/dports/security/nmap/nmap-7.91/ |
H A D | services.cc | 339 for (i=0; i<ptsdata->tcp_count; i++) in is_port_member() 425 ports->tcp_count++; in gettoppts() 435 if (ports->tcp_count) in gettoppts() 436 ports->tcp_ports = (unsigned short *)safe_zalloc(ports->tcp_count * sizeof(unsigned short)); in gettoppts() 466 ports->tcp_count = MIN((int) level, numtcpports); in gettoppts() 467 ports->tcp_ports = (unsigned short *)safe_zalloc(ports->tcp_count * sizeof(unsigned short)); in gettoppts() 484 if (o.TCPScan() && strcmp(current->s_proto, "tcp") == 0 && ti < ports->tcp_count) in gettoppts() 492 if (ti < ports->tcp_count) ports->tcp_count = ti; in gettoppts() 503 if (ports->tcp_count > 1) in gettoppts() 504 qsort(ports->tcp_ports, ports->tcp_count, sizeof(unsigned short), &port_compare); in gettoppts() [all …]
|
H A D | scan_lists.cc | 158 ports->tcp_count = 0; in getpts() 164 ports->tcp_count++; in getpts() 173 …if (range_type != 0 && 0 == (ports->tcp_count + ports->udp_count + ports->sctp_count + ports->prot… in getpts() 176 if (ports->tcp_count) { in getpts() 177 ports->tcp_ports = (unsigned short *)safe_zalloc(ports->tcp_count * sizeof(unsigned short)); in getpts()
|
H A D | scan_lists.h | 90 int tcp_count; member
|
H A D | output.cc | 1140 int tcpportsscanned = ports->tcp_count; in output_ports_to_machine_parseable_output() 1244 doscaninfo("syn", "tcp", scanlist->tcp_ports, scanlist->tcp_count); in output_xml_scaninfo_records() 1246 doscaninfo("ack", "tcp", scanlist->tcp_ports, scanlist->tcp_count); in output_xml_scaninfo_records() 1248 doscaninfo("bounce", "tcp", scanlist->tcp_ports, scanlist->tcp_count); in output_xml_scaninfo_records() 1250 doscaninfo("connect", "tcp", scanlist->tcp_ports, scanlist->tcp_count); in output_xml_scaninfo_records() 1252 doscaninfo("null", "tcp", scanlist->tcp_ports, scanlist->tcp_count); in output_xml_scaninfo_records() 1254 doscaninfo("xmas", "tcp", scanlist->tcp_ports, scanlist->tcp_count); in output_xml_scaninfo_records() 1256 doscaninfo("window", "tcp", scanlist->tcp_ports, scanlist->tcp_count); in output_xml_scaninfo_records() 1258 doscaninfo("maimon", "tcp", scanlist->tcp_ports, scanlist->tcp_count); in output_xml_scaninfo_records() 1260 doscaninfo("fin", "tcp", scanlist->tcp_ports, scanlist->tcp_count); in output_xml_scaninfo_records()
|
H A D | nmap.cc | 1641 if ((o.TCPScan()) && ports.tcp_count == 0) in apply_delayed_options() 1976 PortList::initializePortMap(IPPROTO_TCP, ports.tcp_ports, ports.tcp_count); in nmap_main() 1983 if (ports.tcp_count) { in nmap_main() 1984 shortfry(ports.tcp_ports, ports.tcp_count); in nmap_main() 1986 random_port_cheat(ports.tcp_ports, ports.tcp_count); in nmap_main() 2188 ports.tcp_count, o.idleProxy, &ports); in nmap_main() 2198 bounce_scan(Targets[targetno], ports.tcp_ports, ports.tcp_count, &ftp); in nmap_main()
|
H A D | scan_engine.cc | 981 numprobes = ports->tcp_count; in numProbesPerHost() 1244 groupsize = MAX(1024 / (ports->tcp_count ? ports->tcp_count : 1), 64); in determineScanGroupSize() 1245 if (ports->tcp_count > 1000 && o.timing_level <= 4) { in determineScanGroupSize() 1295 if (hss->next_portidx >= USI->ports->tcp_count) in get_next_target_probe() 1473 if (next_portidx >= USI->ports->tcp_count) in freshPortsLeft() 1475 return USI->ports->tcp_count - next_portidx; in freshPortsLeft()
|
/dports/dns/getdns/getdns-1.5.2/src/test/ |
H A D | check_getdns_transport.c | 70 int tcp_count; member 87 int tcp_count = 0; in run_transport_server() local 136 tcp_count++; in run_transport_server() 204 tdata->tcp_count = tcp_count; in run_transport_server() 239 t_data.tcp_count = 0; in START_TEST() 287 ck_assert_msg(t_data.tcp_count == 0, "tcp_count != 0"); in START_TEST() 313 t_data.tcp_count = 0; in START_TEST() 361 ck_assert_msg(t_data.tcp_count >= 1, "tcp_count !>= 1"); in START_TEST() 387 t_data.tcp_count = 0; in START_TEST() 439 ck_assert_msg(t_data.tcp_count == 0, "tcp_count != 0"); in START_TEST() [all …]
