/freebsd-12-stable/usr.bin/systat/ |
H A D | systat.h | 61 #define TCP 0x1 macro
|
H A D | netcmds.c | 149 protos == TCP ? "tcp" : protos == UDP ? "udp" : 0); 173 protos = TCP | UDP; 175 protos = TCP; 188 if ((protos&TCP) == 0) 248 protos == (TCP|UDP) ? 0 : protos == TCP ? "tcp" : "udp");
|
H A D | netstat.c | 161 protos = TCP|UDP; 190 if (protos&TCP) { 260 if (protos&TCP) { 288 if (idx == 0) { /* TCP */ 296 if (idx == 0) { /* TCP */
|
/freebsd-12-stable/sys/netinet/libalias/ |
H A D | alias_mod.h | 58 #define TCP 0x02 macro
|
H A D | alias_dummy.c | 107 .proto = UDP|TCP,
|
H A D | alias_pptp.c | 134 .proto = TCP, 141 .proto = TCP, 200 Alias_pptp.c performs special processing for PPTP sessions under TCP. 204 TCP applications that are currently (ie. FTP, IRC and RTSP) aliased. 211 into a single TCP packet. This is typically the case, but is not 214 Unlike some of the other TCP applications that are aliased (ie. FTP, 338 /* Compute TCP checksum for revised packet */ 410 /* Compute TCP checksum for modified packet */
|
H A D | alias_ftp.c | 34 TCP. Specifically, when a PORT/EPRT command from the client 40 single TCP packet. This is typically the case, but exceptions 47 machine is totally unaware of the modification to the TCP stream. 150 .proto = TCP, 157 .proto = TCP, 230 /* Calculate data length of TCP packet */ 289 /* Calculate data length of TCP packet */ 664 /* Calculate data length of TCP packet */ 754 /* Compute TCP checksum for revised packet */
|
H A D | alias_irc.c | 37 single TCP packet. This will usually happen, but is not 123 .proto = TCP, 179 /* Calculate data length of TCP packet */ 458 /* Compute TCP checksum for revised packet */ 484 changes in the TCP stream. This should not be too difficult given
|
H A D | alias_skinny.c | 83 .proto = TCP, 125 * protocol. Skinny typically uses TCP port 2000 to set up calls between 132 * the TCP port over which it will communicate.
|
H A D | alias_smedia.c | 73 protocols. It performs special processing for RSTP sessions under TCP. 91 into a single TCP packet. This is typically the case, but exceptions 98 machine is totally unaware of the modification to the TCP stream. 167 .proto = TCP|UDP, 250 /* Calculate data length of TCP packet */ 451 /* Compute TCP checksum for revised packet */
|
/freebsd-12-stable/sys/dev/ice/ |
H A D | ice_lan_tx_rx.h | 1204 ICE_PTT(26, IP, IPV4, NOF, NONE, NONE, NOF, TCP, PAY4), 1213 ICE_PTT(33, IP, IPV4, NOF, IP_IP, IPV4, NOF, TCP, PAY4), 1222 ICE_PTT(40, IP, IPV4, NOF, IP_IP, IPV6, NOF, TCP, PAY4), 1234 ICE_PTT(48, IP, IPV4, NOF, IP_GRENAT, IPV4, NOF, TCP, PAY4), 1243 ICE_PTT(55, IP, IPV4, NOF, IP_GRENAT, IPV6, NOF, TCP, PAY4), 1255 ICE_PTT(63, IP, IPV4, NOF, IP_GRENAT_MAC, IPV4, NOF, TCP, PAY4), 1264 ICE_PTT(70, IP, IPV4, NOF, IP_GRENAT_MAC, IPV6, NOF, TCP, PAY4), 1276 ICE_PTT(78, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV4, NOF, TCP, PAY4), 1285 ICE_PTT(85, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV6, NOF, TCP, PAY4), 1294 ICE_PTT(92, IP, IPV6, NOF, NONE, NONE, NOF, TCP, PAY [all...] |
/freebsd-12-stable/tests/sys/netpfil/common/ |
H A D | pft_ping.py | 184 tcp = packet.getlayer(sp.TCP) 196 # Verify TCP checksum 201 new_chksum = newpacket[sp.TCP].chksum 203 print("Expected TCP checksum %x but found %x\n" % (new_chksum, chksum)) 216 tcp = sp.TCP(dport=666, flags='S', options=opts) 242 # TCP options 244 help='Send a TCP SYN packet') 246 help='Include unaligned TCP options')
|
/freebsd-12-stable/share/examples/ipfw/ |
H A D | change_rules.sh | 128 The TCP/IP connections might be broken during the change. If so, restore
|
/freebsd-12-stable/tests/sys/netinet6/ |
H A D | exthdr.py | 85 tcp = packet.getlayer(sp.TCP) 88 # Is TCP RST? 238 # Try for at least UDP and TCP upper layer payloads. 245 tcp = sp.TCP(dport=4567, sport=7654)
|
/freebsd-12-stable/share/dtrace/ |
H A D | tcpconn | 29 * The tcpconn D script shows histograms of the source of TCP connections
|
H A D | tcpdebug | 32 * A TCP debug statement shows a connection's
|
H A D | tcpstate | 29 * The tcpstate D script shows TCP sockets transitioning between states.
