| /freebsd/contrib/ldns/ |
| H A D | packet.c | 2 * packet.c 4 * dns packet implementation 41 ldns_pkt_id(const ldns_pkt *packet) in ldns_pkt_id() argument 43 return packet->_header->_id; in ldns_pkt_id() 47 ldns_pkt_qr(const ldns_pkt *packet) in ldns_pkt_qr() argument 49 return packet->_header->_qr; in ldns_pkt_qr() 53 ldns_pkt_aa(const ldns_pkt *packet) in ldns_pkt_aa() argument 55 return packet->_header->_aa; in ldns_pkt_aa() 59 ldns_pkt_tc(const ldns_pkt *packet) in ldns_pkt_tc() argument 61 return packet->_header->_tc; in ldns_pkt_tc() [all …]
|
| /freebsd/contrib/ldns/ldns/ |
| H A D | packet.h | 2 * packet.h 4 * DNS packet definitions 72 * Header of a dns packet 74 * Contains the information about the packet itself, as specified in RFC1035 195 /** Id of a packet */ 201 /** Packet truncated */ 227 * DNS packet 229 * This structure contains a complete DNS packet (either a query or an answer) 238 /* extra items needed in a packet */ 241 /** Timestamp of the time the packet was sent or created */ [all …]
|
| /freebsd/contrib/processor-trace/libipt/src/ |
| H A D | pt_packet_decoder.c | 111 * by a preceding packet. in pt_pkt_sync_forward() 236 int pt_pkt_next(struct pt_packet_decoder *decoder, struct pt_packet *packet, in pt_pkt_next() argument 243 if (!packet || !decoder) in pt_pkt_next() 246 ppkt = psize == sizeof(pkt) ? packet : &pkt; in pt_pkt_next() 255 if (!dfun->packet) in pt_pkt_next() 258 size = dfun->packet(decoder, ppkt); in pt_pkt_next() 262 errcode = pkt_to_user(packet, psize, ppkt); in pt_pkt_next() 272 struct pt_packet *packet) in pt_pkt_decode_unknown() argument 279 size = pt_pkt_read_unknown(packet, decoder->pos, &decoder->config); in pt_pkt_decode_unknown() 287 struct pt_packet *packet) in pt_pkt_decode_pad() argument [all …]
|
| H A D | pt_encoder.c | 208 /* Encode an IP packet. 210 * Write an IP packet with opcode \@opc and payload from \@packet if there is 216 * Returns -pte_internal if \@encoder or \@packet is NULL. 217 * Returns -pte_invalid if \@packet.ipc is not valid. 220 const struct pt_packet_ip *packet) in pt_encode_ip() argument 226 if (!encoder || !packet) in pt_encode_ip() 229 size = pt_ipc_size(packet->ipc); in pt_encode_ip() 239 ipc = (uint8_t) (packet->ipc << pt_opm_ipc_shr); in pt_encode_ip() 245 encoder->pos = pt_encode_int(pos, packet->ip, size); in pt_encode_ip() 249 int pt_enc_next(struct pt_encoder *encoder, const struct pt_packet *packet) in pt_enc_next() argument [all …]
|
| H A D | pt_packet.c | 52 int pt_pkt_read_unknown(struct pt_packet *packet, const uint8_t *pos, in pt_pkt_read_unknown() argument 59 if (!packet || !pos || !config) in pt_pkt_read_unknown() 67 packet->payload.unknown.packet = pos; in pt_pkt_read_unknown() 68 packet->payload.unknown.priv = NULL; in pt_pkt_read_unknown() 73 size = (*decode)(&packet->payload.unknown, config, pos, in pt_pkt_read_unknown() 81 packet->type = ppt_unknown; in pt_pkt_read_unknown() 82 packet->size = (uint8_t) size; in pt_pkt_read_unknown() 135 int pt_pkt_read_ip(struct pt_packet_ip *packet, const uint8_t *pos, in pt_pkt_read_ip() argument 142 if (!packet || !pos || !config) in pt_pkt_read_ip() 158 packet->ipc = (enum pt_ip_compression) ipc; in pt_pkt_read_ip() [all …]
|
