Searched refs:TCP (Results 1 - 25 of 29) sorted by relevance

12

/freebsd-11-stable/usr.bin/systat/
H A Dsystat.h59 #define TCP 0x1 macro
H A Dnetcmds.c147 protos == TCP ? "tcp" : protos == UDP ? "udp" : 0);
171 protos = TCP | UDP;
173 protos = TCP;
186 if ((protos&TCP) == 0)
246 protos == (TCP|UDP) ? 0 : protos == TCP ? "tcp" : "udp");
H A Dnetstat.c156 protos = TCP|UDP;
185 if (protos&TCP) {
256 if (protos&TCP) {
284 if (idx == 0) { /* TCP */
292 if (idx == 0) { /* TCP */
320 if (idx == 0) /* TCP */
/freebsd-11-stable/sys/netinet/libalias/
H A Dalias_mod.h55 #define TCP 0x02 macro
H A Dalias_dummy.c108 .proto = UDP|TCP,
H A Dalias_pptp.c140 .proto = TCP,
147 .proto = TCP,
206 Alias_pptp.c performs special processing for PPTP sessions under TCP.
210 TCP applications that are currently (ie. FTP, IRC and RTSP) aliased.
217 into a single TCP packet. This is typically the case, but is not
220 Unlike some of the other TCP applications that are aliased (ie. FTP,
347 /* Compute TCP checksum for revised packet */
419 /* Compute TCP checksum for modified packet */
H A Dalias_ftp.c32 TCP. Specifically, when a PORT/EPRT command from the client
38 single TCP packet. This is typically the case, but exceptions
45 machine is totally unaware of the modification to the TCP stream.
154 .proto = TCP,
161 .proto = TCP,
234 /* Calculate data length of TCP packet */
298 /* Calculate data length of TCP packet */
674 /* Calculate data length of TCP packet */
764 /* Compute TCP checksum for revised packet */
H A Dalias_skinny.c83 .proto = TCP,
125 * protocol. Skinny typically uses TCP port 2000 to set up calls between
132 * the TCP port over which it will communicate.
H A Dalias_irc.c35 single TCP packet. This will usually happen, but is not
123 .proto = TCP,
179 /* Calculate data length of TCP packet */
459 /* Compute TCP checksum for revised packet */
485 changes in the TCP stream. This should not be too difficult given
H A Dalias_smedia.c71 protocols. It performs special processing for RSTP sessions under TCP.
89 into a single TCP packet. This is typically the case, but exceptions
96 machine is totally unaware of the modification to the TCP stream.
167 .proto = TCP|UDP,
252 /* Calculate data length of TCP packet */
466 /* Compute TCP checksum for revised packet */
/freebsd-11-stable/share/examples/ipfw/
H A Dchange_rules.sh126 The TCP/IP connections might be broken during the change. If so, restore
/freebsd-11-stable/share/dtrace/
H A Dtcpconn29 * The tcpconn D script shows histograms of the source of TCP connections
H A Dtcpdebug32 * A TCP debug statement shows a connection's
H A Dtcpstate29 * The tcpstate D script shows TCP sockets transitioning between states.
H A Dtcptrack29 * The tcptrack D script shows various information about TCP
/freebsd-11-stable/sys/netpfil/ipfw/
H A Dip_fw2.c235 #define TCP(p) ((struct tcphdr *)(p)) macro
332 * Parse TCP options. The logic copied from tcp_dooptions().
602 * Generate a TCP packet, containing either a RST or a keepalive.
1111 * Check to see if the UDP or TCP stack supplied us with
1393 * valid for TCP and UDP packets.
1494 dst_port = TCP(ulp)->th_dport;
1495 src_port = TCP(ulp)->th_sport;
1497 args->f_id._flags = TCP(ulp)->th_flags;
1679 dst_port = TCP(ulp)->th_dport;
1680 src_port = TCP(ul
[all...]
H A Dip_fw_log.c77 #define TCP(p) ((struct tcphdr *)(p)) macro
328 len = snprintf(SNPARGS(proto, 0), "TCP %s", src);
/freebsd-11-stable/sys/netpfil/ipfw/nat64/
H A Dnat64_translate.h80 #define TCP(p) ((struct tcphdr *)(p)) macro
H A Dnat64_translate.c1068 tcp = TCP(eip6 + 1);
1246 csum = &TCP(mtodo(m, hlen))->th_sum;
1248 struct tcphdr *tcp = TCP(mtodo(m, hlen));
1622 csum = &TCP(mtodo(m, hlen))->th_sum;
1624 struct tcphdr *tcp = TCP(mtodo(m, hlen));
/freebsd-11-stable/crypto/heimdal/tools/
H A Dkdc-log-analyze.pl179 print "\tStrange TCP data clients: ", int(keys %strange_tcp_data),"\n";
183 print "\tTimeout waiting on TCP requests: ", $tcp_conn_timeout,"\n";
185 print "\tTop ten TCP timeout request clients\n";
409 } elsif (/TCP data of strange type from IPv[46]:([0-9\.:a-fA-F]+)/) {
421 } elsif (/TCP-connection from IPv[46]:([0-9\.:a-fA-F]+) expired after [0-9]+ bytes/) {
/freebsd-11-stable/sys/net/
H A Dflowtable.c287 #define TCP(p) ((struct tcphdr *)(p)) macro
332 dport = TCP(ulp)->th_dport;
333 sport = TCP(ulp)->th_sport;
334 if (TCP(ulp)->th_flags & (TH_RST|TH_FIN))
/freebsd-11-stable/crypto/openssh/contrib/suse/
H A Dopenssh.spec55 arbitrary TCP/IP ports can also be forwarded over the secure channel.
69 arbitrary TCP/IP ports can also be forwarded over the secure channel.
100 - Added flag to configure daemon with TCP Wrappers support
/freebsd-11-stable/sys/dev/ixl/
H A Di40e_common.c665 I40E_PTT(26, IP, IPV4, NOF, NONE, NONE, NOF, TCP, PAY4),
674 I40E_PTT(33, IP, IPV4, NOF, IP_IP, IPV4, NOF, TCP, PAY4),
683 I40E_PTT(40, IP, IPV4, NOF, IP_IP, IPV6, NOF, TCP, PAY4),
695 I40E_PTT(48, IP, IPV4, NOF, IP_GRENAT, IPV4, NOF, TCP, PAY4),
704 I40E_PTT(55, IP, IPV4, NOF, IP_GRENAT, IPV6, NOF, TCP, PAY4),
716 I40E_PTT(63, IP, IPV4, NOF, IP_GRENAT_MAC, IPV4, NOF, TCP, PAY4),
725 I40E_PTT(70, IP, IPV4, NOF, IP_GRENAT_MAC, IPV6, NOF, TCP, PAY4),
737 I40E_PTT(78, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV4, NOF, TCP, PAY4),
746 I40E_PTT(85, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV6, NOF, TCP, PAY4),
755 I40E_PTT(92, IP, IPV6, NOF, NONE, NONE, NOF, TCP, PAY
[all...]
/freebsd-11-stable/contrib/libpcap/
H A Dgrammar.y323 %token ARP RARP IP SCTP TCP UDP ICMP IGMP IGRP PIM VRRP CARP
510 | TCP { $$ = Q_TCP; }
H A Dscanner.l264 tcp return TCP;

Completed in 283 milliseconds

12