| /external/scapy/test/scapy/layers/ |
| D | ipsec.uts | 8 + IPv4 / ESP - Transport - Encryption Algorithms 11 = IPv4 / ESP - Transport - NULL - NULL 12 ~ -crypto 41 * after decryption the original packet payload should be unaltered 45 = IPv4 / ESP - Transport - DES - NULL 63 * the encrypted packet should have an ESP layer 68 * after encryption the original packet payload should NOT be readable 74 * after decryption the original packet payload should be unaltered 77 # Generated with Linux 4.4.0-62-generic #83-Ubuntu 97 = IPv4 / ESP - Transport - 3DES - NULL [all …]
|
| /external/openthread/.github/workflows/ |
| D | simulation-1.4.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 43 permissions: # added using https://github.com/step-security/secure-workflows 48 thread-1-4: 49 name: thread-1-4-${{ matrix.compiler.c }}-${{ matrix.arch }} 50 runs-on: ubuntu-22.04 52 CFLAGS: -${{ matrix.arch }} [all …]
|
| D | simulation-1.1.yml | 33 branches-ignore: 34 - 'dependabot/**' 37 - 'main' 40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent… 41 cancel-in-progress: true 48 packet-verification: 49 runs-on: ubuntu-24.04 57 - name: Harden Runner 58 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2 60 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs [all …]
|
| /external/webrtc/net/dcsctp/socket/ |
| D | dcsctp_socket.cc | 4 * Use of this source code is governed by a BSD-style license 26 #include "net/dcsctp/packet/chunk/abort_chunk.h" 27 #include "net/dcsctp/packet/chunk/chunk.h" 28 #include "net/dcsctp/packet/chunk/cookie_ack_chunk.h" 29 #include "net/dcsctp/packet/chunk/cookie_echo_chunk.h" 30 #include "net/dcsctp/packet/chunk/data_chunk.h" 31 #include "net/dcsctp/packet/chunk/data_common.h" 32 #include "net/dcsctp/packet/chunk/error_chunk.h" 33 #include "net/dcsctp/packet/chunk/forward_tsn_chunk.h" 34 #include "net/dcsctp/packet/chunk/forward_tsn_common.h" [all …]
|
| D | dcsctp_socket.h | 4 * Use of this source code is governed by a BSD-style license 21 #include "net/dcsctp/packet/chunk/abort_chunk.h" 22 #include "net/dcsctp/packet/chunk/chunk.h" 23 #include "net/dcsctp/packet/chunk/cookie_ack_chunk.h" 24 #include "net/dcsctp/packet/chunk/cookie_echo_chunk.h" 25 #include "net/dcsctp/packet/chunk/data_chunk.h" 26 #include "net/dcsctp/packet/chunk/data_common.h" 27 #include "net/dcsctp/packet/chunk/error_chunk.h" 28 #include "net/dcsctp/packet/chunk/forward_tsn_chunk.h" 29 #include "net/dcsctp/packet/chunk/forward_tsn_common.h" [all …]
|
| D | transmission_control_block.h | 4 * Use of this source code is governed by a BSD-style license 24 #include "net/dcsctp/packet/chunk/cookie_echo_chunk.h" 25 #include "net/dcsctp/packet/sctp_packet.h" 95 // Returns this socket's verification tag, set in all packet headers. 97 // Returns the peer's verification tag, which should be in received packets. 103 // A 64-bit tie-tag, used to e.g. detect reconnections. 109 // Sends a FORWARD-TSN, if it is needed and allowed (rate-limited). 113 // can only be a single packet outstanding, and it must contain the COOKIE 114 // ECHO chunk as the first chunk in that packet, until the COOKIE ACK has been 134 // present, then only one packet will be sent, with this chunk as the first [all …]
|
| D | context.h | 4 * Use of this source code is governed by a BSD-style license 17 #include "net/dcsctp/packet/sctp_packet.h" 57 // Returns a PacketBuilder, filled in with the correct verification tag. 60 // Builds the packet from `builder` and sends it.
