Home
last modified time | relevance | path

Searched full:packet (Results 1 – 25 of 2399) sorted by relevance

12345678910>>...96

/freebsd/contrib/ldns/
H A Dpacket.c2 * packet.c
4 * dns packet implementation
41 ldns_pkt_id(const ldns_pkt *packet) in ldns_pkt_id() argument
43 return packet->_header->_id; in ldns_pkt_id()
47 ldns_pkt_qr(const ldns_pkt *packet) in ldns_pkt_qr() argument
49 return packet->_header->_qr; in ldns_pkt_qr()
53 ldns_pkt_aa(const ldns_pkt *packet) in ldns_pkt_aa() argument
55 return packet->_header->_aa; in ldns_pkt_aa()
59 ldns_pkt_tc(const ldns_pkt *packet) in ldns_pkt_tc() argument
61 return packet->_header->_tc; in ldns_pkt_tc()
[all …]
H A Dwire2host.c366 ldns_wire2pkt_hdr(ldns_pkt *packet, const uint8_t *wire, size_t max, size_t *pos) in ldns_wire2pkt_hdr() argument
371 ldns_pkt_set_id(packet, LDNS_ID_WIRE(wire)); in ldns_wire2pkt_hdr()
372 ldns_pkt_set_qr(packet, LDNS_QR_WIRE(wire)); in ldns_wire2pkt_hdr()
373 ldns_pkt_set_opcode(packet, LDNS_OPCODE_WIRE(wire)); in ldns_wire2pkt_hdr()
374 ldns_pkt_set_aa(packet, LDNS_AA_WIRE(wire)); in ldns_wire2pkt_hdr()
375 ldns_pkt_set_tc(packet, LDNS_TC_WIRE(wire)); in ldns_wire2pkt_hdr()
376 ldns_pkt_set_rd(packet, LDNS_RD_WIRE(wire)); in ldns_wire2pkt_hdr()
377 ldns_pkt_set_ra(packet, LDNS_RA_WIRE(wire)); in ldns_wire2pkt_hdr()
378 ldns_pkt_set_ad(packet, LDNS_AD_WIRE(wire)); in ldns_wire2pkt_hdr()
379 ldns_pkt_set_cd(packet, LDNS_CD_WIRE(wire)); in ldns_wire2pkt_hdr()
[all …]
/freebsd/contrib/ldns/ldns/
H A Dpacket.h2 * packet.h
4 * DNS packet definitions
72 * Header of a dns packet
74 * Contains the information about the packet itself, as specified in RFC1035
195 /** Id of a packet */
201 /** Packet truncated */
227 * DNS packet
229 * This structure contains a complete DNS packet (either a query or an answer)
238 /* extra items needed in a packet */
241 /** Timestamp of the time the packet was sent or created */
[all …]
/freebsd/contrib/processor-trace/libipt/src/
H A Dpt_packet_decoder.c111 * by a preceding packet. in pt_pkt_sync_forward()
236 int pt_pkt_next(struct pt_packet_decoder *decoder, struct pt_packet *packet, in pt_pkt_next() argument
243 if (!packet || !decoder) in pt_pkt_next()
246 ppkt = psize == sizeof(pkt) ? packet : &pkt; in pt_pkt_next()
255 if (!dfun->packet) in pt_pkt_next()
258 size = dfun->packet(decoder, ppkt); in pt_pkt_next()
262 errcode = pkt_to_user(packet, psize, ppkt); in pt_pkt_next()
272 struct pt_packet *packet) in pt_pkt_decode_unknown() argument
279 size = pt_pkt_read_unknown(packet, decoder->pos, &decoder->config); in pt_pkt_decode_unknown()
287 struct pt_packet *packet) in pt_pkt_decode_pad() argument
[all …]
H A Dpt_encoder.c208 /* Encode an IP packet.
210 * Write an IP packet with opcode \@opc and payload from \@packet if there is
216 * Returns -pte_internal if \@encoder or \@packet is NULL.
217 * Returns -pte_invalid if \@packet.ipc is not valid.
