/freebsd-11-stable/testcode/ |
H A D | fake_event.c | 136 /** helper function that logs a sldns_pkt packet to logfile */ 340 if(!reppkt) fatal_exit("extra packet read from TCP stream but none is available"); 391 /* go to next packet next time */ 515 /* go to next packet next time */ 710 if(!p) return; /* no pending packet to backoff */ 1016 /* try to parse packet */ 1081 pending_udp_query(struct serviced_query* sq, sldns_buffer* packet, argument 1089 pend->buffer = sldns_buffer_new(sldns_buffer_capacity(packet)); 1091 sldns_buffer_write(pend->buffer, sldns_buffer_begin(packet), 1092 sldns_buffer_limit(packet)); 1131 pending_tcp_query(struct serviced_query* sq, sldns_buffer* packet, int timeout, comm_point_callback_type* callback, void* callback_arg) argument 1767 comm_point_send_udp_msg(struct comm_point *c, sldns_buffer* packet, struct sockaddr* addr, socklen_t addrlen, int ATTR_UNUSED(is_connected)) argument [all...] |
/freebsd-11-stable/contrib/wpa/src/l2_packet/ |
H A D | l2_packet_freebsd.c | 2 * WPA Supplicant - Layer2 packet handling with FreeBSD 80 const u_char *packet; local 85 packet = pcap_next(pcap, &hdr); 87 if (packet == NULL || hdr.caplen < sizeof(*ethhdr)) 90 ethhdr = (struct l2_ethhdr *) packet;
|
/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | dtls1.h | 219 unsigned int link_mtu; /* max on-the-wire DTLS packet size */ 220 unsigned int mtu; /* max DTLS packet size */ 252 unsigned char *packet; member in struct:dtls1_record_data_st
|
H A D | s2_pkt.c | 180 p = s->packet; 195 p = s->packet; 223 p = &(s->packet[2]); 277 * Possibly the packet that we just read had 0 actual data bytes. 326 s->packet = &(s->s2->rbuf[s->s2->rbuf_offs]); 348 if (s->packet != s->s2->rbuf) 349 memcpy(s->s2->rbuf, s->packet, (unsigned int)newb + off); 363 s->packet = s->s2->rbuf;
|
H A D | d1_pkt.c | 232 s->packet = rdata->packet; 238 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6); 265 rdata->packet = s->packet; 282 s->packet = NULL; 360 * We've still got data from the current packet to read. There could 363 * finished reading the current packet). 447 s->packet = rdata->packet; [all...] |
H A D | s23_clnt.c | 631 p = s->packet; 696 s->packet = &(s->s2->rbuf[0]); 697 memcpy(s->packet, buf, n); 820 s->packet = &(s->s3->rbuf.buf[0]); 821 memcpy(s->packet, buf, n);
|
/freebsd-11-stable/sys/dev/isci/scil/ |
H A D | scic_sds_stp_request.h | 143 } packet; member in union:SCIC_SDS_STP_REQUEST::__anon10352
|
/freebsd-11-stable/tools/tools/net80211/w00t/expand/ |
H A D | expand.c | 77 char packet[2048]; member in struct:params 103 printf("Got non WEP packet...\n"); 167 rc = inject(p->tx, p->packet, p->packet_len); 195 memset(p->packet, 0, sizeof(p->packet)); 196 wh = (struct ieee80211_frame*) p->packet;
|
/freebsd-11-stable/tools/bus_space/examples/ |
H A D | am79c900_diag.py | 38 This example program sends a single DHCP discovery packet, 40 a targeted packet. 79 # The DHCP packet definition (incl. all headers) 80 class packet(ctypes.BigEndianStructure): class in inherits:ctypes.BigEndianStructure 280 pkt = packet.from_address(addr_txbufs) 317 logging.info('DHCP discovery packet sent') 332 pkt = packet.from_address(addr_rxbufs + i * bufsize) 334 logging.debug('RX #%d: broadcast packet: length %u' % (i, bd.length)) 337 logging.debug('RX #%d: packet for %s?' % (i, mac_str(pkt.eth_dest))) 339 logging.debug('RX %d: packet fro [all...] |
/freebsd-11-stable/contrib/ldns/ldns/ |
H A D | str2host.h | 18 #include <ldns/packet.h>
|
/freebsd-11-stable/sys/dev/wtap/wtap_hal/ |
H A D | hal.c | 39 struct packet *p;
|
/freebsd-11-stable/contrib/libpcap/ |
H A D | fad-getad.c | 67 # include <netpacket/packet.h>
|
/freebsd-11-stable/sys/netgraph/ |
