Home
last modified time | relevance | path

Searched full:tcp (Results 1 – 25 of 1789) sorted by relevance

12345678910>>...72

/third_party/iptables/extensions/
Dlibxt_tcp.t2 -p tcp -m tcp --sport 1;=;OK
3 -p tcp -m tcp --sport 65535;=;OK
4 -p tcp -m tcp --dport 1;=;OK
5 -p tcp -m tcp --dport 65535;=;OK
6 -p tcp -m tcp --sport 1:1023;=;OK
7 -p tcp -m tcp --sport 1024:65535;=;OK
8 -p tcp -m tcp --sport 1024:;-p tcp -m tcp --sport 1024:65535;OK
9 -p tcp -m tcp --sport :;-p tcp -m tcp;OK
10 -p tcp -m tcp ! --sport :;-p tcp -m tcp ! --sport 0:65535;OK
11 -p tcp -m tcp --sport :4;-p tcp -m tcp --sport 0:4;OK
[all …]
Dlibxt_tcp.txlate1 iptables-translate -A INPUT -p tcp -i eth0 --sport 53 -j ACCEPT
2 nft 'add rule ip filter INPUT iifname "eth0" tcp sport 53 counter accept'
4 iptables-translate -A OUTPUT -p tcp -o eth0 --dport 53:66 -j DROP
5 nft 'add rule ip filter OUTPUT oifname "eth0" tcp dport 53-66 counter drop'
7 iptables-translate -I OUTPUT -p tcp -d 8.8.8.8 -j ACCEPT
8 nft 'insert rule ip filter OUTPUT ip protocol tcp ip daddr 8.8.8.8 counter accept'
10 iptables-translate -I OUTPUT -p tcp --dport 1020:1023 --sport 53 -j ACCEPT
11 nft 'insert rule ip filter OUTPUT tcp sport 53 tcp dport 1020-1023 counter accept'
13 iptables -A INPUT -p tcp --tcp-flags ACK,FIN FIN -j DROP
14 nft 'add rule ip filter INPUT tcp flags fin / fin,ack counter drop'
[all …]
Dlibxt_DNAT.txlate1 iptables-translate -t nat -A prerouting -p tcp -o eth0 -j DNAT --to-destination 1.2.3.4
2 nft 'add rule ip nat prerouting oifname "eth0" ip protocol tcp counter dnat to 1.2.3.4'
4 iptables-translate -t nat -A prerouting -p tcp -d 15.45.23.67 --dport 80 -j DNAT --to-destination 1…
5 nft 'add rule ip nat prerouting ip daddr 15.45.23.67 tcp dport 80 counter dnat to 192.168.1.1-192.1…
7 iptables-translate -t nat -A prerouting -p tcp -o eth0 -j DNAT --to-destination 1.2.3.4:1-1023
8 nft 'add rule ip nat prerouting oifname "eth0" ip protocol tcp counter dnat to 1.2.3.4:1-1023'
10 iptables-translate -t nat -A prerouting -p tcp -o eth0 -j DNAT --to-destination 1.2.3.4 --random
11 nft 'add rule ip nat prerouting oifname "eth0" ip protocol tcp counter dnat to 1.2.3.4 random'
13 iptables-translate -t nat -A prerouting -p tcp -o eth0 -j DNAT --to-destination 1.2.3.4 --random --…
14 nft 'add rule ip nat prerouting oifname "eth0" ip protocol tcp counter dnat to 1.2.3.4 random,persi…
[all …]
Dlibxt_multiport.txlate1 iptables-translate -t filter -A INPUT -p tcp -m multiport --dports 80,81 -j ACCEPT
2 nft 'add rule ip filter INPUT ip protocol tcp tcp dport { 80, 81 } counter accept'
4 iptables-translate -t filter -A INPUT -p tcp -m multiport --dports 80:88 -j ACCEPT
5 nft 'add rule ip filter INPUT ip protocol tcp tcp dport 80-88 counter accept'
