Home
last modified time | relevance | path

Searched refs:SYN (Results 1 – 13 of 13) sorted by relevance

/tools/testing/selftests/net/netfilter/packetdrill/
A Dconntrack_synack_reuse.pkt1 // Check reception of another SYN while we have an established conntrack state.
3 // state and SYN retransmit should give us new 'SYN_RECV' connection state.
8 +0 `iptables -A INPUT -m conntrack --ctstate INVALID -p tcp --tcp-flags SYN,ACK SYN,ACK`
A Dconntrack_syn_challenge_ack.pkt1 // Check connection re-use, i.e. peer that receives the SYN answers with
A Dconntrack_synack_old.pkt37 // with buggy conntrack above packet is dropped, so SYN rtx is seen:
/tools/testing/selftests/net/packetdrill/
A Dtcp_ecn_ecn-uses-ect0.pkt11 // ECN handshake: send EW flags in SYN packet, E flag in SYN-ACK response
A Dtcp_zerocopy_fastopen-client.pkt13 // Send a FastOpen request, no cookie yet so no data in SYN
33 // Send another Fastopen request, now SYN will have data
A Dtcp_md5_md5-only-on-client-ack.pkt2 // Test what happens when client does not provide MD5 on SYN,
A Dtcp_zerocopy_fastopen-server.pkt18 // Client sends a SYN with data.
A Dtcp_timestamping_client-only-last-byte.pkt40 // is called after when SYN is acked. So, we expect the last byte of the first
A Dtcp_timestamping_server.pkt24 // is called after when SYN is acked. So, we expect the last byte of the first
/tools/testing/selftests/bpf/prog_tests/
A Dcls_redirect.c151 SYN, enumerator
199 if (test->flags == SYN) in test_str()
209 { TCP, ACCEPT, UNKNOWN_CONN, NO_HOPS, SYN },
308 if (test->flags == SYN) in build_input()
/tools/perf/trace/beauty/
A Dmsg_flags.c55 P_MSG_FLAG(SYN); in syscall_arg__scnprintf_msg_flags()
/tools/testing/selftests/bpf/progs/
A Dtest_cls_redirect.c83 SYN, enumerator
830 return SYN; in process_tcp()
1059 case SYN: in cls_redirect()
A Dtest_cls_redirect_dynptr.c77 SYN, enumerator
723 return SYN; in process_tcp()
957 case SYN: in cls_redirect()

Completed in 19 milliseconds