Home
last modified time | relevance | path

Searched refs:dport (Results 1 – 25 of 198) sorted by relevance

12345678

/external/iptables/extensions/
Dlibxt_sctp.txlate1 iptables-translate -A INPUT -p sctp --dport 80 -j DROP
2 nft add rule ip filter INPUT sctp dport 80 counter drop
7 iptables-translate -A INPUT -p sctp ! --dport 80 -j DROP
8 nft add rule ip filter INPUT sctp dport != 80 counter drop
16 iptables-translate -A INPUT -p sctp --dport 50:56 -j ACCEPT
17 nft add rule ip filter INPUT sctp dport 50-56 counter accept
22 iptables-translate -A INPUT -p sctp ! --dport 50:56 -j ACCEPT
23 nft add rule ip filter INPUT sctp dport != 50-56 counter accept
25 iptables-translate -A INPUT -p sctp --dport 80 --sport 50 -j ACCEPT
26 nft add rule ip filter INPUT sctp sport 50 dport 80 counter accept
[all …]
Dlibxt_udp.t4 -p udp -m udp --dport 1;=;OK
5 -p udp -m udp --dport 65535;=;OK
11 -p udp -m udp ! --dport 1;=;OK
12 -p udp -m udp ! --dport 65535;=;OK
13 -p udp -m udp --sport 1 --dport 65535;=;OK
14 -p udp -m udp --sport 65535 --dport 1;=;OK
15 -p udp -m udp ! --sport 1 --dport 65535;=;OK
16 -p udp -m udp ! --sport 65535 --dport 1;=;OK
20 -p udp -m udp --dport -1;;FAIL
Dlibxt_dccp.txlate4 iptables-translate -A INPUT -p dccp -m dccp --dport 100:200
5 nft add rule ip filter INPUT dccp dport 100-200 counter
7 iptables-translate -A INPUT -p dccp -m dccp ! --dport 100
8 nft add rule ip filter INPUT dccp dport != 100 counter
16 iptables-translate -A INPUT -p dccp -m dccp --dport 100 --dccp-types REQUEST,RESPONSE,DATA,ACK,DATA…
17 nft add rule ip filter INPUT dccp dport 100 dccp type {request, response, data, ack, dataack, close…
19 iptables-translate -A INPUT -p dccp -m dccp --sport 200 --dport 100
20 nft add rule ip filter INPUT dccp sport 200 dccp dport 100 counter
Dlibxt_tcp.t4 -p tcp -m tcp --dport 1;=;OK
5 -p tcp -m tcp --dport 65535;=;OK
11 -p tcp -m tcp ! --dport 1;=;OK
12 -p tcp -m tcp ! --dport 65535;=;OK
13 -p tcp -m tcp --sport 1 --dport 65535;=;OK
14 -p tcp -m tcp --sport 65535 --dport 1;=;OK
15 -p tcp -m tcp ! --sport 1 --dport 65535;=;OK
16 -p tcp -m tcp ! --sport 65535 --dport 1;=;OK
19 -p tcp -m tcp --dport -1;;FAIL
Dlibxt_dccp.t4 -p dccp -m dccp --dport 1;=;OK
5 -p dccp -m dccp --dport 65535;=;OK
11 -p dccp -m dccp ! --dport 1;=;OK
12 -p dccp -m dccp ! --dport 65535;=;OK
13 -p dccp -m dccp --sport 1 --dport 65535;=;OK
14 -p dccp -m dccp --sport 65535 --dport 1;=;OK
15 -p dccp -m dccp ! --sport 1 --dport 65535;=;OK
16 -p dccp -m dccp ! --sport 65535 --dport 1;=;OK
20 -p dccp -m dccp --dport -1;;FAIL
Dlibip6t_REJECT.txlate1 ip6tables-translate -A FORWARD -p TCP --dport 22 -j REJECT
2 nft add rule ip6 filter FORWARD tcp dport 22 counter reject
4 ip6tables-translate -A FORWARD -p TCP --dport 22 -j REJECT --reject-with icmp6-reject-route
5 nft add rule ip6 filter FORWARD tcp dport 22 counter reject with icmpv6 type reject-route
7 ip6tables-translate -A FORWARD -p TCP --dport 22 -j REJECT --reject-with tcp-reset
8 nft add rule ip6 filter FORWARD tcp dport 22 counter reject with tcp reset
Dlibipt_REJECT.txlate1 iptables-translate -A FORWARD -p TCP --dport 22 -j REJECT
2 nft add rule ip filter FORWARD tcp dport 22 counter reject
