/external/scapy/scapy/layers/ |
hsrp.py | 80 bind_layers(UDP, HSRP, dport=1985, sport=1985) 81 bind_layers(UDP, HSRP, dport=2029, sport=2029) 82 DestIPField.bind_addr(UDP, "224.0.0.2", dport=1985) 83 DestIP6Field.bind_addr(UDP, "ff02::66", dport=2029)
|
mgcp.py | 44 bind_layers( UDP, MGCP, dport=2727)
|
vxlan.py | 58 UDP: {'dport': 8472}, 67 bind_layers(UDP, VXLAN, dport=4789) # RFC standard vxlan port 68 bind_layers(UDP, VXLAN, dport=4790) # RFC standard vxlan-gpe port 69 bind_layers(UDP, VXLAN, dport=6633) # New IANA assigned port for use with NSH 70 bind_layers(UDP, VXLAN, dport=8472) # Linux implementation port 76 bind_layers(UDP, VXLAN, sport=4789, dport=4789)
|
mobileip.py | 43 bind_layers( UDP, MobileIP, dport=434)
|
tftp.py | 109 bind_layers(UDP, TFTP, dport=69) 132 and pkt[UDP].dport == self.my_tid 140 bind_bottom_up(UDP, TFTP, dport=self.my_tid) 144 self.l3 = IP(dst=self.server)/UDP(sport=self.my_tid, dport=self.port)/TFTP() 162 self.l3[UDP].dport = self.server_tid 201 split_bottom_up(UDP, TFTP, dport=self.my_tid) 207 split_bottom_up(UDP, TFTP, dport=self.my_tid) 225 and pkt[UDP].dport == self.my_tid 235 bind_bottom_up(UDP, TFTP, dport=self.my_tid) 238 self.l3 = IP(dst=self.server)/UDP(sport=self.my_tid, dport=self.port)/TFTP( [all...] |
/system/core/libnetutils/ |
packet.h | 22 uint32_t saddr, uint32_t daddr, uint32_t sport, uint32_t dport);
|
/external/autotest/client/deps/lansim/src/py/ |
host.py | 177 def _tcp_pick_port(self, dhost, dport): 180 if (dhost, dport, p) in self._tcp_fwd_out: 192 dport = pkt.ip.tcp.dport 195 if (shost, sport, dport) in self._tcp_fwd_out: 196 fhost, fport, oport = self._tcp_fwd_out[(shost, sport, dport)] 199 pkt.ip.tcp.dport = fport 206 if dport in self._tcp_fwd_ports: 208 fhost, fport = self._tcp_fwd_ports[dport] 212 if (shost, sport, dport) in self._tcp_fwd_in [all...] |
/external/ltp/testcases/network/iptables/ |
iptables_tests.sh | 229 local dport=45886 235 iptables -A INPUT -p tcp -d 127.0.0.1 --dport $dport -j LOG \ 243 tst_resm TINFO "telnet 127.0.0.1 $dport" 244 telnet 127.0.0.1 $dport > tst_iptables.out 2>&1 250 "iptables did not log packets to port $dport" 254 tst_resm TINFO "Packets to port $dport logged." 257 tst_resm TFAIL "telnet to 127.0.0.1 $dport should fail." 275 local dport=0 280 iptables -A INPUT -p tcp -d 127.0.0.1 --dport 45801:45803 -j LOG [all...] |
/external/linux-kselftest/tools/testing/selftests/bpf/ |
test_iptunnel_common.h | 19 __u16 dport; member in struct:vip
|
test_xdp.c | 91 int dport; local 98 dport = get_dport(iph + 1, data_end, iph->protocol); 99 if (dport == -1) 105 vip.dport = dport; 163 int dport; local 168 dport = get_dport(ip6h + 1, data_end, ip6h->nexthdr); 169 if (dport == -1) 175 vip.dport = dport; [all...] |
/frameworks/base/tests/net/java/com/android/server/connectivity/ |
