Home
last modified time | relevance | path

Searched refs:next_protocol (Results 1 – 25 of 149) sorted by relevance

123456

/dports/net/hexinject/hexinject/
H A Dhexpcap.h105 switch(next_protocol) { in do_cksum_ipv4_ipv6_next_protocol()
189 next_protocol = raw[9]; in do_cksum_ipv4()
200 uint8_t next_protocol = 0; in do_cksum_ipv6() local
203 next_protocol = raw[6]; in do_cksum_ipv6()
208 switch (next_protocol) { in do_cksum_ipv6()
217 next_protocol = next_header[0]; in do_cksum_ipv6()
257 switch(next_protocol) { in do_size_ipv4_ipv6_next_protocol()
298 next_protocol = raw[9]; in do_size_ipv4()
309 uint8_t next_protocol = 0; in do_size_ipv6() local
319 next_protocol = raw[6]; in do_size_ipv6()
[all …]
H A Dprettypacket.h324 int next_protocol = protocol_8bit_extract(packet_buffer, counter); in ip_print() local
343 int next_protocol = 0, eh_size = 0; in ipv6_print() local
376 next_protocol = protocol_8bit_extract(packet_buffer, counter); in ipv6_print()
389 switch (next_protocol) { in ipv6_print()
425 next_protocol = protocol_8bit_extract(packet_buffer, counter); in ipv6_print()
513 int next_protocol = protocol_16bit_extract(packet_buffer, counter); in ethernet_print() local
521 if (next_protocol > 1500) { in ethernet_print()
524 layer_3_dispatcher(packet_buffer + counter, size - counter, next_protocol); in ethernet_print()
554 int next_protocol = protocol_8bit_extract(packet_buffer, counter); in isl_print() local
555 next_protocol >>= 4; in isl_print()
[all …]
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/tls/
H A Dmsg_server_hello.cpp61 const std::string next_protocol) : in Server_Hello() argument
93 if(!next_protocol.empty() && client_hello.supports_alpn()) in Server_Hello()
94 m_extensions.add(new Application_Layer_Protocol_Notification(next_protocol)); in Server_Hello()
132 const std::string& next_protocol) : in Server_Hello() argument
160 if(!next_protocol.empty() && client_hello.supports_alpn()) in Server_Hello()
161 m_extensions.add(new Application_Layer_Protocol_Notification(next_protocol)); in Server_Hello()
/dports/security/botan2/Botan-2.18.2/src/lib/tls/
H A Dmsg_server_hello.cpp61 const std::string next_protocol) : in Server_Hello() argument
93 if(!next_protocol.empty() && client_hello.supports_alpn()) in Server_Hello()
94 m_extensions.add(new Application_Layer_Protocol_Notification(next_protocol)); in Server_Hello()
132 const std::string& next_protocol) : in Server_Hello() argument
160 if(!next_protocol.empty() && client_hello.supports_alpn()) in Server_Hello()
161 m_extensions.add(new Application_Layer_Protocol_Notification(next_protocol)); in Server_Hello()
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/tls/
H A Dmsg_server_hello.cpp61 const std::string next_protocol) : in Server_Hello() argument
93 if(!next_protocol.empty() && client_hello.supports_alpn()) in Server_Hello()
94 m_extensions.add(new Application_Layer_Protocol_Notification(next_protocol)); in Server_Hello()
132 const std::string& next_protocol) : in Server_Hello() argument
160 if(!next_protocol.empty() && client_hello.supports_alpn()) in Server_Hello()
161 m_extensions.add(new Application_Layer_Protocol_Notification(next_protocol)); in Server_Hello()
/dports/net/tcpdump/tcpdump-4.99.1/
H A Dprint-vxlan-gpe.c65 uint8_t next_protocol; in vxlan_gpe_print() local
85 next_protocol = GET_U_1(bp); in vxlan_gpe_print()
101 switch (next_protocol) { in vxlan_gpe_print()
H A Dprint-nsh.c96 uint8_t next_protocol; in nsh_print() local
127 next_protocol = NSH_NEXT_PROT(basehdr); in nsh_print()
144 tok2str(np_str, "unknown (0x%02x)", next_protocol)); in nsh_print()
