/external/tcpdump/ |
D | print-udp.c | 317 udpipaddr_print(netdissect_options *ndo, const struct ip *ip, int sport, int dport) in udpipaddr_print() argument 337 udpport_string(ndo, dport))); in udpipaddr_print() 343 udpport_string(ndo, dport))); in udpipaddr_print() 357 udpport_string(ndo, dport))); in udpipaddr_print() 363 udpport_string(ndo, dport))); in udpipaddr_print() 377 uint16_t sport, dport, ulen; in udp_print() local 394 dport = EXTRACT_16BITS(&up->uh_dport); in udp_print() 397 udpipaddr_print(ndo, ip, sport, dport); in udp_print() 402 udpipaddr_print(ndo, ip, sport, dport); in udp_print() 407 udpipaddr_print(ndo, ip, sport, dport); in udp_print() [all …]
|
D | print-tcp.c | 169 uint16_t sport, dport, win, urp; in tcp_print() local 191 dport = EXTRACT_16BITS(&tp->th_dport); in tcp_print() 199 tcpport_string(ndo, dport))); in tcp_print() 202 tcpport_string(ndo, sport), tcpport_string(ndo, dport))); in tcp_print() 210 tcpport_string(ndo, dport))); in tcp_print() 213 tcpport_string(ndo, sport), tcpport_string(ndo, dport))); in tcp_print() 261 if (sport > dport) in tcp_print() 263 else if (sport == dport) { in tcp_print() 270 tha.port = dport << 16 | sport; in tcp_print() 274 tha.port = sport << 16 | dport; in tcp_print() [all …]
|
/external/ltp/testcases/network/iptables/ |
D | iptables_tests.sh | 229 local dport=45886 235 iptables -A INPUT -p tcp -d 127.0.0.1 --dport $dport -j LOG \ 243 tst_resm TINFO "telnet 127.0.0.1 $dport" 244 telnet 127.0.0.1 $dport > tst_iptables.out 2>&1 250 "iptables did not log packets to port $dport" 254 tst_resm TINFO "Packets to port $dport logged." 257 tst_resm TFAIL "telnet to 127.0.0.1 $dport should fail." 275 local dport=0 280 iptables -A INPUT -p tcp -d 127.0.0.1 --dport 45801:45803 -j LOG \ 298 for dport in 45801 45802 45803 45804 45805 45806; do [all …]
|
/external/iptables/extensions/ |
D | libxt_udp.t | 4 -p udp -m udp --dport 1;=;OK 5 -p udp -m udp --dport 65535;=;OK 11 -p udp -m udp ! --dport 1;=;OK 12 -p udp -m udp ! --dport 65535;=;OK 13 -p udp -m udp --sport 1 --dport 65535;=;OK 14 -p udp -m udp --sport 65535 --dport 1;=;OK 15 -p udp -m udp ! --sport 1 --dport 65535;=;OK 16 -p udp -m udp ! --sport 65535 --dport 1;=;OK 20 -p udp -m udp --dport -1;;FAIL
|
D | libxt_tcp.t | 4 -p tcp -m tcp --dport 1;=;OK 5 -p tcp -m tcp --dport 65535;=;OK 11 -p tcp -m tcp ! --dport 1;=;OK 12 -p tcp -m tcp ! --dport 65535;=;OK 13 -p tcp -m tcp --sport 1 --dport 65535;=;OK 14 -p tcp -m tcp --sport 65535 --dport 1;=;OK 15 -p tcp -m tcp ! --sport 1 --dport 65535;=;OK 16 -p tcp -m tcp ! --sport 65535 --dport 1;=;OK 19 -p tcp -m tcp --dport -1;;FAIL
|
D | libxt_dccp.t | 4 -p dccp -m dccp --dport 1;=;OK 5 -p dccp -m dccp --dport 65535;=;OK 11 -p dccp -m dccp ! --dport 1;=;OK 12 -p dccp -m dccp ! --dport 65535;=;OK 13 -p dccp -m dccp --sport 1 --dport 65535;=;OK 14 -p dccp -m dccp --sport 65535 --dport 1;=;OK 15 -p dccp -m dccp ! --sport 1 --dport 65535;=;OK 16 -p dccp -m dccp ! --sport 65535 --dport 1;=;OK 20 -p dccp -m dccp --dport -1;;FAIL
|
D | libxt_connlimit.man | 25 iptables \-A INPUT \-p tcp \-\-syn \-\-dport 23 \-m connlimit \-\-connlimit\-above 2 \-j REJECT 28 iptables \-A INPUT \-p tcp \-\-syn \-\-dport 23 \-m connlimit \-\-connlimit\-upto 2 \-j ACCEPT 32 iptables \-p tcp \-\-syn \-\-dport 80 \-m connlimit \-\-connlimit\-above 16 37 ip6tables \-p tcp \-\-syn \-\-dport 80 \-s fe80::/64 \-m connlimit \-\-connlimit\-above 41 ip6tables \-p tcp \-\-syn \-\-dport 49152:65535 \-d 2001:db8::1 \-m connlimit
