Searched refs:packet (Results 76 - 100 of 158) sorted by relevance

1234567

/freebsd-11-stable/testcode/
H A Dfake_event.c136 /** helper function that logs a sldns_pkt packet to logfile */
340 if(!reppkt) fatal_exit("extra packet read from TCP stream but none is available");
391 /* go to next packet next time */
515 /* go to next packet next time */
710 if(!p) return; /* no pending packet to backoff */
1016 /* try to parse packet */
1081 pending_udp_query(struct serviced_query* sq, sldns_buffer* packet, argument
1089 pend->buffer = sldns_buffer_new(sldns_buffer_capacity(packet));
1091 sldns_buffer_write(pend->buffer, sldns_buffer_begin(packet),
1092 sldns_buffer_limit(packet));
1131 pending_tcp_query(struct serviced_query* sq, sldns_buffer* packet, int timeout, comm_point_callback_type* callback, void* callback_arg) argument
1767 comm_point_send_udp_msg(struct comm_point *c, sldns_buffer* packet, struct sockaddr* addr, socklen_t addrlen, int ATTR_UNUSED(is_connected)) argument
[all...]
/freebsd-11-stable/contrib/wpa/src/l2_packet/
H A Dl2_packet_freebsd.c2 * WPA Supplicant - Layer2 packet handling with FreeBSD
80 const u_char *packet; local
85 packet = pcap_next(pcap, &hdr);
87 if (packet == NULL || hdr.caplen < sizeof(*ethhdr))
90 ethhdr = (struct l2_ethhdr *) packet;
/freebsd-11-stable/crypto/openssl/ssl/
H A Ddtls1.h219 unsigned int link_mtu; /* max on-the-wire DTLS packet size */
220 unsigned int mtu; /* max DTLS packet size */
252 unsigned char *packet; member in struct:dtls1_record_data_st
H A Ds2_pkt.c180 p = s->packet;
195 p = s->packet;
223 p = &(s->packet[2]);
277 * Possibly the packet that we just read had 0 actual data bytes.
326 s->packet = &(s->s2->rbuf[s->s2->rbuf_offs]);
348 if (s->packet != s->s2->rbuf)
349 memcpy(s->s2->rbuf, s->packet, (unsigned int)newb + off);
363 s->packet = s->s2->rbuf;
H A Dd1_pkt.c232 s->packet = rdata->packet;
238 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6);
265 rdata->packet = s->packet;
282 s->packet = NULL;
360 * We've still got data from the current packet to read. There could
363 * finished reading the current packet).
447 s->packet = rdata->packet;
[all...]
H A Ds23_clnt.c631 p = s->packet;
696 s->packet = &(s->s2->rbuf[0]);
697 memcpy(s->packet, buf, n);
820 s->packet = &(s->s3->rbuf.buf[0]);
821 memcpy(s->packet, buf, n);
/freebsd-11-stable/sys/dev/isci/scil/
H A Dscic_sds_stp_request.h143 } packet; member in union:SCIC_SDS_STP_REQUEST::__anon10352
/freebsd-11-stable/tools/tools/net80211/w00t/expand/
H A Dexpand.c77 char packet[2048]; member in struct:params
103 printf("Got non WEP packet...\n");
167 rc = inject(p->tx, p->packet, p->packet_len);
195 memset(p->packet, 0, sizeof(p->packet));
196 wh = (struct ieee80211_frame*) p->packet;
/freebsd-11-stable/tools/bus_space/examples/
H A Dam79c900_diag.py38 This example program sends a single DHCP discovery packet,
40 a targeted packet.
79 # The DHCP packet definition (incl. all headers)
80 class packet(ctypes.BigEndianStructure): class in inherits:ctypes.BigEndianStructure
280 pkt = packet.from_address(addr_txbufs)
317 logging.info('DHCP discovery packet sent')
332 pkt = packet.from_address(addr_rxbufs + i * bufsize)
334 logging.debug('RX #%d: broadcast packet: length %u' % (i, bd.length))
337 logging.debug('RX #%d: packet for %s?' % (i, mac_str(pkt.eth_dest)))
339 logging.debug('RX %d: packet fro
[all...]
