Home
last modified time | relevance | path

Searched full:tcp (Results 1 – 25 of 1807) sorted by relevance

12345678910>>...73

/openbmc/linux/net/ipv4/
H A DKconfig269 bool "IP: TCP syncookie support"
271 Normal TCP/IP networking is open to an attack known as "SYN
278 say Y here, the TCP/IP stack will use a cryptographic challenge
281 is no need for the legitimate users to change their TCP/IP software;
384 bool "IP: ESP in TCP encapsulation (RFC 8229)"
391 TCP/IPv4 sockets.
428 Support for INET (TCP, DCCP, etc) socket monitoring interface used by
470 bool "TCP: advanced congestion control"
472 Support for selection of various TCP congestion control
486 BIC-TCP is a sender-side only change that ensures a linear RTT
[all …]
H A Dtcp_lp.c3 * TCP Low Priority (TCP-LP)
5 * TCP Low Priority is a distributed algorithm whose goal is to utilize only
7 * bandwidth as targeted by TCP.
11 * the original TCP-LP implementation:
26 * http://www.ece.rice.edu/~akuzma/Doc/akuzma/TCP-LP.pdf
28 * http://www-ece.rice.edu/networks/TCP-LP/
34 * http://tcp-lp-mod.sourceforge.net/
38 #include <net/tcp.h>
50 * TCP-LP's state flags.
62 * @flag: TCP-LP state flag
[all …]
H A Dtcp_westwood.c3 * TCP Westwood+: end-to-end bandwidth estimation for TCP
5 * Angelo Dell'Aera: author of the first version of TCP Westwood+ in Linux 2.4
11 * "TCP Westwood: bandwidth estimation for TCP" Proc. ACM Mobicom 2001
14 * "Performance evaluation of New Reno, Vegas, Westwood+ TCP" ACM Computer
18 * "Linux 2.4 Implementation of Westwood+ TCP with Rate-Halving :
29 #include <net/tcp.h>
31 /* TCP Westwood structure */
46 /* TCP Westwood functions and constants */
52 * This function initializes fields used in TCP Westwood+,
212 * TCP Westwood
[all …]
/openbmc/linux/Documentation/networking/
H A Dkcm.rst8 interface over TCP for generic application protocols. With KCM an application
9 can efficiently send and receive application protocol messages over TCP using
31 | TCP sock | | TCP sock | | TCP sock | | TCP sock | | TCP sock |
46 written on a KCM socket are sent atomically on an appropriate TCP socket.
47 Similarly, in the receive path, messages are constructed on each TCP socket
50 TCP sockets & Psocks
53 TCP sockets may be bound to a KCM multiplexor. A Psock structure is allocated
54 for each bound TCP socket, this structure holds the state for constructing
60 Each multiplexor assumes that all attached TCP connections are to the same
73 Messages are sent over a TCP stream with some application protocol message
[all …]
H A Dsnmp_counter.rst32 The number of packets delivers to the upper layer protocols. E.g. TCP, UDP,
249 General TCP counters
257 The number of packets received by the TCP layer. As mentioned in
259 error, invalid TCP header and so on. Only one error won't be included:
263 packets would be delivered to the TCP layer, but the TCP layer will discard
274 The number of packets sent by the TCP layer. As mentioned in RFC1213,
286 It means the TCP layer sends a SYN, and come into the SYN-SENT
296 It means the TCP layer receives a SYN, replies a SYN+ACK, come into
301 When packets are received by the TCP layer and are not be read by the
302 application, the TCP layer will try to merge them. This counter
[all …]
/openbmc/linux/net/netfilter/
H A Dnf_conntrack_proto_tcp.c12 #include <linux/tcp.h>
19 #include <net/tcp.h>
91 /* What TCP flags are set from RST/SYN/FIN/ACK. */
102 * The TCP state transition table needs a few words...
