/freebsd/usr.sbin/bluetooth/l2control/ |
H A D | l2cap.c | 145 r.connections = calloc(NG_L2CAP_MAX_CON_NUM, in l2cap_read_connection_list() 147 if (r.connections == NULL) { in l2cap_read_connection_list() 167 bdaddrpr(&r.connections[n].remote), in l2cap_read_connection_list() 168 r.connections[n].con_handle, in l2cap_read_connection_list() 169 ((r.connections[n].flags & NG_L2CAP_CON_OUTGOING)? 'O' : 'I'), in l2cap_read_connection_list() 170 ((r.connections[n].flags & NG_L2CAP_CON_LP_TIMO)? 'L' : ' '), in l2cap_read_connection_list() 171 ((r.connections[n].flags & NG_L2CAP_CON_AUTO_DISCON_TIMO)? 'D' : ' '), in l2cap_read_connection_list() 172 ((r.connections[n].flags & NG_L2CAP_CON_TX)? 'T' : ' '), in l2cap_read_connection_list() 173 ((r.connections[n].flags & NG_L2CAP_CON_RX)? 'R' : ' '), in l2cap_read_connection_list() 174 r.connections[n].pending, in l2cap_read_connection_list() [all …]
|
/freebsd/contrib/ncurses/ncurses/tinfo/ |
H A D | hashed_db.c | 53 static MYCONN *connections; variable 58 while (connections != 0) { in cleanup() 59 _nc_db_close(connections->db); in cleanup() 69 for (p = connections; p != 0; p = p->next) { in find_connection() 84 for (p = connections, q = 0; p != 0; q = p, p = p->next) { in drop_connection() 89 connections = p->next; in drop_connection() 107 p->next = connections; in make_connection() 108 connections = p; in make_connection() 124 if (connections == 0) in _nc_db_open()
|
/freebsd/usr.sbin/bluetooth/hccontrol/ |
H A D | node.c | 282 r.connections = calloc(NG_HCI_MAX_CON_NUM, sizeof(ng_hci_node_con_ep)); in hci_read_connection_list() 283 if (r.connections == NULL) { in hci_read_connection_list() 315 hci_bdaddr2str(&r.connections[n].bdaddr), in hci_read_connection_list() 316 r.connections[n].con_handle, in hci_read_connection_list() 317 (r.connections[n].link_type == NG_HCI_LINK_ACL)? in hci_read_connection_list() 319 r.connections[n].mode, in hci_read_connection_list() 320 (r.connections[n].role == NG_HCI_ROLE_MASTER)? in hci_read_connection_list() 322 hci_encrypt2str(r.connections[n].encryption_mode, 1), in hci_read_connection_list() 323 r.connections[n].pending, in hci_read_connection_list() 324 r.connections[ in hci_read_connection_list() [all...] |
/freebsd/tools/tools/netrate/tcpp/ |
H A D | README | 6 This tool generates large numbers of TCP connections and stuffs lots of data 11 client won't have a listener. The client then proceeds to make connections 12 and send data to the server. Each worker multiplexes many connections at 15 automatically spread the load of new connections across available source 28 -m <maxconnectionsperproc> Maximum simultaneous connections/proc, should 35 This selects server mode, four workers, and at most 1 million TCP connections 41 -C Print connections/second instead of GBps 50 -t <tcpsperproc> How many connections to use per worker 58 use 100,000 TCP connections carrying 100K of data, up to 10,000 simultaneous 60 starting with 192.168.100.101, and all connections will be to the single [all …]
|
/freebsd/contrib/ofed/librdmacm/examples/ |
H A D | cmatose.c | 73 static int connections = 1; variable 270 if (test.conn_index == connections) { in connect_handler() 375 test.nodes = malloc(sizeof *test.nodes * connections); in alloc_nodes() 380 memset(test.nodes, 0, sizeof *test.nodes * connections); in alloc_nodes() 382 for (i = 0; i < connections; i++) { in alloc_nodes() 404 for (i = 0; i < connections; i++) in destroy_nodes() 414 for (i = 0; i < connections; i++) { in poll_cqs() 484 for (i = 0; i < connections && !ret; i++) in migrate_channel() 532 for (i = 0; i < connections; i++) { in run_server() 558 for (i = 0; i < connections; i++) { in run_server() [all …]
|
