/dports/security/snort3/snort3-3.1.19.0/src/flow/ |
H A D | flow_key.cc | 104 src = srcIP->get_ip4_value(); in init4() 110 COPY4(ip_l, srcIP->get_ip6_ptr()); in init4() 117 COPY4(ip_l, srcIP->get_ip6_ptr()); in init4() 135 COPY4(ip_h, srcIP->get_ip6_ptr()); in init4() 155 COPY4(ip_l, srcIP->get_ip6_ptr()); in init6() 160 else if (srcIP->fast_eq6(*dstIP)) in init6() 162 COPY4(ip_l, srcIP->get_ip6_ptr()); in init6() 180 COPY4(ip_h, srcIP->get_ip6_ptr()); in init6() 234 const SfIp *srcIP, uint16_t srcPort, in init() argument 280 const SfIp *srcIP, uint16_t srcPort, in init() argument [all …]
|
H A D | flow_key.h | 79 const snort::SfIp *srcIP, uint16_t srcPort, 86 const snort::SfIp *srcIP, const snort::SfIp *dstIP, 93 const snort::SfIp *srcIP, uint16_t srcPort, 99 const snort::SfIp *srcIP, const snort::SfIp *dstIP, 111 bool init4(IpProtocol, const snort::SfIp *srcIP, uint16_t srcPort, 114 bool init6(IpProtocol, const snort::SfIp *srcIP, uint16_t srcPort,
|
/dports/www/libwww/w3c-libwww-5.4.2/config/ |
H A D | netmon2tcpdump.pl | 16 local ($flags, $len, $seqStart, $seqEnd, $ack, $win, $srcPort, $dstPort, $srcIP, $dstIP); 19 …($flags, $len, $seqStart, $seqEnd, $ack, $win, $srcPort, $dstPort, $srcIP, $dstIP) = ($1, $2, $3, … 22 print $output "$time $srcIP.$srcPort > $dstIP.$dstPort: $flags"; 28 local ($message, $whatIsA, $a, $whatIsB, $b, $srcIP, $dstIP); 31 local ($message, $whatIsA, $a, $whatIsB, $b, $srcIP, $dstIP) = ($1, $2, $3, $4, $5, $6, $7); 32 print $output "$time $srcIP > $dstIP: ";
|
/dports/net-mgmt/blackbox_exporter/blackbox_exporter-0.17.0/prober/ |
H A D | icmp.go | 91 var srcIP net.IP 93 if srcIP = net.ParseIP(module.ICMP.SourceIPAddress); srcIP == nil { 97 level.Info(logger).Log("msg", "Using source address", "srcIP", srcIP) 111 if srcIP == nil { 112 srcIP = net.ParseIP("::") 118 icmpConn, err = icmp.ListenPacket("udp6", srcIP.String()) 127 icmpConn, err = icmp.ListenPacket("ip6:ipv6-icmp", srcIP.String()) 139 if srcIP == nil { 140 srcIP = net.ParseIP("0.0.0.0") 147 icmpConn, err = icmp.ListenPacket("udp4", srcIP.String()) [all …]
|
H A D | dns.go | 222 srcIP := net.ParseIP(module.DNS.SourceIPAddress) 223 if srcIP == nil { 227 level.Info(logger).Log("msg", "Using local address", "srcIP", srcIP) 230 client.Dialer.LocalAddr = &net.TCPAddr{IP: srcIP} 232 client.Dialer.LocalAddr = &net.UDPAddr{IP: srcIP}
|
H A D | tcp.go | 54 srcIP := net.ParseIP(module.TCP.SourceIPAddress) 55 if srcIP == nil { 59 level.Info(logger).Log("msg", "Using local address", "srcIP", srcIP) 60 dialer.LocalAddr = &net.TCPAddr{IP: srcIP}
|
/dports/security/snort/snort-2.9.18/src/file-process/ |
