History log of /openbsd-src/lib/libpcap/gencode.c (Results 1 – 25 of 67)
Revision Date Author Comments
# f6e4162f 15-Sep-2024 jsg <jsg@openbsd.org>

remove unused variables


# 146262ea 08-Apr-2024 jsg <jsg@openbsd.org>

more ansi function decls
ok deraadt@


# 19fef815 05-Apr-2024 deraadt <deraadt@openbsd.org>

ANSI functions; ok tb


# 2c53affb 27-Dec-2022 jmc <jmc@openbsd.org>

spelling fixes; from paul tagliamonte
any changes not taken noted on tech, but chiefly here i did not take the
cancelation - cancellation changes;


# 9aff5a10 28-May-2022 deraadt <deraadt@openbsd.org>

clear cur_membag so that pcap can be used more than once


# c8ee1a74 28-May-2022 deraadt <deraadt@openbsd.org>

Do not walk off the end of the array performing frees
crash found by daharmasterkor


# daa036ab 28-Mar-2022 dlg <dlg@openbsd.org>

tweak the pflog ifname filter to include the terminating nul.

without this the code effectively just compares the start of the
string, which means you can get a prefix match unexpectedly. including

tweak the pflog ifname filter to include the terminating nul.

without this the code effectively just compares the start of the
string, which means you can get a prefix match unexpectedly. including
the nul in the comparison means it only works for whole interface
names, as it was originally intended.

reported by Aner Perez on misc@
ok deraadt@ (who also dug through the history behind this)

show more ...


# 0931029a 13-Feb-2022 otto <otto@openbsd.org>

Handle the case in freechunks where not a single allocation has happened.
ok deraadt@


# 6c734e6e 05-Dec-2021 deraadt <deraadt@openbsd.org>

libpcap parser uses a memory tracker to only free all objects at the end.
this code was slicing up large mallocs with sys/param.h ALIGN(). such a
scheme loses the many overflow/damage checking benef

libpcap parser uses a memory tracker to only free all objects at the end.
this code was slicing up large mallocs with sys/param.h ALIGN(). such a
scheme loses the many overflow/damage checking benefits of malloc per object.
Change the code to track independent allocations, rather than slicing.
ok gnezdo claudio

show more ...


# 426b943d 01-Dec-2021 deraadt <deraadt@openbsd.org>

we do not need 'struct mbuf; struct rtentry;' to satisfy some ancient unix
variant that made a header file mistake.
ok jsg


# ff78d6ed 18-Jan-2021 sthen <sthen@openbsd.org>

support PCAP_NETMASK_UNKNOWN, adapted from an old commit in upstream
libpcap, ok dlg@

https://github.com/the-tcpdump-group/libpcap/commit/74b2de364f3443fc2414d0160b0b942f347c6fd4
https://github.com/

support PCAP_NETMASK_UNKNOWN, adapted from an old commit in upstream
libpcap, ok dlg@

https://github.com/the-tcpdump-group/libpcap/commit/74b2de364f3443fc2414d0160b0b942f347c6fd4
https://github.com/the-tcpdump-group/libpcap/commit/117cb5eb2eb4fe212d3851f1205bb0b8f57873c6

show more ...


# fe3e795b 12-Sep-2020 kn <kn@openbsd.org>

Fix byte order handling for DLT_LOOP links

Fixing filters on DLT_LOOP revealed that we treat DLT_NULL, DLT_ENC and
DLT_LOOP the same way even though DLT_LOOP stores the AF value in network
not byte

Fix byte order handling for DLT_LOOP links

Fixing filters on DLT_LOOP revealed that we treat DLT_NULL, DLT_ENC and
DLT_LOOP the same way even though DLT_LOOP stores the AF value in network
not byte order like the rest.

This amends the missing conversion which ought to land with the recent
commit exposing the byte order mismatch:

revision 1.53
date: 2020/07/21 22:44:55; author: dlg; state: Exp; lines: +2 -2;
DLT_LOOP does have a link header, so tell pcap-filter so it can use it.
...
debugged with and ok kn@

Discussed with bluhm who reported src/regress/sys/netinet6/rip6cksum/
failing on i386 after above commit.

The comment in this commit is taken from libpcap upstream as is modulo
additional file-save related byte-order handling which we don't seem to do.

OK bluhm

show more ...


