Home
last modified time | relevance | path

Searched full:packets (Results 1 – 25 of 1981) sorted by relevance

12345678910>>...80

/freebsd/contrib/libpcap/
H A Dpcap.3pcap.in33 provides a high level interface to packet capture systems. All packets
36 It also supports saving captured packets to a ``savefile'', and reading
37 packets from a ``savefile''.
112 To open a handle for a ``savefile'' from which to read packets, given the
135 which is the handle used for reading packets from the capture stream or
148 TCP headers of packets - you can set the "snapshot length" for the
166 packets passing through the switch are sent, a network adapter receives
167 all packets on the LAN, including unicast or multicast packets not sent
171 Normally, the adapter will discard those packets; however, many network
173 packets, even if they are not sent to an address that the adapter
[all …]
H A Dpcap_loop.3pcap22 pcap_loop, pcap_dispatch \- process packets from a live capture or savefile
40 processes packets from a live capture or ``savefile'' until
42 packets are processed, the end of the ``savefile'' is
55 is equivalent to infinity, so that packets are processed until another
59 processes packets from a live capture or ``savefile'' until
61 packets are processed, the end of the current bufferful of packets is
68 is the maximum number of packets to process before returning, but is not
70 bufferful of packets is read at a time, so fewer than
72 packets may be processed. A value of
78 causes all the packets received in one buffer to be processed when
[all …]
H A Dpcap_breakloop.3pcap39 to return rather than looping; they will return the number of packets
42 if no packets have been processed so far. If the loop is currently
43 blocked waiting for packets to arrive,
60 The flag is checked in loops reading packets from the OS - a signal by
62 processing a set of packets returned by the OS.
68 if the signal interrupted a call reading packets in a live capture,
71 packets arrive and the call completes.
97 Note that if pcap_breakloop() unblocks the thread capturing packets, and
99 be packets in the buffer that arrived before pcap_breakloop() were
100 called but that weren't yet provided to libpcap, those packets will not
[all …]
H A Dpcap_stats.3pcap51 number of packets received;
54 number of packets dropped because there was no room in the operating
55 system's buffer when they arrived, because packets weren't being read
59 number of packets dropped by the network interface or its driver.
64 might count packets whether they passed any filter set with
66 or not, or it might count only packets that pass the filter.
67 It also might, or might not, count packets dropped because there was no
72 the operating system, it would count packets that don't pass the filter.
77 might, or might not, count packets not yet read from the operating
81 no packets were dropped by the interface, or it might mean that the
[all …]
/freebsd/sbin/ping/tests/
H A Dtest_ping.py200 :keyword count: Number of packets to send, defaults to 1
202 :keyword dup: Duplicate packets, defaults to `False`
304 1 packets transmitted, 1 packets received, 0.0% packet loss
320 1 packets transmitted, 1 packets received, 0.0% packet loss
336 1 packets transmitted, 1 packets received, 0.0% packet loss
351 1 packets transmitted, 0 packets received, 100.0% packet loss
366 1 packets transmitted, 1 packets received, 0.0% packet loss
381 1 packets transmitted, 0 packets received, 100.0% packet loss
398 3 packets transmitted, 3 packets received, 0.0% packet loss
413 3 packets transmitted, 0 packets received, 100.0% packet loss
[all …]
/freebsd/tools/tools/crypto/
H A Dipsecstats.c106 AHSTAT(ahs.ahs_input, "input packets processed"); in main()
107 AHSTAT(ahs.ahs_output, "output packets processed"); in main()
110 AHSTAT(ahs.ahs_notdb, "packets with no SA"); in main()
111 AHSTAT(ahs.ahs_badkcr, "packets with bad kcr"); in main()
112 AHSTAT(ahs.ahs_badauth, "packets with bad authentication"); in main()
113 AHSTAT(ahs.ahs_noxform, "packets with no xform"); in main()
114 AHSTAT(ahs.ahs_qfull, "packets dropped packet 'cuz queue full"); in main()
115 AHSTAT(ahs.ahs_wrap, "packets dropped for replace counter wrap"); in main()
116 AHSTAT(ahs.ahs_replay, "packets dropped for possible replay"); in main()
117 AHSTAT(ahs.ahs_badauthl, "packets dropped for bad authenticator length"); in main()
[all …]
/freebsd/share/man/man4/
H A Dng_car.477 Committed burst packets are counted as green, extended burst packets are
78 counted as yellow and exceeding packets are counted as red.
