• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.5.8/xnu-1228.15.4/bsd/netinet/

Lines Matching defs:packet

173 	"Enable packet capture for FAITH IPv4->IPv6 translater daemon");
184 "Maximum number of IPv4 fragments allowed per packet");
215 &ip_checkinterface, 0, "Verify packet arrives on correct interface");
299 * to an incoming packet over the same route if the packet got here
417 mbuf_t packet;
422 for (packet = packet_list; packet; packet = packet_list) {
424 packet_list = mbuf_nextpkt(packet);
425 mbuf_setnextpkt(packet, NULL);
426 ip_input(packet);
543 u_int32_t div_info = 0; /* packet divert/tee info */
608 * No need to proccess packet twice if we've
685 * Either this is not loopback packet coming from an interface
687 * packet that has undergone software checksumming at the send
689 * calculate the checksum in software to validate the packet.
694 * This is a loopback packet without any valid checksum since
723 * Drop packet if shorter than we expect.
749 * Right now when no processing on packet has done
753 * - Xlate: translate packet's addr/port (NAT).
755 * - Wrap: fake packet's addr/port <unimpl.>
764 * Check if we want to allow this packet to be processed.
802 /* Send packet to the appropriate pipe */
809 /* Divert or tee packet */
820 * if we get here, the packet must be dropped
832 * to be sent and the original packet to be freed).
843 /* greedy RSVP, snatches any PATH packet of the RSVP protocol and no
847 * grabbing the packet.
853 * Check our list of addresses, to see if the packet is for us.
854 * If we don't have any addresses, assume any unicast packet
863 * Cache the destination address of the packet; this may be
875 * and the arrival interface for a unicast packet (the RFC 1122
876 * strong ES model) if IP forwarding is disabled and the packet
877 * is not locally generated and the packet is not subject to
905 * If the address matches, verify that the packet
943 * The packet is returned (relatively) intact; if
944 * ip_mforward() returns a non-zero value, the packet
1038 * if the packet was previously fragmented,
1053 * oldest fragemented packet to make space.
1066 * discard, drop this packet too.
1126 /* Clear the flag in case packet comes from loopback */
1150 /* Get the header length of the reassembled packet */
1153 /* Restore original checksum before diverting packet */
1171 * Divert or tee packet to the divert protocol if required.
1179 /* Clone packet if we're doing a 'tee' */
1183 /* Restore packet header fields to original values */
1188 /* Deliver packet to divert input routine */
1192 /* If 'tee', continue with original packet */
1265 * When IPDIVERT enabled, keep additional state with each packet that
1266 * tells us if we need to divert or tee the packet we're building.
1346 * drop if CE and not-ECT are mixed for the same packet.
1435 * Check for complete reassembly and perform frag per packet
1439 * a chance to complete the packet before we drop the packet.
1440 * As a result, n+1 frags are actually allowed per packet, but
1455 /* Make sure the last packet didn't have the IP_MF flag */
1465 * Reassembly is complete. Make sure the packet is a sane size.
1514 * Create header for new ip packet by
1515 * modifying header of first packet;
1637 * non-routing options should be processed only if the packet is for us.
1638 * Returns 1 if packet has been forwarded/freed,
1639 * 0 if the packet should be processed further.
2069 * Forward a packet. If some error occurs return the sender
2070 * an icmp packet. Note we can't always generate a meaningful
2074 * If not forwarding, just drop the packet. This could be confusing
2079 * The srcrt parameter indicates whether the packet is being forwarded
2099 * Cache the destination address of the packet; this may be
2175 * If forwarding packet using same interface that it came in on,
2178 * and if packet was not source routed (or has any options).
2269 * If the packet is routed over IPsec tunnel, tell the
2360 case EACCES: /* ipfw denied packet */