7 iptables-translate -t filter -A INPUT -p tcp -m multiport ! --dports 80:88 -j ACCEPT
8 nft 'add rule ip filter INPUT ip protocol tcp tcp dport != 80-88 counter accept'
10 iptables-translate -t filter -A INPUT -p tcp -m multiport --sports 50 -j ACCEPT
11 nft 'add rule ip filter INPUT ip protocol tcp tcp sport 50 counter accept'
13 iptables-translate -t filter -I INPUT -p tcp -m multiport --ports 10
14 nft 'insert rule ip filter INPUT ip protocol tcp tcp sport . tcp dport { 0-65535 . 10, 10 . 0-65535…
Dlibxt_REDIRECT.txlate1 iptables-translate -t nat -A prerouting -p tcp --dport 80 -j REDIRECT
2 nft 'add rule ip nat prerouting tcp dport 80 counter redirect'
4 iptables-translate -t nat -A prerouting -p tcp --dport 80 -j REDIRECT --to-ports 0
5 nft 'add rule ip nat prerouting tcp dport 80 counter redirect to :0'
7 iptables-translate -t nat -A prerouting -p tcp --dport 80 -j REDIRECT --to-ports 8080
8 nft 'add rule ip nat prerouting tcp dport 80 counter redirect to :8080'
10 iptables-translate -t nat -A prerouting -p tcp --dport 80 -j REDIRECT --to-ports 0-65535
11 nft 'add rule ip nat prerouting tcp dport 80 counter redirect to :0-65535'
13 iptables-translate -t nat -A prerouting -p tcp --dport 80 -j REDIRECT --to-ports 10-22
14 nft 'add rule ip nat prerouting tcp dport 80 counter redirect to :10-22'
[all …]
Dlibipt_ECN.c27 " --ecn-tcp-remove Remove all ECN bits from TCP header\n"); in ECN_help()
33 " --ecn-tcp-cwr Set the IPv4 CWR bit (0 or 1)\n"
34 " --ecn-tcp-ece Set the IPv4 ECE bit (0 or 1)\n",
38 {.name = "ecn-tcp-remove", .id = O_ECN_TCP_REMOVE, .type = XTTYPE_NONE,
40 {.name = "ecn-tcp-cwr", .id = O_ECN_TCP_CWR, .type = XTTYPE_UINT8,
42 {.name = "ecn-tcp-ece", .id = O_ECN_TCP_ECE, .type = XTTYPE_UINT8,
57 einfo->proto.tcp.ece = 0; in ECN_parse()
58 einfo->proto.tcp.cwr = 0; in ECN_parse()
62 einfo->proto.tcp.cwr = cb->val.u8; in ECN_parse()
66 einfo->proto.tcp.ece = cb->val.u8; in ECN_parse()
[all …]
Dlibipt_DNAT.t7 -p tcp -j DNAT --to-destination 1.1.1.1:1025-65535;=;OK
8 -p tcp -j DNAT --to-destination 1.1.1.1-1.1.1.10:1025-65535;=;OK
9 -p tcp -j DNAT --to-destination 1.1.1.1-1.1.1.10:1025-65536;;FAIL
10 -p tcp -j DNAT --to-destination 1.1.1.1-1.1.1.10:1025-65535 --to-destination 2.2.2.2-2.2.2.20:1025-…
11 -p tcp -j DNAT --to-destination 1.1.1.1:1000-2000/1000;=;OK
12 -p tcp -j DNAT --to-destination 1.1.1.1:1000-2000/3000;=;OK
13 -p tcp -j DNAT --to-destination 1.1.1.1:1000-2000/65535;=;OK
14 -p tcp -j DNAT --to-destination 1.1.1.1:1000-2000/0;;FAIL
15 -p tcp -j DNAT --to-destination 1.1.1.1:1000-2000/65536;;FAIL
16 -p tcp -j DNAT --to-destination 1.1.1.1:ssh;-p tcp -j DNAT --to-destination 1.1.1.1:22;OK
[all …]
Dlibxt_tcp.c1 /* Shared library add-on to iptables to add TCP support. */
15 "tcp match options:\n" in tcp_help()
