/external/iptables/extensions/ |
D | libxt_tcpmss.man | 1 …TCP MSS (maximum segment size) field of the TCP header. You can only use this on TCP SYN or SYN/A… 4 Match a given TCP MSS value or range.
|
D | libxt_tcp.man | 21 Match when the TCP flags are as specified. The first argument \fImask\fP is the 34 Only match TCP packets with the SYN bit set and the ACK,RST and FIN bits 35 cleared. Such packets are used to request TCP connection initiation; 37 incoming TCP connections, but outgoing TCP connections will be 44 Match if TCP option set.
|
D | libxt_TCPOPTSTRIP.man | 1 This target will strip TCP options off a TCP packet. (It will actually replace 5 Strip the given option(s). The options may be specified by TCP option number or
|
D | libxt_ecn.man | 1 This allows you to match the ECN bits of the IPv4/IPv6 and TCP header. ECN is the Explicit Congest… 4 This matches if the TCP ECN CWR (Congestion Window Received) bit is set. 7 This matches if the TCP ECN ECE (ECN Echo) bit is set.
|
D | libxt_udp.man | 8 option of the TCP extension for details. 14 option of the TCP extension for details.
|
D | libip6t_REJECT.man | 27 can be used on rules which only match the TCP protocol: this causes a 28 TCP RST packet to be sent back. This is mainly useful for blocking
|
D | libipt_REJECT.man | 26 can be used on rules which only match the TCP protocol: this causes a 27 TCP RST packet to be sent back. This is mainly useful for blocking
|
D | libxt_LOG.man | 24 Log TCP sequence numbers. This is a security risk if the log is 28 Log options from the TCP packet header.
|
D | libxt_u32.man | 113 TCP payload bytes 8-12 is any of 1, 2, 5 or 8 124 makes this the new offset into the packet, which is the start of the TCP 125 header. The length of the TCP header (again in 32 bit words) is the left half 126 of byte 12 of the TCP header. The \fB12>>26&3C\fP computes this length in bytes 128 start of the TCP payload. Finally, 8 reads bytes 8-12 of the payload and
|
/external/tcpdump/tests/ |
D | zmtp1.out | 1 IP (tos 0x0, ttl 64, id 17993, offset 0, flags [DF], proto TCP (6), length 60) 3 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 5 IP (tos 0x0, ttl 64, id 17994, offset 0, flags [DF], proto TCP (6), length 52) 7 IP (tos 0x0, ttl 64, id 17995, offset 0, flags [DF], proto TCP (6), length 54) 10 IP (tos 0x0, ttl 64, id 51304, offset 0, flags [DF], proto TCP (6), length 52) 12 IP (tos 0x0, ttl 64, id 51305, offset 0, flags [DF], proto TCP (6), length 54) 15 IP (tos 0x0, ttl 64, id 17996, offset 0, flags [DF], proto TCP (6), length 52) 17 IP (tos 0x0, ttl 64, id 17997, offset 0, flags [DF], proto TCP (6), length 148) 28 IP (tos 0x0, ttl 64, id 51306, offset 0, flags [DF], proto TCP (6), length 84) 35 IP (tos 0x0, ttl 64, id 17998, offset 0, flags [DF], proto TCP (6), length 72) [all …]
|
D | of10_s4810-vvvv.out | 1 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 64) 3 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 5 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) 7 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 10 IP (tos 0x0, ttl 64, id 53094, offset 0, flags [DF], proto TCP (6), length 52) 12 IP (tos 0x0, ttl 64, id 53095, offset 0, flags [DF], proto TCP (6), length 60) 15 IP (tos 0x0, ttl 64, id 53096, offset 0, flags [DF], proto TCP (6), length 60) 18 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) 20 IP (tos 0x0, ttl 64, id 53469, offset 0, flags [DF], proto TCP (6), length 180) 40 IP (tos 0x0, ttl 64, id 53097, offset 0, flags [DF], proto TCP (6), length 136) [all …]
|
D | of10_pf5240-vv.out | 1 IP (tos 0xa0, ttl 64, id 10670, offset 0, flags [DF], proto TCP (6), length 60) 3 IP (tos 0xa0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 40) 5 IP (tos 0xa0, ttl 64, id 10673, offset 0, flags [DF], proto TCP (6), length 60) 7 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 9 IP (tos 0xa0, ttl 64, id 10674, offset 0, flags [DF], proto TCP (6), length 52) 11 IP (tos 0xa0, ttl 64, id 10675, offset 0, flags [DF], proto TCP (6), length 60) 14 IP (tos 0x0, ttl 64, id 16028, offset 0, flags [DF], proto TCP (6), length 52) 16 IP (tos 0x0, ttl 64, id 16029, offset 0, flags [DF], proto TCP (6), length 60) 19 IP (tos 0x0, ttl 64, id 16030, offset 0, flags [DF], proto TCP (6), length 60) 22 IP (tos 0xa0, ttl 64, id 10676, offset 0, flags [DF], proto TCP (6), length 52) [all …]
|