| H A D | pt_query_decoder.c | 48 * The packet @decoder must be synchronized onto the trace stream at the 51 * It uses @packet to hold trace packets during its search. If the search is 52 * successful, @packet will contain the first (and hopefully only) FUP packet in 53 * this PSB+. Otherwise, @packet may contain anything. 55 * Returns one if a FUP packet is found (@packet will contain it). 56 * Returns zero if no FUP packet is found (@packet is undefined). 59 static int pt_qry_find_header_fup(struct pt_packet *packet, in pt_qry_find_header_fup() argument 62 if (!packet || !decoder) in pt_qry_find_header_fup() 68 errcode = pt_pkt_next(decoder, packet, sizeof(*packet)); in pt_qry_find_header_fup() 72 switch (packet->type) { in pt_qry_find_header_fup() [all …]
|
| /freebsd/contrib/netbsd-tests/ipf/expected/ |
| H A D | f13 | 2 bad-packet 5 bad-packet 8 bad-packet 10 bad-packet 22 bad-packet 25 bad-packet 28 bad-packet 30 bad-packet 42 bad-packet 45 bad-packet [all …]
|
| /freebsd/contrib/llvm-project/lldb/source/Utility/ |
| H A D | TraceGDBRemotePackets.cpp | 17 bool fromJSON(const json::Value &value, TraceSupportedResponse &packet, in fromJSON() argument 20 return o && o.map("description", packet.description) && in fromJSON() 21 o.map("name", packet.name); in fromJSON() 24 json::Value toJSON(const TraceSupportedResponse &packet) { in toJSON() argument 26 Object{{"description", packet.description}, {"name", packet.name}}); in toJSON() 34 bool fromJSON(const json::Value &value, TraceStartRequest &packet, Path path) { in fromJSON() argument 36 return o && o.map("type", packet.type) && o.map("tids", packet.tids); in fromJSON() 39 json::Value toJSON(const TraceStartRequest &packet) { in toJSON() argument 40 return json::Value(Object{{"tids", packet.tids}, {"type", packet.type}}); in toJSON() 56 bool fromJSON(const json::Value &value, TraceStopRequest &packet, Path path) { in fromJSON() argument [all …]
|
| H A D | TraceIntelPTGDBRemotePackets.cpp | 45 bool fromJSON(const json::Value &value, TraceIntelPTStartRequest &packet, in fromJSON() argument 48 if (!(o && fromJSON(value, (TraceStartRequest &)packet, path) && in fromJSON() 49 o.map("enableTsc", packet.enable_tsc) && in fromJSON() 50 o.map("psbPeriod", packet.psb_period) && in fromJSON() 51 o.map("iptTraceSize", packet.ipt_trace_size))) in fromJSON() 54 if (packet.IsProcessTracing()) { in fromJSON() 55 if (!o.map("processBufferSizeLimit", packet.process_buffer_size_limit) || in fromJSON() 56 !o.map("perCpuTracing", packet.per_cpu_tracing) || in fromJSON() 57 !o.map("disableCgroupTracing", packet.disable_cgroup_filtering)) in fromJSON() 63 json::Value toJSON(const TraceIntelPTStartRequest &packet) { in toJSON() argument [all …]
|
| /freebsd/contrib/llvm-project/lldb/source/Plugins/Process/gdb-remote/ |
| H A D | GDBRemoteCommunicationServerCommon.h | 38 PacketResult Handle_A(StringExtractorGDBRemote &packet); 40 PacketResult Handle_qHostInfo(StringExtractorGDBRemote &packet); 42 PacketResult Handle_qProcessInfoPID(StringExtractorGDBRemote &packet); 44 PacketResult Handle_qfProcessInfo(StringExtractorGDBRemote &packet); 46 PacketResult Handle_qsProcessInfo(StringExtractorGDBRemote &packet); 48 PacketResult Handle_qUserName(StringExtractorGDBRemote &packet); 50 PacketResult Handle_qGroupName(StringExtractorGDBRemote &packet); 52 PacketResult Handle_qSpeedTest(StringExtractorGDBRemote &packet); 54 PacketResult Handle_vFile_Open(StringExtractorGDBRemote &packet); 56 PacketResult Handle_vFile_Close(StringExtractorGDBRemote &packet); [all …]
|