|
/dports/dns/dnsflood/dns_flood_detector_1.2/ |
H A D | dns_flood_detector.c | 235 …rintf(datalet,MAXDATALET,"\"%s\":%d,",inet_ntoa(bb[i]->ip_addr),bb[i]->udp_count+bb[i]->tcp_count); in saddr_stats() 319 bb[i]->qps = (u_int)ceil( (bb[i]->tcp_count + bb[i]->udp_count) / (float)delta); in calculate_averages() 332 (u_int)ceil( ((float)bb[i]->tcp_count/delta)), in calculate_averages() 359 (u_int)ceil( ((float)bb[i]->tcp_count/delta)), in calculate_averages() 378 (u_int)ceil( ((float)bb[i]->tcp_count/delta)), in calculate_averages() 397 …printf("[%s] totals - %3.2f qps tcp : %3.2f qps udp ",st_time, ((float)bb[totals]->tcp_count/delta… in calculate_averages() 415 ((float)bb[totals]->tcp_count/delta), in calculate_averages() 434 ((float)bb[totals]->tcp_count/delta), in calculate_averages() 474 bb[i]->tcp_count=0; in scour_bucket() 499 bb[bucket]->tcp_count+=num_queries; in add_to_bucket() [all …]
|
H A D | dns_flood_detector.h | 71 unsigned int tcp_count; member
|
/dports/games/powwow/powwow-1.2.17/ |
H A D | tcp.c | 58 int tcp_count = 0; /* number of open connections */ variable 748 int i = tcp_count+tcp_attachcount; in __P0() 793 if (tcp_count+tcp_attachcount >= MAX_CONNECTS) { in __P4() 842 tcp_count++; in __P4() 844 if (opt_info && tcp_count) { in __P4() 888 if (tcp_count == 1) { /* was last connection */ in __P1() 918 tcp_count--; in __P1()
|
H A D | tcp.h | 10 extern int tcp_count; /* number of open connections */
|
H A D | main.c | 554 if (tcp_count > 1 || tcp_attachcount) { in __P0()
|
/dports/net-mgmt/nfdump/nfdump-1.6.20/bin/ |
H A D | pcap_reader.c | 64 static uint32_t tcp_count, udp_count, arp_count, unknow_count; variable 217 tcp_count++; in decode_packet()
|
/dports/dns/opendnssec2/opendnssec-2.1.10/signer/src/wire/ |
H A D | tcpset.h | 71 size_t tcp_count; member
|
H A D | tcpset.c | 73 tcp_set->tcp_count = 0; in tcp_set_create()
|
H A D | xfrd.c | 1424 if (set->tcp_count < TCPSET_MAX) { in xfrd_tcp_obtain() 1426 set->tcp_count ++; in xfrd_tcp_obtain() 1595 set->tcp_count --; in xfrd_tcp_release() 1600 while (xfrhandler->tcp_waiting_first && set->tcp_count < TCPSET_MAX) { in xfrd_tcp_release() 1610 set->tcp_count++; in xfrd_tcp_release()
|
/dports/dns/nsd/nsd-4.3.9/ |
H A D | xfrd-tcp.c | 165 tcp_set->tcp_count = 0; in xfrd_tcp_set_create() 541 if(set->tcp_count < XFRD_MAX_TCP) { in xfrd_tcp_obtain() 544 set->tcp_count ++; in xfrd_tcp_obtain() 566 set->tcp_count --; in xfrd_tcp_obtain() 1449 while(set->tcp_count == XFRD_MAX_TCP && set->tcp_waiting_first) { in xfrd_tcp_pipe_release() 1490 set->tcp_count --; in xfrd_tcp_pipe_release() 1491 assert(set->tcp_count >= 0); in xfrd_tcp_pipe_release()
|
H A D | xfrd-tcp.h | 37 int tcp_count; member
|
H A D | options.h | 88 int tcp_count; member
|
H A D | nsd-checkconf.c | 431 SERV_GET_INT(tcp_count, o); in config_print_zone() 579 printf("\ttcp-count: %d\n", opt->tcp_count); in config_test_print_server()
|
H A D | configparser.y | 315 cfg_parser->opt->tcp_count = (int)$2;
|
H A D | nsd.c | 1134 nsd.maximum_tcp_count = nsd.options->tcp_count; in main()
|
/dports/net-mgmt/pmacct/pmacct-1.7.5/src/ndpi/ |
H A D | ndpi.h | 79 u_int64_t tcp_count, udp_count; member
|
/dports/net/ndpi/nDPI-92a1be2/example/ |
H A D | reader_util.h | 260 u_int64_t tcp_count, udp_count; member
|
H A D | ndpiReader.c | 2925 cumulative_stats.tcp_count += ndpi_thread_info[thread_id].workflow->stats.tcp_count; in printResults() 2967 printf("\tTCP Packets: %-13lu\n", (unsigned long)cumulative_stats.tcp_count); in printResults()
|