83 Committed burst packets are counted as green, peak burst packets are counted
84 as yellow and exceeding packets are counted as red.
92 When normal burst exceeded and extended burst is used, packets are counted
100 Committed burst packets are counted as green, exceeding packets are delayed
102 Packets dropped by queue counted as red.
103 Queue parameters are hardcoded: length 99 packets, min_th 8 packets, max_p 100%.
113 rates are measured in packets per second and bursts are in packets.
130 uint8_t green_action; /* Action for green packets */
[all …]
H A Ddivert.432 Divert sockets allow to intercept and re-inject packets flowing through
50 A divert socket bound to a divert port will receive all packets diverted
53 Packets may also be written to a divert port, in which case they re-enter
56 By reading from and writing to a divert socket, matching packets
59 .Sh READING PACKETS
60 Packets are diverted either as they are ``incoming'' or ``outgoing.''
61 Incoming packets are diverted after reception on an IP interface,
62 whereas outgoing packets are diverted before next hop forwarding.
64 Diverted packets may be read unaltered via
79 .Sh WRITING PACKETS
[all …]
H A Dinet.4170 Boolean: enable/disable accepting of source-routed IP packets (default false).
172 Boolean: allow forwarding of, and ICMP responses to, packets with addresses in
175 Boolean: allow forwarding of, and ICMP responses to, packets with addresses in
181 Boolean: enable/disable forwarding of IP packets.
195 Fragmented packets are hashed to buckets.
197 The system must compare the incoming packets to the existing reassembly queues
207 Integer: maximum number of fragmented packets the host will accept and
209 0 means that the host will not accept any fragmented packets for that VNET.
223 0 means that the host will not accept any fragmented packets for the VNET.
241 By setting this variable to 0, all IP options in the incoming packets
[all …]
H A Dng_tag.459 for matching packets, a destination hook for non-matching packets,
74 Packets with matched tags are forwarded to
82 Tag list of packets leaving the node is extended with a new tag
99 New hooks are initially configured to drop all incoming packets
101 to forward all packets to non-matching hook),
102 and to forward all outgoing packets without any tag appending.
104 Data payload of packets passing through the node is completely
116 incoming packets on a hook.
142 Matching and non-matching incoming packets are delivered out the hooks named
157 packets.
[all …]
H A Dsiftr.469 is to capture IPv4 TCP/IP packets.
106 controls how many inbound/outbound packets for a given TCP connection will cause
125 Set to any other value, only packets where either the source or destination
356 Number of TCP packets that traversed up the network stack.
357 This only includes inbound TCP packets during the periods when
363 Number of TCP packets that traversed down the network stack.
364 This only includes outbound TCP packets during the periods when
374 Number of inbound packets that were not processed because of failed
380 Number of outbound packets that were not processed because of failed
386 Number of inbound packets that were not processed because of failure to find the
[all …]
H A Dng_vjc.463 Packets received on the
66 Packets received on the other three hooks will be uncompressed as appropriate.
71 Van Jacobson compression only applies to TCP packets.
74 (i.e., common case) TCP packets are actually compressed.
