/dports/net/hexinject/hexinject/ |
H A D | hexpcap.h | 105 switch(next_protocol) { in do_cksum_ipv4_ipv6_next_protocol() 189 next_protocol = raw[9]; in do_cksum_ipv4() 200 uint8_t next_protocol = 0; in do_cksum_ipv6() local 203 next_protocol = raw[6]; in do_cksum_ipv6() 208 switch (next_protocol) { in do_cksum_ipv6() 217 next_protocol = next_header[0]; in do_cksum_ipv6() 257 switch(next_protocol) { in do_size_ipv4_ipv6_next_protocol() 298 next_protocol = raw[9]; in do_size_ipv4() 309 uint8_t next_protocol = 0; in do_size_ipv6() local 319 next_protocol = raw[6]; in do_size_ipv6() [all …]
|
H A D | prettypacket.h | 324 int next_protocol = protocol_8bit_extract(packet_buffer, counter); in ip_print() local 343 int next_protocol = 0, eh_size = 0; in ipv6_print() local 376 next_protocol = protocol_8bit_extract(packet_buffer, counter); in ipv6_print() 389 switch (next_protocol) { in ipv6_print() 425 next_protocol = protocol_8bit_extract(packet_buffer, counter); in ipv6_print() 513 int next_protocol = protocol_16bit_extract(packet_buffer, counter); in ethernet_print() local 521 if (next_protocol > 1500) { in ethernet_print() 524 layer_3_dispatcher(packet_buffer + counter, size - counter, next_protocol); in ethernet_print() 554 int next_protocol = protocol_8bit_extract(packet_buffer, counter); in isl_print() local 555 next_protocol >>= 4; in isl_print() [all …]
|
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/tls/ |
H A D | msg_server_hello.cpp | 61 const std::string next_protocol) : in Server_Hello() argument 93 if(!next_protocol.empty() && client_hello.supports_alpn()) in Server_Hello() 94 m_extensions.add(new Application_Layer_Protocol_Notification(next_protocol)); in Server_Hello() 132 const std::string& next_protocol) : in Server_Hello() argument 160 if(!next_protocol.empty() && client_hello.supports_alpn()) in Server_Hello() 161 m_extensions.add(new Application_Layer_Protocol_Notification(next_protocol)); in Server_Hello()
|
/dports/security/botan2/Botan-2.18.2/src/lib/tls/ |
H A D | msg_server_hello.cpp | 61 const std::string next_protocol) : in Server_Hello() argument 93 if(!next_protocol.empty() && client_hello.supports_alpn()) in Server_Hello() 94 m_extensions.add(new Application_Layer_Protocol_Notification(next_protocol)); in Server_Hello() 132 const std::string& next_protocol) : in Server_Hello() argument 160 if(!next_protocol.empty() && client_hello.supports_alpn()) in Server_Hello() 161 m_extensions.add(new Application_Layer_Protocol_Notification(next_protocol)); in Server_Hello()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/tls/ |
H A D | msg_server_hello.cpp | 61 const std::string next_protocol) : in Server_Hello() argument 93 if(!next_protocol.empty() && client_hello.supports_alpn()) in Server_Hello() 94 m_extensions.add(new Application_Layer_Protocol_Notification(next_protocol)); in Server_Hello() 132 const std::string& next_protocol) : in Server_Hello() argument 160 if(!next_protocol.empty() && client_hello.supports_alpn()) in Server_Hello() 161 m_extensions.add(new Application_Layer_Protocol_Notification(next_protocol)); in Server_Hello()
|
/dports/net/tcpdump/tcpdump-4.99.1/ |
H A D | print-vxlan-gpe.c | 65 uint8_t next_protocol; in vxlan_gpe_print() local 85 next_protocol = GET_U_1(bp); in vxlan_gpe_print() 101 switch (next_protocol) { in vxlan_gpe_print()
|
H A D | print-nsh.c | 96 uint8_t next_protocol; in nsh_print() local 127 next_protocol = NSH_NEXT_PROT(basehdr); in nsh_print() 144 tok2str(np_str, "unknown (0x%02x)", next_protocol)); in nsh_print() 244 switch (next_protocol) { in nsh_print()
|
