/external/iptables/extensions/ |
D | libxt_TCPMSS.c | 18 struct xt_tcpmss_info mss; member 43 .flags = XTOPT_PUT, XTOPT_POINTER(struct xt_tcpmss_info, mss)}, 51 .flags = XTOPT_PUT, XTOPT_POINTER(struct xt_tcpmss_info, mss)}, 62 mssinfo->mss = XT_TCPMSS_CLAMP_PMTU; in TCPMSS_parse() 77 if(mssinfo->mss == XT_TCPMSS_CLAMP_PMTU) in TCPMSS_print() 80 printf(" TCPMSS set %u", mssinfo->mss); in TCPMSS_print() 88 if(mssinfo->mss == XT_TCPMSS_CLAMP_PMTU) in TCPMSS_save() 91 printf(" --set-mss %u", mssinfo->mss); in TCPMSS_save() 99 if (mssinfo->mss == XT_TCPMSS_CLAMP_PMTU) in TCPMSS_xlate() 102 xt_xlate_add(xl, "tcp option maxseg size set %d", mssinfo->mss); in TCPMSS_xlate()
|
D | libxt_tcpmss.t | 2 -m tcpmss --mss 42;;FAIL 3 -p tcp -m tcpmss --mss 42;=;OK 4 -p tcp -m tcpmss --mss 42:12345;=;OK 5 -p tcp -m tcpmss --mss 42:65536;;FAIL 6 -p tcp -m tcpmss --mss 65535:1000;;FAIL
|
D | libxt_TCPMSS.t | 4 -p tcp -j TCPMSS --set-mss 42;;FAIL 5 -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -j TCPMSS --set-mss 42;=;OK 6 -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -j TCPMSS --clamp-mss-to-pmtu;=;OK
|
D | libxt_SYNPROXY.c | 61 info->mss = cb->val.u32; in SYNPROXY_parse() 87 printf("mss %u ", info->mss); in SYNPROXY_print() 104 printf(" --mss %u", info->mss); in SYNPROXY_save() 124 xt_xlate_add(xl, "mss %u ", info->mss); in SYNPROXY_xlate()
|
D | libxt_SYNPROXY.t | 2 -j SYNPROXY --sack-perm --timestamp --mss 1460 --wscale 9;;FAIL 3 …onntrack --ctstate INVALID,UNTRACKED -j SYNPROXY --sack-perm --timestamp --wscale 9 --mss 1460;=;OK
|
D | libxt_SYNPROXY.txlate | 1 …ort 80 -m state --state INVALID,UNTRACKED -j SYNPROXY --sack-perm --timestamp --wscale 7 --mss 1460 2 …me" tcp dport 80 ct state invalid,untracked counter synproxy sack-perm timestamp wscale 7 mss 1460
|
D | libxt_TCPMSS.txlate | 1 iptables-translate -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu 4 iptables-translate -A FORWARD -p tcp --tcp-flags SYN,RST SYN -j TCPMSS --set-mss 90
|
D | libxt_TCPMSS.man | 25 \-j TCPMSS \-\-clamp\-mss\-to\-pmtu 27 \fB\-\-set\-mss\fP \fIvalue\fP 32 \fB\-\-clamp\-mss\-to\-pmtu\fP
|
D | libxt_SYNPROXY.man | 7 \fB\-\-mss\fP \fImaximum segment size\fP 35 options [mss 1460,sackOK, 61 \-\-sack\-perm \-\-timestamp \-\-mss 1460 \-\-wscale 9
|
/external/linux-kselftest/tools/testing/selftests/net/ |
D | psock_snd.sh | 15 readonly mss="$((${mtu} - ${iphlen} - ${udphlen}))" 16 readonly mss_exceeds="$((${mss} + 1))" 58 ./in_netns.sh ./psock_snd -l "${mss}" 72 ./in_netns.sh ./psock_snd -d -l "${mss}" 90 (! ./in_netns.sh ./psock_snd -v -c -g -l "${mss}")
|
D | tcp_mmap.c | 349 int mss = 0; in main() local 380 mss = atoi(optarg); in main() 421 if (mss && in main() 423 &mss, sizeof(mss)) == -1) { in main() 453 if (mss && in main() 454 setsockopt(fd, IPPROTO_TCP, TCP_MAXSEG, &mss, sizeof(mss)) == -1) { in main()
|
D | udpgso.c | 508 int i, ret, val, mss; in run_one() local 531 mss = test->gso_len; in run_one() 533 mss = addr->sa_family == AF_INET ? CONST_MSS_V4 : CONST_MSS_V6; in run_one() 539 if (ret != mss) in run_one() 540 error(1, 0, "recv.%d: %d != %d", i, ret, mss); in run_one()
|
/external/tcpdump/tests/ |
