Lines Matching +full:4 +full:th
378 const struct tcphdr *th = (struct tcphdr *)(skb->data+offset); in tcp_v6_err() local
389 &hdr->daddr, th->dest, in tcp_v6_err()
390 &hdr->saddr, ntohs(th->source), in tcp_v6_err()
405 seq = ntohl(th->seq); in tcp_v6_err()
491 ipv6_icmp_error(sk, skb, err, th->dest, ntohl(info), (u8 *)th); in tcp_v6_err()
693 const struct tcphdr *th, int nbytes) in tcp_v6_md5_hash_headers() argument
707 memcpy(_th, th, sizeof(*th)); in tcp_v6_md5_hash_headers()
710 sg_init_one(&sg, bp, sizeof(*bp) + sizeof(*th)); in tcp_v6_md5_hash_headers()
712 sizeof(*bp) + sizeof(*th)); in tcp_v6_md5_hash_headers()
718 const struct tcphdr *th) in tcp_v6_md5_hash_hdr() argument
727 if (tcp_v6_md5_hash_headers(&hp, daddr, saddr, th, th->doff << 2)) in tcp_v6_md5_hash_hdr()
750 const struct tcphdr *th = tcp_hdr(skb); in tcp_v6_md5_hash_skb() local
769 if (tcp_v6_md5_hash_headers(&hp, daddr, saddr, th, skb->len)) in tcp_v6_md5_hash_skb()
771 if (tcp_sigpool_hash_skb_data(&hp, skb, th->doff << 2)) in tcp_v6_md5_hash_skb()
872 const struct tcphdr *th = tcp_hdr(skb); in tcp_v6_send_response() local
907 t1->dest = th->source; in tcp_v6_send_response()
908 t1->source = th->dest; in tcp_v6_send_response()
909 t1->doff = tot_len / 4; in tcp_v6_send_response()
912 t1->ack = !rst || !th->ack; in tcp_v6_send_response()
1015 const struct tcphdr *th = tcp_hdr(skb); in tcp_v6_send_reset() local
1035 if (th->rst) in tcp_v6_send_reset()
1046 if (tcp_parse_auth_options(th, &md5_hash_location, &aoh)) in tcp_v6_send_reset()
1075 NULL, 0, &ipv6h->saddr, th->source, in tcp_v6_send_reset()
1076 &ipv6h->daddr, ntohs(th->source), in tcp_v6_send_reset()
1097 if (th->ack) in tcp_v6_send_reset()
1098 seq = ntohl(th->ack_seq); in tcp_v6_send_reset()
1100 ack_seq = ntohl(th->seq) + th->syn + th->fin + skb->len - in tcp_v6_send_reset()
1101 (th->doff << 2); in tcp_v6_send_reset()
1301 const struct tcphdr *th = tcp_hdr(skb); local
1303 if (!th->syn)
1310 struct tcphdr *th, u32 *cookie) argument
1315 &tcp_request_sock_ipv6_ops, sk, th);
1317 *cookie = __cookie_v6_init_sequence(iph, th, &mss);
1698 4. Finally, it really contains options, which user wants to receive.
1726 const struct tcphdr *th) argument
1737 TCP_SKB_CB(skb)->seq = ntohl(th->seq);
1738 TCP_SKB_CB(skb)->end_seq = (TCP_SKB_CB(skb)->seq + th->syn + th->fin +
1739 skb->len - th->doff*4);
1740 TCP_SKB_CB(skb)->ack_seq = ntohl(th->ack_seq);
1741 TCP_SKB_CB(skb)->tcp_flags = tcp_flags_ntohs(th);
1755 const struct tcphdr *th; local
1774 th = (const struct tcphdr *)skb->data;
1776 if (unlikely(th->doff < sizeof(struct tcphdr) / 4)) {
1780 if (!pskb_may_pull(skb, th->doff*4))
1786 th = (const struct tcphdr *)skb->data;
1790 sk = __inet6_lookup_skb(net->ipv4.tcp_death_row.hashinfo, skb, __tcp_hdrlen(th),
1791 th->source, th->dest, inet6_iif(skb), sdif,
1836 th = (const struct tcphdr *)skb->data;
1838 tcp_v6_fill_cb(skb, hdr, th);
1902 th = (const struct tcphdr *)skb->data;
1904 tcp_v6_fill_cb(skb, hdr, th);
1935 tcp_v6_fill_cb(skb, hdr, th);
1966 tcp_v6_fill_cb(skb, hdr, th);
1973 tw_status = tcp_timewait_state_process(inet_twsk(sk), skb, th, &isn);
1980 skb, __tcp_hdrlen(th),
1981 &ipv6_hdr(skb)->saddr, th->source,
1983 ntohs(th->dest),
2016 const struct tcphdr *th; local
2026 th = tcp_hdr(skb);
2028 if (th->doff < sizeof(struct tcphdr) / 4)
2033 &hdr->saddr, th->source,
2034 &hdr->daddr, ntohs(th->dest),
2153 "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
2200 timer_active = 4;
2221 "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "
2261 "%4d: %08X%08X%08X%08X:%04X %08X%08X%08X%08X:%04X "