Home
last modified time | relevance | path

Searched refs:dport (Results 1 – 25 of 151) sorted by relevance

1234567

/external/tcpdump/
Dprint-udp.c317 udpipaddr_print(netdissect_options *ndo, const struct ip *ip, int sport, int dport) in udpipaddr_print() argument
337 udpport_string(ndo, dport))); in udpipaddr_print()
343 udpport_string(ndo, dport))); in udpipaddr_print()
357 udpport_string(ndo, dport))); in udpipaddr_print()
363 udpport_string(ndo, dport))); in udpipaddr_print()
377 uint16_t sport, dport, ulen; in udp_print() local
394 dport = EXTRACT_16BITS(&up->uh_dport); in udp_print()
397 udpipaddr_print(ndo, ip, sport, dport); in udp_print()
402 udpipaddr_print(ndo, ip, sport, dport); in udp_print()
407 udpipaddr_print(ndo, ip, sport, dport); in udp_print()
[all …]
Dprint-tcp.c169 uint16_t sport, dport, win, urp; in tcp_print() local
191 dport = EXTRACT_16BITS(&tp->th_dport); in tcp_print()
199 tcpport_string(ndo, dport))); in tcp_print()
202 tcpport_string(ndo, sport), tcpport_string(ndo, dport))); in tcp_print()
210 tcpport_string(ndo, dport))); in tcp_print()
213 tcpport_string(ndo, sport), tcpport_string(ndo, dport))); in tcp_print()
261 if (sport > dport) in tcp_print()
263 else if (sport == dport) { in tcp_print()
270 tha.port = dport << 16 | sport; in tcp_print()
274 tha.port = sport << 16 | dport; in tcp_print()
[all …]
/external/ltp/testcases/network/iptables/
Diptables_tests.sh216 local dport=45886
222 iptables -A INPUT -p tcp -d 127.0.0.1 --dport $dport -j LOG \
230 tst_res TINFO "telnet 127.0.0.1 $dport"
231 telnet 127.0.0.1 $dport > tst_iptables.out 2>&1
237 "iptables did not log packets to port $dport"
241 tst_res TINFO "Packets to port $dport logged."
244 tst_res TFAIL "telnet to 127.0.0.1 $dport should fail."
262 local dport=0
267 iptables -A INPUT -p tcp -d 127.0.0.1 --dport 45801:45803 -j LOG \
285 for dport in 45801 45802 45803 45804 45805 45806; do
[all …]
/external/iptables/extensions/
Dlibxt_udp.t4 -p udp -m udp --dport 1;=;OK
5 -p udp -m udp --dport 65535;=;OK
11 -p udp -m udp ! --dport 1;=;OK
12 -p udp -m udp ! --dport 65535;=;OK
13 -p udp -m udp --sport 1 --dport 65535;=;OK
14 -p udp -m udp --sport 65535 --dport 1;=;OK
15 -p udp -m udp ! --sport 1 --dport 65535;=;OK
16 -p udp -m udp ! --sport 65535 --dport 1;=;OK
20 -p udp -m udp --dport -1;;FAIL
Dlibxt_tcp.t4 -p tcp -m tcp --dport 1;=;OK
5 -p tcp -m tcp --dport 65535;=;OK
11 -p tcp -m tcp ! --dport 1;=;OK
12 -p tcp -m tcp ! --dport 65535;=;OK
13 -p tcp -m tcp --sport 1 --dport 65535;=;OK
14 -p tcp -m tcp --sport 65535 --dport 1;=;OK
15 -p tcp -m tcp ! --sport 1 --dport 65535;=;OK
16 -p tcp -m tcp ! --sport 65535 --dport 1;=;OK
19 -p tcp -m tcp --dport -1;;FAIL
Dlibxt_dccp.t4 -p dccp -m dccp --dport 1;=;OK
5 -p dccp -m dccp --dport 65535;=;OK
11 -p dccp -m dccp ! --dport 1;=;OK
12 -p dccp -m dccp ! --dport 65535;=;OK
13 -p dccp -m dccp --sport 1 --dport 65535;=;OK
14 -p dccp -m dccp --sport 65535 --dport 1;=;OK
15 -p dccp -m dccp ! --sport 1 --dport 65535;=;OK
16 -p dccp -m dccp ! --sport 65535 --dport 1;=;OK
20 -p dccp -m dccp --dport -1;;FAIL
Dlibxt_connlimit.man25 iptables \-A INPUT \-p tcp \-\-syn \-\-dport 23 \-m connlimit \-\-connlimit\-above 2 \-j REJECT
