Home
last modified time | relevance | path

Searched +full:packet +full:- +full:verification (Results 1 – 25 of 221) sorted by relevance

123456789

/external/scapy/test/scapy/layers/
Dipsec.uts8 + IPv4 / ESP - Transport - Encryption Algorithms
11 = IPv4 / ESP - Transport - NULL - NULL
12 ~ -crypto
41 * after decryption the original packet payload should be unaltered
45 = IPv4 / ESP - Transport - DES - NULL
63 * the encrypted packet should have an ESP layer
68 * after encryption the original packet payload should NOT be readable
74 * after decryption the original packet payload should be unaltered
77 # Generated with Linux 4.4.0-62-generic #83-Ubuntu
97 = IPv4 / ESP - Transport - 3DES - NULL
[all …]
/external/openthread/.github/workflows/
Dsimulation-1.4.yml33 branches-ignore:
34 - 'dependabot/**'
37 - 'main'
40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent…
41 cancel-in-progress: true
43 permissions: # added using https://github.com/step-security/secure-workflows
48 thread-1-4:
49 name: thread-1-4-${{ matrix.compiler.c }}-${{ matrix.arch }}
50 runs-on: ubuntu-22.04
52 CFLAGS: -${{ matrix.arch }}
[all …]
Dsimulation-1.1.yml33 branches-ignore:
34 - 'dependabot/**'
37 - 'main'
40 …group: ${{ github.workflow }}-${{ github.event.pull_request.number || (github.repository == 'opent…
41 cancel-in-progress: true
48 packet-verification:
49 runs-on: ubuntu-24.04
57 - name: Harden Runner
58 uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2
60 egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
[all …]
/external/webrtc/net/dcsctp/socket/
Ddcsctp_socket.cc4 * Use of this source code is governed by a BSD-style license
26 #include "net/dcsctp/packet/chunk/abort_chunk.h"
27 #include "net/dcsctp/packet/chunk/chunk.h"
28 #include "net/dcsctp/packet/chunk/cookie_ack_chunk.h"
29 #include "net/dcsctp/packet/chunk/cookie_echo_chunk.h"
30 #include "net/dcsctp/packet/chunk/data_chunk.h"
31 #include "net/dcsctp/packet/chunk/data_common.h"
32 #include "net/dcsctp/packet/chunk/error_chunk.h"
33 #include "net/dcsctp/packet/chunk/forward_tsn_chunk.h"
34 #include "net/dcsctp/packet/chunk/forward_tsn_common.h"
[all …]
Ddcsctp_socket.h4 * Use of this source code is governed by a BSD-style license
21 #include "net/dcsctp/packet/chunk/abort_chunk.h"
22 #include "net/dcsctp/packet/chunk/chunk.h"
23 #include "net/dcsctp/packet/chunk/cookie_ack_chunk.h"
24 #include "net/dcsctp/packet/chunk/cookie_echo_chunk.h"
25 #include "net/dcsctp/packet/chunk/data_chunk.h"
26 #include "net/dcsctp/packet/chunk/data_common.h"
27 #include "net/dcsctp/packet/chunk/error_chunk.h"
28 #include "net/dcsctp/packet/chunk/forward_tsn_chunk.h"
29 #include "net/dcsctp/packet/chunk/forward_tsn_common.h"
[all …]
Dtransmission_control_block.h4 * Use of this source code is governed by a BSD-style license
24 #include "net/dcsctp/packet/chunk/cookie_echo_chunk.h"
25 #include "net/dcsctp/packet/sctp_packet.h"
95 // Returns this socket's verification tag, set in all packet headers.
97 // Returns the peer's verification tag, which should be in received packets.
103 // A 64-bit tie-tag, used to e.g. detect reconnections.
109 // Sends a FORWARD-TSN, if it is needed and allowed (rate-limited).
113 // can only be a single packet outstanding, and it must contain the COOKIE
114 // ECHO chunk as the first chunk in that packet, until the COOKIE ACK has been
134 // present, then only one packet will be sent, with this chunk as the first
[all …]
Dcontext.h4 * Use of this source code is governed by a BSD-style license
17 #include "net/dcsctp/packet/sctp_packet.h"
57 // Returns a PacketBuilder, filled in with the correct verification tag.
60 // Builds the packet from `builder` and sends it.
