/dragonfly/contrib/ldns/ |
H A D | packet.c | 240 packet->_edns_z = packet->_edns_z | LDNS_EDNS_MASK_DO_BIT; in ldns_pkt_set_edns_do() 242 packet->_edns_z = packet->_edns_z & ~LDNS_EDNS_MASK_DO_BIT; in ldns_pkt_set_edns_do() 275 if (!packet) { in ldns_pkt_rr_list_by_name() 312 if(!packet) { in ldns_pkt_rr_list_by_type() 350 if(!packet) { in ldns_pkt_rr_list_by_name_and_type() 845 if (!packet) { in ldns_pkt_new() 874 memset(&packet->timestamp, 0, sizeof(packet->timestamp)); in ldns_pkt_new() 891 return packet; in ldns_pkt_new() 897 if (packet) { in ldns_pkt_free() 914 if (!packet) { in ldns_pkt_set_flags() [all …]
|
H A D | wire2host.c | 416 if (!packet) { in ldns_wire2pkt() 431 ldns_pkt_free(packet); in ldns_wire2pkt() 442 ldns_pkt_free(packet); in ldns_wire2pkt() 453 ldns_pkt_free(packet); in ldns_wire2pkt() 478 ldns_pkt_set_tsig(packet, rr); in ldns_wire2pkt() 479 ldns_pkt_set_arcount(packet, ldns_pkt_arcount(packet) - 1); in ldns_wire2pkt() 481 ldns_pkt_free(packet); in ldns_wire2pkt() 485 ldns_pkt_set_size(packet, max); in ldns_wire2pkt() 487 ldns_pkt_set_arcount(packet, ldns_pkt_arcount(packet) in ldns_wire2pkt() 491 *packet_p = packet; in ldns_wire2pkt() [all …]
|
H A D | host2wire.c | 337 flags = ldns_pkt_qr(packet) << 7 in ldns_hdr2buffer_wire() 339 | ldns_pkt_aa(packet) << 2 in ldns_hdr2buffer_wire() 340 | ldns_pkt_tc(packet) << 1 | ldns_pkt_rd(packet); in ldns_hdr2buffer_wire() 343 flags = ldns_pkt_ra(packet) << 7 in ldns_hdr2buffer_wire() 347 | ldns_pkt_get_rcode(packet); in ldns_hdr2buffer_wire() 355 if (ldns_pkt_tsig(packet)) { in ldns_hdr2buffer_wire() 358 if (ldns_pkt_edns(packet)) { in ldns_hdr2buffer_wire() 411 rr_list = ldns_pkt_answer(packet); in ldns_pkt2buffer_wire_compress() 434 if (ldns_pkt_edns(packet)) { in ldns_pkt2buffer_wire_compress() 454 else if (packet->_edns_data) in ldns_pkt2buffer_wire_compress() [all …]
|
/dragonfly/contrib/ldns/ldns/ |
H A D | packet.h | 673 uint16_t ldns_pkt_edns_udp_size(const ldns_pkt *packet); 685 uint8_t ldns_pkt_edns_version(const ldns_pkt *packet); 691 uint16_t ldns_pkt_edns_z(const ldns_pkt *packet); 697 ldns_rdf *ldns_pkt_edns_data(const ldns_pkt *packet); 704 bool ldns_pkt_edns_do(const ldns_pkt *packet); 710 void ldns_pkt_set_edns_do(ldns_pkt *packet, bool value); 715 uint16_t ldns_pkt_edns_unassigned(const ldns_pkt *packet); 733 bool ldns_pkt_edns(const ldns_pkt *packet); 762 void ldns_pkt_set_edns_version(ldns_pkt *packet, uint8_t v); 768 void ldns_pkt_set_edns_z(ldns_pkt *packet, uint16_t z); [all …]
|
/dragonfly/crypto/openssh/ |
H A D | PROTOCOL.chacha20poly1305 | 19 data passed to the MAC and in the addition of encryption of the packet 41 to encrypt the 4 byte packet length field. The second instance, 44 and authenticate the entire packet. 46 Two separate cipher instances are used here so as to keep the packet 47 lengths confidential but not create an oracle for the packet payload 48 cipher by decrypting and using the packet length prior to checking 60 for encryption of the packet payload. 65 When receiving a packet, the length must be decrypted first. When 4 71 Once the entire packet has been received, the MAC MUST be checked 76 packet and the packet decrypted using ChaCha20 as described above (with [all …]
|
/dragonfly/sbin/dhclient/ |
