Home
last modified time | relevance | path

Searched full:rfc1122 (Results 1 – 19 of 19) sorted by relevance

/linux/net/ipv4/
H A Dtcp_minisocks.c729 * RFC793 draws (Incorrectly! It was fixed in RFC1122) in tcp_check_req()
736 * CONCLUSION: RFC793 (even with RFC1122) DOES NOT in tcp_check_req()
743 * of RFC793, fixed by RFC1122. in tcp_check_req()
H A Dsyncookies.c439 * the ACK carries the same options again (see RFC1122 4.2.3.8) in cookie_v4_check()
H A Dip_input.c490 * RFC1122: 3.2.1.2 MUST silently discard any IP frame that fails the checksum. in ip_rcv_core()
H A Dping.c575 * RFC1122: OK. Passes ICMP errors back to application, as per in ping_err()
H A Dudp.c49 * Mike Shaver : RFC1122 checks.
1003 * RFC1122: OK. Passes ICMP errors back to application, as per in __udp4_lib_err()
2758 * RFC1122: OK. Discards the bad packet silently (as far as in __udp4_lib_rcv()
H A Darp.c32 * Mike Shaver : RFC1122 checks.
H A Dicmp.c16 * Mike Shaver : RFC1122 checks.
H A Dtcp_output.c112 * RFC1122, RFC1063, draft-ietf-tcpimpl-pmtud-01 state that:
1915 It is MMS_S - sizeof(tcphdr) of rfc1122 in __tcp_mtu_to_mss()
1986 NOTE1. rfc1122 clearly states that advertised MSS
H A Dtcp_ipv4.c638 * rfc1122 4.2.3.9 allows to consider as hard errors in tcp_v4_err()
H A Dtcp.c176 * Mike Shaver : RFC1122 verifications.
H A Dtcp_input.c3728 * Window update algorithm, described in RFC793/RFC1122 (used in linux-2.2
/linux/tools/include/uapi/linux/
H A Dtcp.h88 #define TCP_MSS_DEFAULT 536U /* IPv4 (RFC1122, RFC2581) */
/linux/tools/testing/selftests/net/tcp_ao/
H A Dicmps-accept.c131 /* Fail on hard ip errors, such as dest unreachable (RFC1122) */ in server_fn()
H A Dicmps-discard.c131 /* Fail on hard ip errors, such as dest unreachable (RFC1122) */ in server_fn()
/linux/include/uapi/linux/
H A Dtcp.h91 #define TCP_MSS_DEFAULT 536U /* IPv4 (RFC1122, RFC2581) */
/linux/include/linux/
H A Dtcp.h371 * See RFC793 and RFC1122. The RFC writes these in capitals.
/linux/net/dccp/
H A Dipv4.c
/linux/include/net/
H A Dtcp.h121 * RFC1122 says that the limit is 100 sec.
127 * RFC1122 says the minimum retry MUST
/linux/net/netfilter/
H A Dnf_conntrack_proto_tcp.c71 /* RFC1122 says the R2 limit should be at least 100 seconds.