/dports/multimedia/libv4l/linux-5.13-rc2/net/netfilter/ipvs/ |
H A D | ip_vs_xmit.c | 974 *next_protocol = IPPROTO_IPV6; in ip_vs_prepare_tunneled_skb() 990 *next_protocol = IPPROTO_IPIP; in ip_vs_prepare_tunneled_skb() 1049 gueh->proto_ctype = *next_protocol; in ipvs_gue_encap() 1090 *next_protocol = IPPROTO_UDP; in ipvs_gue_encap() 1110 *next_protocol = IPPROTO_GRE; in ipvs_gre_encap() 1141 __u8 next_protocol = 0; in ip_vs_tunnel_xmit() local 1199 &next_protocol, NULL, &dsfield, in ip_vs_tunnel_xmit() 1254 iph->protocol = next_protocol; in ip_vs_tunnel_xmit() 1291 __u8 next_protocol = 0; in ip_vs_tunnel_xmit_v6() local 1347 &next_protocol, &payload_len, in ip_vs_tunnel_xmit_v6() [all …]
|
/dports/multimedia/v4l_compat/linux-5.13-rc2/net/netfilter/ipvs/ |
H A D | ip_vs_xmit.c | 974 *next_protocol = IPPROTO_IPV6; in ip_vs_prepare_tunneled_skb() 990 *next_protocol = IPPROTO_IPIP; in ip_vs_prepare_tunneled_skb() 1049 gueh->proto_ctype = *next_protocol; in ipvs_gue_encap() 1090 *next_protocol = IPPROTO_UDP; in ipvs_gue_encap() 1110 *next_protocol = IPPROTO_GRE; in ipvs_gre_encap() 1141 __u8 next_protocol = 0; in ip_vs_tunnel_xmit() local 1199 &next_protocol, NULL, &dsfield, in ip_vs_tunnel_xmit() 1254 iph->protocol = next_protocol; in ip_vs_tunnel_xmit() 1291 __u8 next_protocol = 0; in ip_vs_tunnel_xmit_v6() local 1347 &next_protocol, &payload_len, in ip_vs_tunnel_xmit_v6() [all …]
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/net/netfilter/ipvs/ |
H A D | ip_vs_xmit.c | 974 *next_protocol = IPPROTO_IPV6; in ip_vs_prepare_tunneled_skb() 990 *next_protocol = IPPROTO_IPIP; in ip_vs_prepare_tunneled_skb() 1049 gueh->proto_ctype = *next_protocol; in ipvs_gue_encap() 1090 *next_protocol = IPPROTO_UDP; in ipvs_gue_encap() 1110 *next_protocol = IPPROTO_GRE; in ipvs_gre_encap() 1141 __u8 next_protocol = 0; in ip_vs_tunnel_xmit() local 1199 &next_protocol, NULL, &dsfield, in ip_vs_tunnel_xmit() 1254 iph->protocol = next_protocol; in ip_vs_tunnel_xmit() 1291 __u8 next_protocol = 0; in ip_vs_tunnel_xmit_v6() local 1347 &next_protocol, &payload_len, in ip_vs_tunnel_xmit_v6() [all …]
|
/dports/net/chrony-lite/chrony-4.2/ |
H A D | nts_ke_server.c | 321 prepare_response(NKSN_Instance session, int error, int next_protocol, int aead_algorithm) in prepare_response() argument 329 DEBUG_LOG("NTS KE response: error=%d next=%d aead=%d", error, next_protocol, aead_algorithm); in prepare_response() 337 } else if (next_protocol < 0) { in prepare_response() 341 datum = htons(next_protocol); in prepare_response() 347 datum = htons(next_protocol); in prepare_response() 394 int next_protocol = -1, aead_algorithm = -1, error = -1; in process_request() local 417 next_protocol = NKE_NEXT_PROTOCOL_NTPV4; in process_request() 447 (next_protocol == NKE_NEXT_PROTOCOL_NTPV4 && in process_request() 452 if (!prepare_response(session, error, next_protocol, aead_algorithm)) in process_request()
|
H A D | nts_ke_client.c | 128 int next_protocol = -1, aead_algorithm = -1, error = 0; in process_response() local 159 next_protocol = NKE_NEXT_PROTOCOL_NTPV4; in process_response() 235 error, next_protocol, aead_algorithm); in process_response() 238 next_protocol != NKE_NEXT_PROTOCOL_NTPV4 || in process_response()
|
/dports/net/chrony/chrony-4.2/ |