NetdEventListenerServiceTest.java | 95 final int dport = 13489; local 107 wakeupEvent(iface, uids[0], v4, tcp, mac, srcIp, dstIp, sport, dport, now); 108 wakeupEvent(iface, uids[1], v6, udp, mac, srcIp6, dstIp6, sport, dport, now); 109 wakeupEvent(iface, uids[2], v6, udp, mac, srcIp6, dstIp6, sport, dport, now); 110 wakeupEvent(iface, uids[3], v4, icmp6, mac, srcIp, dstIp, sport, dport, now); 111 wakeupEvent(iface, uids[4], v6, tcp, mac, srcIp6, dstIp6, sport, dport, now); 112 wakeupEvent(iface, uids[5], v4, tcp, mac, srcIp, dstIp, sport, dport, now); 113 wakeupEvent(iface, uids[6], v6, udp, mac, srcIp6, dstIp6, sport, dport, now); 114 wakeupEvent(iface, uids[7], v6, tcp, mac, srcIp6, dstIp6, sport, dport, now); 115 wakeupEvent(iface, uids[8], v6, udp, mac, srcIp6, dstIp6, sport, dport, now) 167 final int dport = 13489; local [all...] |
/kernel/tests/net/test/ |
packets.py | 64 scapy.UDP(sport=sport, dport=53) / UDP_PAYLOAD) 69 scapy.UDP(sport=sport, dport=53) / 74 scapy.UDP(sport=sport, dport=53) / 78 def SYN(dport, version, srcaddr, dstaddr, sport=0, seq=-1): 86 scapy.TCP(sport=sport, dport=dport, 96 scapy.TCP(sport=original.dport, dport=original.sport, 106 scapy.TCP(sport=original.dport, dport=original.sport [all...] |
/external/tcpdump/ |
print-udp.c | 317 udpipaddr_print(netdissect_options *ndo, const struct ip *ip, int sport, int dport) 337 udpport_string(ndo, dport))); 343 udpport_string(ndo, dport))); 357 udpport_string(ndo, dport))); 363 udpport_string(ndo, dport))); 377 uint16_t sport, dport, ulen; local 394 dport = EXTRACT_16BITS(&up->uh_dport); 397 udpipaddr_print(ndo, ip, sport, dport); 402 udpipaddr_print(ndo, ip, sport, dport); 407 udpipaddr_print(ndo, ip, sport, dport); [all...] |
/bionic/libc/kernel/uapi/linux/netfilter_bridge/ |
ebt_ip.h | 40 __u16 dport[2]; member in struct:ebt_ip_info
|
ebt_ip6.h | 46 __u16 dport[2]; member in union:ebt_ip6_info::__anon948
|
/external/iptables/include/linux/netfilter_bridge/ |
ebt_ip.h | 10 * added ip-sport and ip-dport 41 __u16 dport[2]; member in struct:ebt_ip_info
|
/external/kernel-headers/original/uapi/linux/netfilter_bridge/ |
ebt_ip.h | 11 * added ip-sport and ip-dport 42 __u16 dport[2]; member in struct:ebt_ip_info
|
ebt_ip6.h | 47 __u16 dport[2]; member in union:ebt_ip6_info::__anon23154
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/netfilter_bridge/ |
ebt_ip.h | 10 * added ip-sport and ip-dport 41 __u16 dport[2]; member in struct:ebt_ip_info
|
ebt_ip6.h | 45 __u16 dport[2]; member in union:ebt_ip6_info::__anon62696
|
/external/libnl/src/lib/ |
exp.c | 130 uint16_t dport = nfnl_exp_get_dst_port(exp, tuple); local 131 nfnl_exp_set_ports(exp, tuple, sport, dport); 136 uint32_t dport = nl_cli_parse_u32(arg); local 138 nfnl_exp_set_ports(exp, tuple, sport, dport);
|
/external/scapy/scapy/contrib/ |
ripng.py | 46 bind_layers(UDP, RIPng, sport=521, dport=521)
|
sebek.py | 83 ShortField("dport", 0), 106 bind_layers( UDP, SebekHead, dport=1101) 107 bind_layers( UDP, SebekHead, dport=1101, sport=1101)
|
/external/libnetfilter_conntrack/src/conntrack/ |
grp_getter.c | 44 this->dport = ct->head.orig.l4dst.all; 51 this->dport = ct->repl.l4dst.all; 80 this->dport = ct->master.l4dst.all;
|
/external/scapy/scapy/modules/ |
queso.py | 73 def queso_sig(target, dport=80, timeout=3): 77 ans, unans = sr(IP(dst=target)/TCP(dport=dport,flags=flags,seq=RandInt()), 113 queso(target, dport=80, timeout=3)"""
|