78 Other TCP packets are run through the state machine but not
82 Other non-TCP IP packets are forwarded unchanged to
106 Upstream (uncompressed) IP packets.
108 Downstream compressed TCP packets.
110 Downstream uncompressed TCP packets.
112 Downstream uncompressed IP packets.
[all …]
H A Dip6.445 IPv6 packets contain an IPv6 header that is not provided as part of the
57 All IPv6 packets begin with an IPv6 header.
63 To directly access IPv6 headers from received packets and specify them
127 IPv6 allows header options on packets to manipulate the behavior of the
160 Get or set the interface from which multicast packets will be sent.
250 Get or set whether additional information about subsequent packets will
263 Get or set whether the hop limit header field from subsequent packets
272 .\" packets will be provided as ancillary data along with the payload in
282 Get or set whether the hop-by-hop options from subsequent packets will be
302 Get or set whether the destination options from subsequent packets will
[all …]
/freebsd/sbin/ipf/ipf/
H A Dipfilter.422 selectively filter fragmented IP packets
24 selectively filter packets with IP options
26 send back an ICMP error/TCP reset for blocked packets
39 in addition, supports temporary storage of pre-authenticated rules for passing packets through
44 Inverted host/net matchingTCP/UDP packets by port number or a port number
47 ICMP packets by type/code
49 "established" TCP packets
53 "short" (fragmented) IP packets with incomplete headers can be filtered
56 Service) field in packets
71 it matches a rule setup to look for suspicious packets
[all …]
H A Dipf.479 u_short fr_icmpm; /* data for ICMP packets (mask) */
112 FR_OUTQUE 0x000004 /* outgoing packets */
113 FR_INQUE 0x000008 /* ingoing packets */
117 FR_LOGBODY 0x000020 /* log the body of packets too */
162 There are two flags which can be set to log packets independently of the
163 rules used. These allow for packets which are either passed or blocked
180 Statistics on the various operations performed by this package on packets
181 is kept inside the kernel. These statistics apply to packets traversing
203 u_long fr_pass; /* packets allowed */
204 u_long fr_block; /* packets denied */
[all …]
H A Dipf.510 and drop packets (block rules) and those that allow packets through (pass
50 # Allow all ICMP packets in
57 pass in proto icmp from any to any # Allow all ICMP packets in
64 firewall rule set or which packets should be blocked or allowed in.
82 any further. Packets that are blocked on the "in" side are never seen by
94 rules provide the administrator with the ability to count packets and
97 path. For outbound packets, count rules are applied before NAT and
107 becomes full, the packets will end up being dropped.
117 For non-UDP packets, there are builtin checks that are applied in addition
132 packets via each network interface but it is also because of the hosts,
[all …]
/freebsd/share/man/man5/
H A Dpf.conf.539 packet filter modifies, drops or passes packets according to rules or
57 Ethernet filtering provides rule-based blocking or passing of Ethernet packets.
67 Packet filtering provides rule-based blocking or passing of packets.
276 Some hosts (notably web servers on Solaris) send TCP packets even after closing
282 can prevent blocking of such packets.
312 The state if both hosts have sent packets.
501 option is used to enable or disable the reassembly of fragmented packets,
532 A TCP RST is returned for blocked TCP packets,
533 an SCTP ABORT chunk is returned for blocked SCTP packets,
534 an ICMP UNREACHABLE is returned for blocked UDP packets,
[all …]
/freebsd/contrib/tcpdump/
H A Dtcpdump.1.in153 \fITcpdump\fP prints out a description of the contents of packets on a
165 read packets from a network interface. It can also be run with the
168 only packets that match
176 flag, continue capturing packets until it is interrupted by a SIGINT
182 flag, it will capture packets until it is interrupted by a SIGINT or
183 SIGTERM signal or the specified number of packets have been processed.
187 finishes capturing packets, it will report counts of:
189 packets ``captured'' (this is the number of packets that
193 packets ``received by filter'' (the meaning of this depends on the OS on
197 specified on the command line, on some OSes it counts packets regardless
[all …]
/freebsd/share/examples/ipfilter/
H A Drules.txt2 # block all incoming TCP packets on le0 from host "foo" to any destination.
9 # block all outgoing TCP packets on le0 from any host to port 23 of host bar.
