Home
last modified time | relevance | path

Searched refs:packet (Results 1 – 25 of 124) sorted by relevance

12345

/dragonfly/contrib/ldns/
H A Dpacket.c240 packet->_edns_z = packet->_edns_z | LDNS_EDNS_MASK_DO_BIT; in ldns_pkt_set_edns_do()
242 packet->_edns_z = packet->_edns_z & ~LDNS_EDNS_MASK_DO_BIT; in ldns_pkt_set_edns_do()
275 if (!packet) { in ldns_pkt_rr_list_by_name()
312 if(!packet) { in ldns_pkt_rr_list_by_type()
350 if(!packet) { in ldns_pkt_rr_list_by_name_and_type()
845 if (!packet) { in ldns_pkt_new()
874 memset(&packet->timestamp, 0, sizeof(packet->timestamp)); in ldns_pkt_new()
891 return packet; in ldns_pkt_new()
897 if (packet) { in ldns_pkt_free()
914 if (!packet) { in ldns_pkt_set_flags()
[all …]
H A Dwire2host.c416 if (!packet) { in ldns_wire2pkt()
431 ldns_pkt_free(packet); in ldns_wire2pkt()
442 ldns_pkt_free(packet); in ldns_wire2pkt()
453 ldns_pkt_free(packet); in ldns_wire2pkt()
478 ldns_pkt_set_tsig(packet, rr); in ldns_wire2pkt()
479 ldns_pkt_set_arcount(packet, ldns_pkt_arcount(packet) - 1); in ldns_wire2pkt()
481 ldns_pkt_free(packet); in ldns_wire2pkt()
485 ldns_pkt_set_size(packet, max); in ldns_wire2pkt()
487 ldns_pkt_set_arcount(packet, ldns_pkt_arcount(packet) in ldns_wire2pkt()
491 *packet_p = packet; in ldns_wire2pkt()
[all …]
H A Dhost2wire.c337 flags = ldns_pkt_qr(packet) << 7 in ldns_hdr2buffer_wire()
339 | ldns_pkt_aa(packet) << 2 in ldns_hdr2buffer_wire()
340 | ldns_pkt_tc(packet) << 1 | ldns_pkt_rd(packet); in ldns_hdr2buffer_wire()
343 flags = ldns_pkt_ra(packet) << 7 in ldns_hdr2buffer_wire()
347 | ldns_pkt_get_rcode(packet); in ldns_hdr2buffer_wire()
355 if (ldns_pkt_tsig(packet)) { in ldns_hdr2buffer_wire()
358 if (ldns_pkt_edns(packet)) { in ldns_hdr2buffer_wire()
411 rr_list = ldns_pkt_answer(packet); in ldns_pkt2buffer_wire_compress()
434 if (ldns_pkt_edns(packet)) { in ldns_pkt2buffer_wire_compress()
454 else if (packet->_edns_data) in ldns_pkt2buffer_wire_compress()
[all …]
/dragonfly/contrib/ldns/ldns/
H A Dpacket.h673 uint16_t ldns_pkt_edns_udp_size(const ldns_pkt *packet);
685 uint8_t ldns_pkt_edns_version(const ldns_pkt *packet);
691 uint16_t ldns_pkt_edns_z(const ldns_pkt *packet);
697 ldns_rdf *ldns_pkt_edns_data(const ldns_pkt *packet);
704 bool ldns_pkt_edns_do(const ldns_pkt *packet);
710 void ldns_pkt_set_edns_do(ldns_pkt *packet, bool value);
715 uint16_t ldns_pkt_edns_unassigned(const ldns_pkt *packet);
733 bool ldns_pkt_edns(const ldns_pkt *packet);
762 void ldns_pkt_set_edns_version(ldns_pkt *packet, uint8_t v);
768 void ldns_pkt_set_edns_z(ldns_pkt *packet, uint16_t z);
[all …]
/dragonfly/crypto/openssh/
H A DPROTOCOL.chacha20poly130519 data passed to the MAC and in the addition of encryption of the packet
41 to encrypt the 4 byte packet length field. The second instance,
44 and authenticate the entire packet.
46 Two separate cipher instances are used here so as to keep the packet
47 lengths confidential but not create an oracle for the packet payload
48 cipher by decrypting and using the packet length prior to checking
60 for encryption of the packet payload.
