/external/scapy/scapy/contrib/ |
D | openflow.py | 503 overload_fields = {TCP: {"sport": 6653}} 539 overload_fields = {TCP: {"dport": 6653}} 558 overload_fields = {TCP: {"dport": 6653}} 577 overload_fields = {TCP: {"dport": 6653}} 593 overload_fields = {TCP: {"dport": 6653}} 605 overload_fields = {TCP: {"dport": 6653}} 618 overload_fields = {TCP: {"dport": 6653}} 636 overload_fields = {TCP: {"sport": 6653}} 644 overload_fields = {TCP: {"sport": 6653}} 653 overload_fields = {TCP: {"sport": 6653}} [all …]
|
D | openflow.uts | 60 = TCP()/OFPTStatsRequestDesc(), check default sport 61 p = TCP()/OFPTStatsRequestDesc() 62 p[TCP].sport == 6653 64 = TCP()/OFPETHelloFailed(), check default dport 65 p = TCP()/OFPETHelloFailed() 66 p[TCP].dport == 6653 68 = TCP()/OFPTHello() dissection, check new TCP.guess_payload_class 69 o = TCP()/OFPTHello() 70 p = TCP(raw(o)) 71 p[TCP].sport == 6653 [all …]
|
D | openflow3.py | 1652 overload_fields = {TCP: {"sport": 6653}} 1697 overload_fields = {TCP: {"dport": 6653}} 1721 overload_fields = {TCP: {"dport": 6653}} 1747 overload_fields = {TCP: {"dport": 6653}} 1766 overload_fields = {TCP: {"dport": 6653}} 1788 overload_fields = {TCP: {"dport": 6653}} 1806 overload_fields = {TCP: {"dport": 6653}} 1831 overload_fields = {TCP: {"dport": 6653}} 1846 overload_fields = {TCP: {"dport": 6653}} 1859 overload_fields = {TCP: {"dport": 6653}} [all …]
|
D | openflow3.uts | 70 = TCP()/OFPMPRequestDesc(), check default sport 71 p = TCP()/OFPMPRequestDesc() 72 p[TCP].sport == 6653 74 = TCP()/OFPETHelloFailed(), check default dport 75 p = TCP()/OFPETHelloFailed() 76 p[TCP].dport == 6653 78 = TCP()/OFPTHello() dissection, check new TCP.guess_payload_class 79 o = TCP()/OFPTHello() 80 p = TCP(raw(o)) 81 p[TCP].sport == 6653 [all …]
|
/external/scapy/test/ |
D | ipsec.uts | 17 p /= TCP(sport=45012, dport=80) 34 assert(not e.haslayer(TCP)) 42 assert(d[TCP] == p[TCP]) 48 p /= TCP(sport=45012, dport=80) 66 assert(not e.haslayer(TCP)) 75 assert(d[TCP] == p[TCP]) 100 p /= TCP(sport=45012, dport=80) 118 assert(not e.haslayer(TCP)) 127 assert(d[TCP] == p[TCP]) 152 p /= TCP(sport=45012, dport=80) [all …]
|
D | p0f.uts | 64 pkt = p0f_impersonate(IP()/TCP(), signature=sig) 69 pkt = p0f_impersonate(IP()/TCP(), signature=sig) 75 pkt = p0f_impersonate(IP()/TCP(options=opts), signature=sig) 81 pkt = p0f_impersonate(IP()/TCP(options=opts), signature=sig) 87 pkt = p0f_impersonate(IP()/TCP(options=opts), signature=sig) 94 pkt = p0f_impersonate(IP()/TCP(options=opts), signature=sig) 103 pkt = p0f_impersonate(IP()/TCP(options=opts), signature=sig)
|
D | fields.uts | 236 x.plist=[IP()/TCP(), IP()/UDP()] 242 x=TestPLF(plist=[IP()/TCP(seq=1234567), IP()/UDP()]) 245 IP in _ and TCP in _ and UDP in _ and _[TCP].seq == 1234567 249 y=IP()/TCP(seq=111111)/TestPLF(plist=[IP()/TCP(seq=222222),IP()/UDP()]) 250 TestPLF(plist=[y,IP()/TCP(seq=333333)]) 252 IP in _ and TCP in _ and UDP in _ and _[TCP].seq == 111111 and _[TCP:2].seq==222222 and _[TCP:3].se… 274 x.plist=[IP()/TCP(), IP()/UDP()] 280 x=TestPLF(plist=[IP()/TCP(seq=1234567), IP()/UDP()]) 283 IP in _ and TCP in _ and UDP in _ and _[TCP].seq == 1234567 287 y=IP()/TCP(seq=111111)/TestPLF(plist=[IP()/TCP(seq=222222),IP()/UDP()]) [all …]
|
/external/tcpdump/tests/ |
