Home
last modified time | relevance | path

Searched refs:dport (Results 1 – 25 of 132) sorted by relevance

123456

/external/tcpdump/
Dprint-udp.c317 udpipaddr_print(netdissect_options *ndo, const struct ip *ip, int sport, int dport) in udpipaddr_print() argument
337 udpport_string(ndo, dport))); in udpipaddr_print()
343 udpport_string(ndo, dport))); in udpipaddr_print()
357 udpport_string(ndo, dport))); in udpipaddr_print()
363 udpport_string(ndo, dport))); in udpipaddr_print()
377 uint16_t sport, dport, ulen; in udp_print() local
394 dport = EXTRACT_16BITS(&up->uh_dport); in udp_print()
397 udpipaddr_print(ndo, ip, sport, dport); in udp_print()
402 udpipaddr_print(ndo, ip, sport, dport); in udp_print()
407 udpipaddr_print(ndo, ip, sport, dport); in udp_print()
[all …]
Dprint-tcp.c169 uint16_t sport, dport, win, urp; in tcp_print() local
191 dport = EXTRACT_16BITS(&tp->th_dport); in tcp_print()
199 tcpport_string(ndo, dport))); in tcp_print()
202 tcpport_string(ndo, sport), tcpport_string(ndo, dport))); in tcp_print()
210 tcpport_string(ndo, dport))); in tcp_print()
213 tcpport_string(ndo, sport), tcpport_string(ndo, dport))); in tcp_print()
261 if (sport > dport) in tcp_print()
263 else if (sport == dport) { in tcp_print()
270 tha.port = dport << 16 | sport; in tcp_print()
274 tha.port = sport << 16 | dport; in tcp_print()
[all …]
/external/ltp/testcases/network/iptables/
Diptables_tests.sh229 local dport=45886
235 iptables -A INPUT -p tcp -d 127.0.0.1 --dport $dport -j LOG \
243 tst_resm TINFO "telnet 127.0.0.1 $dport"
244 telnet 127.0.0.1 $dport > tst_iptables.out 2>&1
250 "iptables did not log packets to port $dport"
254 tst_resm TINFO "Packets to port $dport logged."
257 tst_resm TFAIL "telnet to 127.0.0.1 $dport should fail."
275 local dport=0
280 iptables -A INPUT -p tcp -d 127.0.0.1 --dport 45801:45803 -j LOG \
298 for dport in 45801 45802 45803 45804 45805 45806; do
[all …]
/external/iptables/extensions/
Dlibxt_udp.t4 -p udp -m udp --dport 1;=;OK
5 -p udp -m udp --dport 65535;=;OK
11 -p udp -m udp ! --dport 1;=;OK
12 -p udp -m udp ! --dport 65535;=;OK
13 -p udp -m udp --sport 1 --dport 65535;=;OK
14 -p udp -m udp --sport 65535 --dport 1;=;OK
15 -p udp -m udp ! --sport 1 --dport 65535;=;OK
16 -p udp -m udp ! --sport 65535 --dport 1;=;OK
20 -p udp -m udp --dport -1;;FAIL
Dlibxt_tcp.t4 -p tcp -m tcp --dport 1;=;OK
5 -p tcp -m tcp --dport 65535;=;OK
11 -p tcp -m tcp ! --dport 1;=;OK
12 -p tcp -m tcp ! --dport 65535;=;OK
13 -p tcp -m tcp --sport 1 --dport 65535;=;OK
14 -p tcp -m tcp --sport 65535 --dport 1;=;OK
15 -p tcp -m tcp ! --sport 1 --dport 65535;=;OK
16 -p tcp -m tcp ! --sport 65535 --dport 1;=;OK
19 -p tcp -m tcp --dport -1;;FAIL
Dlibxt_dccp.t4 -p dccp -m dccp --dport 1;=;OK
5 -p dccp -m dccp --dport 65535;=;OK
11 -p dccp -m dccp ! --dport 1;=;OK
12 -p dccp -m dccp ! --dport 65535;=;OK
13 -p dccp -m dccp --sport 1 --dport 65535;=;OK
14 -p dccp -m dccp --sport 65535 --dport 1;=;OK
15 -p dccp -m dccp ! --sport 1 --dport 65535;=;OK
16 -p dccp -m dccp ! --sport 65535 --dport 1;=;OK
20 -p dccp -m dccp --dport -1;;FAIL
Dlibxt_connlimit.man25 iptables \-A INPUT \-p tcp \-\-syn \-\-dport 23 \-m connlimit \-\-connlimit\-above 2 \-j REJECT
28 iptables \-A INPUT \-p tcp \-\-syn \-\-dport 23 \-m connlimit \-\-connlimit\-upto 2 \-j ACCEPT
32 iptables \-p tcp \-\-syn \-\-dport 80 \-m connlimit \-\-connlimit\-above 16