H A D | nts_ke_server.c | 321 prepare_response(NKSN_Instance session, int error, int next_protocol, int aead_algorithm) in prepare_response() argument 329 DEBUG_LOG("NTS KE response: error=%d next=%d aead=%d", error, next_protocol, aead_algorithm); in prepare_response() 337 } else if (next_protocol < 0) { in prepare_response() 341 datum = htons(next_protocol); in prepare_response() 347 datum = htons(next_protocol); in prepare_response() 394 int next_protocol = -1, aead_algorithm = -1, error = -1; in process_request() local 417 next_protocol = NKE_NEXT_PROTOCOL_NTPV4; in process_request() 447 (next_protocol == NKE_NEXT_PROTOCOL_NTPV4 && in process_request() 452 if (!prepare_response(session, error, next_protocol, aead_algorithm)) in process_request()
|
H A D | nts_ke_client.c | 128 int next_protocol = -1, aead_algorithm = -1, error = 0; in process_response() local 159 next_protocol = NKE_NEXT_PROTOCOL_NTPV4; in process_response() 235 error, next_protocol, aead_algorithm); in process_response() 238 next_protocol != NKE_NEXT_PROTOCOL_NTPV4 || in process_response()
|
/dports/emulators/dolphin-emu/dolphin-3152428/Externals/curl/lib/vtls/ |
H A D | mbedtls.c | 441 const char* next_protocol; in mbed_connect_step2() local 563 next_protocol = mbedtls_ssl_get_alpn_protocol(&connssl->ssl); in mbed_connect_step2() 565 if(next_protocol) { in mbed_connect_step2() 566 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in mbed_connect_step2() 568 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, in mbed_connect_step2() 570 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { in mbed_connect_step2() 575 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && in mbed_connect_step2() 576 !next_protocol[ALPN_HTTP_1_1_LENGTH]) { in mbed_connect_step2()
|
/dports/games/0ad/0ad-0.0.23b-alpha/build/premake/premake5/contrib/curl/lib/vtls/ |
H A D | mbedtls.c | 465 const char *next_protocol; in mbed_connect_step2() local 587 next_protocol = mbedtls_ssl_get_alpn_protocol(&connssl->ssl); in mbed_connect_step2() 589 if(next_protocol) { in mbed_connect_step2() 590 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in mbed_connect_step2() 592 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, in mbed_connect_step2() 594 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { in mbed_connect_step2() 599 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && in mbed_connect_step2() 600 !next_protocol[ALPN_HTTP_1_1_LENGTH]) { in mbed_connect_step2()
|
/dports/devel/premake5/premake-5.0.0-alpha16-src/contrib/curl/lib/vtls/ |
H A D | mbedtls.c | 465 const char *next_protocol; in mbed_connect_step2() local 587 next_protocol = mbedtls_ssl_get_alpn_protocol(&connssl->ssl); in mbed_connect_step2() 589 if(next_protocol) { in mbed_connect_step2() 590 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in mbed_connect_step2() 592 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, in mbed_connect_step2() 594 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { in mbed_connect_step2() 599 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && in mbed_connect_step2() 600 !next_protocol[ALPN_HTTP_1_1_LENGTH]) { in mbed_connect_step2()
|
/dports/audio/lewton/lewton-0.10.2/cargo-crates/curl-sys-0.4.25/curl/lib/vtls/ |
H A D | mbedtls.c | 667 const char *next_protocol = mbedtls_ssl_get_alpn_protocol(&BACKEND->ssl); in mbed_connect_step2() local 669 if(next_protocol) { in mbed_connect_step2() 670 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in mbed_connect_step2() 672 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, in mbed_connect_step2() 674 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { in mbed_connect_step2() 679 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && in mbed_connect_step2() 680 !next_protocol[ALPN_HTTP_1_1_LENGTH]) { in mbed_connect_step2()
|
/dports/graphics/mupdf/mupdf-1.18.0-source/thirdparty/curl/lib/vtls/ |
