/freebsd-10.2-release/contrib/ofed/libsdp/src/ |
H A D | config_parser.h | 45 TCP = 261, enumerator in enum:yytokentype 63 #define TCP 261 macro
|
H A D | config_parser.c | 80 TCP = 261, enumerator in enum:yytokentype 98 #define TCP 261 macro
|
H A D | config_scanner.c | 888 yylval.ival = TCP; 890 printf("TCP\n"); 892 return TCP;
|
/freebsd-10.2-release/usr.bin/systat/ |
H A D | systat.h | 58 #define TCP 0x1 macro
|
H A D | netcmds.c | 147 protos == TCP ? "tcp" : protos == UDP ? "udp" : 0); 171 protos = TCP | UDP; 173 protos = TCP; 186 if ((protos&TCP) == 0) 246 protos == (TCP|UDP) ? 0 : protos == TCP ? "tcp" : "udp");
|
H A D | netstat.c | 156 protos = TCP|UDP; 185 if (protos&TCP) { 256 if (protos&TCP) { 284 if (idx == 0) { /* TCP */ 292 if (idx == 0) { /* TCP */ 320 if (idx == 0) /* TCP */
|
/freebsd-10.2-release/sys/netinet/libalias/ |
H A D | alias_mod.h | 56 #define TCP 2 macro
|
H A D | alias_dummy.c | 108 .proto = UDP|TCP,
|
H A D | alias_pptp.c | 140 .proto = TCP, 147 .proto = TCP, 206 Alias_pptp.c performs special processing for PPTP sessions under TCP. 210 TCP applications that are currently (ie. FTP, IRC and RTSP) aliased. 217 into a single TCP packet. This is typically the case, but is not 220 Unlike some of the other TCP applications that are aliased (ie. FTP, 347 /* Compute TCP checksum for revised packet */ 419 /* Compute TCP checksum for modified packet */
|
H A D | alias_ftp.c | 32 TCP. Specifically, when a PORT/EPRT command from the client 38 single TCP packet. This is typically the case, but exceptions 45 machine is totally unaware of the modification to the TCP stream. 154 .proto = TCP, 161 .proto = TCP, 234 /* Calculate data length of TCP packet */ 298 /* Calculate data length of TCP packet */ 674 /* Calculate data length of TCP packet */ 763 /* Compute TCP checksum for revised packet */
|
H A D | alias_irc.c | 35 single TCP packet. This will usually happen, but is not 124 .proto = TCP, 180 /* Calculate data length of TCP packet */ 460 /* Compute TCP checksum for revised packet */ 486 changes in the TCP stream. This should not be too difficult given
|
H A D | alias_skinny.c | 83 .proto = TCP, 125 * protocol. Skinny typically uses TCP port 2000 to set up calls between 132 * the TCP port over which it will communicate.
|
H A D | alias_smedia.c | 71 protocols. It performs special processing for RSTP sessions under TCP. 89 into a single TCP packet. This is typically the case, but exceptions 96 machine is totally unaware of the modification to the TCP stream. 167 .proto = TCP|UDP, 252 /* Calculate data length of TCP packet */ 466 /* Compute TCP checksum for revised packet */
|
H A D | alias.c | 33 TCP connection state, protocol-specific aliasing routines, 64 - TCP connection closing logic simplified in 84 IP header (TCP, UDP and ICMP were already 173 /* TCP Handling Routines 175 TcpMonitorIn() -- These routines monitor TCP connections, and 178 These routines look for SYN, FIN and RST flags to determine when TCP 179 connections open and close. When a TCP connection closes, the data 246 any incoming packets. For TCP and UDP, ports are also re-mapped. 255 For TCP and UDP protocols, a port number is chosen for an outgoing 257 port numbers. For TCP packet [all...] |
/freebsd-10.2-release/share/examples/ipfw/ |
H A D | change_rules.sh | 126 The TCP/IP connections might be broken during the change. If so, restore