H A D | cmtime.c | 104 static int connections = 100; variable 170 for (c = 0; c < connections; c++) { in show_perf() 189 max[i] / 1000., min[i], us / connections); in show_perf() 355 nodes = calloc(sizeof *nodes, connections); in alloc_nodes() 361 for (i = 0; i < connections; i++) { in alloc_nodes() 387 for (i = 0; i < connections; i++) { in cleanup_nodes() 513 for (i = 0; i < connections; i++) { in run_client() 528 for (i = 0; i < connections; i++) { in run_client() 547 for (i = 0; i < connections; i++) { in run_client() 565 for (i = 0; i < connections; i++) { in run_client() [all …]
|
H A D | mckey.c | 76 static int connections = 1; variable 380 test.nodes = malloc(sizeof *test.nodes * connections); in alloc_nodes() 385 memset(test.nodes, 0, sizeof *test.nodes * connections); in alloc_nodes() 387 for (i = 0; i < connections; i++) { in alloc_nodes() 406 for (i = 0; i < connections; i++) in destroy_nodes() 416 for (i = 0; i < connections; i++) { in poll_cqs() 491 for (i = 0; i < connections; i++) { in run() 530 for (i = 0; i < connections; i++) { in run() 544 for (i = 0; i < connections; i++) { in run() 577 connections = atoi(optarg); in main() [all …]
|
H A D | udaddy.c | 70 static int connections = 1; variable 292 if (test.conn_index == connections) { in connect_handler() 418 test.nodes = malloc(sizeof *test.nodes * connections); in alloc_nodes() 423 memset(test.nodes, 0, sizeof *test.nodes * connections); in alloc_nodes() 425 for (i = 0; i < connections; i++) { in alloc_nodes() 447 for (i = 0; i < connections; i++) in destroy_nodes() 470 for (i = 0; i < connections; i++) { in poll_cqs() 542 for (i = 0; i < connections; i++) { in run_server() 571 for (i = 0; i < connections; i++) { in run_client() 587 for (i = 0; i < connections; i++) { in run_client() [all …]
|
/freebsd/contrib/netbsd-tests/lib/librumphijack/ |
H A D | netstat.expout | 1 Active Internet connections (including servers) 4 Active Internet6 connections (including servers)
|
/freebsd/share/examples/ipfilter/rules/ |
H A D | nat.eg | 1 # map all tcp connections from 10.1.0.0/16 to 240.1.0.1, changing the source 10 # For example, to redirect FTP connections through this box, to the local ftp
|
H A D | example.11 | 16 # allow any connections to be made, except to BSD print/r-services 22 # allow any connections to be made, except to BSD print/r-services
|
/freebsd/sys/netinet/libalias/ |
H A D | HISTORY | 5 - Host accepts incoming connections for ports 0 to 1023. 12 connections (no more 0 to 1023 restriction). 40 - Accepts FTP data connections from other than 41 port 20. This allows one ftp connections 126 bypass of FTP/IRC DCC data connections. Also added
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | BIO_s_accept.pod | 43 Using accept BIOs, TCP/IP connections can be accepted and data 135 If a server wishes to process multiple connections (as is normally 137 incoming connections. This can be done by waiting for a connection and 144 again which can be used to await further incoming connections. 145 If no further connections will be accepted the B<accept> can 151 connections. This can be resolved by using BIO_pop() (see above) 187 This example accepts two connections on port 4444, sends messages 221 /* Close accept BIO to refuse further connections */ 229 /* Close the two established connections */
|
/freebsd/sbin/natd/samples/ |
H A D | natd.cf.sample | 11 # Incoming connections. Should NEVER be set to "yes" if redirect_port 19 # guarantees successful connections when port numbers conflict 59 # Map connections coming to port 30000 to telnet in my_private_host. 64 # Map connections coming from host.xyz.com to port 30001 to
|
/freebsd/sys/dev/usb/serial/ |
H A D | uvisor.c | 131 } __packed connections[UVISOR_MAX_CONN]; member 162 } __packed connections[UVISOR_MAX_CONN]; member 434 switch (coninfo.connections[i].port_function_id) { in uvisor_init() 452 coninfo.connections[i].port, desc); in uvisor_init() 480 port = pconinfo.connections[0].end_point_info; in uvisor_init() 484 port = pconinfo.connections[0].port; in uvisor_init()
|
/freebsd/usr.sbin/ppp/ |
