/external/tcpdump/ |
D | print-udp.c | 317 udpipaddr_print(netdissect_options *ndo, const struct ip *ip, int sport, int dport) in udpipaddr_print() argument 337 udpport_string(ndo, dport))); in udpipaddr_print() 343 udpport_string(ndo, dport))); in udpipaddr_print() 357 udpport_string(ndo, dport))); in udpipaddr_print() 363 udpport_string(ndo, dport))); in udpipaddr_print() 377 uint16_t sport, dport, ulen; in udp_print() local 394 dport = EXTRACT_16BITS(&up->uh_dport); in udp_print() 397 udpipaddr_print(ndo, ip, sport, dport); in udp_print() 402 udpipaddr_print(ndo, ip, sport, dport); in udp_print() 407 udpipaddr_print(ndo, ip, sport, dport); in udp_print() [all …]
|
D | print-tcp.c | 169 uint16_t sport, dport, win, urp; in tcp_print() local 191 dport = EXTRACT_16BITS(&tp->th_dport); in tcp_print() 199 tcpport_string(ndo, dport))); in tcp_print() 202 tcpport_string(ndo, sport), tcpport_string(ndo, dport))); in tcp_print() 210 tcpport_string(ndo, dport))); in tcp_print() 213 tcpport_string(ndo, sport), tcpport_string(ndo, dport))); in tcp_print() 261 if (sport > dport) in tcp_print() 263 else if (sport == dport) { in tcp_print() 270 tha.port = dport << 16 | sport; in tcp_print() 274 tha.port = sport << 16 | dport; in tcp_print() [all …]
|
/external/ltp/testcases/network/iptables/ |
D | iptables_tests.sh | 216 local dport=45886 222 iptables -A INPUT -p tcp -d 127.0.0.1 --dport $dport -j LOG \ 230 tst_res TINFO "telnet 127.0.0.1 $dport" 231 telnet 127.0.0.1 $dport > tst_iptables.out 2>&1 237 "iptables did not log packets to port $dport" 241 tst_res TINFO "Packets to port $dport logged." 244 tst_res TFAIL "telnet to 127.0.0.1 $dport should fail." 262 local dport=0 267 iptables -A INPUT -p tcp -d 127.0.0.1 --dport 45801:45803 -j LOG \ 285 for dport in 45801 45802 45803 45804 45805 45806; do [all …]
|
/external/iptables/extensions/ |
D | libxt_udp.t | 4 -p udp -m udp --dport 1;=;OK 5 -p udp -m udp --dport 65535;=;OK 11 -p udp -m udp ! --dport 1;=;OK 12 -p udp -m udp ! --dport 65535;=;OK 13 -p udp -m udp --sport 1 --dport 65535;=;OK 14 -p udp -m udp --sport 65535 --dport 1;=;OK 15 -p udp -m udp ! --sport 1 --dport 65535;=;OK 16 -p udp -m udp ! --sport 65535 --dport 1;=;OK 20 -p udp -m udp --dport -1;;FAIL
|
D | libxt_tcp.t | 4 -p tcp -m tcp --dport 1;=;OK 5 -p tcp -m tcp --dport 65535;=;OK 11 -p tcp -m tcp ! --dport 1;=;OK 12 -p tcp -m tcp ! --dport 65535;=;OK 13 -p tcp -m tcp --sport 1 --dport 65535;=;OK 14 -p tcp -m tcp --sport 65535 --dport 1;=;OK 15 -p tcp -m tcp ! --sport 1 --dport 65535;=;OK 16 -p tcp -m tcp ! --sport 65535 --dport 1;=;OK 19 -p tcp -m tcp --dport -1;;FAIL
|
D | libxt_dccp.t | 4 -p dccp -m dccp --dport 1;=;OK 5 -p dccp -m dccp --dport 65535;=;OK 11 -p dccp -m dccp ! --dport 1;=;OK 12 -p dccp -m dccp ! --dport 65535;=;OK 13 -p dccp -m dccp --sport 1 --dport 65535;=;OK 14 -p dccp -m dccp --sport 65535 --dport 1;=;OK 15 -p dccp -m dccp ! --sport 1 --dport 65535;=;OK 16 -p dccp -m dccp ! --sport 65535 --dport 1;=;OK 20 -p dccp -m dccp --dport -1;;FAIL
|
