Home
last modified time | relevance | path

Searched refs:mss (Results 1 – 25 of 93) sorted by relevance

1234

/external/iptables/extensions/
Dlibxt_TCPMSS.c18 struct xt_tcpmss_info mss; member
43 .flags = XTOPT_PUT, XTOPT_POINTER(struct xt_tcpmss_info, mss)},
51 .flags = XTOPT_PUT, XTOPT_POINTER(struct xt_tcpmss_info, mss)},
62 mssinfo->mss = XT_TCPMSS_CLAMP_PMTU; in TCPMSS_parse()
77 if(mssinfo->mss == XT_TCPMSS_CLAMP_PMTU) in TCPMSS_print()
80 printf(" TCPMSS set %u", mssinfo->mss); in TCPMSS_print()
88 if(mssinfo->mss == XT_TCPMSS_CLAMP_PMTU) in TCPMSS_save()
91 printf(" --set-mss %u", mssinfo->mss); in TCPMSS_save()
99 if (mssinfo->mss == XT_TCPMSS_CLAMP_PMTU) in TCPMSS_xlate()
102 xt_xlate_add(xl, "tcp option maxseg size set %d", mssinfo->mss); in TCPMSS_xlate()
Dlibxt_tcpmss.t2 -m tcpmss --mss 42;;FAIL
3 -p tcp -m tcpmss --mss 42;=;OK
4 -p tcp -m tcpmss --mss 42:12345;=;OK
5 -p tcp -m tcpmss --mss 42:65536;;FAIL
6 -p tcp -m tcpmss --mss 65535:1000;;FAIL
Dlibxt_TCPMSS.t4 -p tcp -j TCPMSS --set-mss 42;;FAIL
5 -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -j TCPMSS --set-mss 42;=;OK
6 -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -j TCPMSS --clamp-mss-to-pmtu;=;OK
Dlibxt_SYNPROXY.c61 info->mss = cb->val.u32; in SYNPROXY_parse()
87 printf("mss %u ", info->mss); in SYNPROXY_print()
104 printf(" --mss %u", info->mss); in SYNPROXY_save()
124 xt_xlate_add(xl, "mss %u ", info->mss); in SYNPROXY_xlate()
Dlibxt_SYNPROXY.t2 -j SYNPROXY --sack-perm --timestamp --mss 1460 --wscale 9;;FAIL
3 …onntrack --ctstate INVALID,UNTRACKED -j SYNPROXY --sack-perm --timestamp --wscale 9 --mss 1460;=;OK
Dlibxt_SYNPROXY.txlate1 …ort 80 -m state --state INVALID,UNTRACKED -j SYNPROXY --sack-perm --timestamp --wscale 7 --mss 1460
2 …me" tcp dport 80 ct state invalid,untracked counter synproxy sack-perm timestamp wscale 7 mss 1460
Dlibxt_TCPMSS.txlate1 iptables-translate -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
4 iptables-translate -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --set-mss 90
Dlibxt_TCPMSS.man25 \-j TCPMSS \-\-clamp\-mss\-to\-pmtu
27 \fB\-\-set\-mss\fP \fIvalue\fP
32 \fB\-\-clamp\-mss\-to\-pmtu\fP
Dlibxt_SYNPROXY.man7 \fB\-\-mss\fP \fImaximum segment size\fP
35 options [mss 1460,sackOK,
61 \-\-sack\-perm \-\-timestamp \-\-mss 1460 \-\-wscale 9
/external/linux-kselftest/tools/testing/selftests/net/
Dpsock_snd.sh15 readonly mss="$((${mtu} - ${iphlen} - ${udphlen}))"
16 readonly mss_exceeds="$((${mss} + 1))"
58 ./in_netns.sh ./psock_snd -l "${mss}"
72 ./in_netns.sh ./psock_snd -d -l "${mss}"
90 (! ./in_netns.sh ./psock_snd -v -c -g -l "${mss}")
Dtcp_mmap.c349 int mss = 0; in main() local
380 mss = atoi(optarg); in main()
421 if (mss && in main()
423 &mss, sizeof(mss)) == -1) { in main()
453 if (mss && in main()
454 setsockopt(fd, IPPROTO_TCP, TCP_MAXSEG, &mss, sizeof(mss)) == -1) { in main()
Dudpgso.c508 int i, ret, val, mss; in run_one() local
531 mss = test->gso_len; in run_one()
533 mss = addr->sa_family == AF_INET ? CONST_MSS_V4 : CONST_MSS_V6; in run_one()
539 if (ret != mss) in run_one()
540 error(1, 0, "recv.%d: %d != %d", i, ret, mss); in run_one()
/external/tcpdump/tests/
Dresp_3.out4 IP 127.0.0.1.52760 > 127.0.0.1.6379: Flags [S], seq 264055152, win 43690, options [mss 65495,sackOK…
5 ….0.1.52760: Flags [S.], seq 4227148888, ack 264055153, win 43690, options [mss 65495,sackOK,TS val…
14 IP 127.0.0.1.52763 > 127.0.0.1.6379: Flags [S], seq 4029577365, win 43690, options [mss 65495,sackO…