# 2cba36b5 03-Aug-2020 dlg <dlg@openbsd.org>

add "sample NUM" so you can ask to capture 1/NUM packets from a filter.

the use of the sample keyword matches similar config in other
products.

NUM can be a number between 2 and 1048576, and is use

add "sample NUM" so you can ask to capture 1/NUM packets from a filter.

the use of the sample keyword matches similar config in other
products.

NUM can be a number between 2 and 1048576, and is used to divide
0x100000000 into a threshold that is then compared against a randomly
generated number produced by a load of BPF_RND.

having sampling as part of the grammar means you can write things
like "icmp or sample 128". this lets you capture all icmp traffic
and a sample of the rest of the traffic.

ok jmatthew@ kn@ tb@

show more ...


# a8e9f808 03-Aug-2020 dlg <dlg@openbsd.org>

add support for handling loads from BPF_RND.

this adds "rnd" and "random" as keywords in the grammar, and handles
them as an arithmetic operator. the decoder recognises the load,
so tcpdump can prin

add support for handling loads from BPF_RND.

this adds "rnd" and "random" as keywords in the grammar, and handles
them as an arithmetic operator. the decoder recognises the load,
so tcpdump can print it as 'ld #random'. most of the handling is
copied from the "len"/"length" keywoard handling that generates and
decodes a load of the actual wire length of the packet.

ok jmatthew@ tb@ kn@

show more ...


# 0918526a 21-Jul-2020 dlg <dlg@openbsd.org>

DLT_LOOP does have a link header, so tell pcap-filter so it can use it.

matthieu@ reported that asking tcpdump to look at ip or ip6 traffic
on a wg(4) interface caused all packets to be captured. th

DLT_LOOP does have a link header, so tell pcap-filter so it can use it.

matthieu@ reported that asking tcpdump to look at ip or ip6 traffic
on a wg(4) interface caused all packets to be captured. this is
because pcap assumes that if your link type doesn't have a link
header then it is always ip or ip6 (which is weird anyway) and
captures everything.

there was already code to generate a filter for the DLT_LOOP link
header, it was just bypassed cos earlier code said that there wasn't
one.

debugged with and ok kn@

show more ...


# ff52dd4a 09-Dec-2018 denis <denis@openbsd.org>

add basic MPLS filtering support

OK claudio@ jca@


# 4f6bb374 10-Nov-2018 denis <denis@openbsd.org>

unbreak VLAN filtering

OK dlg@


# ac451769 09-Nov-2018 denis <denis@openbsd.org>

fix a typo

OK jca@ (from a long time ago...)


# aa4ed2b9 03-Jun-2018 sthen <sthen@openbsd.org>

Change some libpcap functions which use pointers as arguments and
returns to const pointers:

- the prefix argument to pcap_perror();
- the return value of pcap_strerror();
- the filter expression ar

Change some libpcap functions which use pointers as arguments and
returns to const pointers:

- the prefix argument to pcap_perror();
- the return value of pcap_strerror();
- the filter expression argument to pcap_compile() and pcap_compile_nopcap();
- the BPF filter program argument to bpf_image().

Matches changes made earlier in tcpdump.org's version of libpcap.
From Guy Harris, ok tb@, been through a bulk ports build.

show more ...


# 2524a2d3 06-Feb-2018 dlg <dlg@openbsd.org>

recognise DLT_PPP_SERIAL.

shlib version doesnt need a bump before no new symbols were added
or removed.

part of a larger diff that was ok sthen@


# d00b8992 03-Feb-2018 mpi <mpi@openbsd.org>

Simple USBPcap parser for tcpdump(8). Raw dumps can be nicely analysed
in wireshark.

ok deraadt@, dlg@


# 8167ef46 20-Nov-2016 reyk <reyk@openbsd.org>

Extend the DLT_OPENFLOW header to include the switch datapath id.

OK rzalamena@


# 7a61d4b0 16-Nov-2016 reyk <reyk@openbsd.org>

Add new DLT_OPENFLOW link-type to allow using tcpdump to debug switch(4),
eg. tcpdump -y openflow -i switch0

Includes a minor bump for libpcap.

Feedback and OK rzalamena@


# 526dd6c5 22-Dec-2015 mmcc <mmcc@openbsd.org>

remove NULL-checks before free()


# d0438536 17-Nov-2015 mmcc <mmcc@openbsd.org>

Remove register keyword.

ok deraadt@


123