/freebsd/contrib/ofed/opensm/include/opensm/ |
H A D | osm_mcast_tbl.h | 40 * This object represents a multicast forwarding table. 60 /****s* OpenSM: Forwarding Table/osm_mcast_tbl_t 65 * Multicast Forwarding Table structure. 115 /****f* OpenSM: Forwarding Table/osm_mcast_tbl_init 120 * This function initializes a Multicast Forwarding Table object. 143 /****f* OpenSM: Forwarding Table/osm_mcast_tbl_delete 148 * This destroys and deallocates a Multicast Forwarding Table object. 156 * [in] Pointer a Pointer to the Multicast Forwarding Table object. 159 * On success, returns a pointer to a new Multicast Forwarding Table object 168 /****f* OpenSM: Forwarding Table/osm_mcast_tbl_realloc [all …]
|
H A D | osm_errors.h | 102 Linear Forwarding Receive Controller 105 Linear Forwarding Receiver 120 Linear Forwarding Receive Controller 123 Linear Forwarding Receiver 159 Multicast Forwarding Receive Controller 162 Multicast Forwarding Receiver
|
/freebsd/crypto/openssh/regress/unittests/authopt/testdata/ |
H A D | mktestdata.sh | 21 sign all_permit.cert -Opermit-agent-forwarding -Opermit-port-forwarding \ 22 -Opermit-pty -Opermit-user-rc -Opermit-X11-forwarding 25 sign no_agentfwd.cert -Ono-agent-forwarding 26 sign no_portfwd.cert -Ono-port-forwarding 29 sign no_x11fwd.cert -Ono-X11-forwarding 31 sign only_agentfwd.cert -Oclear -Opermit-agent-forwarding 32 sign only_portfwd.cert -Oclear -Opermit-port-forwarding 35 sign only_x11fwd.cert -Oclear -Opermit-X11-forwarding
|
/freebsd/crypto/openssh/regress/ |
H A D | forwarding.sh | 1 # $OpenBSD: forwarding.sh,v 1.24 2021/05/07 09:23:40 dtucker Exp $ 4 tid="local and remote forwarding" 27 trace "start forwarding, fork to background" 67 trace "simple clear forwarding" 75 fail "connection failed with cleared local forwarding" 80 fail "local forwarding not cleared" 89 fail "connection failed with cleared remote forwarding" 94 fail "remote forwarding not cleared" 98 trace "stdio forwarding" 102 fail "stdio forwarding" [all …]
|
H A D | dynamic-forward.sh | 4 tid="dynamic forwarding" 24 trace "start dynamic -$direction forwarding, fork to background" 30 test $r -eq 0 || fatal "failed to start dynamic forwarding $r" 33 fatal "forwarding ssh process unresponsive" 41 fatal "forwarding ssh process did not respond to close" 50 fatal "forwarding ssh process did not exit" 81 verbose "test -$d forwarding"
|
H A D | forward-control.sh | 4 tid="sshd control of local and remote forwarding" 92 # Sanity check: ensure the default config allows forwarding 155 # Check port-forwarding flags in authorized_keys. 157 sed "s/^/no-port-forwarding /" \ 163 check_lfwd N "$_prefix, no-port-forwarding" 164 check_rfwd N "$_prefix, no-port-forwarding" 174 sed "s/^/restrict,port-forwarding /" \ 180 check_lfwd $_plain_lfwd "$_prefix, restrict,port-forwarding" 181 check_rfwd $_plain_rfwd "$_prefix, restrict,port-forwarding"
|
/freebsd/contrib/netbsd-tests/net/mpls/ |
H A D | t_mpls_fw.sh | 28 # TEST MPLS encap/decap and forwarding using INET as encapsulated protocol 31 # Disable net.inet.ip.forwarding, enable net.mpls.forwarding 52 atf_set "descr" "IP/MPLS forwarding test using PHP" 76 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0 90 atf_check -s exit:0 rump.sysctl -q -w net.mpls.forwarding=1 91 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0 105 atf_check -s exit:0 rump.sysctl -q -w net.mpls.forwarding=1 106 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0 120 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0 164 atf_set "descr" "IP/MPLS forwarding test using explicit NULL labels"
|
H A D | t_mpls_fw64.sh | 28 # Test MPLS encap/decap and forwarding using INET6 as encapsulated protocol 31 # Disable net.inet[6].ip[6].forwarding, enable net.mpls.forwarding 73 atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.forwarding=0 88 atf_check -s exit:0 rump.sysctl -q -w net.mpls.forwarding=1 89 atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.forwarding=0 105 atf_check -s exit:0 rump.sysctl -q -w net.mpls.forwarding=1 106 atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.forwarding=0 107 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0 123 atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.forwarding=0 124 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0
|
