Home
last modified time | relevance | path

Searched refs:tot_len (Results 1 – 8 of 8) sorted by relevance

/packages/modules/Connectivity/bpf_progs/
Dclatd.c116 __u16 tot_len = ntohs(ip6->payload_len) + sizeof(struct iphdr); // cannot overflow, see above in nat64() local
137 tot_len -= sizeof(struct frag_hdr); in nat64()
139 if (tot_len < sizeof(struct iphdr)) return TC_ACT_PIPE; in nat64()
168 .tot_len = htons(tot_len), // be16 in nat64()
334 if (ntohs(ip4->tot_len) < sizeof(*ip4)) return TC_ACT_PIPE;
379 .payload_len = htons(ntohs(ip4->tot_len) - 20), // __be16
Doffload.c606 if (ntohs(ip->tot_len) < sizeof(*ip)) TC_PUNT(TRUNCATED_IPV4); in do_forward4()
Doffload@mainline.c606 if (ntohs(ip->tot_len) < sizeof(*ip)) TC_PUNT(TRUNCATED_IPV4); in do_forward4()
/packages/apps/Gallery2/jni/filters/
Dnegative.c24 int tot_len = height * width * 4; in JNIFUNCF() local
27 for (i = 0; i < tot_len; i+=4) { in JNIFUNCF()
/packages/modules/Connectivity/clatd/
Dipv6.c175 ip_targ->tot_len = htons(ntohs(ip_targ->tot_len) + packet_length(out, pos)); in ipv6_packet()
Ddump.c52 printf("tot_len = %x\n", ntohs(header->tot_len)); in dump_ip()
Dclatd_test.cpp220 EXPECT_EQ(len, ntohs(ip->tot_len)) << msg << ": Incorrect IPv4 length\n"; in check_packet()
366 ip->tot_len = htons(total_length); in reassemble_packet()
Dtranslate.c132 ip->tot_len = htons(sizeof(struct iphdr) + payload_len); in fill_ip_header()