D | libxt_connlimit.man | 25 iptables \-A INPUT \-p tcp \-\-syn \-\-dport 23 \-m connlimit \-\-connlimit\-above 2 \-j REJECT 28 iptables \-A INPUT \-p tcp \-\-syn \-\-dport 23 \-m connlimit \-\-connlimit\-upto 2 \-j ACCEPT 32 iptables \-p tcp \-\-syn \-\-dport 80 \-m connlimit \-\-connlimit\-above 16 37 ip6tables \-p tcp \-\-syn \-\-dport 80 \-s fe80::/64 \-m connlimit \-\-connlimit\-above 41 ip6tables \-p tcp \-\-syn \-\-dport 49152:65535 \-d 2001:db8::1 \-m connlimit
|
D | libxt_sctp.t | 7 -p sctp -m sctp --dport 1;=;OK 8 -p sctp -m sctp --dport 1:65535;=;OK 9 -p sctp -m sctp --dport 65535;=;OK 10 -p sctp -m sctp --dport -1;;FAIL 11 -p sctp -m sctp --dport 65536;;FAIL
|
D | libxt_HMARK.t | 4 -j HMARK --hmark-src-prefix 32 --hmark-dst-prefix 32 --hmark-sport-mask 0xffff --hmark-dport-mask 0… 6 -j HMARK --hmark-src-prefix 1 --hmark-dst-prefix 2 --hmark-sport-mask 0x0003 --hmark-dport-mask 0x0… 8 -j HMARK --hmark-src-prefix 32 --hmark-dst-prefix 32 --hmark-sport-mask 0xffff --hmark-dport-mask 0…
|
/external/autotest/client/deps/lansim/src/py/ |
D | host.py | 177 def _tcp_pick_port(self, dhost, dport): argument 180 if (dhost, dport, p) in self._tcp_fwd_out: 192 dport = pkt.ip.tcp.dport 195 if (shost, sport, dport) in self._tcp_fwd_out: 196 fhost, fport, oport = self._tcp_fwd_out[(shost, sport, dport)] 199 pkt.ip.tcp.dport = fport 206 if dport in self._tcp_fwd_ports: 208 fhost, fport = self._tcp_fwd_ports[dport] 212 if (shost, sport, dport) in self._tcp_fwd_in: 213 lport = self._tcp_fwd_in[(shost, sport, dport)] [all …]
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
D | test_xdp.c | 91 int dport; in handle_ipv4() local 98 dport = get_dport(iph + 1, data_end, iph->protocol); in handle_ipv4() 99 if (dport == -1) in handle_ipv4() 105 vip.dport = dport; in handle_ipv4() 163 int dport; in handle_ipv6() local 168 dport = get_dport(ip6h + 1, data_end, ip6h->nexthdr); in handle_ipv6() 169 if (dport == -1) in handle_ipv6() 175 vip.dport = dport; in handle_ipv6()
|
/external/scapy/scapy/layers/ |
D | tftp.py | 109 bind_layers(UDP, TFTP, dport=69) 132 and pkt[UDP].dport == self.my_tid 140 bind_bottom_up(UDP, TFTP, dport=self.my_tid) 144 self.l3 = IP(dst=self.server)/UDP(sport=self.my_tid, dport=self.port)/TFTP() 162 self.l3[UDP].dport = self.server_tid 201 split_bottom_up(UDP, TFTP, dport=self.my_tid) 207 split_bottom_up(UDP, TFTP, dport=self.my_tid) 225 and pkt[UDP].dport == self.my_tid 235 bind_bottom_up(UDP, TFTP, dport=self.my_tid) 238 self.l3 = IP(dst=self.server)/UDP(sport=self.my_tid, dport=self.port)/TFTP() [all …]
|
D | vxlan.py | 67 bind_layers(UDP, VXLAN, dport=4789) # RFC standard vxlan port 68 bind_layers(UDP, VXLAN, dport=4790) # RFC standard vxlan-gpe port 69 bind_layers(UDP, VXLAN, dport=6633) # New IANA assigned port for use with NSH 70 bind_layers(UDP, VXLAN, dport=8472) # Linux implementation port 76 bind_layers(UDP, VXLAN, sport=4789, dport=4789)
|
D | hsrp.py | 80 bind_layers(UDP, HSRP, dport=1985, sport=1985) 81 bind_layers(UDP, HSRP, dport=2029, sport=2029) 82 DestIPField.bind_addr(UDP, "224.0.0.2", dport=1985) 83 DestIP6Field.bind_addr(UDP, "ff02::66", dport=2029)
|
D | netbios.py | 211 bind_layers( UDP, NBNSQueryRequest, dport=137) 212 bind_layers( UDP, NBNSRequest, dport=137) 221 bind_layers( UDP, NBTDatagram, dport=138) 222 bind_layers( TCP, NBTSession, dport=139)
|