37 ip6tables \-p tcp \-\-syn \-\-dport 80 \-s fe80::/64 \-m connlimit \-\-connlimit\-above
41 ip6tables \-p tcp \-\-syn \-\-dport 49152:65535 \-d 2001:db8::1 \-m connlimit
Dlibxt_sctp.t7 -p sctp -m sctp --dport 1;=;OK
8 -p sctp -m sctp --dport 1:65535;=;OK
9 -p sctp -m sctp --dport 65535;=;OK
10 -p sctp -m sctp --dport -1;;FAIL
11 -p sctp -m sctp --dport 65536;;FAIL
Dlibxt_HMARK.t4 -j HMARK --hmark-src-prefix 32 --hmark-dst-prefix 32 --hmark-sport-mask 0xffff --hmark-dport-mask 0…
6 -j HMARK --hmark-src-prefix 1 --hmark-dst-prefix 2 --hmark-sport-mask 0x0003 --hmark-dport-mask 0x0…
8 -j HMARK --hmark-src-prefix 32 --hmark-dst-prefix 32 --hmark-sport-mask 0xffff --hmark-dport-mask 0…
/external/autotest/client/deps/lansim/src/py/
Dhost.py177 def _tcp_pick_port(self, dhost, dport): argument
180 if (dhost, dport, p) in self._tcp_fwd_out:
192 dport = pkt.ip.tcp.dport
195 if (shost, sport, dport) in self._tcp_fwd_out:
196 fhost, fport, oport = self._tcp_fwd_out[(shost, sport, dport)]
199 pkt.ip.tcp.dport = fport
206 if dport in self._tcp_fwd_ports:
208 fhost, fport = self._tcp_fwd_ports[dport]
212 if (shost, sport, dport) in self._tcp_fwd_in:
213 lport = self._tcp_fwd_in[(shost, sport, dport)]
[all …]
/external/linux-kselftest/tools/testing/selftests/bpf/
Dtest_xdp.c91 int dport; in handle_ipv4() local
98 dport = get_dport(iph + 1, data_end, iph->protocol); in handle_ipv4()
99 if (dport == -1) in handle_ipv4()
105 vip.dport = dport; in handle_ipv4()
163 int dport; in handle_ipv6() local
168 dport = get_dport(ip6h + 1, data_end, ip6h->nexthdr); in handle_ipv6()
169 if (dport == -1) in handle_ipv6()
175 vip.dport = dport; in handle_ipv6()
/external/scapy/scapy/layers/
Dtftp.py109 bind_layers(UDP, TFTP, dport=69)
132 and pkt[UDP].dport == self.my_tid
140 bind_bottom_up(UDP, TFTP, dport=self.my_tid)
144 self.l3 = IP(dst=self.server)/UDP(sport=self.my_tid, dport=self.port)/TFTP()
162 self.l3[UDP].dport = self.server_tid
201 split_bottom_up(UDP, TFTP, dport=self.my_tid)
207 split_bottom_up(UDP, TFTP, dport=self.my_tid)
225 and pkt[UDP].dport == self.my_tid
235 bind_bottom_up(UDP, TFTP, dport=self.my_tid)
238 self.l3 = IP(dst=self.server)/UDP(sport=self.my_tid, dport=self.port)/TFTP()
[all …]
Dvxlan.py67 bind_layers(UDP, VXLAN, dport=4789) # RFC standard vxlan port
68 bind_layers(UDP, VXLAN, dport=4790) # RFC standard vxlan-gpe port
69 bind_layers(UDP, VXLAN, dport=6633) # New IANA assigned port for use with NSH
70 bind_layers(UDP, VXLAN, dport=8472) # Linux implementation port
76 bind_layers(UDP, VXLAN, sport=4789, dport=4789)
Dhsrp.py80 bind_layers(UDP, HSRP, dport=1985, sport=1985)
81 bind_layers(UDP, HSRP, dport=2029, sport=2029)
82 DestIPField.bind_addr(UDP, "224.0.0.2", dport=1985)
83 DestIP6Field.bind_addr(UDP, "ff02::66", dport=2029)
Dnetbios.py211 bind_layers( UDP, NBNSQueryRequest, dport=137)
212 bind_layers( UDP, NBNSRequest, dport=137)
221 bind_layers( UDP, NBTDatagram, dport=138)
222 bind_layers( TCP, NBTSession, dport=139)
Ddhcp.py296 bind_layers( UDP, BOOTP, dport=67, sport=68)
297 bind_layers( UDP, BOOTP, dport=68, sport=67)
298 bind_bottom_up( UDP, BOOTP, dport=67, sport=67)
308 … srp1(Ether(dst="ff:ff:ff:ff:ff:ff")/IP(src="0.0.0.0",dst="255.255.255.255")/UDP(sport=68,dport=67)
364 rep=Ether(dst=mac)/IP(dst=ip)/UDP(sport=req.dport,dport=req.sport)/repb