4 iptables-translate -A FORWARD -p TCP --dport 22 -j REJECT --reject-with icmp-net-unreachable
5 nft add rule ip filter FORWARD tcp dport 22 counter reject with icmp type net-unreachable
7 iptables-translate -A FORWARD -p TCP --dport 22 -j REJECT --reject-with tcp-reset
8 nft add rule ip filter FORWARD tcp dport 22 counter reject with tcp reset
Dlibxt_owner.txlate1 iptables-translate -t nat -A OUTPUT -p tcp --dport 80 -m owner --uid-owner root -j ACCEPT
2 nft add rule ip nat OUTPUT tcp dport 80 skuid 0 counter accept
4 iptables-translate -t nat -A OUTPUT -p tcp --dport 80 -m owner --gid-owner 0-10 -j ACCEPT
5 nft add rule ip nat OUTPUT tcp dport 80 skgid 0-10 counter accept
7 iptables-translate -t nat -A OUTPUT -p tcp --dport 80 -m owner ! --uid-owner 1000 -j ACCEPT
8 nft add rule ip nat OUTPUT tcp dport 80 skuid != 1000 counter accept
Dlibxt_tcp.txlate4 iptables-translate -A OUTPUT -p tcp -o eth0 --dport 53:66 -j DROP
5 nft add rule ip filter OUTPUT oifname "eth0" tcp dport 53-66 counter drop
10 iptables-translate -I OUTPUT -p tcp --dport 1020:1023 --sport 53 -j ACCEPT
11 nft insert rule ip filter OUTPUT tcp sport 53 tcp dport 1020-1023 counter accept
19 iptables-translate -A INPUT -p tcp --syn --dport 80 -j ACCEPT
20 nft add rule ip filter INPUT tcp dport 80 tcp flags & (fin|syn|rst|ack) == syn counter accept
25 iptables-translate -A INPUT ! -f -p tcp --dport 22
26 nft add rule ip filter INPUT ip frag-off & 0x1fff 0 tcp dport 22 counter
Dlibxt_cpu.txlate1 iptables-translate -A INPUT -p tcp --dport 80 -m cpu --cpu 0 -j ACCEPT
2 nft add rule ip filter INPUT tcp dport 80 cpu 0 counter accept
4 iptables-translate -A INPUT -p tcp --dport 80 -m cpu ! --cpu 1 -j ACCEPT
5 nft add rule ip filter INPUT tcp dport 80 cpu != 1 counter accept
Dlibipt_REDIRECT.txlate1 iptables-translate -t nat -A prerouting -p tcp --dport 80 -j REDIRECT --to-ports 8080
2 nft add rule ip nat prerouting tcp dport 80 counter redirect to :8080
4 iptables-translate -t nat -A prerouting -p tcp --dport 80 -j REDIRECT --to-ports 8080 --random
5 nft add rule ip nat prerouting tcp dport 80 counter redirect to :8080 random
Dlibip6t_REDIRECT.txlate1 ip6tables-translate -t nat -A prerouting -p tcp --dport 80 -j REDIRECT --to-ports 8080
2 nft add rule ip6 nat prerouting tcp dport 80 counter redirect to :8080
4 ip6tables-translate -t nat -A prerouting -p tcp --dport 80 -j REDIRECT --to-ports 8080 --random
5 nft add rule ip6 nat prerouting tcp dport 80 counter redirect to :8080 random
Dlibxt_udp.txlate4 iptables-translate -A OUTPUT -p udp -o eth0 --dport 53:66 -j DROP
5 nft add rule ip filter OUTPUT oifname "eth0" udp dport 53-66 counter drop
10 iptables-translate -I OUTPUT -p udp --dport 1020:1023 --sport 53 -j ACCEPT
11 nft insert rule ip filter OUTPUT udp sport 53 udp dport 1020-1023 counter accept
/external/tcpdump/
Dprint-udp.c317 udpipaddr_print(netdissect_options *ndo, const struct ip *ip, int sport, int dport) in udpipaddr_print() argument
337 udpport_string(ndo, dport))); in udpipaddr_print()
343 udpport_string(ndo, dport))); in udpipaddr_print()
357 udpport_string(ndo, dport))); in udpipaddr_print()
363 udpport_string(ndo, dport))); in udpipaddr_print()
