Home
last modified time | relevance | path

Searched refs:TCP (Results 1 – 25 of 251) sorted by relevance

1234567891011

/src/contrib/netbsd-tests/ipf/input/
H A Df132 # 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF,FO=0 SYN
7 # 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP MF ACK
12 # 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP FO=2 ACK
17 # 1.1.1.1,1024 -> 2.1.1.1,25 TTL=63 TCP DF MF FO=0 SYN
22 # 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF FO=0
27 # 1.1.1.1 -> 2.1.1.1 TTL=63 TCP DF FO=1 SYN
56 # 1.1.1.1,21 -> 2.1.1.1,54 TTL=63 TCP MF FO=0
76 # 2.1.1.1,25 -> 1.1.1.1,1014 TTL=63 TCP DF SYN-ACK
81 # 1.1.1.1,1024 -> 2.1.1.1,25 TTL=63 TCP DF ACK (OOW)
86 # 1.1.1.1,1024 -> 2.1.1.1,25 TTL=63 TCP DF ACK (out-of-order)
[all …]
H A Df171 # TCP 1.1.1.1,54076 -> 2.2.2.2,27 SYN
8 # TCP 2.2.2.2,27 -> 1.1.1.1,54076 ACK
15 # TCP 1.1.1.1,54076 -> 2.2.2.2,27 SYN
22 # TCP 2.2.2.2,27 -> 1.1.1.1,54076 SYN-ACK
28 # TCP 1.1.1.1,54076 -> 2.2.2.2,27 ACK
34 # TCP 2.2.2.2,27 -> 1.1.1.1,54076 ACK+data
H A Df121 # 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF SYN
6 # 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF ACK
11 # 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF MF FO=0 ACK
16 # 1.1.1.1,1025 -> 2.1.1.1,25 TTL=63 TCP DF FO=0
21 # 1.1.1.1 -> 2.1.1.1 TTL=63 TCP DF FO=1 ACK
H A Df211 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
3 # IP 4.4.4.4 2.2.2.2 TCP(20480,80)
10 # IP 3.3.3.3 -> 4.4.4.4 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80)) UNREACH
17 # IP 3.3.3.3 -> 4.4.4.4 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80)) REDIRECT
25 # IP 3.3.3.3 -> 5.5.5.5 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80)) UNREACH
H A Df221 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
3 # IP 4.4.4.4 2.2.2.2 TCP(20480,80)
10 # IP 3.3.3.3 -> 4.4.4.4 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80)) UNREACH
17 # IP 3.3.3.3 -> 4.4.4.4 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80)) REDIRECT
25 # IP 3.3.3.3 -> 5.5.5.5 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80)) UNREACH
H A Dni102 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
4 # IP 4.4.4.4 2.2.2.2 TCP(20480,80)
9 # IP 3.3.3.3 -> 4.4.4.4 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80))
16 # IP 3.3.3.3 -> 4.4.4.4 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80))
24 # IP 3.3.3.3 -> 4.4.4.4 ICMP (IP(4.4.4.4,6.6.6.6) TCP(20480,80))
/src/release/packages/ucl/
H A Dtcpd-all.ucl19 comment = "TCP Wrappers access control facility"
22 TCP Wrappers allows connections to local network services to be restricted
23 based on a user-defined ruleset. TCP Wrappers can also perform certain
26 Applications which wish to implement the TCP Wrappers functionality natively
28 but are started from the inetd(8) super-server, can also be run under TCP
31 This package also provides a periodic(8) script used to report TCP Wrappers
/src/share/examples/ipfilter/
H A Dexamples.txt9 [Image] TCP/UDP Ports
11 [Image] TCP Flags (established)
104 package, the threat is that the TCP flags field of the TCP packet may be in
171 Filtering by port number only works with the TCP and UDP IP protocols. When
190 # allow any TCP packets from the same subnet as foo is on through to host
234 TCP Flags (established)
236 Filtering on TCP flags is useful, but fraught with danger. I'd recommend
237 that before using TCP flags in your IP filtering, you become at least a
239 used. This package will compare the flags present in each TCP packet, if
240 asked, and match if those present in the TCP packet are the same as in the
[all …]
H A Drules.txt2 # block all incoming TCP packets on le0 from host "foo" to any destination.
