Home
last modified time | relevance | path

Searched refs:opsize (Results 1 – 6 of 6) sorted by relevance

/linux/tools/testing/selftests/bpf/progs/
H A Dtest_tcp_custom_syncookie.c222 __u8 *opcode, *opsize, *wscale; in tcp_parse_option() local
238 opsize = next(ctx, 1); in tcp_parse_option()
239 if (!opsize) in tcp_parse_option()
242 if (*opsize < 2) in tcp_parse_option()
248 if (*opsize == TCPOLEN_MSS && ctx->tcp->syn && mss) in tcp_parse_option()
253 if (*opsize == TCPOLEN_WINDOW && ctx->tcp->syn && wscale) { in tcp_parse_option()
261 if (*opsize == TCPOLEN_TIMESTAMP && tsval && tsecr) { in tcp_parse_option()
272 if (*opsize == TCPOLEN_SACK_PERM && ctx->tcp->syn) in tcp_parse_option()
277 ctx->off = off + *opsize; in tcp_parse_option()
/linux/net/netfilter/
H A Dnf_conntrack_proto_tcp.c355 int opsize; in tcp_options() local
366 opsize=*ptr++; in tcp_options()
367 if (opsize < 2) /* "silly options" */ in tcp_options()
369 if (opsize > length) in tcp_options()
373 && opsize == TCPOLEN_SACK_PERM) in tcp_options()
376 && opsize == TCPOLEN_WINDOW) { in tcp_options()
385 ptr += opsize - 2; in tcp_options()
386 length -= opsize; in tcp_options()
417 int opsize, i; in tcp_sack() local
428 opsize = *ptr++; in tcp_sack()
[all …]
/linux/net/sched/
H A Dsch_cake.c1028 int opsize; in cake_get_tcpopt() local
1038 opsize = *ptr++; in cake_get_tcpopt()
1039 if (opsize < 2 || opsize > length) in cake_get_tcpopt()
1043 *oplen = opsize; in cake_get_tcpopt()
1047 ptr += opsize - 2; in cake_get_tcpopt()
1048 length -= opsize; in cake_get_tcpopt()
1135 int opsize; in cake_tcph_get_tstamp() local
1137 ptr = cake_get_tcpopt(tcph, TCPOPT_TIMESTAMP, &opsize); in cake_tcph_get_tstamp()
1139 if (ptr && opsize == TCPOLEN_TIMESTAMP) { in cake_tcph_get_tstamp()
1167 int opsize; in cake_tcph_may_drop() local
[all …]
/linux/net/ipv4/
H A Dtcp_input.c4473 int opsize) in smc_parse_options() argument
4477 if (th->syn && !(opsize & 1) && in smc_parse_options()
4478 opsize >= TCPOLEN_EXP_SMC_BASE && in smc_parse_options()
4499 int opsize; in tcp_parse_mss_option() local
4510 opsize = *ptr++; in tcp_parse_mss_option()
4511 if (opsize < 2) /* "silly options" */ in tcp_parse_mss_option()
4513 if (opsize > length) in tcp_parse_mss_option()
4515 if (opcode == TCPOPT_MSS && opsize == TCPOLEN_MSS) { in tcp_parse_mss_option()
4524 ptr += opsize - 2; in tcp_parse_mss_option()
4525 length -= opsize; in tcp_parse_mss_option()
[all …]
H A Dtcp.c4985 int opsize; in tcp_do_parse_auth_options() local
4994 opsize = *ptr++; in tcp_do_parse_auth_options()
4995 if (opsize < 2 || opsize > length) in tcp_do_parse_auth_options()
4998 if (opsize != TCPOLEN_MD5SIG) in tcp_do_parse_auth_options()
5004 if (opsize <= sizeof(struct tcp_ao_hdr)) in tcp_do_parse_auth_options()
5011 ptr += opsize - 2; in tcp_do_parse_auth_options()
5012 length -= opsize; in tcp_do_parse_auth_options()
/linux/arch/m68k/ifpsp060/src/
H A Dpfpsp.S3925 cmpi.b %d0,&0xc # is opsize ext or packed?