|
H A D | tcptrack | 29 * The tcptrack D script shows various information about TCP
|
/freebsd-12-stable/sys/netpfil/ipfw/ |
H A D | ip_fw2.c | 250 #define TCP(p) ((struct tcphdr *)(p)) macro 347 * Parse TCP options. The logic copied from tcp_dooptions(). 617 * Generate a TCP packet, containing either a RST or a keepalive. 1126 * Check to see if the UDP or TCP stack supplied us with 1408 * valid for TCP and UDP packets. 1509 dst_port = TCP(ulp)->th_dport; 1510 src_port = TCP(ulp)->th_sport; 1512 args->f_id._flags = TCP(ulp)->th_flags; 1694 dst_port = TCP(ulp)->th_dport; 1695 src_port = TCP(ul [all...] |
H A D | ip_fw_log.c | 79 #define TCP(p) ((struct tcphdr *)(p)) macro 330 len = snprintf(SNPARGS(proto, 0), "TCP %s", src);
|
/freebsd-12-stable/sys/netpfil/ipfw/nat64/ |
H A D | nat64_translate.h | 80 #define TCP(p) ((struct tcphdr *)(p)) macro
|
H A D | nat64_translate.c | 1121 tcp = TCP(eip6 + 1); 1298 csum = &TCP(mtodo(m, hlen))->th_sum; 1300 struct tcphdr *tcp = TCP(mtodo(m, hlen)); 1674 csum = &TCP(mtodo(m, hlen))->th_sum; 1676 struct tcphdr *tcp = TCP(mtodo(m, hlen));
|
/freebsd-12-stable/crypto/heimdal/tools/ |
H A D | kdc-log-analyze.pl | 179 print "\tStrange TCP data clients: ", int(keys %strange_tcp_data),"\n"; 183 print "\tTimeout waiting on TCP requests: ", $tcp_conn_timeout,"\n"; 185 print "\tTop ten TCP timeout request clients\n"; 409 } elsif (/TCP data of strange type from IPv[46]:([0-9\.:a-fA-F]+)/) { 421 } elsif (/TCP-connection from IPv[46]:([0-9\.:a-fA-F]+) expired after [0-9]+ bytes/) {
|
/freebsd-12-stable/crypto/openssh/contrib/suse/ |
H A D | openssh.spec | 55 arbitrary TCP/IP ports can also be forwarded over the secure channel. 69 arbitrary TCP/IP ports can also be forwarded over the secure channel. 100 - Added flag to configure daemon with TCP Wrappers support
|
/freebsd-12-stable/sys/dev/ixl/ |
H A D | i40e_common.c | 667 I40E_PTT(26, IP, IPV4, NOF, NONE, NONE, NOF, TCP, PAY4), 676 I40E_PTT(33, IP, IPV4, NOF, IP_IP, IPV4, NOF, TCP, PAY4), 685 I40E_PTT(40, IP, IPV4, NOF, IP_IP, IPV6, NOF, TCP, PAY4), 697 I40E_PTT(48, IP, IPV4, NOF, IP_GRENAT, IPV4, NOF, TCP, PAY4), 706 I40E_PTT(55, IP, IPV4, NOF, IP_GRENAT, IPV6, NOF, TCP, PAY4), 718 I40E_PTT(63, IP, IPV4, NOF, IP_GRENAT_MAC, IPV4, NOF, TCP, PAY4), 727 I40E_PTT(70, IP, IPV4, NOF, IP_GRENAT_MAC, IPV6, NOF, TCP, PAY4), 739 I40E_PTT(78, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV4, NOF, TCP, PAY4), 748 I40E_PTT(85, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV6, NOF, TCP, PAY4), 757 I40E_PTT(92, IP, IPV6, NOF, NONE, NONE, NOF, TCP, PAY [all...] |