16 # block all inbound packets.
20 # pass through packets to and from localhost.
37 # block all outbound packets.
41 # allow any packets destined for localhost out.
59 # block all ICMP packets.
68 # allow packets coming from foo to bar through.
72 # allow any TCP packets from the same subnet as foo is on through to host
77 # allow in UDP packets which are NOT from port 53 and are destined for
[all …]
H A Dexamples.txt18 [Image] Logging packets to network devices
20 Authenticating packets
21 Pre-authenticating packets
31 # setup default to block all packets.
34 # pass packets from host firewall to any destination
46 # drop all inbound packets from localhost coming from ethernet
81 # block all incoming ICMP packets
87 # allow all IP packets in which are protocol 4
94 # prevent any packets destined for NFS from coming in
108 To filter out these nasties, it is possible to select fragmented packets out
[all …]
/freebsd/sbin/ipfw/
H A Dipfw.8202 Packets are passed to the firewall
216 Depending on the action and certain system settings, packets
223 and matches all packets.
243 i.e., rules that match packets with the same 5-tuple
260 for all packets (not only these matched by the rule) but
392 counters (total or current packets or bytes).
485 Note that as packets flow through the stack, headers can be
488 E.g., incoming packets will include the MAC header when
492 but the same packets will have the MAC header stripped off when
512 match on those packets.
[all …]
/freebsd/sbin/ipf/ipsend/
H A Diptest.14 iptest \- automatically generate a packets to test IP functionality
30 Run IP test group #1. This group of tests generates packets with the IP
33 3 (ip_v < 4), 4 (ip_v > 4), 5 (ip_len < packetsize, long packets),
34 6 (ip_len > packet size, short packets), 7 (Zero length fragments),
39 Run IP test group #2. This group of tests generates packets with the IP
44 Run IP test group #3. This group of tests generates packets with the ICMP
49 9-10, 13-14 and 17-18 - shortened packets).
52 Run IP test group #4. This group of tests generates packets with the UDP
59 Run IP test group #5. This group of tests generates packets with the TCP
69 an attempt to exhaust the network buffers used for holding packets for later
[all …]
/freebsd/sbin/ping/
H A Dping.837 packets to network hosts
177 between transmissions, further missing packets cause a bell only
178 if the maximum number of unreceived packets has increased.
193 packets.
201 packets.
210 Outputs packets as fast as they come back or one hundred times per second,
219 This provides a rapid display of how many packets are being dropped.
233 is an IP address identifying an interface from which the packets will be sent.
238 is a name of an interface (e.g., `em0') from which the packets will be sent.
257 sends that many packets as fast as possible before falling into its normal
[all …]
/freebsd/tools/tools/mctest/
H A Dmctest.cc83 // absorb and record packets
88 // @param number ///< number of packets we're expecting
156 timeval packets[number]; in sink() local
180 * 1/N packets from each, otherwise the clients will overwhelm in sink()
191 gettimeofday(&packets[ntohl(*(int *)packet)], 0); in sink()
197 cout << "Missed " << number - n << " packets." << endl; in sink()
200 cout << "sec: " << packets[i].tv_sec << " usec: " << in sink()
201 packets[i].tv_usec << endl; in sink()
203 timersub(&packets[i+1], &packets[i], &result); in sink()
222 struct timeval *packets; ///< The timestamps of returning packets member
[all …]
/freebsd/usr.sbin/ipfwpcap/
H A Dipfwpcap.829 .Nd "copy diverted packets to a file in tcpdump format"
41 utility is used to copy diverted packets to a file in
44 The interesting packets are diverted by
49 The packets are then dropped unless
58 Writes packets back to the
67 Diverted packets will silently disappear if nothing is listening on the
77 packets.
91 argument is the path to the file to write captured packets to.
102 as a background job listening to port 8091 and reflecting the packets
109 rule to divert all packets from 192.0.2.101 to port 8091.

12345678910>>...80