/freebsd/contrib/ldns/ |
H A D | packet.c | 2 * packet.c 4 * dns packet implementation 41 ldns_pkt_id(const ldns_pkt *packet) in ldns_pkt_id() argument 43 return packet->_header->_id; in ldns_pkt_id() 47 ldns_pkt_qr(const ldns_pkt *packet) in ldns_pkt_qr() argument 49 return packet->_header->_qr; in ldns_pkt_qr() 53 ldns_pkt_aa(const ldns_pkt *packet) in ldns_pkt_aa() argument 55 return packet->_header->_aa; in ldns_pkt_aa() 59 ldns_pkt_tc(const ldns_pkt *packet) in ldns_pkt_tc() argument 61 return packet->_header->_tc; in ldns_pkt_tc() [all …]
|
H A D | wire2host.c | 366 ldns_wire2pkt_hdr(ldns_pkt *packet, const uint8_t *wire, size_t max, size_t *pos) in ldns_wire2pkt_hdr() argument 371 ldns_pkt_set_id(packet, LDNS_ID_WIRE(wire)); in ldns_wire2pkt_hdr() 372 ldns_pkt_set_qr(packet, LDNS_QR_WIRE(wire)); in ldns_wire2pkt_hdr() 373 ldns_pkt_set_opcode(packet, LDNS_OPCODE_WIRE(wire)); in ldns_wire2pkt_hdr() 374 ldns_pkt_set_aa(packet, LDNS_AA_WIRE(wire)); in ldns_wire2pkt_hdr() 375 ldns_pkt_set_tc(packet, LDNS_TC_WIRE(wire)); in ldns_wire2pkt_hdr() 376 ldns_pkt_set_rd(packet, LDNS_RD_WIRE(wire)); in ldns_wire2pkt_hdr() 377 ldns_pkt_set_ra(packet, LDNS_RA_WIRE(wire)); in ldns_wire2pkt_hdr() 378 ldns_pkt_set_ad(packet, LDNS_AD_WIRE(wire)); in ldns_wire2pkt_hdr() 379 ldns_pkt_set_cd(packet, LDNS_CD_WIRE(wire)); in ldns_wire2pkt_hdr() [all …]
|
/freebsd/contrib/ldns/ldns/ |
H A D | packet.h | 2 * packet.h 4 * DNS packet definitions 72 * Header of a dns packet 74 * Contains the information about the packet itself, as specified in RFC1035 195 /** Id of a packet */ 201 /** Packet truncated */ 227 * DNS packet 229 * This structure contains a complete DNS packet (either a query or an answer) 238 /* extra items needed in a packet */ 241 /** Timestamp of the time the packet was sent or created */ [all …]
|
/freebsd/contrib/processor-trace/libipt/src/ |
H A D | pt_packet_decoder.c | 111 * by a preceding packet. in pt_pkt_sync_forward() 236 int pt_pkt_next(struct pt_packet_decoder *decoder, struct pt_packet *packet, in pt_pkt_next() argument 243 if (!packet || !decoder) in pt_pkt_next() 246 ppkt = psize == sizeof(pkt) ? packet : &pkt; in pt_pkt_next() 255 if (!dfun->packet) in pt_pkt_next() 258 size = dfun->packet(decoder, ppkt); in pt_pkt_next() 262 errcode = pkt_to_user(packet, psize, ppkt); in pt_pkt_next() 272 struct pt_packet *packet) in pt_pkt_decode_unknown() argument 279 size = pt_pkt_read_unknown(packet, decoder->pos, &decoder->config); in pt_pkt_decode_unknown() 287 struct pt_packet *packet) in pt_pkt_decode_pad() argument [all …]
|
H A D | pt_encoder.c | 208 /* Encode an IP packet. 210 * Write an IP packet with opcode \@opc and payload from \@packet if there is 216 * Returns -pte_internal if \@encoder or \@packet is NULL. 217 * Returns -pte_invalid if \@packet.ipc is not valid. 220 const struct pt_packet_ip *packet) in pt_encode_ip() argument 226 if (!encoder || !packet) in pt_encode_ip() 229 size = pt_ipc_size(packet->ipc); in pt_encode_ip() 239 ipc = (uint8_t) (packet->ipc << pt_opm_ipc_shr); in pt_encode_ip() 245 encoder->pos = pt_encode_int(pos, packet->ip, size); in pt_encode_ip() 249 int pt_enc_next(struct pt_encoder *encoder, const struct pt_packet *packet) in pt_enc_next() argument [all …]
|
