Home
last modified time | relevance | path

Searched refs:TCP (Results 1 – 25 of 445) sorted by relevance

12345678910>>...18

/external/scapy/scapy/contrib/
Dopenflow.py503 overload_fields = {TCP: {"sport": 6653}}
539 overload_fields = {TCP: {"dport": 6653}}
558 overload_fields = {TCP: {"dport": 6653}}
577 overload_fields = {TCP: {"dport": 6653}}
593 overload_fields = {TCP: {"dport": 6653}}
605 overload_fields = {TCP: {"dport": 6653}}
618 overload_fields = {TCP: {"dport": 6653}}
636 overload_fields = {TCP: {"sport": 6653}}
644 overload_fields = {TCP: {"sport": 6653}}
653 overload_fields = {TCP: {"sport": 6653}}
[all …]
Dopenflow.uts60 = TCP()/OFPTStatsRequestDesc(), check default sport
61 p = TCP()/OFPTStatsRequestDesc()
62 p[TCP].sport == 6653
64 = TCP()/OFPETHelloFailed(), check default dport
65 p = TCP()/OFPETHelloFailed()
66 p[TCP].dport == 6653
68 = TCP()/OFPTHello() dissection, check new TCP.guess_payload_class
69 o = TCP()/OFPTHello()
70 p = TCP(raw(o))
71 p[TCP].sport == 6653
[all …]
Dopenflow3.py1652 overload_fields = {TCP: {"sport": 6653}}
1697 overload_fields = {TCP: {"dport": 6653}}
1721 overload_fields = {TCP: {"dport": 6653}}
1747 overload_fields = {TCP: {"dport": 6653}}
1766 overload_fields = {TCP: {"dport": 6653}}
1788 overload_fields = {TCP: {"dport": 6653}}
1806 overload_fields = {TCP: {"dport": 6653}}
1831 overload_fields = {TCP: {"dport": 6653}}
1846 overload_fields = {TCP: {"dport": 6653}}
1859 overload_fields = {TCP: {"dport": 6653}}
[all …]
Dopenflow3.uts70 = TCP()/OFPMPRequestDesc(), check default sport
71 p = TCP()/OFPMPRequestDesc()
72 p[TCP].sport == 6653
74 = TCP()/OFPETHelloFailed(), check default dport
75 p = TCP()/OFPETHelloFailed()
76 p[TCP].dport == 6653
78 = TCP()/OFPTHello() dissection, check new TCP.guess_payload_class
79 o = TCP()/OFPTHello()
80 p = TCP(raw(o))
81 p[TCP].sport == 6653
[all …]
/external/scapy/test/
Dipsec.uts17 p /= TCP(sport=45012, dport=80)
34 assert(not e.haslayer(TCP))
42 assert(d[TCP] == p[TCP])
48 p /= TCP(sport=45012, dport=80)
66 assert(not e.haslayer(TCP))
75 assert(d[TCP] == p[TCP])
100 p /= TCP(sport=45012, dport=80)
118 assert(not e.haslayer(TCP))
127 assert(d[TCP] == p[TCP])
152 p /= TCP(sport=45012, dport=80)
[all …]
Dp0f.uts64 pkt = p0f_impersonate(IP()/TCP(), signature=sig)
69 pkt = p0f_impersonate(IP()/TCP(), signature=sig)
75 pkt = p0f_impersonate(IP()/TCP(options=opts), signature=sig)
81 pkt = p0f_impersonate(IP()/TCP(options=opts), signature=sig)
87 pkt = p0f_impersonate(IP()/TCP(options=opts), signature=sig)
94 pkt = p0f_impersonate(IP()/TCP(options=opts), signature=sig)
103 pkt = p0f_impersonate(IP()/TCP(options=opts), signature=sig)
Dfields.uts236 x.plist=[IP()/TCP(), IP()/UDP()]
242 x=TestPLF(plist=[IP()/TCP(seq=1234567), IP()/UDP()])
245 IP in _ and TCP in _ and UDP in _ and _[TCP].seq == 1234567
249 y=IP()/TCP(seq=111111)/TestPLF(plist=[IP()/TCP(seq=222222),IP()/UDP()])
250 TestPLF(plist=[y,IP()/TCP(seq=333333)])
252 IP in _ and TCP in _ and UDP in _ and _[TCP].seq == 111111 and _[TCP:2].seq==222222 and _[TCP:3].se…
274 x.plist=[IP()/TCP(), IP()/UDP()]
280 x=TestPLF(plist=[IP()/TCP(seq=1234567), IP()/UDP()])
283 IP in _ and TCP in _ and UDP in _ and _[TCP].seq == 1234567
287 y=IP()/TCP(seq=111111)/TestPLF(plist=[IP()/TCP(seq=222222),IP()/UDP()])
[all …]
/external/tcpdump/tests/
Dof10_7050sx_bsn-vv.out1 IP (tos 0x0, ttl 55, id 5483, offset 0, flags [DF], proto TCP (6), length 60)
3 IP (tos 0x0, ttl 64, id 26571, offset 0, flags [DF], proto TCP (6), length 40)
5 IP (tos 0x0, ttl 55, id 49495, offset 0, flags [DF], proto TCP (6), length 60)
7 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
