History log of /netbsd-src/sys/netinet/tcp_output.c (Results 101 – 125 of 222)
Revision Date Author Comments
# c24b749d 06-Mar-2005 matt <matt@NetBSD.org>

Fix typo. Opposite of >= is <, not ==.


# 9337b701 06-Mar-2005 matt <matt@NetBSD.org>

Replace some gotos with a do while (0) and breaks. No functional change.


# 8e04817c 06-Mar-2005 matt <matt@NetBSD.org>

Add IPv4/TCP hooks for TCP Segment Offload on transmit.


# c9f058f6 02-Mar-2005 mycroft <mycroft@NetBSD.org>

Copyright maintenance.


# 4ae1f36d 28-Feb-2005 jonathan <jonathan@NetBSD.org>

Commit TCP SACK patches from Kentaro A. Karahone's patch at:
http://www.sigusr1.org/~kurahone/tcp-sack-netbsd-02152005.diff.gz

Fixes in that patch for pre-existing TCP pcb initializations were al

Commit TCP SACK patches from Kentaro A. Karahone's patch at:
http://www.sigusr1.org/~kurahone/tcp-sack-netbsd-02152005.diff.gz

Fixes in that patch for pre-existing TCP pcb initializations were already
committed to NetBSD-current, so are not included in this commit.

The SACK patch has been observed to correctly negotiate and respond,
to SACKs in wide-area traffic.

There are two indepenently-observed, as-yet-unresolved anomalies:
First, seeing unexplained delays between in fast retransmission
(potentially explainable by an 0.2sec RTT between adjacent
ethernet/wifi NICs); and second, peculiar and unepxlained TCP
retransmits observed over an ath0 card.

After discussion with several interested developers, I'm committing
this now, as-is, for more eyes to use and look over. Current hypothesis
is that the anomalies above may in fact be due to link/level (hardware,
driver, HAL, firmware) abberations in the test setup, affecting both
Kentaro's wired-Ethernet NIC and in my two (different) WiFi NICs.

show more ...


# f07677dd 26-Feb-2005 perry <perry@NetBSD.org>

nuke trailing whitespace


# 870f2067 03-Feb-2005 perry <perry@NetBSD.org>

ANSIfy function declarations


# 7994b6f9 15-Dec-2004 thorpej <thorpej@NetBSD.org>

Don't perform checksums on loopback interfaces. They can be reenabled with
the net.inet.*.do_loopback_cksum sysctl.

Approved by: groo


# c8c7a6db 20-May-2004 jonathan <jonathan@NetBSD.org>

With FAST_IPSEC, include <netipsec/key.h>, as Itojun's recent changes
now require KEY_FREESAV() to be in scope.


# 4ebcfcf2 18-May-2004 itojun <itojun@NetBSD.org>

fix MD5 signature support to actually validate inbound signature, and
drop packet if fails.


# bd3ff85f 08-May-2004 chs <chs@NetBSD.org>

work around an LP64 problem where we report an excessively large window
due to incorrect mixing of types.


# e0395ac8 26-Apr-2004 itojun <itojun@NetBSD.org>

make TCP MD5 signature work with KAME IPSEC (#define IPSEC).

support IPv6 if KAME IPSEC (RFC is not explicit about how we make data stream
for checksum with IPv6, but i'm pretty sure using normal ps

make TCP MD5 signature work with KAME IPSEC (#define IPSEC).

support IPv6 if KAME IPSEC (RFC is not explicit about how we make data stream
for checksum with IPv6, but i'm pretty sure using normal pseudo-header is the
right thing).

XXX
current TCP MD5 signature code has giant flaw:
it does not validate signature on input (can't believe it! what is the point?)

show more ...


# 887b782b 25-Apr-2004 jonathan <jonathan@NetBSD.org>

Initial commit of a port of the FreeBSD implementation of RFC 2385
(MD5 signatures for TCP, as used with BGP). Credit for original
FreeBSD code goes to Bruce M. Simpson, with FreeBSD sponsorship
cre

Initial commit of a port of the FreeBSD implementation of RFC 2385
(MD5 signatures for TCP, as used with BGP). Credit for original
FreeBSD code goes to Bruce M. Simpson, with FreeBSD sponsorship
credited to sentex.net. Shortening of the setsockopt() name
attributed to Vincent Jardin.

This commit is a minimal, working version of the FreeBSD code, as
MFC'ed to FreeBSD-4. It has received minimal testing with a ttcp
modified to set the TCP-MD5 option; BMS's additions to tcpdump-current
(tcpdump -M) confirm that the MD5 signatures are correct. Committed
as-is for further testing between a NetBSD BGP speaker (e.g., quagga)
and industry-standard BGP speakers (e.g., Cisco, Juniper).


NOTE: This version has two potential flaws. First, I do see any code
that verifies recieved TCP-MD5 signatures. Second, the TCP-MD5
options are internally padded and assumed to be 32-bit aligned. A more
space-efficient scheme is to pack all TCP options densely (and
possibly unaligned) into the TCP header ; then do one final padding to
a 4-byte boundary. Pre-existing comments note that accounting for
TCP-option space when we add SACK is yet to be done. For now, I'm
punting on that; we can solve it properly, in a way that will handle
SACK blocks, as a separate exercise.