/freebsd-11-stable/contrib/ldns/ldns/
H A Dstr2host.h18 #include <ldns/packet.h>
/freebsd-11-stable/sys/dev/wtap/wtap_hal/
H A Dhal.c39 struct packet *p;
/freebsd-11-stable/contrib/libpcap/
H A Dfad-getad.c67 # include <netpacket/packet.h>
/freebsd-11-stable/sys/netgraph/
H A Dng_pppoe.h126 * packet is expected to arrive from the session control daemon, on the
249 union packet { union
/freebsd-11-stable/contrib/gdb/gdb/
H A Dremote-mips.c162 packet protocol. Each packet is organized as follows:
165 may not appear anywhere else in the packet. Any time a SYN is
166 seen, a new packet should be assumed to have begun.
171 is a data packet or an acknowledgement. The documentation
172 indicates that this bit is 1 for a data packet, but the actual
182 SEQ This byte contains the six bit sequence number of the packet.
185 An acknowlegment packet contains the sequence number of the
186 packet being acknowledged plus 1 modulo 64. Data packets are
188 unacknowledged data packet a
817 unsigned char *packet; local
[all...]
/freebsd-11-stable/sys/compat/ndis/
H A Dsubr_ndis.c1673 * NdisMStartBufferPhysicalMapping() to map each buffer in the packet
1810 NdisAllocatePacket(status, packet, pool)
1812 ndis_packet **packet;
1827 printf("NDIS: tried to allocate packet from dead pool %p\n",
1855 * We must initialize the packet flags correctly in order
1863 *packet = pkt;
1869 NdisFreePacket(packet)
1870 ndis_packet *packet;
1877 p = (ndis_packet_pool *)packet->np_private.npp_pool;
1883 InterlockedPushEntrySList(&p->np_head, (slist_entry *)packet);
[all...]
/freebsd-11-stable/contrib/ldns/
H A DMakefile.in69 LDNS_LOBJS = buffer.lo dane.lo dname.lo dnssec.lo dnssec_sign.lo dnssec_verify.lo dnssec_zone.lo duration.lo error.lo higher.lo host2str.lo host2wire.lo keys.lo net.lo packet.lo parse.lo radix.lo rbtree.lo rdata.lo resolver.lo rr.lo rr_functions.lo sha1.lo sha2.lo str2host.lo tsig.lo update.lo util.lo wire2host.lo zone.lo
74 LDNS_HEADERS = buffer.h dane.h dname.h dnssec.h dnssec_sign.h dnssec_verify.h dnssec_zone.h duration.h error.h higher.h host2str.h host2wire.h keys.h ldns.h packet.h parse.h radix.h rbtree.h rdata.h resolver.h rr_functions.h rr.h sha1.h sha2.h str2host.h tsig.h update.h wire2host.h zone.h
503 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h $(srcdir)/ldns/zone.h \
511 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h $(srcdir)/ldns/zone.h \
519 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h $(srcdir)/ldns/zone.h \
527 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h $(srcdir)/ldns/zone.h \
535 $(srcdir)/ldns/rr.h $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h \
543 $(srcdir)/ldns/rr.h $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h \
551 $(srcdir)/ldns/rr.h $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h \
560 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet
[all...]
/freebsd-11-stable/stand/i386/libi386/
H A Dbiosdisk.c1120 static struct edd_packet packet; local
1122 packet.len = sizeof(struct edd_packet);
1123 packet.count = blks;
1124 packet.off = VTOPOFF(dest);
1125 packet.seg = VTOPSEG(dest);
1126 packet.lba = dblk;
1135 v86.ds = VTOPSEG(&packet);
1136 v86.esi = VTOPOFF(&packet);
/freebsd-11-stable/contrib/unbound/services/
H A Doutside_network.h335 /** The query itself, the query packet to send. */
337 /** length of query packet. */
392 * The query itself, the query packet to send.
396 /** length of query packet. */
409 /** the packet was involved in an error, to stop looping errors */
497 /** edns options to use for sending upstream packet */
564 * @param packet: wireformat query to send to destination.
571 struct sldns_buffer* packet, int timeout, comm_point_callback_type* callback,
578 * @param packet: wireformat query to send to destination. copied from.
587 struct sldns_buffer* packet, in
[all...]