|
D | libxt_sctp.t | 7 -p sctp -m sctp --dport 1;=;OK 8 -p sctp -m sctp --dport 1:65535;=;OK 9 -p sctp -m sctp --dport 65535;=;OK 10 -p sctp -m sctp --dport -1;;FAIL 11 -p sctp -m sctp --dport 65536;;FAIL
|
D | libxt_HMARK.t | 4 -j HMARK --hmark-src-prefix 32 --hmark-dst-prefix 32 --hmark-sport-mask 0xffff --hmark-dport-mask 0… 6 -j HMARK --hmark-src-prefix 1 --hmark-dst-prefix 2 --hmark-sport-mask 0x0003 --hmark-dport-mask 0x0… 8 -j HMARK --hmark-src-prefix 32 --hmark-dst-prefix 32 --hmark-sport-mask 0xffff --hmark-dport-mask 0…
|
/external/autotest/client/deps/lansim/src/py/ |
D | host.py | 177 def _tcp_pick_port(self, dhost, dport): argument 180 if (dhost, dport, p) in self._tcp_fwd_out: 192 dport = pkt.ip.tcp.dport 195 if (shost, sport, dport) in self._tcp_fwd_out: 196 fhost, fport, oport = self._tcp_fwd_out[(shost, sport, dport)] 199 pkt.ip.tcp.dport = fport 206 if dport in self._tcp_fwd_ports: 208 fhost, fport = self._tcp_fwd_ports[dport] 212 if (shost, sport, dport) in self._tcp_fwd_in: 213 lport = self._tcp_fwd_in[(shost, sport, dport)] [all …]
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
D | test_xdp.c | 91 int dport; in handle_ipv4() local 98 dport = get_dport(iph + 1, data_end, iph->protocol); in handle_ipv4() 99 if (dport == -1) in handle_ipv4() 105 vip.dport = dport; in handle_ipv4() 163 int dport; in handle_ipv6() local 168 dport = get_dport(ip6h + 1, data_end, ip6h->nexthdr); in handle_ipv6() 169 if (dport == -1) in handle_ipv6() 175 vip.dport = dport; in handle_ipv6()
|
/external/scapy/scapy/layers/ |
D | tftp.py | 109 bind_layers(UDP, TFTP, dport=69) 132 and pkt[UDP].dport == self.my_tid 140 bind_bottom_up(UDP, TFTP, dport=self.my_tid) 144 self.l3 = IP(dst=self.server)/UDP(sport=self.my_tid, dport=self.port)/TFTP() 162 self.l3[UDP].dport = self.server_tid 201 split_bottom_up(UDP, TFTP, dport=self.my_tid) 207 split_bottom_up(UDP, TFTP, dport=self.my_tid) 225 and pkt[UDP].dport == self.my_tid 235 bind_bottom_up(UDP, TFTP, dport=self.my_tid) 238 self.l3 = IP(dst=self.server)/UDP(sport=self.my_tid, dport=self.port)/TFTP() [all …]
|
D | vxlan.py | 67 bind_layers(UDP, VXLAN, dport=4789) # RFC standard vxlan port 68 bind_layers(UDP, VXLAN, dport=4790) # RFC standard vxlan-gpe port 69 bind_layers(UDP, VXLAN, dport=6633) # New IANA assigned port for use with NSH 70 bind_layers(UDP, VXLAN, dport=8472) # Linux implementation port 76 bind_layers(UDP, VXLAN, sport=4789, dport=4789)
|
D | hsrp.py | 80 bind_layers(UDP, HSRP, dport=1985, sport=1985) 81 bind_layers(UDP, HSRP, dport=2029, sport=2029) 82 DestIPField.bind_addr(UDP, "224.0.0.2", dport=1985) 83 DestIP6Field.bind_addr(UDP, "ff02::66", dport=2029)
|
D | netbios.py | 211 bind_layers( UDP, NBNSQueryRequest, dport=137) 212 bind_layers( UDP, NBNSRequest, dport=137) 221 bind_layers( UDP, NBTDatagram, dport=138) 222 bind_layers( TCP, NBTSession, dport=139)
|
D | dhcp.py | 296 bind_layers( UDP, BOOTP, dport=67, sport=68) 297 bind_layers( UDP, BOOTP, dport=68, sport=67) 298 bind_bottom_up( UDP, BOOTP, dport=67, sport=67) 308 … srp1(Ether(dst="ff:ff:ff:ff:ff:ff")/IP(src="0.0.0.0",dst="255.255.255.255")/UDP(sport=68,dport=67) 364 rep=Ether(dst=mac)/IP(dst=ip)/UDP(sport=req.dport,dport=req.sport)/repb
|