H A D | pt_packet.c | 52 int pt_pkt_read_unknown(struct pt_packet *packet, const uint8_t *pos, in pt_pkt_read_unknown() argument 59 if (!packet || !pos || !config) in pt_pkt_read_unknown() 67 packet->payload.unknown.packet = pos; in pt_pkt_read_unknown() 68 packet->payload.unknown.priv = NULL; in pt_pkt_read_unknown() 73 size = (*decode)(&packet->payload.unknown, config, pos, in pt_pkt_read_unknown() 81 packet->type = ppt_unknown; in pt_pkt_read_unknown() 82 packet->size = (uint8_t) size; in pt_pkt_read_unknown() 135 int pt_pkt_read_ip(struct pt_packet_ip *packet, const uint8_t *pos, in pt_pkt_read_ip() argument 142 if (!packet || !pos || !config) in pt_pkt_read_ip() 158 packet->ipc = (enum pt_ip_compression) ipc; in pt_pkt_read_ip() [all …]
|
H A D | pt_query_decoder.c | 48 * The packet @decoder must be synchronized onto the trace stream at the 51 * It uses @packet to hold trace packets during its search. If the search is 52 * successful, @packet will contain the first (and hopefully only) FUP packet in 53 * this PSB+. Otherwise, @packet may contain anything. 55 * Returns one if a FUP packet is found (@packet will contain it). 56 * Returns zero if no FUP packet is found (@packet is undefined). 59 static int pt_qry_find_header_fup(struct pt_packet *packet, in pt_qry_find_header_fup() argument 62 if (!packet || !decoder) in pt_qry_find_header_fup() 68 errcode = pt_pkt_next(decoder, packet, sizeof(*packet)); in pt_qry_find_header_fup() 72 switch (packet->type) { in pt_qry_find_header_fup() [all …]
|
/freebsd/contrib/netbsd-tests/ipf/expected/ |
H A D | f13 | 2 bad-packet 5 bad-packet 8 bad-packet 10 bad-packet 22 bad-packet 25 bad-packet 28 bad-packet 30 bad-packet 42 bad-packet 45 bad-packet [all …]
|
/freebsd/contrib/llvm-project/lldb/source/Utility/ |
H A D | TraceGDBRemotePackets.cpp | 17 bool fromJSON(const json::Value &value, TraceSupportedResponse &packet, in fromJSON() argument 20 return o && o.map("description", packet.description) && in fromJSON() 21 o.map("name", packet.name); in fromJSON() 24 json::Value toJSON(const TraceSupportedResponse &packet) { in toJSON() argument 26 Object{{"description", packet.description}, {"name", packet.name}}); in toJSON() 34 bool fromJSON(const json::Value &value, TraceStartRequest &packet, Path path) { in fromJSON() argument 36 return o && o.map("type", packet.type) && o.map("tids", packet.tids); in fromJSON() 39 json::Value toJSON(const TraceStartRequest &packet) { in toJSON() argument 40 return json::Value(Object{{"tids", packet.tids}, {"type", packet.type}}); in toJSON() 56 bool fromJSON(const json::Value &value, TraceStopRequest &packet, Path path) { in fromJSON() argument [all …]
|
H A D | TraceIntelPTGDBRemotePackets.cpp | 45 bool fromJSON(const json::Value &value, TraceIntelPTStartRequest &packet, in fromJSON() argument 48 if (!(o && fromJSON(value, (TraceStartRequest &)packet, path) && in fromJSON() 49 o.map("enableTsc", packet.enable_tsc) && in fromJSON() 50 o.map("psbPeriod", packet.psb_period) && in fromJSON() 51 o.map("iptTraceSize", packet.ipt_trace_size))) in fromJSON() 54 if (packet.IsProcessTracing()) { in fromJSON() 55 if (!o.map("processBufferSizeLimit", packet.process_buffer_size_limit) || in fromJSON() 56 !o.map("perCpuTracing", packet.per_cpu_tracing) || in fromJSON() 57 !o.map("disableCgroupTracing", packet.disable_cgroup_filtering)) in fromJSON() 63 json::Value toJSON(const TraceIntelPTStartRequest &packet) { in toJSON() argument [all …]
|
/freebsd/contrib/llvm-project/lldb/source/Plugins/Process/gdb-remote/ |
