HomeSort by: relevance | last modified time | path
    Searched refs:tcp (Results 1 - 25 of 557) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/sbin/mount_portal/examples/
tcp.1.conf 1 # $NetBSD: tcp.1.conf,v 1.2 2017/05/09 23:26:49 kamil Exp $
3 tcp/ tcp tcp/
  /src/sbin/mount_portal/
portal.conf 4 tcp/ tcp tcp/
  /src/crypto/external/bsd/heimdal/dist/etc/
services.append 7 kerberos 88/tcp kerberos-sec # Kerberos v5 TCP
9 kpasswd 464/tcp # password changing
10 klogin 543/tcp # Kerberos authenticated rlogin
11 kshell 544/tcp krcmd # and remote shell
12 ekshell 545/tcp # Kerberos encrypted remote shell -kfall
13 ekshell2 2106/tcp # What U of Colorado @ Boulder uses?
15 kerberos-adm 749/tcp # v5 kadmin
17 kerberos-iv 750/tcp kdc # Kerberos authentication--tcp
    [all...]
  /src/external/bsd/libpcap/dist/rpcapd/
rpcapd.inetd.conf 1 2002 stream tcp nowait root /usr/local/sbin/rpcapd rpcapd -i
rpcapd.xinetd.conf 3 protocol = tcp
  /src/sys/arch/alpha/pci/
ttwoga_dma.c 84 #define TTWOGA_TLB_INVALIDATE(tcp) \
89 temp = T2GA((tcp), T2_IOCSR); \
90 T2GA((tcp), T2_IOCSR) = temp | IOCSR_FTLB; \
93 T2GA((tcp), T2_IOCSR) = temp; \
99 ttwoga_dma_init(struct ttwoga_config *tcp)
106 t = &tcp->tc_dmat_direct;
107 t->_cookie = tcp;
132 t = &tcp->tc_dmat_sgmap;
133 t->_cookie = tcp;
138 t->_sgmap = &tcp->tc_sgmap
242 struct ttwoga_config *tcp = t->_cookie; local
276 struct ttwoga_config *tcp = t->_cookie; local
294 struct ttwoga_config *tcp = t->_cookie; local
311 struct ttwoga_config *tcp = t->_cookie; local
328 struct ttwoga_config *tcp = t->_cookie; local
345 struct ttwoga_config *tcp = t->_cookie; local
    [all...]
ttwoga.c 168 struct ttwoga_config *tcp; local
173 tcp = &ttwoga_configuration[hose];
174 tcp->tc_hose = hose;
176 tcp->tc_sysmap = &ttwoga_sysmap[hose];
186 tcp->tc_io_bus_start = (T2GA(tcp, T2_HAE0_2) & HAE0_2_PUA2) << 23;
187 tcp->tc_d_mem_bus_start = (T2GA(tcp, T2_HAE0_4) & HAE0_4_PUA1) << 30;
188 tcp->tc_s_mem_bus_start = (T2GA(tcp, T2_HAE0_1) & HAE0_1_PUA1) << 27
221 struct ttwoga_config *tcp; local
    [all...]
pci_2100_a500.c 190 struct ttwoga_config *tcp = core; local
208 pc->pc_vecbase = 0x800 + ((64 * 16) * tcp->tc_hose);
219 tcp->tc_hose == 0 ? dec_2100_a500_intr_deftype[i]
239 if (tcp->tc_rev < TRN_T3 && tcp->tc_hose == 0) {
241 tcp->tc_enable_intr = dec_2100_a500_pic_enable_intr;
242 tcp->tc_setlevel = dec_2100_a500_pic_setlevel;
243 tcp->tc_eoi = dec_2100_a500_pic_eoi;
244 dec_2100_a500_pic_init_intr(tcp);
247 tcp->tc_enable_intr = dec_2100_a500_icic_enable_intr
435 struct ttwoga_config *tcp = pc->pc_intr_v; local
470 struct ttwoga_config *tcp = pc->pc_intr_v; local
538 struct ttwoga_config *tcp = v; local
552 struct ttwoga_config *tcp = v; local
608 struct ttwoga_config *tcp = v; local
665 struct ttwoga_config *tcp = arg; local
    [all...]