Dinet.py541 return struct.pack("H",self.sport ^ self.dport)+self.payload.hashret()
561 if not ((self.sport == other.dport) and
562 (self.dport == other.sport)):
619 if self.dport != other.sport:
751 (self.dport == other.dport)):
772 (self.dport == other.dport)):
1185 a,b=sr(IP(dst=o.ip)/TCP(dport=[21,22,23,25,80,443]),timeout=2)
1238 trace_id = (s.src,s.dst,s.proto,s.dport)
1304 trace_id = (s.src,s.dst,6,s.dport)
1306 trace_id = (s.src,s.dst,17,s.dport)
[all …]
/external/scapy/scapy/contrib/
Dsebek.uts10 assert pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 1
15 pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 1
19 assert pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 2 and pkt[SebekHead].type ==2
24 pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 2 and pkt[SebekHead].type ==2
28 assert pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 3
33 pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 3
Dtacacs.uts9 pkt = IP()/TCP(dport=49)/TacacsHeader()
14 pkt = IP()/TCP(dport=49)/TacacsHeader()
19 pkt = IP()/TCP(dport=49)/TacacsHeader(seq=5, session_id=165)
31 pkt = IP()/TCP(dport=49)/TacacsHeader()/TacacsAuthenticationStart()
36 pkt = IP()/TCP(dport=49)/TacacsHeader()/TacacsAuthenticationStart()
41 pkt = IP()/TCP(dport=49)/TacacsHeader(seq=1, flags=0, session_id=2424164486, length=28)/TacacsAuthe…
53 pkt = IP()/TCP(dport=49)/TacacsHeader()/TacacsAuthenticationReply()
58 pkt = IP()/TCP(dport=49)/TacacsHeader(seq=2)/TacacsAuthenticationReply()
63 pkt = IP()/TCP(dport=49)/TacacsHeader(seq=2, flags=0, session_id=2424164486, length=16)/TacacsAuthe…
75 pkt = IP()/TCP(dport=49)/TacacsHeader()/TacacsAuthenticationContinue()
[all …]
/external/scapy/test/
Dipsec.uts17 p /= TCP(sport=45012, dport=80)
48 p /= TCP(sport=45012, dport=80)
100 p /= TCP(sport=45012, dport=80)
152 p /= TCP(sport=45012, dport=80)
204 p /= TCP(sport=45012, dport=80)
255 p /= TCP(sport=45012, dport=80)
306 p /= TCP(sport=45012, dport=80)
361 p /= TCP(sport=45012, dport=80)
394 p /= TCP(sport=45012, dport=80)
429 p /= TCP(sport=45012, dport=80)
[all …]
/external/libnl/src/lib/
Dexp.c130 uint16_t dport = nfnl_exp_get_dst_port(exp, tuple); in nl_cli_exp_parse_src_port() local
131 nfnl_exp_set_ports(exp, tuple, sport, dport); in nl_cli_exp_parse_src_port()
136 uint32_t dport = nl_cli_parse_u32(arg); in nl_cli_exp_parse_dst_port() local
138 nfnl_exp_set_ports(exp, tuple, sport, dport); in nl_cli_exp_parse_dst_port()
/external/autotest/client/site_tests/security_Firewall/
Dbaseline.webservd1 -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
2 -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT
/external/scapy/scapy/modules/
Dqueso.py73 def queso_sig(target, dport=80, timeout=3): argument
77 ans, unans = sr(IP(dst=target)/TCP(dport=dport,flags=flags,seq=RandInt()),
/external/scapy/scapy/layers/tls/
Dsession.py308 sport=None, dport=None, sid=None, argument
319 self.dport = dport
495 self.dport, self.sport = self.sport, self.dport
766 s2 = struct.pack("!H", self.dport)
776 if (self.sport == other.sport and self.dport == other.dport and
781 self.dport == other.sport and self.sport == other.dport and
797 self.ipdst, str(self.dport))
979 dst = "%s[%d]" % (s.ipdst, s.dport)
/external/iproute2/testsuite/tests/tc/
Dpedit.t186 do_pedit ip dport set 0x1234
188 do_pedit ip dport preserve
190 do_pedit ip dport invert
192 do_pedit ip dport clear

123456