H A D | GDBRemoteCommunicationServerCommon.h | 38 PacketResult Handle_A(StringExtractorGDBRemote &packet); 40 PacketResult Handle_qHostInfo(StringExtractorGDBRemote &packet); 42 PacketResult Handle_qProcessInfoPID(StringExtractorGDBRemote &packet); 44 PacketResult Handle_qfProcessInfo(StringExtractorGDBRemote &packet); 46 PacketResult Handle_qsProcessInfo(StringExtractorGDBRemote &packet); 48 PacketResult Handle_qUserName(StringExtractorGDBRemote &packet); 50 PacketResult Handle_qGroupName(StringExtractorGDBRemote &packet); 52 PacketResult Handle_qSpeedTest(StringExtractorGDBRemote &packet); 54 PacketResult Handle_vFile_Open(StringExtractorGDBRemote &packet); 56 PacketResult Handle_vFile_Close(StringExtractorGDBRemote &packet); [all …]
|
H A D | GDBRemoteCommunicationServerLLGS.h | 148 PacketResult Handle_k(StringExtractorGDBRemote &packet); 150 PacketResult Handle_vKill(StringExtractorGDBRemote &packet); 152 PacketResult Handle_qProcessInfo(StringExtractorGDBRemote &packet); 154 PacketResult Handle_qC(StringExtractorGDBRemote &packet); 156 PacketResult Handle_QSetDisableASLR(StringExtractorGDBRemote &packet); 158 PacketResult Handle_QSetWorkingDir(StringExtractorGDBRemote &packet); 160 PacketResult Handle_qGetWorkingDir(StringExtractorGDBRemote &packet); 162 PacketResult Handle_QThreadSuffixSupported(StringExtractorGDBRemote &packet); 164 PacketResult Handle_QListThreadsInStopReply(StringExtractorGDBRemote &packet); 169 PacketResult Handle_C(StringExtractorGDBRemote &packet); [all …]
|
H A D | GDBRemoteCommunicationServerCommon.cpp | 179 StringExtractorGDBRemote &packet) { in Handle_qHostInfo() argument 315 StringExtractorGDBRemote &packet) { in Handle_qProcessInfoPID() argument 316 // Packet format: "qProcessInfoPID:%i" where %i is the pid in Handle_qProcessInfoPID() 317 packet.SetFilePos(::strlen("qProcessInfoPID:")); in Handle_qProcessInfoPID() 318 lldb::pid_t pid = packet.GetU32(LLDB_INVALID_PROCESS_ID); in Handle_qProcessInfoPID() 332 StringExtractorGDBRemote &packet) { in Handle_qfProcessInfo() argument 337 packet.SetFilePos(::strlen("qfProcessInfo")); in Handle_qfProcessInfo() 338 if (packet.GetChar() == ':') { in Handle_qfProcessInfo() 341 while (packet.GetNameColonValue(key, value)) { in Handle_qfProcessInfo() 407 // process info packet handler... in Handle_qfProcessInfo() [all …]
|
H A D | GDBRemoteCommunicationServerLLGS.cpp | 228 [this](StringExtractorGDBRemote packet, Status &error, in RegisterPacketHandlers() 231 return this->Handle_k(packet); in RegisterPacketHandlers() 801 LLDB_LOG(log, "preparing packet for pid {0} tid {1}", process.GetID(), in PrepareStopReplyPacketForThread() 817 // Output the T packet with the thread in PrepareStopReplyPacketForThread() 856 // reply packet, so it must be enabled only on systems where there are no in PrepareStopReplyPacketForThread() 857 // limits on packet lengths. in PrepareStopReplyPacketForThread() 874 // thread otherwise this packet has all the info it needs. in PrepareStopReplyPacketForThread() 1167 "GDBRemoteCommunicationServerLLGS::%s processing a packet " in DataAvailableCallback() 1284 StringExtractorGDBRemote &packet) { in Handle_jLLDBTraceSupported() argument 1296 StringExtractorGDBRemote &packet) { in Handle_jLLDBTraceStop() argument [all …]
|
/freebsd/contrib/processor-trace/libipt/test/src/ |
H A D | ptunit-packet.c | 41 /* A test fixture providing everything needed for packet en- and de-coding. */ 47 struct pt_packet packet[2]; member 66 static int pfix_decode_unknown(struct pt_packet_unknown *packet, in pfix_decode_unknown() argument 72 if (!packet || !config) in pfix_decode_unknown() 88 packet->priv = pfix; in pfix_decode_unknown() 98 memset(pfix->packet, 0, sizeof(pfix->packet)); in pfix_init() 147 size = pt_enc_next(&pfix->encoder, &pfix->packet[0]); in pfix_test() 150 pfix->packet[0].size = (uint8_t) size; in pfix_test() 152 size = pt_pkt_next(&pfix->decoder, &pfix->packet[1], in pfix_test() 153 sizeof(pfix->packet[1])); in pfix_test() [all …]