377 uint16_t sport, dport, ulen; in udp_print() local
394 dport = EXTRACT_16BITS(&up->uh_dport); in udp_print()
397 udpipaddr_print(ndo, ip, sport, dport); in udp_print()
402 udpipaddr_print(ndo, ip, sport, dport); in udp_print()
407 udpipaddr_print(ndo, ip, sport, dport); in udp_print()
[all …]
/external/autotest/client/deps/lansim/src/py/
Dhost.py177 def _tcp_pick_port(self, dhost, dport): argument
180 if (dhost, dport, p) in self._tcp_fwd_out:
192 dport = pkt.ip.tcp.dport
195 if (shost, sport, dport) in self._tcp_fwd_out:
196 fhost, fport, oport = self._tcp_fwd_out[(shost, sport, dport)]
199 pkt.ip.tcp.dport = fport
206 if dport in self._tcp_fwd_ports:
208 fhost, fport = self._tcp_fwd_ports[dport]
212 if (shost, sport, dport) in self._tcp_fwd_in:
213 lport = self._tcp_fwd_in[(shost, sport, dport)]
[all …]
/external/ltp/testcases/network/iptables/
Diptables_lib.sh241 local dport=45886
247 NFRUN -A INPUT -p tcp -d $loc_addr --dport $dport -j LOG \
255 tst_res TINFO "telnet $loc_addr $dport"
256 telnet $loc_addr $dport > tst_iptables.out 2>&1
262 "$toolname did not log packets to port $dport"
266 tst_res TINFO "Packets to port $dport logged"
269 tst_res TFAIL "telnet to $loc_addr $dport should fail"
283 local dport=0
288 NFRUN -A INPUT -p tcp -d $loc_addr --dport 45801:45803 -j LOG \
306 for dport in 45801 45802 45803 45804 45805 45806; do
[all …]
/external/iptables/iptables/tests/shell/testcases/ipt-save/dumps/
Dfedora27-iptables26 [0:0] -A POSTROUTING -o virbr0 -p udp -m udp --dport 68 -j CHECKSUM --checksum-fill
56 [0:0] -A PRE_FedoraWorkstation_allow -p udp -m udp --dport 137 -j CT --helper netbios-ns
85 [5:6] -A INPUT -i virbr0 -p udp -m udp --dport 53 -j ACCEPT
86 [0:123456789] -A INPUT -i virbr0 -p tcp -m tcp --dport 53 -j ACCEPT
87 [0:0] -A INPUT -i virbr0 -p udp -m udp --dport 67 -j ACCEPT
88 [0:0] -A INPUT -i virbr0 -p tcp -m tcp --dport 67 -j ACCEPT
110 [0:0] -A OUTPUT -o virbr0 -p udp -m udp --dport 68 -j ACCEPT
129 [0:0] -A IN_FedoraWorkstation_allow -p udp -m udp --dport 137 -m conntrack --ctstate NEW -j ACCEPT
130 [0:0] -A IN_FedoraWorkstation_allow -p udp -m udp --dport 138 -m conntrack --ctstate NEW -j ACCEPT
131 [0:0] -A IN_FedoraWorkstation_allow -p tcp -m tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT
[all …]
Dipt-save-filter.txt16 -A INPUT -i ppp0 -p tcp -m tcp --dport 22 -j in_trusted
18 -A FORWARD -d 192.168.100.77/32 -i ppp0 -p udp -m udp --dport 4166 -j ACCEPT
19 -A FORWARD -d 192.168.100.77/32 -i ppp0 -p tcp -m tcp --dport 4180 -j ACCEPT
20 -A FORWARD -d 192.168.100.77/32 -i ppp0 -p tcp -m tcp --dport 4162 -j ACCEPT
21 -A FORWARD -d 192.168.100.77/32 -i ppp0 -p tcp -m tcp --dport 20376 -j ACCEPT
22 -A FORWARD -d 192.168.100.2/32 -i ppp0 -p tcp -m tcp --dport 10209 -j ACCEPT
23 -A FORWARD -d 192.168.100.2/32 -i ppp0 -p tcp -m tcp --dport 881 -j ACCEPT
34 -A FORWARD -i ppp0 -p udp -m udp --dport 137:139 -j DROP
35 -A FORWARD -i ppp0 -p udp -m udp --dport 445 -j DROP
36 -A FORWARD -i ppp0 -p tcp -m tcp --dport 137:139 -j DROP
[all …]
Dwireless.txt8 -A port_assignment -p tcp -m tcp --dport 1723 -j CT --helper pptp
28 -A INPUT -s 10.78.129.130/32 -p tcp -m tcp --dport 5666 -j L_ACCEPT