D | of10_p3295-vv.out | 1 IP (tos 0x0, ttl 64, id 55495, offset 0, flags [DF], proto TCP (6), length 60) 3 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 60) 5 IP (tos 0x0, ttl 64, id 55496, offset 0, flags [DF], proto TCP (6), length 52) 7 IP (tos 0x0, ttl 64, id 778, offset 0, flags [DF], proto TCP (6), length 60) 10 IP (tos 0x0, ttl 64, id 55497, offset 0, flags [DF], proto TCP (6), length 52) 12 IP (tos 0x0, ttl 64, id 55498, offset 0, flags [DF], proto TCP (6), length 60) 15 IP (tos 0x0, ttl 64, id 779, offset 0, flags [DF], proto TCP (6), length 52) 17 IP (tos 0x0, ttl 64, id 780, offset 0, flags [DF], proto TCP (6), length 60) 20 IP (tos 0x0, ttl 64, id 55499, offset 0, flags [DF], proto TCP (6), length 52) 22 IP (tos 0x0, ttl 64, id 55500, offset 0, flags [DF], proto TCP (6), length 2628) [all …]
|
/external/chromium_org/ppapi/api/ |
D | ppb_tcp_socket.idl | 21 * Disables coalescing of small writes to make TCP segments, and instead 51 * The <code>PPB_TCPSocket</code> interface provides TCP socket operations. 61 * Creates a TCP socket resource. 66 * @return A <code>PP_Resource</code> corresponding to a TCP socket or 0 72 * Determines if a given resource is a TCP socket. 84 * @param[in] tcp_socket A <code>PP_Resource</code> corresponding to a TCP 104 * @param[in] tcp_socket A <code>PP_Resource</code> corresponding to a TCP 134 * @param[in] tcp_socket A <code>PP_Resource</code> corresponding to a TCP 144 * @param[in] tcp_socket A <code>PP_Resource</code> corresponding to a TCP 155 * @param[in] tcp_socket A <code>PP_Resource</code> corresponding to a TCP [all …]
|
D | pp_errors.idl | 145 * This value indicates that the connection was closed. For TCP sockets, it 146 * corresponds to a TCP FIN. 150 * This value indicates that the connection was reset. For TCP sockets, it 151 * corresponds to a TCP RST. 159 * This value indicates that the connection was aborted. For TCP sockets, it
|
/external/nist-sip/java/gov/nist/javax/sip/address/ |
D | ParameterNames.java | 46 public static final String TCP = GenericURI.TCP; field
|
/external/bluetooth/bluedroid/doc/ |
D | btsnoop_net.md | 3 btsnoop_net exposes Bluetooth snoop logs over a local TCP socket which enables 8 incoming TCP connections on port 8872.
|
/external/dnsmasq/contrib/port-forward/ |
D | portforward | 9 # for TCP, but it can done for UDP instead by prefixing the port to "u". 10 # To forward both TCP and UDP, two lines are required. 23 # will port forward port 53 UDP and TCP from this host to port 53 on dnsserver.
|
/external/chromium_org/ppapi/api/private/ |
D | ppb_tcp_server_socket_private.idl | 16 * The <code>PPB_TCPServerSocket_Private</code> interface provides TCP 21 * Allocates a TCP server socket resource. 26 * Determines if a given resource is TCP server socket.
|
D | ppb_tcp_socket_private.idl | 21 // Disable coalescing of small writes to make TCP segments, and instead 28 * The <code>PPB_TCPSocket_Private</code> interface provides TCP socket 33 * Allocates a TCP socket resource. 38 * Determines if a given resource is TCP socket. 43 * Connects to a TCP port given as a host-port pair.
|
/external/mdnsresponder/ |
D | PrivateDNS.txt | 35 When setting up a long-lived query over TCP (with or without TLS) 36 TCP's standard three-way handshake makes the full four-packet LLQ setup 38 unnecessary. Instead, when connecting over TCP, the client simply sends 57 interface. dnsextd then listens on the standard DNS ports (TCP/UDP port 101 set is sent over TLS/TCP, but subsequent change events are sent over 102 unencrypted UDP), dnsextd uses the port number of the client's TCP 114 3) Every LLQ opens up two sockets (TCP and UDP), rather than just the 115 one TCP socket. 119 additional UDP socket for every private LLQ, port mapping both the TCP 146 setting up an LLQ over TCP. This isn't a terrible problem right now,
|
/external/ppp/pppd/plugins/radius/etc/ |
D | dictionary.compat | 17 VALUE Framed-Compression Van-Jacobsen-TCP-IP 1 18 VALUE Framed-Compression VJ-TCP-IP 1
|
/external/libpcap/ |
D | README.sita | 33 work, but interfaces via a TCP session to remote agents that 47 which opens a TCP session (to a well known port) on the target IOP 50 All captured packets are then forwarded across that TCP session
|
D | tokdefs.h | 57 TCP = 275, enumerator 178 #define TCP 275 macro
|
/external/chromium_org/extensions/common/api/ |
D | sockets_tcp.idl | 6 // network using TCP connections. This API supersedes the TCP functionality 146 // Creates a TCP socket. 170 // Enables or disables the keep-alive functionality for a TCP connection. 181 // Sets or clears <code>TCP_NODELAY</code> for a TCP connection. Nagle's 212 // Sends data on the given TCP socket.
|