|
H A D | ptunit-time.c | 72 struct pt_packet_tsc packet; in tsc_null() local 75 errcode = pt_time_update_tsc(NULL, &packet, &tfix->config); in tsc_null() 86 struct pt_packet_cbr packet; in cbr_null() local 89 errcode = pt_time_update_cbr(NULL, &packet, &tfix->config); in cbr_null() 100 struct pt_packet_tma packet; in tma_null() local 103 errcode = pt_time_update_tma(NULL, &packet, &tfix->config); in tma_null() 109 errcode = pt_time_update_tma(&tfix->time, &packet, NULL); in tma_null() 117 struct pt_packet_mtc packet; in mtc_null() local 120 errcode = pt_time_update_mtc(NULL, &packet, &tfix->config); in mtc_null() 126 errcode = pt_time_update_mtc(&tfix->time, &packet, NULL); in mtc_null() [all …]
|
/freebsd/contrib/libpcap/ |
H A D | pcap-filter.manmisc.in | 23 pcap-filter \- packet filter syntax 118 and destination addresses, and often contain Ethernet-like packet 154 True if the IPv4/v6 destination field of the packet is \fIhostnameaddr\fP, 157 True if the IPv4/v6 source field of the packet is \fIhostnameaddr\fP. 159 True if either the IPv4/v6 source or destination of the packet is \fIhostnameaddr\fP. 188 True if the packet used \fIhost\fP as a gateway. 205 True if the IPv4/v6 destination address of the packet has a network 218 True if the IPv4/v6 source address of the packet has a network 221 True if either the IPv4/v6 source or destination address of the packet has a network 232 True if the packet is IPv4/v6 TCP, UDP or SCTP and has a [all …]
|
/freebsd/tests/sys/netpfil/common/ |
H A D | pft_ping.py | 107 for packet in sp.fragment6(ip6 / icmp, fragSize=send_frag_length): 108 packets.append(ether / packet) 117 for packet in sp.fragment(ip / icmp / raw, fragsize=send_frag_length): 118 packets.append(ether / packet) 121 for packet in packets: 122 sp.sendp(packet, iface=send_params['sendif'], verbose=False) 158 for packet in sp.fragment6(ip6 / udp / raw, fragSize=send_frag_length): 159 packets.append(ether / packet) 169 for packet in sp.fragment(ip / udp / raw, fragsize=send_frag_length): 170 packets.append(ether / packet) [all …]
|
/freebsd/contrib/opencsd/decoder/include/opencsd/stm/ |
H A D | trc_pkt_types_stm.h | 42 /** @name STM Packet Types 45 /** STM protocol packet types. 46 Contains both protocol packet types and markers for unsynced processor 47 state and bad packet sequences. 53 STM_PKT_INCOMPLETE_EOT, /**< Incomplete packet flushed at end of trace. */ 54 STM_PKT_NO_ERR_TYPE, /**< No error in error packet marker. */ 57 STM_PKT_ASYNC, /**< Alignment synchronisation packet */ 58 STM_PKT_VERSION, /**< Version packet */ 59 STM_PKT_FREQ, /**< Frequency packet */ 60 STM_PKT_NULL, /**< Null packet */ [all …]
|
/freebsd/contrib/processor-trace/libipt/internal/include/ |
H A D | pt_packet.h | 54 /* Read the payload of an Intel PT packet. 56 * Reads the payload of the packet starting at @pos into @packet. 58 * For pt_pkt_read_psb(), the @packet parameter is omitted; the function 61 * Decoding an unknown packet uses @config's decode callback. If the callback 64 * Beware that the packet opcode is not checked. The caller is responsible 65 * for checking the opcode and calling the correct packet read function. 67 * Returns the packet size on success, a negative error code otherwise. 68 * Returns -pte_bad_packet if the packet payload is corrupt. 69 * Returns -pte_eos if the packet does not fit into the trace buffer. 70 * Returns -pte_internal if @packet, @pos, or @config is NULL. [all …]
