Lines Matching refs:packet

294 	mbuf_t				packet)
296 ip6_input(packet);
494 /* Check if the packet we received is valid after interface filter
522 * No need to proccess packet twice if we've
536 * should the inner packet be considered authentic?
573 * Drop the packet if IPv6 operation is disabled on the IF;
645 /* If ipfw says divert, we have to just drop packet */
671 * In this case, the packet should come from the loopback
740 /* Invoke inbound packet filter */
750 panic("%s: unexpected packet %p\n", __func__, m);
829 * Accept the packet if the forwarding interface to the destination
832 * Note that this approach causes to accept a packet if there is a
833 * route to the loopback interface for the destination of the packet.
835 * a special daemon which wants to intercept the packet.
838 * of an outgoing packet. If the outgoing interface of the packet
839 * is a loopback one, the kernel would consider the packet to be
882 /* Count the packet in the ip address stats */
890 /* address is not ready, so discard the packet. */
892 "ip6_input: packet to an unready address %s->%s\n",
903 * Now there is no reason to process the packet if it's not our own
923 * XXX maybe we should drop the packet here,
990 * If we are acting as a router and the packet contains a
993 * case we should pass the packet to the multicast routing
1016 * Drop packet if shorter than we expect.
1039 * The packet is returned (relatively) intact; if
1040 * ip6_mforward() returns a non-zero value, the packet
1054 * if so, claim the packet and let icmp6_input()
1065 * The unicast forwarding function might return the packet
1066 * if we are proxying prefix(es), and if the packet is an
1067 * ICMPv6 packet that has failed the zone checks, but is
1069 * way of RTF_PROXY test.) If so, claim the packet as ours
1070 * and let icmp6_input() handle the rest. The packet's hop
1128 * protection against faulty packet - there should be
1383 * *plenp will be non-zero and the packet will be
1597 * received packet, and if so, store the options as ancillary