Home
last modified time | relevance | path

Searched full:tcp (Results 1 – 25 of 3893) sorted by relevance

12345678910>>...156

/external/iptables/extensions/
Dlibxt_tcp.t2 -p tcp -m tcp --sport 1;=;OK
3 -p tcp -m tcp --sport 65535;=;OK
4 -p tcp -m tcp --dport 1;=;OK
5 -p tcp -m tcp --dport 65535;=;OK
6 -p tcp -m tcp --sport 1:1023;=;OK
7 -p tcp -m tcp --sport 1024:65535;=;OK
8 -p tcp -m tcp --sport 1024:;-p tcp -m tcp --sport 1024:65535;OK
9 -p tcp -m tcp --sport :;-p tcp -m tcp;OK
10 -p tcp -m tcp ! --sport :;-p tcp -m tcp ! --sport 0:65535;OK
11 -p tcp -m tcp --sport :4;-p tcp -m tcp --sport 0:4;OK
[all …]
Dlibxt_tcp.txlate1 iptables-translate -A INPUT -p tcp -i eth0 --sport 53 -j ACCEPT
2 nft 'add rule ip filter INPUT iifname "eth0" tcp sport 53 counter accept'
4 iptables-translate -A OUTPUT -p tcp -o eth0 --dport 53:66 -j DROP
5 nft 'add rule ip filter OUTPUT oifname "eth0" tcp dport 53-66 counter drop'
7 iptables-translate -I OUTPUT -p tcp -d 8.8.8.8 -j ACCEPT
8 nft 'insert rule ip filter OUTPUT ip protocol tcp ip daddr 8.8.8.8 counter accept'
10 iptables-translate -I OUTPUT -p tcp --dport 1020:1023 --sport 53 -j ACCEPT
11 nft 'insert rule ip filter OUTPUT tcp sport 53 tcp dport 1020-1023 counter accept'
13 iptables -A INPUT -p tcp --tcp-flags ACK,FIN FIN -j DROP
14 nft 'add rule ip filter INPUT tcp flags fin / fin,ack counter drop'
[all …]
/external/ltp/runtest/
Dnet.nfs6 nfs01_v30_ip4t nfs01.sh -v 3 -t tcp
7 nfs01_v40_ip4t nfs01.sh -v 4 -t tcp
8 nfs01_v41_ip4t nfs01.sh -v 4.1 -t tcp
9 nfs01_v42_ip4t nfs01.sh -v 4.2 -t tcp
11 nfs01_v30_ip6t nfs01.sh -6 -v 3 -t tcp
12 nfs01_v40_ip6t nfs01.sh -6 -v 4 -t tcp
13 nfs01_v41_ip6t nfs01.sh -6 -v 4.1 -t tcp
14 nfs01_v42_ip6t nfs01.sh -6 -v 4.2 -t tcp
17 nfs02_v30_ip4t nfs02.sh -v 3 -t tcp
18 nfs02_v40_ip4t nfs02.sh -v 4 -t tcp
[all …]
/external/rust/android-crates-io/crates/grpcio-sys/grpc/third_party/cares/cares/src/lib/
Dares_platform.c96 {"tcpmux", {NULL}, 1, "tcp"},
98 {"compressnet", {NULL}, 2, "tcp"},
100 {"compressnet", {NULL}, 3, "tcp"},
102 {"rje", {NULL}, 5, "tcp"},
104 {"echo", {NULL}, 7, "tcp"},
106 {"discard", {NULL}, 9, "tcp"},
110 {"systat", {NULL}, 11, "tcp"},
112 {"daytime", {NULL}, 13, "tcp"},
114 {"qotd", {NULL}, 17, "tcp"},
116 {"msp", {NULL}, 18, "tcp"},
[all …]
/external/strace/
Dtime.c37 print_timezone(struct tcb *const tcp, const kernel_ulong_t addr) in print_timezone() argument
41 if (umove_or_printaddr(tcp, addr, &tz)) in print_timezone()
50 if (exiting(tcp)) { in SYS_FUNC()
51 print_timeval(tcp, tcp->u_arg[0]); in SYS_FUNC()
53 print_timezone(tcp, tcp->u_arg[1]); in SYS_FUNC()
61 if (exiting(tcp)) { in SYS_FUNC()