|
H A D | pt_encoder.h | 35 /* An Intel PT packet encoder. */ 45 /* Initialize the packet encoder. 51 /* Finalize the packet encoder. */ 57 /* Encode a Padding (pad) packet. */ 60 /* Encode a Packet Stream Boundary (psb) packet. */ 63 /* Encode an End PSB (psbend) packet. */ 66 /* Encode a Target Instruction Pointer (tip) packet. */ 70 /* Encode a Taken Not Taken (tnt) packet - 8-bit version. */ 73 /* Encode a Taken Not Taken (tnt) packet - 64-bit version. */ 76 /* Encode a Packet Generation Enable (tip.pge) packet. */ [all …]
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | statem_local.h | 70 int parse_ca_names(SSL *s, PACKET *pkt); 86 MSG_PROCESS_RETURN ossl_statem_client_process_message(SSL *s, PACKET *pkt); 99 MSG_PROCESS_RETURN ossl_statem_server_process_message(SSL *s, PACKET *pkt); 110 __owur MSG_PROCESS_RETURN tls_process_change_cipher_spec(SSL *s, PACKET *pkt); 111 __owur MSG_PROCESS_RETURN tls_process_finished(SSL *s, PACKET *pkt); 117 __owur MSG_PROCESS_RETURN tls_process_key_update(SSL *s, PACKET *pkt); 124 __owur MSG_PROCESS_RETURN tls_process_server_hello(SSL *s, PACKET *pkt); 125 __owur MSG_PROCESS_RETURN tls_process_certificate_request(SSL *s, PACKET *pkt); 126 __owur MSG_PROCESS_RETURN tls_process_new_session_ticket(SSL *s, PACKET *pkt); 127 __owur int tls_process_cert_status_body(SSL *s, PACKET *pkt); [all …]
|
/freebsd/sys/ofed/drivers/infiniband/core/ |
H A D | ib_user_mad.c | 61 MODULE_DESCRIPTION("InfiniBand userspace MAD packet access"); 166 struct ib_umad_packet *packet) in queue_packet() argument 172 for (packet->mad.hdr.id = 0; in queue_packet() 173 packet->mad.hdr.id < IB_UMAD_MAX_AGENTS; in queue_packet() 174 packet->mad.hdr.id++) in queue_packet() 175 if (agent == __get_agent(file, packet->mad.hdr.id)) { in queue_packet() 176 list_add_tail(&packet->list, &file->recv_list); in queue_packet() 188 struct ib_umad_packet *packet) in dequeue_send() argument 191 list_del(&packet->list); in dequeue_send() 199 struct ib_umad_packet *packet = send_wc->send_buf->context[0]; in send_handler() local [all …]
|
/freebsd/sbin/ipf/ipf/ |
H A D | ipf.5 | 5 The ipf.conf file is used to specify rules for the firewall, packet 6 authentication and packet accounting components of IPFilter. To load rules 26 the direction of the packet (in or out) 69 of a packet that matches it will be. Descriptions of the many and various 70 sections that can be used to match on the contents of packet headers will 77 rules that match a packet indicate to ipfilter that it should be 81 rules are used when it is desirable to prevent a packet from going 86 when IPFilter successfully matches a packet against a log rule a log 88 have no impact on whether or not a packet is allowed through or not. 89 So if a packet first matched a block rule and then matched a log rule, [all …]
|
/freebsd/crypto/openssl/include/internal/ |
H A D | packet.h | 27 } PACKET; typedef 30 static ossl_inline void packet_forward(PACKET *pkt, size_t len) in packet_forward() 37 * Returns the number of bytes remaining to be read in the PACKET 39 static ossl_inline size_t PACKET_remaining(const PACKET *pkt) in PACKET_remaining() 45 * Returns a pointer to the first byte after the packet data. 46 * Useful for integrating with non-PACKET parsing code. 48 * has consumed the entire packet contents. 50 static ossl_inline const unsigned char *PACKET_end(const PACKET *pkt) in PACKET_end() 56 * Returns a pointer to the PACKET's current position. 59 static ossl_inline const unsigned char *PACKET_data(const PACKET *pkt) in PACKET_data() [all …]
|