Searched full:tftp (Results 1 – 25 of 246) sorted by relevance
12345678910
| /external/curl/docs/cmdline-opts/ |
| D | tftp-no-options.md | 4 Long: tftp-no-options 5 Help: Do not send any TFTP options 6 Protocols: TFTP 8 Category: tftp 11 - tftp-blksize 13 - --tftp-no-options tftp://192.168.0.1/ 16 # `--tftp-no-options` 18 Do not to send TFTP options requests. This improves interop with some legacy 19 servers that do not acknowledge or properly implement TFTP options. When this 20 option is used --tftp-blksize is ignored.
|
| D | tftp-blksize.md | 4 Long: tftp-blksize 6 Help: Set TFTP BLKSIZE option 7 Protocols: TFTP 9 Category: tftp 12 - tftp-no-options 14 - --tftp-blksize 1024 tftp://example.com/file 17 # `--tftp-blksize` 19 Set the TFTP **BLKSIZE** option (must be 512 or larger). This is the block 20 size that curl tries to use when transferring data to or from a TFTP
|
| /external/scapy/scapy/layers/ |
| D | tftp.py | 7 TFTP (Trivial File Transfer Protocol). 25 class TFTP(Packet): class 26 name = "TFTP opcode" 31 name = "TFTP Read Request" 43 name = "TFTP Write Request" 55 name = "TFTP Data" 78 name = "TFTP Ack" 96 4: "Illegal TFTP operation", 105 name = "TFTP Error" 117 name = "TFTP Option Ack" [all …]
|
| /external/curl/tests/data/ |
| D | test286 | 4 TFTP 5 TFTP WRQ 13 tftp 16 TFTP send of boundary case 512 byte file 19 -T %LOGDIR/test%TESTNUMBER.txt tftp://%HOSTIP:%TFTPPORT// 23 a 512 byte TFTP block, testing a boundary 24 condition in the TFTP transmit code. 58 a 512 byte TFTP block, testing a boundary 59 condition in the TFTP transmit code.
|
| D | test2004 | 4 TFTP 5 TFTP RRQ 18 for tftp test 26 tftp 30 TFTP RRQ followed by SFTP retrieval followed by FILE followed by SCP retrieval then again in revers… 33 …tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER sftp://%HOSTIP:%SSHPORT%SSH_PWD/%LOGDIR/test%TESTNUMBER.txt … 61 for tftp test 73 for tftp test
|
| D | test1238 | 4 TFTP 5 TFTP RRQ 28 tftp 30 # Always kill the TFTP server to not affect following tests, due 31 # to this test potentially keeping the TFTP server busy waiting 36 tftp 39 slow TFTP retrieve cancel due to -Y and -y 43 tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER -Y1000 -y2
|
| D | test1242 | 4 TFTP 5 TFTP RRQ 24 tftp 27 TFTP retrieve without TFTP options requests 30 tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER --tftp-no-options
|
| D | test1243 | 4 TFTP 5 TFTP WRQ 13 tftp 16 TFTP send without TFTP options requests 19 -T %LOGDIR/test%TESTNUMBER.txt tftp://%HOSTIP:%TFTPPORT// --tftp-no-options
|
| D | test2003 | 9 TFTP 10 TFTP RRQ 44 to TFTP client 55 tftp 58 HTTP GET followed by FTP RETR followed by FILE followed by TFTP RRQ then again in reverse order 61 …ile://localhost%FILE_PWD/%LOGDIR/test%TESTNUMBER.txt tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER0003 tft… 130 to TFTP client 134 to TFTP client
|
| D | test284 | 4 TFTP 5 TFTP RRQ 14 a 512 byte TFTP block, testing a boundary 15 condition in the TFTP receive code. 48 tftp 51 TFTP retrieve of boundary case 512 byte file 54 tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER
|
| D | test283 | 4 TFTP 5 TFTP RRQ 14 tftp 17 TFTP retrieve on invalid file 20 tftp://%HOSTIP:%TFTPPORT//invalid-file --tftp-blksize 1024
|
| D | test332 | 4 TFTP 5 TFTP RRQ 23 tftp 26 TFTP retrieve with blksize 400 29 tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER --tftp-blksize 400
|
| D | test1007 | 4 TFTP 5 TFTP WRQ 14 tftp 17 TFTP send with invalid permission on server 20 -T %LOGDIR/test%TESTNUMBER.txt tftp://%HOSTIP:%TFTPPORT//invalid-file -sS 44 curl: (69) TFTP: Access Violation
|
| D | test1099 | 4 TFTP 5 TFTP RRQ 20 tftp 23 TFTP get first a non-existing file then an existing 26 tftp://%HOSTIP:%TFTPPORT/an/invalid-file tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER
|
| D | test2002 | 9 TFTP 10 TFTP RRQ 44 to TFTP client 55 tftp 58 HTTP GET followed by FTP RETR followed by FILE followed by TFTP RRQ 61 …ORT/%TESTNUMBER0002 file://localhost%FILE_PWD/%LOGDIR/test%TESTNUMBER.txt tftp://%HOSTIP:%TFTPPORT… 117 to TFTP client
|
| D | test1453 | 4 Too long tftp filename 20 tftp 23 Too long tftp filename 26 tftp://%HOSTIP:%NOLISTENPORT/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa… 33 # TFTP file name too long