/external/webrtc/net/dcsctp/packet/
Dsctp_packet_test.cc4 * Use of this source code is governed by a BSD-style license
10 #include "net/dcsctp/packet/sctp_packet.h"
19 #include "net/dcsctp/packet/chunk/abort_chunk.h"
20 #include "net/dcsctp/packet/chunk/cookie_ack_chunk.h"
21 #include "net/dcsctp/packet/chunk/data_chunk.h"
22 #include "net/dcsctp/packet/chunk/init_chunk.h"
23 #include "net/dcsctp/packet/chunk/sack_chunk.h"
24 #include "net/dcsctp/packet/error_cause/error_cause.h"
25 #include "net/dcsctp/packet/error_cause/user_initiated_abort_cause.h"
26 #include "net/dcsctp/packet/parameter/parameter.h"
[all …]
/external/openthread/tests/scripts/thread-cert/pktverify/
Dverify_result.py30 from pktverify.packet import Packet
36 Represents a verification result of a packet.
45 def record_last(self, name: str, pkts: PacketFilter) -> None:
47 Record the information of the last found packet.
50 :param pkts: The packet filter.
57 def packet_index(self, name: str) -> int:
59 Returns a recorded packet index.
62 :return: The packet index.
66 def packet(self, name: str) -> Packet: member in VerifyResult
68 Returns the recorded packet.
[all …]
/external/scapy/scapy/layers/tls/
Dtools.py1 # SPDX-License-Identifier: GPL-2.0-only
8 TLS helpers, provided as out-of-context methods.
17 from scapy.packet import Packet
22 class TLSPlaintext(Packet):
83 the verification process.
86 - The function returns True
87 - The packet p is updated in the following way: trailing MAC value is
98 received_h = p.data[-h_size:]
99 p.len -= h_size
100 p.data = p.data[:-h_size]
[all …]
/external/ethtool/
Dethtool.8.in1 .\" -*- nroff -*-
9 .\" .An - list of n alternative values as in "flav vanilla|strawberry"
24 .\" .Bn - same as above but framed by square brackets
39 .\" .BN - value with a numeric input as in "[value N]"
45 .\" .BM - same as above but has a mask field for format "[value N [m N]]"
51 .\" \(*MA - mac address
55 .\" \(*MS - master-slave property
59 .\" \(*PA - IP address
63 .\" \(*WO - wol flags
67 .\" \(*FL - flow type values
[all …]
/external/apache-harmony/jdwp/src/test/java/org/apache/harmony/jpda/tests/jdwp/share/
DJDWPTestCase.java9 * http://www.apache.org/licenses/LICENSE-2.0
34 import org.apache.harmony.jpda.tests.framework.jdwp.Packet;
72 logWriter.println("Adjusted VM-dependent type lengths"); in internalSetUp()
147 logWriter.println("Adjusted VM-dependent type lengths"); in openConnection()
174 * @param objectID -
186 * @param objectID -
206 * @param classID -
208 * @param methodName -
219 * @param classID -
221 * @param methodName -
[all …]
/external/coreboot/src/vendorcode/intel/edk2/UDK2017/MdePkg/Include/Protocol/
DTls.h13 http://opensource.org/licenses/bsd-license.php
174 /// of the certificate verification result.
179 /// the reason for the certificate verification failure.
188 /// re-negotiation.
237 /// data from peer, then get response packet and send to peer. After handshake
356 Build response packet according to TLS state machine. This function is only valid for
359 The BuildResponsePacket() function builds TLS response packet in response to the TLS
360 request packet specified by RequestBuffer and RequestSize. If RequestBuffer is NULL and
362 will be initiated and the response packet needs to be ClientHello. If RequestBuffer is
364 session will be closed and response packet needs to be CloseNotify. If RequestBuffer is
[all …]
/external/cronet/stable/net/third_party/quiche/src/quiche/quic/core/
Dquic_crypto_client_stream.h2 // Use of this source code is governed by a BSD-style license that can be
47 // than the number of round-trips needed for the handshake.
54 // handshake. Resumption only makes sense for TLS handshakes - there is no
55 // concept of resumption for QUIC crypto even though it supports a 0-RTT
60 // Returns true if early data (0-RTT) was accepted in the connection.
65 // crypto handshakes. The equivalent feature in IETF QUIC is a Retry packet,
108 // * One failure due to an incorrect or missing source-address token.
