/external/iproute2/include/linux/netfilter/ |
xt_tcpudp.h | 6 /* TCP matching stuff */ 10 __u8 option; /* TCP Option iff non-zero*/ 11 __u8 flg_mask; /* TCP flags mask byte */ 12 __u8 flg_cmp; /* TCP flags compare byte */ 19 #define XT_TCP_INV_FLAGS 0x04 /* Invert the sense of TCP flags. */
|
/external/iptables/include/linux/netfilter/ |
xt_tcpudp.h | 6 /* TCP matching stuff */ 10 __u8 option; /* TCP Option iff non-zero*/ 11 __u8 flg_mask; /* TCP flags mask byte */ 12 __u8 flg_cmp; /* TCP flags compare byte */ 19 #define XT_TCP_INV_FLAGS 0x04 /* Invert the sense of TCP flags. */
|
/external/kernel-headers/original/linux/netfilter/ |
xt_tcpudp.h | 4 /* TCP matching stuff */ 9 u_int8_t option; /* TCP Option iff non-zero*/ 10 u_int8_t flg_mask; /* TCP flags mask byte */ 11 u_int8_t flg_cmp; /* TCP flags compare byte */ 18 #define XT_TCP_INV_FLAGS 0x04 /* Invert the sense of TCP flags. */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/netfilter/ |
xt_tcpudp.h | 4 /* TCP matching stuff */ 9 u_int8_t option; /* TCP Option iff non-zero*/ 10 u_int8_t flg_mask; /* TCP flags mask byte */ 11 u_int8_t flg_cmp; /* TCP flags compare byte */ 18 #define XT_TCP_INV_FLAGS 0x04 /* Invert the sense of TCP flags. */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/netfilter/ |
xt_tcpudp.h | 4 /* TCP matching stuff */ 9 u_int8_t option; /* TCP Option iff non-zero*/ 10 u_int8_t flg_mask; /* TCP flags mask byte */ 11 u_int8_t flg_cmp; /* TCP flags compare byte */ 18 #define XT_TCP_INV_FLAGS 0x04 /* Invert the sense of TCP flags. */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/netfilter/ |
xt_tcpudp.h | 4 /* TCP matching stuff */ 9 u_int8_t option; /* TCP Option iff non-zero*/ 10 u_int8_t flg_mask; /* TCP flags mask byte */ 11 u_int8_t flg_cmp; /* TCP flags compare byte */ 18 #define XT_TCP_INV_FLAGS 0x04 /* Invert the sense of TCP flags. */
|
/external/chromium/net/socket/ |
tcp_client_socket.h | 19 // A client socket that uses TCP as the transport layer. 26 // Enable/disable experimental TCP FastOpen option. 30 // Check if the TCP FastOpen option is enabled.
|
/external/srec/config/en.us/ |
run-bothtags5-from-saved.sh | 1 /system/bin/SRecTest -parfile baseline11k.par -tcp tcp/bothtags5_from_saved.tcp -datapath audio/ >out_SHIP_bothtags5_from_saved.txt 2>&1
|
run-bothtags5.sh | 1 /system/bin/SRecTest -parfile baseline11k.par -tcp tcp/bothtags5.tcp -datapath audio/ >out_SHIP_bothtags5.txt 2>&1
|
/external/tcpdump/ |
slcompress.h | 2 * Definitions for tcp compression routines. 28 * The first octet contains the packet type (top 3 bits), TCP 29 * 'push' bit, and flags that indicate which of the 4 TCP sequence 31 * conversation number that associates a saved IP/TCP header with 32 * the compressed packet. The next two octets are the TCP checksum 39 * in the following order): TCP urgent pointer, window, 54 * three possible types: IP (not proto TCP or tcp with one of the 55 * control flags set); uncompressed TCP (a normal IP/TCP packet bu [all...] |
/packages/apps/Bluetooth/res/values-uk/ |
test_strings.xml | 8 <string name="ack_record" msgid="6716152390978472184">"????? TCP"</string> 12 <string name="start_server" msgid="9034821924409165795">"????????? TCP ??????"</string> 13 <string name="notify_server" msgid="4369106744022969655">"???????. TCP ??????"</string>
|
/external/iproute2/include/libiptc/ |
ipt_kernel_headers.h | 12 #include <netinet/tcp.h> 21 #include <linux/tcp.h>
|
/external/iptables/include/linux/netfilter_ipv4/ |
ipt_ecn.h | 1 /* iptables module for matching the ECN header in IPv4 and TCP header 29 } tcp; member in union:ipt_ecn_info::__anon9312
|
/packages/apps/Bluetooth/res/values/ |