220 const struct pt_packet_ip *packet) in pt_encode_ip() argument
226 if (!encoder || !packet) in pt_encode_ip()
229 size = pt_ipc_size(packet->ipc); in pt_encode_ip()
239 ipc = (uint8_t) (packet->ipc << pt_opm_ipc_shr); in pt_encode_ip()
245 encoder->pos = pt_encode_int(pos, packet->ip, size); in pt_encode_ip()
249 int pt_enc_next(struct pt_encoder *encoder, const struct pt_packet *packet) in pt_enc_next() argument
[all …]
H A Dpt_packet.c52 int pt_pkt_read_unknown(struct pt_packet *packet, const uint8_t *pos, in pt_pkt_read_unknown() argument
59 if (!packet || !pos || !config) in pt_pkt_read_unknown()
67 packet->payload.unknown.packet = pos; in pt_pkt_read_unknown()
68 packet->payload.unknown.priv = NULL; in pt_pkt_read_unknown()
73 size = (*decode)(&packet->payload.unknown, config, pos, in pt_pkt_read_unknown()
81 packet->type = ppt_unknown; in pt_pkt_read_unknown()
82 packet->size = (uint8_t) size; in pt_pkt_read_unknown()
135 int pt_pkt_read_ip(struct pt_packet_ip *packet, const uint8_t *pos, in pt_pkt_read_ip() argument
142 if (!packet || !pos || !config) in pt_pkt_read_ip()
158 packet->ipc = (enum pt_ip_compression) ipc; in pt_pkt_read_ip()
[all …]
H A Dpt_query_decoder.c48 * The packet @decoder must be synchronized onto the trace stream at the
51 * It uses @packet to hold trace packets during its search. If the search is
52 * successful, @packet will contain the first (and hopefully only) FUP packet in
53 * this PSB+. Otherwise, @packet may contain anything.
55 * Returns one if a FUP packet is found (@packet will contain it).
56 * Returns zero if no FUP packet is found (@packet is undefined).
59 static int pt_qry_find_header_fup(struct pt_packet *packet, in pt_qry_find_header_fup() argument
62 if (!packet || !decoder) in pt_qry_find_header_fup()
68 errcode = pt_pkt_next(decoder, packet, sizeof(*packet)); in pt_qry_find_header_fup()
72 switch (packet->type) { in pt_qry_find_header_fup()
[all …]
/freebsd/contrib/netbsd-tests/ipf/expected/
H A Df132 bad-packet
5 bad-packet
8 bad-packet
10 bad-packet
22 bad-packet
25 bad-packet
28 bad-packet
30 bad-packet
42 bad-packet
45 bad-packet
[all …]
/freebsd/contrib/llvm-project/lldb/source/Utility/
H A DTraceGDBRemotePackets.cpp17 bool fromJSON(const json::Value &value, TraceSupportedResponse &packet, in fromJSON() argument
20 return o && o.map("description", packet.description) && in fromJSON()
21 o.map("name", packet.name); in fromJSON()
24 json::Value toJSON(const TraceSupportedResponse &packet) { in toJSON() argument
26 Object{{"description", packet.description}, {"name", packet.name}}); in toJSON()
34 bool fromJSON(const json::Value &value, TraceStartRequest &packet, Path path) { in fromJSON() argument
36 return o && o.map("type", packet.type) && o.map("tids", packet.tids); in fromJSON()
39 json::Value toJSON(const TraceStartRequest &packet) { in toJSON() argument
40 return json::Value(Object{{"tids", packet.tids}, {"type", packet.type}}); in toJSON()
56 bool fromJSON(const json::Value &value, TraceStopRequest &packet, Path path) { in fromJSON() argument
[all …]
H A DTraceIntelPTGDBRemotePackets.cpp45 bool fromJSON(const json::Value &value, TraceIntelPTStartRequest &packet, in fromJSON() argument
48 if (!(o && fromJSON(value, (TraceStartRequest &)packet, path) && in fromJSON()
49 o.map("enableTsc", packet.enable_tsc) && in fromJSON()
50 o.map("psbPeriod", packet.psb_period) && in fromJSON()
51 o.map("iptTraceSize", packet.ipt_trace_size))) in fromJSON()
54 if (packet.IsProcessTracing()) { in fromJSON()
55 if (!o.map("processBufferSizeLimit", packet.process_buffer_size_limit) || in fromJSON()
56 !o.map("perCpuTracing", packet.per_cpu_tracing) || in fromJSON()