9 # block all outgoing TCP packets on le0 from any host to port 23 of host bar.
72 # allow any TCP packets from the same subnet as foo is on through to host
94 # block all TCP packets with only the SYN flag set (this is the first
107 # do any meaningful comparison on. This actually only applies to TCP
113 # log all inbound TCP packets with the SYN flag (only) set
114 # (NOTE: if it were an inbound TCP packet with the SYN flag set and it
150 # block any inbound TCP packets with only the SYN flag set that are
163 # Log all short TCP packets to qe3, with "packetlog" as the intended
168 # Log all connection attempts for TCP
H A Dexample.147 # do any meaningful comparison on. This actually only applies to TCP
13 # log all inbound TCP packets with the SYN flag (only) set
14 # (NOTE: if it were an inbound TCP packet with the SYN flag set and it
50 # block any inbound TCP packets with only the SYN flag set that are
H A Dfirewall.218 # filtering rules won't be able to examine the whole UDP/TCP header,
43 # Block all incoming TCP traffic connections to known services,
50 # Allow incoming TCP connections to ports between 1024 and 5000, as
59 # Now allow various incoming TCP connections to particular hosts, TCP
/src/usr.bin/systat/
H A Dnetcmds.c143 protos == TCP ? "tcp" : protos == UDP ? "udp" : 0); in changeitems()
167 protos = TCP | UDP; in selectproto()
169 protos = TCP; in selectproto()
182 if ((protos&TCP) == 0) in showprotos()
242 protos == (TCP|UDP) ? 0 : protos == TCP ? "tcp" : "udp"); in showports()
/src/tools/tools/netrate/tcpp/
H A DREADME1 tcpp -- Parallel TCP Exercise Tool
6 This tool generates large numbers of TCP connections and stuffs lots of data
9 which in turn uses its own TCP port. The number of server processes must be
18 You will need to retune your TCP stack for high volume, see Configuration
26 -r <baseport> Non-default base TCP port, should match client
35 This selects server mode, four workers, and at most 1 million TCP connections
49 -r <baseport> Non-default base TCP port, should match server
58 use 100,000 TCP connections carrying 100K of data, up to 10,000 simultaneous
/src/tests/sys/netpfil/pf/
H A Dtcp.py48 / self.sp.TCP(sport=self.sport, dport=self.dport, flags="S", seq=self.seq)
56 t = r.getlayer(self.sp.TCP)
65 / self.sp.TCP(sport=self.sport, dport=self.dport, flags="A", ack=self.ack, seq=self.seq)
71 … / self.sp.TCP(sport=self.sport, dport=self.dport, ack=self.ack, seq=self.seq, flags="") \
140 tcp = p.getlayer(sp.TCP)
/src/sys/dev/iavf/
H A Diavf_common.c625 IAVF_PTT(26, IP, IPV4, NOF, NONE, NONE, NOF, TCP, PAY4),
634 IAVF_PTT(33, IP, IPV4, NOF, IP_IP, IPV4, NOF, TCP, PAY4),
643 IAVF_PTT(40, IP, IPV4, NOF, IP_IP, IPV6, NOF, TCP, PAY4),
655 IAVF_PTT(48, IP, IPV4, NOF, IP_GRENAT, IPV4, NOF, TCP, PAY4),
664 IAVF_PTT(55, IP, IPV4, NOF, IP_GRENAT, IPV6, NOF, TCP, PAY4),
676 IAVF_PTT(63, IP, IPV4, NOF, IP_GRENAT_MAC, IPV4, NOF, TCP, PAY4),