| H A D | GDBRemoteCommunicationServerLLGS.h | 148 PacketResult Handle_k(StringExtractorGDBRemote &packet); 150 PacketResult Handle_vKill(StringExtractorGDBRemote &packet); 152 PacketResult Handle_qProcessInfo(StringExtractorGDBRemote &packet); 154 PacketResult Handle_qC(StringExtractorGDBRemote &packet); 156 PacketResult Handle_QSetDisableASLR(StringExtractorGDBRemote &packet); 158 PacketResult Handle_QSetWorkingDir(StringExtractorGDBRemote &packet); 160 PacketResult Handle_qGetWorkingDir(StringExtractorGDBRemote &packet); 162 PacketResult Handle_QThreadSuffixSupported(StringExtractorGDBRemote &packet); 164 PacketResult Handle_QListThreadsInStopReply(StringExtractorGDBRemote &packet); 169 PacketResult Handle_C(StringExtractorGDBRemote &packet); [all …]
|
| H A D | GDBRemoteCommunicationServerCommon.cpp | 179 StringExtractorGDBRemote &packet) { in Handle_qHostInfo() argument 315 StringExtractorGDBRemote &packet) { in Handle_qProcessInfoPID() argument 316 // Packet format: "qProcessInfoPID:%i" where %i is the pid in Handle_qProcessInfoPID() 317 packet.SetFilePos(::strlen("qProcessInfoPID:")); in Handle_qProcessInfoPID() 318 lldb::pid_t pid = packet.GetU32(LLDB_INVALID_PROCESS_ID); in Handle_qProcessInfoPID() 332 StringExtractorGDBRemote &packet) { in Handle_qfProcessInfo() argument 337 packet.SetFilePos(::strlen("qfProcessInfo")); in Handle_qfProcessInfo() 338 if (packet.GetChar() == ':') { in Handle_qfProcessInfo() 341 while (packet.GetNameColonValue(key, value)) { in Handle_qfProcessInfo() 407 // process info packet handler... in Handle_qfProcessInfo() [all …]
|
| H A D | GDBRemoteCommunicationServerLLGS.cpp | 228 [this](StringExtractorGDBRemote packet, Status &error, in RegisterPacketHandlers() 231 return this->Handle_k(packet); in RegisterPacketHandlers() 801 LLDB_LOG(log, "preparing packet for pid {0} tid {1}", process.GetID(), in PrepareStopReplyPacketForThread() 817 // Output the T packet with the thread in PrepareStopReplyPacketForThread() 856 // reply packet, so it must be enabled only on systems where there are no in PrepareStopReplyPacketForThread() 857 // limits on packet lengths. in PrepareStopReplyPacketForThread() 874 // thread otherwise this packet has all the info it needs. in PrepareStopReplyPacketForThread() 1167 "GDBRemoteCommunicationServerLLGS::%s processing a packet " in DataAvailableCallback() 1284 StringExtractorGDBRemote &packet) { in Handle_jLLDBTraceSupported() argument 1296 StringExtractorGDBRemote &packet) { in Handle_jLLDBTraceStop() argument [all …]
|
| /freebsd/contrib/processor-trace/libipt/test/src/ |
| H A D | ptunit-packet.c | 41 /* A test fixture providing everything needed for packet en- and de-coding. */ 47 struct pt_packet packet[2]; member 66 static int pfix_decode_unknown(struct pt_packet_unknown *packet, in pfix_decode_unknown() argument 72 if (!packet || !config) in pfix_decode_unknown() 88 packet->priv = pfix; in pfix_decode_unknown() 98 memset(pfix->packet, 0, sizeof(pfix->packet)); in pfix_init() 147 size = pt_enc_next(&pfix->encoder, &pfix->packet[0]); in pfix_test() 150 pfix->packet[0].size = (uint8_t) size; in pfix_test() 152 size = pt_pkt_next(&pfix->decoder, &pfix->packet[1], in pfix_test() 153 sizeof(pfix->packet[1])); in pfix_test() [all …]
|
| H A D | ptunit-time.c | 72 struct pt_packet_tsc packet; in tsc_null() local 75 errcode = pt_time_update_tsc(NULL, &packet, &tfix->config); in tsc_null() 86 struct pt_packet_cbr packet; in cbr_null() local 89 errcode = pt_time_update_cbr(NULL, &packet, &tfix->config); in cbr_null() 100 struct pt_packet_tma packet; in tma_null() local 103 errcode = pt_time_update_tma(NULL, &packet, &tfix->config); in tma_null() 109 errcode = pt_time_update_tma(&tfix->time, &packet, NULL); in tma_null() 117 struct pt_packet_mtc packet; in mtc_null() local 120 errcode = pt_time_update_mtc(NULL, &packet, &tfix->config); in mtc_null() 126 errcode = pt_time_update_mtc(&tfix->time, &packet, NULL); in mtc_null() [all …]