244 switch (next_protocol) { in nsh_print()
/dports/multimedia/libv4l/linux-5.13-rc2/net/netfilter/ipvs/
H A Dip_vs_xmit.c974 *next_protocol = IPPROTO_IPV6; in ip_vs_prepare_tunneled_skb()
990 *next_protocol = IPPROTO_IPIP; in ip_vs_prepare_tunneled_skb()
1049 gueh->proto_ctype = *next_protocol; in ipvs_gue_encap()
1090 *next_protocol = IPPROTO_UDP; in ipvs_gue_encap()
1110 *next_protocol = IPPROTO_GRE; in ipvs_gre_encap()
1141 __u8 next_protocol = 0; in ip_vs_tunnel_xmit() local
1199 &next_protocol, NULL, &dsfield, in ip_vs_tunnel_xmit()
1254 iph->protocol = next_protocol; in ip_vs_tunnel_xmit()
1291 __u8 next_protocol = 0; in ip_vs_tunnel_xmit_v6() local
1347 &next_protocol, &payload_len, in ip_vs_tunnel_xmit_v6()
[all …]
/dports/multimedia/v4l_compat/linux-5.13-rc2/net/netfilter/ipvs/
H A Dip_vs_xmit.c974 *next_protocol = IPPROTO_IPV6; in ip_vs_prepare_tunneled_skb()
990 *next_protocol = IPPROTO_IPIP; in ip_vs_prepare_tunneled_skb()
1049 gueh->proto_ctype = *next_protocol; in ipvs_gue_encap()
1090 *next_protocol = IPPROTO_UDP; in ipvs_gue_encap()
1110 *next_protocol = IPPROTO_GRE; in ipvs_gre_encap()
1141 __u8 next_protocol = 0; in ip_vs_tunnel_xmit() local
1199 &next_protocol, NULL, &dsfield, in ip_vs_tunnel_xmit()
1254 iph->protocol = next_protocol; in ip_vs_tunnel_xmit()
1291 __u8 next_protocol = 0; in ip_vs_tunnel_xmit_v6() local
1347 &next_protocol, &payload_len, in ip_vs_tunnel_xmit_v6()
[all …]
/dports/multimedia/v4l-utils/linux-5.13-rc2/net/netfilter/ipvs/
H A Dip_vs_xmit.c974 *next_protocol = IPPROTO_IPV6; in ip_vs_prepare_tunneled_skb()
990 *next_protocol = IPPROTO_IPIP; in ip_vs_prepare_tunneled_skb()
1049 gueh->proto_ctype = *next_protocol; in ipvs_gue_encap()
1090 *next_protocol = IPPROTO_UDP; in ipvs_gue_encap()
1110 *next_protocol = IPPROTO_GRE; in ipvs_gre_encap()
1141 __u8 next_protocol = 0; in ip_vs_tunnel_xmit() local
1199 &next_protocol, NULL, &dsfield, in ip_vs_tunnel_xmit()
1254 iph->protocol = next_protocol; in ip_vs_tunnel_xmit()
1291 __u8 next_protocol = 0; in ip_vs_tunnel_xmit_v6() local
1347 &next_protocol, &payload_len, in ip_vs_tunnel_xmit_v6()
[all …]
/dports/net/chrony-lite/chrony-4.2/
H A Dnts_ke_server.c321 prepare_response(NKSN_Instance session, int error, int next_protocol, int aead_algorithm) in prepare_response() argument
329 DEBUG_LOG("NTS KE response: error=%d next=%d aead=%d", error, next_protocol, aead_algorithm); in prepare_response()
337 } else if (next_protocol < 0) { in prepare_response()
341 datum = htons(next_protocol); in prepare_response()
347 datum = htons(next_protocol); in prepare_response()
394 int next_protocol = -1, aead_algorithm = -1, error = -1; in process_request() local
417 next_protocol = NKE_NEXT_PROTOCOL_NTPV4; in process_request()
447 (next_protocol == NKE_NEXT_PROTOCOL_NTPV4 && in process_request()
452 if (!prepare_response(session, error, next_protocol, aead_algorithm)) in process_request()
H A Dnts_ke_client.c128 int next_protocol = -1, aead_algorithm = -1, error = 0; in process_response() local
159 next_protocol = NKE_NEXT_PROTOCOL_NTPV4; in process_response()
235 error, next_protocol, aead_algorithm); in process_response()
238 next_protocol != NKE_NEXT_PROTOCOL_NTPV4 || in process_response()
/dports/net/chrony/chrony-4.2/
H A Dnts_ke_server.c321 prepare_response(NKSN_Instance session, int error, int next_protocol, int aead_algorithm) in prepare_response() argument
329 DEBUG_LOG("NTS KE response: error=%d next=%d aead=%d", error, next_protocol, aead_algorithm); in prepare_response()
337 } else if (next_protocol < 0) { in prepare_response()