65 When receiving a packet, the length must be decrypted first. When 4
71 Once the entire packet has been received, the MAC MUST be checked
76 packet and the packet decrypted using ChaCha20 as described above (with
[all …]
/dragonfly/sbin/dhclient/
H A Ddhclient.c1250 memset(&client->packet, 0, sizeof(client->packet)); in make_discover()
1295 memset(&client->packet.ciaddr, 0, sizeof(client->packet.ciaddr)); in make_discover()
1296 memset(&client->packet.yiaddr, 0, sizeof(client->packet.yiaddr)); in make_discover()
1297 memset(&client->packet.siaddr, 0, sizeof(client->packet.siaddr)); in make_discover()
1298 memset(&client->packet.giaddr, 0, sizeof(client->packet.giaddr)); in make_discover()
1311 memset(&client->packet, 0, sizeof(client->packet)); in make_request()
1375 memset(&client->packet.yiaddr, 0, sizeof(client->packet.yiaddr)); in make_request()
1376 memset(&client->packet.siaddr, 0, sizeof(client->packet.siaddr)); in make_request()
1377 memset(&client->packet.giaddr, 0, sizeof(client->packet.giaddr)); in make_request()
1390 memset(&client->packet, 0, sizeof(client->packet)); in make_decline()
[all …]
H A Doptions.c151 unsigned char *buf = client->packet.options; in cons_options()
454 struct dhcp_packet *packet = &client->packet; in do_packet() local
461 if (packet->hlen > sizeof(packet->chaddr)) { in do_packet()
470 if ((ifi->hw_address.hlen != packet->hlen) || in do_packet()
471 (memcmp(ifi->hw_address.haddr, packet->chaddr, packet->hlen))) in do_packet()
479 &packet->options[4], sizeof(packet->options) - 4); in do_packet()
487 (unsigned char *)packet->file, in do_packet()
488 sizeof(packet->file)); in do_packet()
492 (unsigned char *)packet->sname, in do_packet()
493 sizeof(packet->sname)); in do_packet()
[all …]
H A Dbpf.c275 (unsigned char *)&client->packet, in send_packet()
280 iov[1].iov_base = (char *)&client->packet; in send_packet()
406 if (hdr.bh_caplen > sizeof(client->packet)) { in receive_packet()
413 memset(&client->packet, DHO_END, sizeof(client->packet)); in receive_packet()
414 memcpy(&client->packet, ifi->rbuf + ifi->rbuf_offset, in receive_packet()
/dragonfly/tools/tools/netrate/netblast/
H A Dnetblast.c68 blast_loop(int s, long duration, u_char *packet, u_int packet_len) in blast_loop() argument
114 be32enc(packet, counter); in blast_loop()
117 if (send(s, packet, packet_len, 0) < 0) in blast_loop()
146 char *dummy, *packet; in main() local
180 packet = malloc(payloadsize); in main()
181 if (packet == NULL) { in main()
187 bzero(packet, payloadsize); in main()
219 return (blast_loop(s, duration, packet, payloadsize)); in main()
/dragonfly/stand/boot/pc32/libi386/
H A Dbioscd.c264 static unsigned short packet[8]; in bc_read() local
298 packet[0] = 0x10; in bc_read()
299 packet[1] = n; in bc_read()
300 packet[2] = VTOPOFF(bounce_base); in bc_read()
301 packet[3] = VTOPSEG(bounce_base); in bc_read()
302 packet[4] = dblk & 0xffff; in bc_read()
303 packet[5] = dblk >> 16; in bc_read()
304 packet[6] = 0; in bc_read()
305 packet[7] = 0; in bc_read()
310 v86.ds = VTOPSEG(packet); in bc_read()
[all …]
H A Dbiosdisk.c1096 packet[0] = 0x10; in bd_read()
1097 packet[1] = x; in bd_read()
1098 packet[2] = VTOPOFF(xp); in bd_read()
1101 packet[5] = dblk >> 16; in bd_read()
1102 packet[6] = 0; in bd_read()
1103 packet[7] = 0; in bd_read()
1246 packet[0] = 0x10; in bd_write()
1247 packet[1] = x; in bd_write()
1251 packet[5] = dblk >> 16; in bd_write()
1252 packet[6] = 0; in bd_write()
[all …]
