/netbsd/external/cddl/dtracetoolkit/dist/Examples/ |
H A D | udpstat_example.txt | 6 outbound, followed by a spray inbound. Both can be identified in the 25 Here we run udpstat.d while an outbound DNS lookup is performed using 38 one outbound and one inbound datagram.
|
/netbsd/external/cddl/dtracetoolkit/dist/Docs/Examples/ |
H A D | udpstat_example.txt | 6 outbound, followed by a spray inbound. Both can be identified in the 25 Here we run udpstat.d while an outbound DNS lookup is performed using 38 one outbound and one inbound datagram.
|
/netbsd/external/bsd/libpcap/dist/doc/ |
H A D | README.hpux | 27 >must me "patched" (poked) in order to see outbound data in promiscuous mode. 65 At that point, a miracle happens and you should start seeing outbound 89 > outbound traffic. 95 outbound traffic too. Thanks again. 116 Another option is to upgrade to 11i as outbound promiscuous mode support 144 If you want to see the system's own outbound traffic, you'll never get 151 outbound traffic did happen). 153 Rick Jones reports that HP-UX 11i needs no patches for outbound 166 To trace the outbound packets, please do the following
|
/netbsd/dist/pf/share/pf/ |
H A D | faq-example3 | 95 # filter rules for fxp0 outbound 106 # filter rules for dc0 outbound 112 # filter rules for fxp1 outbound
|
H A D | faq-example2 | 64 # filter rules for fxp0 outbound 80 # filter rules for dc0 outbound
|
/netbsd/external/bsd/unbound/dist/dns64/ |
H A D | dns64.h | 60 struct outbound_entry* outbound);
|
/netbsd/external/bsd/unbound/dist/ipset/ |
H A D | ipset.h | 59 int id, struct outbound_entry* outbound);
|
H A D | ipset.c | 292 struct outbound_entry *outbound) { in ipset_operate() argument 323 if (iq && outbound) { in ipset_operate()
|
/netbsd/external/bsd/unbound/dist/ipsecmod/ |
H A D | ipsecmod.h | 82 int id, struct outbound_entry* outbound);
|
/netbsd/external/bsd/unbound/dist/cachedb/ |
H A D | cachedb.h | 98 int id, struct outbound_entry* outbound);
|
/netbsd/external/bsd/unbound/dist/testdata/stat_values.tdir/ |
H A D | stat_values.conf | 14 outbound-msg-retry: 0
|
/netbsd/external/bsd/unbound/dist/pythonmod/ |
H A D | pythonmod.h | 59 int id, struct outbound_entry* outbound);
|
/netbsd/external/bsd/unbound/dist/testdata/ |
H A D | fwd_error_retries.rpl | 3 outbound-msg-retry: 1
|
H A D | fwd_timeout.rpl | 12 ; outbound-msg-retry times timeout.
|
H A D | fwd_error.rpl | 12 ; This is util/config_file.c outbound-msg-retry number of errors.
|
H A D | edns_attached_once_per_upstream.rpl | 4 outbound-msg-retry: 1
|
/netbsd/external/bsd/unbound/dist/validator/ |
H A D | validator.h | 241 struct outbound_entry* outbound);
|
/netbsd/external/bsd/unbound/dist/dynlibmod/ |
H A D | dynlibmod.c | 179 int id, struct outbound_entry* outbound) { in dynlibmod_operate() argument 182 de->func_operate(qstate, event, id, outbound); in dynlibmod_operate()
|
H A D | dynlibmod.h | 58 int id, struct outbound_entry* outbound);
|
/netbsd/external/ibm-public/postfix/dist/src/smtpstone/ |
H A D | hashed-deferred | 2 outbound concurrency 10. smtp-sink pipelining disabled. Machine is
|
/netbsd/external/bsd/unbound/dist/edns-subnet/ |
H A D | subnetmod.h | 117 int id, struct outbound_entry* outbound);
|
/netbsd/external/bsd/ipf/dist/rules/ |
H A D | example.3 | 24 # block all outbound packets.
|
/netbsd/external/bsd/unbound/dist/iterator/ |
H A D | iterator.h | 481 struct outbound_entry* outbound);
|
/netbsd/external/bsd/unbound/dist/util/ |
H A D | fptr_wlist.h | 288 enum module_ev event, int id, struct outbound_entry* outbound));
|
/netbsd/external/bsd/unbound/dist/respip/ |
H A D | respip.h | 205 struct outbound_entry* outbound);
|