9 IP (tos 0x0, ttl 55, id 49496, offset 0, flags [DF], proto TCP (6), length 52)
11 IP (tos 0x0, ttl 64, id 60691, offset 0, flags [DF], proto TCP (6), length 60)
14 IP (tos 0x0, ttl 55, id 49497, offset 0, flags [DF], proto TCP (6), length 52)
16 IP (tos 0x0, ttl 55, id 49498, offset 0, flags [DF], proto TCP (6), length 60)
19 IP (tos 0x0, ttl 64, id 60692, offset 0, flags [DF], proto TCP (6), length 52)
21 IP (tos 0x0, ttl 64, id 60693, offset 0, flags [DF], proto TCP (6), length 60)
[all …]
Dzmtp1.out1 IP (tos 0x0, ttl 64, id 17993, offset 0, flags [DF], proto TCP (6), length 60)
3 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
5 IP (tos 0x0, ttl 64, id 17994, offset 0, flags [DF], proto TCP (6), length 52)
7 IP (tos 0x0, ttl 64, id 17995, offset 0, flags [DF], proto TCP (6), length 54)
10 IP (tos 0x0, ttl 64, id 51304, offset 0, flags [DF], proto TCP (6), length 52)
12 IP (tos 0x0, ttl 64, id 51305, offset 0, flags [DF], proto TCP (6), length 54)
15 IP (tos 0x0, ttl 64, id 17996, offset 0, flags [DF], proto TCP (6), length 52)
17 IP (tos 0x0, ttl 64, id 17997, offset 0, flags [DF], proto TCP (6), length 148)
28 IP (tos 0x0, ttl 64, id 51306, offset 0, flags [DF], proto TCP (6), length 84)
35 IP (tos 0x0, ttl 64, id 17998, offset 0, flags [DF], proto TCP (6), length 72)
[all …]
Dkday7.out3 IP (tos 0x10, ttl 62, id 64806, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 3da6 (->3…
10 IP (tos 0x0, ttl 64, id 63178, offset 0, flags [DF], proto TCP (6), length 52)
12 IP (tos 0x0, ttl 64, id 36752, offset 0, flags [DF], proto TCP (6), length 399, bad cksum a46b (->a…
15 IP (tos 0x10, ttl 62, id 64806, offset 0, flags [DF], proto TCP (6), length 52)
17 IP (tos 0x10, ttl 62, id 62920, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 4504 (->4…
19 IP (tos 0x0, ttl 64, id 63178, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 3e8c (->43…
21 IP (tos 0x0, ttl 64, id 36752, offset 0, flags [DF], proto TCP (6), length 399, bad cksum a46b (->a…
24 IP truncated-ip - 768 bytes missing! (tos 0x10, ttl 62, id 64806, offset 0, flags [DF], proto TCP (…
26 IP (tos 0x6,ECT(0), ttl 62, id 62920, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 450…
28 IP (tos 0x0, ttl 64, id 63178, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 3e8c (->43…
[all …]
Dkday4.out3 IP (tos 0x10, ttl 62, id 64806, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 3da6 (->3…
10 IP (tos 0x0, ttl 64, id 63178, offset 0, flags [DF], proto TCP (6), length 52)
12 IP (tos 0x0, ttl 64, id 36752, offset 0, flags [DF], proto TCP (6), length 399, bad cksum a46b (->a…
15 IP (tos 0x10, ttl 62, id 64806, offset 0, flags [DF], proto TCP (6), length 52)
17 IP (tos 0x10, ttl 62, id 62920, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 4504 (->4…
19 IP (tos 0x0, ttl 64, id 63178, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 3e8c (->43…
21 IP (tos 0x0, ttl 64, id 36752, offset 0, flags [DF], proto TCP (6), length 399, bad cksum a46b (->a…
24 IP truncated-ip - 768 bytes missing! (tos 0x10, ttl 62, id 64806, offset 0, flags [DF], proto TCP (…
26 IP (tos 0x6,ECT(0), ttl 62, id 62920, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 450…
28 IP (tos 0x0, ttl 64, id 63178, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 3e8c (->43…
[all …]
Dof10_s4810-vvvv.out1 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 64)
3 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
5 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
7 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
10 IP (tos 0x0, ttl 64, id 53094, offset 0, flags [DF], proto TCP (6), length 52)