/freebsd-11-stable/sys/powerpc/powermac/
H A Dcuda.c381 * If we already are sending a packet, we should bail now that this
479 * handled when we abort packet output to handle
480 * this packet in cuda_intr(). Thus, we ignore
539 * This is an unexpected packet, so grab the first (dummy)
541 * starting to receive the packet by setting the TIP bit.
594 /* Queue up the packet */
597 /* If we have a free packet, process it */
694 /* If we have another packet waiting, set it up */
707 uint8_t packet[16]; local
710 /* construct an ADB command packet an
[all...]
/freebsd-11-stable/sys/dev/drm/
H A Dradeon_drm.h69 /* New style per-packet identifiers for use in cmd_buffer ioctl with
71 * state bits and the packet size:
177 #define RADEON_CMD_PACKET3 5 /* emit hw packet */
178 #define RADEON_CMD_PACKET3_CLIP 6 /* emit hw packet wrapped in cliprects */
192 } packet; member in union:__anon9798
260 unsigned char cmd_type, packet, pad0, pad1; member in struct:__anon9806::__anon9810
263 unsigned char cmd_type, packet; member in struct:__anon9806::__anon9811
622 * - allows updating of tcl packet, vector and scalar state
/freebsd-11-stable/sbin/routed/rtquery/
H A Drtquery.c99 char packet[MAXPACKETSIZE+MAXPATHLEN]; member in union:__anon7090
106 char packet[MAXPACKETSIZE+1024]; member in union:__anon7091
435 cc = recvfrom(soc, imsg_buf.packet,
436 sizeof(imsg_buf.packet), 0,
596 * Handle an incoming RIP packet.
/freebsd-11-stable/secure/lib/libssh/
H A DMakefile14 log.c match.c md-sha256.c moduli.c nchan.c packet.c opacket.c \
/freebsd-11-stable/contrib/unbound/util/
H A Dalloc.h44 * so that they are reused for other packet rrset allocations.
189 # include <sldns/packet.h>
/freebsd-11-stable/contrib/llvm-project/lldb/source/Plugins/Process/gdb-remote/
H A DGDBRemoteCommunication.h61 kLoUserBroadcastBit << 1 // Sent when we received a notify packet.
68 ErrorSendFailed, // Status sending the packet
69 ErrorSendAck, // Didn't get an ack back after sending a packet
72 ErrorReplyInvalid, // Got a reply but it wasn't valid for the packet that
76 ErrorNoSequenceLock // We couldn't get the sequence lock for a multi-packet
92 // Don't ever reduce the timeout for a packet, only increase it. If the
111 StringExtractorGDBRemote &packet);
115 // Set the global packet timeout.
169 // Pop a packet from the queue in a thread safe manner
181 // If compression is enabled, decompress the packet i
[all...]
/freebsd-11-stable/contrib/wpa/src/ap/
H A Dwpa_auth_ft.c133 /* get first tlv record in packet matching type
134 * @data (decrypted) packet
489 /* encryption not needed, return plaintext as packet */
512 * @packet Pointer to return the pointer to the allocated packet buffer;
524 u8 **packet, size_t *packet_len)
531 *packet = NULL;
563 *packet = os_zalloc(*packet_len);
564 if (!*packet)
567 pos = *packet;
518 wpa_ft_rrb_build(const u8 *key, const size_t key_len, const struct tlv_list *tlvs_enc0, const struct tlv_list *tlvs_enc1, const struct tlv_list *tlvs_auth, const struct vlan_description *vlan, const u8 *src_addr, u8 type, u8 **packet, size_t *packet_len) argument
937 u8 *packet = NULL; local
1933 u8 *packet = NULL; local
3503 wpa_ft_rrb_build_r0(const u8 *key, const size_t key_len, const struct tlv_list *tlvs, const struct wpa_ft_pmk_r0_sa *pmk_r0, const u8 *r1kh_id, const u8 *s1kh_id, const struct tlv_list *tlv_auth, const u8 *src_addr, u8 type, u8 **packet, size_t *packet_len) argument
3584 u8 *plain = NULL, *packet = NULL; local
4161 u8 *packet = NULL, *key = NULL; local
4509 u8 *packet; local
[all...]

Completed in 500 milliseconds

1234567