Lines Matching defs:packet

201 	"Maximum number of IPv4 fragments allowed per packet");
232 &ip_checkinterface, 0, "Verify packet arrives on correct interface");
326 * to an incoming packet over the same route if the packet got here
544 mbuf_t packet;
549 for (packet = packet_list; packet; packet = packet_list) {
551 packet_list = mbuf_nextpkt(packet);
552 mbuf_setnextpkt(packet, NULL);
553 ip_input(packet);
610 * if needed, before passing packet
682 u_int32_t div_info = 0; /* packet divert/tee info */
763 * No need to process packet twice if we've already seen it.
882 * Drop packet if shorter than we expect.
906 /* Invoke inbound packet filter */
916 panic("%s: unexpected packet %p\n", __func__, m);
937 * Check if we want to allow this packet to be processed.
967 /* Send packet to the appropriate pipe */
974 /* Divert or tee packet */
985 * if we get here, the packet must be dropped
997 * to be sent and the original packet to be freed).
1008 /* greedy RSVP, snatches any PATH packet of the RSVP protocol and no
1012 * grabbing the packet.
1018 * Check our list of addresses, to see if the packet is for us.
1019 * If we don't have any addresses, assume any unicast packet
1028 * Cache the destination address of the packet; this may be
1040 * and the arrival interface for a unicast packet (the RFC 1122
1041 * strong ES model) if IP forwarding is disabled and the packet
1042 * is not locally generated and the packet is not subject to
1066 * If the address matches, verify that the packet
1121 * The packet is returned (relatively) intact; if
1122 * ip_mforward() returns a non-zero value, the packet
1201 * if the packet was previously fragmented,
1216 * oldest fragemented packet to make space.
1229 * discard, drop this packet too.
1289 /* Clear the flag in case packet comes from loopback */
1313 /* Get the header length of the reassembled packet */
1317 /* Restore original checksum before diverting packet */
1343 * Divert or tee packet to the divert protocol if required.
1351 /* Clone packet if we're doing a 'tee' */
1355 /* Restore packet header fields to original values */
1362 /* Deliver packet to divert input routine */
1366 /* If 'tee', continue with original packet */
1449 * When IPDIVERT enabled, keep additional state with each packet that
1450 * tells us if we need to divert or tee the packet we're building.
1530 * drop if CE and not-ECT are mixed for the same packet.
1619 * Check for complete reassembly and perform frag per packet
1623 * a chance to complete the packet before we drop the packet.
1624 * As a result, n+1 frags are actually allowed per packet, but
1639 /* Make sure the last packet didn't have the IP_MF flag */
1649 * Reassembly is complete. Make sure the packet is a sane size.
1698 * Create header for new ip packet by
1699 * modifying header of first packet;
1820 * non-routing options should be processed only if the packet is for us.
1821 * Returns 1 if packet has been forwarded/freed,
1822 * 0 if the packet should be processed further.
2330 * Forward a packet. If some error occurs return the sender
2331 * an icmp packet. Note we can't always generate a meaningful
2335 * If not forwarding, just drop the packet. This could be confusing
2340 * The srcrt parameter indicates whether the packet is being forwarded
2367 * Cache the destination address of the packet; this may be
2455 * If forwarding packet using same interface that it came in on,
2458 * and if packet was not source routed (or has any options).
2527 * the packet was successfully consumed by
2566 * If the packet is routed over IPsec tunnel, tell the
2658 case EACCES: /* ipfw denied packet */
2865 * Either this is not loopback packet coming from an interface
2867 * packet that has undergone software checksumming at the send
2869 * calculate the checksum in software to validate the packet.
2874 * This is a loopback packet without any valid checksum since