Home
last modified time | relevance | path

Searched full:tftp (Results 1 – 25 of 246) sorted by relevance

12345678910

/external/curl/docs/cmdline-opts/
Dtftp-no-options.md4 Long: tftp-no-options
5 Help: Do not send any TFTP options
6 Protocols: TFTP
8 Category: tftp
11 - tftp-blksize
13 - --tftp-no-options tftp://192.168.0.1/
16 # `--tftp-no-options`
18 Do not to send TFTP options requests. This improves interop with some legacy
19 servers that do not acknowledge or properly implement TFTP options. When this
20 option is used --tftp-blksize is ignored.
Dtftp-blksize.md4 Long: tftp-blksize
6 Help: Set TFTP BLKSIZE option
7 Protocols: TFTP
9 Category: tftp
12 - tftp-no-options
14 - --tftp-blksize 1024 tftp://example.com/file
17 # `--tftp-blksize`
19 Set the TFTP **BLKSIZE** option (must be 512 or larger). This is the block
20 size that curl tries to use when transferring data to or from a TFTP
/external/scapy/scapy/layers/
Dtftp.py7 TFTP (Trivial File Transfer Protocol).
25 class TFTP(Packet): class
26 name = "TFTP opcode"
31 name = "TFTP Read Request"
43 name = "TFTP Write Request"
55 name = "TFTP Data"
78 name = "TFTP Ack"
96 4: "Illegal TFTP operation",
105 name = "TFTP Error"
117 name = "TFTP Option Ack"
[all …]
/external/curl/tests/data/
Dtest2864 TFTP
5 TFTP WRQ
13 tftp
16 TFTP send of boundary case 512 byte file
19 -T %LOGDIR/test%TESTNUMBER.txt tftp://%HOSTIP:%TFTPPORT//
23 a 512 byte TFTP block, testing a boundary
24 condition in the TFTP transmit code.
58 a 512 byte TFTP block, testing a boundary
59 condition in the TFTP transmit code.
Dtest20044 TFTP
5 TFTP RRQ
18 for tftp test
26 tftp
30 TFTP RRQ followed by SFTP retrieval followed by FILE followed by SCP retrieval then again in revers…
33tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER sftp://%HOSTIP:%SSHPORT%SSH_PWD/%LOGDIR/test%TESTNUMBER.txt …
61 for tftp test
73 for tftp test
Dtest12384 TFTP
5 TFTP RRQ
28 tftp
30 # Always kill the TFTP server to not affect following tests, due
31 # to this test potentially keeping the TFTP server busy waiting
36 tftp
39 slow TFTP retrieve cancel due to -Y and -y
43 tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER -Y1000 -y2
Dtest12424 TFTP
5 TFTP RRQ
24 tftp
27 TFTP retrieve without TFTP options requests
30 tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER --tftp-no-options
Dtest12434 TFTP
5 TFTP WRQ
13 tftp
16 TFTP send without TFTP options requests
19 -T %LOGDIR/test%TESTNUMBER.txt tftp://%HOSTIP:%TFTPPORT// --tftp-no-options
Dtest20039 TFTP
10 TFTP RRQ
44 to TFTP client
55 tftp
58 HTTP GET followed by FTP RETR followed by FILE followed by TFTP RRQ then again in reverse order
61 …ile://localhost%FILE_PWD/%LOGDIR/test%TESTNUMBER.txt tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER0003 tft…
130 to TFTP client
134 to TFTP client
Dtest2844 TFTP
5 TFTP RRQ
14 a 512 byte TFTP block, testing a boundary
15 condition in the TFTP receive code.
48 tftp
51 TFTP retrieve of boundary case 512 byte file
54 tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER
Dtest2834 TFTP
5 TFTP RRQ
14 tftp
17 TFTP retrieve on invalid file
20 tftp://%HOSTIP:%TFTPPORT//invalid-file --tftp-blksize 1024
Dtest3324 TFTP
5 TFTP RRQ
23 tftp
26 TFTP retrieve with blksize 400
29 tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER --tftp-blksize 400
Dtest10074 TFTP
5 TFTP WRQ
14 tftp
17 TFTP send with invalid permission on server
20 -T %LOGDIR/test%TESTNUMBER.txt tftp://%HOSTIP:%TFTPPORT//invalid-file -sS
44 curl: (69) TFTP: Access Violation
Dtest10994 TFTP
5 TFTP RRQ
20 tftp
23 TFTP get first a non-existing file then an existing
26 tftp://%HOSTIP:%TFTPPORT/an/invalid-file tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER
Dtest20029 TFTP
10 TFTP RRQ
44 to TFTP client
55 tftp
58 HTTP GET followed by FTP RETR followed by FILE followed by TFTP RRQ
61 …ORT/%TESTNUMBER0002 file://localhost%FILE_PWD/%LOGDIR/test%TESTNUMBER.txt tftp://%HOSTIP:%TFTPPORT…
117 to TFTP client
Dtest14534 Too long tftp filename
20 tftp
23 Too long tftp filename
26 tftp://%HOSTIP:%NOLISTENPORT/aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa…