|
| D | test271 | 4 TFTP 5 TFTP RRQ 24 tftp 27 TFTP retrieve 30 tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER
|
| D | test1093 | 4 TFTP 5 TFTP RRQ 25 tftp 28 TFTP retrieve with mode=i 31 "tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER;mode=i" --use-ascii
|
| D | test1094 | 4 TFTP 5 TFTP RRQ 31 tftp 34 TFTP retrieve with mode=netascii 37 "tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER;mode=netascii"
|
| /external/tcpdump/tests/ |
| D | tftp-T.out | 1 …1 2015-06-04 12:31:53.718074 IP 192.168.1.2.44935 > 192.168.1.1.69: TFTP, length 14, RRQ "file1" … 2 …2 2015-06-04 12:31:53.732442 IP 192.168.1.1.59557 > 192.168.1.2.44935: TFTP, length 516, DATA blo… 3 …3 2015-06-04 12:31:53.732956 IP 192.168.1.2.44935 > 192.168.1.1.59557: TFTP, length 4, ACK block 1 4 …4 2015-06-04 12:31:53.733217 IP 192.168.1.1.59557 > 192.168.1.2.44935: TFTP, length 516, DATA blo… 5 …5 2015-06-04 12:31:53.733497 IP 192.168.1.2.44935 > 192.168.1.1.59557: TFTP, length 4, ACK block 2 6 …6 2015-06-04 12:31:53.733527 IP 192.168.1.1.59557 > 192.168.1.2.44935: TFTP, length 109, DATA blo… 7 …7 2015-06-04 12:31:53.733706 IP 192.168.1.2.44935 > 192.168.1.1.59557: TFTP, length 4, ACK block 3
|
| /external/scapy/test/ |
| D | tftp.uts | 1 % Regression tests for TFTP 5 + TFTP coverage tests 19 + TFTP Automatons 121 packets = [IP(dst="1.2.3.4") / UDP(dport=0x2807) / TFTP() / TFTP_WRQ(filename="scapy.txt"), 122 IP(dst="1.2.3.4") / UDP(dport=0x2807) / TFTP() / TFTP_DATA(block=1) / ("P" * 512), 123 IP(dst="1.2.3.4") / UDP(dport=0x2807) / TFTP() / TFTP_DATA(block=2) / "<3"] 134 …packets = [IP(dst="1.2.3.4") / UDP(dport=0x2807) / TFTP() / TFTP_WRQ(filename="scapy.txt") / TFTP_… 135 IP(dst="1.2.3.4") / UDP(dport=0x2807) / TFTP() / TFTP_DATA(block=1) / ("P" * 100), 136 IP(dst="1.2.3.4") / UDP(dport=0x2807) / TFTP() / TFTP_DATA(block=2) / "<3"] 156 …packets = [IP(dst="1.2.3.4") / UDP(dport=0x2807) / TFTP() / TFTP_RRQ(filename="scapy.txt") / TFTP_… [all …]
|
| /external/iputils/doc/ |
| D | tftpd.sgml | 26 The TFTP server is started 33 via TFTP protocol, effectively chrooting <command/tftpd/ to this directory. 45 And second, TFTP protocol is not a tool for browsing of server's filesystem, 53 tftp directories in these services should coincide and it is expected 54 that each client booted via TFTP has boot image corresponding 65 TFTP protocol does not provide any authentication. 73 Impact is evident, directory exported via TFTP <emphasis/must not/ 77 publishing f.e. Cisco IOS config files via TFTP, they contain 85 access to files published in tftp directory. If it is executed 89 for everyone can be read or written via TFTP. [all …]
|
| /external/mesa3d/.gitlab-ci/bare-metal/ |
| D | cros-servo.sh | 7 # NFS and TFTP to boot. 32 if [ ! -d /tftp ]; then 33 echo "TFTP directory for this board needs to be mounted at /tftp by the gitlab runner" 69 # Put the kernel/dtb image and the boot command line in the tftp directory for 89 rm -rf /tftp/* 92 $BM_KERNEL -o /tftp/vmlinuz 95 "${FDO_HTTP_CACHE_URI:-}${KERNEL_IMAGE_BASE}/${DEBIAN_ARCH}/${BM_KERNEL}" -o /tftp/vmlinuz 101 cp /baremetal-files/"$BM_KERNEL" /tftp/vmlinuz 103 echo "$BM_CMDLINE" > /tftp/cmdline
|
| D | poe-powered.sh | 53 if [ ! -d /tftp ]; then 54 echo "TFTP directory for this board needs to be mounted at /tftp by the gitlab runner" 65 echo "Must set /boot files for the TFTP boot in the job's variables or set kernel and dtb" 140 mv "${BM_KERNEL}" "${BM_DTB}.dtb" /tftp/ 142 rsync -aL --delete $BM_BOOTFS/boot/ /tftp/ 148 mkdir -p /tftp/pxelinux.cfg 149 cat <<EOF >/tftp/pxelinux.cfg/default-arm-tegra210-p3450-0000 155 MENU LABEL CI kernel on TFTP 162 cat <<EOF >/tftp/pxelinux.cfg/default-arm-tegra124-jetson-tk1 168 MENU LABEL CI kernel on TFTP [all …]
|
| /external/curl/docs/libcurl/opts/ |
| D | CURLOPT_TFTP_NO_OPTIONS.md | 10 - TFTP 16 CURLOPT_TFTP_NO_OPTIONS - send no TFTP options requests 28 Set *onoff* to 1L to exclude all TFTP options defined in RFC 2347, 32 acknowledge or properly implement TFTP options. When this option is used 58 curl_easy_setopt(curl, CURLOPT_URL, "tftp://example.com/foo.bin"); 60 /* do not send TFTP options requests */
|
12345678910