|
| /external/webrtc/net/dcsctp/packet/ |
| D | sctp_packet_test.cc | 4 * Use of this source code is governed by a BSD-style license 10 #include "net/dcsctp/packet/sctp_packet.h" 19 #include "net/dcsctp/packet/chunk/abort_chunk.h" 20 #include "net/dcsctp/packet/chunk/cookie_ack_chunk.h" 21 #include "net/dcsctp/packet/chunk/data_chunk.h" 22 #include "net/dcsctp/packet/chunk/init_chunk.h" 23 #include "net/dcsctp/packet/chunk/sack_chunk.h" 24 #include "net/dcsctp/packet/error_cause/error_cause.h" 25 #include "net/dcsctp/packet/error_cause/user_initiated_abort_cause.h" 26 #include "net/dcsctp/packet/parameter/parameter.h" [all …]
|
| /external/openthread/tests/scripts/thread-cert/pktverify/ |
| D | verify_result.py | 30 from pktverify.packet import Packet 36 Represents a verification result of a packet. 45 def record_last(self, name: str, pkts: PacketFilter) -> None: 47 Record the information of the last found packet. 50 :param pkts: The packet filter. 57 def packet_index(self, name: str) -> int: 59 Returns a recorded packet index. 62 :return: The packet index. 66 def packet(self, name: str) -> Packet: member in VerifyResult 68 Returns the recorded packet. [all …]
|
| /external/scapy/scapy/layers/tls/ |
| D | tools.py | 1 # SPDX-License-Identifier: GPL-2.0-only 8 TLS helpers, provided as out-of-context methods. 17 from scapy.packet import Packet 22 class TLSPlaintext(Packet): 83 the verification process. 86 - The function returns True 87 - The packet p is updated in the following way: trailing MAC value is 98 received_h = p.data[-h_size:] 99 p.len -= h_size 100 p.data = p.data[:-h_size] [all …]
|
| /external/ethtool/ |
| D | ethtool.8.in | 1 .\" -*- nroff -*- 9 .\" .An - list of n alternative values as in "flav vanilla|strawberry" 24 .\" .Bn - same as above but framed by square brackets 39 .\" .BN - value with a numeric input as in "[value N]" 45 .\" .BM - same as above but has a mask field for format "[value N [m N]]" 51 .\" \(*MA - mac address 55 .\" \(*MS - master-slave property 59 .\" \(*PA - IP address 63 .\" \(*WO - wol flags 67 .\" \(*FL - flow type values [all …]
|
| /external/apache-harmony/jdwp/src/test/java/org/apache/harmony/jpda/tests/jdwp/share/ |
| D | JDWPTestCase.java | 9 * http://www.apache.org/licenses/LICENSE-2.0 34 import org.apache.harmony.jpda.tests.framework.jdwp.Packet; 72 logWriter.println("Adjusted VM-dependent type lengths"); in internalSetUp() 147 logWriter.println("Adjusted VM-dependent type lengths"); in openConnection() 174 * @param objectID - 186 * @param objectID - 206 * @param classID - 208 * @param methodName - 219 * @param classID - 221 * @param methodName - [all …]
|
| /external/coreboot/src/vendorcode/intel/edk2/UDK2017/MdePkg/Include/Protocol/ |
| D | Tls.h | 13 http://opensource.org/licenses/bsd-license.php 174 /// of the certificate verification result. 179 /// the reason for the certificate verification failure. 188 /// re-negotiation. 237 /// data from peer, then get response packet and send to peer. After handshake 356 Build response packet according to TLS state machine. This function is only valid for 359 The BuildResponsePacket() function builds TLS response packet in response to the TLS 360 request packet specified by RequestBuffer and RequestSize. If RequestBuffer is NULL and 362 will be initiated and the response packet needs to be ClientHello. If RequestBuffer is 364 session will be closed and response packet needs to be CloseNotify. If RequestBuffer is [all …]
|
| /external/cronet/stable/net/third_party/quiche/src/quiche/quic/core/ |
| D | quic_crypto_client_stream.h | 2 // Use of this source code is governed by a BSD-style license that can be 47 // than the number of round-trips needed for the handshake. 54 // handshake. Resumption only makes sense for TLS handshakes - there is no 55 // concept of resumption for QUIC crypto even though it supports a 0-RTT 60 // Returns true if early data (0-RTT) was accepted in the connection. 65 // crypto handshakes. The equivalent feature in IETF QUIC is a Retry packet, 108 // * One failure due to an incorrect or missing source-address token. 110 // the server being unwilling to send it without a valid source-address 141 // than the number of round-trips needed for the handshake. 148 // full handshake. Resumption only makes sense for TLS handshakes - there is [all …]