/dragonfly/tools/tools/net80211/
H A DREADME8 stumbler view nearby networks using raw packet interface
9 w00t variety of programs that use the raw packet interface
10 wesside WEP frag attack tool using raw packet interface
11 wlaninject inject 802.11 packets using the raw packet interface
16 The raw packet tools are from Andrea Bittau <a.bittau@cs.ucl.ac.uk>.
/dragonfly/lib/libc/resolv/
H A Dres_update.c95 u_char *packet; in res_nupdate() local
101 packet = malloc(NS_MAXMSG); in res_nupdate()
102 if (packet == NULL) { in res_nupdate()
158 packet, NS_MAXMSG); in res_nupdate()
176 n = res_nsendsigned(statp, packet, n, key, in res_nupdate()
180 n = res_nsend(statp, packet, n, answer, sizeof answer); in res_nupdate()
204 free(packet); in res_nupdate()
/dragonfly/contrib/wpa_supplicant/src/ap/
H A Deth_p_oui.c165 u8 *packet, *p; in eth_p_oui_send() local
171 packet = os_zalloc(packet_len); in eth_p_oui_send()
172 if (!packet) in eth_p_oui_send()
174 p = packet; in eth_p_oui_send()
176 ethhdr = (struct l2_ethhdr *) packet; in eth_p_oui_send()
188 ret = l2_packet_send(iface->l2, NULL, 0, packet, packet_len); in eth_p_oui_send()
189 os_free(packet); in eth_p_oui_send()
/dragonfly/sys/dev/drm/
H A Ddrm_mipi_dsi.c443 int mipi_dsi_create_packet(struct mipi_dsi_packet *packet, in mipi_dsi_create_packet() argument
446 if (!packet || !msg) in mipi_dsi_create_packet()
457 memset(packet, 0, sizeof(*packet)); in mipi_dsi_create_packet()
458 packet->header[0] = ((msg->channel & 0x3) << 6) | (msg->type & 0x3f); in mipi_dsi_create_packet()
470 packet->header[1] = (msg->tx_len >> 0) & 0xff; in mipi_dsi_create_packet()
471 packet->header[2] = (msg->tx_len >> 8) & 0xff; in mipi_dsi_create_packet()
473 packet->payload_length = msg->tx_len; in mipi_dsi_create_packet()
474 packet->payload = msg->tx_buf; in mipi_dsi_create_packet()
478 packet->header[1] = (msg->tx_len > 0) ? tx[0] : 0; in mipi_dsi_create_packet()
479 packet->header[2] = (msg->tx_len > 1) ? tx[1] : 0; in mipi_dsi_create_packet()
[all …]
/dragonfly/crypto/libressl/ssl/
H A Dssl_packet.c87 CBS_init(&cbs, s->internal->packet, SSL3_RT_HEADER_LENGTH); in ssl_convert_sslv2_client_hello()
122 tls1_transcript_record(s, s->internal->packet + 2, in ssl_convert_sslv2_client_hello()
128 s->internal->packet + 2, s->internal->packet_length - 2, s, in ssl_convert_sslv2_client_hello()
132 CBS_init(&cbs, s->internal->packet, s->internal->packet_length); in ssl_convert_sslv2_client_hello()
215 s->internal->packet = s->s3->rbuf.buf; in ssl_convert_sslv2_client_hello()
217 memcpy(s->internal->packet, data, data_len); in ssl_convert_sslv2_client_hello()
243 CBS_init(&header, s->internal->packet, SSL3_RT_HEADER_LENGTH); in ssl_server_legacy_first_packet()
/dragonfly/tools/tools/net80211/w00t/prga/
H A Dprga.c67 char packet[2048]; member
241 rc = inject(p->tx, p->packet, p->packet_len); in send_packet()
250 wh = (struct ieee80211_frame*) p->packet; in send_packet()
268 memset(p->packet, 0, sizeof(p->packet)); in send_frag()
269 wh = (struct ieee80211_frame*) p->packet; in send_frag()
517 memset(p->packet, 0, sizeof(p->packet)); in read_tap()
519 rc = sizeof(p->packet) - offset; in read_tap()
520 ptr = &p->packet[offset]; in read_tap()
527 wh = (struct ieee80211_frame*) p->packet; in read_tap()
/dragonfly/contrib/tcpdump/
H A DREADME.md43 packet capture. Before building tcpdump, you must first retrieve and
85 we just note if the packet is a "send" or an "ack".