In case a pullup to NetBSD-2 is requested, this adds sys/netipsec/xform_tcp.c
,and modifies:

sys/net/pfkeyv2.h,v 1.15
sys/netinet/files.netinet,v 1.5
sys/netinet/ip.h,v 1.25
sys/netinet/tcp.h,v 1.15
sys/netinet/tcp_input.c,v 1.200
sys/netinet/tcp_output.c,v 1.109
sys/netinet/tcp_subr.c,v 1.165
sys/netinet/tcp_usrreq.c,v 1.89
sys/netinet/tcp_var.h,v 1.109
sys/netipsec/files.netipsec,v 1.3
sys/netipsec/ipsec.c,v 1.11
sys/netipsec/ipsec.h,v 1.7
sys/netipsec/key.c,v 1.11
share/man/man4/tcp.4,v 1.16
lib/libipsec/pfkey.c,v 1.20
lib/libipsec/pfkey_dump.c,v 1.17
lib/libipsec/policy_token.l,v 1.8
sbin/setkey/parse.y,v 1.14
sbin/setkey/setkey.8,v 1.27
sbin/setkey/token.l,v 1.15

Note that the preceding two revisions to tcp.4 will be
required to cleanly apply this diff.

show more ...


# dc937846 30-Mar-2004 christos <christos@NetBSD.org>

Make sure we disarm the persist timer before we arm the rexmit
timer, otherwise there is a tiny window where both timers are
active, and this is not correct according to the comments in the
code. I b

Make sure we disarm the persist timer before we arm the rexmit
timer, otherwise there is a tiny window where both timers are
active, and this is not correct according to the comments in the
code. I believe that this is the cause of the to_ticks <= 0 assertion
failure in callout_schedule() that I've been getting.

show more ...


# 8387ab32 03-Mar-2004 thorpej <thorpej@NetBSD.org>

Use IPSEC_PCB_SKIP_IPSEC() to short-circuit calls to ipsec{4,6}_hdrsiz_tcp().


# d334411b 04-Feb-2004 itojun <itojun@NetBSD.org>

deal with IPv6 path MTU < 1280 (RFC2460 section 5 last paragraph).
check if there really is room for TCP data.


# 4a9b211e 12-Nov-2003 ragge <ragge@NetBSD.org>

Remove the FAST_MBSEARCH ifdef, send packet prediction is now default.


# da20a11a 24-Oct-2003 ragge <ragge@NetBSD.org>

Fix the bug in the tcp transmit prediction code.
During testing the prediction counters show a hit-rate on about 85% for
packets sent on a local LAN, and better than 99% for intercontinental
high-spe

Fix the bug in the tcp transmit prediction code.
During testing the prediction counters show a hit-rate on about 85% for
packets sent on a local LAN, and better than 99% for intercontinental
high-speed bulk traffic (!).

show more ...


# 935b3c7a 24-Oct-2003 enami <enami@NetBSD.org>

Make this file compile again when TCP_OUTPUT_COUNTERS defined.


# e8a98ee6 23-Oct-2003 thorpej <thorpej@NetBSD.org>

Oops, FAST_MBSEARCH counters were swapped; fix it. Pointed out by yamt@.


# 861856ca 21-Oct-2003 thorpej <thorpej@NetBSD.org>

Add event counters that measure FAST_MBSEARCH.


# 11ede1ed 22-Aug-2003 itojun <itojun@NetBSD.org>

remove ipsec_set/getsocket. now we explicitly pass socket * to ip{,6}_output.


# 82eb4ce9 22-Aug-2003 itojun <itojun@NetBSD.org>

change the additional arg to be passed to ip{,6}_output to struct socket *.

this fixes KAME policy lookup which was broken by the previous commit.


# 90266995 22-Aug-2003 jonathan <jonathan@NetBSD.org>

Replace the set_socket() method of passing an extra struct socket*
argument to ip6_output() with a new explicit struct in6pcb* argument.
(The underlying socket can be obtained via in6pcb->inp6_socket

Replace the set_socket() method of passing an extra struct socket*
argument to ip6_output() with a new explicit struct in6pcb* argument.
(The underlying socket can be obtained via in6pcb->inp6_socket.)

In preparation for fast-ipsec. Reviewed by itojun.

show more ...


# 28b5f5df 15-Aug-2003 jonathan <jonathan@NetBSD.org>

(fast-ipsec): Add hooks to pass IPv4 IPsec traffic into fast-ipsec, if
configured with ``options FAST_IPSEC''. Kernels with KAME IPsec or
with no IPsec should work as before.

All calls to ip_output

(fast-ipsec): Add hooks to pass IPv4 IPsec traffic into fast-ipsec, if
configured with ``options FAST_IPSEC''. Kernels with KAME IPsec or
with no IPsec should work as before.

All calls to ip_output() now always pass an additional compulsory
argument: the inpcb associated with the packet being sent,
or 0 if no inpcb is available.

Fast-ipsec tested with ICMP or UDP over ESP. TCP doesn't work, yet.

show more ...


123456789