H A D | mbedtls.c | 664 const char *next_protocol = mbedtls_ssl_get_alpn_protocol(&BACKEND->ssl); in mbed_connect_step2() local 666 if(next_protocol) { in mbed_connect_step2() 667 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in mbed_connect_step2() 669 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, in mbed_connect_step2() 671 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { in mbed_connect_step2() 676 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && in mbed_connect_step2() 677 !next_protocol[ALPN_HTTP_1_1_LENGTH]) { in mbed_connect_step2()
|
/dports/net/proby/proby-1.0.2/cargo-crates/curl-sys-0.4.34+curl-7.71.1/curl/lib/vtls/ |
H A D | mbedtls.c | 678 const char *next_protocol = mbedtls_ssl_get_alpn_protocol(&backend->ssl); in mbed_connect_step2() local 680 if(next_protocol) { in mbed_connect_step2() 681 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in mbed_connect_step2() 683 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, in mbed_connect_step2() 685 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { in mbed_connect_step2() 690 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && in mbed_connect_step2() 691 !next_protocol[ALPN_HTTP_1_1_LENGTH]) { in mbed_connect_step2()
|
/dports/devel/cargo-generate/cargo-generate-0.9.0/cargo-crates/curl-sys-0.4.41+curl-7.75.0/curl/lib/vtls/ |
H A D | mbedtls.c | 682 const char *next_protocol = mbedtls_ssl_get_alpn_protocol(&backend->ssl); in mbed_connect_step2() local 684 if(next_protocol) { in mbed_connect_step2() 685 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in mbed_connect_step2() 687 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, in mbed_connect_step2() 689 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { in mbed_connect_step2() 694 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && in mbed_connect_step2() 695 !next_protocol[ALPN_HTTP_1_1_LENGTH]) { in mbed_connect_step2()
|
/dports/www/newsboat/newsboat-2.22.1/cargo-crates/curl-sys-0.4.39+curl-7.74.0/curl/lib/vtls/ |
H A D | mbedtls.c | 684 const char *next_protocol = mbedtls_ssl_get_alpn_protocol(&backend->ssl); in mbed_connect_step2() local 686 if(next_protocol) { in mbed_connect_step2() 687 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in mbed_connect_step2() 689 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, in mbed_connect_step2() 691 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { in mbed_connect_step2() 696 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && in mbed_connect_step2() 697 !next_protocol[ALPN_HTTP_1_1_LENGTH]) { in mbed_connect_step2()
|
/dports/net/ipdecap/ipdecap-0.7.2/src/ |
H A D | gre.h | 25 u_int16_t next_protocol; member
|
/dports/devel/cargo-c/cargo-c-0.9.6+cargo-0.58/cargo-crates/curl-sys-0.4.51+curl-7.80.0/curl/lib/vtls/ |
H A D | mbedtls.c | 741 const char *next_protocol = mbedtls_ssl_get_alpn_protocol(&backend->ssl); local 743 if(next_protocol) { 744 infof(data, "ALPN, server accepted to use %s", next_protocol); 746 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, 748 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { 753 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && 754 !next_protocol[ALPN_HTTP_1_1_LENGTH]) {
|
/dports/devel/cmake-doc/cmake-3.22.1/Utilities/cmcurl/lib/vtls/ |
H A D | mbedtls.c | 741 const char *next_protocol = mbedtls_ssl_get_alpn_protocol(&backend->ssl); local 743 if(next_protocol) { 744 infof(data, "ALPN, server accepted to use %s", next_protocol); 746 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, 748 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { 753 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && 754 !next_protocol[ALPN_HTTP_1_1_LENGTH]) {
|