Searched refs:TCP (Results 1 - 25 of 30) sorted by relevance

12

/freebsd-12-stable/usr.bin/systat/
H A Dsystat.h61 #define TCP 0x1 macro
H A Dnetcmds.c149 protos == TCP ? "tcp" : protos == UDP ? "udp" : 0);
173 protos = TCP | UDP;
175 protos = TCP;
188 if ((protos&TCP) == 0)
248 protos == (TCP|UDP) ? 0 : protos == TCP ? "tcp" : "udp");
H A Dnetstat.c161 protos = TCP|UDP;
190 if (protos&TCP) {
260 if (protos&TCP) {
288 if (idx == 0) { /* TCP */
296 if (idx == 0) { /* TCP */
/freebsd-12-stable/sys/netinet/libalias/
H A Dalias_mod.h58 #define TCP 0x02 macro
H A Dalias_dummy.c107 .proto = UDP|TCP,
H A Dalias_pptp.c134 .proto = TCP,
141 .proto = TCP,
200 Alias_pptp.c performs special processing for PPTP sessions under TCP.
204 TCP applications that are currently (ie. FTP, IRC and RTSP) aliased.
211 into a single TCP packet. This is typically the case, but is not
214 Unlike some of the other TCP applications that are aliased (ie. FTP,
338 /* Compute TCP checksum for revised packet */
410 /* Compute TCP checksum for modified packet */
H A Dalias_ftp.c34 TCP. Specifically, when a PORT/EPRT command from the client
40 single TCP packet. This is typically the case, but exceptions
47 machine is totally unaware of the modification to the TCP stream.
150 .proto = TCP,
157 .proto = TCP,
230 /* Calculate data length of TCP packet */
289 /* Calculate data length of TCP packet */
664 /* Calculate data length of TCP packet */
754 /* Compute TCP checksum for revised packet */
H A Dalias_irc.c37 single TCP packet. This will usually happen, but is not
123 .proto = TCP,
179 /* Calculate data length of TCP packet */
458 /* Compute TCP checksum for revised packet */
484 changes in the TCP stream. This should not be too difficult given
H A Dalias_skinny.c83 .proto = TCP,
125 * protocol. Skinny typically uses TCP port 2000 to set up calls between
132 * the TCP port over which it will communicate.
H A Dalias_smedia.c73 protocols. It performs special processing for RSTP sessions under TCP.
91 into a single TCP packet. This is typically the case, but exceptions
98 machine is totally unaware of the modification to the TCP stream.
167 .proto = TCP|UDP,
250 /* Calculate data length of TCP packet */
451 /* Compute TCP checksum for revised packet */
/freebsd-12-stable/sys/dev/ice/
H A Dice_lan_tx_rx.h1204 ICE_PTT(26, IP, IPV4, NOF, NONE, NONE, NOF, TCP, PAY4),
1213 ICE_PTT(33, IP, IPV4, NOF, IP_IP, IPV4, NOF, TCP, PAY4),
1222 ICE_PTT(40, IP, IPV4, NOF, IP_IP, IPV6, NOF, TCP, PAY4),
1234 ICE_PTT(48, IP, IPV4, NOF, IP_GRENAT, IPV4, NOF, TCP, PAY4),
1243 ICE_PTT(55, IP, IPV4, NOF, IP_GRENAT, IPV6, NOF, TCP, PAY4),
1255 ICE_PTT(63, IP, IPV4, NOF, IP_GRENAT_MAC, IPV4, NOF, TCP, PAY4),
1264 ICE_PTT(70, IP, IPV4, NOF, IP_GRENAT_MAC, IPV6, NOF, TCP, PAY4),
1276 ICE_PTT(78, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV4, NOF, TCP, PAY4),
1285 ICE_PTT(85, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV6, NOF, TCP, PAY4),
1294 ICE_PTT(92, IP, IPV6, NOF, NONE, NONE, NOF, TCP, PAY
[all...]
/freebsd-12-stable/tests/sys/netpfil/common/
H A Dpft_ping.py184 tcp = packet.getlayer(sp.TCP)
196 # Verify TCP checksum
201 new_chksum = newpacket[sp.TCP].chksum
203 print("Expected TCP checksum %x but found %x\n" % (new_chksum, chksum))
