/freebsd/tests/sys/netpfil/pf/ |
H A D | fragmentation_no_reassembly.sh | 33 atf_set descr 'Matching non-fragmented IPv4 packets' 45 # Only non-fragmented packets are passed 64 atf_set descr 'Matching fragmented IPv4 packets' 76 # Only fragmented packets are passed 108 # Only fragmented packets are passed.
|
H A D | nat66.py | 162 # Send a ping that just barely doesn't need to be fragmented 165 # Send a ping that just barely needs to be fragmented 168 # A ping that arrives fragmented 192 # Send a ping that just barely doesn't need to be fragmented 195 # Send a ping that just barely needs to be fragmented 198 # A ping that arrives fragmented
|
H A D | fragmentation_pass.sh | 422 # But a fragmented ping does not 431 # Both single packet & fragmented pass when we scrub 453 # Tester can send long packets which will get fragmented by the router. 565 atf_set descr 'Test dummynet on NATed fragmented traffic' 612 atf_set descr 'Test dummynet on NATed fragmented traffic' 639 # Count that fragmented packets have hit the rule only once and that 641 # for fragmented packets. 643 atf_fail "Fragmented packets not counted correctly"
|
H A D | fragmentation_compat.sh | 309 # Both single packet & fragmented pass when we scrub 319 # And the fragmented ping doesn't pass if we do not reassemble
|
H A D | fragcommon.py | 41 help='The address to send the fragmented packets to')
|
/freebsd/contrib/tcpdump/ |
H A D | print-ip-demux.c | 38 u_int length, u_int ver, int fragmented, u_int ttl_hl, in ip_demux_print() argument 65 esp_print(ndo, bp, length, iph, ver, fragmented, ttl_hl); in ip_demux_print() 96 tcp_print(ndo, bp, length, iph, fragmented); in ip_demux_print() 100 udp_print(ndo, bp, length, iph, fragmented, ttl_hl); in ip_demux_print() 105 icmp_print(ndo, bp, length, iph, fragmented); in ip_demux_print() 115 icmp6_print(ndo, bp, length, iph, fragmented); in ip_demux_print()
|
H A D | print-udp.c | 367 const u_char *bp2, int fragmented, u_int ttl_hl) in udp_print() argument 550 if (ndo->ndo_vflag && !ndo->ndo_Kflag && !fragmented) { in udp_print() 644 isakmp_rfc3948_print(ndo, cp, length, bp2, IP_V(ip), fragmented, ttl_hl); in udp_print() 725 if (ulen > length && !fragmented) in udp_print() 732 if (ulen > length && !fragmented) in udp_print()
|
H A D | print-ip6.c | 233 int fragmented = 0; in ip6_print() local 382 fragmented = 1; in ip6_print() 486 ip_demux_print(ndo, cp, len, 6, fragmented, in ip6_print()
|
/freebsd/sys/contrib/dev/iwlwifi/fw/api/ |
H A D | time-event.h | 57 * means that the event can be fragmented but only the first 'x' will be 67 /* If a Time Event can be fragmented, this is the max number of fragments */ 123 * means that the event can be fragmented but only the first 'x' will be 402 * * A rather short event that can't be fragmented and with a very 410 * priority and that can be fragmented allowing other activities 418 * listen mode. Will be fragmented. Valid only on the P2P Device MAC. 422 * able to run the GO Negotiation. Will not be fragmented and not
|
H A D | scan.h | 299 * @IWL_MVM_LMAC_SCAN_FLAG_FRAGMENTED: all passive scans will be fragmented 341 * @fragmented_dwell: dwell time for fragmented passive scan 513 * @fragmented: default dwell time for fragmented scan member 519 u8 fragmented; 670 * @IWL_UMAC_SCAN_GEN_FLAGS_V2_FRAGMENTED_LMAC1: fragmented scan LMAC1 671 * @IWL_UMAC_SCAN_GEN_FLAGS_V2_FRAGMENTED_LMAC2: fragmented scan LMAC2 832 * @fragmented_dwell: dwell time for fragmented passive scan 845 * Relevant only for fragmented scan. 1041 * @num_of_fragments: number of fragments needed for full fragmented [all...] |
/freebsd/share/man/man4/ |
H A D | inet.4 | 195 Fragmented packets are hashed to buckets. 207 Integer: maximum number of fragmented packets the host will accept and 209 0 means that the host will not accept any fragmented packets for that VNET. 223 0 means that the host will not accept any fragmented packets for the VNET.
|
H A D | inet6.4 | 232 Integer: maximum number of fragmented packets the node will accept and 234 0 means that the node will not accept any fragmented packets for that VNET. 241 Fragmented packets are hashed to buckets.