|
| /freebsd/crypto/openssl/include/internal/ |
| H A D | quic_wire_pkt.h | 22 /* QUIC logical packet type. These do not match wire values. */ 31 * Determine encryption level from packet type. Returns QUIC_ENC_LEVEL_NUM if 32 * the packet is not of a type which is encrypted. 68 /* Determine if a packet type contains an encrypted payload. */ 81 /* Determine if a packet type contains a PN field. */ 86 * Currently a packet has a PN iff it is encrypted. This could change in ossl_quic_pkt_type_has_pn() 93 * Determine if a packet type can appear with other packets in a datagram. Some 94 * packet types must be the sole packet in a datagram. 100 * Currently only the encrypted packet types can share a datagram. This in ossl_quic_pkt_type_can_share_dgram() 107 * Determine if the packet type must come at the end of the datagram (due to the [all …]
|
| H A D | quic_wire.h | 134 * Represents an inclusive range of packet numbers [start, end]. 142 * A sequence of packet number ranges [[start, end]...]. 149 * As such, ack_ranges[0].end is always the highest packet number 151 * always the lowest packet number being acknowledged. 154 * acknowledge at least one packet number. 177 * runs to the end of the packet. 180 * length. If not set, the frame runs to the end of the packet and len has 234 * Encodes zero or more QUIC PADDING frames to the packet writer. Each PADDING 241 * Encodes a QUIC PING frame to the packet writer. This frame type takes 247 * Encodes a QUIC ACK frame to the packet writer, given a logical representation [all …]
|
| /freebsd/contrib/libpcap/ |
| H A D | pcap-filter.manmisc.in | 23 pcap-filter \- packet filter syntax 118 and destination addresses, and often contain Ethernet-like packet 154 True if the IPv4/v6 destination field of the packet is \fIhostnameaddr\fP, 157 True if the IPv4/v6 source field of the packet is \fIhostnameaddr\fP. 159 True if either the IPv4/v6 source or destination of the packet is \fIhostnameaddr\fP. 188 True if the packet used \fIhost\fP as a gateway. 205 True if the IPv4/v6 destination address of the packet has a network 218 True if the IPv4/v6 source address of the packet has a network 221 True if either the IPv4/v6 source or destination address of the packet has a network 232 True if the packet is IPv4/v6 TCP, UDP or SCTP and has a [all …]
|
| /freebsd/tests/sys/netpfil/common/ |
| H A D | pft_ping.py | 107 for packet in sp.fragment6(ip6 / icmp, fragSize=send_frag_length): 108 packets.append(ether / packet) 117 for packet in sp.fragment(ip / icmp / raw, fragsize=send_frag_length): 118 packets.append(ether / packet) 121 for packet in packets: 122 sp.sendp(packet, iface=send_params['sendif'], verbose=False) 158 for packet in sp.fragment6(ip6 / udp / raw, fragSize=send_frag_length): 159 packets.append(ether / packet) 169 for packet in sp.fragment(ip / udp / raw, fragsize=send_frag_length): 170 packets.append(ether / packet) [all …]
|
| /freebsd/crypto/openssl/doc/designs/quic-design/ |
