Lines Matching defs:packet

1845 	/* Adjust packet back to original */
1985 bridge_proto_input(ifnet_t ifp, protocol_family_t protocol, mbuf_t packet,
1988 #pragma unused(protocol, packet, header)
1990 printf("%s: unexpected packet from %s\n", __func__,
3442 * Enqueue a packet on a bridge member interface.
3475 * then attach a packet tag that holds it.
3517 * Receive a queued packet from dummynet and pass it on to the output
3530 * The packet didnt originate from a member interface. This should only
3590 * If the packet is an 802.1X ethertype, then only send on the
3600 * go ahead and send out that interface. Otherwise, the packet
3609 * If the packet is a multicast, or we don't know a better way to
3872 * If the packet is unicast, destined for someone on
3899 * OR this is a unicast packet, push it through the bpf(4) machinery.
3903 * drop the packet, or possibly modify it, making it difficult to debug
3916 /* run the packet filter */
4000 * Filter input from a member interface. Queue the packet for
4037 * set on this interface, discard the packet once we push it through
4039 * packet counters associated with this interface.
4108 * Make a deep copy of the packet and enqueue the copy
4109 * for bridge processing; return the original packet for
4139 /* mark packet as arriving on the bridge */
4164 /* Return the original packet for local processing. */
4231 /* We just received a packet that we sent out. */ \
4242 * If the packet is for us, set the packets source as the
4243 * bridge, and return the packet back to ether_input for
4249 /* Mark the packet as arriving on the bridge interface */
4274 printf("%s: %s packet for bridge\n", __func__,
4284 * if the destination of the packet is for the MAC address of
4290 * then it will consume the packet
4299 printf("%s: not forwarding packet bound for member "
4329 * the bridge, except for the one on which the packet
4437 * Duplicate a packet out one or more interfaces that are in span mode,
5119 * question.) If *bifp or *ifp are NULL then packet filtering is skipped for
5235 goto ipfwpass; /* packet already partially processed */
5258 * packet will return to us via bridge_dummynet().
5273 * Run the packet through pfil
5314 /* check if we need to fragment the packet */
5473 /* Retrieve the packet length. */
5487 * Drop packet if shorter than we expect.