D | inet.py | 541 return struct.pack("H",self.sport ^ self.dport)+self.payload.hashret() 561 if not ((self.sport == other.dport) and 562 (self.dport == other.sport)): 619 if self.dport != other.sport: 751 (self.dport == other.dport)): 772 (self.dport == other.dport)): 1185 a,b=sr(IP(dst=o.ip)/TCP(dport=[21,22,23,25,80,443]),timeout=2) 1238 trace_id = (s.src,s.dst,s.proto,s.dport) 1304 trace_id = (s.src,s.dst,6,s.dport) 1306 trace_id = (s.src,s.dst,17,s.dport) [all …]
|
/external/scapy/scapy/contrib/ |
D | sebek.uts | 10 assert pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 1 15 pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 1 19 assert pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 2 and pkt[SebekHead].type ==2 24 pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 2 and pkt[SebekHead].type ==2 28 assert pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 3 33 pkt.sport == pkt.dport == 1101 and pkt[SebekHead].version == 3
|
D | tacacs.uts | 9 pkt = IP()/TCP(dport=49)/TacacsHeader() 14 pkt = IP()/TCP(dport=49)/TacacsHeader() 19 pkt = IP()/TCP(dport=49)/TacacsHeader(seq=5, session_id=165) 31 pkt = IP()/TCP(dport=49)/TacacsHeader()/TacacsAuthenticationStart() 36 pkt = IP()/TCP(dport=49)/TacacsHeader()/TacacsAuthenticationStart() 41 pkt = IP()/TCP(dport=49)/TacacsHeader(seq=1, flags=0, session_id=2424164486, length=28)/TacacsAuthe… 53 pkt = IP()/TCP(dport=49)/TacacsHeader()/TacacsAuthenticationReply() 58 pkt = IP()/TCP(dport=49)/TacacsHeader(seq=2)/TacacsAuthenticationReply() 63 pkt = IP()/TCP(dport=49)/TacacsHeader(seq=2, flags=0, session_id=2424164486, length=16)/TacacsAuthe… 75 pkt = IP()/TCP(dport=49)/TacacsHeader()/TacacsAuthenticationContinue() [all …]
|
/external/scapy/test/ |
D | ipsec.uts | 17 p /= TCP(sport=45012, dport=80) 48 p /= TCP(sport=45012, dport=80) 100 p /= TCP(sport=45012, dport=80) 152 p /= TCP(sport=45012, dport=80) 204 p /= TCP(sport=45012, dport=80) 255 p /= TCP(sport=45012, dport=80) 306 p /= TCP(sport=45012, dport=80) 361 p /= TCP(sport=45012, dport=80) 394 p /= TCP(sport=45012, dport=80) 429 p /= TCP(sport=45012, dport=80) [all …]
|
/external/libnl/src/lib/ |
D | exp.c | 130 uint16_t dport = nfnl_exp_get_dst_port(exp, tuple); in nl_cli_exp_parse_src_port() local 131 nfnl_exp_set_ports(exp, tuple, sport, dport); in nl_cli_exp_parse_src_port() 136 uint32_t dport = nl_cli_parse_u32(arg); in nl_cli_exp_parse_dst_port() local 138 nfnl_exp_set_ports(exp, tuple, sport, dport); in nl_cli_exp_parse_dst_port()
|
/external/autotest/client/site_tests/security_Firewall/ |
D | baseline.webservd | 1 -A INPUT -p tcp -m tcp --dport 80 -j ACCEPT 2 -A INPUT -p tcp -m tcp --dport 443 -j ACCEPT
|
/external/scapy/scapy/modules/ |
D | queso.py | 73 def queso_sig(target, dport=80, timeout=3): argument 77 ans, unans = sr(IP(dst=target)/TCP(dport=dport,flags=flags,seq=RandInt()),
|
/external/scapy/scapy/layers/tls/ |
D | session.py | 308 sport=None, dport=None, sid=None, argument 319 self.dport = dport 495 self.dport, self.sport = self.sport, self.dport 766 s2 = struct.pack("!H", self.dport) 776 if (self.sport == other.sport and self.dport == other.dport and 781 self.dport == other.sport and self.sport == other.dport and 797 self.ipdst, str(self.dport)) 979 dst = "%s[%d]" % (s.ipdst, s.dport)
|
/external/iproute2/testsuite/tests/tc/ |
D | pedit.t | 186 do_pedit ip dport set 0x1234 188 do_pedit ip dport preserve 190 do_pedit ip dport invert 192 do_pedit ip dport clear
|