Home
last modified time | relevance | path

Searched refs:TCP (Results 1 – 25 of 98) sorted by relevance

1234

/external/iptables/extensions/
Dlibxt_tcpmss.man1TCP MSS (maximum segment size) field of the TCP header. You can only use this on TCP SYN or SYN/A…
4 Match a given TCP MSS value or range.
Dlibxt_tcp.man21 Match when the TCP flags are as specified. The first argument \fImask\fP is the
34 Only match TCP packets with the SYN bit set and the ACK,RST and FIN bits
35 cleared. Such packets are used to request TCP connection initiation;
37 incoming TCP connections, but outgoing TCP connections will be
44 Match if TCP option set.
Dlibxt_TCPOPTSTRIP.man1 This target will strip TCP options off a TCP packet. (It will actually replace
5 Strip the given option(s). The options may be specified by TCP option number or
Dlibxt_ecn.man1 This allows you to match the ECN bits of the IPv4/IPv6 and TCP header. ECN is the Explicit Congest…
4 This matches if the TCP ECN CWR (Congestion Window Received) bit is set.
7 This matches if the TCP ECN ECE (ECN Echo) bit is set.
Dlibxt_udp.man8 option of the TCP extension for details.
14 option of the TCP extension for details.
Dlibip6t_REJECT.man27 can be used on rules which only match the TCP protocol: this causes a
28 TCP RST packet to be sent back. This is mainly useful for blocking
Dlibipt_REJECT.man26 can be used on rules which only match the TCP protocol: this causes a
27 TCP RST packet to be sent back. This is mainly useful for blocking
Dlibxt_LOG.man24 Log TCP sequence numbers. This is a security risk if the log is
28 Log options from the TCP packet header.
Dlibxt_u32.man113 TCP payload bytes 8-12 is any of 1, 2, 5 or 8
124 makes this the new offset into the packet, which is the start of the TCP
125 header. The length of the TCP header (again in 32 bit words) is the left half
126 of byte 12 of the TCP header. The \fB12>>26&3C\fP computes this length in bytes
128 start of the TCP payload. Finally, 8 reads bytes 8-12 of the payload and
/external/tcpdump/tests/
Dzmtp1.out1 IP (tos 0x0, ttl 64, id 17993, offset 0, flags [DF], proto TCP (6), length 60)
3 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
5 IP (tos 0x0, ttl 64, id 17994, offset 0, flags [DF], proto TCP (6), length 52)
7 IP (tos 0x0, ttl 64, id 17995, offset 0, flags [DF], proto TCP (6), length 54)
10 IP (tos 0x0, ttl 64, id 51304, offset 0, flags [DF], proto TCP (6), length 52)
12 IP (tos 0x0, ttl 64, id 51305, offset 0, flags [DF], proto TCP (6), length 54)
15 IP (tos 0x0, ttl 64, id 17996, offset 0, flags [DF], proto TCP (6), length 52)
17 IP (tos 0x0, ttl 64, id 17997, offset 0, flags [DF], proto TCP (6), length 148)
28 IP (tos 0x0, ttl 64, id 51306, offset 0, flags [DF], proto TCP (6), length 84)
35 IP (tos 0x0, ttl 64, id 17998, offset 0, flags [DF], proto TCP (6), length 72)
[all …]
Dof10_s4810-vvvv.out1 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 64)
3 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
5 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
7 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
10 IP (tos 0x0, ttl 64, id 53094, offset 0, flags [DF], proto TCP (6), length 52)
12 IP (tos 0x0, ttl 64, id 53095, offset 0, flags [DF], proto TCP (6), length 60)
15 IP (tos 0x0, ttl 64, id 53096, offset 0, flags [DF], proto TCP (6), length 60)
18 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52)
20 IP (tos 0x0, ttl 64, id 53469, offset 0, flags [DF], proto TCP (6), length 180)
40 IP (tos 0x0, ttl 64, id 53097, offset 0, flags [DF], proto TCP (6), length 136)
[all …]
Dof10_pf5240-vv.out1 IP (tos 0xa0, ttl 64, id 10670, offset 0, flags [DF], proto TCP (6), length 60)
3 IP (tos 0xa0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40)
5 IP (tos 0xa0, ttl 64, id 10673, offset 0, flags [DF], proto TCP (6), length 60)
7 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
9 IP (tos 0xa0, ttl 64, id 10674, offset 0, flags [DF], proto TCP (6), length 52)
11 IP (tos 0xa0, ttl 64, id 10675, offset 0, flags [DF], proto TCP (6), length 60)
14 IP (tos 0x0, ttl 64, id 16028, offset 0, flags [DF], proto TCP (6), length 52)
16 IP (tos 0x0, ttl 64, id 16029, offset 0, flags [DF], proto TCP (6), length 60)
19 IP (tos 0x0, ttl 64, id 16030, offset 0, flags [DF], proto TCP (6), length 60)
22 IP (tos 0xa0, ttl 64, id 10676, offset 0, flags [DF], proto TCP (6), length 52)
[all …]
Dof10_p3295-vv.out1 IP (tos 0x0, ttl 64, id 55495, offset 0, flags [DF], proto TCP (6), length 60)