32 -A INPUT -s 10.31.70.8/29 -i bond0.208 -p tcp -m tcp --dport 179 --tcp-flags FIN,SYN,RST,ACK SYN -j…
33 -A INPUT -s 10.44.224.8/29 -i bond0.686 -p tcp -m tcp --dport 179 --tcp-flags FIN,SYN,RST,ACK SYN -…
56 -A CUST_I15_IN -p tcp -m tcp --dport 22 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT
57 -A CUST_I15_IN -p tcp -m tcp --dport 80 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT
58 -A CUST_I15_IN -p tcp -m tcp --dport 433 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT
59 -A CUST_I15_IN -p tcp -m tcp --dport 3306 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT
60 -A CUST_I15_IN -p tcp -m tcp --dport 3390 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT
64 -A CUST_I16_IN -p tcp -m tcp --dport 3390 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT
[all …]
/external/linux-kselftest/tools/testing/selftests/bpf/progs/
Dtest_xdp_loop.c87 int dport; in handle_ipv4() local
94 dport = get_dport(iph + 1, data_end, iph->protocol); in handle_ipv4()
95 if (dport == -1) in handle_ipv4()
101 vip.dport = dport; in handle_ipv4()
159 int dport; in handle_ipv6() local
164 dport = get_dport(ip6h + 1, data_end, ip6h->nexthdr); in handle_ipv6()
165 if (dport == -1) in handle_ipv6()
171 vip.dport = dport; in handle_ipv6()
Dtest_xdp.c91 int dport; in handle_ipv4() local
98 dport = get_dport(iph + 1, data_end, iph->protocol); in handle_ipv4()
99 if (dport == -1) in handle_ipv4()
105 vip.dport = dport; in handle_ipv4()
163 int dport; in handle_ipv6() local
168 dport = get_dport(ip6h + 1, data_end, ip6h->nexthdr); in handle_ipv6()
169 if (dport == -1) in handle_ipv6()
175 vip.dport = dport; in handle_ipv6()
/external/scapy/scapy/layers/
Dtftp.py109 bind_layers(UDP, TFTP, dport=69)
132 and pkt[UDP].dport == self.my_tid
140 bind_bottom_up(UDP, TFTP, dport=self.my_tid)
144 self.l3 = IP(dst=self.server)/UDP(sport=self.my_tid, dport=self.port)/TFTP()
162 self.l3[UDP].dport = self.server_tid
201 split_bottom_up(UDP, TFTP, dport=self.my_tid)
207 split_bottom_up(UDP, TFTP, dport=self.my_tid)
225 and pkt[UDP].dport == self.my_tid
235 bind_bottom_up(UDP, TFTP, dport=self.my_tid)
238 self.l3 = IP(dst=self.server)/UDP(sport=self.my_tid, dport=self.port)/TFTP()
[all …]
Dvxlan.py67 bind_layers(UDP, VXLAN, dport=4789) # RFC standard vxlan port
68 bind_layers(UDP, VXLAN, dport=4790) # RFC standard vxlan-gpe port
69 bind_layers(UDP, VXLAN, dport=6633) # New IANA assigned port for use with NSH
70 bind_layers(UDP, VXLAN, dport=8472) # Linux implementation port
76 bind_layers(UDP, VXLAN, sport=4789, dport=4789)
Dhsrp.py80 bind_layers(UDP, HSRP, dport=1985, sport=1985)
81 bind_layers(UDP, HSRP, dport=2029, sport=2029)
82 DestIPField.bind_addr(UDP, "224.0.0.2", dport=1985)
83 DestIP6Field.bind_addr(UDP, "ff02::66", dport=2029)
/external/libnl/lib/xfrm/
Dselector.c168 ((a->dport & a->dport_mask) != (b->dport & b->dport_mask)) || in xfrmnl_sel_cmp()
187 sel->dport, sel->dport_mask, sel->sport, sel->sport_mask); in xfrmnl_sel_dump()
235 return sel->dport; in xfrmnl_sel_get_dport()
238 int xfrmnl_sel_set_dport (struct xfrmnl_sel* sel, unsigned int dport) in xfrmnl_sel_set_dport() argument
240 sel->dport = dport; in xfrmnl_sel_set_dport()

12345678