|
| /external/cronet/tot/net/third_party/quiche/src/quiche/quic/core/ |
| D | quic_crypto_client_stream.h | 2 // Use of this source code is governed by a BSD-style license that can be 47 // than the number of round-trips needed for the handshake. 54 // handshake. Resumption only makes sense for TLS handshakes - there is no 55 // concept of resumption for QUIC crypto even though it supports a 0-RTT 60 // Returns true if early data (0-RTT) was accepted in the connection. 65 // crypto handshakes. The equivalent feature in IETF QUIC is a Retry packet, 108 // * One failure due to an incorrect or missing source-address token. 110 // the server being unwilling to send it without a valid source-address 141 // than the number of round-trips needed for the handshake. 148 // full handshake. Resumption only makes sense for TLS handshakes - there is [all …]
|
| /external/perfetto/src/trace_redaction/ |
| D | trace_redactor.h | 8 * http://www.apache.org/licenses/LICENSE-2.0 78 // fails verification. 85 // Run all collectors on a packet because moving to the next package. 89 // for packet in packets: 91 // collector(context, packet) 105 // Runs all transformers on a packet before moving to the next package. 109 // for packet in packets: 111 // transform(context, packet)
|
| /external/coreboot/src/vendorcode/intel/edk2/edk2-stable202302/MdePkg/Include/Protocol/ |
| D | Tls.h | 10 SPDX-License-Identifier: BSD-2-Clause-Patent 169 /// of the certificate verification result. 174 /// the reason for the certificate verification failure. 184 /// re-negotiation. 194 /// Wildcards are supported and they match only in the left-most label. 215 /// Restrict to only match direct child sub-domains which start with ".". 287 /// data from peer, then get response packet and send to peer. After handshake 405 Build response packet according to TLS state machine. This function is only valid for 408 The BuildResponsePacket() function builds TLS response packet in response to the TLS 409 request packet specified by RequestBuffer and RequestSize. If RequestBuffer is NULL and [all …]
|
| /external/coreboot/src/vendorcode/intel/edk2/edk2-stable202111/MdePkg/Include/Protocol/ |
| D | Tls.h | 10 SPDX-License-Identifier: BSD-2-Clause-Patent 169 /// of the certificate verification result. 174 /// the reason for the certificate verification failure. 184 /// re-negotiation. 194 /// Wildcards are supported and they match only in the left-most label. 215 /// Restrict to only match direct child sub-domains which start with ".". 287 /// data from peer, then get response packet and send to peer. After handshake 406 Build response packet according to TLS state machine. This function is only valid for 409 The BuildResponsePacket() function builds TLS response packet in response to the TLS 410 request packet specified by RequestBuffer and RequestSize. If RequestBuffer is NULL and [all …]
|
| /external/coreboot/src/vendorcode/intel/edk2/edk2-stable202005/MdePkg/Include/Protocol/ |
| D | Tls.h | 10 SPDX-License-Identifier: BSD-2-Clause-Patent 169 /// of the certificate verification result. 174 /// the reason for the certificate verification failure. 184 /// re-negotiation. 194 /// Wildcards are supported and they match only in the left-most label. 215 /// Restrict to only match direct child sub-domains which start with ".". 287 /// data from peer, then get response packet and send to peer. After handshake 406 Build response packet according to TLS state machine. This function is only valid for 409 The BuildResponsePacket() function builds TLS response packet in response to the TLS 410 request packet specified by RequestBuffer and RequestSize. If RequestBuffer is NULL and [all …]
|
| /external/cronet/tot/net/third_party/quiche/src/quiche/quic/masque/ |