341 datum = htons(next_protocol); in prepare_response()
347 datum = htons(next_protocol); in prepare_response()
394 int next_protocol = -1, aead_algorithm = -1, error = -1; in process_request() local
417 next_protocol = NKE_NEXT_PROTOCOL_NTPV4; in process_request()
447 (next_protocol == NKE_NEXT_PROTOCOL_NTPV4 && in process_request()
452 if (!prepare_response(session, error, next_protocol, aead_algorithm)) in process_request()
H A Dnts_ke_client.c128 int next_protocol = -1, aead_algorithm = -1, error = 0; in process_response() local
159 next_protocol = NKE_NEXT_PROTOCOL_NTPV4; in process_response()
235 error, next_protocol, aead_algorithm); in process_response()
238 next_protocol != NKE_NEXT_PROTOCOL_NTPV4 || in process_response()
/dports/emulators/dolphin-emu/dolphin-3152428/Externals/curl/lib/vtls/
H A Dmbedtls.c441 const char* next_protocol; in mbed_connect_step2() local
563 next_protocol = mbedtls_ssl_get_alpn_protocol(&connssl->ssl); in mbed_connect_step2()
565 if(next_protocol) { in mbed_connect_step2()
566 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in mbed_connect_step2()
568 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, in mbed_connect_step2()
570 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { in mbed_connect_step2()
575 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && in mbed_connect_step2()
576 !next_protocol[ALPN_HTTP_1_1_LENGTH]) { in mbed_connect_step2()
/dports/games/0ad/0ad-0.0.23b-alpha/build/premake/premake5/contrib/curl/lib/vtls/
H A Dmbedtls.c465 const char *next_protocol; in mbed_connect_step2() local
587 next_protocol = mbedtls_ssl_get_alpn_protocol(&connssl->ssl); in mbed_connect_step2()
589 if(next_protocol) { in mbed_connect_step2()
590 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in mbed_connect_step2()
592 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, in mbed_connect_step2()
594 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { in mbed_connect_step2()
599 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && in mbed_connect_step2()
600 !next_protocol[ALPN_HTTP_1_1_LENGTH]) { in mbed_connect_step2()
/dports/devel/premake5/premake-5.0.0-alpha16-src/contrib/curl/lib/vtls/
H A Dmbedtls.c465 const char *next_protocol; in mbed_connect_step2() local
587 next_protocol = mbedtls_ssl_get_alpn_protocol(&connssl->ssl); in mbed_connect_step2()
589 if(next_protocol) { in mbed_connect_step2()
590 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in mbed_connect_step2()
592 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, in mbed_connect_step2()
594 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { in mbed_connect_step2()
599 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && in mbed_connect_step2()
600 !next_protocol[ALPN_HTTP_1_1_LENGTH]) { in mbed_connect_step2()
/dports/audio/lewton/lewton-0.10.2/cargo-crates/curl-sys-0.4.25/curl/lib/vtls/
H A Dmbedtls.c667 const char *next_protocol = mbedtls_ssl_get_alpn_protocol(&BACKEND->ssl); in mbed_connect_step2() local
669 if(next_protocol) { in mbed_connect_step2()
670 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in mbed_connect_step2()
672 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, in mbed_connect_step2()
674 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { in mbed_connect_step2()
679 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && in mbed_connect_step2()
680 !next_protocol[ALPN_HTTP_1_1_LENGTH]) { in mbed_connect_step2()
/dports/graphics/mupdf/mupdf-1.18.0-source/thirdparty/curl/lib/vtls/
H A Dmbedtls.c664 const char *next_protocol = mbedtls_ssl_get_alpn_protocol(&BACKEND->ssl); in mbed_connect_step2() local