12 IP (tos 0x0, ttl 64, id 53095, offset 0, flags [DF], proto TCP (6), length 60)
15 IP (tos 0x0, ttl 64, id 53096, offset 0, flags [DF], proto TCP (6), length 60)
18 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
20 IP (tos 0x0, ttl 64, id 53469, offset 0, flags [DF], proto TCP (6), length 180)
40 IP (tos 0x0, ttl 64, id 53097, offset 0, flags [DF], proto TCP (6), length 136)
[all …]
Dgeneve-vv.out11 IP (tos 0x0, ttl 64, id 23057, offset 0, flags [DF], proto TCP (6), length 60)
15 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
19 IP (tos 0x0, ttl 64, id 23058, offset 0, flags [DF], proto TCP (6), length 52)
23 IP (tos 0x0, ttl 64, id 54890, offset 0, flags [DF], proto TCP (6), length 91)
27 IP (tos 0x0, ttl 64, id 23059, offset 0, flags [DF], proto TCP (6), length 52)
31 IP (tos 0x0, ttl 64, id 23060, offset 0, flags [DF], proto TCP (6), length 73)
35 IP (tos 0x0, ttl 64, id 54891, offset 0, flags [DF], proto TCP (6), length 52)
39 IP (tos 0x0, ttl 64, id 23061, offset 0, flags [DF], proto TCP (6), length 844)
43 IP (tos 0x0, ttl 64, id 54892, offset 0, flags [DF], proto TCP (6), length 52)
47 IP (tos 0x0, ttl 64, id 54893, offset 0, flags [DF], proto TCP (6), length 1036)
[all …]
Dkday3.out1 IP (tos 0x10, ttl 64, id 63177, offset 0, flags [DF], proto TCP (6), length 168)
4 IP (tos 0x10, ttl 62, id 62920, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 4504 (->4…
6 IP (tos 0x0, ttl 64, id 63178, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 3e8c (->43…
8 IP (tos 0x0, ttl 64, id 36752, offset 0, flags [DF], proto TCP (6), length 399, bad cksum a46b (->a…
11 IP (tos 0x10, ttl 62, id 64806, offset 0, flags [DF], proto TCP (6), length 52)
13 IP (tos 0x10, ttl 62, id 62920, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 4504 (->4…
15 IP (tos 0x0, ttl 64, id 63178, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 3e8c (->43…
17 IP (tos 0x0, ttl 64, id 36752, offset 0, flags [DF], proto TCP (6), length 399, bad cksum a46b (->a…
Dof10_pf5240-vv.out1 IP (tos 0xa0, ttl 64, id 10670, offset 0, flags [DF], proto TCP (6), length 60)
3 IP (tos 0xa0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
5 IP (tos 0xa0, ttl 64, id 10673, offset 0, flags [DF], proto TCP (6), length 60)
7 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
9 IP (tos 0xa0, ttl 64, id 10674, offset 0, flags [DF], proto TCP (6), length 52)
11 IP (tos 0xa0, ttl 64, id 10675, offset 0, flags [DF], proto TCP (6), length 60)
14 IP (tos 0x0, ttl 64, id 16028, offset 0, flags [DF], proto TCP (6), length 52)
16 IP (tos 0x0, ttl 64, id 16029, offset 0, flags [DF], proto TCP (6), length 60)
19 IP (tos 0x0, ttl 64, id 16030, offset 0, flags [DF], proto TCP (6), length 60)
22 IP (tos 0xa0, ttl 64, id 10676, offset 0, flags [DF], proto TCP (6), length 52)
[all …]
Dbgp_infloop-v.out1 IP (tos 0x0, ttl 128, id 1467, offset 0, flags [DF], proto TCP (6), length 74)
4 IP (tos 0x0, ttl 64, id 39449, offset 0, flags [DF], proto TCP (6), length 74)
7 IP (tos 0x0, ttl 128, id 43331, offset 0, flags [DF], proto TCP (6), length 74)
10 IP (tos 0x0, ttl 64, id 51082, offset 0, flags [DF], proto TCP (6), length 74)
13 IP (tos 0x0, ttl 64, id 51082, offset 0, flags [DF], proto TCP (6), length 74)
Dof10_p3295-vv.out1 IP (tos 0x0, ttl 64, id 55495, offset 0, flags [DF], proto TCP (6), length 60)
3 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
5 IP (tos 0x0, ttl 64, id 55496, offset 0, flags [DF], proto TCP (6), length 52)
7 IP (tos 0x0, ttl 64, id 778, offset 0, flags [DF], proto TCP (6), length 60)
10 IP (tos 0x0, ttl 64, id 55497, offset 0, flags [DF], proto TCP (6), length 52)