H A D | README.nat | 64 establish TCP connections and make UDP inquiries (such as domain name 65 service requests) but the connections seem to come from the ppp host 142 Set to "yes" to disable all incoming connections. This just drops 143 connections to, for example, ftp, telnet or web servers. The NAT 144 mechanism prevents these connections. Technically, this option denies 147 all incoming connections to telnetd, ftpd, etc. 176 connections (which don't know the remote port number, though it is 296 PPP host accepts incoming connections for ports 0 to 1023. 302 - Generalised mechanism for handling incoming connections 325 - Accepts FTP data connections from other than [all …]
|
/freebsd/contrib/sendmail/cf/cf/ |
H A D | ucbvax.mc | 41 # local UUCP connections, and our local uucp name 44 # remote UUCP connections, and the machine they are on 87 # handle local UUCP connections in the Berkeley.EDU domain
|
/freebsd/contrib/ntp/sntp/libevent/ |
H A D | evrpc.c | 514 TAILQ_INIT(&pool->connections); in evrpc_pool_new() 556 while ((connection = TAILQ_FIRST(&pool->connections)) != NULL) { in evrpc_pool_free() 557 TAILQ_REMOVE(&pool->connections, connection, next); in evrpc_pool_free() 584 TAILQ_INSERT_TAIL(&pool->connections, connection, next); in evrpc_pool_add_connection() 616 TAILQ_REMOVE(&pool->connections, connection, next); in evrpc_pool_remove_connection() 623 TAILQ_FOREACH(evcon, &pool->connections, next) { in evrpc_pool_set_timeout() 641 TAILQ_FOREACH(connection, &pool->connections, next) { in evrpc_pool_find_connection() 808 EVUTIL_ASSERT(TAILQ_FIRST(&pool->connections) != NULL); in evrpc_make_request()
|
/freebsd/contrib/libevent/ |
H A D | evrpc.c | 514 TAILQ_INIT(&pool->connections); in evrpc_pool_new() 556 while ((connection = TAILQ_FIRST(&pool->connections)) != NULL) { in evrpc_pool_free() 557 TAILQ_REMOVE(&pool->connections, connection, next); in evrpc_pool_free() 584 TAILQ_INSERT_TAIL(&pool->connections, connection, next); in evrpc_pool_add_connection() 616 TAILQ_REMOVE(&pool->connections, connection, next); in evrpc_pool_remove_connection() 623 TAILQ_FOREACH(evcon, &pool->connections, next) { in evrpc_pool_set_timeout() 641 TAILQ_FOREACH(connection, &pool->connections, next) { in evrpc_pool_find_connection() 808 EVUTIL_ASSERT(TAILQ_FIRST(&pool->connections) != NULL); in evrpc_make_request()
|
/freebsd/share/examples/ppp/ |
H A D | ppp.secret.sample | 5 # This file is used to authenticate incoming connections. 12 # This doesn't work for CHAP connections as ppp must have access
|
/freebsd/contrib/tcp_wrappers/ |
H A D | BLURB | 25 receive source-routed connections and are therefore not vulnerable 26 to IP spoofing attacks with source-routed TCP connections.
|
/freebsd/share/dtrace/ |
H A D | tcptrack | 28 * connections including acceptance and refusal of inbound and 29 * outbound connections as well as state changes.
|
/freebsd/share/examples/ipfilter/ |
H A D | firewall.2 | 43 # Block all incoming TCP traffic connections to known services, 50 # Allow incoming TCP connections to ports between 1024 and 5000, as 59 # Now allow various incoming TCP connections to particular hosts, TCP
|
H A D | examples.txt | 155 present in the packet header. For example, to allow telnet connections 214 # allow any connections to be made, except to BSD print/r-services 226 # allow any connections to be made, except to BSD print/r-services 257 A more useful flag to filter on, for TCP connections, I find, is the SYN 261 So, if I want to stop connections being made to my internal network 321 shut down all connections between the two hosts for which the ICMP error is 332 # block all incoming TCP connections but send back a TCP-RST for ones to 393 # Keep state for all outgoing telnet connections 426 # map all tcp connections from 10.1.0.0/16 to 240.1.0.1, changing the source 445 # For example, to redirect FTP connections through this box (in this case ed0 [all …]
|
/freebsd/sys/netgraph/bluetooth/include/ |
H A D | ng_btsocket.h | 155 ng_hci_node_con_ep *connections; member 301 ng_l2cap_node_con_ep *connections; member
|