/external/android-clat/ |
D | ipv4.c | 73 if (header->ihl < 5) { in ipv4_packet() 74 logmsg_dbg(ANDROID_LOG_ERROR, "ip_packet/ip header length set to less than 5: %x", header->ihl); in ipv4_packet() 78 if ((size_t)header->ihl * 4 > len) { // ip header length larger than entire packet in ipv4_packet() 79 logmsg_dbg(ANDROID_LOG_ERROR, "ip_packet/ip header length set too large: %x", header->ihl); in ipv4_packet() 93 next_header = packet + header->ihl * 4; in ipv4_packet() 94 len_left = len - header->ihl * 4; in ipv4_packet()
|
/external/linux-kselftest/tools/testing/selftests/bpf/progs/ |
D | test_tc_edt.c | 84 uint32_t ihl; in handle_ipv4() local 92 ihl = iph->ihl * 4; in handle_ipv4() 93 if (((void *)iph) + ihl > data_end) in handle_ipv4() 97 return handle_tcp(skb, (struct tcphdr *)(((void *)iph) + ihl)); in handle_ipv4()
|
D | test_sk_assign.c | 62 if (iph->ihl != 5) in get_tuple() 65 ihl_len = iph->ihl * 4; in get_tuple()
|
D | test_tc_tunnel.c | 120 iph_inner.ihl = 5; in __encap_ipv4() 138 if (iph_inner.ihl != 5 || iph_inner.protocol != IPPROTO_TCP) in __encap_ipv4() 587 if (iph_outer.ihl != 5) in decap_ipv4()
|
D | test_lwt_ip_encap.c | 26 hdr.iph.ihl = 5; in bpf_lwt_encap_gre()
|
D | test_migrate_reuseport.c | 65 tcp = (struct tcphdr *)((void *)ip + ip->ihl * 4); in drop_ack()
|
D | test_cls_redirect.c | 200 if (ipv4->ihl <= 5) { in pkt_skip_ipv4_options() 204 return buf_skip(buf, (ipv4->ihl - 5) * 4); in pkt_skip_ipv4_options() 220 if (ipv4->ihl < 5) { in pkt_parse_ipv4() 968 if (encap->ip.ihl != 5) { in cls_redirect()
|
D | test_pkt_access.c | 117 ihl_len = iph->ihl * 4; in test_pkt_access()
|
D | bpf_flow.c | 273 if (iph->ihl < 5) in PROG() 281 keys->thoff += iph->ihl << 2; in PROG()
|
D | test_tcp_check_syncookie_kern.c | 70 if (ipv4h->ihl != 5) in check_syncookie()
|
/external/iproute2/testsuite/tests/tc/ |
D | pedit.t | 86 do_pedit ip ihl set 0x04 88 do_pedit ip ihl set 0x40 90 do_pedit ip ihl preserve 92 do_pedit ip ihl invert 94 do_pedit ip ihl clear
|
/external/ltp/runtest/ |
D | net_stress.broken_ip | 7 broken_ip4-ihl broken_ip-ihl.sh
|
/external/linux-kselftest/tools/testing/selftests/bpf/prog_tests/ |
D | flow_dissector.c | 112 .iph.ihl = 5, 154 .iph.ihl = 5, 198 .iph.ihl = 5, 224 .iph.ihl = 5, 338 .iph.ihl = 5, 341 .iph_inner.ihl = 5, 366 .iph.ihl = 5, 369 .iph_inner.ihl = 5,
|
/external/cronet/net/third_party/quiche/src/quiche/quic/masque/ |
D | masque_encapsulated_client_session.cc | 101 uint8_t ihl = first_byte & 0xF; in ProcessIpPacket() local 102 if (ihl < 5) { in ProcessIpPacket() 104 << static_cast<int>(ihl) << "\n" in ProcessIpPacket() 147 uint8_t ip_options_length = (ihl - 5) * 4; in ProcessIpPacket()
|
/external/linux-kselftest/tools/testing/selftests/drivers/net/mlxsw/ |
