| /src/sys/rump/net/lib/libnetinet/ |
| Makefile | 5 COMMENT=IPv4 incl. TCP and UDP (PF_INET)
|
| /src/sys/rump/net/lib/libnetinet6/ |
| Makefile | 5 COMMENT=IPv6 incl. TCP and UDP (PF_INET6)
|
| /src/usr.bin/systat/ |
| systat.h | 57 #define TCP 0x1
|
| netcmds.c | 130 selectproto("tcp"); 160 protos == TCP ? "tcp" : protos == UDP ? "udp" : 0); 184 protos = TCP|UDP; 185 else if (streq(proto, "tcp")) 186 protos = TCP; 195 if ((protos & TCP) == 0) 197 addstr("tcp "); 256 protos == (TCP|UDP) ? 0 : protos == TCP ? "tcp" : "udp") [all...] |
| netstat.c | 63 #include <netinet/tcp.h> 101 short ni_state; /* tcp state */ 182 protos = TCP|UDP; 196 if ((protos & (TCP | UDP)) == 0) { 200 if ((protos & TCP) && namelist[X_TCBTABLE].n_type) 205 if ((protos & TCP) && namelist[X_TCBTABLE].n_type) 250 enter(inp, &sockb, tcpcb.t_state, "tcp"); 295 enter6(inp, &sockb, tcpcb.t_state, "tcp"); 513 if (streq(p->ni_proto, "tcp")) {
|
| /src/external/mpl/bind/dist/bin/tests/system/tcp/ |
| tests.sh | 31 echo_i "initializing TCP statistics ($n)" 37 ntcp10="$(grep "TCP requests received" ns1/named.stats.test$n | tail -1 | awk '{print $1}')" 38 ntcp20="$(grep "TCP requests received" ns2/named.stats.test$n | tail -1 | awk '{print $1}')" 43 echo_i "checking TCP request statistics (resolver) ($n)" 51 ntcp11="$(grep "TCP requests received" ns1/named.stats.test$n | tail -1 | awk '{print $1}')" 52 ntcp21="$(grep "TCP requests received" ns2/named.stats.test$n | tail -1 | awk '{print $1}')" 59 echo_i "checking TCP request statistics (forwarder) ($n)" 67 ntcp12="$(grep "TCP requests received" ns1/named.stats.test$n | tail -1 | awk '{print $1}')" 68 ntcp22="$(grep "TCP requests received" ns2/named.stats.test$n | tail -1 | awk '{print $1}')" 74 # -------- TCP high-water tests --------- [all...] |
| /src/external/mit/libuv/dist/test/ |
| benchmark-pump.c | 106 type == TCP ? "tcp" : "pipe", 112 if (type == TCP) 134 type == TCP ? "tcp" : "pipe", 235 if (type == TCP) 246 uv_tcp_t* tcp; local 252 if (type == TCP) { 253 tcp = &tcp_write_handles[max_connect_socket++]; 255 r = uv_tcp_init(loop, tcp); [all...] |
| echo-server.c | 179 case TCP: 258 serverType = TCP; 292 serverType = TCP;
|
| task.h | 82 TCP = 0,
|
| /src/external/bsd/nsd/dist/simdzone/src/generic/ |
| wks.h | 14 // for TCP and UDP. 17 // may be in place for TCP and UDP). Note that BIND passes the protocol to 18 // getservbyname for TCP and UDP only, NULL otherwise, which means any 68 // subset of mnemonics (TCP and UDP) as well as numeric values and add 72 # define TCP (0x0000000000706374llu) 75 # define TCP (0x7463700000000000llu) 102 if (key == TCP) 217 (void)protocol; // all supported services map to tcp and udp
|
| /src/external/mpl/bind/dist/bin/tests/system/resolver/ans8/ |
| ans.py | 68 return qctx.protocol == DnsProtocol.TCP and super().match(qctx) 73 return qctx.protocol == DnsProtocol.TCP 124 # Install TCP handlers first so they take precedence
|
| /src/tests/usr.sbin/inetd/ |
| t_inetd.c | 51 #define TCP 6 67 "uses UDP/TCP ports 5432-5439 with localhost."); 197 /* Run localhost tcp echo, return true if successful, false if timeout/disconnect */ 203 int tcp; local 206 tcp = create_socket("127.0.0.1", port, SOCK_STREAM, TCP, 1, &remote); 207 CHECK_ERROR(connect(tcp, (const struct sockaddr *)&remote, 209 CHECK_ERROR(send(tcp, buffer, sizeof(buffer), 0)); 210 count = recv(tcp, buffer, sizeof(buffer), 0);
|
| /src/usr.sbin/npf/npfctl/ |
| npf_scan.l | 161 tcp return TCP;
|
| npf_parse.y | 173 %token TCP 654 : TCP tcp_flags_and_mask
|
| /src/external/mpl/bind/dist/bin/tests/ |
| test_server.c | 33 typedef enum { UDP, TCP, DOT, HTTPS, HTTP } protocol_t; 35 static const char *protocols[] = { "udp", "tcp", "dot", "https", "http-plain" }; 252 case TCP:
|
| test_client.c | 42 TCP, 50 static const char *protocols[] = { "udp", "tcp", 382 case TCP:
|