16 "[!] --tcp-flags mask comp match when TCP flags & mask == comp\n" in tcp_help()
19 " (equivalent to --tcp-flags SYN,RST,ACK,FIN SYN)\n" in tcp_help()
26 "[!] --tcp-option number match if TCP option set\n"); in tcp_help()
35 {.name = "tcp-flags", .has_arg = true, .val = '4'},
36 {.name = "tcp-option", .has_arg = true, .val = '5'},
48 ports[0] = ports[1] = xtables_parse_port(buffer, "tcp"); in parse_tcp_ports()
53 ports[0] = buffer[0] ? xtables_parse_port(buffer, "tcp") : 0; in parse_tcp_ports()
54 ports[1] = cp[0] ? xtables_parse_port(cp, "tcp") : 0xFFFF; in parse_tcp_ports()
[all …]
Dlibxt_tcpmss.t3 -p tcp -m tcpmss --mss 42;=;OK
4 -p tcp -m tcpmss --mss :;-p tcp -m tcpmss --mss 0:65535;OK
5 -p tcp -m tcpmss --mss :42;-p tcp -m tcpmss --mss 0:42;OK
6 -p tcp -m tcpmss --mss 42:;-p tcp -m tcpmss --mss 42:65535;OK
7 -p tcp -m tcpmss --mss 42:42;-p tcp -m tcpmss --mss 42;OK
8 -p tcp -m tcpmss --mss 42:12345;=;OK
9 -p tcp -m tcpmss --mss 42:65536;;FAIL
10 -p tcp -m tcpmss --mss 65535:1000;;FAIL
Dlibip6t_DNAT.t7 -p tcp -j DNAT --to-destination [dead::beef]:1025-65535;=;OK
8 -p tcp -j DNAT --to-destination [dead::beef-dead::fee7]:1025-65535;=;OK
9 -p tcp -j DNAT --to-destination [dead::beef-dead::fee7]:1025-65536;;FAIL
10 -p tcp -j DNAT --to-destination [dead::beef-dead::fee7]:1025-65535 --to-destination [dead::beef-dea…
11 -p tcp -j DNAT --to-destination [dead::beef-dead::fee7]:1000-2000/1000;=;OK
12 -p tcp -j DNAT --to-destination [dead::beef-dead::fee7]:1000-2000/3000;=;OK
13 -p tcp -j DNAT --to-destination [dead::beef-dead::fee7]:1000-2000/65535;=;OK
14 -p tcp -j DNAT --to-destination [dead::beef-dead::fee7]:1000-2000/0;;FAIL
15 -p tcp -j DNAT --to-destination [dead::beef-dead::fee7]:1000-2000/65536;;FAIL
16 -p tcp -j DNAT --to-destination [dead::beef]:ssh;-p tcp -j DNAT --to-destination [dead::beef]:22;OK
[all …]
Dlibxt_REDIRECT.t3 -p tcp -j REDIRECT --to-ports 42;=;OK
4 -p tcp -j REDIRECT --to-ports 0;=;OK
5 -p tcp -j REDIRECT --to-ports 65535;=;OK
6 -p tcp -j REDIRECT --to-ports 65536;;FAIL
10 -p tcp -j REDIRECT --to-ports 42-1234 --random;=;OK
11 -p tcp -j REDIRECT --to-ports 42-1234/567;;FAIL
12 -p tcp -j REDIRECT --to-ports ssh;-p tcp -j REDIRECT --to-ports 22;OK
13 -p tcp -j REDIRECT --to-ports ftp-data;-p tcp -j REDIRECT --to-ports 20;OK
14 -p tcp -j REDIRECT --to-ports ftp-ssh;;FAIL
15 -p tcp -j REDIRECT --to-ports 10-ssh;;FAIL
Dlibxt_tcp.man1 These extensions can be used if `\-\-protocol tcp' is specified. It
19 [\fB!\fP] \fB\-\-tcp\-flags\fP \fImask\fP \fIcomp\fP
20 Match when the TCP flags are as specified. The first argument \fImask\fP is the
27 iptables \-A FORWARD \-p tcp \-\-tcp\-flags SYN,ACK,FIN,RST SYN
33 Only match TCP packets with the SYN bit set and the ACK,RST and FIN bits
34 cleared. Such packets are used to request TCP connection initiation;