H A D | dhclient.c | 1250 memset(&client->packet, 0, sizeof(client->packet)); in make_discover() 1295 memset(&client->packet.ciaddr, 0, sizeof(client->packet.ciaddr)); in make_discover() 1296 memset(&client->packet.yiaddr, 0, sizeof(client->packet.yiaddr)); in make_discover() 1297 memset(&client->packet.siaddr, 0, sizeof(client->packet.siaddr)); in make_discover() 1298 memset(&client->packet.giaddr, 0, sizeof(client->packet.giaddr)); in make_discover() 1311 memset(&client->packet, 0, sizeof(client->packet)); in make_request() 1375 memset(&client->packet.yiaddr, 0, sizeof(client->packet.yiaddr)); in make_request() 1376 memset(&client->packet.siaddr, 0, sizeof(client->packet.siaddr)); in make_request() 1377 memset(&client->packet.giaddr, 0, sizeof(client->packet.giaddr)); in make_request() 1390 memset(&client->packet, 0, sizeof(client->packet)); in make_decline() [all …]
|
H A D | options.c | 151 unsigned char *buf = client->packet.options; in cons_options() 454 struct dhcp_packet *packet = &client->packet; in do_packet() local 461 if (packet->hlen > sizeof(packet->chaddr)) { in do_packet() 470 if ((ifi->hw_address.hlen != packet->hlen) || in do_packet() 471 (memcmp(ifi->hw_address.haddr, packet->chaddr, packet->hlen))) in do_packet() 479 &packet->options[4], sizeof(packet->options) - 4); in do_packet() 487 (unsigned char *)packet->file, in do_packet() 488 sizeof(packet->file)); in do_packet() 492 (unsigned char *)packet->sname, in do_packet() 493 sizeof(packet->sname)); in do_packet() [all …]
|
H A D | bpf.c | 275 (unsigned char *)&client->packet, in send_packet() 280 iov[1].iov_base = (char *)&client->packet; in send_packet() 406 if (hdr.bh_caplen > sizeof(client->packet)) { in receive_packet() 413 memset(&client->packet, DHO_END, sizeof(client->packet)); in receive_packet() 414 memcpy(&client->packet, ifi->rbuf + ifi->rbuf_offset, in receive_packet()
|
/dragonfly/tools/tools/netrate/netblast/ |
H A D | netblast.c | 68 blast_loop(int s, long duration, u_char *packet, u_int packet_len) in blast_loop() argument 114 be32enc(packet, counter); in blast_loop() 117 if (send(s, packet, packet_len, 0) < 0) in blast_loop() 146 char *dummy, *packet; in main() local 180 packet = malloc(payloadsize); in main() 181 if (packet == NULL) { in main() 187 bzero(packet, payloadsize); in main() 219 return (blast_loop(s, duration, packet, payloadsize)); in main()
|
/dragonfly/stand/boot/pc32/libi386/ |
H A D | bioscd.c | 264 static unsigned short packet[8]; in bc_read() local 298 packet[0] = 0x10; in bc_read() 299 packet[1] = n; in bc_read() 300 packet[2] = VTOPOFF(bounce_base); in bc_read() 301 packet[3] = VTOPSEG(bounce_base); in bc_read() 302 packet[4] = dblk & 0xffff; in bc_read() 303 packet[5] = dblk >> 16; in bc_read() 304 packet[6] = 0; in bc_read() 305 packet[7] = 0; in bc_read() 310 v86.ds = VTOPSEG(packet); in bc_read() [all …]
|
H A D | biosdisk.c | 1096 packet[0] = 0x10; in bd_read() 1097 packet[1] = x; in bd_read() 1098 packet[2] = VTOPOFF(xp); in bd_read() 1101 packet[5] = dblk >> 16; in bd_read() 1102 packet[6] = 0; in bd_read() 1103 packet[7] = 0; in bd_read() 1246 packet[0] = 0x10; in bd_write() 1247 packet[1] = x; in bd_write() 1251 packet[5] = dblk >> 16; in bd_write() 1252 packet[6] = 0; in bd_write() [all …]
|
/dragonfly/tools/tools/net80211/ |
H A D | README | 8 stumbler view nearby networks using raw packet interface 9 w00t variety of programs that use the raw packet interface 10 wesside WEP frag attack tool using raw packet interface 11 wlaninject inject 802.11 packets using the raw packet interface 16 The raw packet tools are from Andrea Bittau <a.bittau@cs.ucl.ac.uk>.