57 !o.map("disableCgroupTracing", packet.disable_cgroup_filtering)) in fromJSON()
63 json::Value toJSON(const TraceIntelPTStartRequest &packet) { in toJSON() argument
[all …]
/freebsd/contrib/llvm-project/lldb/source/Plugins/Process/gdb-remote/
H A DGDBRemoteCommunicationServerCommon.h38 PacketResult Handle_A(StringExtractorGDBRemote &packet);
40 PacketResult Handle_qHostInfo(StringExtractorGDBRemote &packet);
42 PacketResult Handle_qProcessInfoPID(StringExtractorGDBRemote &packet);
44 PacketResult Handle_qfProcessInfo(StringExtractorGDBRemote &packet);
46 PacketResult Handle_qsProcessInfo(StringExtractorGDBRemote &packet);
48 PacketResult Handle_qUserName(StringExtractorGDBRemote &packet);
50 PacketResult Handle_qGroupName(StringExtractorGDBRemote &packet);
52 PacketResult Handle_qSpeedTest(StringExtractorGDBRemote &packet);
54 PacketResult Handle_vFile_Open(StringExtractorGDBRemote &packet);
56 PacketResult Handle_vFile_Close(StringExtractorGDBRemote &packet);
[all …]
H A DGDBRemoteCommunicationServerLLGS.h148 PacketResult Handle_k(StringExtractorGDBRemote &packet);
150 PacketResult Handle_vKill(StringExtractorGDBRemote &packet);
152 PacketResult Handle_qProcessInfo(StringExtractorGDBRemote &packet);
154 PacketResult Handle_qC(StringExtractorGDBRemote &packet);
156 PacketResult Handle_QSetDisableASLR(StringExtractorGDBRemote &packet);
158 PacketResult Handle_QSetWorkingDir(StringExtractorGDBRemote &packet);
160 PacketResult Handle_qGetWorkingDir(StringExtractorGDBRemote &packet);
162 PacketResult Handle_QThreadSuffixSupported(StringExtractorGDBRemote &packet);
164 PacketResult Handle_QListThreadsInStopReply(StringExtractorGDBRemote &packet);
169 PacketResult Handle_C(StringExtractorGDBRemote &packet);
[all …]
H A DGDBRemoteCommunicationServerCommon.cpp179 StringExtractorGDBRemote &packet) { in Handle_qHostInfo() argument
315 StringExtractorGDBRemote &packet) { in Handle_qProcessInfoPID() argument
316 // Packet format: "qProcessInfoPID:%i" where %i is the pid in Handle_qProcessInfoPID()
317 packet.SetFilePos(::strlen("qProcessInfoPID:")); in Handle_qProcessInfoPID()
318 lldb::pid_t pid = packet.GetU32(LLDB_INVALID_PROCESS_ID); in Handle_qProcessInfoPID()
332 StringExtractorGDBRemote &packet) { in Handle_qfProcessInfo() argument
337 packet.SetFilePos(::strlen("qfProcessInfo")); in Handle_qfProcessInfo()
338 if (packet.GetChar() == ':') { in Handle_qfProcessInfo()
341 while (packet.GetNameColonValue(key, value)) { in Handle_qfProcessInfo()
407 // process info packet handler... in Handle_qfProcessInfo()
[all …]
H A DGDBRemoteCommunicationServerLLGS.cpp228 [this](StringExtractorGDBRemote packet, Status &error, in RegisterPacketHandlers()
231 return this->Handle_k(packet); in RegisterPacketHandlers()
801 LLDB_LOG(log, "preparing packet for pid {0} tid {1}", process.GetID(), in PrepareStopReplyPacketForThread()
817 // Output the T packet with the thread in PrepareStopReplyPacketForThread()
856 // reply packet, so it must be enabled only on systems where there are no in PrepareStopReplyPacketForThread()
857 // limits on packet lengths. in PrepareStopReplyPacketForThread()
874 // thread otherwise this packet has all the info it needs. in PrepareStopReplyPacketForThread()
1167 "GDBRemoteCommunicationServerLLGS::%s processing a packet " in DataAvailableCallback()
1284 StringExtractorGDBRemote &packet) { in Handle_jLLDBTraceSupported() argument
1296 StringExtractorGDBRemote &packet) { in Handle_jLLDBTraceStop() argument
[all …]
/freebsd/contrib/processor-trace/libipt/test/src/
H A Dptunit-packet.c41 /* A test fixture providing everything needed for packet en- and de-coding. */
47 struct pt_packet packet[2]; member
66 static int pfix_decode_unknown(struct pt_packet_unknown *packet, in pfix_decode_unknown() argument