36 incoming TCP connections, but outgoing TCP connections will be
38 It is equivalent to \fB\-\-tcp\-flags SYN,RST,ACK,FIN SYN\fP.
42 [\fB!\fP] \fB\-\-tcp\-option\fP \fInumber\fP
43 Match if TCP option set.
Dlibipt_MASQUERADE.txlate4 iptables-translate -t nat -A POSTROUTING -p tcp -j MASQUERADE --to-ports 10
5 nft 'add rule ip nat POSTROUTING ip protocol tcp counter masquerade to :10'
7 iptables-translate -t nat -A POSTROUTING -p tcp -j MASQUERADE --to-ports 10-20 --random
8 nft 'add rule ip nat POSTROUTING ip protocol tcp counter masquerade to :10-20 random'
10 iptables-translate -t nat -A POSTROUTING -p tcp -j MASQUERADE --random
11 nft 'add rule ip nat POSTROUTING ip protocol tcp counter masquerade random'
13 iptables-translate -t nat -A POSTROUTING -p tcp -j MASQUERADE --random-fully
14 nft 'add rule ip nat POSTROUTING ip protocol tcp counter masquerade fully-random'
16 iptables-translate -t nat -A POSTROUTING -p tcp -j MASQUERADE --random --random-fully
17 nft 'add rule ip nat POSTROUTING ip protocol tcp counter masquerade random,fully-random'
Dlibip6t_MASQUERADE.txlate4 ip6tables-translate -t nat -A POSTROUTING -p tcp -j MASQUERADE --to-ports 10
5 nft 'add rule ip6 nat POSTROUTING meta l4proto tcp counter masquerade to :10'
7 ip6tables-translate -t nat -A POSTROUTING -p tcp -j MASQUERADE --to-ports 10-20 --random
8 nft 'add rule ip6 nat POSTROUTING meta l4proto tcp counter masquerade to :10-20 random'
10 ip6tables-translate -t nat -A POSTROUTING -p tcp -j MASQUERADE --random
11 nft 'add rule ip6 nat POSTROUTING meta l4proto tcp counter masquerade random'
13 ip6tables-translate -t nat -A POSTROUTING -p tcp -j MASQUERADE --random-fully
14 nft 'add rule ip6 nat POSTROUTING meta l4proto tcp counter masquerade fully-random'
16 ip6tables-translate -t nat -A POSTROUTING -p tcp -j MASQUERADE --random --random-fully
17 nft 'add rule ip6 nat POSTROUTING meta l4proto tcp counter masquerade random,fully-random'
Dlibxt_ecn.t2 -m ecn --ecn-tcp-cwr;;FAIL
3 -p tcp -m ecn --ecn-tcp-cwr;=;OK
4 -p tcp -m ecn --ecn-tcp-ece --ecn-tcp-cwr --ecn-ip-ect 2;=;OK
5 -p tcp -m ecn ! --ecn-tcp-ece ! --ecn-tcp-cwr ! --ecn-ip-ect 2;=;OK
/third_party/ltp/runtest/
Dnet.nfs6 nfs3t_01 nfs01.sh -v 3 -t tcp
7 nfs4_01 nfs01.sh -v 4 -t tcp
8 nfs41_01 nfs01.sh -v 4.1 -t tcp
9 nfs42_01 nfs01.sh -v 4.2 -t tcp