271 seq_printf(s, "%s ", tcp_conntrack_names[ct->proto.tcp.state]); in tcp_print_conntrack()
284 /* TCP connection tracking based on 'Real Stateful TCP Packet Filtering
515 struct ip_ct_tcp *state = &ct->proto.tcp; in tcp_in_window()
581 * RFC 793: "if a TCP is reinitialized ... then it need in tcp_in_window()
586 * syn(-ack) reply, it might differ in seq, ack or tcp options. in tcp_in_window()
605 * Broken TCP stacks, that set ACK in RST packets as well in tcp_in_window()
[all …]
H A Dnft_synproxy.c4 #include <net/tcp.h>
24 const struct tcphdr *tcp, in nft_synproxy_tcp_options() argument
30 if (tcp->ece && tcp->cwr) in nft_synproxy_tcp_options()
47 const struct tcphdr *tcp, in nft_synproxy_eval_v4() argument
56 if (tcp->syn) { in nft_synproxy_eval_v4()
58 nft_synproxy_tcp_options(opts, tcp, snet, &info, priv); in nft_synproxy_eval_v4()
59 synproxy_send_client_synack(net, skb, tcp, opts); in nft_synproxy_eval_v4()
62 } else if (tcp->ack) { in nft_synproxy_eval_v4()
64 if (synproxy_recv_client_ack(net, skb, tcp, opts, in nft_synproxy_eval_v4()
65 ntohl(tcp->seq))) { in nft_synproxy_eval_v4()
[all …]
H A Dnfnetlink_osf.c14 #include <linux/tcp.h>
17 #include <net/tcp.h>
171 const struct tcphdr *tcp; in nf_osf_hdr_ctx_init() local
173 tcp = skb_header_pointer(skb, ip_hdrlen(skb), sizeof(struct tcphdr), _tcph); in nf_osf_hdr_ctx_init()
174 if (!tcp) in nf_osf_hdr_ctx_init()
177 if (!tcp->syn) in nf_osf_hdr_ctx_init()
182 ctx->window = ntohs(tcp->window); in nf_osf_hdr_ctx_init()
184 if (tcp->doff * 4 > sizeof(struct tcphdr)) { in nf_osf_hdr_ctx_init()
185 ctx->optsize = tcp->doff * 4 - sizeof(struct tcphdr); in nf_osf_hdr_ctx_init()
193 return tcp; in nf_osf_hdr_ctx_init()
[all …]
/openbmc/linux/tools/testing/selftests/bpf/prog_tests/
H A Dflow_dissector.c47 struct tcphdr tcp; member
54 struct tcphdr tcp; member
62 struct tcphdr tcp; member
68 struct tcphdr tcp; member
80 struct tcphdr tcp; member
90 struct tcphdr tcp; member
119 .tcp.doff = 5,
120 .tcp.source = 80,
121 .tcp.dest = 8080,
140 .tcp.doff = 5,
[all …]
/openbmc/openbmc/meta-google/recipes-google/networking/gbmc-bridge/
H A D50-gbmc-br-cn-redirect.rules15 tcp dport 10167-10168 mark set 0xff
16 mark 1 tcp dport 10166 tcp dport set 10167 notrack
17 mark 2 tcp dport 10166 tcp dport set 10168 notrack
21 tcp sport 10167 tcp sport set 10166 notrack
22 tcp sport 10168 tcp sport set 10166 notrack
/openbmc/linux/tools/testing/selftests/bpf/progs/
H A Dxdp_synproxy_kern.c369 struct tcphdr *tcp; member
395 hdr->tcp = (void *)hdr->ipv4 + hdr->ipv4->ihl * 4; in tcp_dissect()
412 hdr->tcp = (void *)hdr->ipv6 + sizeof(*hdr->ipv6); in tcp_dissect()
419 if (hdr->tcp + 1 > data_end) in tcp_dissect()
421 hdr->tcp_len = hdr->tcp->doff * 4; in tcp_dissect()
422 if (hdr->tcp_len < sizeof(*hdr->tcp)) in tcp_dissect()
439 /* TCP doesn't normally use fragments, and XDP can't reassemble in tcp_lookup()
447 tup.ipv4.sport = hdr->tcp->source; in tcp_lookup()
448 tup.ipv4.dport = hdr->tcp->dest; in tcp_lookup()
453 tup.ipv6.sport = hdr->tcp->source; in tcp_lookup()
[all …]
H A Dtest_pkt_access.c12 #include <linux/tcp.h>
89 struct tcphdr *tcp = NULL; in test_pkt_write_access_subprog() local
94 tcp = data + off; in test_pkt_write_access_subprog()
95 if (tcp + 1 > data_end) in test_pkt_write_access_subprog()
98 tcp->check++; in test_pkt_write_access_subprog()
108 struct tcphdr *tcp = NULL; in test_pkt_access() local
122 tcp = (struct tcphdr *)((void *)(iph) + ihl_len); in test_pkt_access()
130 tcp = (struct tcphdr *)((void *)(ip6h) + ihl_len); in test_pkt_access()
139 if (tcp) { in test_pkt_access()
140 if (test_pkt_write_access_subprog(skb, (void *)tcp - data)) in test_pkt_access()
[all …]
H A Dtest_migrate_reuseport.c19 #include <linux/tcp.h>
50 struct tcphdr *tcp = NULL; in drop_ack() local
65 tcp = (struct tcphdr *)((void *)ip + ip->ihl * 4); in drop_ack()
77 tcp = (struct tcphdr *)(ipv6 + 1); in drop_ack()
84 if (tcp + 1 > data_end) in drop_ack()
87 if (tcp->dest != server_port) in drop_ack()
90 if (!tcp->syn && tcp->ack) in drop_ack()
/openbmc/linux/include/net/
H A Dslhc_vj.h4 * Definitions for tcp compression routines.