D | of10_7050sx_bsn-vv.out | 1 IP (tos 0x0, ttl 55, id 5483, offset 0, flags [DF], proto TCP (6), length 60) 3 IP (tos 0x0, ttl 64, id 26571, offset 0, flags [DF], proto TCP (6), length 40) 5 IP (tos 0x0, ttl 55, id 49495, offset 0, flags [DF], proto TCP (6), length 60) 7 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 9 IP (tos 0x0, ttl 55, id 49496, offset 0, flags [DF], proto TCP (6), length 52) 11 IP (tos 0x0, ttl 64, id 60691, offset 0, flags [DF], proto TCP (6), length 60) 14 IP (tos 0x0, ttl 55, id 49497, offset 0, flags [DF], proto TCP (6), length 52) 16 IP (tos 0x0, ttl 55, id 49498, offset 0, flags [DF], proto TCP (6), length 60) 19 IP (tos 0x0, ttl 64, id 60692, offset 0, flags [DF], proto TCP (6), length 52) 21 IP (tos 0x0, ttl 64, id 60693, offset 0, flags [DF], proto TCP (6), length 60) [all …]
|
D | kday7.out | 3 IP (tos 0x10, ttl 62, id 64806, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 3da6 (->3… 10 IP (tos 0x0, ttl 64, id 63178, offset 0, flags [DF], proto TCP (6), length 52) 12 IP (tos 0x0, ttl 64, id 36752, offset 0, flags [DF], proto TCP (6), length 399, bad cksum a46b (->a… 15 IP (tos 0x10, ttl 62, id 64806, offset 0, flags [DF], proto TCP (6), length 52) 17 IP (tos 0x10, ttl 62, id 62920, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 4504 (->4… 19 IP (tos 0x0, ttl 64, id 63178, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 3e8c (->43… 21 IP (tos 0x0, ttl 64, id 36752, offset 0, flags [DF], proto TCP (6), length 399, bad cksum a46b (->a… 24 IP truncated-ip - 768 bytes missing! (tos 0x10, ttl 62, id 64806, offset 0, flags [DF], proto TCP (… 26 IP (tos 0x6,ECT(0), ttl 62, id 62920, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 450… 28 IP (tos 0x0, ttl 64, id 63178, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 3e8c (->43… [all …]
|
D | kday4.out | 3 IP (tos 0x10, ttl 62, id 64806, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 3da6 (->3… 10 IP (tos 0x0, ttl 64, id 63178, offset 0, flags [DF], proto TCP (6), length 52) 12 IP (tos 0x0, ttl 64, id 36752, offset 0, flags [DF], proto TCP (6), length 399, bad cksum a46b (->a… 15 IP (tos 0x10, ttl 62, id 64806, offset 0, flags [DF], proto TCP (6), length 52) 17 IP (tos 0x10, ttl 62, id 62920, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 4504 (->4… 19 IP (tos 0x0, ttl 64, id 63178, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 3e8c (->43… 21 IP (tos 0x0, ttl 64, id 36752, offset 0, flags [DF], proto TCP (6), length 399, bad cksum a46b (->a… 24 IP truncated-ip - 768 bytes missing! (tos 0x10, ttl 62, id 64806, offset 0, flags [DF], proto TCP (… 26 IP (tos 0x6,ECT(0), ttl 62, id 62920, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 450… 28 IP (tos 0x0, ttl 64, id 63178, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 3e8c (->43… [all …]
|
D | zmtp1.out | 1 IP (tos 0x0, ttl 64, id 17993, offset 0, flags [DF], proto TCP (6), length 60) 3 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 5 IP (tos 0x0, ttl 64, id 17994, offset 0, flags [DF], proto TCP (6), length 52) 7 IP (tos 0x0, ttl 64, id 17995, offset 0, flags [DF], proto TCP (6), length 54) 10 IP (tos 0x0, ttl 64, id 51304, offset 0, flags [DF], proto TCP (6), length 52) 12 IP (tos 0x0, ttl 64, id 51305, offset 0, flags [DF], proto TCP (6), length 54) 15 IP (tos 0x0, ttl 64, id 17996, offset 0, flags [DF], proto TCP (6), length 52) 17 IP (tos 0x0, ttl 64, id 17997, offset 0, flags [DF], proto TCP (6), length 148) 28 IP (tos 0x0, ttl 64, id 51306, offset 0, flags [DF], proto TCP (6), length 84) 35 IP (tos 0x0, ttl 64, id 17998, offset 0, flags [DF], proto TCP (6), length 72) [all …]
|
