Lines Matching defs:to

16  *    may be used to endorse or promote products derived from this software
201 * we are forced to a ridiculous low MSS like 20 and send hundreds
204 * with packet generation and sending. Set to zero to disable MINMSS
256 &tcp_pacing_failures, "Number of times we failed to enable pacing to avoid exceeding the limit");
259 &tcp_dgp_failures, "Number of times we failed to enable dgp to avoid exceeding the limit");
508 * Now, we'll find a new function block to use.
524 /* Try to use that stack. */
547 * stack which is not allowed to reject anyone.
552 panic("Can't refer to tcp_def_funcblk");
569 /* And set in the pointers to the new */
826 /* Ok, we have a socket, bind it to the port. */
852 /* Ok, we have a socket, bind it to the port. */
946 * Wire the old buffer so we can directly copy the functions to
957 * is compiled in, also walk the list to verify the length of
984 * mechanism we use to accumulate length
1005 "List TCP function block name-to-ID mappings");
1009 * Note that we'll basically try to take all comers.
1025 * it is required to always succeed since it is the stack of last resort!
1060 * Nothing to do for ESTABLISHED or LISTEN states. And, we don't
1061 * know what to do for unexpected states (which includes TIME_WAIT).
1108 * This changes state as necessary (or prudent) to prepare for another stack
1109 * to assume responsibility for the connection.
1137 * Used to size the tcp_inpcb hash buckets.
1163 * you wish to register the stack with that name.)
1167 * argument to point to the array index of the name that encountered
1233 * for names[i], we don't need to deregister that name.
1299 * When called with a force argument, attempt to switch all TCBs to
1333 * If TCBs are still attached to the stack, attempt to switch them
1334 * to the default stack.
1371 /* Remove any function names that map to this function block. */
1437 printf("%s: WARNING: unable to register helper hook\n", __func__);
1440 printf("%s: WARNING: unable to register helper hook\n", __func__);
1444 printf("%s: WARNING: unable to initialise TCP stats\n",
1554 printf("%s: %s auto tuned to %d\n", __func__,
1558 * We require a hashsize to be a power of two.
1560 * back to 512, which could be a nasty surprise if you did not notice
1562 * Instead what we do is clip it to the closest power of two lower
1573 "clipped from %d to %d.\n", __func__, oldhashsize,
1599 * Sleep to let all tcpcb timers really disappear and cleanup.
1617 * the allocations to them.
1627 printf("%s: WARNING: unable to deregister helper hook "
1633 printf("%s: WARNING: unable to deregister helper hook "
1650 * tcp_template used to store this data in mbufs, but we now recopy it out
1651 * of the tcpcb each time to conserve mbufs.
1714 * Create template to be used to send tcp packets on a connection.
1731 * Send a single message to the TCP at address specified by
1733 * of the tcpiphdr at th and send directly to the addressed host.
1734 * This is used to force keep alive messages out using the TCP
1736 * a message back to the TCP which originated the segment th,
1742 * NOTE: If m != NULL, then th must point to *inside* the mbuf.
1749 struct tcpopt to;
1949 to.to_flags = 0;
1968 to.to_tsval = tcp_ts_getticks() + tp->ts_offset;
1969 to.to_tsecr = tp->ts_recent;
1970 to.to_flags |= TOF_TS;
1975 to.to_flags |= TOF_SIGNATURE;
1978 tlen += optlen = tcp_addoptions(&to, optp);
2032 * label of the response to reflect the socket label.
2059 if (to.to_flags & TOF_SIGNATURE) {
2061 TCPMD5_OUTPUT(m, nth, to.to_signature) != 0) {
2124 * is not upgraded to a write lock, since only getting
2125 * the read lock was done intentionally to improve the
2131 * The incoming SYN segments do not really belong to
2179 * it to the argument protocol control block. The `inp' parameter must have
2264 * Init srtt to TCPTV_SRTTBASE (0), so we can tell that we have no
2279 * because the socket may be bound to an IPv6 wildcard address,
2313 * then send a RST to peer.