62 print_timeval32(tcp, tcp->u_arg[0]); in SYS_FUNC()
64 print_timezone(tcp, tcp->u_arg[1]); in SYS_FUNC()
72 print_timeval(tcp, tcp->u_arg[0]); in SYS_FUNC()
74 print_timezone(tcp, tcp->u_arg[1]); in SYS_FUNC()
[all …]
Dsyscall.c277 update_personality(struct tcb *tcp, unsigned int personality) in update_personality() argument
284 if (personality == tcp->currpers) in update_personality()
286 tcp->currpers = personality; in update_personality()
290 tcp->pid, personality_names[personality]); in update_personality()
304 decode_socket_subcall(struct tcb *tcp) in decode_socket_subcall() argument
306 const int call = tcp->u_arg[0]; in decode_socket_subcall()
315 if (umoven(tcp, tcp->u_arg[1], nargs * current_wordsize, buf) < 0) in decode_socket_subcall()
318 tcp->scno = scno; in decode_socket_subcall()
319 tcp->qual_flg = qual_flags(scno); in decode_socket_subcall()
320 tcp->s_ent = &sysent[scno]; in decode_socket_subcall()
[all …]
Dio.c38 if (entering(tcp)) { in SYS_FUNC()
39 printfd(tcp, tcp->u_arg[0]); in SYS_FUNC()
42 if (syserror(tcp)) in SYS_FUNC()
43 printaddr(tcp->u_arg[1]); in SYS_FUNC()
45 printstrn(tcp, tcp->u_arg[1], tcp->u_rval); in SYS_FUNC()
46 tprintf(", %" PRI_klu, tcp->u_arg[2]); in SYS_FUNC()
53 printfd(tcp, tcp->u_arg[0]); in SYS_FUNC()
55 printstrn(tcp, tcp->u_arg[1], tcp->u_arg[2]); in SYS_FUNC()
56 tprintf(", %" PRI_klu, tcp->u_arg[2]); in SYS_FUNC()
67 print_iovec(struct tcb *tcp, void *elem_buf, size_t elem_size, void *data) in print_iovec() argument
[all …]
Dxattr.c43 print_xattr_val(struct tcb *const tcp, in print_xattr_val() argument
53 printstr_ex(tcp, addr, size, QUOTE_OMIT_TRAILING_0); in print_xattr_val()
59 printpath(tcp, tcp->u_arg[0]); in SYS_FUNC()
61 printstr(tcp, tcp->u_arg[1]); in SYS_FUNC()
62 print_xattr_val(tcp, tcp->u_arg[2], tcp->u_arg[3], tcp->u_arg[3]); in SYS_FUNC()
64 printflags(xattrflags, tcp->u_arg[4], "XATTR_???"); in SYS_FUNC()
70 printfd(tcp, tcp->u_arg[0]); in SYS_FUNC()
72 printstr(tcp, tcp->u_arg[1]); in SYS_FUNC()
73 print_xattr_val(tcp, tcp->u_arg[2], tcp->u_arg[3], tcp->u_arg[3]); in SYS_FUNC()
75 printflags(xattrflags, tcp->u_arg[4], "XATTR_???"); in SYS_FUNC()
[all …]
Dnet.c41 # include <netinet/tcp.h>
103 decode_sockbuf(struct tcb *const tcp, const int fd, const kernel_ulong_t addr, in decode_sockbuf() argument
107 switch (verbose(tcp) ? getfdproto(tcp, fd) : SOCK_PROTO_UNKNOWN) { in decode_sockbuf()
109 decode_netlink(tcp, fd, addr, addrlen); in decode_sockbuf()
112 printstrn(tcp, addr, addrlen); in decode_sockbuf()
137 printxval(addrfams, tcp->u_arg[0], "AF_???"); in SYS_FUNC()
139 tprint_sock_type(tcp->u_arg[1]); in SYS_FUNC()
