/freebsd-11-stable/usr.bin/systat/ |
H A D | systat.h | 59 #define TCP 0x1 macro
|
H A D | netcmds.c | 147 protos == TCP ? "tcp" : protos == UDP ? "udp" : 0); 171 protos = TCP | UDP; 173 protos = TCP; 186 if ((protos&TCP) == 0) 246 protos == (TCP|UDP) ? 0 : protos == TCP ? "tcp" : "udp");
|
H A D | netstat.c | 156 protos = TCP|UDP; 185 if (protos&TCP) { 256 if (protos&TCP) { 284 if (idx == 0) { /* TCP */ 292 if (idx == 0) { /* TCP */ 320 if (idx == 0) /* TCP */
|
/freebsd-11-stable/sys/netinet/libalias/ |
H A D | alias_mod.h | 55 #define TCP 0x02 macro
|
H A D | alias_dummy.c | 108 .proto = UDP|TCP,
|
H A D | alias_pptp.c | 140 .proto = TCP, 147 .proto = TCP, 206 Alias_pptp.c performs special processing for PPTP sessions under TCP. 210 TCP applications that are currently (ie. FTP, IRC and RTSP) aliased. 217 into a single TCP packet. This is typically the case, but is not 220 Unlike some of the other TCP applications that are aliased (ie. FTP, 347 /* Compute TCP checksum for revised packet */ 419 /* Compute TCP checksum for modified packet */
|
H A D | alias_ftp.c | 32 TCP. Specifically, when a PORT/EPRT command from the client 38 single TCP packet. This is typically the case, but exceptions 45 machine is totally unaware of the modification to the TCP stream. 154 .proto = TCP, 161 .proto = TCP, 234 /* Calculate data length of TCP packet */ 298 /* Calculate data length of TCP packet */ 674 /* Calculate data length of TCP packet */ 764 /* Compute TCP checksum for revised packet */
|
H A D | alias_skinny.c | 83 .proto = TCP, 125 * protocol. Skinny typically uses TCP port 2000 to set up calls between 132 * the TCP port over which it will communicate.
|
H A D | alias_irc.c | 35 single TCP packet. This will usually happen, but is not 123 .proto = TCP, 179 /* Calculate data length of TCP packet */ 459 /* Compute TCP checksum for revised packet */ 485 changes in the TCP stream. This should not be too difficult given
|
H A D | alias_smedia.c | 71 protocols. It performs special processing for RSTP sessions under TCP. 89 into a single TCP packet. This is typically the case, but exceptions 96 machine is totally unaware of the modification to the TCP stream. 167 .proto = TCP|UDP, 252 /* Calculate data length of TCP packet */ 466 /* Compute TCP checksum for revised packet */
|
/freebsd-11-stable/share/examples/ipfw/ |
H A D | change_rules.sh | 126 The TCP/IP connections might be broken during the change. If so, restore
|
/freebsd-11-stable/share/dtrace/ |
H A D | tcpconn | 29 * The tcpconn D script shows histograms of the source of TCP connections
|
H A D | tcpdebug | 32 * A TCP debug statement shows a connection's
|
H A D | tcpstate | 29 * The tcpstate D script shows TCP sockets transitioning between states.
|
H A D | tcptrack | 29 * The tcptrack D script shows various information about TCP
|
/freebsd-11-stable/sys/netpfil/ipfw/ |
H A D | ip_fw2.c | 235 #define TCP(p) ((struct tcphdr *)(p)) macro 332 * Parse TCP options. The logic copied from tcp_dooptions(). 602 * Generate a TCP packet, containing either a RST or a keepalive. 1111 * Check to see if the UDP or TCP stack supplied us with 1393 * valid for TCP and UDP packets. 1494 dst_port = TCP(ulp)->th_dport; 1495 src_port = TCP(ulp)->th_sport; 1497 args->f_id._flags = TCP(ulp)->th_flags; 1679 dst_port = TCP(ulp)->th_dport; 1680 src_port = TCP(ul [all...] |
H A D | ip_fw_log.c | 77 #define TCP(p) ((struct tcphdr *)(p)) macro 328 len = snprintf(SNPARGS(proto, 0), "TCP %s", src);
|
/freebsd-11-stable/sys/netpfil/ipfw/nat64/ |
H A D | nat64_translate.h | 80 #define TCP(p) ((struct tcphdr *)(p)) macro
|
H A D | nat64_translate.c | 1068 tcp = TCP(eip6 + 1); 1246 csum = &TCP(mtodo(m, hlen))->th_sum; 1248 struct tcphdr *tcp = TCP(mtodo(m, hlen)); 1622 csum = &TCP(mtodo(m, hlen))->th_sum; 1624 struct tcphdr *tcp = TCP(mtodo(m, hlen));
|
/freebsd-11-stable/crypto/heimdal/tools/ |
H A D | kdc-log-analyze.pl | 179 print "\tStrange TCP data clients: ", int(keys %strange_tcp_data),"\n"; 183 print "\tTimeout waiting on TCP requests: ", $tcp_conn_timeout,"\n"; 185 print "\tTop ten TCP timeout request clients\n"; 409 } elsif (/TCP data of strange type from IPv[46]:([0-9\.:a-fA-F]+)/) { 421 } elsif (/TCP-connection from IPv[46]:([0-9\.:a-fA-F]+) expired after [0-9]+ bytes/) {
|
/freebsd-11-stable/sys/net/ |
H A D | flowtable.c | 287 #define TCP(p) ((struct tcphdr *)(p)) macro 332 dport = TCP(ulp)->th_dport; 333 sport = TCP(ulp)->th_sport; 334 if (TCP(ulp)->th_flags & (TH_RST|TH_FIN))
|
/freebsd-11-stable/crypto/openssh/contrib/suse/ |
H A D | openssh.spec | 55 arbitrary TCP/IP ports can also be forwarded over the secure channel. 69 arbitrary TCP/IP ports can also be forwarded over the secure channel. 100 - Added flag to configure daemon with TCP Wrappers support
|
/freebsd-11-stable/sys/dev/ixl/ |
H A D | i40e_common.c | 665 I40E_PTT(26, IP, IPV4, NOF, NONE, NONE, NOF, TCP, PAY4), 674 I40E_PTT(33, IP, IPV4, NOF, IP_IP, IPV4, NOF, TCP, PAY4), 683 I40E_PTT(40, IP, IPV4, NOF, IP_IP, IPV6, NOF, TCP, PAY4), 695 I40E_PTT(48, IP, IPV4, NOF, IP_GRENAT, IPV4, NOF, TCP, PAY4), 704 I40E_PTT(55, IP, IPV4, NOF, IP_GRENAT, IPV6, NOF, TCP, PAY4), 716 I40E_PTT(63, IP, IPV4, NOF, IP_GRENAT_MAC, IPV4, NOF, TCP, PAY4), 725 I40E_PTT(70, IP, IPV4, NOF, IP_GRENAT_MAC, IPV6, NOF, TCP, PAY4), 737 I40E_PTT(78, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV4, NOF, TCP, PAY4), 746 I40E_PTT(85, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV6, NOF, TCP, PAY4), 755 I40E_PTT(92, IP, IPV6, NOF, NONE, NONE, NOF, TCP, PAY [all...] |
/freebsd-11-stable/contrib/libpcap/ |
H A D | grammar.y | 323 %token ARP RARP IP SCTP TCP UDP ICMP IGMP IGRP PIM VRRP CARP 510 | TCP { $$ = Q_TCP; }
|
H A D | scanner.l | 264 tcp return TCP;
|