2325 /* Don't use tcp_output() here due to possible recursion. */
2364 /* Allow the CC algorithm to clean up after itself. */
2399 * 4 samples is enough for the srtt filter to converge
2400 * to within enough % of the correct value; fewer samples
2428 * convert the limit from user data bytes to
2429 * packets then to packet data bytes.
2461 * Attempt to close a TCP control block, marking it as dropped, and freeing
2479 * from SYN_RECEIVED to CLOSED.
2526 * than waiting a long time to establish a connection that
2615 * might be necessary to retry.
2738 /* Path MTU to try next when a fragmentation-needed message is received. */
2884 /* Now call in to the normal handling code */
2897 * small, set to the min.
3000 * in the route to the suggested new
3068 /* Now call in to the normal handling code */
3134 * unguessable so as to prevent connection hijacking. To satisfy
3145 * As reading the *exact* system time is too expensive to be done
3148 * is added to isn_offset for each connection that is set up.
3152 * random positive increments serve only to ensure that the same
3158 * between seeding of isn_secret. This is normally set to zero,
3245 * based on the new value. Also nudge TCP to send something, since we
3277 * SACK's since we are subject to attack in such a
3311 * Look-up the routing entry to the peer of this inpcb. If no route
3314 * tcp_mss_update to get the peer/interface MTU.
3391 * The right place to do that is ip6_setpktopt() that has just been
3402 * option, the INC_IPV6MINMTU flag to announce
3422 * SACK's since we are subject to attack in such a
3499 * for cc modules to figure out what the modulo of the
3754 "Switch TCP connection to SW TLS");
3758 "Switch TCP connection to ifnet TLS");
3763 * tcp subsystem. Memory allocation is done with M_NOWAIT to
3769 * Due to header inclusion and ordering limitations the struct ip
3770 * and ip6_hdr pointers have to be passed as void pointers.
3811 * "TCP: [1.2.3.4]:50332 to [1.2.3.4]:80 tcpflags 0x2<SYN>"
3813 size = sizeof("TCP: []:12345 to []:12345 tcpflags 0x2<>") +
3831 sprintf(sp, "]:%i to [", ntohs(inc->inc_fport));
3840 sprintf(sp, "]:%i to [", ntohs(inc->inc_fport));
3848 sprintf(sp, "]:%i to [", ntohs(th->th_sport));
3858 sprintf(sp, "]:%i to [", ntohs(th->th_sport));
3877 * A subroutine which makes it easy to track TCP state changes with DTrace.
3879 * correspond to actual TCP state transitions.
3896 * the kernel-format tcpcb structure pointed to by tp. This is done to
3897 * reduce the spew of irrelevant information over this interface, to isolate
3898 * user code from changes in the kernel structure, and potentially to provide
4059 * If a switch fails we only need to
4074 tcp_do_ack_accounting(struct tcpcb *tp, struct tcphdr *th, struct tcpopt *to, uint32_t tiwin, int mss)
4078 if (to->to_flags & TOF_SACK) {
4091 if (to->to_flags & TOF_SACK) {
4113 if (to->to_flags & TOF_SACK) {
4182 /* Convert back to ticks, with */
4194 * over from converting to hz and shifting.
4195 * We need to convert this to the 5 bit
4215 * over from converting to hz and shifting.
4216 * We need to convert this to the 4 bit
4246 * run of the new stack and it has set the t_flags2 to
4257 * It is unsafe to process the packets since a
4259 * can occur). If we were to find a RST, then we
4262 * will blow up when it trys to unlock the inp.
4403 * time to purge it.
4512 * An open end request only needs to
4523 * For this one we need to
4549 /* Check to see if this is a duplicate of one not started */
4563 * a 4xx of some sort and its going to age
4595 * We can set the min boundaries to the TCP Sequence space,
4596 * but it might be found to be further up when sendfile
4669 * convert the stored value to the requested unit of granularity.
4679 * If the srtt is stored with ticks granularity, we need to
4680 * unshift to get the actual value. We do this after the
4681 * conversion above (if one was necessary) in order to maximize
4699 /* To get total bytes sent you must add t_snd_rxt_bytes to t_sndbytes */