D | kday3.out | 1 IP (tos 0x10, ttl 64, id 63177, offset 0, flags [DF], proto TCP (6), length 168) 4 IP (tos 0x10, ttl 62, id 62920, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 4504 (->4… 6 IP (tos 0x0, ttl 64, id 63178, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 3e8c (->43… 8 IP (tos 0x0, ttl 64, id 36752, offset 0, flags [DF], proto TCP (6), length 399, bad cksum a46b (->a… 11 IP (tos 0x10, ttl 62, id 64806, offset 0, flags [DF], proto TCP (6), length 52) 13 IP (tos 0x10, ttl 62, id 62920, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 4504 (->4… 15 IP (tos 0x0, ttl 64, id 63178, offset 0, flags [DF], proto TCP (6), length 52, bad cksum 3e8c (->43… 17 IP (tos 0x0, ttl 64, id 36752, offset 0, flags [DF], proto TCP (6), length 399, bad cksum a46b (->a…
|
D | of10_s4810-vvvv.out | 1 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 64) 3 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 5 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) 7 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 10 IP (tos 0x0, ttl 64, id 53094, offset 0, flags [DF], proto TCP (6), length 52) 12 IP (tos 0x0, ttl 64, id 53095, offset 0, flags [DF], proto TCP (6), length 60) 15 IP (tos 0x0, ttl 64, id 53096, offset 0, flags [DF], proto TCP (6), length 60) 18 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) 20 IP (tos 0x0, ttl 64, id 53469, offset 0, flags [DF], proto TCP (6), length 180) 40 IP (tos 0x0, ttl 64, id 53097, offset 0, flags [DF], proto TCP (6), length 136) [all …]
|
D | geneve-vv.out | 11 IP (tos 0x0, ttl 64, id 23057, offset 0, flags [DF], proto TCP (6), length 60) 15 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 19 IP (tos 0x0, ttl 64, id 23058, offset 0, flags [DF], proto TCP (6), length 52) 23 IP (tos 0x0, ttl 64, id 54890, offset 0, flags [DF], proto TCP (6), length 91) 27 IP (tos 0x0, ttl 64, id 23059, offset 0, flags [DF], proto TCP (6), length 52) 31 IP (tos 0x0, ttl 64, id 23060, offset 0, flags [DF], proto TCP (6), length 73) 35 IP (tos 0x0, ttl 64, id 54891, offset 0, flags [DF], proto TCP (6), length 52) 39 IP (tos 0x0, ttl 64, id 23061, offset 0, flags [DF], proto TCP (6), length 844) 43 IP (tos 0x0, ttl 64, id 54892, offset 0, flags [DF], proto TCP (6), length 52) 47 IP (tos 0x0, ttl 64, id 54893, offset 0, flags [DF], proto TCP (6), length 1036) [all …]
|
D | of10_pf5240-vv.out | 1 IP (tos 0xa0, ttl 64, id 10670, offset 0, flags [DF], proto TCP (6), length 60) 3 IP (tos 0xa0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) 5 IP (tos 0xa0, ttl 64, id 10673, offset 0, flags [DF], proto TCP (6), length 60) 7 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 9 IP (tos 0xa0, ttl 64, id 10674, offset 0, flags [DF], proto TCP (6), length 52) 11 IP (tos 0xa0, ttl 64, id 10675, offset 0, flags [DF], proto TCP (6), length 60) 14 IP (tos 0x0, ttl 64, id 16028, offset 0, flags [DF], proto TCP (6), length 52) 16 IP (tos 0x0, ttl 64, id 16029, offset 0, flags [DF], proto TCP (6), length 60) 19 IP (tos 0x0, ttl 64, id 16030, offset 0, flags [DF], proto TCP (6), length 60) 22 IP (tos 0xa0, ttl 64, id 10676, offset 0, flags [DF], proto TCP (6), length 52) [all …]
|
D | bgp_infloop-v.out | 1 IP (tos 0x0, ttl 128, id 1467, offset 0, flags [DF], proto TCP (6), length 74) 4 IP (tos 0x0, ttl 64, id 39449, offset 0, flags [DF], proto TCP (6), length 74) 7 IP (tos 0x0, ttl 128, id 43331, offset 0, flags [DF], proto TCP (6), length 74) 10 IP (tos 0x0, ttl 64, id 51082, offset 0, flags [DF], proto TCP (6), length 74) 13 IP (tos 0x0, ttl 64, id 51082, offset 0, flags [DF], proto TCP (6), length 74)
|