141 switch (tcp->u_arg[0]) { in SYS_FUNC()
144 printxval_search(inet_protocols, tcp->u_arg[2], "IPPROTO_???"); in SYS_FUNC()
149 printxval_searchn_ex(ARRSZ_PAIR(ax25_protocols), tcp->u_arg[2], in SYS_FUNC()
[all …]
Dfcntl.c57 printflock64(struct tcb *const tcp, const kernel_ulong_t addr, const int getlk) in printflock64() argument
61 if (fetch_struct_flock64(tcp, addr, &fl)) in printflock64()
66 printflock(struct tcb *const tcp, const kernel_ulong_t addr, const int getlk) in printflock() argument
70 if (fetch_struct_flock(tcp, addr, &fl)) in printflock()
75 print_f_owner_ex(struct tcb *const tcp, const kernel_ulong_t addr) in print_f_owner_ex() argument
79 if (umove_or_printaddr(tcp, addr, &owner)) in print_f_owner_ex()
88 print_fcntl(struct tcb *tcp) in print_fcntl() argument
90 const unsigned int cmd = tcp->u_arg[1]; in print_fcntl()
95 printflags(fdflags, tcp->u_arg[2], "FD_???"); in print_fcntl()
99 tprintf(", %" PRI_kld, tcp->u_arg[2]); in print_fcntl()
[all …]
Dkeyctl.c53 printstr(tcp, tcp->u_arg[0]); in SYS_FUNC()
56 printstr(tcp, tcp->u_arg[1]); in SYS_FUNC()
59 printstrn(tcp, tcp->u_arg[2], tcp->u_arg[3]); in SYS_FUNC()
61 tprintf(", %" PRI_klu ", ", tcp->u_arg[3]); in SYS_FUNC()
63 print_keyring_serial_number(tcp->u_arg[4]); in SYS_FUNC()
71 printstr(tcp, tcp->u_arg[0]); in SYS_FUNC()
74 printstr(tcp, tcp->u_arg[1]); in SYS_FUNC()
77 printstr(tcp, tcp->u_arg[2]); in SYS_FUNC()
80 print_keyring_serial_number(tcp->u_arg[3]); in SYS_FUNC()
86 keyctl_get_keyring_id(struct tcb *tcp, key_serial_t id, int create) in keyctl_get_keyring_id() argument
[all …]
Dsignal.c97 * memcpy(&tcp->u_arg[1], &something, sizeof(sigset_t))
99 * it may overflow tcp->u_arg[] array, and it may try to copy more data
102 * umoven(tcp, addr, sizeof(sigset_t), &sigset)
255 print_sigset_addr_len_limit(struct tcb *const tcp, const kernel_ulong_t addr, in print_sigset_addr_len_limit() argument
267 if (umoven_or_printaddr(tcp, addr, len, mask)) in print_sigset_addr_len_limit()
273 print_sigset_addr_len(struct tcb *const tcp, const kernel_ulong_t addr, in print_sigset_addr_len() argument
276 print_sigset_addr_len_limit(tcp, addr, len, current_wordsize); in print_sigset_addr_len()
280 print_sigset_addr(struct tcb *const tcp, const kernel_ulong_t addr) in print_sigset_addr() argument
282 print_sigset_addr_len_limit(tcp, addr, NSIG_BYTES, NSIG_BYTES); in print_sigset_addr()
287 if (entering(tcp)) { in SYS_FUNC()
[all …]
Dmmsghdr.c38 fetch_struct_mmsghdr_for_print(struct tcb *const tcp, in fetch_struct_mmsghdr_for_print() argument
42 return (entering(tcp) || !syserror(tcp)) && in fetch_struct_mmsghdr_for_print()
