Home
last modified time | relevance | path

Searched refs:TCP_FLAG_ACK (Results 1 – 6 of 6) sorted by relevance

/linux-4.4.14/net/ipv4/netfilter/
Dipt_SYNPROXY.c101 tcp_flag_word(nth) = TCP_FLAG_SYN | TCP_FLAG_ACK; in synproxy_send_client_synack()
187 tcp_flag_word(nth) = TCP_FLAG_ACK; in synproxy_send_server_ack()
225 tcp_flag_word(nth) = TCP_FLAG_ACK; in synproxy_send_client_ack()
/linux-4.4.14/net/ipv6/netfilter/
Dip6t_SYNPROXY.c114 tcp_flag_word(nth) = TCP_FLAG_SYN | TCP_FLAG_ACK; in synproxy_send_client_synack()
200 tcp_flag_word(nth) = TCP_FLAG_ACK; in synproxy_send_server_ack()
238 tcp_flag_word(nth) = TCP_FLAG_ACK; in synproxy_send_client_ack()
/linux-4.4.14/include/uapi/linux/
Dtcp.h75 TCP_FLAG_ACK = __constant_cpu_to_be32(0x00100000), enumerator
/linux-4.4.14/net/ipv4/
Dtcp_minisocks.c578 __be32 flg = tcp_flag_word(th) & (TCP_FLAG_RST|TCP_FLAG_SYN|TCP_FLAG_ACK); in tcp_check_req()
698 if ((flg & TCP_FLAG_ACK) && !fastopen && in tcp_check_req()
745 if (!(flg & TCP_FLAG_ACK)) in tcp_check_req()
/linux-4.4.14/net/netfilter/
Dnf_conntrack_proto_tcp.c612 } else if (((tcp_flag_word(tcph) & (TCP_FLAG_ACK|TCP_FLAG_RST)) == in tcp_in_window()
613 (TCP_FLAG_ACK|TCP_FLAG_RST)) in tcp_in_window()
/linux-4.4.14/include/net/
Dtcp.h637 ntohl(TCP_FLAG_ACK) | in __tcp_fast_path_on()