12 IP (tos 0x0, ttl 64, id 55498, offset 0, flags [DF], proto TCP (6), length 60)
15 IP (tos 0x0, ttl 64, id 779, offset 0, flags [DF], proto TCP (6), length 52)
17 IP (tos 0x0, ttl 64, id 780, offset 0, flags [DF], proto TCP (6), length 60)
20 IP (tos 0x0, ttl 64, id 55499, offset 0, flags [DF], proto TCP (6), length 52)
22 IP (tos 0x0, ttl 64, id 55500, offset 0, flags [DF], proto TCP (6), length 2628)
[all …]
/external/scapy/doc/scapy/
Dusage.rst78 >>> IP()/TCP()
79 <IP frag=0 proto=TCP |<TCP |>>
80 >>> Ether()/IP()/TCP()
81 <Ether type=0x800 |<IP frag=0 proto=TCP |<TCP |>>>
82 >>> IP()/TCP()/"GET / HTTP/1.0\r\n\r\n"
83 <IP frag=0 proto=TCP |<TCP |<Raw load='GET / HTTP/1.0\r\n\r\n' |>>>
86 >>> IP(proto=55)/TCP()
87 <IP frag=0 proto=55 |<TCP |>>
100 >>> a=Ether()/IP(dst="www.slashdot.org")/TCP()/"GET /index.html HTTP/1.0 \n\n"
116 ihl=5L tos=0x0 len=67 id=1 flags= frag=0L ttl=64 proto=TCP chksum=0x783c
[all …]
/external/curl/tests/
DREADME51 - TCP/8990 for HTTP
52 - TCP/8991 for HTTPS
53 - TCP/8992 for FTP
54 - TCP/8993 for FTPS
55 - TCP/8994 for HTTP IPv6
56 - TCP/8995 for FTP (2)
57 - TCP/8996 for FTP IPv6
60 - TCP/8999 for SCP/SFTP
61 - TCP/9000 for SOCKS
62 - TCP/9001 for POP3
[all …]
/external/grpc-grpc/src/objective-c/
DNetworkTransitionBehavior.md18 * The underlying TCP connection is no longer valid, e.g. WiFi connects to
36 ### gRPC iOS with TCP Sockets
37 gRPC's default implementation is to use TCP sockets for networking. It turns
42 #### Issues with TCP Sockets
43 The TCP sockets on iOS is flawed in that it does not reflect the viability of
45 using TCP sockets:
46 * When a TCP socket connection is established on cellular data and WiFi
47 becomes available, the TCP socket neither return an error event nor continue
49 * A TCP socket does not report certain events that happen in the
50 background. When a TCP connection breaks in the background for the reason
[all …]
/external/iptables/extensions/
Dlibxt_tcpmss.man1TCP MSS (maximum segment size) field of the TCP header. You can only use this on TCP SYN or SYN/A…
4 Match a given TCP MSS value or range.
Dlibxt_tcp.man20 Match when the TCP flags are as specified. The first argument \fImask\fP is the
33 Only match TCP packets with the SYN bit set and the ACK,RST and FIN bits
34 cleared. Such packets are used to request TCP connection initiation;
36 incoming TCP connections, but outgoing TCP connections will be
43 Match if TCP option set.
/external/scapy/scapy/layers/
Dinet.py510 class TCP(Packet): class
545 if not isinstance(other, TCP):
744 class TCPerror(TCP):
747 if not isinstance(other, TCP):
811 bind_layers( IP, TCP, frag=0, proto=6)
1015 b = (x for x in tmp if IP in x and x[IP].src == ip and TCP in x)
1021 opts = p.getlayer(TCP).options
1185 a,b=sr(IP(dst=o.ip)/TCP(dport=[21,22,23,25,80,443]),timeout=2)
1237 if s.haslayer(TCP) or s.haslayer(UDP):
1303 if TCP in s:
[all …]
/external/bcc/tools/
Dtcpretrans_example.txt4 This tool traces the kernel TCP retransmit function to show details of these
14 This output shows three TCP retransmits, the first two were for an IPv4
15 connection from 10.153.223.157 port 22 to 69.53.245.40 port 34619. The TCP
23 additional kernel details: the state of the TCP session at the time of the
27 A -l option will include TCP tail loss probe attempts:
67 Trace TCP retransmits
75 ./tcpretrans # trace TCP retransmits
Dtcpdrop_example.txt4 tcpdrop prints details of TCP packets or segments that were dropped by the
53 The last two columns show the state of the TCP session, and the TCP flags.
66 Trace TCP drops by the kernel
72 ./tcpdrop # trace kernel TCP drops

12345678910>>...18