Searched refs:fraglen (Results 1 - 19 of 19) sorted by relevance

/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/
H A Dsnoop_socks.c36 static void put_socks5_addr(char *cp, const unsigned char *buf, int fraglen);
41 interpret_socks_call(flags, line, fraglen)
44 int fraglen;
53 if (fraglen >= 2) {
60 if (fraglen >= 8) {
69 if (fraglen > 8) {
73 i < 40 && i < fraglen;
94 if (2 + n == fraglen) {
98 for (i = 0; i < n && 2 + i < fraglen; ++i) {
102 } else if (fraglen >
365 put_socks5_addr(char *cp, const unsigned char *buf, int fraglen) argument
[all...]
H A Dsnoop_udp.c50 interpret_udp(int flags, struct udphdr *udp, int iplen, int fraglen) argument
58 if (fraglen < sizeof (struct udphdr))
59 return (fraglen); /* incomplete header */
63 fraglen -= sizeof (struct udphdr);
64 if (fraglen > udplen)
65 fraglen = udplen;
102 udplen > fraglen ?
118 data, fraglen)) {
119 if (fraglen > 0 && sunrpc)
120 interpret_rpc(flags, data, fraglen, IPPROTO_UD
[all...]
H A Dsnoop_ipsec.c52 interpret_esp(int flags, uint8_t *hdr, int iplen, int fraglen) argument
60 if (fraglen < sizeof (esph_t))
61 return (fraglen); /* incomplete header */
103 interpret_ah(int flags, uint8_t *hdr, int iplen, int fraglen) argument
115 if (fraglen < sizeof (ah_t))
116 return (fraglen); /* incomplete header */
134 fraglen -= ahlen;
135 if (fraglen < 0)
136 return (fraglen + ahlen); /* incomplete header */
196 &fraglen);
[all...]
H A Dsnoop_http.c63 interpret_http(int flags, char *line, int fraglen) argument
69 endp = line + fraglen;
83 show_header("HTTP: ", "HyperText Transfer Protocol", fraglen);
123 return (fraglen);
H A Dsnoop_ospf.c131 interpret_ospf_hello(int flags, struct ospfhdr *op, int fraglen) argument
136 if (fraglen < OSPF_MIN_HEADER_SIZE + OSPF_MIN_HELLO_HEADER_SIZE)
152 while ((uchar_t *)nbr < ((uchar_t *)op + fraglen)) {
154 ((uchar_t *)op + fraglen))
190 while ((uchar_t *)nbr < ((uchar_t *)op + fraglen)) {
192 ((uchar_t *)op + fraglen))
199 return (fraglen);
540 interpret_ospf(int flags, struct ospfhdr *ospf, int iplen, int fraglen) argument
548 if ((fraglen < OSPF_MIN_HEADER_SIZE) ||
549 (fraglen < ntoh
[all...]
H A Dsnoop_rip6.c53 interpret_rip6(int flags, struct rip6 *rip6, int fraglen) argument
72 len = fraglen - 4;
91 fraglen);
105 len = fraglen - 4;
128 return (fraglen);
H A Dsnoop_ip.c83 interpret_ip(int flags, const struct ip *ip, int fraglen) argument
94 iplen = interpret_ipv6(flags, (ip6_t *)ip, fraglen);
106 fraglen -= hdrlen;
107 if (fraglen > iplen)
108 fraglen = iplen;
109 if (fraglen < 0) {
111 "IP truncated: header missing %d bytes", -fraglen);
113 return (fraglen + iplen);
147 iplen > fraglen ? "?" : "",
186 iplen > fraglen
312 interpret_ipv6(int flags, const ip6_t *ip6h, int fraglen) argument
493 print_ipv6_extensions(int flags, uint8_t **hdr, uint8_t *next, int *iplen, int *fraglen) argument
[all...]
H A Dsnoop_tftp.c38 interpret_tftp(int flags, struct tftphdr *tftp, int fraglen) argument
42 int blocksize = fraglen - 4;
90 show_header("TFTP: ", "Trivial File Transfer Protocol", fraglen);
142 return (fraglen);
H A Dsnoop_ospf6.c78 interpret_ospf6_hello(int flags, struct ospf6hdr *op, int fraglen) argument
83 if (fraglen < OSPF6_MIN_HEADER_SIZE + OSPF_MIN_HELLO_HEADER_SIZE)
99 while ((uchar_t *)nbr < ((uchar_t *)op + fraglen)) {
101 ((uchar_t *)op + fraglen))
138 while ((uchar_t *)nbr < ((uchar_t *)op + fraglen)) {
140 ((uchar_t *)op + fraglen))
147 return (fraglen);
587 interpret_ospf6(int flags, struct ospf6hdr *ospf, int iplen, int fraglen) argument
595 if ((fraglen < OSPF6_MIN_HEADER_SIZE) ||
596 (fraglen < ntoh
[all...]