43 fetch_struct_mmsghdr(tcp, addr, mh); in fetch_struct_mmsghdr_for_print()
54 print_struct_mmsghdr(struct tcb *tcp, void *elem_buf, in print_struct_mmsghdr() argument
67 print_struct_msghdr(tcp, &mmsg->msg_hdr, c->p_user_msg_namelen, in print_struct_mmsghdr()
98 save_mmsgvec_namelen(struct tcb *const tcp, kernel_ulong_t addr, in save_mmsgvec_namelen() argument
114 fetched = fetch_struct_mmsghdr(tcp, addr, &mh); in save_mmsgvec_namelen()
121 set_tcb_priv_data(tcp, data, free_mmsgvec_data); in save_mmsgvec_namelen()
125 decode_mmsgvec(struct tcb *const tcp, const kernel_ulong_t addr, in decode_mmsgvec() argument
135 const struct mmsgvec_data *const data = get_tcb_priv_data(tcp); in decode_mmsgvec()
[all …]
Dmq.c35 printpath(tcp, tcp->u_arg[0]); in SYS_FUNC()
38 tprint_open_modes(tcp->u_arg[1]); in SYS_FUNC()
39 if (tcp->u_arg[1] & O_CREAT) { in SYS_FUNC()
42 print_numeric_umode_t(tcp->u_arg[2]); in SYS_FUNC()
44 printmqattr(tcp, tcp->u_arg[3], false); in SYS_FUNC()
51 printfd(tcp, tcp->u_arg[0]); in SYS_FUNC()
53 printstrn(tcp, tcp->u_arg[1], tcp->u_arg[2]); in SYS_FUNC()
54 tprintf(", %" PRI_klu ", %u, ", tcp->u_arg[2], in SYS_FUNC()
55 (unsigned int) tcp->u_arg[3]); in SYS_FUNC()
56 print_timespec(tcp, tcp->u_arg[4]); in SYS_FUNC()
[all …]
Dmem.c60 printaddr(tcp->u_arg[0]); in SYS_FUNC()
97 print_mmap(struct tcb *tcp, kernel_ulong_t *u_arg, unsigned long long offset) in print_mmap() argument
111 printfd(tcp, fd); in print_mmap()
128 fetch_indirect_syscall_args(tcp, tcp->u_arg[0], 6); in SYS_FUNC()
131 print_mmap(tcp, args, args[5]); in SYS_FUNC()
133 printaddr(tcp->u_arg[0]); in SYS_FUNC()
143 fetch_indirect_syscall_args(tcp, tcp->u_arg[0], 6); in SYS_FUNC()
151 print_mmap(tcp, args, offset); in SYS_FUNC()
153 printaddr(tcp->u_arg[0]); in SYS_FUNC()
169 print_mmap(tcp, tcp->u_arg, tcp->u_arg[5]); in SYS_FUNC()
[all …]
Dnuma.c33 print_node(struct tcb *tcp, void *elem_buf, size_t elem_size, void *data) in print_node() argument
47 print_nodemask(struct tcb *const tcp, const kernel_ulong_t addr, in print_nodemask() argument
61 print_array(tcp, addr, nmemb, &buf, current_wordsize, in print_nodemask()
67 tprintf("%d, %" PRI_klu ", ", (int) tcp->u_arg[0], tcp->u_arg[1]); in SYS_FUNC()
68 print_nodemask(tcp, tcp->u_arg[2], tcp->u_arg[1]); in SYS_FUNC()
70 print_nodemask(tcp, tcp->u_arg[3], tcp->u_arg[1]); in SYS_FUNC()
80 printaddr(tcp->u_arg[0]); in SYS_FUNC()
81 tprintf(", %" PRI_klu ", ", tcp->u_arg[1]); in SYS_FUNC()
82 printxval64(policies, tcp->u_arg[2], "MPOL_???"); in SYS_FUNC()
84 print_nodemask(tcp, tcp->u_arg[3], tcp->u_arg[4]); in SYS_FUNC()
[all …]
