| /src/sbin/mount_portal/examples/ |
| tcp.1.conf | 1 # $NetBSD: tcp.1.conf,v 1.2 2017/05/09 23:26:49 kamil Exp $ 3 tcp/ tcp tcp/
|
| /src/sbin/mount_portal/ |
| portal.conf | 4 tcp/ tcp tcp/
|
| /src/crypto/external/bsd/heimdal/dist/etc/ |
| services.append | 7 kerberos 88/tcp kerberos-sec # Kerberos v5 TCP 9 kpasswd 464/tcp # password changing 10 klogin 543/tcp # Kerberos authenticated rlogin 11 kshell 544/tcp krcmd # and remote shell 12 ekshell 545/tcp # Kerberos encrypted remote shell -kfall 13 ekshell2 2106/tcp # What U of Colorado @ Boulder uses? 15 kerberos-adm 749/tcp # v5 kadmin 17 kerberos-iv 750/tcp kdc # Kerberos authentication--tcp [all...] |
| /src/external/bsd/libpcap/dist/rpcapd/ |
| rpcapd.inetd.conf | 1 2002 stream tcp nowait root /usr/local/sbin/rpcapd rpcapd -i
|
| rpcapd.xinetd.conf | 3 protocol = tcp
|
| /src/sys/arch/alpha/pci/ |
| ttwoga_dma.c | 84 #define TTWOGA_TLB_INVALIDATE(tcp) \ 89 temp = T2GA((tcp), T2_IOCSR); \ 90 T2GA((tcp), T2_IOCSR) = temp | IOCSR_FTLB; \ 93 T2GA((tcp), T2_IOCSR) = temp; \ 99 ttwoga_dma_init(struct ttwoga_config *tcp) 106 t = &tcp->tc_dmat_direct; 107 t->_cookie = tcp; 132 t = &tcp->tc_dmat_sgmap; 133 t->_cookie = tcp; 138 t->_sgmap = &tcp->tc_sgmap 242 struct ttwoga_config *tcp = t->_cookie; local 276 struct ttwoga_config *tcp = t->_cookie; local 294 struct ttwoga_config *tcp = t->_cookie; local 311 struct ttwoga_config *tcp = t->_cookie; local 328 struct ttwoga_config *tcp = t->_cookie; local 345 struct ttwoga_config *tcp = t->_cookie; local [all...] |
| ttwoga.c | 168 struct ttwoga_config *tcp; local 173 tcp = &ttwoga_configuration[hose]; 174 tcp->tc_hose = hose; 176 tcp->tc_sysmap = &ttwoga_sysmap[hose]; 186 tcp->tc_io_bus_start = (T2GA(tcp, T2_HAE0_2) & HAE0_2_PUA2) << 23; 187 tcp->tc_d_mem_bus_start = (T2GA(tcp, T2_HAE0_4) & HAE0_4_PUA1) << 30; 188 tcp->tc_s_mem_bus_start = (T2GA(tcp, T2_HAE0_1) & HAE0_1_PUA1) << 27 221 struct ttwoga_config *tcp; local [all...] |
| pci_2100_a500.c | 190 struct ttwoga_config *tcp = core; local 208 pc->pc_vecbase = 0x800 + ((64 * 16) * tcp->tc_hose); 219 tcp->tc_hose == 0 ? dec_2100_a500_intr_deftype[i] 239 if (tcp->tc_rev < TRN_T3 && tcp->tc_hose == 0) { 241 tcp->tc_enable_intr = dec_2100_a500_pic_enable_intr; 242 tcp->tc_setlevel = dec_2100_a500_pic_setlevel; 243 tcp->tc_eoi = dec_2100_a500_pic_eoi; 244 dec_2100_a500_pic_init_intr(tcp); 247 tcp->tc_enable_intr = dec_2100_a500_icic_enable_intr 435 struct ttwoga_config *tcp = pc->pc_intr_v; local 470 struct ttwoga_config *tcp = pc->pc_intr_v; local 538 struct ttwoga_config *tcp = v; local 552 struct ttwoga_config *tcp = v; local 608 struct ttwoga_config *tcp = v; local 665 struct ttwoga_config *tcp = arg; local [all...] |
| /src/crypto/dist/ipsec-tools/src/setkey/ |
| sample-policy02.cf | 7 spdadd ::1 ::1[9999] tcp 12 spdadd ::1 ::1[9998] tcp 15 spdadd ::1[9998] ::1 tcp 18 spdadd ::1[9998] ::1 tcp 23 spdadd ::1 ::1[9997] tcp 28 spdadd ::1 ::1[9996] tcp 33 spdadd ::1 ::1[9995] tcp
|
| /src/external/bsd/blocklist/etc/ |
