Home
last modified time | relevance | path

Searched full:fragmented (Results 1 – 25 of 255) sorted by relevance

1234567891011

/freebsd/tests/sys/netpfil/pf/
H A Dfragmentation_no_reassembly.sh33 atf_set descr 'Matching non-fragmented IPv4 packets'
45 # Only non-fragmented packets are passed
64 atf_set descr 'Matching fragmented IPv4 packets'
76 # Only fragmented packets are passed
108 # Only fragmented packets are passed.
H A Dnat66.py162 # Send a ping that just barely doesn't need to be fragmented
165 # Send a ping that just barely needs to be fragmented
168 # A ping that arrives fragmented
192 # Send a ping that just barely doesn't need to be fragmented
195 # Send a ping that just barely needs to be fragmented
198 # A ping that arrives fragmented
H A Dfragmentation_pass.sh422 # But a fragmented ping does not
431 # Both single packet & fragmented pass when we scrub
453 # Tester can send long packets which will get fragmented by the router.
565 atf_set descr 'Test dummynet on NATed fragmented traffic'
612 atf_set descr 'Test dummynet on NATed fragmented traffic'
639 # Count that fragmented packets have hit the rule only once and that
641 # for fragmented packets.
643 atf_fail "Fragmented packets not counted correctly"
H A Dfragmentation_compat.sh309 # Both single packet & fragmented pass when we scrub
319 # And the fragmented ping doesn't pass if we do not reassemble
H A Dfragcommon.py41 help='The address to send the fragmented packets to')
/freebsd/contrib/tcpdump/
H A Dprint-ip-demux.c38 u_int length, u_int ver, int fragmented, u_int ttl_hl, in ip_demux_print() argument
65 esp_print(ndo, bp, length, iph, ver, fragmented, ttl_hl); in ip_demux_print()
96 tcp_print(ndo, bp, length, iph, fragmented); in ip_demux_print()
100 udp_print(ndo, bp, length, iph, fragmented, ttl_hl); in ip_demux_print()
105 icmp_print(ndo, bp, length, iph, fragmented); in ip_demux_print()
115 icmp6_print(ndo, bp, length, iph, fragmented); in ip_demux_print()
H A Dprint-udp.c367 const u_char *bp2, int fragmented, u_int ttl_hl) in udp_print() argument
550 if (ndo->ndo_vflag && !ndo->ndo_Kflag && !fragmented) { in udp_print()
644 isakmp_rfc3948_print(ndo, cp, length, bp2, IP_V(ip), fragmented, ttl_hl); in udp_print()
725 if (ulen > length && !fragmented) in udp_print()
732 if (ulen > length && !fragmented) in udp_print()
H A Dprint-ip6.c233 int fragmented = 0; in ip6_print() local
382 fragmented = 1; in ip6_print()
486 ip_demux_print(ndo, cp, len, 6, fragmented, in ip6_print()
/freebsd/sys/contrib/dev/iwlwifi/fw/api/
H A Dtime-event.h57 * means that the event can be fragmented but only the first 'x' will be
67 /* If a Time Event can be fragmented, this is the max number of fragments */
123 * means that the event can be fragmented but only the first 'x' will be
402 * * A rather short event that can't be fragmented and with a very
410 * priority and that can be fragmented allowing other activities
418 * listen mode. Will be fragmented. Valid only on the P2P Device MAC.
422 * able to run the GO Negotiation. Will not be fragmented and not
H A Dscan.h299 * @IWL_MVM_LMAC_SCAN_FLAG_FRAGMENTED: all passive scans will be fragmented
341 * @fragmented_dwell: dwell time for fragmented passive scan
513 * @fragmented: default dwell time for fragmented scan member
519 u8 fragmented;
670 * @IWL_UMAC_SCAN_GEN_FLAGS_V2_FRAGMENTED_LMAC1: fragmented scan LMAC1
671 * @IWL_UMAC_SCAN_GEN_FLAGS_V2_FRAGMENTED_LMAC2: fragmented scan LMAC2
832 * @fragmented_dwell: dwell time for fragmented passive scan
845 * Relevant only for fragmented scan.
1041 * @num_of_fragments: number of fragments needed for full fragmented