  /src/crypto/dist/ipsec-tools/src/setkey/
sample-policy02.cf 7 spdadd ::1 ::1[9999] tcp
12 spdadd ::1 ::1[9998] tcp
15 spdadd ::1[9998] ::1 tcp
18 spdadd ::1[9998] ::1 tcp
23 spdadd ::1 ::1[9997] tcp
28 spdadd ::1 ::1[9996] tcp
33 spdadd ::1 ::1[9995] tcp
  /src/external/bsd/blocklist/etc/
ipf.conf 25 block in proto tcp/udp from any to any head blocklistd
32 # echo 'block return-rst in log quick proto tcp from 118.136.0.0/15 to any flags S/SAFR group attackers' >> /etc/ipf.conf
44 block in proto tcp/udp from any to any head attackers
  /src/external/bsd/ipf/dist/perl/
logfilter.pl 29 %tcp = ();
45 if ($proto =~ m/^tcp$/) { $tcp{$identifier} = $filename; last SWITCH; };
72 # to a TCP or UDP connection (eg Port Unreachable).
85 # TCP Protocol
88 # known ports in the tcp hash. For the first match, place this
89 # line in the file specified by the tcp hash. Ignore one of the
96 $filename = $tcp{$sport} if (defined($tcp{$sport}));
97 $filename = $tcp{$dport} if (defined($tcp{$dport}))
    [all...]
  /src/external/bsd/ipf/dist/lib/
printpacket.c 24 tcphdr_t *tcp; local
74 tcp = (struct tcphdr *)((char *)ip + (IP_HL(ip) << 2));
82 PRINTF(",%d", ntohs(tcp->th_sport));
87 PRINTF(",%d", ntohs(tcp->th_dport));
88 if ((ip->ip_p == IPPROTO_TCP) && (tcp->th_flags != 0)) {
90 if (tcp->th_flags & TH_FIN)
92 if (tcp->th_flags & TH_SYN)
94 if (tcp->th_flags & TH_RST)
96 if (tcp->th_flags & TH_PUSH)
98 if (tcp->th_flags & TH_ACK
    [all...]
ipft_tx.c 168 tcphdr_t th, *tcp = &th; local
175 bzero((char *)ip, MAX(sizeof(*tcp), sizeof(*ic)) + sizeof(*ip));
176 bzero((char *)tcp, sizeof(*tcp));
217 if (!strcasecmp(*cpp, "tcp") || !strcasecmp(*cpp, "udp") ||
222 tx_proto = "tcp";
246 fprintf(stderr, "tcp/udp with no source port\n");
250 tcp->th_sport = htons(tx_portnum(last));
252 tcp->th_win = htons(4096);
253 TCP_OFF_A(tcp, sizeof(*tcp) >> 2)
346 tcphdr_t th, *tcp = &th; local
    [all...]
  /src/usr.sbin/faithd/
Makefile 6 SRCS= faithd.c tcp.c ftp.c prefix.c
  /src/external/bsd/ipf/dist/rules/
BASIC.NAT 13 map ppp0 w.x.y.z/24 -> a.b.c.d/32 proxy port ftp ftp/tcp
15 # For normal TCP/UDP and other IP protocols
17 map ppp0 w.x.y.z/24 -> a.b.c.d/32 portmap tcp/udp 40000:60000
22 #map ppp0 w.x.y.z/24 -> 0/32 portmap tcp/udp 40000:60000
28 #map ppp0 w.x.y.z/24 -> a.b.c.d/24 portmap tcp/udp 40000:60000
33 #map ppp0 w.x.y.v/32 -> a.b.c.E/32 portmap tcp/udp 40000:60000
35 #map ppp0 w.x.y.u/32 -> a.b.c.F/32 portmap tcp/udp 40000:60000
37 #map ppp0 w.x.y.t/32 -> a.b.c.G/32 portmap tcp/udp 40000:60000
39 #map ppp0 w.x.y.s/32 -> a.b.c.H/32 portmap tcp/udp 40000:60000
41 #map ppp0 w.x.y.r/32 -> a.b.c.I/32 portmap tcp/udp 40000:6000
    [all...]
tcpstate 2 # Only allow TCP packets in/out of le0 if there is an outgoing connection setup
5 pass out quick on le0 proto tcp from any to any flags S/SAFR keep state
6 block out on le0 proto tcp all
7 block in on le0 proto tcp all
  /src/external/bsd/unbound/dist/testdata/fwd_udp_with_tcp_upstream.tdir/
fwd_udp_with_tcp_upstream.conf 13 name: "tcp.example.com"
15 forward-tcp-upstream: "yes"
19 forward-tcp-upstream: "no"
  /src/external/bsd/unbound/dist/testdata/stub_udp_with_tcp_upstream.tdir/
stub_udp_with_tcp_upstream.conf 13 name: "tcp.example.com"
15 stub-tcp-upstream: "yes"
19 stub-tcp-upstream: "no
  /src/external/bsd/nsd/lib/libxfrd/
Makefile 14 xfrd-tcp.c
16 COPTS.xfrd-tcp.c+=-Wno-stack-protector
  /src/external/mpl/bind/dist/bin/tests/system/names/
tests_names.py 25 res_enabled = isctest.query.tcp(msg, ip="10.53.0.1", source="10.53.0.1")
27 res_disabled = isctest.query.tcp(msg, ip="10.53.0.1", source="10.53.0.2")
  /src/external/mpl/bind/dist/bin/tests/system/transport-acl/
tests.sh 56 run_dig_expect_axfr_failure "$testing XFR via TCP (failure expected)" -p "${PORT}" +tcp -b 10.53.0.10 @10.53.0.1 axfr example0
58 # 1. Test allow-transfer port X, transfer works with TCP and TLS on port X but not port Y.