685 IAVF_PTT(70, IP, IPV4, NOF, IP_GRENAT_MAC, IPV6, NOF, TCP, PAY4),
697 IAVF_PTT(78, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV4, NOF, TCP, PAY4),
706 IAVF_PTT(85, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV6, NOF, TCP, PAY4),
715 IAVF_PTT(92, IP, IPV6, NOF, NONE, NONE, NOF, TCP, PAY4),
[all …]
/src/share/examples/ipfilter/rules/
H A Dexample.sr7 # do any meaningful comparison on. This actually only applies to TCP
13 # log all inbound TCP packets with the SYN flag (only) set
14 # (NOTE: if it were an inbound TCP packet with the SYN flag set and it
50 # block any inbound TCP packets with only the SYN flag set that are
H A Dexample.82 # block all incoming TCP connections but send back a TCP-RST for ones to
H A Dexample.132 # Log all short TCP packets to qe3, with 10.3.3.3 as the intended
7 # Log all connection attempts for TCP
/src/sys/dev/qlxge/
H A DREADME.txt38 * Large Segment Offload over TCP IPV4
39 * Large Segment Offload over TCP IPV6
41 * TCP over IPv4 checksum offload
44 * TCP over IPv6 checksum offload
/src/sys/dev/qlxgb/
H A DREADME.txt38 * Large Segment Offload over TCP IPV4
39 * Large Segment Offload over TCP IPV6
41 * TCP over IPv4 checksum offload
44 * TCP over IPv6 checksum offload
/src/sys/dev/qlxgbe/
H A DREADME.txt38 * Large Segment Offload over TCP IPV4
39 * Large Segment Offload over TCP IPV6
41 * TCP over IPv4 checksum offload
44 * TCP over IPv6 checksum offload
/src/contrib/sendmail/cf/mailer/
H A Dsmtp.m419 ifdef(`SMTP_MAILER_ARGS',, `define(`SMTP_MAILER_ARGS', `TCP $h')')
20 ifdef(`ESMTP_MAILER_ARGS',, `define(`ESMTP_MAILER_ARGS', `TCP $h')')
21 ifdef(`SMTP8_MAILER_ARGS',, `define(`SMTP8_MAILER_ARGS', `TCP $h')')
22 ifdef(`DSMTP_MAILER_ARGS',, `define(`DSMTP_MAILER_ARGS', `TCP $h')')
23 ifdef(`RELAY_MAILER_ARGS',, `define(`RELAY_MAILER_ARGS', `TCP $h')')
/src/contrib/sendmail/cf/feature/
H A Dmsp.m437 ifelse(_ARG2_, `MSA', `define(`RELAY_MAILER_ARGS', `TCP $h 587')')
55 define(`LOCAL_MAILER_ARGS', `TCP $h')dnl
59 define(`LOCAL_SHELL_ARGS', `TCP $h')dnl
/src/tools/regression/netinet/tcpstream/
H A DREADME1 tcpstream - a simple TCP streaming test tool
4 tcpstream generates TCP connections between a 'client' and a 'server'. The
/src/sys/dev/ice/
H A Dice_lan_tx_rx.h1225 ICE_PTT(26, IP, IPV4, NOF, NONE, NONE, NOF, TCP, PAY4),
1234 ICE_PTT(33, IP, IPV4, NOF, IP_IP, IPV4, NOF, TCP, PAY4),
1243 ICE_PTT(40, IP, IPV4, NOF, IP_IP, IPV6, NOF, TCP, PAY4),
1255 ICE_PTT(48, IP, IPV4, NOF, IP_GRENAT, IPV4, NOF, TCP, PAY4),
1264 ICE_PTT(55, IP, IPV4, NOF, IP_GRENAT, IPV6, NOF, TCP, PAY4),
1276 ICE_PTT(63, IP, IPV4, NOF, IP_GRENAT_MAC, IPV4, NOF, TCP, PAY4),
1285 ICE_PTT(70, IP, IPV4, NOF, IP_GRENAT_MAC, IPV6, NOF, TCP, PAY4),
1297 ICE_PTT(78, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV4, NOF, TCP, PAY4),
1306 ICE_PTT(85, IP, IPV4, NOF, IP_GRENAT_MAC_VLAN, IPV6, NOF, TCP, PAY4),
1315 ICE_PTT(92, IP, IPV6, NOF, NONE, NONE, NOF, TCP, PAY4),
[all …]

1234567891011