H A D | t_mpls_fw6.sh | 28 # Test MPLS encap/decap and forwarding using INET6 as encapsulated protocol 31 # Disable net.inet6.ip6.forwarding, enable net.mpls.forwarding 53 atf_set "descr" "IP6/MPLS forwarding test using PHP" 77 atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.forwarding=0 92 atf_check -s exit:0 rump.sysctl -q -w net.mpls.forwarding=1 93 atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.forwarding=0 109 atf_check -s exit:0 rump.sysctl -q -w net.mpls.forwarding=1 110 atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.forwarding=0 126 atf_check -s exit:0 rump.sysctl -q -w net.inet6.ip6.forwarding=0 195 atf_set "descr" "IP6/MPLS forwarding test using explicit NULL labels"
|
H A D | t_ldp_regen.sh | 31 # Enable MPLS forwarding on R2 32 # Disable IP forwarding and enable MPLS forwarding on R3 91 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0 106 atf_check -s exit:0 rump.sysctl -q -w net.mpls.forwarding=1 107 # This one should still do ip forwarding because it announces IMPLNULL 123 atf_check -s exit:0 rump.sysctl -q -w net.mpls.forwarding=1 124 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0 138 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0
|
H A D | t_rfc4182.sh | 31 # Disable net.inet.ip.forwarding, enable net.mpls.forwarding 78 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0 92 atf_check -s exit:0 rump.sysctl -q -w net.mpls.forwarding=1 93 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0 107 atf_check -s exit:0 rump.sysctl -q -w net.mpls.forwarding=1 108 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0 122 atf_check -s exit:0 rump.sysctl -q -w net.inet.ip.forwarding=0
|
/freebsd/lib/libpmc/pmu-events/arch/x86/goldmont/ |
H A D | cache.json | 264 …at miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 272 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 277 …miss the L2 cache with a snoop hit in the other processor module, no data forwarding is required.", 285 …s the L2 cache with a snoop hit in the other processor module, no data forwarding is required. Req… 329 …at miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 337 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… 342 …miss the L2 cache with a snoop hit in the other processor module, no data forwarding is required.", 350 …s the L2 cache with a snoop hit in the other processor module, no data forwarding is required. Req… 394 …at miss the L2 cache with a snoop hit in the other processor module, data forwarding is required.", 402 …miss the L2 cache with a snoop hit in the other processor module, data forwarding is required. Req… [all …]
|
/freebsd/contrib/netbsd-tests/net/net/ |
H A D | t_forwarding.sh | 53 atf_set "descr" "Does IPv4 forwarding tests" 59 atf_set "descr" "Does IPv6 forwarding tests" 77 atf_set "descr" "Does IPv4 forwarding tests" 146 rump.sysctl net.inet6.ip6.forwarding 148 rump.sysctl net.inet.ip.forwarding 218 atf_check -s exit:0 -o ignore rump.sysctl -w net.inet.ip.forwarding=1 224 atf_check -s exit:0 -o ignore rump.sysctl -w net.inet6.ip6.forwarding=1 242 atf_check -s exit:0 -o ignore rump.sysctl -w net.inet.ip.forwarding=0 248 atf_check -s exit:0 -o ignore rump.sysctl -w net.inet6.ip6.forwarding=0 272 atf_check -s exit:0 -o match:"net.inet.ip.forwarding = 1" \ [all …]
|
/freebsd/crypto/openssh/ |
H A D | sshd_config.5 | 103 forwarding is permitted. 106 Note that disabling agent forwarding does not improve security 127 Specifies whether StreamLocal (Unix-domain socket) forwarding is permitted. 133 to allow StreamLocal forwarding, 135 to prevent all StreamLocal forwarding, 139 forwarding only or 141 to allow remote forwarding only. 142 Note that disabling StreamLocal forwarding does not improve security unless 146 Specifies whether TCP forwarding is permitted. 152 to allow TCP forwarding, [all …]
|
H A D | sshd.8 | 322 things like allocating a pseudo-tty, forwarding X11 connections, 323 forwarding TCP connections, or forwarding the authentication agent 408 If X11 forwarding is in use, it will receive the "proto cookie" pair in 500 .It Cm agent-forwarding 501 Enable authentication agent forwarding previously disabled by the 526 forwarding unless they are explicitly prohibited, e.g. using the 577 .It Cm no-agent-forwarding 578 Forbids authentication agent forwarding when this key is used for 580 .It Cm no-port-forwarding 581 Forbids TCP forwarding when this key is used for authentication. [all …]
|
H A D | PROTOCOL.mux | 19 the mux process; requesting a forwarding, performing an alive check or 31 Stdio forwarding (requested using MUX_C_NEW_STDIO_FWD) is another 72 bool want X11 forwarding flag 120 3. Requesting passenger-mode stdio forwarding 122 A client may request the master to establish a stdio forwarding: 166 uint32 forwarding type 172 forwarding type may be MUX_FWD_LOCAL, MUX_FWD_REMOTE, MUX_FWD_DYNAMIC. 195 uint32 forwarding type
