/net/ipv4/ |
D | tcp_fastopen.c | 135 struct sk_buff *syn, in __tcp_fastopen_cookie_gen_cipher() argument 142 const struct iphdr *iph = ip_hdr(syn); in __tcp_fastopen_cookie_gen_cipher() 153 const struct ipv6hdr *ip6h = ipv6_hdr(syn); in __tcp_fastopen_cookie_gen_cipher() 171 struct sk_buff *syn, in tcp_fastopen_cookie_gen() argument 179 __tcp_fastopen_cookie_gen_cipher(req, syn, &ctx->key[0], foc); in tcp_fastopen_cookie_gen() 229 struct sk_buff *syn, in tcp_fastopen_cookie_gen_check() argument 243 __tcp_fastopen_cookie_gen_cipher(req, syn, &ctx->key[i], foc); in tcp_fastopen_cookie_gen_check()
|
D | tcp_input.c | 402 if (th->ece && !th->syn && (tp->ecn_flags & TCP_ECN_OK)) in tcp_ecn_rcv_ecn_echo() 3543 if (likely(!tcp_hdr(skb)->syn)) in tcp_ack_update_window() 3610 !tcp_hdr(skb)->syn) in tcp_oow_rate_limited() 3945 bool syn, struct tcp_fastopen_cookie *foc, in tcp_parse_fastopen_option() argument 3949 if (!foc || !syn || len < 0 || (len & 1)) in tcp_parse_fastopen_option() 3968 if (th->syn && !(opsize & 1) && in smc_parse_options() 4059 if (opsize == TCPOLEN_MSS && th->syn && !estab) { in tcp_parse_options() 4070 if (opsize == TCPOLEN_WINDOW && th->syn && in tcp_parse_options() 4094 if (opsize == TCPOLEN_SACK_PERM && th->syn && in tcp_parse_options() 4119 ptr, th->syn, foc, false); in tcp_parse_options() [all …]
|
D | tcp_minisocks.c | 126 if (th->syn && !before(TCP_SKB_CB(skb)->seq, tcptw->tw_rcv_nxt)) in tcp_timewait_state_process() 218 if (th->syn && !th->rst && !th->ack && !paws_reject && in tcp_timewait_state_process()
|
D | tcp_output.c | 3615 th->syn = 1; in tcp_make_synack() 3766 static int tcp_send_syn_data(struct sock *sk, struct sk_buff *syn) in tcp_send_syn_data() argument 3798 memcpy(syn_data->cb, syn->cb, sizeof(syn->cb)); in tcp_send_syn_data() 3824 syn->skb_mstamp_ns = syn_data->skb_mstamp_ns; in tcp_send_syn_data() 3848 err = tcp_transmit_skb(sk, syn, 1, sk->sk_allocation); in tcp_send_syn_data()
|
D | tcp_ipv4.c | 702 rep.th.ack_seq = htonl(ntohl(th->seq) + th->syn + th->fin + in tcp_v4_send_reset() 1641 if (!th->syn) in tcp_v4_cookie_check() 1921 TCP_SKB_CB(skb)->end_seq = (TCP_SKB_CB(skb)->seq + th->syn + th->fin + in tcp_v4_fill_cb()
|
/net/ipv4/netfilter/ |
D | ipt_SYNPROXY.c | 31 if (th->syn && !(th->ack || th->fin || th->rst)) { in synproxy_tg4() 51 } else if (th->ack && !(th->fin || th->rst || th->syn)) { in synproxy_tg4()
|
D | nf_tproxy_ipv4.c | 31 if (hp->syn && !hp->rst && !hp->ack && !hp->fin) { in nf_tproxy_handle_time_wait4()
|
D | nf_reject_ipv4.c | 84 tcph->ack_seq = htonl(ntohl(oth->seq) + oth->syn + oth->fin + in nf_reject_ip_tcphdr_put()