| ipf.conf | 25 block in proto tcp/udp from any to any head blocklistd 32 # echo 'block return-rst in log quick proto tcp from 118.136.0.0/15 to any flags S/SAFR group attackers' >> /etc/ipf.conf 44 block in proto tcp/udp from any to any head attackers
|
| /src/external/bsd/ipf/dist/perl/ |
| logfilter.pl | 29 %tcp = (); 45 if ($proto =~ m/^tcp$/) { $tcp{$identifier} = $filename; last SWITCH; }; 72 # to a TCP or UDP connection (eg Port Unreachable). 85 # TCP Protocol 88 # known ports in the tcp hash. For the first match, place this 89 # line in the file specified by the tcp hash. Ignore one of the 96 $filename = $tcp{$sport} if (defined($tcp{$sport})); 97 $filename = $tcp{$dport} if (defined($tcp{$dport})) [all...] |
| /src/external/bsd/ipf/dist/lib/ |
| printpacket.c | 24 tcphdr_t *tcp; local 74 tcp = (struct tcphdr *)((char *)ip + (IP_HL(ip) << 2)); 82 PRINTF(",%d", ntohs(tcp->th_sport)); 87 PRINTF(",%d", ntohs(tcp->th_dport)); 88 if ((ip->ip_p == IPPROTO_TCP) && (tcp->th_flags != 0)) { 90 if (tcp->th_flags & TH_FIN) 92 if (tcp->th_flags & TH_SYN) 94 if (tcp->th_flags & TH_RST) 96 if (tcp->th_flags & TH_PUSH) 98 if (tcp->th_flags & TH_ACK [all...] |
| ipft_tx.c | 168 tcphdr_t th, *tcp = &th; local 175 bzero((char *)ip, MAX(sizeof(*tcp), sizeof(*ic)) + sizeof(*ip)); 176 bzero((char *)tcp, sizeof(*tcp)); 217 if (!strcasecmp(*cpp, "tcp") || !strcasecmp(*cpp, "udp") || 222 tx_proto = "tcp"; 246 fprintf(stderr, "tcp/udp with no source port\n"); 250 tcp->th_sport = htons(tx_portnum(last)); 252 tcp->th_win = htons(4096); 253 TCP_OFF_A(tcp, sizeof(*tcp) >> 2) 346 tcphdr_t th, *tcp = &th; local [all...] |
| /src/usr.sbin/faithd/ |
| Makefile | 6 SRCS= faithd.c tcp.c ftp.c prefix.c
|
| /src/external/bsd/ipf/dist/rules/ |
| BASIC.NAT | 13 map ppp0 w.x.y.z/24 -> a.b.c.d/32 proxy port ftp ftp/tcp 15 # For normal TCP/UDP and other IP protocols 17 map ppp0 w.x.y.z/24 -> a.b.c.d/32 portmap tcp/udp 40000:60000 22 #map ppp0 w.x.y.z/24 -> 0/32 portmap tcp/udp 40000:60000 28 #map ppp0 w.x.y.z/24 -> a.b.c.d/24 portmap tcp/udp 40000:60000 33 #map ppp0 w.x.y.v/32 -> a.b.c.E/32 portmap tcp/udp 40000:60000 35 #map ppp0 w.x.y.u/32 -> a.b.c.F/32 portmap tcp/udp 40000:60000 37 #map ppp0 w.x.y.t/32 -> a.b.c.G/32 portmap tcp/udp 40000:60000 39 #map ppp0 w.x.y.s/32 -> a.b.c.H/32 portmap tcp/udp 40000:60000 41 #map ppp0 w.x.y.r/32 -> a.b.c.I/32 portmap tcp/udp 40000:6000 [all...] |
| tcpstate | 2 # Only allow TCP packets in/out of le0 if there is an outgoing connection setup 5 pass out quick on le0 proto tcp from any to any flags S/SAFR keep state 6 block out on le0 proto tcp all 7 block in on le0 proto tcp all
|
| /src/external/bsd/unbound/dist/testdata/fwd_udp_with_tcp_upstream.tdir/ |
| fwd_udp_with_tcp_upstream.conf | 13 name: "tcp.example.com" 15 forward-tcp-upstream: "yes" 19 forward-tcp-upstream: "no"
|
| /src/external/bsd/unbound/dist/testdata/stub_udp_with_tcp_upstream.tdir/ |
| stub_udp_with_tcp_upstream.conf | 13 name: "tcp.example.com" 15 stub-tcp-upstream: "yes" 19 stub-tcp-upstream: "no
|
| /src/external/bsd/nsd/lib/libxfrd/ |
| Makefile | 14 xfrd-tcp.c 16 COPTS.xfrd-tcp.c+=-Wno-stack-protector