D | resp_3.out | 4 IP 127.0.0.1.52760 > 127.0.0.1.6379: Flags [S], seq 264055152, win 43690, options [mss 65495,sackOK… 5 ….0.1.52760: Flags [S.], seq 4227148888, ack 264055153, win 43690, options [mss 65495,sackOK,TS val… 14 IP 127.0.0.1.52763 > 127.0.0.1.6379: Flags [S], seq 4029577365, win 43690, options [mss 65495,sackO… 15 ….0.1.52763: Flags [S.], seq 365322185, ack 4029577366, win 43690, options [mss 65495,sackOK,TS val… 24 IP 127.0.0.1.52764 > 127.0.0.1.6379: Flags [S], seq 3994485171, win 43690, options [mss 65495,sackO… 25 …0.1.52764: Flags [S.], seq 3089553256, ack 3994485172, win 43690, options [mss 65495,sackOK,TS val… 34 IP 127.0.0.1.52765 > 127.0.0.1.6379: Flags [S], seq 3235592213, win 43690, options [mss 65495,sackO… 35 …0.1.52765: Flags [S.], seq 1213611847, ack 3235592214, win 43690, options [mss 65495,sackOK,TS val… 44 IP 127.0.0.1.52766 > 127.0.0.1.6379: Flags [S], seq 1161779316, win 43690, options [mss 65495,sackO… 45 …0.1.52766: Flags [S.], seq 1206331179, ack 1161779317, win 43690, options [mss 65495,sackOK,TS val… [all …]
|
D | resp_1.out | 1 IP 127.0.0.1.35901 > 127.0.0.1.6379: Flags [S], seq 1159918511, win 43690, options [mss 65495,sackO… 2 …0.1.35901: Flags [S.], seq 1309831771, ack 1159918512, win 43690, options [mss 65495,sackOK,TS val… 11 IP 127.0.0.1.35902 > 127.0.0.1.6379: Flags [S], seq 3880036895, win 43690, options [mss 65495,sackO… 12 …0.0.1.35902: Flags [S.], seq 95825237, ack 3880036896, win 43690, options [mss 65495,sackOK,TS val… 21 IP 127.0.0.1.35903 > 127.0.0.1.6379: Flags [S], seq 3040658582, win 43690, options [mss 65495,sackO… 22 …0.1.35903: Flags [S.], seq 2458684268, ack 3040658583, win 43690, options [mss 65495,sackOK,TS val… 31 IP 127.0.0.1.35904 > 127.0.0.1.6379: Flags [S], seq 2555867980, win 43690, options [mss 65495,sackO… 32 …0.1.35904: Flags [S.], seq 4291997072, ack 2555867981, win 43690, options [mss 65495,sackOK,TS val… 41 IP 127.0.0.1.35905 > 127.0.0.1.6379: Flags [S], seq 2342248419, win 43690, options [mss 65495,sackO… 42 …0.1.35905: Flags [S.], seq 2490886259, ack 2342248420, win 43690, options [mss 65495,sackOK,TS val… [all …]
|
D | scps_invalid.out | 1 IP 182.181.202.230.52750 > 83.253.102.83.63764: Flags [S], seq 3757264999, win 8192, options [mss 1… 2 IP 182.181.158.21.53052 > 83.253.102.83.30122: Flags [S], seq 2824624414, win 8192, options [mss 14…
|
D | tfo.out | 2 IP 9.9.9.9.13047 > 3.3.3.3.13054: Flags [S], seq 218476388, win 1400, options [mss 1460,exp-tfo coo… 4 …0.100.13047: Flags [S.], seq 4035392501, ack 218476389, win 1400, options [mss 1500,exp-tfo cookie…
|
D | mptcp-fclose.out | 3 IP 10.1.1.2.37479 > 10.2.1.2.2002: Flags [S], seq 1895673170, win 14600, options [mss 1460,sackOK,T… 4 …1.2.37479: Flags [S.], seq 2868811558, ack 1895673171, win 14280, options [mss 1460,sackOK,TS val …
|
D | mptcp-dss-oobr.out | 2 …127.0.0.1.57370 > 127.0.0.1.23: Flags [S], seq 1736820995, win 32792, options [mss 16396,sackOK,TS…
|
/external/scapy/scapy/modules/ |
D | p0f.py | 152 mss = -1 161 mss = option[1] 195 if mss != -1: 196 if mss != 0 and win % mss == 0: 197 win = "S" + str(win/mss) 198 elif win % (mss + 40) == 0: 199 win = "T" + str(win/(mss+40)) 509 mss = [x for x in options if x[0] == 'MSS'] 510 if not mss: 512 pkt.payload.window = mss[0][1] * int(pers[0][1:])
|
/external/iptables/include/linux/netfilter/ |
D | xt_TCPMSS.h | 7 __u16 mss; member
|
D | xt_SYNPROXY.h | 13 __u16 mss; member
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
D | xt_TCPMSS.h | 8 __u16 mss; member
|
D | nf_synproxy.h | 20 __u16 mss; member
|
/external/linux-kselftest/tools/testing/selftests/bpf/progs/ |
D | test_tcp_check_syncookie_kern.c | 135 __u32 mss = seq_mss >> 32; in check_syncookie() local 138 bpf_map_update_elem(&results, &key_mss, &mss, 0); in check_syncookie()
|
/external/arm-trusted-firmware/plat/marvell/armada/a8k/common/mss/ |
D | mss_a8k.mk | 9 A8K_MSS_SOURCE := $(PLAT_MARVELL)/a8k/common/mss
|