43 * The first octet contains the packet type (top 3 bits), TCP
44 * 'push' bit, and flags that indicate which of the 4 TCP sequence
46 * conversation number that associates a saved IP/TCP header with
47 * the compressed packet. The next two octets are the TCP checksum
54 * in the following order): TCP urgent pointer, window,
69 * three possible types: IP (not proto TCP or tcp with one of the
70 * control flags set); uncompressed TCP (a normal IP/TCP packet but
73 * TCP (described above).
75 * LSB of 4-bit field is TCP "PUSH" bit (a worthless anachronism) and
[all …]
/openbmc/qemu/tests/qemu-iotests/
H A D083.out4 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
8 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
12 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
16 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
20 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
24 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
28 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
32 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
36 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
40 qemu-io: can't open device nbd+tcp://127.0.0.1:PORT/foo
[all …]
/openbmc/openbmc-test-automation/security/
H A Dtest_bmc_network_security.robot148 Send Continuous TCP Connection Requests To Redfish Interface And Check Stability
149 [Documentation] Establish large number of TCP connections to Redfish port (443)
153 # Establish large number of TCP connections to Redfish interface.
154 ${connection_loss}= Establish TCP Connections And Get Connection Failures
161 # Check if TCP connections dropped.
166 Send Continuous TCP Connection Requests To IPMI Interface And Check Stability
167 [Documentation] Establish large number of TCP connections to IPMI interface
171 # Establish large number of TCP connections to IPMI interface.
172 ${connection_loss}= Establish TCP Connections And Get Connection Failures
178 # Check if TCP/Network connections dropped.
[all …]
/openbmc/linux/drivers/net/ethernet/mellanox/mlx5/core/en/tc/
H A Dct_fs_smfs.c47 mlx5_ct_fs_smfs_fill_mask(struct mlx5_ct_fs *fs, struct mlx5_flow_spec *spec, bool ipv4, bool tcp, in mlx5_ct_fs_smfs_fill_mask() argument
76 if (likely(tcp)) { in mlx5_ct_fs_smfs_fill_mask()
91 bool tcp, bool gre, u32 priority) in mlx5_ct_fs_smfs_matcher_create() argument
100 mlx5_ct_fs_smfs_fill_mask(fs, spec, ipv4, tcp, gre); in mlx5_ct_fs_smfs_matcher_create()
112 mlx5_ct_fs_smfs_matcher_get(struct mlx5_ct_fs *fs, bool nat, bool ipv4, bool tcp, bool gre) in mlx5_ct_fs_smfs_matcher_get() argument
123 smfs_matcher = &matchers->smfs_matchers[ipv4 * 3 + tcp * 2 + gre]; in mlx5_ct_fs_smfs_matcher_get()
149 dr_matcher = mlx5_ct_fs_smfs_matcher_create(fs, tbl, ipv4, tcp, gre, prio); in mlx5_ct_fs_smfs_matcher_get()
152 "ct_fs_smfs: failed to create matcher (nat %d, ipv4 %d, tcp %d, gre %d), err: %ld\n", in mlx5_ct_fs_smfs_matcher_get()
153 nat, ipv4, tcp, gre, PTR_ERR(dr_matcher)); in mlx5_ct_fs_smfs_matcher_get()
230 DISS_BIT(PORTS) | DISS_BIT(TCP); in mlx5_tc_ct_valid_used_dissector_keys()
[all …]
/openbmc/linux/include/linux/
H A Dnvme-tcp.h3 * NVMe over Fabrics TCP protocol header.