H A D | file_resume_block.c | 227 sfaddr_t* srcIP; in file_resume_block_add_file() local 233 srcIP = GET_SRC_IP(p); in file_resume_block_add_file() 236 sfaddr_copy_to_raw(&hashKey.sip, srcIP); in file_resume_block_add_file() 293 … DAQ_Add_Dynamic_Protocol_Channel(p, srcIP, 0, dstIP, srv_port, GET_IPH_PROTO(p), ¶ms); in file_resume_block_add_file() 295 … DAQ_Add_Dynamic_Protocol_Channel(p, dstIP, 0, srcIP, srv_port, GET_IPH_PROTO(p), ¶ms); in file_resume_block_add_file() 298 … DAQ_Add_Dynamic_Protocol_Channel(p, srcIP, 0, dstIP, p->dp, GET_IPH_PROTO(p), ¶ms); in file_resume_block_add_file() 306 … DAQ_Add_Dynamic_Protocol_Channel(p, srcIP, 0, dstIP, srv_port, GET_IPH_PROTO(p), ¶ms); in file_resume_block_add_file() 311 … DAQ_Add_Dynamic_Protocol_Channel(p, dstIP, 0, srcIP, p->sp, GET_IPH_PROTO(p), ¶ms); in file_resume_block_add_file() 495 sfaddr_t* srcIP; in file_resume_block_check() local 510 srcIP = GET_SRC_IP(p); in file_resume_block_check() [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/mdlayher/arp/ |
H A D | packet.go | 82 func NewPacket(op Operation, srcHW net.HardwareAddr, srcIP net.IP, dstHW net.HardwareAddr, dstIP ne… 96 srcIP = srcIP.To4() 97 if srcIP == nil { 115 IPLength: uint8(len(srcIP)), 118 SenderIP: srcIP,
|
/dports/net/clash/clash-1.6.0/component/process/ |
H A D | process_darwin.go | 60 var srcIP net.IP 64 srcIP = net.IP(buf[inp+76 : inp+80]) 67 srcIP = net.IP(buf[inp+64 : inp+80]) 72 if !ip.Equal(srcIP) {
|
H A D | process_freebsd_amd64.go | 134 var srcIP net.IP 138 srcIP = net.IP(buf[inp+s.ip : inp+s.ip+4]) 141 srcIP = net.IP(buf[inp+s.ip-12 : inp+s.ip+4]) 146 if !ip.Equal(srcIP) {
|
H A D | process.go | 19 func FindProcessName(network string, srcIP net.IP, srcPort int) (string, error) { 20 return findProcessName(network, srcIP, srcPort)
|
/dports/net/ooni-probe-cli/probe-cli-3.10.1/vendor/github.com/ooni/psiphon/oopsi/github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/packetman/ |
H A D | packetman_linux.go | 351 if len(srcIP) == net.IPv4len { 354 copy(connID[offset:], srcIP) 355 offset += len(srcIP) 357 copy(connID[offset:], srcIP) 358 offset += len(srcIP) 428 srcIP, dstIP, _, _ := m.getPacketAddressInfo(interceptedPacket) 433 srcIP, 625 var srcIP, dstIP net.IP 632 srcIP = interceptedIPv4.SrcIP 640 srcIP = interceptedIPv6.SrcIP [all …]
|
/dports/net/ooni-mini/probe-engine-0.23.0/vendor/github.com/ooni/psiphon/oopsi/github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/packetman/ |
H A D | packetman_linux.go | 351 if len(srcIP) == net.IPv4len { 354 copy(connID[offset:], srcIP) 355 offset += len(srcIP) 357 copy(connID[offset:], srcIP) 358 offset += len(srcIP) 428 srcIP, dstIP, _, _ := m.getPacketAddressInfo(interceptedPacket) 433 srcIP, 625 var srcIP, dstIP net.IP 632 srcIP = interceptedIPv4.SrcIP 640 srcIP = interceptedIPv6.SrcIP [all …]
|
/dports/net/file2pcap/file2pcap-1.29/ |
