/dports/net/hostapd-devel/hostap-14ab4a816/wpa_supplicant/utils/ |
H A D | log2pcap.py | 12 def write_pcap_header(pcap_file): argument 13 pcap_file.write( 19 def pcap_addpacket(pcap_file, ts, data): argument 21 pcap_file.write(struct.pack('<IIII', 24 pcap_file.write(data) 35 pcap_file = open(pcap, 'w') variable 38 write_pcap_header(pcap_file) 51 pcap_addpacket(pcap_file, ts, data) 54 pcap_file.close()
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/utils/ |
H A D | log2pcap.py | 12 def write_pcap_header(pcap_file): argument 13 pcap_file.write( 19 def pcap_addpacket(pcap_file, ts, data): argument 21 pcap_file.write(struct.pack('<IIII', 24 pcap_file.write(data) 35 pcap_file = open(pcap, 'w') variable 38 write_pcap_header(pcap_file) 51 pcap_addpacket(pcap_file, ts, data) 54 pcap_file.close()
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/wpa_supplicant/utils/ |
H A D | log2pcap.py | 12 def write_pcap_header(pcap_file): argument 13 pcap_file.write( 19 def pcap_addpacket(pcap_file, ts, data): argument 21 pcap_file.write(struct.pack('<IIII', 24 pcap_file.write(data) 35 pcap_file = open(pcap, 'w') variable 38 write_pcap_header(pcap_file) 51 pcap_addpacket(pcap_file, ts, data) 54 pcap_file.close()
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/wpa_supplicant/utils/ |
H A D | log2pcap.py | 12 def write_pcap_header(pcap_file): argument 13 pcap_file.write( 19 def pcap_addpacket(pcap_file, ts, data): argument 21 pcap_file.write(struct.pack('<IIII', 24 pcap_file.write(data) 35 pcap_file = open(pcap, 'w') variable 38 write_pcap_header(pcap_file) 51 pcap_addpacket(pcap_file, ts, data) 54 pcap_file.close()
|
/dports/net/ndpi/nDPI-92a1be2/fuzz/ |
H A D | fuzz_ndpi_reader.c | 119 FILE * pcap_file; in main() local 130 pcap_file = fopen(argv[1], "r"); in main() 131 if (pcap_file == NULL) { in main() 136 if (fseek(pcap_file, 0, SEEK_END) != 0) { in main() 138 fclose(pcap_file); in main() 142 pcap_file_size = ftell(pcap_file); in main() 145 fclose(pcap_file); in main() 151 fclose(pcap_file); in main() 158 fclose(pcap_file); in main() 164 fclose(pcap_file); in main() [all …]
|
/dports/security/yersinia/yersinia-8c0d7c5/src/ |
H A D | interfaces.c | 1243 … node->protocol[proto].pcap_file.pdumper = pcap_dump_open(node->protocol[proto].pcap_file.pd, in interfaces_pcap_file_open() 1260 if (node->pcap_file.name == NULL) in interfaces_pcap_file_open() 1270 if (node->pcap_file.name == NULL) in interfaces_pcap_file_open() 1279 node->pcap_file.pdumper = pcap_dump_open(node->pcap_file.pd, in interfaces_pcap_file_open() 1283 if (node->pcap_file.pdumper == NULL) in interfaces_pcap_file_open() 1286 node->pcap_file.pd = NULL; in interfaces_pcap_file_open() 1287 free(node->pcap_file.name); in interfaces_pcap_file_open() 1314 node->pcap_file.pdumper = NULL; in interfaces_pcap_file_close() 1315 node->pcap_file.pd = NULL; in interfaces_pcap_file_close() 1316 free(node->pcap_file.name); in interfaces_pcap_file_close() [all …]
|
H A D | terminal-defs.h | 243 struct pcap_file { struct 258 struct pcap_file pcap_file; /* Pcap file per protocol */ argument 349 struct pcap_file pcap_file; /* Pcap file for ALL protocols */ member
|
/dports/net-mgmt/fastnetmon/fastnetmon-1.1.4/src/tests/snabb/ |