D | devlink_trap_l3_drops.sh | 356 local ihl=$1; shift 362 )"$ihl:"$( : IHL 380 local ihl=$1; shift 393 payload=$(ipv4_payload_get $ipver $ihl $checksum) 456 local ihl="5" 459 __ipv4_header_corrupted_test "wrong IP version" 5 $ihl $checksum 461 __ipv4_header_corrupted_test "wrong checksum" $ipv $ihl "00:00"
|
/external/scapy/scapy/layers/ |
D | inet.py | 381 PacketListField("options", [], IPOption, length_from=lambda p:p.ihl*4-20) ] 383 ihl = self.ihl 385 if ihl is None: 386 ihl = len(p)//4 387 p = chb(((self.version&0xf)<<4) | ihl&0x0f)+p[1:] 397 l = self.len - (self.ihl << 2) 495 if u.ihl is None: 497 ihl = 5 + olen // 4 + (1 if olen % 4 else 0) 499 ihl = u.ihl 500 ln = u.len - 4 * ihl [all …]
|
/external/kernel-headers/original/uapi/linux/ |
D | ip.h | 89 __u8 ihl:4, member 93 ihl:4;
|
/external/iproute2/include/uapi/linux/ |
D | ip.h | 88 __u8 ihl:4, member 92 ihl:4;
|
/external/libnl/include/linux-private/linux/ |
D | ip.h | 88 __u8 ihl:4, member 92 ihl:4;
|
/external/musl/include/netinet/ |
D | ip.h | 26 unsigned int ihl:4; member 30 unsigned int ihl:4;
|
/external/linux-kselftest/tools/testing/selftests/net/ |
D | psock_snd.c | 121 iph->ihl = 5; in build_ipv4_header() 129 iph->check = build_ip_csum((void *) iph, iph->ihl << 1, 0); in build_ipv4_header() 131 return iph->ihl << 2; in build_ipv4_header()
|
/external/iputils/ |
D | ping.c | 799 hlen = ip->ihl*4; in parse_reply() 800 if (cc < hlen + 8 || ip->ihl < 5) { in parse_reply() 857 struct icmphdr *icp1 = (struct icmphdr*)((unsigned char *)iph + iph->ihl*4); in parse_reply() 860 cc < 8+iph->ihl*4+8) in parse_reply() 1291 hlen = ip->ihl << 2; in pr_iph() 1296 ip->version, ip->ihl, ip->tos, ip->tot_len, ip->id); in pr_iph()
|
/external/ltp/testcases/network/stress/ns-tools/ |
D | ns-icmpv4_sender.c | 367 pkt.hdr.ihl = sizeof(struct iphdr) / 4; in create_clean_packet() 431 pkt->hdr.ihl ^= seed; in thrust_fakes()
|
/external/selinux/python/po/ |
D | cs.po | 529 msgstr "Nelze zjistit, zda-li je mapování přihlášení definováno pro %s" 549 msgstr "Nelze vytvořit mapování přihlášení pro %s" 569 msgstr "Nelze přidat mapování přihlášení pro %s" 578 msgstr "Mapování přihlášení není definováno pro %s" 588 msgstr "Nelze upravit mapování přihlášení pro %s" 593 msgstr "Mapování přihlášení pro %s je definováno v politice, nelze ho smazat" 598 msgstr "Nelze smazat mapování přihlášení pro %s" 603 msgstr "Nelze vypsat mapování přihlášení" 1602 msgstr "Minimální role uživatele přihlášení do terminálu" 1606 msgstr "Minimální role uživatele přihlášení do X Windows" [all …]
|
/external/iptables/utils/ |
D | nfsynproxy.c | 31 const struct tcphdr *th = (void *)iph + iph->ihl * 4; in parse_packet()
|