/external/openthread/src/cli/
DREADME_TCP.md1 # OpenThread CLI - TCP Example
3 The OpenThread TCP APIs may be invoked via the OpenThread CLI.
13 On node 1, initialize the TCP CLI module and listen for incoming connections using the example TCP
16 > tcp init
17 > tcp listen :: 30000
24 On node 2, initialize the TCP CLI module, connect to node 1, and send a simple message.
27 > tcp init
28 > tcp connect fe80:0:0:0:a8df:580a:860:ffa4 30000
29 > tcp send hello
34 After running the `tcp connect` command on node 2, you should see a printout on node 2 similar to b…
[all …]
/external/rust/android-crates-io/crates/grpcio-sys/grpc/src/core/lib/iomgr/
Dtcp_windows.cc131 static void tcp_free(grpc_tcp* tcp) { in tcp_free() argument
132 grpc_winsocket_destroy(tcp->socket); in tcp_free()
133 gpr_mu_destroy(&tcp->mu); in tcp_free()
134 grpc_slice_buffer_destroy(&tcp->last_read_buffer); in tcp_free()
135 delete tcp; in tcp_free()
139 #define TCP_UNREF(tcp, reason) tcp_unref((tcp), (reason), __FILE__, __LINE__) argument
140 #define TCP_REF(tcp, reason) tcp_ref((tcp), (reason), __FILE__, __LINE__) argument
141 static void tcp_unref(grpc_tcp* tcp, const char* reason, const char* file, in tcp_unref() argument
144 gpr_atm val = gpr_atm_no_barrier_load(&tcp->refcount.count); in tcp_unref()
146 "TCP unref %p : %s %" PRIdPTR " -> %" PRIdPTR, tcp, reason, val, in tcp_unref()
[all …]
Dtcp_posix.cc31 #include <netinet/tcp.h>
88 // TCP zero copy sendmsg flag.
207 gpr_log(GPR_INFO, "Disabling TCP TX zerocopy due to memory pressure.\n"); in TcpZerocopySendCtx()
231 // TCP send zerocopy maintains an implicit sequence number for every
525 // transport layer wants the TCP layer to collect timestamps for this write.
531 // requirement from the TCP endpoint layer is that this arg should be non-null
558 static void ZerocopyDisableAndWaitForRemaining(grpc_tcp* tcp);
617 static void drop_uncovered(grpc_tcp* /*tcp*/) { in drop_uncovered()
638 static void cover_self(grpc_tcp* tcp) { in cover_self() argument
662 gpr_log(GPR_INFO, "BACKUP_POLLER:%p add %p cnt %d->%d", p, tcp, in cover_self()
[all …]
/external/grpc-grpc/src/core/lib/iomgr/
Dtcp_windows.cc131 static void tcp_free(grpc_tcp* tcp) { in tcp_free() argument
132 grpc_winsocket_destroy(tcp->socket); in tcp_free()
133 gpr_mu_destroy(&tcp->mu); in tcp_free()
134 grpc_slice_buffer_destroy(&tcp->last_read_buffer); in tcp_free()
135 delete tcp; in tcp_free()
139 #define TCP_UNREF(tcp, reason) tcp_unref((tcp), (reason), __FILE__, __LINE__) argument
140 #define TCP_REF(tcp, reason) tcp_ref((tcp), (reason), __FILE__, __LINE__) argument
141 static void tcp_unref(grpc_tcp* tcp, const char* reason, const char* file, in tcp_unref() argument
144 gpr_atm val = gpr_atm_no_barrier_load(&tcp->refcount.count); in tcp_unref()
146 "TCP unref %p : %s %" PRIdPTR " -> %" PRIdPTR, tcp, reason, val, in tcp_unref()
[all …]
Dtcp_posix.cc37 #include <netinet/tcp.h>
95 // TCP zero copy sendmsg flag.