666 if(next_protocol) { in mbed_connect_step2()
667 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in mbed_connect_step2()
669 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, in mbed_connect_step2()
671 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { in mbed_connect_step2()
676 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && in mbed_connect_step2()
677 !next_protocol[ALPN_HTTP_1_1_LENGTH]) { in mbed_connect_step2()
/dports/net/proby/proby-1.0.2/cargo-crates/curl-sys-0.4.34+curl-7.71.1/curl/lib/vtls/
H A Dmbedtls.c678 const char *next_protocol = mbedtls_ssl_get_alpn_protocol(&backend->ssl); in mbed_connect_step2() local
680 if(next_protocol) { in mbed_connect_step2()
681 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in mbed_connect_step2()
683 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, in mbed_connect_step2()
685 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { in mbed_connect_step2()
690 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && in mbed_connect_step2()
691 !next_protocol[ALPN_HTTP_1_1_LENGTH]) { in mbed_connect_step2()
/dports/devel/cargo-generate/cargo-generate-0.9.0/cargo-crates/curl-sys-0.4.41+curl-7.75.0/curl/lib/vtls/
H A Dmbedtls.c682 const char *next_protocol = mbedtls_ssl_get_alpn_protocol(&backend->ssl); in mbed_connect_step2() local
684 if(next_protocol) { in mbed_connect_step2()
685 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in mbed_connect_step2()
687 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, in mbed_connect_step2()
689 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { in mbed_connect_step2()
694 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && in mbed_connect_step2()
695 !next_protocol[ALPN_HTTP_1_1_LENGTH]) { in mbed_connect_step2()
/dports/www/newsboat/newsboat-2.22.1/cargo-crates/curl-sys-0.4.39+curl-7.74.0/curl/lib/vtls/
H A Dmbedtls.c684 const char *next_protocol = mbedtls_ssl_get_alpn_protocol(&backend->ssl); in mbed_connect_step2() local
686 if(next_protocol) { in mbed_connect_step2()
687 infof(data, "ALPN, server accepted to use %s\n", next_protocol); in mbed_connect_step2()
689 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID, in mbed_connect_step2()
691 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) { in mbed_connect_step2()
696 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) && in mbed_connect_step2()
697 !next_protocol[ALPN_HTTP_1_1_LENGTH]) { in mbed_connect_step2()
/dports/net/ipdecap/ipdecap-0.7.2/src/
H A Dgre.h25 u_int16_t next_protocol; member
/dports/devel/cargo-c/cargo-c-0.9.6+cargo-0.58/cargo-crates/curl-sys-0.4.51+curl-7.80.0/curl/lib/vtls/
H A Dmbedtls.c741 const char *next_protocol = mbedtls_ssl_get_alpn_protocol(&backend->ssl); local
743 if(next_protocol) {
744 infof(data, "ALPN, server accepted to use %s", next_protocol);
746 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID,
748 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) {
753 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) &&
754 !next_protocol[ALPN_HTTP_1_1_LENGTH]) {
/dports/devel/cmake-doc/cmake-3.22.1/Utilities/cmcurl/lib/vtls/
H A Dmbedtls.c741 const char *next_protocol = mbedtls_ssl_get_alpn_protocol(&backend->ssl); local
743 if(next_protocol) {
744 infof(data, "ALPN, server accepted to use %s", next_protocol);
746 if(!strncmp(next_protocol, NGHTTP2_PROTO_VERSION_ID,
748 !next_protocol[NGHTTP2_PROTO_VERSION_ID_LEN]) {
753 if(!strncmp(next_protocol, ALPN_HTTP_1_1, ALPN_HTTP_1_1_LENGTH) &&
754 !next_protocol[ALPN_HTTP_1_1_LENGTH]) {

123456