Searched refs:SYN (Results 1 – 12 of 12) sorted by relevance
/Zephyr-Core-3.7.0/tests/net/tcp/src/ |
D | main.c | 251 if ((test_case_no == TEST_SERVER_WITH_OPTIONS_IPV4) && (flags & SYN)) { in tester_prepare_tcp_pkt() 287 if ((test_case_no == TEST_SERVER_WITH_OPTIONS_IPV4) && (flags & SYN)) { in tester_prepare_tcp_pkt() 306 if ((test_case_no == TEST_SERVER_WITH_OPTIONS_IPV4) && (flags & SYN)) { in tester_prepare_tcp_pkt() 344 return tester_prepare_tcp_pkt(af, src_port, dst_port, SYN, NULL, 0U); in prepare_syn_packet() 350 return tester_prepare_tcp_pkt(af, src_port, dst_port, SYN | ACK, in prepare_syn_ack_packet() 538 test_verify_flags(th, SYN); in handle_client_test() 721 test_verify_flags(th, SYN | ACK); in handle_server_test() 1077 test_verify_flags(th, SYN); in handle_syn_rst_ack() 1140 test_verify_flags(th, SYN); in handle_client_fin_wait_2_test() 1265 test_verify_flags(th, SYN); in handle_client_fin_wait_2_failure_test() [all …]
|
/Zephyr-Core-3.7.0/subsys/net/ip/ |
D | tcp_private.h | 186 SYN = BIT(1), enumerator
|
D | tcp.c | 296 if (flags & SYN) { in tcp_flags() 2266 if (th_flags(th) & SYN && !(th_flags(th) & ACK)) { in tcp_recv() 2888 tcp_validate_seq(conn, th) && FL(&fl, &, SYN)) { in tcp_in() 2934 if (FL(&fl, ==, SYN)) { in tcp_in() 2938 tcp_out(conn, SYN | ACK); in tcp_in() 2951 ret = tcp_out_ext(conn, SYN, NULL /* no data */, conn->seq); in tcp_in() 3060 if (FL(&fl, &, SYN | ACK, th && th_ack(th) == conn->seq)) { in tcp_in() 4138 if (conn == NULL && SYN == th_flags(th)) { in tcp_input()
|
/Zephyr-Core-3.7.0/subsys/net/lib/sockets/ |
D | Kconfig | 62 API call will timeout if we have not received SYN-ACK from
|
/Zephyr-Core-3.7.0/doc/releases/ |
D | release-notes-1.9.rst | 266 * ``ZEP-2279`` - echo_server TCP handler corrupt by SYN flood
|
D | release-notes-1.13.rst | 173 * Add MSS option on sending TCP SYN request.
|
D | release-notes-1.14.rst | 123 * :github:`16323` - net: ipv6: tcp: unexpected reply to malformed HBH in TCP/IPv6 SYN 322 * :github:`16323` - net: ipv6: tcp: unexpected reply to malformed HBH in TCP/IPv6 SYN 2302 * :github:`729` - TCP SYN backlog change likely has concurrent global var access issues
|
D | release-notes-2.0.rst | 1061 * :github:`16323` - net: ipv6: tcp: unexpected reply to malformed HBH in TCP/IPv6 SYN
|
D | release-notes-3.7.rst | 1547 * Fixed a possible TCP context leak in case initial SYN packet transmission failed.
|
D | release-notes-2.7.rst | 1885 * :github:`30209` - TCP2 : How to add MSS option on sending [SYN, ACK] to client?
|
D | release-notes-2.5.rst | 1938 * :github:`9944` - sockets: Connect doesn't send new SYN in case the first connection attempt fails
|
D | release-notes-3.2.rst | 2133 * :github:`48465` - net: tcp: SYN flag received after connection is established should result in co…
|