110 // the server being unwilling to send it without a valid source-address
141 // than the number of round-trips needed for the handshake.
148 // full handshake. Resumption only makes sense for TLS handshakes - there is
[all …]
/external/cronet/tot/net/third_party/quiche/src/quiche/quic/core/
Dquic_crypto_client_stream.h2 // Use of this source code is governed by a BSD-style license that can be
47 // than the number of round-trips needed for the handshake.
54 // handshake. Resumption only makes sense for TLS handshakes - there is no
55 // concept of resumption for QUIC crypto even though it supports a 0-RTT
60 // Returns true if early data (0-RTT) was accepted in the connection.
65 // crypto handshakes. The equivalent feature in IETF QUIC is a Retry packet,
108 // * One failure due to an incorrect or missing source-address token.
110 // the server being unwilling to send it without a valid source-address
141 // than the number of round-trips needed for the handshake.
148 // full handshake. Resumption only makes sense for TLS handshakes - there is
[all …]
/external/perfetto/src/trace_redaction/
Dtrace_redactor.h8 * http://www.apache.org/licenses/LICENSE-2.0
78 // fails verification.
85 // Run all collectors on a packet because moving to the next package.
89 // for packet in packets:
91 // collector(context, packet)
105 // Runs all transformers on a packet before moving to the next package.
109 // for packet in packets:
111 // transform(context, packet)
/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202302/MdePkg/Include/Protocol/
DTls.h10 SPDX-License-Identifier: BSD-2-Clause-Patent
169 /// of the certificate verification result.
174 /// the reason for the certificate verification failure.
184 /// re-negotiation.
194 /// Wildcards are supported and they match only in the left-most label.
215 /// Restrict to only match direct child sub-domains which start with ".".
287 /// data from peer, then get response packet and send to peer. After handshake
405 Build response packet according to TLS state machine. This function is only valid for
408 The BuildResponsePacket() function builds TLS response packet in response to the TLS
409 request packet specified by RequestBuffer and RequestSize. If RequestBuffer is NULL and
[all …]
/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202111/MdePkg/Include/Protocol/
DTls.h10 SPDX-License-Identifier: BSD-2-Clause-Patent
169 /// of the certificate verification result.
174 /// the reason for the certificate verification failure.
184 /// re-negotiation.
194 /// Wildcards are supported and they match only in the left-most label.
215 /// Restrict to only match direct child sub-domains which start with ".".
287 /// data from peer, then get response packet and send to peer. After handshake
406 Build response packet according to TLS state machine. This function is only valid for
409 The BuildResponsePacket() function builds TLS response packet in response to the TLS
410 request packet specified by RequestBuffer and RequestSize. If RequestBuffer is NULL and
[all …]
/external/coreboot/src/vendorcode/intel/edk2/edk2-stable202005/MdePkg/Include/Protocol/
DTls.h10 SPDX-License-Identifier: BSD-2-Clause-Patent
169 /// of the certificate verification result.
174 /// the reason for the certificate verification failure.
184 /// re-negotiation.
194 /// Wildcards are supported and they match only in the left-most label.
215 /// Restrict to only match direct child sub-domains which start with ".".