| H A D | quic-ackm.md | 9 - Generating notifications that a packet we sent was delivered successfully 10 - Generating notifications that a packet we sent was lost 12 - Providing information on the largest unacked packet number so that packet 13 numbers in packet headers can be encoded and decoded correctly 19 - Providing information on whether a given RX packet number is potentially 28 - be notified when a packet number space is discarded 49 - It indicates the largest unacknowledged packet number 50 for a given packet number space. 52 - It calls a callback for each transmitted packet it is notified 53 of, specifying whether the packet was successfully acknowledged by the peer, [all …]
|
| /freebsd/contrib/opencsd/decoder/include/opencsd/stm/ |
| H A D | trc_pkt_types_stm.h | 42 /** @name STM Packet Types 45 /** STM protocol packet types. 46 Contains both protocol packet types and markers for unsynced processor 47 state and bad packet sequences. 53 STM_PKT_INCOMPLETE_EOT, /**< Incomplete packet flushed at end of trace. */ 54 STM_PKT_NO_ERR_TYPE, /**< No error in error packet marker. */ 57 STM_PKT_ASYNC, /**< Alignment synchronisation packet */ 58 STM_PKT_VERSION, /**< Version packet */ 59 STM_PKT_FREQ, /**< Frequency packet */ 60 STM_PKT_NULL, /**< Null packet */ [all …]
|
| /freebsd/contrib/processor-trace/libipt/internal/include/ |
| H A D | pt_packet.h | 54 /* Read the payload of an Intel PT packet. 56 * Reads the payload of the packet starting at @pos into @packet. 58 * For pt_pkt_read_psb(), the @packet parameter is omitted; the function 61 * Decoding an unknown packet uses @config's decode callback. If the callback 64 * Beware that the packet opcode is not checked. The caller is responsible 65 * for checking the opcode and calling the correct packet read function. 67 * Returns the packet size on success, a negative error code otherwise. 68 * Returns -pte_bad_packet if the packet payload is corrupt. 69 * Returns -pte_eos if the packet does not fit into the trace buffer. 70 * Returns -pte_internal if @packet, @pos, or @config is NULL. [all …]
|
| H A D | pt_encoder.h | 35 /* An Intel PT packet encoder. */ 45 /* Initialize the packet encoder. 51 /* Finalize the packet encoder. */ 57 /* Encode a Padding (pad) packet. */ 60 /* Encode a Packet Stream Boundary (psb) packet. */ 63 /* Encode an End PSB (psbend) packet. */ 66 /* Encode a Target Instruction Pointer (tip) packet. */ 70 /* Encode a Taken Not Taken (tnt) packet - 8-bit version. */ 73 /* Encode a Taken Not Taken (tnt) packet - 64-bit version. */ 76 /* Encode a Packet Generation Enable (tip.pge) packet. */ [all …]
|
| /freebsd/crypto/openssl/ssl/statem/ |
| H A D | statem_local.h | 74 int parse_ca_names(SSL_CONNECTION *s, PACKET *pkt); 92 PACKET *pkt); 107 PACKET *pkt); 120 PACKET *pkt); 121 __owur MSG_PROCESS_RETURN tls_process_finished(SSL_CONNECTION *s, PACKET *pkt); 130 PACKET *pkt); 137 PACKET *pkt, 138 PACKET *tmppkt, 146 PACKET *pkt); 148 PACKET *pkt); [all …]
|
| /freebsd/sys/ofed/drivers/infiniband/core/ |
| H A D | ib_user_mad.c | 61 MODULE_DESCRIPTION("InfiniBand userspace MAD packet access"); 166 struct ib_umad_packet *packet) in queue_packet() argument 172 for (packet->mad.hdr.id = 0; in queue_packet() 173 packet->mad.hdr.id < IB_UMAD_MAX_AGENTS; in queue_packet() 174 packet->mad.hdr.id++) in queue_packet() 175 if (agent == __get_agent(file, packet->mad.hdr.id)) { in queue_packet() 176 list_add_tail(&packet->list, &file->recv_list); in queue_packet() 188 struct ib_umad_packet *packet) in dequeue_send() argument 191 list_del(&packet->list); in dequeue_send() 199 struct ib_umad_packet *packet = send_wc->send_buf->context[0]; in send_handler() local [all …]
|