/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/ |
H A D | snoop_socks.c | 36 static void put_socks5_addr(char *cp, const unsigned char *buf, int fraglen); 41 interpret_socks_call(flags, line, fraglen) 44 int fraglen; 53 if (fraglen >= 2) { 60 if (fraglen >= 8) { 69 if (fraglen > 8) { 73 i < 40 && i < fraglen; 94 if (2 + n == fraglen) { 98 for (i = 0; i < n && 2 + i < fraglen; ++i) { 102 } else if (fraglen > 365 put_socks5_addr(char *cp, const unsigned char *buf, int fraglen) argument [all...] |
H A D | snoop_udp.c | 50 interpret_udp(int flags, struct udphdr *udp, int iplen, int fraglen) argument 58 if (fraglen < sizeof (struct udphdr)) 59 return (fraglen); /* incomplete header */ 63 fraglen -= sizeof (struct udphdr); 64 if (fraglen > udplen) 65 fraglen = udplen; 102 udplen > fraglen ? 118 data, fraglen)) { 119 if (fraglen > 0 && sunrpc) 120 interpret_rpc(flags, data, fraglen, IPPROTO_UD [all...] |
H A D | snoop_ipsec.c | 52 interpret_esp(int flags, uint8_t *hdr, int iplen, int fraglen) argument 60 if (fraglen < sizeof (esph_t)) 61 return (fraglen); /* incomplete header */ 103 interpret_ah(int flags, uint8_t *hdr, int iplen, int fraglen) argument 115 if (fraglen < sizeof (ah_t)) 116 return (fraglen); /* incomplete header */ 134 fraglen -= ahlen; 135 if (fraglen < 0) 136 return (fraglen + ahlen); /* incomplete header */ 196 &fraglen); [all...] |
H A D | snoop_http.c | 63 interpret_http(int flags, char *line, int fraglen) argument 69 endp = line + fraglen; 83 show_header("HTTP: ", "HyperText Transfer Protocol", fraglen); 123 return (fraglen);
|
H A D | snoop_ospf.c | 131 interpret_ospf_hello(int flags, struct ospfhdr *op, int fraglen) argument 136 if (fraglen < OSPF_MIN_HEADER_SIZE + OSPF_MIN_HELLO_HEADER_SIZE) 152 while ((uchar_t *)nbr < ((uchar_t *)op + fraglen)) { 154 ((uchar_t *)op + fraglen)) 190 while ((uchar_t *)nbr < ((uchar_t *)op + fraglen)) { 192 ((uchar_t *)op + fraglen)) 199 return (fraglen); 540 interpret_ospf(int flags, struct ospfhdr *ospf, int iplen, int fraglen) argument 548 if ((fraglen < OSPF_MIN_HEADER_SIZE) || 549 (fraglen < ntoh [all...] |
H A D | snoop_rip6.c | 53 interpret_rip6(int flags, struct rip6 *rip6, int fraglen) argument 72 len = fraglen - 4; 91 fraglen); 105 len = fraglen - 4; 128 return (fraglen);
|
H A D | snoop_ip.c | 83 interpret_ip(int flags, const struct ip *ip, int fraglen) argument 94 iplen = interpret_ipv6(flags, (ip6_t *)ip, fraglen); 106 fraglen -= hdrlen; 107 if (fraglen > iplen) 108 fraglen = iplen; 109 if (fraglen < 0) { 111 "IP truncated: header missing %d bytes", -fraglen); 113 return (fraglen + iplen); 147 iplen > fraglen ? "?" : "", 186 iplen > fraglen 312 interpret_ipv6(int flags, const ip6_t *ip6h, int fraglen) argument 493 print_ipv6_extensions(int flags, uint8_t **hdr, uint8_t *next, int *iplen, int *fraglen) argument [all...] |
H A D | snoop_tftp.c | 38 interpret_tftp(int flags, struct tftphdr *tftp, int fraglen) argument 42 int blocksize = fraglen - 4; 90 show_header("TFTP: ", "Trivial File Transfer Protocol", fraglen); 142 return (fraglen);
|
H A D | snoop_ospf6.c | 78 interpret_ospf6_hello(int flags, struct ospf6hdr *op, int fraglen) argument 83 if (fraglen < OSPF6_MIN_HEADER_SIZE + OSPF_MIN_HELLO_HEADER_SIZE) 99 while ((uchar_t *)nbr < ((uchar_t *)op + fraglen)) { 101 ((uchar_t *)op + fraglen)) 138 while ((uchar_t *)nbr < ((uchar_t *)op + fraglen)) { 140 ((uchar_t *)op + fraglen)) 147 return (fraglen); 587 interpret_ospf6(int flags, struct ospf6hdr *ospf, int iplen, int fraglen) argument 595 if ((fraglen < OSPF6_MIN_HEADER_SIZE) || 596 (fraglen < ntoh [all...] |
H A D | snoop_tcp.c | 78 interpret_tcp(int flags, struct tcphdr *tcp, int iplen, int fraglen) argument 91 fraglen -= hdrlen; 92 if (fraglen < 0) 93 return (fraglen + hdrlen); /* incomplete header */ 94 if (fraglen > tcplen) 95 fraglen = tcplen; 135 valid_rpc(data + 4, fraglen - 4); 215 data, fraglen)) { 216 if (sunrpc && fraglen > 0) 217 interpret_rpc(flags, data, fraglen, IPPROTO_TC [all...] |