60 run_dig_expect_axfr_success "$testing for XFR via TCP" -p "${EXTRAPORT1}" +tcp -b 10.53.0.10 @10.53.0.1 axfr example1
64 run_dig_expect_axfr_failure "$testing for XFR via TCP (failure expected)" -p "${EXTRAPORT2}" +tcp -b 10.53.0.10 @10.53.0.1 axfr example1
68 # 2. Test allow-transfer transport tcp, transfer works with TCP on any port but not TLS.
70 run_dig_expect_axfr_success "$testing for XFR via TCP" -p "${EXTRAPORT1}" +tcp -b 10.53.0.10 @10.53.0.3 axfr example
    [all...]
  /src/external/mit/libuv/dist/test/
test-shutdown-simultaneous.c 27 static uv_tcp_t tcp; variable
53 ASSERT_PTR_EQ((uv_tcp_t*)t, &tcp);
68 uv_shutdown(&shutdown_req, (uv_stream_t*) &tcp, shutdown_cb);
86 ASSERT_OK(uv_read_start((uv_stream_t*)&tcp, alloc_cb, read_cb));
89 ASSERT_EQ(UV_EALREADY, uv_read_start((uv_stream_t*)&tcp, alloc_cb, read_cb));
91 ASSERT_EQ(UV_EINVAL, uv_read_start((uv_stream_t*)&tcp, NULL, read_cb));
92 ASSERT_EQ(UV_EINVAL, uv_read_start((uv_stream_t*)&tcp, alloc_cb, NULL));
98 ASSERT_EQ(qbuf.len, uv_try_write((uv_stream_t*) &tcp, &qbuf, 1));
117 r = uv_tcp_init(uv_default_loop(), &tcp);
121 &tcp,
    [all...]
test-tcp-rst.c 25 static uv_tcp_t tcp; variable
34 ASSERT_PTR_EQ(handle, (uv_handle_t*) &tcp);
47 ASSERT_PTR_EQ((uv_tcp_t*) t, &tcp);
65 ASSERT_OK(uv_read_start((uv_stream_t*) &tcp, alloc_cb, read_cb));
68 ASSERT_EQ(qbuf.len, uv_try_write((uv_stream_t*) &tcp, &qbuf, 1));
75 * This test has a client which connects to the echo_server and receives TCP
76 * RST. Test checks that uv_guess_handle still works on a reset TCP handle.
90 r = uv_tcp_init(uv_default_loop(), &tcp);
94 &tcp,
test-socket-buffer-size.c 30 static uv_tcp_t tcp; variable
61 ASSERT_OK(uv_tcp_init(uv_default_loop(), &tcp));
62 ASSERT_OK(uv_tcp_bind(&tcp, (struct sockaddr*) &addr, 0));
63 check_buffer_size((uv_handle_t*) &tcp);
64 uv_close((uv_handle_t*) &tcp, close_cb);
  /src/external/bsd/nsd/dist/
xfrd-tcp.c 2 * xfrd-tcp.c - XFR (transfer) Daemon TCP system source file. Manages tcp conn.
18 #include "xfrd-tcp.h"
640 /* lookup existing tcp transfer to the master with highest unused */
642 /* exact match, strange, fully unused tcp cannot be open */
659 /* remove zone from tcp waiting list */
672 /* remove zone from tcp pipe write-wait list */
698 /* remove zone from tcp pipe ID map */
713 /* stop the tcp pipe (and all its zones need to retry) *
1100 struct xfrd_tcp* tcp = tp->tcp_w; local
1300 struct xfrd_tcp* tcp = tp->tcp_w; local
1580 struct xfrd_tcp* tcp = tp->tcp_r; local
    [all...]

Completed in 26 milliseconds

1 2 3 4 5 6 7 8 91011>>