62 * struct nvme_tcp_hdr - nvme tcp pdu common header
79 * struct nvme_tcp_icreq_pdu - nvme tcp initialize connection request pdu
97 * struct nvme_tcp_icresp_pdu - nvme tcp initialize connection response pdu
115 * struct nvme_tcp_term_pdu - nvme tcp terminate connection pdu
130 * struct nvme_tcp_cmd_pdu - nvme tcp command capsule pdu
141 * struct nvme_tcp_rsp_pdu - nvme tcp response capsule pdu
144 * @hdr: nvme-tcp generic header
153 * struct nvme_tcp_r2t_pdu - nvme tcp ready-to-transfer pdu
171 * struct nvme_tcp_data_pdu - nvme tcp data pdu
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/gensio/
H A Dgensio_2.8.7.bb1 SUMMARY = "A library to abstract stream I/O like serial port, TCP, telnet, etc"
16 PACKAGECONFIG ??= "openssl tcp-wrappers"
19 PACKAGECONFIG[tcp-wrappers] = "--with-tcp-wrappers,--without-tcp-wrappers, tcp-wrappers"
/openbmc/bmcweb/http/routing/
H A Dwebsocketrule.cpp11 #include <boost/asio/ip/tcp.hpp>
21 boost::asio::ip::tcp::socket&& adaptor) in handleUpgrade()
25 crow::websocket::ConnectionImpl<boost::asio::ip::tcp::socket>> in handleUpgrade()
27 crow::websocket::ConnectionImpl<boost::asio::ip::tcp::socket>>( in handleUpgrade()
35 boost::asio::ssl::stream<boost::asio::ip::tcp::socket>&& adaptor) in handleUpgrade()
39 boost::asio::ssl::stream<boost::asio::ip::tcp::socket>>> in handleUpgrade()
41 boost::asio::ssl::stream<boost::asio::ip::tcp::socket>>>( in handleUpgrade()
H A Dsserule.cpp13 #include <boost/asio/ip/tcp.hpp>
45 boost::asio::ip::tcp::socket&& adaptor) in handleUpgrade()
48 crow::sse_socket::ConnectionImpl<boost::asio::ip::tcp::socket>> in handleUpgrade()
50 crow::sse_socket::ConnectionImpl<boost::asio::ip::tcp::socket>>( in handleUpgrade()
56 boost::asio::ssl::stream<boost::asio::ip::tcp::socket>&& adaptor) in handleUpgrade()
59 boost::asio::ssl::stream<boost::asio::ip::tcp::socket>>> in handleUpgrade()
61 boost::asio::ssl::stream<boost::asio::ip::tcp::socket>>>( in handleUpgrade()
/openbmc/linux/net/rds/
H A Dtcp_send.c35 #include <net/tcp.h>
39 #include "tcp.h"
96 rdsdebug("rm %p tcp nxt %u ack_seq %llu\n", in rds_tcp_xmit()
126 rdsdebug("tcp sendpage %p:%u:%u ret %d\n", (void *)sg_page(&rm->data.op_sg[sg]), in rds_tcp_xmit()
152 pr_warn("RDS/tcp: send to %pI6c on cp [%d]" in rds_tcp_xmit()
166 * rm->m_ack_seq is set to the tcp sequence number that corresponds to the
169 * unacked byte of the TCP sequence space. We have to do very careful
197 rdsdebug("tcp una %u\n", rds_tcp_snd_una(tc)); in rds_tcp_write_space()
211 * write_space is only called when data leaves tcp's send queue if in rds_tcp_write_space()
213 * data in tcp's send queue because we use write_space to parse the in rds_tcp_write_space()
[all …]
/openbmc/linux/include/net/netfilter/
H A Dnf_tproxy.h4 #include <net/tcp.h>
38 * nf_tproxy_handle_time_wait4 - handle IPv4 TCP TIME_WAIT reopen redirections
41 * @lport: TCP port to redirect to or zero.
42 * @sk: The TIME_WAIT TCP socket found by the lookup.
52 * no such listener is found, or NULL if the TCP header is incomplete.
94 * nf_tproxy_handle_time_wait6 - handle IPv6 TCP TIME_WAIT reopen redirections
100 * @lport: TCP port to redirect to or zero.
101 * @sk: The TIME_WAIT TCP socket found by the lookup.
111 * no such listener is found, or NULL if the TCP header is incomplete.
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-devtools/iptraf/
H A Diptraf-ng_1.2.1.bb6 data like TCP connection packet and byte counts, interface statistics \
7 and activity indicators, TCP/UDP traffic breakdowns, and LAN station \
9 which shows TCP flag information, packet and byte counts, ICMP \
11 interface statistics showing IP, TCP, UDP, ICMP, non-IP and other IP \
13 counts; a TCP and UDP service monitor showing counts of incoming and \
14 outgoing packets for common TCP and UDP application ports, a LAN \
16 about their activity; TCP, UDP and other protocol display filters so \
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/rsyslog/librelp/
H A D0001-tcp-fix-some-compiler-warnings-with-enable-tls-opens.patch4 Subject: [PATCH] tcp: fix some compiler warnings with enable-tls-openssl
10 | ../../git/src/tcp.c:3765:1: error: no previous declaration for 'relpTcpGetRtryDirection_gtls' [-W…
13 | ../../git/src/tcp.c:3583:1: error: 'relpTcpChkPeerName' defined but not used [-Werror=unused-func…
28 src/tcp.c | 11 ++++-------
31 diff --git a/src/tcp.c b/src/tcp.c
33 --- a/src/tcp.c
34 +++ b/src/tcp.c

12345678910>>...73