H A D | snoop_rpc.c | 68 interpret_rpc(int flags, char *rpc, int fraglen, int type) argument 81 xdr_init(rpc, fraglen); 87 return (fraglen); 107 rpc, fraglen); 132 rpc, fraglen); 163 rpc, fraglen); 209 show_header("RPC: ", "SUN RPC Header", fraglen); 229 prog, vers, proc, rpc, fraglen); 232 rpc_detail_reply(flags, xid, x, rpc, fraglen); 237 return (fraglen); [all...] |
H A D | snoop_slp.c | 166 void interpret_slp(int flags, char *slp, int fraglen) { argument 170 msglength = fraglen; 178 if (add_tcp_cont(tce, slp, fraglen)) { 180 fraglen = tce->curr_offset; 186 interpret_slp_v2(flags, (void *)slp, fraglen); 188 interpret_slp_v1(flags, (void *)slp, fraglen); 623 int fraglen, int dst_port) { 634 memcpy(tce->msg, msg, fraglen); 636 tce->curr_offset = fraglen; 644 static int add_tcp_cont(struct tcp_cont *tce, char *msg, int fraglen) { argument 622 reg_tcp_cont(char *msg, int totallen, int fraglen, int dst_port) argument 689 interpret_slp_v2(int flags, struct slpv2_hdr *slp, int fraglen) argument 762 v2_header(int flags, struct slpv2_hdr *slp, int *totallen, int fraglen) argument 1400 interpret_slp_v1(int flags, struct slpv1_hdr *slp, int fraglen) argument 1473 v1_header(int flags, struct slpv1_hdr *slp, int fraglen) argument [all...] |
H A D | snoop_sctp.c | 566 * check fraglen before actually trying to use hdr, in 951 * Loops through all chunks until it has read fraglen bytes of 954 * fraglen. 957 interpret_chunks(int flags, sctp_chunk_hdr_t *cp, int fraglen) argument 975 * check fraglen before actually trying to use hdr, in 981 fraglen -= pad; 987 if (fraglen < 0 || fraglen < sizeof (*cp)) { 988 if (fraglen > 0 && flags & F_DTAIL) { 993 return (fraglen); 1066 interpret_sctp(int flags, sctp_hdr_t *sctp, int iplen, int fraglen) argument [all...] |
H A D | snoop_ntp.c | 59 interpret_ntp(int flags, struct ntpdata *ntp_pkt, int fraglen) argument 91 (void) memcpy(&fragbuf, ntp_pkt, MIN(sizeof (fragbuf), fraglen)); 127 show_header("NTP: ", "Network Time Protocol", fraglen); 208 fraglen < (LEN_PKT_NOMAC + MAC_OCTETS_MIN)) { 219 macbytes = fraglen - (LEN_PKT_NOMAC + sizeof (uint32_t)); 373 return (fraglen);
|
H A D | snoop_rip.c | 46 interpret_rip(int flags, struct rip *rip, int fraglen) argument 65 if ((len = fraglen - 4) < 0) 148 len = fraglen - 4; 149 show_header("RIP: ", "Routing Information Protocol", fraglen); 381 return (fraglen - len);
|
H A D | snoop_mip.c | 288 interpret_mip_cntrlmsg(int flags, uchar_t *msg, int fraglen) { argument 301 if (fraglen < sizeof (regreq_t)) 306 regext_size = fraglen - sizeof (regreq_t); 310 if (fraglen < sizeof (regrep_t)) 315 regext_size = fraglen - sizeof (regrep_t); 503 show_header("MIP: ", "Mobile IP Header", fraglen); 628 fraglen = interpret_extensions(regext_data, regext_size, REG);
|
H A D | snoop_ldap.c | 121 interpret_ldap(flags, data, fraglen, src, dst) 124 int fraglen; 134 (void) decode_ldap(data, fraglen); 139 "Lightweight Directory Access Protocol Header", fraglen);
|
/illumos-gate/usr/src/uts/common/io/rtw/ |
H A D | rtw.c | 2017 * fraglen: fragment length, set to maximum (or higher) for no 2034 uint32_t flags, int fraglen, int rate, struct rtw_ieee80211_duration *d0, 2051 npkt = paylen / fraglen; 2052 lastlen0 = paylen % fraglen; 2060 lastlen = fraglen + overlen; 2066 firstlen = fraglen + overlen; 2033 rtw_compute_duration(struct ieee80211_frame *wh, int len, uint32_t flags, int fraglen, int rate, struct rtw_ieee80211_duration *d0, struct rtw_ieee80211_duration *dn, int *npktp) argument
|
/illumos-gate/usr/src/uts/common/inet/sctp/ |
H A D | sctp_input.c | 944 uint16_t fraglen = 0; local 1141 * fraglen contains the length of consecutive chunks of fragments. 1149 fraglen += ntohs(qdc->sdh_len); 1153 srp->sr_msglen += fraglen;
|