| /src/crypto/external/bsd/heimdal/dist/tools/ |
| kdc-log-analyze.pl | 179 print "\tStrange TCP data clients: ", int(keys %strange_tcp_data),"\n"; 183 print "\tTimeout waiting on TCP requests: ", $tcp_conn_timeout,"\n"; 185 print "\tTop ten TCP timeout request clients\n"; 409 } elsif (/TCP data of strange type from IPv[46]:([0-9\.:a-fA-F]+)/) { 421 } elsif (/TCP-connection from IPv[46]:([0-9\.:a-fA-F]+) expired after [0-9]+ bytes/) {
|
| /src/external/bsd/ipf/dist/ |
| HISTORY | 130 3529486 tcp checksum wrong for ipv6 321 supports window scaling if seen at TCP session setup 336 don't add TCP state if it is an RST packet and (attempt) to send out 685 update addresses used in NAT mappings for 0/32 rules for any protocol but TCP 764 fixed NAT handling of non-TCP/UDP packets, esp. for ICMP errors returned. 766 Solaris recusive mutex on icmp-error/tcp-reset - requires rwlock's rather 817 don't allow window to become 0 in tcp state code 831 log closing state of TCP connection in "keep state" 912 fix tcp checksum data overrun, sgi #define changes, 922 ECONNRESET for TCP [all...] |
| /src/external/gpl3/gcc.old/dist/libphobos/src/std/ |
| socket.d | 78 import core.sys.posix.netinet.tcp; 361 TCP = IPPROTO_TCP, /// Transmission Control Protocol 376 * writeln("About protocol TCP:"); 377 * if (proto.getProtocolByType(ProtocolType.TCP)) 456 assert(proto.getProtocolByType(ProtocolType.TCP)); 457 //writeln("About protocol TCP:"); 463 assert(proto.name == "tcp"); 464 assert(proto.aliases.length == 1 && proto.aliases[0] == "TCP"); 476 * if (serv.getServiceByName("epmap", "tcp")) 558 if (serv.getServiceByName("epmap", "tcp")) [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/cookie/ |
| cookie_ans.py | 130 return qctx.qtype == dns.rdatatype.A and qctx.protocol == DnsProtocol.TCP
|
| /src/external/mpl/bind/dist/bin/tests/system/rpz/ |
| tests.sh | 92 if test "$1" = TCP; then 349 expr "$1" : 'TCP ' >/dev/null && tcp=1 || tcp=0 350 digarg=${1#TCP } 359 grep -q 'Truncated, retrying in TCP' $DIGNM && trunc=1 || trunc=0 360 if [ "$tcp" -ne "$trunc" ]; then 427 # $1=optional "TCP" 534 nochange TCP a3-9.tld2 # 33 tcp-onl [all...] |
| /src/external/bsd/libpcap/dist/ |
| grammar.y.in | 377 %token ARP RARP IP SCTP TCP UDP ICMP IGMP IGRP PIM VRRP CARP 636 | TCP { $$ = Q_TCP; }
|
| scanner.l | 268 tcp return TCP; 477 tcp-fin { yylval->h = 0x01; return NUM; } 478 tcp-syn { yylval->h = 0x02; return NUM; } 479 tcp-rst { yylval->h = 0x04; return NUM; } 480 tcp-push { yylval->h = 0x08; return NUM; } 481 tcp-ack { yylval->h = 0x10; return NUM; } 482 tcp-urg { yylval->h = 0x20; return NUM; } 483 tcp-ece { yylval->h = 0x40; return NUM; } 484 tcp-cwr { yylval->h = 0x80; return NUM; [all...] |
| /src/external/mpl/bind/dist/lib/ns/ |
| query.c | 114 /*% Is TCP? */ 115 #define TCP(c) (((c)->attributes & NS_CLIENTATTR_TCP) != 0) 589 if (TCP(client)) { 2804 if (!TCP(client)) { 5809 if (!TCP(qctx->client) && 5990 /* Track TCP vs UDP stats per zone */ 5991 if (TCP(qctx->client)) { 6609 if (!TCP(client)) { 7236 TCP(qctx->client), qctx->client->message->rdclass, 7364 !TCP(qctx->client)) & [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/isctest/ |
| asyncserver.py | 91 A generic asynchronous server which may handle UDP and/or TCP traffic. 231 TCP = enum.auto() 411 Action which makes the server close the connection (TCP only). 420 logging.info("Waiting %.1fs before closing TCP connection", self.delay) 427 Base class for TCP connection handlers. 429 An installed connection handler is called when a new TCP connection is 508 # a TCP transport (which in practice means removing the client socket 513 # by keeping a reference to each incoming TCP connection to protect its 515 # prevents AsyncDnsServer from closing any of the ignored TCP 547 "Waiting %.1fs before closing TCP connection from %s", self.delay, pee [all...] |