[all...]
/freebsd/share/man/man4/
H A Dinet.4195 Fragmented packets are hashed to buckets.
207 Integer: maximum number of fragmented packets the host will accept and
209 0 means that the host will not accept any fragmented packets for that VNET.
223 0 means that the host will not accept any fragmented packets for the VNET.
H A Dinet6.4232 Integer: maximum number of fragmented packets the node will accept and
234 0 means that the node will not accept any fragmented packets for that VNET.
241 Fragmented packets are hashed to buckets.
/freebsd/crypto/openssl/test/recipes/
H A D70-test_sslrecords.t69 #Test 4: Injecting a fragmented fatal alert should fail. We expect the server to
70 # send back an alert of its own because it cannot handle fragmented
78 ok($fatal_alert, "Fragmented alert records test");
124 ok(TLSProxy::Message->success(), "Fragmented ClientHello in TLSv1.2 test");
134 ok(TLSProxy::Message->fail(), "Fragmented ClientHello in TLSv1.2/SSLv2 test");
236 #Test 19: Sending application data in the middle of a fragmented KeyUpdate
245 #Test 20: Fragmented KeyUpdate. This should succeed. Strictly speaking this
/freebsd/sys/netinet6/
H A Dfrag6.c78 * |||||||| fragmented packets
188 "A value of 0 means no fragmented packets will be accepted, while "
207 "Default maximum number of outstanding fragmented IPv6 packets. "
208 "A value of 0 means no fragmented packets will be accepted, while a "
391 * While the sender will use the same value for all of the fragmented packets,
585 * Enforce upper bound on number of fragmented packets in frag6_input()
710 /* Allocate an IPv6 fragement queue entry for this fragmented part. */ in frag6_input()
750 /* Find a fragmented part which begins after this one does. */ in frag6_input()
795 * queue, as we are the most recently active fragmented packet. in frag6_input()
978 * If we are still over the maximum number of fragmented in frag6_slowtimo()
/freebsd/sys/contrib/device-tree/Bindings/dma/
H A Dqcom_hidma_mgmt.txt23 fragmented to multiples of this amount. This parameter is used while
28 fragmented to multiples of this amount. This parameter is used while
/freebsd/tests/sys/netinet6/frag6/
H A Dfrag6_15.py62 # Sysctl set to accept maximum 3 segments on a fragmented packet.
83 # Sysctl set to accept maximum 3 segments on a fragmented packet.
/freebsd/share/man/man9/
H A Dieee80211_output.9153 .Sh FRAGMENTED FRAMES
161 Fragmented frames are placed
/freebsd/sbin/ipf/ipf/
H A Dipfilter.422 selectively filter fragmented IP packets
53 "short" (fragmented) IP packets with incomplete headers can be filtered
/freebsd/share/doc/smm/05.fastfs/
H A D3.t207 and possibly a single fragmented block.
208 If a file system block must be fragmented to obtain
237 The file contains no fragmented blocks (and the last
272 fragmented block expands to a full block.
/freebsd/share/doc/smm/03.fsck/
H A D2.t172 and possibly a single fragmented block.
173 If a file system block must be fragmented to obtain
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/pool_checkpoint/
H A Dcheckpoint_indirect.ksh26 # 1. Import pool that's slightly fragmented
H A Dcheckpoint_big_rewind.ksh28 # 1. Import pool that's slightly fragmented
/freebsd/sys/contrib/device-tree/Bindings/memory-controllers/
H A Dnvidia,tegra20-mc.yaml23 fragmented memory pages.
/freebsd/usr.bin/systat/
H A Dsctp.c68 18999999999999 asconf timeouts 999999999999 fragmented
114 L(18, "asconf timeouts"); R(18, "fragmented"); in labelsctp()
/freebsd/share/examples/ipfilter/
H A Dexample.146 # block any inbound packets on le0 which are fragmented and "too short" to

1234567891011