|
| /src/external/mpl/bind/dist/bin/tests/system/names/ |
| tests_names.py | 25 res_enabled = isctest.query.tcp(msg, ip="10.53.0.1", source="10.53.0.1") 27 res_disabled = isctest.query.tcp(msg, ip="10.53.0.1", source="10.53.0.2")
|
| /src/external/mpl/bind/dist/bin/tests/system/transport-acl/ |
| tests.sh | 56 run_dig_expect_axfr_failure "$testing XFR via TCP (failure expected)" -p "${PORT}" +tcp -b 10.53.0.10 @10.53.0.1 axfr example0 58 # 1. Test allow-transfer port X, transfer works with TCP and TLS on port X but not port Y. 60 run_dig_expect_axfr_success "$testing for XFR via TCP" -p "${EXTRAPORT1}" +tcp -b 10.53.0.10 @10.53.0.1 axfr example1 64 run_dig_expect_axfr_failure "$testing for XFR via TCP (failure expected)" -p "${EXTRAPORT2}" +tcp -b 10.53.0.10 @10.53.0.1 axfr example1 68 # 2. Test allow-transfer transport tcp, transfer works with TCP on any port but not TLS. 70 run_dig_expect_axfr_success "$testing for XFR via TCP" -p "${EXTRAPORT1}" +tcp -b 10.53.0.10 @10.53.0.3 axfr example [all...] |
| /src/external/mit/libuv/dist/test/ |
| test-shutdown-simultaneous.c | 27 static uv_tcp_t tcp; variable 53 ASSERT_PTR_EQ((uv_tcp_t*)t, &tcp); 68 uv_shutdown(&shutdown_req, (uv_stream_t*) &tcp, shutdown_cb); 86 ASSERT_OK(uv_read_start((uv_stream_t*)&tcp, alloc_cb, read_cb)); 89 ASSERT_EQ(UV_EALREADY, uv_read_start((uv_stream_t*)&tcp, alloc_cb, read_cb)); 91 ASSERT_EQ(UV_EINVAL, uv_read_start((uv_stream_t*)&tcp, NULL, read_cb)); 92 ASSERT_EQ(UV_EINVAL, uv_read_start((uv_stream_t*)&tcp, alloc_cb, NULL)); 98 ASSERT_EQ(qbuf.len, uv_try_write((uv_stream_t*) &tcp, &qbuf, 1)); 117 r = uv_tcp_init(uv_default_loop(), &tcp); 121 &tcp, [all...] |
| test-tcp-rst.c | 25 static uv_tcp_t tcp; variable 34 ASSERT_PTR_EQ(handle, (uv_handle_t*) &tcp); 47 ASSERT_PTR_EQ((uv_tcp_t*) t, &tcp); 65 ASSERT_OK(uv_read_start((uv_stream_t*) &tcp, alloc_cb, read_cb)); 68 ASSERT_EQ(qbuf.len, uv_try_write((uv_stream_t*) &tcp, &qbuf, 1)); 75 * This test has a client which connects to the echo_server and receives TCP 76 * RST. Test checks that uv_guess_handle still works on a reset TCP handle. 90 r = uv_tcp_init(uv_default_loop(), &tcp); 94 &tcp,
|
| test-socket-buffer-size.c | 30 static uv_tcp_t tcp; variable 61 ASSERT_OK(uv_tcp_init(uv_default_loop(), &tcp)); 62 ASSERT_OK(uv_tcp_bind(&tcp, (struct sockaddr*) &addr, 0)); 63 check_buffer_size((uv_handle_t*) &tcp); 64 uv_close((uv_handle_t*) &tcp, close_cb);
|
| /src/external/bsd/nsd/dist/ |
| xfrd-tcp.c | 2 * xfrd-tcp.c - XFR (transfer) Daemon TCP system source file. Manages tcp conn. 18 #include "xfrd-tcp.h" 640 /* lookup existing tcp transfer to the master with highest unused */ 642 /* exact match, strange, fully unused tcp cannot be open */ 659 /* remove zone from tcp waiting list */ 672 /* remove zone from tcp pipe write-wait list */ 698 /* remove zone from tcp pipe ID map */ 713 /* stop the tcp pipe (and all its zones need to retry) * 1100 struct xfrd_tcp* tcp = tp->tcp_w; local 1300 struct xfrd_tcp* tcp = tp->tcp_w; local 1580 struct xfrd_tcp* tcp = tp->tcp_r; local [all...] |