lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 13 Mar 2007 16:22:37 -0700
From:	"Jesse Brandeburg" <>
To:	"Arnaldo Carvalho de Melo" <>
Cc:	"David Miller" <>,
	"Netdev List" <>
Subject: Re: [PATCH 09/15] [TCP]: Introduce tcp_hdrlen() and tcp_optlen()

On 3/13/07, Arnaldo Carvalho de Melo <> wrote:
> Introduce tcp_hdrlen() and tcp_optlen():
> The ip_hdrlen() buddy, created to reduce the number of skb->> uses and to
> avoid the longer, open coded equivalent.

+static inline unsigned int tcp_hdrlen(const struct sk_buff *skb)
+	return skb->>doff * 4;
+static inline unsigned int tcp_optlen(const struct sk_buff *skb)
+	return (skb->>doff - 5) * 4;

acme, good stuff, but does the " * 4" generate equivalent assembly
with gcc 3/4 as " << 2" ?

I could assume that the compiler would be smart enough, but every time
I assume I know what the compiler is doing I get myself in trouble.
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to
More majordomo info at

Powered by blists - more mailing lists