H A D | file2pcap.c | 176 *((unsigned long *) ((unsigned char *) minimalip + 0)) = ho->srcIP; in craftIpv4() 196 iphdr->ip_src.s_addr = ho->srcIP; in craftIpv4() 202 iphdr->ip_dst.s_addr = ho->srcIP; in craftIpv4() 678 hoFtp.srcIP = ho->srcIP; in ftp() 692 hoFtp.srcIP = ho->dstIP; in ftp() 693 hoFtp.dstIP = ho->srcIP; in ftp() 881 char *srcIP=NULL, *dstIP=NULL; in main() local 916 ho.srcIP = inet_addr(SRC_IP4); in main() 1087 if(srcIP != NULL) in main() 1089 ho.srcIP = inet_addr(srcIP); in main() [all …]
|
/dports/www/ufdbguard/ufdbGuard-1.35.3/src/ |
H A D | engine.c | 150 found = UFDBmemDBfind( s->ipv4hosts, si->srcIP, &dummy ); in matchSourceAND() 157 si->worker, si->srcIP, s->name ); in matchSourceAND() 224 found = UFDBmemDBfind( s->ipv6hosts, si->srcIP, &dummy ); in matchSourceAND() 231 si->worker, si->srcIP, s->name ); in matchSourceAND() 406 if (UFDBmemDBfind( s->ipv4hosts, si->srcIP, &dummy )) in matchSourceOR() 414 si->worker, si->srcIP, s->name ); in matchSourceOR() 463 si->worker, si->srcIP, s->name ); in matchSourceOR() 478 if (UFDBmemDBfind( s->ipv6hosts, si->srcIP, &dummy )) in matchSourceOR() 486 si->worker, si->srcIP, s->name ); in matchSourceOR() 690 si->srcIP, in UFDBfindSource() [all …]
|
H A D | ufdbguard.c | 291 squidInfo.ident, squidInfo.srcIP, acl->name, category, in ufdbguard_main() 321 squidInfo.ident, squidInfo.srcIP, acl->name, category, in ufdbguard_main() 344 ufdbLogMessage( "REDIRECT %s %s/%s %s %s %s\n", redirect, squidInfo.srcIP, in ufdbguard_main() 370 printf( "%s %s/%s %s %s%s\n", redirect, squidInfo.srcIP, in ufdbguard_main() 376 squidInfo.ident, squidInfo.srcIP, acl->name, category, in ufdbguard_main()
|
H A D | sgDiv.c | 55 ufdbLogMessage( " src = %s", s->srcIP ); 263 s->url[0] = s->domain[0] = s->orig_domain[0] = s->srcIP[0] = s->ident[0] = s->ident[1] = in parseLine() 793 if ((o-p) > (ssize_t) sizeof(s->srcIP)-1) in parseLine() 795 strncpy( s->srcIP, p, sizeof(s->srcIP)-1 ); in parseLine() 796 s->srcIP[sizeof(s->srcIP)-1] = '\0'; in parseLine() 800 memcpy( s->srcIP, p, o-p ); in parseLine() 801 s->srcIP[o-p] = '\0'; in parseLine() 807 if (inet_pton( AF_INET6, s->srcIP, (void *) &s->source_ipv6 ) > 0) in parseLine() 809 else if (sgConvDot( s->srcIP, &s->source_ipv4 ) != NULL) in parseLine() 814 strcpy( s->srcIP, p ); in parseLine() [all …]
|
/dports/www/carbonapi/carbonapi-0.14.1/cmd/carbonapi/http/ |
H A D | lbcheck_handler.go | 18 srcIP, srcPort := splitRemoteAddr(r.RemoteAddr) 23 PeerIP: srcIP,
|
H A D | version_handler.go | 23 srcIP, srcPort := splitRemoteAddr(r.RemoteAddr) 27 PeerIP: srcIP,
|
/dports/security/snort3/snort3-3.1.19.0/src/stream/ |
H A D | stream.cc | 91 const SfIp* srcIP, uint16_t srcPort, in get_flow() argument 99 key.init(sc, type, proto, srcIP, srcPort, dstIP, dstPort, vlan, mplsId, in get_flow() 106 const SfIp* srcIP, uint16_t srcPort, in get_flow() argument 113 key.init(sc, type, proto, srcIP, srcPort, dstIP, dstPort, vlan, mplsId, in get_flow() 156 const SfIp* srcIP, uint16_t srcPort, in get_flow_data() argument 163 type, proto, srcIP, srcPort, dstIP, dstPort, in get_flow_data() 175 const SfIp* srcIP, uint16_t srcPort, in get_flow_data() argument 181 type, proto, srcIP, srcPort, dstIP, dstPort, in get_flow_data() 239 const SfIp* srcIP, uint16_t srcPort, in ignore_flow() argument 246 ctrlPkt, type, ip_proto, srcIP, srcPort, dstIP, dstPort, direction, fd); in ignore_flow() [all …]