287 /// data from peer, then get response packet and send to peer. After handshake
406 Build response packet according to TLS state machine. This function is only valid for
409 The BuildResponsePacket() function builds TLS response packet in response to the TLS
410 request packet specified by RequestBuffer and RequestSize. If RequestBuffer is NULL and
[all …]
/external/cronet/tot/net/third_party/quiche/src/quiche/quic/masque/
Dmasque_server_session.cc2 // Use of this source code is governed by a BSD-style license that can be
118 response_headers["masque-debug-info"] = error_details; in CreateBackendErrorResponse()
120 response->set_response_type(QuicBackendResponse::REGULAR_RESPONSE); in CreateBackendErrorResponse()
121 response->set_headers(std::move(response_headers)); in CreateBackendErrorResponse()
141 // Artificially increase the max packet length to ensure we can fit QUIC in MasqueServerSession()
144 connection->SetMaxPacketLength(kDefaultMaxPacketSizeForTunnels); in MasqueServerSession()
146 masque_server_backend_->RegisterBackendClient(connection_id(), this); in MasqueServerSession()
150 // clang's `-Wunused-private-field` warning for this when building QUICHE for in MasqueServerSession()
168 masque_server_backend_->RemoveBackendClient(connection_id()); in OnConnectionClosed()
176 return connect_udp.stream()->id() == stream_id; in OnStreamClosed()
[all …]
/external/cronet/stable/net/third_party/quiche/src/quiche/quic/masque/
Dmasque_server_session.cc2 // Use of this source code is governed by a BSD-style license that can be
118 response_headers["masque-debug-info"] = error_details; in CreateBackendErrorResponse()
120 response->set_response_type(QuicBackendResponse::REGULAR_RESPONSE); in CreateBackendErrorResponse()
121 response->set_headers(std::move(response_headers)); in CreateBackendErrorResponse()
141 // Artificially increase the max packet length to ensure we can fit QUIC in MasqueServerSession()
144 connection->SetMaxPacketLength(kDefaultMaxPacketSizeForTunnels); in MasqueServerSession()
146 masque_server_backend_->RegisterBackendClient(connection_id(), this); in MasqueServerSession()
150 // clang's `-Wunused-private-field` warning for this when building QUICHE for in MasqueServerSession()
168 masque_server_backend_->RemoveBackendClient(connection_id()); in OnConnectionClosed()
176 return connect_udp.stream()->id() == stream_id; in OnStreamClosed()
[all …]
/external/autotest/server/cros/chaos_lib/
Dchaos_analyzer_usage.txt1 Used to analyze the chaos logs & packet captures and produce a consolidated analysis of each test a…
6 Download the source tarball from here: https://drive.google.com/a/google.com/file/d/0B-W7uZuGgJr6Ql…
9 cd pyshark-master/src
17 … each attempt is stored in the same folder as the packet captures with the name: chaos_analyzer_tr…
20 --------------------------------------
21 Packet Capture File: connect_try_4_fail.trc
22 --------------------------------------
24 DUT packet count Tx : 4, Rx : 0, DUT: 14:7d:c5:e6:41:24
25 --------------------------------------
26 WLAN Protocol Verification
[all …]
/external/openthread/third_party/mbedtls/repo/tests/
Dssl-opt.sh3 # ssl-opt.sh
6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
21 set -u
25 ulimit -f 20971520
38 : ${GNUTLS_CLI:=gnutls-cli}
39 : ${GNUTLS_SERV:=gnutls-serv}
54 if git diff --quiet ../include/mbedtls/mbedtls_config.h 2>/dev/null; then
62 : ${MBEDTLS_TEST_PLATFORM:="$(uname -s | tr -c \\n0-9A-Za-z _)-$(uname -m | tr -c \\n0-9A-Za-z _)"}
65 O_SRV="$OPENSSL s_server -www -cert data_files/server5.crt -key data_files/server5.key"
67 G_SRV="$GNUTLS_SERV --x509certfile data_files/server5.crt --x509keyfile data_files/server5.key"
[all …]
/external/mbedtls/tests/
Dssl-opt.sh3 # ssl-opt.sh
6 # SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
21 set -u
25 ulimit -f 20971520
38 : ${GNUTLS_CLI:=gnutls-cli}
39 : ${GNUTLS_SERV:=gnutls-serv}
54 if git diff --quiet ../include/mbedtls/mbedtls_config.h 2>/dev/null; then
62 : ${MBEDTLS_TEST_PLATFORM:="$(uname -s | tr -c \\n0-9A-Za-z _)-$(uname -m | tr -c \\n0-9A-Za-z _)"}
64 O_SRV="$OPENSSL s_server -www -cert data_files/server5.crt -key data_files/server5.key"
66 G_SRV="$GNUTLS_SERV --x509certfile data_files/server5.crt --x509keyfile data_files/server5.key"
[all …]
/external/rust/android-crates-io/crates/quiche/include/
Dquiche.h1 // Copyright (C) 2018-2019, Cloudflare, Inc.
69 QUICHE_ERR_DONE = -1,
72 QUICHE_ERR_BUFFER_TOO_SHORT = -2,
74 // The provided packet cannot be parsed because its version is unknown.
75 QUICHE_ERR_UNKNOWN_VERSION = -3,
77 // The provided packet cannot be parsed because it contains an invalid
79 QUICHE_ERR_INVALID_FRAME = -4,
81 // The provided packet cannot be parsed.
82 QUICHE_ERR_INVALID_PACKET = -5,
86 QUICHE_ERR_INVALID_STATE = -6,
[all …]

123456789