Lines Matching defs:cookie
24 * for a valid cookie, so this is an acceptable risk.
149 /* Generate the fastopen cookie by applying SipHash to both the source and
303 * to validating the cookie in order to avoid burning CPU cycles
307 * processing a cookie request is that clients can't differentiate
343 /* Returns true if we should perform Fast Open on the SYN. The cookie (foc)
345 * cookie request (foc->len == 0).
358 if (foc->len == 0) /* Client requests a cookie */
372 /* Client requests a cookie. */
385 * cookie.
387 * Note: Data-less SYN with valid cookie is allowed to
415 struct tcp_fastopen_cookie *cookie)
419 tcp_fastopen_cache_get(sk, mss, cookie);
423 cookie->len = -1;
430 cookie->len = -1;
433 if (cookie->len > 0)
442 * 2. we have a valid cookie
448 struct tcp_fastopen_cookie cookie = { .len = 0 };
453 if (tcp_fastopen_cookie_check(sk, &mss, &cookie)) {
464 tp->fastopen_req->cookie = cookie;