15 ….0.1.52763: Flags [S.], seq 365322185, ack 4029577366, win 43690, options [mss 65495,sackOK,TS val…
24 IP 127.0.0.1.52764 > 127.0.0.1.6379: Flags [S], seq 3994485171, win 43690, options [mss 65495,sackO…
25 …0.1.52764: Flags [S.], seq 3089553256, ack 3994485172, win 43690, options [mss 65495,sackOK,TS val…
34 IP 127.0.0.1.52765 > 127.0.0.1.6379: Flags [S], seq 3235592213, win 43690, options [mss 65495,sackO…
35 …0.1.52765: Flags [S.], seq 1213611847, ack 3235592214, win 43690, options [mss 65495,sackOK,TS val…
44 IP 127.0.0.1.52766 > 127.0.0.1.6379: Flags [S], seq 1161779316, win 43690, options [mss 65495,sackO…
45 …0.1.52766: Flags [S.], seq 1206331179, ack 1161779317, win 43690, options [mss 65495,sackOK,TS val…
[all …]
Dresp_1.out1 IP 127.0.0.1.35901 > 127.0.0.1.6379: Flags [S], seq 1159918511, win 43690, options [mss 65495,sackO…
2 …0.1.35901: Flags [S.], seq 1309831771, ack 1159918512, win 43690, options [mss 65495,sackOK,TS val…
11 IP 127.0.0.1.35902 > 127.0.0.1.6379: Flags [S], seq 3880036895, win 43690, options [mss 65495,sackO…
12 …0.0.1.35902: Flags [S.], seq 95825237, ack 3880036896, win 43690, options [mss 65495,sackOK,TS val…
21 IP 127.0.0.1.35903 > 127.0.0.1.6379: Flags [S], seq 3040658582, win 43690, options [mss 65495,sackO…
22 …0.1.35903: Flags [S.], seq 2458684268, ack 3040658583, win 43690, options [mss 65495,sackOK,TS val…
31 IP 127.0.0.1.35904 > 127.0.0.1.6379: Flags [S], seq 2555867980, win 43690, options [mss 65495,sackO…
32 …0.1.35904: Flags [S.], seq 4291997072, ack 2555867981, win 43690, options [mss 65495,sackOK,TS val…
41 IP 127.0.0.1.35905 > 127.0.0.1.6379: Flags [S], seq 2342248419, win 43690, options [mss 65495,sackO…
42 …0.1.35905: Flags [S.], seq 2490886259, ack 2342248420, win 43690, options [mss 65495,sackOK,TS val…
[all …]
Dscps_invalid.out1 IP 182.181.202.230.52750 > 83.253.102.83.63764: Flags [S], seq 3757264999, win 8192, options [mss 1…
2 IP 182.181.158.21.53052 > 83.253.102.83.30122: Flags [S], seq 2824624414, win 8192, options [mss 14…
Dtfo.out2 IP 9.9.9.9.13047 > 3.3.3.3.13054: Flags [S], seq 218476388, win 1400, options [mss 1460,exp-tfo coo…
4 …0.100.13047: Flags [S.], seq 4035392501, ack 218476389, win 1400, options [mss 1500,exp-tfo cookie…
Dmptcp-fclose.out3 IP 10.1.1.2.37479 > 10.2.1.2.2002: Flags [S], seq 1895673170, win 14600, options [mss 1460,sackOK,T…
4 …1.2.37479: Flags [S.], seq 2868811558, ack 1895673171, win 14280, options [mss 1460,sackOK,TS val …
Dmptcp-dss-oobr.out2 …127.0.0.1.57370 > 127.0.0.1.23: Flags [S], seq 1736820995, win 32792, options [mss 16396,sackOK,TS…
/external/scapy/scapy/modules/
Dp0f.py152 mss = -1
161 mss = option[1]
195 if mss != -1:
196 if mss != 0 and win % mss == 0:
197 win = "S" + str(win/mss)
198 elif win % (mss + 40) == 0:
199 win = "T" + str(win/(mss+40))
509 mss = [x for x in options if x[0] == 'MSS']
510 if not mss:
512 pkt.payload.window = mss[0][1] * int(pers[0][1:])
/external/iptables/include/linux/netfilter/
Dxt_TCPMSS.h7 __u16 mss; member
Dxt_SYNPROXY.h13 __u16 mss; member
/external/kernel-headers/original/uapi/linux/netfilter/
Dxt_TCPMSS.h8 __u16 mss; member
Dnf_synproxy.h20 __u16 mss; member
/external/linux-kselftest/tools/testing/selftests/bpf/progs/
Dtest_tcp_check_syncookie_kern.c135 __u32 mss = seq_mss >> 32; in check_syncookie() local
138 bpf_map_update_elem(&results, &key_mss, &mss, 0); in check_syncookie()
/external/arm-trusted-firmware/plat/marvell/armada/a8k/common/mss/
Dmss_a8k.mk9 A8K_MSS_SOURCE := $(PLAT_MARVELL)/a8k/common/mss

1234