H A D | capturetodisk.cpp | 49 int pcap_file = 0; variable 68 close(pcap_file); in firehose_stop() 166 …unsigned int packet_header_written_bytes = write(pcap_file, &pcap_packet_header, sizeof(pcap_packe… in write_packet_to_file() 172 unsigned int packet_written_bytes = write(pcap_file, packet->buffer, packet->length); in write_packet_to_file() 208 pcap_file = open("/mnt/traffic_capture.pcap", O_TRUNC|O_WRONLY|O_CREAT); in firehose_start() 210 if (pcap_file < 0) { in firehose_start() 216 int fallocate_result = posix_fallocate(pcap_file, 0, preallocate_packet_dump_file_size); in firehose_start() 234 unsigned int written_bytes = write(pcap_file, &pcap_header, sizeof(pcap_header)); in firehose_start()
|
/dports/net/tcpslice/tcpslice-f73194c/ |
H A D | search.c | 322 if ( fseek64( pcap_file (p), (int64_t) 0, SEEK_END ) < 0 ) in sf_find_end() 325 len_file = ftell64( pcap_file (p) ); in sf_find_end() 350 if ( fread( (char *) bufpos, num_bytes, 1, pcap_file( p ) ) != 1 ) in sf_find_end() 468 pos = ftell64( pcap_file( p ) ); in read_up_to() 472 if ( feof( pcap_file( p ) ) ) in read_up_to() 475 clearerr( pcap_file( p ) ); in read_up_to() 491 if ( fseek64( pcap_file( p ), pos, SEEK_SET ) < 0 ) in read_up_to() 546 int64_t present_pos = ftell64( pcap_file( p ) ); in sf_find_packet() 564 if ( fseek64( pcap_file( p ), desired_pos, SEEK_SET ) < 0 ) in sf_find_packet() 568 fread( (char *) buf, 1, num_bytes, pcap_file( p ) ); in sf_find_packet() [all …]
|
/dports/net/ndpi/nDPI-92a1be2/wireshark/tshark/ |
H A D | count_tcp_example.lua | 9 local pcap_file = "../../tests/pcap/tor.pcap" 11 local t = tshark:open(pcap_file, "tcp") 14 io.write("Unable to read pcap file "..pcap_file.."\n") 33 io.write("\nFound "..num_tcp.." TCP packets on pcap "..pcap_file.."\n")
|
/dports/net/samba412/samba-4.12.15/source3/printing/ |
H A D | print_standard.c | 65 FILE *pcap_file; in ippFirstAttribute() 70 if ((pcap_file = fopen(pcap_name, "r")) == NULL) { in ippFirstAttribute() 77 pcap_file)) != NULL) { in ippFirstAttribute() 135 fclose(pcap_file); in ippFirstAttribute() 153 fclose(pcap_file); in ippFirstAttribute()
|
/dports/security/libssh/libssh-0.9.6/tests/server/test_server/ |
H A D | main.c | 57 char *pcap_file; 83 SAFE_FREE(arguments->pcap_file); 168 state->pcap_file? state->pcap_file: "NULL"); 286 if (arguments->pcap_file) { 287 state->pcap_file = arguments->pcap_file; 288 arguments->pcap_file = NULL; 291 state->pcap_file = strdup(SSHD_DEFAULT_PCAP_FILE); 292 if (state->pcap_file == NULL) { 298 state->pcap_file = NULL; 496 arguments->pcap_file = strdup(arg); [all …]
|
/dports/net-mgmt/pads/pads-1.2/src/ |
H A D | pads.c | 210 if (gc.pcap_file) { in main_pads() 212 log_message("Reading from file %s\n", bdata(gc.pcap_file)); in main_pads() 213 if (!(gc.handle = pcap_open_offline(bdata(gc.pcap_file), errbuf))) { in main_pads() 214 err_message("Unable to open %s. (%s)", bdata(gc.pcap_file), errbuf); in main_pads() 345 if (gc.pcap_file != NULL) in end_pads() 346 bdestroy(gc.pcap_file); in end_pads() 407 gc.pcap_file = blk2bstr(optarg, strlen(optarg)); in process_cmdline()
|
/dports/net/samba412/samba-4.12.15/testprogs/blackbox/ |
H A D | test_client_etypes.sh | 48 pcap_file=$BASEDIR/$WORKDIR/test.pcap 50 export SOCKET_WRAPPER_PCAP_FILE=$pcap_file 64 if ! tshark -r $pcap_file -nVY "kerberos" > /dev/null 2>&1 ; then 72 actual_types="`tshark -r $pcap_file -nVY "kerberos" | \
|
/dports/net/p5-Net-Nmsg/Net-Nmsg-0.17/t/ |
H A D | nmsgtest.pm | 47 $paths{pcap_file} = "$tdir/test.pcap"; 72 sub pcap_files { $paths{pcap_file} } 76 sub not_pcap_files { grep { $_ ne $paths{pcap_file} } values %paths }