H A Dsnoop_tcp.c78 interpret_tcp(int flags, struct tcphdr *tcp, int iplen, int fraglen) argument
91 fraglen -= hdrlen;
92 if (fraglen < 0)
93 return (fraglen + hdrlen); /* incomplete header */
94 if (fraglen > tcplen)
95 fraglen = tcplen;
135 valid_rpc(data + 4, fraglen - 4);
215 data, fraglen)) {
216 if (sunrpc && fraglen > 0)
217 interpret_rpc(flags, data, fraglen, IPPROTO_TC
[all...]
H A Dsnoop_rpc.c68 interpret_rpc(int flags, char *rpc, int fraglen, int type) argument
81 xdr_init(rpc, fraglen);
87 return (fraglen);
107 rpc, fraglen);
132 rpc, fraglen);
163 rpc, fraglen);
209 show_header("RPC: ", "SUN RPC Header", fraglen);
229 prog, vers, proc, rpc, fraglen);
232 rpc_detail_reply(flags, xid, x, rpc, fraglen);
237 return (fraglen);
[all...]
H A Dsnoop_slp.c166 void interpret_slp(int flags, char *slp, int fraglen) { argument
170 msglength = fraglen;
178 if (add_tcp_cont(tce, slp, fraglen)) {
180 fraglen = tce->curr_offset;
186 interpret_slp_v2(flags, (void *)slp, fraglen);
188 interpret_slp_v1(flags, (void *)slp, fraglen);
623 int fraglen, int dst_port) {
634 memcpy(tce->msg, msg, fraglen);
636 tce->curr_offset = fraglen;
644 static int add_tcp_cont(struct tcp_cont *tce, char *msg, int fraglen) { argument
622 reg_tcp_cont(char *msg, int totallen, int fraglen, int dst_port) argument
689 interpret_slp_v2(int flags, struct slpv2_hdr *slp, int fraglen) argument
762 v2_header(int flags, struct slpv2_hdr *slp, int *totallen, int fraglen) argument
1400 interpret_slp_v1(int flags, struct slpv1_hdr *slp, int fraglen) argument
1473 v1_header(int flags, struct slpv1_hdr *slp, int fraglen) argument
[all...]
H A Dsnoop_sctp.c566 * check fraglen before actually trying to use hdr, in
951 * Loops through all chunks until it has read fraglen bytes of
954 * fraglen.
957 interpret_chunks(int flags, sctp_chunk_hdr_t *cp, int fraglen) argument
975 * check fraglen before actually trying to use hdr, in
981 fraglen -= pad;
987 if (fraglen < 0 || fraglen < sizeof (*cp)) {
988 if (fraglen > 0 && flags & F_DTAIL) {
993 return (fraglen);
1066 interpret_sctp(int flags, sctp_hdr_t *sctp, int iplen, int fraglen) argument
[all...]
H A Dsnoop_ntp.c59 interpret_ntp(int flags, struct ntpdata *ntp_pkt, int fraglen) argument
91 (void) memcpy(&fragbuf, ntp_pkt, MIN(sizeof (fragbuf), fraglen));
127 show_header("NTP: ", "Network Time Protocol", fraglen);
208 fraglen < (LEN_PKT_NOMAC + MAC_OCTETS_MIN)) {
219 macbytes = fraglen - (LEN_PKT_NOMAC + sizeof (uint32_t));
373 return (fraglen);
H A Dsnoop_rip.c46 interpret_rip(int flags, struct rip *rip, int fraglen) argument
65 if ((len = fraglen - 4) < 0)
148 len = fraglen - 4;
149 show_header("RIP: ", "Routing Information Protocol", fraglen);
381 return (fraglen - len);
H A Dsnoop_mip.c288 interpret_mip_cntrlmsg(int flags, uchar_t *msg, int fraglen) { argument
301 if (fraglen < sizeof (regreq_t))
306 regext_size = fraglen - sizeof (regreq_t);
310 if (fraglen < sizeof (regrep_t))
315 regext_size = fraglen - sizeof (regrep_t);
503 show_header("MIP: ", "Mobile IP Header", fraglen);
628 fraglen = interpret_extensions(regext_data, regext_size, REG);
H A Dsnoop_ldap.c121 interpret_ldap(flags, data, fraglen, src, dst)
124 int fraglen;
134 (void) decode_ldap(data, fraglen);
139 "Lightweight Directory Access Protocol Header", fraglen);
/illumos-gate/usr/src/uts/common/io/rtw/
H A Drtw.c2017 * fraglen: fragment length, set to maximum (or higher) for no
2034 uint32_t flags, int fraglen, int rate, struct rtw_ieee80211_duration *d0,
2051 npkt = paylen / fraglen;
2052 lastlen0 = paylen % fraglen;
2060 lastlen = fraglen + overlen;
2066 firstlen = fraglen + overlen;
2033 rtw_compute_duration(struct ieee80211_frame *wh, int len, uint32_t flags, int fraglen, int rate, struct rtw_ieee80211_duration *d0, struct rtw_ieee80211_duration *dn, int *npktp) argument
/illumos-gate/usr/src/uts/common/inet/sctp/
H A Dsctp_input.c944 uint16_t fraglen = 0; local
1141 * fraglen contains the length of consecutive chunks of fragments.
1149 fraglen += ntohs(qdc->sdh_len);
1153 srp->sr_msglen += fraglen;

Completed in 116 milliseconds