11 nfs3t_ipv6_01 nfs01.sh -6 -v 3 -t tcp
12 nfs4_ipv6_01 nfs01.sh -6 -v 4 -t tcp
13 nfs41_ipv6_01 nfs01.sh -6 -v 4.1 -t tcp
14 nfs42_ipv6_01 nfs01.sh -6 -v 4.2 -t tcp
17 nfs3t_02 nfs02.sh -v 3 -t tcp
18 nfs4_02 nfs02.sh -v 4 -t tcp
[all …]
/third_party/musl/src/internal/
Dservices.h19 // port number for both TCP and UDP, hence, officially ports have two entries
30 PORT_DESC("tcpmux 1/tcp\r\n"),
31 PORT_DESC("echo 7/tcp\r\n"),
33 PORT_DESC("discard 9/tcp sink null\r\n"),
35 PORT_DESC("systat 11/tcp users\r\n"),
36 PORT_DESC("daytime 13/tcp\r\n"),
38 PORT_DESC("netstat 15/tcp\r\n"),
39 PORT_DESC("qotd 17/tcp quote\r\n"),
40 PORT_DESC("msp 18/tcp\r\n"),
42 PORT_DESC("chargen 19/tcp ttytst source\r\n"),
[all …]
/third_party/musl/porting/linux/user/src/internal/
Dservices.h4 // port number for both TCP and UDP, hence, officially ports have two entries
15 PORT_DESC("tcpmux 1/tcp\r\n"),
16 PORT_DESC("echo 7/tcp\r\n"),
18 PORT_DESC("discard 9/tcp sink null\r\n"),
20 PORT_DESC("systat 11/tcp users\r\n"),
21 PORT_DESC("daytime 13/tcp\r\n"),
23 PORT_DESC("netstat 15/tcp\r\n"),
24 PORT_DESC("qotd 17/tcp quote\r\n"),
25 PORT_DESC("msp 18/tcp\r\n"),
27 PORT_DESC("chargen 19/tcp ttytst source\r\n"),
[all …]
/third_party/grpc/src/core/lib/iomgr/
Dtcp_windows.cc127 static void tcp_free(grpc_tcp* tcp) { in tcp_free() argument
128 grpc_winsocket_destroy(tcp->socket); in tcp_free()
129 gpr_mu_destroy(&tcp->mu); in tcp_free()
130 grpc_slice_buffer_destroy(&tcp->last_read_buffer); in tcp_free()
131 delete tcp; in tcp_free()
135 #define TCP_UNREF(tcp, reason) tcp_unref((tcp), (reason), __FILE__, __LINE__) argument
136 #define TCP_REF(tcp, reason) tcp_ref((tcp), (reason), __FILE__, __LINE__) argument
137 static void tcp_unref(grpc_tcp* tcp, const char* reason, const char* file, in tcp_unref() argument
139 if (GRPC_TRACE_FLAG_ENABLED(tcp)) { in tcp_unref()
140 gpr_atm val = gpr_atm_no_barrier_load(&tcp->refcount.count); in tcp_unref()
[all …]
Dtcp_posix.cc40 #include <netinet/tcp.h>
92 // TCP zero copy sendmsg flag.
209 GRPC_TRACE_LOG(tcp, INFO) in TcpZerocopySendCtx()
210 << "Disabling TCP TX zerocopy due to memory pressure.\n"; in TcpZerocopySendCtx()
234 // TCP send zerocopy maintains an implicit sequence number for every
522 // transport layer wants the TCP layer to collect timestamps for this write.
