Lines Matching refs:cookie

1670 		__aligned_u64	cookie;
1745 __u64 cookie;
2774 * retrieve the cookie (generated by the kernel) of this socket.
2775 * If no cookie has been set yet, generate a new cookie. Once
2776 * generated, the socket cookie remains stable for the life of the
3929 * Check whether *iph* and *th* contain a valid SYN cookie ACK for
3940 * 0 if *iph* and *th* are a valid SYN cookie ACK, or a negative
4116 * Try to issue a SYN cookie for the packet with corresponding
4127 * On success, lower 32 bits hold the generated SYN cookie in
4128 * followed by 16 bits which hold the MSS value for that cookie,
4133 * **-EINVAL** SYN cookie cannot be issued due to error
4135 * **-ENOENT** SYN cookie should not be issued (no SYN flood)
4315 * Retrieve the cookie (generated by the kernel) of the network
4317 * namespace cookie remains stable for its lifetime and provides
4319 * NULL, then the helper returns the cookie for the initial
4320 * network namespace. The cookie itself is very similar to that
5635 * Try to issue a SYN cookie for the packet with corresponding
5645 * On success, lower 32 bits hold the generated SYN cookie in
5646 * followed by 16 bits which hold the MSS value for that cookie,
5655 * Try to issue a SYN cookie for the packet with corresponding
5665 * On success, lower 32 bits hold the generated SYN cookie in
5666 * followed by 16 bits which hold the MSS value for that cookie,
5677 * Check whether *iph* and *th* contain a valid SYN cookie ACK
5684 * 0 if *iph* and *th* are a valid SYN cookie ACK.
5688 * **-EACCES** if the SYN cookie is not valid.
5692 * Check whether *iph* and *th* contain a valid SYN cookie ACK
5699 * 0 if *iph* and *th* are a valid SYN cookie ACK.
5703 * **-EACCES** if the SYN cookie is not valid.
6697 __u64 cookie;
6705 __u64 cookie;
6711 __u64 cookie;
6717 __u64 cookie;
7369 __u64 cookie; /* Non-zero if socket was selected in PROG_TEST_RUN */