Lines Matching refs:ofs
404 u32* const ofs)) { in FUNC() argument
405 u32 first_unread_offset = *ofs; in FUNC()
412 if (*ofs >= udp_len) return error_packet; in FUNC()
413 v = udp[(*ofs)++]; in FUNC()
417 if (*ofs >= udp_len) return error_packet; in FUNC()
418 w = udp[(*ofs)++]; in FUNC()
419 if (*ofs > first_unread_offset) first_unread_offset = *ofs; in FUNC()
421 … if (new_ofs >= *ofs) return error_packet; /* RFC 1035 4.1.4 allows only backward pointers */ in FUNC()
422 *ofs = new_ofs; in FUNC()
427 if (*ofs + label_size > udp_len) return error_packet; in FUNC()
434 u8 w = udp[(*ofs)++]; in FUNC()
439 *ofs += label_size; in FUNC()
443 *ofs += label_size; in FUNC()
446 if (first_unread_offset > *ofs) *ofs = first_unread_offset; in FUNC()
480 u32 i, ofs = 12; /* dns header is 12 bytes */ in FUNC() local
485 … match_result_type m = apf_internal_match_single_name(needles, needle_bound, udp, udp_len, &ofs); in FUNC()
488 if (ofs + 2 > udp_len) return error_packet; in FUNC()
489 qtype = (int)read_be16(udp + ofs); in FUNC()
490 ofs += 4; /* skip be16 qtype & qclass */ in FUNC()
497 … match_result_type m = apf_internal_match_single_name(needles, needle_bound, udp, udp_len, &ofs); in FUNC()
499 ofs += 8; /* skip be16 type, class & be32 ttl */ in FUNC()
500 if (ofs + 2 > udp_len) return error_packet; in FUNC()
501 ofs += 2 + read_be16(udp + ofs); /* skip be16 rdata length field, plus length bytes */ in FUNC()