|
/dports/devel/socket_wrapper/socket_wrapper-1.1.9/tests/ |
H A D | torture.c | 125 s->pcap_file = malloc(len); in torture_setup_socket_dir() 126 assert_non_null(s->pcap_file); in torture_setup_socket_dir() 128 snprintf(s->pcap_file, len, "%s/%s", p, TORTURE_PCAP_FILE); in torture_setup_socket_dir() 140 setenv("SOCKET_WRAPPER_PCAP_FILE", s->pcap_file, 1); in torture_setup_socket_dir() 250 free(s->pcap_file); in torture_teardown_socket_dir()
|
/dports/devel/resolv_wrapper/resolv_wrapper-1.1.5/tests/ |
H A D | torture.c | 127 s->pcap_file = malloc(len); in torture_setup_socket_dir() 128 assert_non_null(s->pcap_file); in torture_setup_socket_dir() 130 snprintf(s->pcap_file, len, "%s/%s", p, TORTURE_PCAP_FILE); in torture_setup_socket_dir() 142 setenv("SOCKET_WRAPPER_PCAP_FILE", s->pcap_file, 1); in torture_setup_socket_dir() 270 free(s->pcap_file); in torture_teardown_socket_dir()
|
/dports/net/hexinject/hexinject/ |
H A D | argparser.h | 22 char *pcap_file; // pcap file member 115 options.pcap_file = optarg; in parseopt() 167 if ( options.pcap_file && !options.sniff ) { in parseopt()
|
H A D | hexinject.c | 167 if(!options.pcap_file) { in main() 230 if((fp = pcap_open_offline(options.pcap_file, errbuf)) == NULL) { in main() 264 ret_val = sniff_hexstr_loop(fp, options.pcap_file ? 1 : 0); in main() 269 ret_val = sniff_raw_loop(fp, options.pcap_file ? 1 : 0); in main()
|
/dports/net/samba412/samba-4.12.15/selftest/ |
H A D | selftest.pl | 117 my $pcap_file = "$ENV{SOCKET_WRAPPER_PCAP_DIR}/$fname.pcap"; 119 SocketWrapper::setup_pcap($pcap_file); 121 return $pcap_file; 126 my ($pcap_file, $exitcode) = @_; 131 return unless defined($pcap_file); 133 unlink($pcap_file); 150 my $pcap_file = setup_pcap($name); 188 cleanup_pcap($pcap_file, $exitcode); 190 if (not $opt_socket_wrapper_keep_pcap and defined($pcap_file)) { 191 print "PCAP FILE: $pcap_file\n";
|
/dports/security/john/john-1.9.0-jumbo-1/src/ |
H A D | SIPdump.c | 140 char *dev = NULL, *pcap_file = NULL, *filter = DEFAULT_PCAP_FILTER; in main_dummy() local 169 pcap_file = (char *) Calloc(strlen(optarg) + 1); in main_dummy() 170 strcpy(pcap_file, optarg); in main_dummy() 178 if (pcap_file != NULL && dev != NULL) in main_dummy() 189 free(pcap_file); in main_dummy() 204 if (pcap_file != NULL) { in main_dummy() 206 printf("* Using pcap file '%s' for sniffing\n", pcap_file); in main_dummy() 208 handle = pcap_open_offline(pcap_file, errbuf); in main_dummy() 211 pcap_file ? pcap_file : dev, errbuf); in main_dummy() 302 free(pcap_file); in main_dummy()
|
/dports/net/wireshark/wireshark-3.6.1/test/suite_dissectors/ |
H A D | dissectorstest.py | 65 pcap_file = self.test_case.filename_from_id('pcap') 76 text_file, pcap_file 82 '-r', pcap_file,
|
/dports/net/wireshark-lite/wireshark-3.6.1/test/suite_dissectors/ |
H A D | dissectorstest.py | 65 pcap_file = self.test_case.filename_from_id('pcap') 76 text_file, pcap_file 82 '-r', pcap_file,
|
/dports/net/tshark-lite/wireshark-3.6.1/test/suite_dissectors/ |
H A D | dissectorstest.py | 65 pcap_file = self.test_case.filename_from_id('pcap') 76 text_file, pcap_file 82 '-r', pcap_file,
|
/dports/net/tshark/wireshark-3.6.1/test/suite_dissectors/ |
H A D | dissectorstest.py | 65 pcap_file = self.test_case.filename_from_id('pcap') 76 text_file, pcap_file 82 '-r', pcap_file,
|