D | of10_p3295-vv.out | 1 IP (tos 0x0, ttl 64, id 55495, offset 0, flags [DF], proto TCP (6), length 60) 3 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 5 IP (tos 0x0, ttl 64, id 55496, offset 0, flags [DF], proto TCP (6), length 52) 7 IP (tos 0x0, ttl 64, id 778, offset 0, flags [DF], proto TCP (6), length 60) 10 IP (tos 0x0, ttl 64, id 55497, offset 0, flags [DF], proto TCP (6), length 52) 12 IP (tos 0x0, ttl 64, id 55498, offset 0, flags [DF], proto TCP (6), length 60) 15 IP (tos 0x0, ttl 64, id 779, offset 0, flags [DF], proto TCP (6), length 52) 17 IP (tos 0x0, ttl 64, id 780, offset 0, flags [DF], proto TCP (6), length 60) 20 IP (tos 0x0, ttl 64, id 55499, offset 0, flags [DF], proto TCP (6), length 52) 22 IP (tos 0x0, ttl 64, id 55500, offset 0, flags [DF], proto TCP (6), length 2628) [all …]
|
/external/iptables/extensions/ |
D | libxt_tcpmss.man | 1 …TCP MSS (maximum segment size) field of the TCP header. You can only use this on TCP SYN or SYN/A… 4 Match a given TCP MSS value or range. If a range is given, the second \fIvalue\fP must be greater t…
|
D | libxt_tcp.man | 20 Match when the TCP flags are as specified. The first argument \fImask\fP is the 33 Only match TCP packets with the SYN bit set and the ACK,RST and FIN bits 34 cleared. Such packets are used to request TCP connection initiation; 36 incoming TCP connections, but outgoing TCP connections will be 43 Match if TCP option set.
|
/external/grpc-grpc/src/objective-c/ |
D | NetworkTransitionBehavior.md | 18 * The underlying TCP connection is no longer valid, e.g. WiFi connects to 36 ### gRPC iOS with TCP Sockets 37 gRPC's default implementation is to use TCP sockets for networking. It turns 42 #### Issues with TCP Sockets 43 The TCP sockets on iOS is flawed in that it does not reflect the viability of 45 using TCP sockets: 46 * When a TCP socket connection is established on cellular data and WiFi 47 becomes available, the TCP socket neither return an error event nor continue 49 * A TCP socket does not report certain events that happen in the 50 background. When a TCP connection breaks in the background for the reason [all …]
|
/external/bcc/tools/ |
D | tcpretrans_example.txt | 4 This tool traces the kernel TCP retransmit function to show details of these 14 This output shows three TCP retransmits, the first two were for an IPv4 15 connection from 10.153.223.157 port 22 to 69.53.245.40 port 34619. The TCP 23 additional kernel details: the state of the TCP session at the time of the 27 A -l option will include TCP tail loss probe attempts: 67 Trace TCP retransmits 75 ./tcpretrans # trace TCP retransmits
|
D | tcpdrop_example.txt | 4 tcpdrop prints details of TCP packets or segments that were dropped by the 53 The last two columns show the state of the TCP session, and the TCP flags. 66 Trace TCP drops by the kernel 72 ./tcpdrop # trace kernel TCP drops
|
D | tcpconnlat_example.txt | 4 This tool traces the kernel function performing active TCP connections 26 TCP connection latency is a useful performance measure showing the time taken 27 to establish a connection. This typically involves kernel TCP/IP processing 39 Trace TCP connects and show connection latency 50 ./tcpconnlat # trace all TCP connect()s
|
/external/scapy/scapy/layers/ |
D | inet.py | 510 class TCP(Packet): class 545 if not isinstance(other, TCP): 744 class TCPerror(TCP): 747 if not isinstance(other, TCP): 811 bind_layers( IP, TCP, frag=0, proto=6) 1015 b = (x for x in tmp if IP in x and x[IP].src == ip and TCP in x) 1021 opts = p.getlayer(TCP).options 1185 a,b=sr(IP(dst=o.ip)/TCP(dport=[21,22,23,25,80,443]),timeout=2) 1237 if s.haslayer(TCP) or s.haslayer(UDP): 1303 if TCP in s: [all …]
|
D | skinny.py | 12 from scapy.layers.inet import TCP 160 bind_layers( TCP, Skinny, dport=2000) 161 bind_layers( TCP, Skinny, sport=2000)
|