/external/bcc/tools/ |
D | tcpconnect.py | 158 dports = [int(dport) for dport in args.port.split(',')] 159 dports_if = ' && '.join(['dport != %d' % ntohs(dport) for dport in dports]) 207 inet_ntop(AF_INET, pack("I", event.daddr)), event.dport)) 219 event.dport))
|
D | tcptop.py | 197 dport=k.dport) 204 dport=k.dport) 257 k.daddr + ":" + str(k.dport), 284 k.daddr + ":" + str(k.dport),
|
D | tcpretrans.py | 254 "%s:%s" % (inet_ntop(AF_INET, pack('I', event.daddr)), event.dport), 263 "%s:%d" % (inet_ntop(AF_INET6, event.daddr), event.dport), 272 … ep_fmt % (inet_ntop(AF_INET, pack('I', k.daddr)), k.dport)) 275 ep_fmt % (inet_ntop(AF_INET6, k.daddr), k.dport))
|
D | tcpstates.py | 172 dports = [int(dport) for dport in args.remoteport.split(',')] 173 dports_if = ' && '.join(['dport != %d' % dport for dport in dports])
|
D | tcplife.py | 376 dports = [int(dport) for dport in args.remoteport.split(',')] 377 dports_if = ' && '.join(['dport != %d' % dport for dport in dports])
|
/external/scapy/scapy/contrib/ |
D | sebek.uts | 10 assert pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 1 15 pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 1 19 assert pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 2 and pkt[SebekHead].type ==2 24 pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 2 and pkt[SebekHead].type ==2 28 assert pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 3 33 pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 3
|
D | tacacs.uts | 9 pkt = IP()/TCP(dport=49)/TacacsHeader() 14 pkt = IP()/TCP(dport=49)/TacacsHeader() 19 pkt = IP()/TCP(dport=49)/TacacsHeader(seq=5, session_id=165) 31 pkt = IP()/TCP(dport=49)/TacacsHeader()/TacacsAuthenticationStart() 36 pkt = IP()/TCP(dport=49)/TacacsHeader()/TacacsAuthenticationStart() 41 pkt = IP()/TCP(dport=49)/TacacsHeader(seq=1, flags=0, session_id=2424164486, length=28)/TacacsAuthe… 53 pkt = IP()/TCP(dport=49)/TacacsHeader()/TacacsAuthenticationReply() 58 pkt = IP()/TCP(dport=49)/TacacsHeader(seq=2)/TacacsAuthenticationReply() 63 pkt = IP()/TCP(dport=49)/TacacsHeader(seq=2, flags=0, session_id=2424164486, length=16)/TacacsAuthe… 75 pkt = IP()/TCP(dport=49)/TacacsHeader()/TacacsAuthenticationContinue() [all …]
|
/external/scapy/test/ |
D | ipsec.uts | 17 p /= TCP(sport=45012, dport=80) 48 p /= TCP(sport=45012, dport=80) 100 p /= TCP(sport=45012, dport=80) 152 p /= TCP(sport=45012, dport=80) 204 p /= TCP(sport=45012, dport=80) 255 p /= TCP(sport=45012, dport=80) 306 p /= TCP(sport=45012, dport=80) 361 p /= TCP(sport=45012, dport=80) 394 p /= TCP(sport=45012, dport=80) 429 p /= TCP(sport=45012, dport=80) [all …]
|
/external/libnl/src/lib/ |
D | exp.c | 130 uint16_t dport = nfnl_exp_get_dst_port(exp, tuple); in nl_cli_exp_parse_src_port() local 131 nfnl_exp_set_ports(exp, tuple, sport, dport); in nl_cli_exp_parse_src_port() 136 uint32_t dport = nl_cli_parse_u32(arg); in nl_cli_exp_parse_dst_port() local 138 nfnl_exp_set_ports(exp, tuple, sport, dport); in nl_cli_exp_parse_dst_port()
|
/external/scapy/scapy/modules/ |
D | queso.py | 73 def queso_sig(target, dport=80, timeout=3): argument 77 ans, unans = sr(IP(dst=target)/TCP(dport=dport,flags=flags,seq=RandInt()),
|