| D | masque_server_session.cc | 2 // Use of this source code is governed by a BSD-style license that can be 118 response_headers["masque-debug-info"] = error_details; in CreateBackendErrorResponse() 120 response->set_response_type(QuicBackendResponse::REGULAR_RESPONSE); in CreateBackendErrorResponse() 121 response->set_headers(std::move(response_headers)); in CreateBackendErrorResponse() 141 // Artificially increase the max packet length to ensure we can fit QUIC in MasqueServerSession() 144 connection->SetMaxPacketLength(kDefaultMaxPacketSizeForTunnels); in MasqueServerSession() 146 masque_server_backend_->RegisterBackendClient(connection_id(), this); in MasqueServerSession() 150 // clang's `-Wunused-private-field` warning for this when building QUICHE for in MasqueServerSession() 168 masque_server_backend_->RemoveBackendClient(connection_id()); in OnConnectionClosed() 176 return connect_udp.stream()->id() == stream_id; in OnStreamClosed() [all …]
|
| /external/cronet/stable/net/third_party/quiche/src/quiche/quic/masque/ |
| D | masque_server_session.cc | 2 // Use of this source code is governed by a BSD-style license that can be 118 response_headers["masque-debug-info"] = error_details; in CreateBackendErrorResponse() 120 response->set_response_type(QuicBackendResponse::REGULAR_RESPONSE); in CreateBackendErrorResponse() 121 response->set_headers(std::move(response_headers)); in CreateBackendErrorResponse() 141 // Artificially increase the max packet length to ensure we can fit QUIC in MasqueServerSession() 144 connection->SetMaxPacketLength(kDefaultMaxPacketSizeForTunnels); in MasqueServerSession() 146 masque_server_backend_->RegisterBackendClient(connection_id(), this); in MasqueServerSession() 150 // clang's `-Wunused-private-field` warning for this when building QUICHE for in MasqueServerSession() 168 masque_server_backend_->RemoveBackendClient(connection_id()); in OnConnectionClosed() 176 return connect_udp.stream()->id() == stream_id; in OnStreamClosed() [all …]
|
| /external/autotest/server/cros/chaos_lib/ |
| D | chaos_analyzer_usage.txt | 1 Used to analyze the chaos logs & packet captures and produce a consolidated analysis of each test a… 6 Download the source tarball from here: https://drive.google.com/a/google.com/file/d/0B-W7uZuGgJr6Ql… 9 cd pyshark-master/src 17 … each attempt is stored in the same folder as the packet captures with the name: chaos_analyzer_tr… 20 -------------------------------------- 21 Packet Capture File: connect_try_4_fail.trc 22 -------------------------------------- 24 DUT packet count Tx : 4, Rx : 0, DUT: 14:7d:c5:e6:41:24 25 -------------------------------------- 26 WLAN Protocol Verification [all …]
|
| /external/openthread/third_party/mbedtls/repo/tests/ |
| D | ssl-opt.sh | 3 # ssl-opt.sh 6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 21 set -u 25 ulimit -f 20971520 38 : ${GNUTLS_CLI:=gnutls-cli} 39 : ${GNUTLS_SERV:=gnutls-serv} 54 if git diff --quiet ../include/mbedtls/mbedtls_config.h 2>/dev/null; then 62 : ${MBEDTLS_TEST_PLATFORM:="$(uname -s | tr -c \\n0-9A-Za-z _)-$(uname -m | tr -c \\n0-9A-Za-z _)"} 65 O_SRV="$OPENSSL s_server -www -cert data_files/server5.crt -key data_files/server5.key" 67 G_SRV="$GNUTLS_SERV --x509certfile data_files/server5.crt --x509keyfile data_files/server5.key" [all …]
|
| /external/mbedtls/tests/ |
| D | ssl-opt.sh | 3 # ssl-opt.sh 6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later 21 set -u 25 ulimit -f 20971520 38 : ${GNUTLS_CLI:=gnutls-cli} 39 : ${GNUTLS_SERV:=gnutls-serv} 54 if git diff --quiet ../include/mbedtls/mbedtls_config.h 2>/dev/null; then 62 : ${MBEDTLS_TEST_PLATFORM:="$(uname -s | tr -c \\n0-9A-Za-z _)-$(uname -m | tr -c \\n0-9A-Za-z _)"} 64 O_SRV="$OPENSSL s_server -www -cert data_files/server5.crt -key data_files/server5.key" 66 G_SRV="$GNUTLS_SERV --x509certfile data_files/server5.crt --x509keyfile data_files/server5.key" [all …]
|
| /external/rust/android-crates-io/crates/quiche/include/ |
| D | quiche.h | 1 // Copyright (C) 2018-2019, Cloudflare, Inc. 69 QUICHE_ERR_DONE = -1, 72 QUICHE_ERR_BUFFER_TOO_SHORT = -2, 74 // The provided packet cannot be parsed because its version is unknown. 75 QUICHE_ERR_UNKNOWN_VERSION = -3, 77 // The provided packet cannot be parsed because it contains an invalid 79 QUICHE_ERR_INVALID_FRAME = -4, 81 // The provided packet cannot be parsed. 82 QUICHE_ERR_INVALID_PACKET = -5, 86 QUICHE_ERR_INVALID_STATE = -6, [all …]
|