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 70-test_sslrecords.t | 69 #Test 4: Injecting a fragmented fatal alert should fail. We expect the server to 70 # send back an alert of its own because it cannot handle fragmented 78 ok($fatal_alert, "Fragmented alert records test"); 124 ok(TLSProxy::Message->success(), "Fragmented ClientHello in TLSv1.2 test"); 134 ok(TLSProxy::Message->fail(), "Fragmented ClientHello in TLSv1.2/SSLv2 test"); 236 #Test 19: Sending application data in the middle of a fragmented KeyUpdate 245 #Test 20: Fragmented KeyUpdate. This should succeed. Strictly speaking this
|
/freebsd/sys/netinet6/ |
H A D | frag6.c | 78 * |||||||| fragmented packets 188 "A value of 0 means no fragmented packets will be accepted, while " 207 "Default maximum number of outstanding fragmented IPv6 packets. " 208 "A value of 0 means no fragmented packets will be accepted, while a " 391 * While the sender will use the same value for all of the fragmented packets, 585 * Enforce upper bound on number of fragmented packets in frag6_input() 710 /* Allocate an IPv6 fragement queue entry for this fragmented part. */ in frag6_input() 750 /* Find a fragmented part which begins after this one does. */ in frag6_input() 795 * queue, as we are the most recently active fragmented packet. in frag6_input() 978 * If we are still over the maximum number of fragmented in frag6_slowtimo()
|
/freebsd/sys/contrib/device-tree/Bindings/dma/ |
H A D | qcom_hidma_mgmt.txt | 23 fragmented to multiples of this amount. This parameter is used while 28 fragmented to multiples of this amount. This parameter is used while
|
/freebsd/tests/sys/netinet6/frag6/ |
H A D | frag6_15.py | 62 # Sysctl set to accept maximum 3 segments on a fragmented packet. 83 # Sysctl set to accept maximum 3 segments on a fragmented packet.
|
/freebsd/share/man/man9/ |
H A D | ieee80211_output.9 | 153 .Sh FRAGMENTED FRAMES 161 Fragmented frames are placed
|
/freebsd/sbin/ipf/ipf/ |
H A D | ipfilter.4 | 22 selectively filter fragmented IP packets 53 "short" (fragmented) IP packets with incomplete headers can be filtered
|
/freebsd/share/doc/smm/05.fastfs/ |
H A D | 3.t | 207 and possibly a single fragmented block. 208 If a file system block must be fragmented to obtain 237 The file contains no fragmented blocks (and the last 272 fragmented block expands to a full block.
|
/freebsd/share/doc/smm/03.fsck/ |
H A D | 2.t | 172 and possibly a single fragmented block. 173 If a file system block must be fragmented to obtain
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/pool_checkpoint/ |
H A D | checkpoint_indirect.ksh | 26 # 1. Import pool that's slightly fragmented
|
H A D | checkpoint_big_rewind.ksh | 28 # 1. Import pool that's slightly fragmented
|
/freebsd/sys/contrib/device-tree/Bindings/memory-controllers/ |
H A D | nvidia,tegra20-mc.yaml | 23 fragmented memory pages.
|
/freebsd/usr.bin/systat/ |
H A D | sctp.c | 68 18999999999999 asconf timeouts 999999999999 fragmented 114 L(18, "asconf timeouts"); R(18, "fragmented"); in labelsctp()
|
/freebsd/share/examples/ipfilter/ |
H A D | example.14 | 6 # block any inbound packets on le0 which are fragmented and "too short" to
|