28 iptables \-A INPUT \-p tcp \-\-syn \-\-dport 23 \-m connlimit \-\-connlimit\-upto 2 \-j ACCEPT
32 iptables \-p tcp \-\-syn \-\-dport 80 \-m connlimit \-\-connlimit\-above 16
37 ip6tables \-p tcp \-\-syn \-\-dport 80 \-s fe80::/64 \-m connlimit \-\-connlimit\-above
41 ip6tables \-p tcp \-\-syn \-\-dport 49152:65535 \-d 2001:db8::1 \-m connlimit
Dlibxt_sctp.t7 -p sctp -m sctp --dport 1;=;OK
8 -p sctp -m sctp --dport 1:65535;=;OK
9 -p sctp -m sctp --dport 65535;=;OK
10 -p sctp -m sctp --dport -1;;FAIL
11 -p sctp -m sctp --dport 65536;;FAIL
Dlibxt_HMARK.t4 -j HMARK --hmark-src-prefix 32 --hmark-dst-prefix 32 --hmark-sport-mask 0xffff --hmark-dport-mask 0…
6 -j HMARK --hmark-src-prefix 1 --hmark-dst-prefix 2 --hmark-sport-mask 0x0003 --hmark-dport-mask 0x0…
8 -j HMARK --hmark-src-prefix 32 --hmark-dst-prefix 32 --hmark-sport-mask 0xffff --hmark-dport-mask 0…
/external/autotest/client/deps/lansim/src/py/
Dhost.py177 def _tcp_pick_port(self, dhost, dport): argument
180 if (dhost, dport, p) in self._tcp_fwd_out:
192 dport = pkt.ip.tcp.dport
195 if (shost, sport, dport) in self._tcp_fwd_out:
196 fhost, fport, oport = self._tcp_fwd_out[(shost, sport, dport)]
199 pkt.ip.tcp.dport = fport
206 if dport in self._tcp_fwd_ports:
208 fhost, fport = self._tcp_fwd_ports[dport]
212 if (shost, sport, dport) in self._tcp_fwd_in:
213 lport = self._tcp_fwd_in[(shost, sport, dport)]
[all …]
/external/linux-kselftest/tools/testing/selftests/bpf/
Dtest_xdp.c91 int dport; in handle_ipv4() local
98 dport = get_dport(iph + 1, data_end, iph->protocol); in handle_ipv4()
99 if (dport == -1) in handle_ipv4()
105 vip.dport = dport; in handle_ipv4()
163 int dport; in handle_ipv6() local
168 dport = get_dport(ip6h + 1, data_end, ip6h->nexthdr); in handle_ipv6()
169 if (dport == -1) in handle_ipv6()
175 vip.dport = dport; in handle_ipv6()
/external/scapy/scapy/layers/
Dtftp.py109 bind_layers(UDP, TFTP, dport=69)
132 and pkt[UDP].dport == self.my_tid
140 bind_bottom_up(UDP, TFTP, dport=self.my_tid)
144 self.l3 = IP(dst=self.server)/UDP(sport=self.my_tid, dport=self.port)/TFTP()
162 self.l3[UDP].dport = self.server_tid
201 split_bottom_up(UDP, TFTP, dport=self.my_tid)
207 split_bottom_up(UDP, TFTP, dport=self.my_tid)
225 and pkt[UDP].dport == self.my_tid
235 bind_bottom_up(UDP, TFTP, dport=self.my_tid)
238 self.l3 = IP(dst=self.server)/UDP(sport=self.my_tid, dport=self.port)/TFTP()
[all …]
Dvxlan.py67 bind_layers(UDP, VXLAN, dport=4789) # RFC standard vxlan port
68 bind_layers(UDP, VXLAN, dport=4790) # RFC standard vxlan-gpe port
69 bind_layers(UDP, VXLAN, dport=6633) # New IANA assigned port for use with NSH
70 bind_layers(UDP, VXLAN, dport=8472) # Linux implementation port
76 bind_layers(UDP, VXLAN, sport=4789, dport=4789)
Dhsrp.py80 bind_layers(UDP, HSRP, dport=1985, sport=1985)
81 bind_layers(UDP, HSRP, dport=2029, sport=2029)
82 DestIPField.bind_addr(UDP, "224.0.0.2", dport=1985)
83 DestIP6Field.bind_addr(UDP, "ff02::66", dport=2029)
Dnetbios.py211 bind_layers( UDP, NBNSQueryRequest, dport=137)
212 bind_layers( UDP, NBNSRequest, dport=137)
221 bind_layers( UDP, NBTDatagram, dport=138)