72 if (!packet || !config) in pfix_decode_unknown()
88 packet->priv = pfix; in pfix_decode_unknown()
98 memset(pfix->packet, 0, sizeof(pfix->packet)); in pfix_init()
147 size = pt_enc_next(&pfix->encoder, &pfix->packet[0]); in pfix_test()
150 pfix->packet[0].size = (uint8_t) size; in pfix_test()
152 size = pt_pkt_next(&pfix->decoder, &pfix->packet[1], in pfix_test()
153 sizeof(pfix->packet[1])); in pfix_test()
[all …]
H A Dptunit-time.c72 struct pt_packet_tsc packet; in tsc_null() local
75 errcode = pt_time_update_tsc(NULL, &packet, &tfix->config); in tsc_null()
86 struct pt_packet_cbr packet; in cbr_null() local
89 errcode = pt_time_update_cbr(NULL, &packet, &tfix->config); in cbr_null()
100 struct pt_packet_tma packet; in tma_null() local
103 errcode = pt_time_update_tma(NULL, &packet, &tfix->config); in tma_null()
109 errcode = pt_time_update_tma(&tfix->time, &packet, NULL); in tma_null()
117 struct pt_packet_mtc packet; in mtc_null() local
120 errcode = pt_time_update_mtc(NULL, &packet, &tfix->config); in mtc_null()
126 errcode = pt_time_update_mtc(&tfix->time, &packet, NULL); in mtc_null()
[all …]
/freebsd/contrib/libpcap/
H A Dpcap-filter.manmisc.in23 pcap-filter \- packet filter syntax
118 and destination addresses, and often contain Ethernet-like packet
154 True if the IPv4/v6 destination field of the packet is \fIhostnameaddr\fP,
157 True if the IPv4/v6 source field of the packet is \fIhostnameaddr\fP.
159 True if either the IPv4/v6 source or destination of the packet is \fIhostnameaddr\fP.
188 True if the packet used \fIhost\fP as a gateway.
205 True if the IPv4/v6 destination address of the packet has a network
218 True if the IPv4/v6 source address of the packet has a network
221 True if either the IPv4/v6 source or destination address of the packet has a network
232 True if the packet is IPv4/v6 TCP, UDP or SCTP and has a
[all …]
/freebsd/tests/sys/netpfil/common/
H A Dpft_ping.py107 for packet in sp.fragment6(ip6 / icmp, fragSize=send_frag_length):
108 packets.append(ether / packet)
117 for packet in sp.fragment(ip / icmp / raw, fragsize=send_frag_length):
118 packets.append(ether / packet)
121 for packet in packets:
122 sp.sendp(packet, iface=send_params['sendif'], verbose=False)
158 for packet in sp.fragment6(ip6 / udp / raw, fragSize=send_frag_length):
159 packets.append(ether / packet)
169 for packet in sp.fragment(ip / udp / raw, fragsize=send_frag_length):
170 packets.append(ether / packet)
[all …]
/freebsd/contrib/opencsd/decoder/include/opencsd/stm/
H A Dtrc_pkt_types_stm.h42 /** @name STM Packet Types
45 /** STM protocol packet types.
46 Contains both protocol packet types and markers for unsynced processor
47 state and bad packet sequences.
53 STM_PKT_INCOMPLETE_EOT, /**< Incomplete packet flushed at end of trace. */
54 STM_PKT_NO_ERR_TYPE, /**< No error in error packet marker. */
57 STM_PKT_ASYNC, /**< Alignment synchronisation packet */
58 STM_PKT_VERSION, /**< Version packet */
59 STM_PKT_FREQ, /**< Frequency packet */
60 STM_PKT_NULL, /**< Null packet */
[all …]
/freebsd/contrib/processor-trace/libipt/internal/include/
H A Dpt_packet.h54 /* Read the payload of an Intel PT packet.
56 * Reads the payload of the packet starting at @pos into @packet.
58 * For pt_pkt_read_psb(), the @packet parameter is omitted; the function
61 * Decoding an unknown packet uses @config's decode callback. If the callback
64 * Beware that the packet opcode is not checked. The caller is responsible
65 * for checking the opcode and calling the correct packet read function.
67 * Returns the packet size on success, a negative error code otherwise.
68 * Returns -pte_bad_packet if the packet payload is corrupt.