|
/freebsd-10.2-release/sys/netpfil/ipfw/ |
H A D | ip_fw2.c | 211 #define TCP(p) ((struct tcphdr *)(p)) macro 685 * Check to see if the UDP or TCP stack supplied us with 938 * valid for TCP and UDP packets. 1030 dst_port = TCP(ulp)->th_dport; 1031 src_port = TCP(ulp)->th_sport; 1033 args->f_id._flags = TCP(ulp)->th_flags; 1202 dst_port = TCP(ulp)->th_dport; 1203 src_port = TCP(ulp)->th_sport; 1205 args->f_id._flags = TCP(ulp)->th_flags; 1695 tcp = TCP(ul [all...] |
H A D | ip_fw_log.c | 81 #define TCP(p) ((struct tcphdr *)(p)) macro 465 len = snprintf(SNPARGS(proto, 0), "TCP %s", src);
|
/freebsd-10.2-release/crypto/heimdal/tools/ |
H A D | kdc-log-analyze.pl | 179 print "\tStrange TCP data clients: ", int(keys %strange_tcp_data),"\n"; 183 print "\tTimeout waiting on TCP requests: ", $tcp_conn_timeout,"\n"; 185 print "\tTop ten TCP timeout request clients\n"; 409 } elsif (/TCP data of strange type from IPv[46]:([0-9\.:a-fA-F]+)/) { 421 } elsif (/TCP-connection from IPv[46]:([0-9\.:a-fA-F]+) expired after [0-9]+ bytes/) {
|
/freebsd-10.2-release/crypto/openssh/contrib/caldera/ |
H A D | openssh.spec | 98 X11 connections and arbitrary TCP/IP ports can also be forwarded over 105 Netzwerk her. X11 Verbindungen und beliebige andere TCP/IP Ports k�nnen ebenso 112 red insegura. Las conexiones X11 y puertos TCP/IP arbitrarios tambi�n pueden 119 connexions X11 et des ports TCP/IP arbitraires peuvent �galement �tre 126 X11 ad una porta TCP/IP arbitraria possono essere inoltrate attraverso 133 Liga��es X11 e portos TCP/IP arbitr�rios tamb�m poder ser reenviados 140 Liga��es X11 e portas TCP/IP arbitr�rias tamb�m podem ser reenviadas
|
/freebsd-10.2-release/sys/dev/ixl/ |
H A D | i40e_common.c | 257 I40E_PTT(26, IP, IPV4, NOF, NONE, NONE, NOF, TCP, PAY4), 266 I40E_PTT(33, IP, IPV4, NOF, IP_IP, IPV4, NOF, TCP, PAY4), 275 I40E_PTT(40, IP, IPV4, NOF, IP_IP, IPV6, NOF, TCP, PAY4), 287 I40E_PTT(48, IP, IPV4, NOF, IP_GRENAT, IPV4, NOF, TCP, PAY4), 296 I40E_PTT(55, IP, IPV4, NOF, IP_GRENAT, IPV6, NOF, TCP, PAY4), 308 I40E_PTT(63, IP, IPV4, NOF, IP_GRENAT_MAC, IPV4, NOF, TCP, PAY4), 317 I40E_PTT(70, IP, IPV4, NOF, IP_GRENAT_MAC, IPV6, NOF, TCP, PAY4), 329 I40E_PTT(78, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV4, NOF, TCP, PAY4), 338 I40E_PTT(85, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV6, NOF, TCP, PAY4), 347 I40E_PTT(92, IP, IPV6, NOF, NONE, NONE, NOF, TCP, PAY [all...] |
/freebsd-10.2-release/sys/net/ |
H A D | flowtable.c | 287 #define TCP(p) ((struct tcphdr *)(p)) macro 332 dport = TCP(ulp)->th_dport; 333 sport = TCP(ulp)->th_sport; 334 if (TCP(ulp)->th_flags & (TH_RST|TH_FIN))
|
/freebsd-10.2-release/crypto/openssh/contrib/suse/ |
H A D | openssh.spec | 31 # TCP Wrappers (tcpd-devel), 57 arbitrary TCP/IP ports can also be forwarded over the secure channel. 71 arbitrary TCP/IP ports can also be forwarded over the secure channel. 102 - Added flag to configure daemon with TCP Wrappers support
|
/freebsd-10.2-release/contrib/libpcap/ |
H A D | grammar.y | 276 %token ARP RARP IP SCTP TCP UDP ICMP IGMP IGRP PIM VRRP CARP 463 | TCP { $$ = Q_TCP; }
|
H A D | scanner.l | 200 tcp return TCP;
|
/freebsd-10.2-release/crypto/openssh/contrib/redhat/ |
H A D | openssh.spec | 139 arbitrary TCP/IP ports can also be forwarded over the secure channel.
|