222 bind_layers( TCP, NBTSession, dport=139)
/external/bcc/tools/
Dtcpconnect.py158 dports = [int(dport) for dport in args.port.split(',')]
159 dports_if = ' && '.join(['dport != %d' % ntohs(dport) for dport in dports])
207 inet_ntop(AF_INET, pack("I", event.daddr)), event.dport))
219 event.dport))
Dtcptop.py197 dport=k.dport)
204 dport=k.dport)
257 k.daddr + ":" + str(k.dport),
284 k.daddr + ":" + str(k.dport),
Dtcpretrans.py254 "%s:%s" % (inet_ntop(AF_INET, pack('I', event.daddr)), event.dport),
263 "%s:%d" % (inet_ntop(AF_INET6, event.daddr), event.dport),
272 … ep_fmt % (inet_ntop(AF_INET, pack('I', k.daddr)), k.dport))
275 ep_fmt % (inet_ntop(AF_INET6, k.daddr), k.dport))
Dtcpstates.py172 dports = [int(dport) for dport in args.remoteport.split(',')]
173 dports_if = ' && '.join(['dport != %d' % dport for dport in dports])
Dtcplife.py376 dports = [int(dport) for dport in args.remoteport.split(',')]
377 dports_if = ' && '.join(['dport != %d' % dport for dport in dports])
/external/scapy/scapy/contrib/
Dsebek.uts10 assert pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 1
15 pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 1
19 assert pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 2 and pkt[SebekHead].type ==2
24 pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 2 and pkt[SebekHead].type ==2
28 assert pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 3
33 pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 3
Dtacacs.uts9 pkt = IP()/TCP(dport=49)/TacacsHeader()
14 pkt = IP()/TCP(dport=49)/TacacsHeader()
19 pkt = IP()/TCP(dport=49)/TacacsHeader(seq=5, session_id=165)
31 pkt = IP()/TCP(dport=49)/TacacsHeader()/TacacsAuthenticationStart()
36 pkt = IP()/TCP(dport=49)/TacacsHeader()/TacacsAuthenticationStart()
41 pkt = IP()/TCP(dport=49)/TacacsHeader(seq=1, flags=0, session_id=2424164486, length=28)/TacacsAuthe…
53 pkt = IP()/TCP(dport=49)/TacacsHeader()/TacacsAuthenticationReply()
58 pkt = IP()/TCP(dport=49)/TacacsHeader(seq=2)/TacacsAuthenticationReply()
63 pkt = IP()/TCP(dport=49)/TacacsHeader(seq=2, flags=0, session_id=2424164486, length=16)/TacacsAuthe…
75 pkt = IP()/TCP(dport=49)/TacacsHeader()/TacacsAuthenticationContinue()
[all …]
/external/scapy/test/
Dipsec.uts17 p /= TCP(sport=45012, dport=80)
48 p /= TCP(sport=45012, dport=80)
100 p /= TCP(sport=45012, dport=80)
152 p /= TCP(sport=45012, dport=80)
204 p /= TCP(sport=45012, dport=80)
255 p /= TCP(sport=45012, dport=80)
306 p /= TCP(sport=45012, dport=80)
361 p /= TCP(sport=45012, dport=80)
394 p /= TCP(sport=45012, dport=80)
429 p /= TCP(sport=45012, dport=80)
[all …]
/external/libnl/src/lib/
Dexp.c130 uint16_t dport = nfnl_exp_get_dst_port(exp, tuple); in nl_cli_exp_parse_src_port() local
131 nfnl_exp_set_ports(exp, tuple, sport, dport); in nl_cli_exp_parse_src_port()
136 uint32_t dport = nl_cli_parse_u32(arg); in nl_cli_exp_parse_dst_port() local
138 nfnl_exp_set_ports(exp, tuple, sport, dport); in nl_cli_exp_parse_dst_port()
/external/scapy/scapy/modules/
Dqueso.py73 def queso_sig(target, dport=80, timeout=3): argument
77 ans, unans = sr(IP(dst=target)/TCP(dport=dport,flags=flags,seq=RandInt()),

1234567