|
/dports/security/snort/snort-2.9.18/src/preprocessors/Session/ |
H A D | session_expect.c | 594 sfaddr_t* srcIP; in StreamExpectIsExpected() local 611 srcIP = GET_SRC_IP(p); in StreamExpectIsExpected() 619 sfip_ntop(srcIP, src_ip, sizeof(src_ip)); in StreamExpectIsExpected() 631 rval = sfip_compare(dstIP, srcIP); in StreamExpectIsExpected() 635 sfaddr_copy_to_raw(&hashKey.ip2, srcIP); in StreamExpectIsExpected() 648 sfaddr_copy_to_raw(&hashKey.ip1, srcIP); in StreamExpectIsExpected() 773 sfaddr_t* srcIP; in StreamExpectProcessNode() local 778 srcIP = GET_SRC_IP(p); in StreamExpectProcessNode() 780 sfip_ntop(srcIP, src_ip, sizeof(src_ip)); in StreamExpectProcessNode()
|
/dports/security/snowflake-tor/snowflake-ead5a960d7fa19dc890ccbfc0765c5ab6629eaa9/vendor/github.com/pion/transport/vnet/ |
H A D | net_test.go | 228 srcIP := nw.v.determineSourceIP(anyIP, dstIP) 229 log.Debugf("anyIP: %s => %s", anyIP.String(), srcIP.String()) 230 assert.NotNil(t, srcIP, "shouldn't be nil") 231 assert.Equal(t, srcIP.String(), demoIP, "use non-loopback IP") 236 srcIP = nw.v.determineSourceIP(anyIP, dstIP) 237 log.Debugf("anyIP: %s => %s", anyIP.String(), srcIP.String()) 238 assert.NotNil(t, srcIP, "shouldn't be nil") 244 srcIP = nw.v.determineSourceIP(anyIP, dstIP) 245 log.Debugf("anyIP: %s => %s", anyIP.String(), srcIP.String()) 246 assert.NotNil(t, srcIP, "shouldn't be nil") [all …]
|
/dports/devel/mutagen/mutagen-0.11.8/vendor/github.com/pion/transport/vnet/ |
H A D | net_test.go | 228 srcIP := nw.v.determineSourceIP(anyIP, dstIP) 229 log.Debugf("anyIP: %s => %s", anyIP.String(), srcIP.String()) 230 assert.NotNil(t, srcIP, "shouldn't be nil") 236 srcIP = nw.v.determineSourceIP(anyIP, dstIP) 237 log.Debugf("anyIP: %s => %s", anyIP.String(), srcIP.String()) 238 assert.NotNil(t, srcIP, "shouldn't be nil") 239 assert.Equal(t, srcIP.String(), "127.0.0.1", "use loopback IP") 244 srcIP = nw.v.determineSourceIP(anyIP, dstIP) 245 log.Debugf("anyIP: %s => %s", anyIP.String(), srcIP.String()) 246 assert.NotNil(t, srcIP, "shouldn't be nil") [all …]
|
/dports/games/openbor3482/openbor-2c1ecd7/engine/psp/ |
H A D | netcomm.c | 39 int addPSP(char *name, char *srcMac, char *srcWan, char *srcIP, int srcPort, char *dstMac, char *ds… in addPSP() argument 58 strncpy(pspList[pspTotal].srcIP, srcIP, 12); in addPSP()
|
/dports/games/openbor3979/openbor-2bcf25b/engine/psp/ |
H A D | netcomm.c | 39 int addPSP(char *name, char *srcMac, char *srcWan, char *srcIP, int srcPort, char *dstMac, char *ds… in addPSP() argument 58 strncpy(pspList[pspTotal].srcIP, srcIP, 12); in addPSP()
|