214 gpr_log(GPR_INFO, "Disabling TCP TX zerocopy due to memory pressure.\n"); in TcpZerocopySendCtx()
238 // TCP send zerocopy maintains an implicit sequence number for every
526 // transport layer wants the TCP layer to collect timestamps for this write.
532 // requirement from the TCP endpoint layer is that this arg should be non-null
606 static void ZerocopyDisableAndWaitForRemaining(grpc_tcp* tcp);
665 static void drop_uncovered(grpc_tcp* /*tcp*/) { in drop_uncovered()
686 static void cover_self(grpc_tcp* tcp) { in cover_self() argument
710 gpr_log(GPR_INFO, "BACKUP_POLLER:%p add %p cnt %d->%d", p, tcp, in cover_self()
[all …]
/external/libnl/etc/
Dpktloc39 # Transmission Control Protocol (TCP)
42 tcp.sport u16 tcp+0
43 tcp.dport u16 tcp+2
44 tcp.seq u32 tcp+4
45 tcp.ack u32 tcp+8
48 tcp.off u8 tcp+12 0xF0 4
51 tcp.reserved u8 tcp+12 0x04 1
54 tcp.ecn u16 tcp+12 0x01C00 6
56 # Individual TCP flags (0|1) (6 bits in total)
57 tcp.flag.urg u8 tcp+13 0x20 5
[all …]
/external/openthread/tests/scripts/expect/
Dcli-tcp-tls.exp39 send "tcp init tls\n"
43 send "tcp init tls\n"
46 send "tcp listen :: 30000\n"
48 send "tcp stoplistening\n"
52 send "tcp connect $addr_2 30000\n"
54 expect "TCP: Connection refused"
57 send "tcp listen :: 30000\n"
62 send "tcp bind $addr_1 25000\n"
64 send "tcp connect $addr_2 30000\n"
66 expect "TCP: Connection established"
[all …]
/external/iptables/iptables/tests/shell/testcases/ipt-save/dumps/
Dwireless.txt8 -A port_assignment -p tcp -m tcp --dport 1723 -j CT --helper pptp
28 -A INPUT -s 10.78.129.130/32 -p tcp -m tcp --dport 5666 -j L_ACCEPT
29 -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m multiport --dports 22,80,443,873,1723 -j …
32 -A INPUT -s 10.31.70.8/29 -i bond0.208 -p tcp -m tcp --dport 179 --tcp-flags FIN,SYN,RST,ACK SYN -j…
33 -A INPUT -s 10.44.224.8/29 -i bond0.686 -p tcp -m tcp --dport 179 --tcp-flags FIN,SYN,RST,ACK SYN -…
46 -A FORWARD -p tcp -m tcp --tcp-flags FIN,SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
56 -A CUST_I15_IN -p tcp -m tcp --dport 22 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT
57 -A CUST_I15_IN -p tcp -m tcp --dport 80 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT
58 -A CUST_I15_IN -p tcp -m tcp --dport 433 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT
59 -A CUST_I15_IN -p tcp -m tcp --dport 3306 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT
[all …]
/external/sdv/vsomeip/third_party/boost/asio/test/ip/
Dtcp.cpp2 // tcp.cpp
20 #include <boost/asio/ip/tcp.hpp>
49 // ip::tcp compile and link correctly. Runtime failures are ignored.
61 ip::tcp::socket sock(ioc); in test()
65 ip::tcp::no_delay no_delay1(true); in test()
67 ip::tcp::no_delay no_delay2; in test()
75 ip::tcp::endpoint ep; in test()
76 (void)static_cast<std::size_t>(std::hash<ip::tcp::endpoint>()(ep)); in test()
90 // The following test checks the runtime operation of the ip::tcp class.
100 ip::tcp::socket sock(ioc, ip::tcp::v4()); in test()
[all …]

12345678910>>...156