3 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60)
5 IP (tos 0x0, ttl 64, id 55496, offset 0, flags [DF], proto TCP (6), length 52)
7 IP (tos 0x0, ttl 64, id 778, offset 0, flags [DF], proto TCP (6), length 60)
10 IP (tos 0x0, ttl 64, id 55497, offset 0, flags [DF], proto TCP (6), length 52)
12 IP (tos 0x0, ttl 64, id 55498, offset 0, flags [DF], proto TCP (6), length 60)
15 IP (tos 0x0, ttl 64, id 779, offset 0, flags [DF], proto TCP (6), length 52)
17 IP (tos 0x0, ttl 64, id 780, offset 0, flags [DF], proto TCP (6), length 60)
20 IP (tos 0x0, ttl 64, id 55499, offset 0, flags [DF], proto TCP (6), length 52)
22 IP (tos 0x0, ttl 64, id 55500, offset 0, flags [DF], proto TCP (6), length 2628)
[all …]
/external/chromium_org/ppapi/api/
Dppb_tcp_socket.idl21 * Disables coalescing of small writes to make TCP segments, and instead
51 * The <code>PPB_TCPSocket</code> interface provides TCP socket operations.
61 * Creates a TCP socket resource.
66 * @return A <code>PP_Resource</code> corresponding to a TCP socket or 0
72 * Determines if a given resource is a TCP socket.
84 * @param[in] tcp_socket A <code>PP_Resource</code> corresponding to a TCP
104 * @param[in] tcp_socket A <code>PP_Resource</code> corresponding to a TCP
134 * @param[in] tcp_socket A <code>PP_Resource</code> corresponding to a TCP
144 * @param[in] tcp_socket A <code>PP_Resource</code> corresponding to a TCP
155 * @param[in] tcp_socket A <code>PP_Resource</code> corresponding to a TCP
[all …]
Dpp_errors.idl145 * This value indicates that the connection was closed. For TCP sockets, it
146 * corresponds to a TCP FIN.
150 * This value indicates that the connection was reset. For TCP sockets, it
151 * corresponds to a TCP RST.
159 * This value indicates that the connection was aborted. For TCP sockets, it
/external/nist-sip/java/gov/nist/javax/sip/address/
DParameterNames.java46 public static final String TCP = GenericURI.TCP; field
/external/bluetooth/bluedroid/doc/
Dbtsnoop_net.md3 btsnoop_net exposes Bluetooth snoop logs over a local TCP socket which enables
8 incoming TCP connections on port 8872.
/external/dnsmasq/contrib/port-forward/
Dportforward9 # for TCP, but it can done for UDP instead by prefixing the port to "u".
10 # To forward both TCP and UDP, two lines are required.
23 # will port forward port 53 UDP and TCP from this host to port 53 on dnsserver.
/external/chromium_org/ppapi/api/private/
Dppb_tcp_server_socket_private.idl16 * The <code>PPB_TCPServerSocket_Private</code> interface provides TCP
21 * Allocates a TCP server socket resource.
26 * Determines if a given resource is TCP server socket.
Dppb_tcp_socket_private.idl21 // Disable coalescing of small writes to make TCP segments, and instead
28 * The <code>PPB_TCPSocket_Private</code> interface provides TCP socket
33 * Allocates a TCP socket resource.
38 * Determines if a given resource is TCP socket.
43 * Connects to a TCP port given as a host-port pair.
/external/mdnsresponder/
DPrivateDNS.txt35 When setting up a long-lived query over TCP (with or without TLS)
36 TCP's standard three-way handshake makes the full four-packet LLQ setup
38 unnecessary. Instead, when connecting over TCP, the client simply sends
57 interface. dnsextd then listens on the standard DNS ports (TCP/UDP port
101 set is sent over TLS/TCP, but subsequent change events are sent over
102 unencrypted UDP), dnsextd uses the port number of the client's TCP
114 3) Every LLQ opens up two sockets (TCP and UDP), rather than just the
115 one TCP socket.
119 additional UDP socket for every private LLQ, port mapping both the TCP
146 setting up an LLQ over TCP. This isn't a terrible problem right now,
/external/ppp/pppd/plugins/radius/etc/
Ddictionary.compat17 VALUE Framed-Compression Van-Jacobsen-TCP-IP 1
18 VALUE Framed-Compression VJ-TCP-IP 1
/external/libpcap/
DREADME.sita33 work, but interfaces via a TCP session to remote agents that
47 which opens a TCP session (to a well known port) on the target IOP
50 All captured packets are then forwarded across that TCP session
Dtokdefs.h57 TCP = 275, enumerator
178 #define TCP 275 macro
/external/chromium_org/extensions/common/api/
Dsockets_tcp.idl6 // network using TCP connections. This API supersedes the TCP functionality
146 // Creates a TCP socket.
170 // Enables or disables the keep-alive functionality for a TCP connection.
181 // Sets or clears <code>TCP_NODELAY</code> for a TCP connection. Nagle's
212 // Sends data on the given TCP socket.

1234