216 tcp = sp.TCP(dport=666, flags='S', options=opts)
242 # TCP options
244 help='Send a TCP SYN packet')
246 help='Include unaligned TCP options')
/freebsd-12-stable/share/examples/ipfw/
H A Dchange_rules.sh128 The TCP/IP connections might be broken during the change. If so, restore
/freebsd-12-stable/tests/sys/netinet6/
H A Dexthdr.py85 tcp = packet.getlayer(sp.TCP)
88 # Is TCP RST?
238 # Try for at least UDP and TCP upper layer payloads.
245 tcp = sp.TCP(dport=4567, sport=7654)
/freebsd-12-stable/share/dtrace/
H A Dtcpconn29 * The tcpconn D script shows histograms of the source of TCP connections
H A Dtcpdebug32 * A TCP debug statement shows a connection's
H A Dtcpstate29 * The tcpstate D script shows TCP sockets transitioning between states.
H A Dtcptrack29 * The tcptrack D script shows various information about TCP
/freebsd-12-stable/sys/netpfil/ipfw/
H A Dip_fw2.c250 #define TCP(p) ((struct tcphdr *)(p)) macro
347 * Parse TCP options. The logic copied from tcp_dooptions().
617 * Generate a TCP packet, containing either a RST or a keepalive.
1126 * Check to see if the UDP or TCP stack supplied us with
1408 * valid for TCP and UDP packets.
1509 dst_port = TCP(ulp)->th_dport;
1510 src_port = TCP(ulp)->th_sport;
1512 args->f_id._flags = TCP(ulp)->th_flags;
1694 dst_port = TCP(ulp)->th_dport;
1695 src_port = TCP(ul
[all...]
H A Dip_fw_log.c79 #define TCP(p) ((struct tcphdr *)(p)) macro
330 len = snprintf(SNPARGS(proto, 0), "TCP %s", src);
/freebsd-12-stable/sys/netpfil/ipfw/nat64/
H A Dnat64_translate.h80 #define TCP(p) ((struct tcphdr *)(p)) macro
H A Dnat64_translate.c1121 tcp = TCP(eip6 + 1);
1298 csum = &TCP(mtodo(m, hlen))->th_sum;
1300 struct tcphdr *tcp = TCP(mtodo(m, hlen));
1674 csum = &TCP(mtodo(m, hlen))->th_sum;
1676 struct tcphdr *tcp = TCP(mtodo(m, hlen));
/freebsd-12-stable/crypto/heimdal/tools/
H A Dkdc-log-analyze.pl179 print "\tStrange TCP data clients: ", int(keys %strange_tcp_data),"\n";
183 print "\tTimeout waiting on TCP requests: ", $tcp_conn_timeout,"\n";
185 print "\tTop ten TCP timeout request clients\n";
409 } elsif (/TCP data of strange type from IPv[46]:([0-9\.:a-fA-F]+)/) {
421 } elsif (/TCP-connection from IPv[46]:([0-9\.:a-fA-F]+) expired after [0-9]+ bytes/) {
/freebsd-12-stable/crypto/openssh/contrib/suse/
H A Dopenssh.spec55 arbitrary TCP/IP ports can also be forwarded over the secure channel.
69 arbitrary TCP/IP ports can also be forwarded over the secure channel.
100 - Added flag to configure daemon with TCP Wrappers support
/freebsd-12-stable/sys/dev/ixl/
H A Di40e_common.c667 I40E_PTT(26, IP, IPV4, NOF, NONE, NONE, NOF, TCP, PAY4),
676 I40E_PTT(33, IP, IPV4, NOF, IP_IP, IPV4, NOF, TCP, PAY4),
685 I40E_PTT(40, IP, IPV4, NOF, IP_IP, IPV6, NOF, TCP, PAY4),
697 I40E_PTT(48, IP, IPV4, NOF, IP_GRENAT, IPV4, NOF, TCP, PAY4),
706 I40E_PTT(55, IP, IPV4, NOF, IP_GRENAT, IPV6, NOF, TCP, PAY4),
718 I40E_PTT(63, IP, IPV4, NOF, IP_GRENAT_MAC, IPV4, NOF, TCP, PAY4),
727 I40E_PTT(70, IP, IPV4, NOF, IP_GRENAT_MAC, IPV6, NOF, TCP, PAY4),
739 I40E_PTT(78, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV4, NOF, TCP, PAY4),
748 I40E_PTT(85, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV6, NOF, TCP, PAY4),
757 I40E_PTT(92, IP, IPV6, NOF, NONE, NONE, NOF, TCP, PAY
[all...]

Completed in 304 milliseconds

12