summaryrefslogtreecommitdiffstats
path: root/sys/netinet/tcp_usrreq.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* indentderaadt1999-01-071-6/+6
|
* NewReno, SACK and FACK support for TCP, adapted from code for BSDIprovos1998-11-171-2/+28
| | | | | | | | by Hari Balakrishnan (hari@lcs.mit.edu), Tom Henderson (tomh@cs.berkeley.edu) and Venkat Padmanabhan (padmanab@cs.berkeley.edu) as part of the Daedalus research group at the University of California, (http://daedalus.cs.berkeley.edu). [I was able to do this on time spent at the Center for Information Technology Integration (citi.umich.edu)]
* indentderaadt1998-06-271-3/+3
|
* indentderaadt1998-06-271-3/+2
|
* Disallow TCP connect() to multicast addresses; cmetz@inner.netangelos1998-06-271-1/+8
|
* indentderaadt1998-06-261-3/+2
|
* indentderaadt1998-06-111-17/+13
|
* wasteland quality control cleanupderaadt1998-06-101-2/+2
|
* New TCPCTL_IDENT sysctl for identd without kmem insanity.beck1998-06-101-2/+58
|
* first step to the setsockopt/getsockopt interface as described inprovos1998-05-181-1/+10
| | | | | | | draft-mcdonald-simple-ipsec-api, kernel notifies (EMT_REQUESTSA) signal userland key management applications when security services are requested. this is only for outgoing connections at the moment, incoming packets are not yet checked against the selected socket policy.
* Another shot at disallowing TCP connections to 255.255.255.255,angelos1998-02-281-1/+12
| | | | 0.0.0.0 and any local broadcast addresses. Tested.
* patch could not have been tested. panics machine on bootderaadt1998-02-251-9/+1
|
* please indent as the file is currently indentedderaadt1998-02-251-3/+2
|
* Disallow TCP connects to 255.255.255.255 or local broadcast addresses.angelos1998-02-251-1/+10
|
* sysctl for def sizes for tcp/udp send/recv queuesmickey1998-01-241-3/+10
|
* s/(cast)0/NYLL/gmickey1998-01-201-4/+4
|
* so_linger is in secondsderaadt1998-01-061-2/+2
|
* ignore PRU_SHUTDOWN if socket is already shutdownderaadt1998-01-031-1/+3
|
* The list of tcp/udp ports not to allocate dynamically is nowmillert1997-08-091-1/+8
| | | | | | a bitmask configurable via sysctl([38]). The default values have not changed. If one wants to change the list it should be done early on in /etc/rc.
* cmd is a u_longderaadt1997-07-241-2/+2
|
* TCP/IP Illustrated Vol. 2, pg 1010. excessive testing in PRU_DETACH case;deraadt1997-06-141-5/+2
| | | | frueauf@ira.uka.de; confirmed by Andreas.Gunnarsson@emw.ericsson.se
* add net.inet.tcp.{keepidle,keepintvl,slowhz}; mouse@Rodents.Montreal.QC.CAderaadt1997-06-061-1/+12
|
* use arc4random()deraadt1997-02-051-2/+3
|
* `solve' the syn bomb problem as well as currently known; add sysctl's forderaadt1996-09-201-2/+6
| | | | | | SOMAXCONN (kern.somaxconn), SOMINCONN (kern.sominconn), and TCPTV_KEEP_INIT (net.inet.tcp.keepinittime). when this is not enough (ie. overfull), start doing tail drop, but slightly prefer the same port.
* Remove random() prototype, as it's not needed. Besides it was wrong for the alpha :-)niklas1996-07-291-4/+1
|
* Make TCP ISS increment by random amountstholo1996-07-291-2/+10
|
* SS_CONNECTOUT indicates socket was connect()ed at this end, accept()ed at other endderaadt1996-07-251-1/+2
|
* From Lite2; fix mbuf leaktholo1996-03-141-1/+7
|
* From NetBSD: 960217 mergeniklas1996-03-031-3/+18
|
* initial import of NetBSD treederaadt1995-10-181-0/+555