|
/dragonfly/lib/libc/resolv/ |
H A D | res_update.c | 95 u_char *packet; in res_nupdate() local 101 packet = malloc(NS_MAXMSG); in res_nupdate() 102 if (packet == NULL) { in res_nupdate() 158 packet, NS_MAXMSG); in res_nupdate() 176 n = res_nsendsigned(statp, packet, n, key, in res_nupdate() 180 n = res_nsend(statp, packet, n, answer, sizeof answer); in res_nupdate() 204 free(packet); in res_nupdate()
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | eth_p_oui.c | 165 u8 *packet, *p; in eth_p_oui_send() local 171 packet = os_zalloc(packet_len); in eth_p_oui_send() 172 if (!packet) in eth_p_oui_send() 174 p = packet; in eth_p_oui_send() 176 ethhdr = (struct l2_ethhdr *) packet; in eth_p_oui_send() 188 ret = l2_packet_send(iface->l2, NULL, 0, packet, packet_len); in eth_p_oui_send() 189 os_free(packet); in eth_p_oui_send()
|
/dragonfly/sys/dev/drm/ |
H A D | drm_mipi_dsi.c | 443 int mipi_dsi_create_packet(struct mipi_dsi_packet *packet, in mipi_dsi_create_packet() argument 446 if (!packet || !msg) in mipi_dsi_create_packet() 457 memset(packet, 0, sizeof(*packet)); in mipi_dsi_create_packet() 458 packet->header[0] = ((msg->channel & 0x3) << 6) | (msg->type & 0x3f); in mipi_dsi_create_packet() 470 packet->header[1] = (msg->tx_len >> 0) & 0xff; in mipi_dsi_create_packet() 471 packet->header[2] = (msg->tx_len >> 8) & 0xff; in mipi_dsi_create_packet() 473 packet->payload_length = msg->tx_len; in mipi_dsi_create_packet() 474 packet->payload = msg->tx_buf; in mipi_dsi_create_packet() 478 packet->header[1] = (msg->tx_len > 0) ? tx[0] : 0; in mipi_dsi_create_packet() 479 packet->header[2] = (msg->tx_len > 1) ? tx[1] : 0; in mipi_dsi_create_packet() [all …]
|
/dragonfly/crypto/libressl/ssl/ |
H A D | ssl_packet.c | 87 CBS_init(&cbs, s->internal->packet, SSL3_RT_HEADER_LENGTH); in ssl_convert_sslv2_client_hello() 122 tls1_transcript_record(s, s->internal->packet + 2, in ssl_convert_sslv2_client_hello() 128 s->internal->packet + 2, s->internal->packet_length - 2, s, in ssl_convert_sslv2_client_hello() 132 CBS_init(&cbs, s->internal->packet, s->internal->packet_length); in ssl_convert_sslv2_client_hello() 215 s->internal->packet = s->s3->rbuf.buf; in ssl_convert_sslv2_client_hello() 217 memcpy(s->internal->packet, data, data_len); in ssl_convert_sslv2_client_hello() 243 CBS_init(&header, s->internal->packet, SSL3_RT_HEADER_LENGTH); in ssl_server_legacy_first_packet()
|
/dragonfly/tools/tools/net80211/w00t/prga/ |
H A D | prga.c | 67 char packet[2048]; member 241 rc = inject(p->tx, p->packet, p->packet_len); in send_packet() 250 wh = (struct ieee80211_frame*) p->packet; in send_packet() 268 memset(p->packet, 0, sizeof(p->packet)); in send_frag() 269 wh = (struct ieee80211_frame*) p->packet; in send_frag() 517 memset(p->packet, 0, sizeof(p->packet)); in read_tap() 519 rc = sizeof(p->packet) - offset; in read_tap() 520 ptr = &p->packet[offset]; in read_tap() 527 wh = (struct ieee80211_frame*) p->packet; in read_tap()
|
/dragonfly/contrib/tcpdump/ |
H A D | README.md | 43 packet capture. Before building tcpdump, you must first retrieve and 85 we just note if the packet is a "send" or an "ack". 88 Field 1 is the packet time in decimal seconds, relative 90 from last packet. Field 3 is packet type/direction. 95 (i.e., missing packet(s)), a "#" means an odd-size (not max 96 seg size) packet. Field 4 has the packet flags 100 the delta-time from the first send of the packet to the 102 delta-time from the first send of the packet to the 125 a chunk of the sequence space -- essentially the packet 162 since the average packet size was 512 bytes). It took [all …]