528 // requirement from the TCP endpoint layer is that this arg should be non-null
602 static void ZerocopyDisableAndWaitForRemaining(grpc_tcp* tcp);
618 GRPC_TRACE_LOG(tcp, INFO) << "BACKUP_POLLER:" << p << " destroy"; in done_poller()
625 GRPC_TRACE_LOG(tcp, INFO) << "BACKUP_POLLER:" << p << " run"; in run_poller()
[all …]
/third_party/iptables/iptables/tests/shell/testcases/ipt-save/dumps/
Dwireless.txt8 -A port_assignment -p tcp -m tcp --dport 1723 -j CT --helper pptp
28 -A INPUT -s 10.78.129.130/32 -p tcp -m tcp --dport 5666 -j L_ACCEPT
29 -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m multiport --dports 22,80,443,873,1723 -j …
32 -A INPUT -s 10.31.70.8/29 -i bond0.208 -p tcp -m tcp --dport 179 --tcp-flags FIN,SYN,RST,ACK SYN -j…
33 -A INPUT -s 10.44.224.8/29 -i bond0.686 -p tcp -m tcp --dport 179 --tcp-flags FIN,SYN,RST,ACK SYN -…
46 -A FORWARD -p tcp -m tcp --tcp-flags FIN,SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
56 -A CUST_I15_IN -p tcp -m tcp --dport 22 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT
57 -A CUST_I15_IN -p tcp -m tcp --dport 80 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT
58 -A CUST_I15_IN -p tcp -m tcp --dport 433 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT
59 -A CUST_I15_IN -p tcp -m tcp --dport 3306 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT
[all …]
Dipt-save-filter.txt16 -A INPUT -i ppp0 -p tcp -m tcp --dport 22 -j in_trusted
19 -A FORWARD -d 192.168.100.77/32 -i ppp0 -p tcp -m tcp --dport 4180 -j ACCEPT
20 -A FORWARD -d 192.168.100.77/32 -i ppp0 -p tcp -m tcp --dport 4162 -j ACCEPT
21 -A FORWARD -d 192.168.100.77/32 -i ppp0 -p tcp -m tcp --dport 20376 -j ACCEPT
22 -A FORWARD -d 192.168.100.2/32 -i ppp0 -p tcp -m tcp --dport 10209 -j ACCEPT
23 -A FORWARD -d 192.168.100.2/32 -i ppp0 -p tcp -m tcp --dport 881 -j ACCEPT
26 -A FORWARD ! -s 192.168.0.0/24 -i eth2 -p tcp -j DROP
29 -A FORWARD ! -s 192.168.100.0/24 -i eth1 -p tcp -j DROP
32 -A FORWARD -o ppp0 -p tcp -m tcp --sport 137:139 -j DROP
33 -A FORWARD -o ppp0 -p tcp -m tcp --sport 445 -j DROP
[all …]
/third_party/lwip/contrib/apps/LwipMibCompiler/Mibs/
DTCP-MIB1 TCP-MIB DEFINITIONS ::= BEGIN
28 "The MIB module for managing TCP implementations.
45 -- the TCP base variables group
50 tcp OBJECT IDENTIFIER ::= { mib-2 6 }
67 ::= { tcp 1 }
75 "The minimum value permitted by a TCP implementation for
81 ::= { tcp 2 }
89 "The maximum value permitted by a TCP implementation for
96 ::= { tcp 3 }
106 "The limit on the total number of TCP connections the entity
[all …]
/third_party/iptables/iptables/tests/shell/testcases/nft-only/
D0010-iptables-nft-save.txt5 -A INPUT -s 1.2.3.4/32 -p tcp -m tcp --dport 23 -j ACCEPT
7 -A INPUT -s 1.0.0.0/8 -d 0.0.0.0/32 -p tcp -m tcp --sport 1024:65535 --dport 443 --tcp-flags SYN,AC…
8 -A INPUT -p tcp -m tcp --dport 443 ! --tcp-flags SYN NONE -m comment --comment "checks if SYN bit i…
9 -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m comment --comment "same as iptables --syn"
10 -A INPUT -p tcp -m tcp --tcp-flags SYN SYN
11 -A INPUT -p tcp -m tcp ! --tcp-flags SYN,ACK SYN,ACK
21 -A INPUT -p tcp
/third_party/selinux/libsepol/tests/policies/test-cond/
Drefpolicy-base.conf1744 portcon tcp 2040 system_u:object_r:afs_fs_port_t:s0
1751 portcon tcp 10080 system_u:object_r:amanda_port_t:s0
1753 portcon tcp 10081 system_u:object_r:amanda_port_t:s0
1754 portcon tcp 10082 system_u:object_r:amanda_port_t:s0
1755 portcon tcp 10083 system_u:object_r:amanda_port_t:s0
1756 portcon tcp 10024 system_u:object_r:amavisd_recv_port_t:s0
1757 portcon tcp 10025 system_u:object_r:amavisd_send_port_t:s0
1758 portcon tcp 1720 system_u:object_r:asterisk_port_t:s0
1763 portcon tcp 113 system_u:object_r:auth_port_t:s0
1764 portcon tcp 179 system_u:object_r:bgp_port_t:s0
[all …]

12345678910>>...72