|
H A D | PROTOCOL.certkeys | 297 permit-X11-forwarding empty Flag indicating that X11 forwarding 298 should be permitted. X11 forwarding will 301 permit-agent-forwarding empty Flag indicating that agent forwarding 302 should be allowed. Agent forwarding 306 permit-port-forwarding empty Flag indicating that port-forwarding 308 not present, then no port forwarding will
|
H A D | OVERVIEW | 71 X11, TCP/IP, and Agent forwarding 73 - Code for various types of channel forwarding is in channels.c. 76 implement X11 forwarding, TCP/IP forwarding, and authentication 77 agent forwarding. 104 It then makes any pty, forwarding, etc. requests. It may call
|
H A D | ssh.1 | 120 Enables forwarding of connections from an authentication agent such as 124 Agent forwarding should be enabled with caution. 137 Disables forwarding of the authentication agent connection. 186 application-level port forwarding. 330 and then establishing a TCP forwarding to the ultimate destination from 344 Enables GSSAPI-based authentication and forwarding (delegation) of GSSAPI 348 Disables forwarding (delegation) of GSSAPI credentials to the server. 446 This is useful for just forwarding ports. 807 device forwarding with the specified 834 forwarding mode it desired, then it should be specified before [all …]
|
H A D | ssh_config.5 | 499 local forwarding, i.e.\& 509 remote forwarding, i.e.\& 521 Open X11 forwarding sessions. 531 In particular, expiring an inactive forwarding session does not prevent 532 another identical forwarding from being subsequently created. 656 forwarding is supported over these multiplexed connections, however the 792 to exit if TCP connections to the ultimate forwarding destination fail. 856 Agent forwarding should be enabled with caution. 874 X11 forwarding should be enabled with caution. 883 Specify a timeout for untrusted X11 forwarding [all …]
|
/freebsd/tools/test/netfibs/ |
H A D | README | 45 forwarding.sh 47 forwarding.sh tests FIBs in the forwarding path, making sure that 59 env IFACE=ifname sh forwarding.sh left 60 env IFACE=leftifname IFACEFAR=rightifname sh forwarding.sh middle 61 env IFACE=ifname sh forwarding.sh right
|
/freebsd/usr.bin/netstat/ |
H A D | mroute6.c | 172 xo_open_list("multicast-forwarding-cache"); in mroute6pr() 174 "{T:IPv6 Multicast Forwarding Cache}\n"); in mroute6pr() 182 xo_open_instance("multicast-forwarding-cache"); in mroute6pr() 214 xo_close_instance("multicast-forwarding-cache"); in mroute6pr() 218 xo_close_list("multicast-forwarding-cache"); in mroute6pr() 220 xo_emit("\n{T:IPv6 Multicast Forwarding Table is empty}\n"); in mroute6pr() 236 xo_emit("{T:IPv6 multicast forwarding}:\n"); in mrt6_stats() 244 "{N:/multicast forwarding cache lookup%s}\n"); in mrt6_stats() 246 "{N:/multicast forwarding cache miss%s}\n"); in mrt6_stats()
|
/freebsd/tests/sys/netipsec/tunnel/ |
H A D | utils.subr | 45 jexec ipsecA sysctl net.inet.ip.forwarding=1 46 jexec router sysctl net.inet.ip.forwarding=1 47 jexec ipsecB sysctl net.inet.ip.forwarding=1 64 jexec ipsecA sysctl net.inet6.ip6.forwarding=1 65 jexec router sysctl net.inet6.ip6.forwarding=1 66 jexec ipsecB sysctl net.inet6.ip6.forwarding=1
|
/freebsd/tests/sys/netinet6/ |
H A D | forward6.sh | 35 atf_set descr 'Test valid IPv6 global unicast fast-forwarding to interface' 83 jexec ${jname} sysctl net.inet6.ip6.forwarding=1 105 atf_set descr 'Test valid IPv6 global unicast fast-forwarding to GU gw' 157 jexec ${jname} sysctl net.inet6.ip6.forwarding=1 179 atf_set descr 'Test valid IPv6 global unicast fast-forwarding to LL gw' 232 jexec ${jname} sysctl net.inet6.ip6.forwarding=1 254 atf_set descr 'Test valid IPv6 global unicast fast-forwarding to interface' 302 jexec ${jname} sysctl net.inet6.ip6.forwarding=1 323 atf_set descr 'Test valid IPv6 global unicast fast-forwarding to GU gw' 375 jexec ${jname} sysctl net.inet6.ip6.forwarding=1 [all …]
|
/freebsd/share/man/man4/ |
H A D | inet.4 | 172 Boolean: allow forwarding of, and ICMP responses to, packets with addresses in 175 Boolean: allow forwarding of, and ICMP responses to, packets with addresses in 180 .It Va forwarding 181 Boolean: enable/disable forwarding of IP packets. 289 Boolean: in non-forwarding mode 290 .Pq forwarding is disabled 320 Boolean: enable/disable forwarding of source-routed IP packets (default false).
|