• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.5.8/xnu-1228.15.4/bsd/netinet/

Lines Matching refs:in

7  * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
32 * Redistribution and use in source and binary forms, with or without
37 * 2. Redistributions in binary form must reproduce the above copyright
38 * notice, this list of conditions and the following disclaimer in the
64 * NOTICE: This file was modified by SPARTA, Inc. in 2007 to introduce
66 * is included in support of clause 2.2 (b) of the Apple Public License,
95 #include <netinet/in.h>
202 * the Strong ES model described in RFC 1122, but since the routing table
204 * setting this to 1 results in an odd hybrid.
289 SYSCTL_NODE(_net_inet_ip_linklocal, OID_AUTO, in, CTLFLAG_RW|CTLFLAG_LOCKED, 0, "link local input");
298 * We need to save the IP options in case a protocol wants to respond
342 * IP initialization: fill in IP protocol switch table.
343 * All protocols not implemented in kernel go to raw IP protocol handler.
372 maxfragsperpacket = 128; /* enough for 64k in 512 byte fragments */
430 /* Initialize the PF_INET domain, and add in the pre-defined protos */
525 * ipforward_rt cleared in in_addroute()
663 /* IPv4 Link-Local Addresses as defined in <draft-ietf-zeroconf-ipv4-linklocal-05.txt> */
689 * calculate the checksum in software to validate the packet.
720 * Check that the amount of data in the buffers
756 * - Encapsulate: put it in another IP and send out. <unimp.>
795 ip = mtod(m, struct ip *); /* just in case m changed */
998 ip = mtod(m, struct ip *); /* in case it changed */
1037 * (We could look in the reassembly queue to see
1052 * If we will exceed the number of fragments in queues, timeout the
1126 /* Clear the flag in case packet comes from loopback */
1134 * the divert info in div_info and args.divert_rule.
1291 * Presence of header sizes in mbufs
1370 * stick new segment in the proper place.
1420 * Only trust info in the fragment at offset 0.
1633 * The pass argument is used when operating in the IPSTEALTH
1903 ip->ip_len -= IP_VHL_HL(ip->ip_vhl) << 2; /* XXX icmp_error adds in hdr length */
1945 * Save incoming source route for use in replies,
1966 * Retrieve incoming source route for use in replies,
1967 * in the same form used by setsockopt.
2036 * level protocol in the kernel.
2151 * in case we need to generate an ICMP message to the src.
2155 * assume exclusive access to the IP header in `m', so any
2156 * data in a cluster may change before we reach icmp_error().
2175 * If forwarding packet using same interface that it came in on,
2468 * the RSVP counter, in case something slips up.
2484 * the RSVP counter, in case something slips up.