|
/net/ipv6/netfilter/ |
D | ip6t_SYNPROXY.c | 31 if (th->syn && !(th->ack || th->fin || th->rst)) { in synproxy_tg6() 52 } else if (th->ack && !(th->fin || th->rst || th->syn)) { in synproxy_tg6()
|
D | nf_tproxy_ipv6.c | 54 if (hp->syn && !hp->rst && !hp->ack && !hp->fin) { in nf_tproxy_handle_time_wait6()
|
D | nf_reject_ipv6.c | 107 tcph->ack_seq = htonl(ntohl(oth->seq) + oth->syn + oth->fin + in nf_reject_ip6_tcphdr_put()
|
/net/netfilter/ |
D | nf_synproxy_core.c | 701 if (!th->syn || th->ack || in ipv4_synproxy_hook() 717 if (!th->syn && th->ack && in ipv4_synproxy_hook() 740 if (!th->syn || !th->ack) in ipv4_synproxy_hook() 1124 if (!th->syn || th->ack || in ipv6_synproxy_hook() 1140 if (!th->syn && th->ack && in ipv6_synproxy_hook() 1163 if (!th->syn || !th->ack) in ipv6_synproxy_hook()
|
D | nft_synproxy.c | 56 if (tcp->syn) { in nft_synproxy_eval_v4() 87 if (tcp->syn) { in nft_synproxy_eval_v6()
|
D | nf_conntrack_proto_tcp.c | 286 else if (tcph->syn) return (tcph->ack ? TCP_SYNACK_SET : TCP_SYN_SET); in get_conntrack_index() 329 + (tcph->syn ? 1 : 0) + (tcph->fin ? 1 : 0)); in segment_seq_plus_len() 512 if (tcph->syn) { in tcp_in_window() 625 if (!tcph->syn) in tcp_in_window() 1120 (th->syn ? 1 : 0), (th->ack ? 1 : 0), in nf_conntrack_tcp_packet()
|
D | nft_osf.c | 42 if (!tcp->syn) { in nft_osf_eval()
|
D | nf_log_common.c | 100 if (th->syn) in nf_log_dump_tcp_header()
|
D | nfnetlink_osf.c | 177 if (!tcp->syn) in nf_osf_hdr_ctx_init()
|
/net/mptcp/ |
D | syncookies.c | 47 if (th->syn) in mptcp_join_entry_hash()
|
/net/netfilter/ipvs/ |
D | ip_vs_proto_tcp.c | 51 if (th->rst || !(sysctl_sloppy_tcp(ipvs) || th->syn)) in tcp_conn_schedule() 502 if (th->syn) in tcp_state_idx() 547 th->syn ? 'S' : '.', in set_tcp_state()
|
D | ip_vs_core.c | 1096 return th->syn; in is_new_conn()
|
/net/ipv6/ |
D | tcp_ipv6.c | 1077 ack_seq = ntohl(th->seq) + th->syn + th->fin + skb->len - in tcp_v6_send_reset() 1162 if (!th->syn) in tcp_v6_cookie_check() 1589 TCP_SKB_CB(skb)->end_seq = (TCP_SKB_CB(skb)->seq + th->syn + th->fin + in tcp_v6_fill_cb()
|
/net/tipc/ |
D | socket.c | 1405 bool syn = !tipc_sk_type_connectionless(sk); in __tipc_sendmsg() local 1438 if (!syn && dest->family != AF_TIPC) in __tipc_sendmsg() 1442 if (unlikely(syn)) { in __tipc_sendmsg() 1500 if (unlikely(syn && !tipc_msg_skb_clone(&pkts, &sk->sk_write_queue))) { in __tipc_sendmsg() 1513 if (unlikely(syn && !rc)) { in __tipc_sendmsg()
|
/net/core/ |
D | filter.c | 6525 if (!th->ack || th->rst || th->syn) in BPF_CALL_5() 6600 if (!th->syn || th->ack || th->fin || th->rst) in BPF_CALL_5()
|