33 # TFTP file name too long
Dtest2714 TFTP
5 TFTP RRQ
24 tftp
27 TFTP retrieve
30 tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER
Dtest10934 TFTP
5 TFTP RRQ
25 tftp
28 TFTP retrieve with mode=i
31 "tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER;mode=i" --use-ascii
Dtest10944 TFTP
5 TFTP RRQ
31 tftp
34 TFTP retrieve with mode=netascii
37 "tftp://%HOSTIP:%TFTPPORT//%TESTNUMBER;mode=netascii"
/external/tcpdump/tests/
Dtftp-T.out1 …1 2015-06-04 12:31:53.718074 IP 192.168.1.2.44935 > 192.168.1.1.69: TFTP, length 14, RRQ "file1" …
2 …2 2015-06-04 12:31:53.732442 IP 192.168.1.1.59557 > 192.168.1.2.44935: TFTP, length 516, DATA blo…
3 …3 2015-06-04 12:31:53.732956 IP 192.168.1.2.44935 > 192.168.1.1.59557: TFTP, length 4, ACK block 1
4 …4 2015-06-04 12:31:53.733217 IP 192.168.1.1.59557 > 192.168.1.2.44935: TFTP, length 516, DATA blo…
5 …5 2015-06-04 12:31:53.733497 IP 192.168.1.2.44935 > 192.168.1.1.59557: TFTP, length 4, ACK block 2
6 …6 2015-06-04 12:31:53.733527 IP 192.168.1.1.59557 > 192.168.1.2.44935: TFTP, length 109, DATA blo…
7 …7 2015-06-04 12:31:53.733706 IP 192.168.1.2.44935 > 192.168.1.1.59557: TFTP, length 4, ACK block 3
/external/scapy/test/
Dtftp.uts1 % Regression tests for TFTP
5 + TFTP coverage tests
19 + TFTP Automatons
121 packets = [IP(dst="1.2.3.4") / UDP(dport=0x2807) / TFTP() / TFTP_WRQ(filename="scapy.txt"),
122 IP(dst="1.2.3.4") / UDP(dport=0x2807) / TFTP() / TFTP_DATA(block=1) / ("P" * 512),
123 IP(dst="1.2.3.4") / UDP(dport=0x2807) / TFTP() / TFTP_DATA(block=2) / "<3"]
134 …packets = [IP(dst="1.2.3.4") / UDP(dport=0x2807) / TFTP() / TFTP_WRQ(filename="scapy.txt") / TFTP_…
135 IP(dst="1.2.3.4") / UDP(dport=0x2807) / TFTP() / TFTP_DATA(block=1) / ("P" * 100),
136 IP(dst="1.2.3.4") / UDP(dport=0x2807) / TFTP() / TFTP_DATA(block=2) / "<3"]
156 …packets = [IP(dst="1.2.3.4") / UDP(dport=0x2807) / TFTP() / TFTP_RRQ(filename="scapy.txt") / TFTP_…
[all …]
/external/iputils/doc/
Dtftpd.sgml26 The TFTP server is started
33 via TFTP protocol, effectively chrooting <command/tftpd/ to this directory.
45 And second, TFTP protocol is not a tool for browsing of server's filesystem,
53 tftp directories in these services should coincide and it is expected
54 that each client booted via TFTP has boot image corresponding
65 TFTP protocol does not provide any authentication.
73 Impact is evident, directory exported via TFTP <emphasis/must not/
77 publishing f.e. Cisco IOS config files via TFTP, they contain
85 access to files published in tftp directory. If it is executed
89 for everyone can be read or written via TFTP.
[all …]
/external/mesa3d/.gitlab-ci/bare-metal/
Dcros-servo.sh7 # NFS and TFTP to boot.
32 if [ ! -d /tftp ]; then
33 echo "TFTP directory for this board needs to be mounted at /tftp by the gitlab runner"
69 # Put the kernel/dtb image and the boot command line in the tftp directory for
89 rm -rf /tftp/*
92 $BM_KERNEL -o /tftp/vmlinuz
95 "${FDO_HTTP_CACHE_URI:-}${KERNEL_IMAGE_BASE}/${DEBIAN_ARCH}/${BM_KERNEL}" -o /tftp/vmlinuz
101 cp /baremetal-files/"$BM_KERNEL" /tftp/vmlinuz
103 echo "$BM_CMDLINE" > /tftp/cmdline
Dpoe-powered.sh53 if [ ! -d /tftp ]; then
54 echo "TFTP directory for this board needs to be mounted at /tftp by the gitlab runner"
65 echo "Must set /boot files for the TFTP boot in the job's variables or set kernel and dtb"
140 mv "${BM_KERNEL}" "${BM_DTB}.dtb" /tftp/
142 rsync -aL --delete $BM_BOOTFS/boot/ /tftp/
148 mkdir -p /tftp/pxelinux.cfg
149 cat <<EOF >/tftp/pxelinux.cfg/default-arm-tegra210-p3450-0000
155 MENU LABEL CI kernel on TFTP
162 cat <<EOF >/tftp/pxelinux.cfg/default-arm-tegra124-jetson-tk1
168 MENU LABEL CI kernel on TFTP
[all …]
/external/curl/docs/libcurl/opts/
DCURLOPT_TFTP_NO_OPTIONS.md10 - TFTP
16 CURLOPT_TFTP_NO_OPTIONS - send no TFTP options requests
28 Set *onoff* to 1L to exclude all TFTP options defined in RFC 2347,
32 acknowledge or properly implement TFTP options. When this option is used
58 curl_easy_setopt(curl, CURLOPT_URL, "tftp://example.com/foo.bin");
60 /* do not send TFTP options requests */

12345678910