69 * Returns -pte_eos if the packet does not fit into the trace buffer.
70 * Returns -pte_internal if @packet, @pos, or @config is NULL.
[all …]
H A Dpt_encoder.h35 /* An Intel PT packet encoder. */
45 /* Initialize the packet encoder.
51 /* Finalize the packet encoder. */
57 /* Encode a Padding (pad) packet. */
60 /* Encode a Packet Stream Boundary (psb) packet. */
63 /* Encode an End PSB (psbend) packet. */
66 /* Encode a Target Instruction Pointer (tip) packet. */
70 /* Encode a Taken Not Taken (tnt) packet - 8-bit version. */
73 /* Encode a Taken Not Taken (tnt) packet - 64-bit version. */
76 /* Encode a Packet Generation Enable (tip.pge) packet. */
[all …]
/freebsd/crypto/openssl/ssl/statem/
H A Dstatem_local.h70 int parse_ca_names(SSL *s, PACKET *pkt);
86 MSG_PROCESS_RETURN ossl_statem_client_process_message(SSL *s, PACKET *pkt);
99 MSG_PROCESS_RETURN ossl_statem_server_process_message(SSL *s, PACKET *pkt);
110 __owur MSG_PROCESS_RETURN tls_process_change_cipher_spec(SSL *s, PACKET *pkt);
111 __owur MSG_PROCESS_RETURN tls_process_finished(SSL *s, PACKET *pkt);
117 __owur MSG_PROCESS_RETURN tls_process_key_update(SSL *s, PACKET *pkt);
124 __owur MSG_PROCESS_RETURN tls_process_server_hello(SSL *s, PACKET *pkt);
125 __owur MSG_PROCESS_RETURN tls_process_certificate_request(SSL *s, PACKET *pkt);
126 __owur MSG_PROCESS_RETURN tls_process_new_session_ticket(SSL *s, PACKET *pkt);
127 __owur int tls_process_cert_status_body(SSL *s, PACKET *pkt);
[all …]
/freebsd/sys/ofed/drivers/infiniband/core/
H A Dib_user_mad.c61 MODULE_DESCRIPTION("InfiniBand userspace MAD packet access");
166 struct ib_umad_packet *packet) in queue_packet() argument
172 for (packet->mad.hdr.id = 0; in queue_packet()
173 packet->mad.hdr.id < IB_UMAD_MAX_AGENTS; in queue_packet()
174 packet->mad.hdr.id++) in queue_packet()
175 if (agent == __get_agent(file, packet->mad.hdr.id)) { in queue_packet()
176 list_add_tail(&packet->list, &file->recv_list); in queue_packet()
188 struct ib_umad_packet *packet) in dequeue_send() argument
191 list_del(&packet->list); in dequeue_send()
199 struct ib_umad_packet *packet = send_wc->send_buf->context[0]; in send_handler() local
[all …]
/freebsd/sbin/ipf/ipf/
H A Dipf.55 The ipf.conf file is used to specify rules for the firewall, packet
6 authentication and packet accounting components of IPFilter. To load rules
26 the direction of the packet (in or out)
69 of a packet that matches it will be. Descriptions of the many and various
70 sections that can be used to match on the contents of packet headers will
77 rules that match a packet indicate to ipfilter that it should be
81 rules are used when it is desirable to prevent a packet from going
86 when IPFilter successfully matches a packet against a log rule a log
88 have no impact on whether or not a packet is allowed through or not.
89 So if a packet first matched a block rule and then matched a log rule,
[all …]
/freebsd/crypto/openssl/include/internal/
H A Dpacket.h27 } PACKET; typedef
30 static ossl_inline void packet_forward(PACKET *pkt, size_t len) in packet_forward()
37 * Returns the number of bytes remaining to be read in the PACKET
39 static ossl_inline size_t PACKET_remaining(const PACKET *pkt) in PACKET_remaining()
45 * Returns a pointer to the first byte after the packet data.
46 * Useful for integrating with non-PACKET parsing code.
48 * has consumed the entire packet contents.
50 static ossl_inline const unsigned char *PACKET_end(const PACKET *pkt) in PACKET_end()
56 * Returns a pointer to the PACKET's current position.
59 static ossl_inline const unsigned char *PACKET_data(const PACKET *pkt) in PACKET_data()
[all …]

12345678910>>...96