Lines Matching refs:packet

1217 	 * see if the packet has been checksummed already (I think)
1620 /* Adjust packet back to original */
1743 __unused mbuf_t packet, __unused char *header)
1745 printf("%s: unexpected packet from %s%d\n", __func__,
2886 * Enqueue a packet on a bridge member interface.
2917 * then attach a packet tag that holds it.
2960 * Receive a queued packet from dummynet and pass it on to the output
2973 * The packet didnt originate from a member interface. This should only
3037 * If the packet is an 802.1X ethertype, then only send on the
3047 * go ahead and send out that interface. Otherwise, the packet
3056 * If the packet is a multicast, or we don't know a better way to
3160 printf("%s: transmitting packet tagged with VLAN?\n", __func__);
3194 * invalid packet header data is the fact that the M_PKTHDR
3262 /* now attach the ethernet header back onto the IP packet */
3267 * clear the M_PKTHDR flags on the ip packet (again,
3340 * now split the ethernet header off of the IP packet
3353 * make sure that the IP packet is writable
3408 // now attach the ethernet header back onto the IP packet
3413 * clear the M_PKTHDR flags on the ip packet
3451 * APPLE MODIFICATION - if the packet needs a checksum
3580 * If the packet is unicast, destined for someone on
3607 * OR this is a unicast packet, push it through the bpf(4) machinery.
3611 * drop the packet, or possibly modify it, making it difficult to debug
3624 /* run the packet filter */
3641 * Clear any in-bound checksum flags for this packet.
3697 * Clear any in-bound checksum flags for this packet.
3727 * Filter input from a member interface. Queue the packet for
3764 * set on this interface, discard the packet once we push it through
3766 * packet counters associated with this interface.
3836 * Make a deep copy of the packet and enqueue the copy
3837 * for bridge processing; return the original packet for
3868 // mark packet as arriving on the bridge
3894 /* Return the original packet for local processing. */
3962 /* We just received a packet that we sent out. */ \
3973 * If the packet is for us, set the packets source as the
3974 * bridge, and return the packet back to ether_input for
3980 /* Mark the packet as arriving on the bridge interface */
4010 printf("%s: %s%d packet for bridge\n", __func__,
4020 * if the destination of the packet is for the MAC address of
4026 * then it will consume the packet
4035 printf("%s: not forwarding packet bound for member "
4066 * the bridge, except for the one on which the packet
4180 * Duplicate a packet out one or more interfaces that are in span mode,
4704 * question.) If *bifp or *ifp are NULL then packet filtering is skipped for
4820 goto ipfwpass; /* packet already partially processed */
4843 * packet will return to us via bridge_dummynet().
4858 * Run the packet through pfil
4899 /* check if we need to fragment the packet */
5059 /* Retrieve the packet length. */
5073 * Drop packet if shorter than we expect.