Home
last modified time | relevance | path

Searched refs:ihl (Results 1 – 25 of 70) sorted by relevance

123

/external/android-clat/
Dipv4.c73 if (header->ihl < 5) { in ipv4_packet()
74 logmsg_dbg(ANDROID_LOG_ERROR, "ip_packet/ip header length set to less than 5: %x", header->ihl); in ipv4_packet()
78 if ((size_t)header->ihl * 4 > len) { // ip header length larger than entire packet in ipv4_packet()
79 logmsg_dbg(ANDROID_LOG_ERROR, "ip_packet/ip header length set too large: %x", header->ihl); in ipv4_packet()
93 next_header = packet + header->ihl * 4; in ipv4_packet()
94 len_left = len - header->ihl * 4; in ipv4_packet()
/external/linux-kselftest/tools/testing/selftests/bpf/progs/
Dtest_tc_edt.c84 uint32_t ihl; in handle_ipv4() local
92 ihl = iph->ihl * 4; in handle_ipv4()
93 if (((void *)iph) + ihl > data_end) in handle_ipv4()
97 return handle_tcp(skb, (struct tcphdr *)(((void *)iph) + ihl)); in handle_ipv4()
Dtest_sk_assign.c62 if (iph->ihl != 5) in get_tuple()
65 ihl_len = iph->ihl * 4; in get_tuple()
Dtest_tc_tunnel.c120 iph_inner.ihl = 5; in __encap_ipv4()
138 if (iph_inner.ihl != 5 || iph_inner.protocol != IPPROTO_TCP) in __encap_ipv4()
587 if (iph_outer.ihl != 5) in decap_ipv4()
Dtest_lwt_ip_encap.c26 hdr.iph.ihl = 5; in bpf_lwt_encap_gre()
Dtest_migrate_reuseport.c65 tcp = (struct tcphdr *)((void *)ip + ip->ihl * 4); in drop_ack()
Dtest_cls_redirect.c200 if (ipv4->ihl <= 5) { in pkt_skip_ipv4_options()
204 return buf_skip(buf, (ipv4->ihl - 5) * 4); in pkt_skip_ipv4_options()
220 if (ipv4->ihl < 5) { in pkt_parse_ipv4()
968 if (encap->ip.ihl != 5) { in cls_redirect()
Dtest_pkt_access.c117 ihl_len = iph->ihl * 4; in test_pkt_access()
Dbpf_flow.c273 if (iph->ihl < 5) in PROG()
281 keys->thoff += iph->ihl << 2; in PROG()
Dtest_tcp_check_syncookie_kern.c70 if (ipv4h->ihl != 5) in check_syncookie()
/external/iproute2/testsuite/tests/tc/
Dpedit.t86 do_pedit ip ihl set 0x04
88 do_pedit ip ihl set 0x40
90 do_pedit ip ihl preserve
92 do_pedit ip ihl invert
94 do_pedit ip ihl clear
/external/ltp/runtest/
Dnet_stress.broken_ip7 broken_ip4-ihl broken_ip-ihl.sh
/external/linux-kselftest/tools/testing/selftests/bpf/prog_tests/
Dflow_dissector.c112 .iph.ihl = 5,
154 .iph.ihl = 5,
198 .iph.ihl = 5,
224 .iph.ihl = 5,
338 .iph.ihl = 5,
341 .iph_inner.ihl = 5,
366 .iph.ihl = 5,
369 .iph_inner.ihl = 5,
/external/cronet/net/third_party/quiche/src/quiche/quic/masque/
Dmasque_encapsulated_client_session.cc101 uint8_t ihl = first_byte & 0xF; in ProcessIpPacket() local
102 if (ihl < 5) { in ProcessIpPacket()
104 << static_cast<int>(ihl) << "\n" in ProcessIpPacket()
147 uint8_t ip_options_length = (ihl - 5) * 4; in ProcessIpPacket()
/external/linux-kselftest/tools/testing/selftests/drivers/net/mlxsw/
Ddevlink_trap_l3_drops.sh356 local ihl=$1; shift
362 )"$ihl:"$( : IHL
380 local ihl=$1; shift
393 payload=$(ipv4_payload_get $ipver $ihl $checksum)
456 local ihl="5"
459 __ipv4_header_corrupted_test "wrong IP version" 5 $ihl $checksum
461 __ipv4_header_corrupted_test "wrong checksum" $ipv $ihl "00:00"
/external/scapy/scapy/layers/
Dinet.py381 PacketListField("options", [], IPOption, length_from=lambda p:p.ihl*4-20) ]
383 ihl = self.ihl
385 if ihl is None:
386 ihl = len(p)//4
387 p = chb(((self.version&0xf)<<4) | ihl&0x0f)+p[1:]
397 l = self.len - (self.ihl << 2)
495 if u.ihl is None:
497 ihl = 5 + olen // 4 + (1 if olen % 4 else 0)
499 ihl = u.ihl
500 ln = u.len - 4 * ihl
[all …]
/external/kernel-headers/original/uapi/linux/
Dip.h89 __u8 ihl:4, member
93 ihl:4;
/external/iproute2/include/uapi/linux/
Dip.h88 __u8 ihl:4, member
92 ihl:4;
/external/libnl/include/linux-private/linux/
Dip.h88 __u8 ihl:4, member
92 ihl:4;
/external/musl/include/netinet/
Dip.h26 unsigned int ihl:4; member
30 unsigned int ihl:4;
/external/linux-kselftest/tools/testing/selftests/net/
Dpsock_snd.c121 iph->ihl = 5; in build_ipv4_header()
129 iph->check = build_ip_csum((void *) iph, iph->ihl << 1, 0); in build_ipv4_header()
131 return iph->ihl << 2; in build_ipv4_header()
/external/iputils/
Dping.c799 hlen = ip->ihl*4; in parse_reply()
800 if (cc < hlen + 8 || ip->ihl < 5) { in parse_reply()
857 struct icmphdr *icp1 = (struct icmphdr*)((unsigned char *)iph + iph->ihl*4); in parse_reply()
860 cc < 8+iph->ihl*4+8) in parse_reply()
1291 hlen = ip->ihl << 2; in pr_iph()
1296 ip->version, ip->ihl, ip->tos, ip->tot_len, ip->id); in pr_iph()
/external/ltp/testcases/network/stress/ns-tools/
Dns-icmpv4_sender.c367 pkt.hdr.ihl = sizeof(struct iphdr) / 4; in create_clean_packet()
431 pkt->hdr.ihl ^= seed; in thrust_fakes()
/external/selinux/python/po/
Dcs.po529 msgstr "Nelze zjistit, zda-li je mapování přihlášení definováno pro %s"
549 msgstr "Nelze vytvořit mapování přihlášení pro %s"
569 msgstr "Nelze přidat mapování přihlášení pro %s"
578 msgstr "Mapování přihlášení není definováno pro %s"
588 msgstr "Nelze upravit mapování přihlášení pro %s"
593 msgstr "Mapování přihlášení pro %s je definováno v politice, nelze ho smazat"
598 msgstr "Nelze smazat mapování přihlášení pro %s"
603 msgstr "Nelze vypsat mapování přihlášení"
1602 msgstr "Minimální role uživatele přihlášení do terminálu"
1606 msgstr "Minimální role uživatele přihlášení do X Windows"
[all …]
/external/iptables/utils/
Dnfsynproxy.c31 const struct tcphdr *th = (void *)iph + iph->ihl * 4; in parse_packet()

123