/linux-master/include/net/netfilter/ |
H A D | nf_synproxy.h | 41 u32 tsecr; member in struct:synproxy_options
|
/linux-master/net/netfilter/ |
H A D | nf_synproxy_core.c | 79 opts->tsecr = get_unaligned_be32(ptr + 4); 138 *ptr++ = htonl(opts->tsecr); 155 opts->tsecr = opts->tsval; 175 opts->wscale = opts->tsecr & 0xf; 179 opts->options |= opts->tsecr & (1 << 4) ? NF_SYNPROXY_OPT_SACK_PERM : 0; 181 opts->options |= opts->tsecr & (1 << 5) ? NF_SYNPROXY_OPT_ECN : 0; 712 synproxy->its = opts.tsecr; 732 swap(opts.tsval, opts.tsecr); 738 swap(opts.tsval, opts.tsecr); 1135 synproxy->its = opts.tsecr; [all...] |
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | xdp_synproxy_kern.c | 192 __be32 *tsecr; member in struct:tcpopt_context 219 __u8 *opcode, *opsize, *wscale, *tsecr; local 244 tsecr = next(ctx, 4); 245 if (!tsecr) 249 /* Client's tsval becomes our tsecr. */ 250 *ctx->tsecr = get_unaligned((__be32 *)tsecr); 276 __be32 *tsecr, void *data, void *data_end) 281 .tsecr = tsecr, 274 tscookie_init(struct tcphdr *tcp_header, __u16 tcp_len, __be32 *tsval, __be32 *tsecr, void *data, void *data_end) argument [all...] |
H A D | test_tcp_custom_syncookie.c | 222 __u32 *tsval, *tsecr; local 259 tsecr = next(ctx, 4); 260 if (*opsize == TCPOLEN_TIMESTAMP && tsval && tsecr) { 262 ctx->attrs.rcv_tsecr = get_unaligned_be32(tsecr);
|
/linux-master/net/sched/ |
H A D | sch_cake.c | 1067 u32 *tsval, u32 *tsecr) 1076 *tsecr = get_unaligned_be32(ptr + 4); 1086 u32 tstamp, tsecr; local 1130 tsecr = get_unaligned_be32(ptr + 4); 1132 after(tsecr, tsecr_new)) 1165 u32 tstamp = 0, tsecr = 0; local 1179 cake_tcph_get_tstamp(tcph, &tstamp, &tsecr); 1246 if (!cake_tcph_may_drop(tcph_check, tstamp, tsecr) || 1066 cake_tcph_get_tstamp(const struct tcphdr *tcph, u32 *tsval, u32 *tsecr) argument
|
/linux-master/net/ipv6/ |
H A D | tcp_ipv6.c | 865 u32 ack, u32 win, u32 tsval, u32 tsecr, 880 if (tsecr) 918 if (tsecr) { 922 *topt++ = htonl(tsecr); 1145 u32 ack, u32 win, u32 tsval, u32 tsecr, int oif, 1149 tcp_v6_send_response(sk, skb, seq, ack, win, tsval, tsecr, oif, 0, 864 tcp_v6_send_response(const struct sock *sk, struct sk_buff *skb, u32 seq, u32 ack, u32 win, u32 tsval, u32 tsecr, int oif, int rst, u8 tclass, __be32 label, u32 priority, u32 txhash, struct tcp_key *key) argument 1144 tcp_v6_send_ack(const struct sock *sk, struct sk_buff *skb, u32 seq, u32 ack, u32 win, u32 tsval, u32 tsecr, int oif, struct tcp_key *key, u8 tclass, __be32 label, u32 priority, u32 txhash) argument
|
/linux-master/tools/testing/selftests/net/ |
H A D | gro.c | 426 uint32_t tsecr; member in struct:tcp_option_ts 449 opt_ts->tsecr = 0;
|
/linux-master/net/ipv4/ |
H A D | tcp_output.c | 32 * Andrea Arcangeli: SYNACK carry ts_recent in tsecr. 450 __u32 tsval, tsecr; /* need to include OPTION_TS */ member in struct:tcp_out_options 692 *ptr++ = htonl(opts->tsecr); 847 opts->tsecr = tp->rx_opt.ts_recent; 935 opts->tsecr = READ_ONCE(req->ts_recent); 992 opts->tsecr = tp->rx_opt.ts_recent;
|
H A D | tcp_ipv4.c | 920 u32 win, u32 tsval, u32 tsecr, int oif, 939 if (tsecr) { 944 rep.opt[2] = htonl(tsecr); 959 int offset = (tsecr) ? 3 : 0; 975 int offset = (tsecr) ? 3 : 0; 918 tcp_v4_send_ack(const struct sock *sk, struct sk_buff *skb, u32 seq, u32 ack, u32 win, u32 tsval, u32 tsecr, int oif, struct tcp_key *key, int reply_flags, u8 tos, u32 txhash) argument
|