88 Field 1 is the packet time in decimal seconds, relative
90 from last packet. Field 3 is packet type/direction.
95 (i.e., missing packet(s)), a "#" means an odd-size (not max
96 seg size) packet. Field 4 has the packet flags
100 the delta-time from the first send of the packet to the
102 delta-time from the first send of the packet to the
125 a chunk of the sequence space -- essentially the packet
162 since the average packet size was 512 bytes). It took
[all …]
/dragonfly/usr.sbin/ppp/
H A Dip.c190 FilterCheck(const unsigned char *packet, u_int32_t family, in FilterCheck() argument
213 const struct ip6_hdr *pip6 = (const struct ip6_hdr *)packet; in FilterCheck()
218 payload = packet + sizeof *pip6; in FilterCheck()
231 const struct ip *pip = (const struct ip *)packet; in FilterCheck()
250 payload = packet + (pip->ip_hl << 2); in FilterCheck()
533 const unsigned char *packet, int nb, struct filter *filter, in PacketCheck() argument
559 const struct ip6_hdr *pip6 = (const struct ip6_hdr *)packet; in PacketCheck()
564 payload = packet + sizeof *pip6; in PacketCheck()
571 const struct ip *pip = (const struct ip *)packet; in PacketCheck()
576 payload = packet + (pip->ip_hl << 2); in PacketCheck()
[all …]
/dragonfly/contrib/dhcpcd/src/
H A Dbpf.c240 struct bpf_hdr packet; in bpf_read() local
263 memcpy(&packet, payload, sizeof(packet)); in bpf_read()
264 if (bpf->bpf_pos + packet.bh_caplen + packet.bh_hdrlen > in bpf_read()
267 payload += packet.bh_hdrlen; in bpf_read()
268 if (packet.bh_caplen > len) in bpf_read()
271 bytes = (ssize_t)packet.bh_caplen; in bpf_read()
278 bpf->bpf_pos += BPF_WORDALIGN(packet.bh_hdrlen + in bpf_read()
279 packet.bh_caplen); in bpf_read()
/dragonfly/contrib/libpcap/
H A DREADME.md17 interface for user-level packet capture. libpcap provides a portable
21 for packet capture, and since we've developed several tools that
24 system-dependent packet capture modules in each application.
34 with the OS's interface for packet capture on those platforms, such as
39 architecture in the BSD packet filter. BPF is described in the 1993
46 Although most packet capture interfaces support in-kernel filtering,
/dragonfly/tools/tools/net80211/w00t/redir/
H A Dredir.c86 char packet[2048]; member
239 rc = inject(p->tx, p->packet, p->packet_len); in send_packet()
248 wh = (struct ieee80211_frame*) p->packet; in send_packet()
266 memset(p->packet, 0, sizeof(p->packet)); in send_header()
267 wh = (struct ieee80211_frame *) p->packet; in send_header()
343 memset(p->packet, 0, sizeof(p->packet)); in send_data()
344 wh = (struct ieee80211_frame*) p->packet; in send_data()
/dragonfly/sbin/natd/
H A DHISTORY35 packet arrives. This allows natd to start up before
48 The options which map directly to packet aliasing options are:
60 way to support new packet aliasing options.
79 when packet size exceeds mtu size of outgoing network interface.
85 - Upgrade to new packet aliasing engine (2.1)
139 use them to find out packet direction instead of
/dragonfly/contrib/file/magic/Magdir/
H A Dpgp-binary-keys18 # A PGP packet is described by a single byte: the so-called CTB. The
25 # Following the CTB is the packet's length in bytes. If we blindly
27 # information we come to the next packet.
44 # 0 0xC0 -- Reserved - a packet tag MUST NOT have this value
93 # 0 0x80 -- Reserved - a packet tag MUST NOT have this value
115 # 3 indeterminate length: natural end of packet, e.g., EOF
135 # Any number of marker packets are also allowed between each packet,
143 # packet versions that we need to worry about in practice: v3 and v4.
160 # The first packet has to be a public key or a secret key.
175 # Parse the length, check the packet's body and finally advance to the
[all …]
H A Dsereal26 0 string/b \=srl Sereal data packet
29 0 string/b \=\xF3rl Sereal data packet
32 0 string/b \=\xC3\xB3rl Sereal data packet, UTF-8 encoded

12345