Lines Matching defs:cookie
30 * for a valid cookie, so this is an acceptable risk.
166 /* Generate the fastopen cookie by applying SipHash to both the source and
319 * to validating the cookie in order to avoid burning CPU cycles
323 * processing a cookie request is that clients can't differentiate
359 /* Returns true if we should perform Fast Open on the SYN. The cookie (foc)
361 * cookie request (foc->len == 0).
374 if (foc->len == 0) /* Client requests a cookie */
388 /* Client requests a cookie. */
401 * cookie.
403 * Note: Data-less SYN with valid cookie is allowed to
431 struct tcp_fastopen_cookie *cookie)
435 tcp_fastopen_cache_get(sk, mss, cookie);
439 cookie->len = -1;
446 cookie->len = -1;
449 if (cookie->len > 0)
458 * 2. we have a valid cookie
464 struct tcp_fastopen_cookie cookie = { .len = 0 };
469 if (tcp_fastopen_cookie_check(sk, &mss, &cookie)) {
480 tp->fastopen_req->cookie = cookie;