|
/dragonfly/usr.sbin/ppp/ |
H A D | ip.c | 190 FilterCheck(const unsigned char *packet, u_int32_t family, in FilterCheck() argument 213 const struct ip6_hdr *pip6 = (const struct ip6_hdr *)packet; in FilterCheck() 218 payload = packet + sizeof *pip6; in FilterCheck() 231 const struct ip *pip = (const struct ip *)packet; in FilterCheck() 250 payload = packet + (pip->ip_hl << 2); in FilterCheck() 533 const unsigned char *packet, int nb, struct filter *filter, in PacketCheck() argument 559 const struct ip6_hdr *pip6 = (const struct ip6_hdr *)packet; in PacketCheck() 564 payload = packet + sizeof *pip6; in PacketCheck() 571 const struct ip *pip = (const struct ip *)packet; in PacketCheck() 576 payload = packet + (pip->ip_hl << 2); in PacketCheck() [all …]
|
/dragonfly/contrib/dhcpcd/src/ |
H A D | bpf.c | 240 struct bpf_hdr packet; in bpf_read() local 263 memcpy(&packet, payload, sizeof(packet)); in bpf_read() 264 if (bpf->bpf_pos + packet.bh_caplen + packet.bh_hdrlen > in bpf_read() 267 payload += packet.bh_hdrlen; in bpf_read() 268 if (packet.bh_caplen > len) in bpf_read() 271 bytes = (ssize_t)packet.bh_caplen; in bpf_read() 278 bpf->bpf_pos += BPF_WORDALIGN(packet.bh_hdrlen + in bpf_read() 279 packet.bh_caplen); in bpf_read()
|
/dragonfly/contrib/libpcap/ |
H A D | README.md | 17 interface for user-level packet capture. libpcap provides a portable 21 for packet capture, and since we've developed several tools that 24 system-dependent packet capture modules in each application. 34 with the OS's interface for packet capture on those platforms, such as 39 architecture in the BSD packet filter. BPF is described in the 1993 46 Although most packet capture interfaces support in-kernel filtering,
|
/dragonfly/tools/tools/net80211/w00t/redir/ |
H A D | redir.c | 86 char packet[2048]; member 239 rc = inject(p->tx, p->packet, p->packet_len); in send_packet() 248 wh = (struct ieee80211_frame*) p->packet; in send_packet() 266 memset(p->packet, 0, sizeof(p->packet)); in send_header() 267 wh = (struct ieee80211_frame *) p->packet; in send_header() 343 memset(p->packet, 0, sizeof(p->packet)); in send_data() 344 wh = (struct ieee80211_frame*) p->packet; in send_data()
|
/dragonfly/sbin/natd/ |
H A D | HISTORY | 35 packet arrives. This allows natd to start up before 48 The options which map directly to packet aliasing options are: 60 way to support new packet aliasing options. 79 when packet size exceeds mtu size of outgoing network interface. 85 - Upgrade to new packet aliasing engine (2.1) 139 use them to find out packet direction instead of
|
/dragonfly/contrib/file/magic/Magdir/ |
H A D | pgp-binary-keys | 18 # A PGP packet is described by a single byte: the so-called CTB. The 25 # Following the CTB is the packet's length in bytes. If we blindly 27 # information we come to the next packet. 44 # 0 0xC0 -- Reserved - a packet tag MUST NOT have this value 93 # 0 0x80 -- Reserved - a packet tag MUST NOT have this value 115 # 3 indeterminate length: natural end of packet, e.g., EOF 135 # Any number of marker packets are also allowed between each packet, 143 # packet versions that we need to worry about in practice: v3 and v4. 160 # The first packet has to be a public key or a secret key. 175 # Parse the length, check the packet's body and finally advance to the [all …]
|
H A D | sereal | 26 0 string/b \=srl Sereal data packet 29 0 string/b \=\xF3rl Sereal data packet 32 0 string/b \=\xC3\xB3rl Sereal data packet, UTF-8 encoded
|