test_strings.xml | 11 <string name="start_server">Start TCP server</string> 12 <string name="notify_server">Notify TCP server</string>
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/netfilter_ipv4/ |
ipt_ecn.h | 1 /* iptables module for matching the ECN header in IPv4 and TCP header 29 } tcp; member in union:ipt_ecn_info::__anon26530
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/netfilter_ipv4/ |
ipt_ecn.h | 1 /* iptables module for matching the ECN header in IPv4 and TCP header 29 } tcp; member in union:ipt_ecn_info::__anon28121
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/netfilter_ipv4/ |
ipt_ecn.h | 1 /* iptables module for matching the ECN header in IPv4 and TCP header 29 } tcp; member in union:ipt_ecn_info::__anon29635
|
/external/strace/ |
sock.c | 71 print_addr(tcp, addr, ifr) 72 struct tcb *tcp; 81 printstr(tcp, addr, sizeof(ifr->ifr_addr.sa_data)); 85 sock_ioctl(struct tcb *tcp, long code, long arg) 92 if (entering(tcp)) { 94 if (umove(tcp, tcp->u_arg[2], &ifc) >= 0 131 printnum(tcp, arg, ", %#d"); 159 if (umove(tcp, tcp->u_arg[2], &ifr) < 0 [all...] |
/external/iptables/extensions/ |
libip6t_LOG.man | 20 \fB\-\-log\-tcp\-sequence\fP 21 Log TCP sequence numbers. This is a security risk if the log is 24 \fB\-\-log\-tcp\-options\fP 25 Log options from the TCP packet header.
|
libipt_LOG.man | 20 \fB\-\-log\-tcp\-sequence\fP 21 Log TCP sequence numbers. This is a security risk if the log is 24 \fB\-\-log\-tcp\-options\fP 25 Log options from the TCP packet header.
|
/external/iptables/tests/ |
options-ipv4.rules | 16 -A FORWARD -p tcp -j ECN --ecn-tcp-remove 17 -A FORWARD -j LOG --log-prefix "hi" --log-tcp-sequence --log-tcp-options --log-ip-options --log-uid --log-macdecode 32 -A PREROUTING -i dummy0 -p tcp -j REDIRECT --to-ports 1-2 --random 33 -A POSTROUTING -o dummy0 -p tcp -j MASQUERADE --to-ports 1-2 --random 34 -A POSTROUTING -o dummy0 -p tcp -j NETMAP --to 1.0.0.0/8 35 -A POSTROUTING -o dummy0 -p tcp -j SNAT --to-source 1.2.3.4-1.2.3.5 --random --persistent 44 -A INPUT -p tcp -m ecn --ecn-tcp-ece --ecn-tcp-cwr --ecn-ip-ect [all...] |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
virtio_net.h | 26 #define VIRTIO_NET_HDR_GSO_TCPV4 1 // GSO frame, IPv4 TCP (TSO) 28 #define VIRTIO_NET_HDR_GSO_TCPV6 4 // GSO frame, IPv6 TCP 29 #define VIRTIO_NET_HDR_GSO_ECN 0x80 // TCP has ECN set 31 __u16 hdr_len; /* Ethernet + IP + tcp/udp hdrs */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
virtio_net.h | 26 #define VIRTIO_NET_HDR_GSO_TCPV4 1 // GSO frame, IPv4 TCP (TSO) 28 #define VIRTIO_NET_HDR_GSO_TCPV6 4 // GSO frame, IPv6 TCP 29 #define VIRTIO_NET_HDR_GSO_ECN 0x80 // TCP has ECN set 31 __u16 hdr_len; /* Ethernet + IP + tcp/udp hdrs */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
virtio_net.h | 26 #define VIRTIO_NET_HDR_GSO_TCPV4 1 // GSO frame, IPv4 TCP (TSO) 28 #define VIRTIO_NET_HDR_GSO_TCPV6 4 // GSO frame, IPv6 TCP 29 #define VIRTIO_NET_HDR_GSO_ECN 0x80 // TCP has ECN set 31 __u16 hdr_len; /* Ethernet + IP + tcp/udp hdrs */
|
/external/iproute2/man/man8/ |
ss.8 | 12 It can display more TCP and state informations than other tools. 50 Show internal TCP information. 55 that parsing /proc/net/tcp is painful. 66 .B \-t, \-\-tcp 67 Display only TCP sockets. 87 are understood: all, inet, tcp, udp, raw, unix, packet, netlink, unix_dgram, 91 Do not display anything, just dump raw information about TCP sockets to FILE after applying filters. If FILE is - stdout is used. 97 .B FILTER := [ state TCP-STATE ] [ EXPRESSION ] 102 Display all TCP sockets. 114 List all the tcp sockets in state FIN-WAIT-1 for our apache to network 193.233.7/24 and look at their timers [all...] |