H A D | ng_pppoe.h | 126 * packet is expected to arrive from the session control daemon, on the 249 union packet { union
|
/freebsd-11-stable/contrib/gdb/gdb/ |
H A D | remote-mips.c | 162 packet protocol. Each packet is organized as follows: 165 may not appear anywhere else in the packet. Any time a SYN is 166 seen, a new packet should be assumed to have begun. 171 is a data packet or an acknowledgement. The documentation 172 indicates that this bit is 1 for a data packet, but the actual 182 SEQ This byte contains the six bit sequence number of the packet. 185 An acknowlegment packet contains the sequence number of the 186 packet being acknowledged plus 1 modulo 64. Data packets are 188 unacknowledged data packet a 817 unsigned char *packet; local [all...] |
/freebsd-11-stable/sys/compat/ndis/ |
H A D | subr_ndis.c | 1673 * NdisMStartBufferPhysicalMapping() to map each buffer in the packet 1810 NdisAllocatePacket(status, packet, pool) 1812 ndis_packet **packet; 1827 printf("NDIS: tried to allocate packet from dead pool %p\n", 1855 * We must initialize the packet flags correctly in order 1863 *packet = pkt; 1869 NdisFreePacket(packet) 1870 ndis_packet *packet; 1877 p = (ndis_packet_pool *)packet->np_private.npp_pool; 1883 InterlockedPushEntrySList(&p->np_head, (slist_entry *)packet); [all...] |
/freebsd-11-stable/contrib/ldns/ |
H A D | Makefile.in | 69 LDNS_LOBJS = buffer.lo dane.lo dname.lo dnssec.lo dnssec_sign.lo dnssec_verify.lo dnssec_zone.lo duration.lo error.lo higher.lo host2str.lo host2wire.lo keys.lo net.lo packet.lo parse.lo radix.lo rbtree.lo rdata.lo resolver.lo rr.lo rr_functions.lo sha1.lo sha2.lo str2host.lo tsig.lo update.lo util.lo wire2host.lo zone.lo 74 LDNS_HEADERS = buffer.h dane.h dname.h dnssec.h dnssec_sign.h dnssec_verify.h dnssec_zone.h duration.h error.h higher.h host2str.h host2wire.h keys.h ldns.h packet.h parse.h radix.h rbtree.h rdata.h resolver.h rr_functions.h rr.h sha1.h sha2.h str2host.h tsig.h update.h wire2host.h zone.h 503 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h $(srcdir)/ldns/zone.h \ 511 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h $(srcdir)/ldns/zone.h \ 519 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h $(srcdir)/ldns/zone.h \ 527 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h $(srcdir)/ldns/zone.h \ 535 $(srcdir)/ldns/rr.h $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h \ 543 $(srcdir)/ldns/rr.h $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h \ 551 $(srcdir)/ldns/rr.h $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet.h $(srcdir)/ldns/keys.h \ 560 $(srcdir)/ldns/dname.h $(srcdir)/ldns/dnssec.h $(srcdir)/ldns/packet [all...] |
/freebsd-11-stable/stand/i386/libi386/ |
H A D | biosdisk.c | 1120 static struct edd_packet packet; local 1122 packet.len = sizeof(struct edd_packet); 1123 packet.count = blks; 1124 packet.off = VTOPOFF(dest); 1125 packet.seg = VTOPSEG(dest); 1126 packet.lba = dblk; 1135 v86.ds = VTOPSEG(&packet); 1136 v86.esi = VTOPOFF(&packet);
|
/freebsd-11-stable/contrib/unbound/services/ |
H A D | outside_network.h | 335 /** The query itself, the query packet to send. */ 337 /** length of query packet. */ 392 * The query itself, the query packet to send. 396 /** length of query packet. */ 409 /** the packet was involved in an error, to stop looping errors */ 497 /** edns options to use for sending upstream packet */ 564 * @param packet: wireformat query to send to destination. 571 struct sldns_buffer* packet, int timeout, comm_point_callback_type* callback, 578 * @param packet: wireformat query to send to destination. copied from. 587 struct sldns_buffer* packet, in [all...] |
/freebsd-11-stable/sys/powerpc/powermac/ |
H A D | cuda.c | 381 * If we already are sending a packet, we should bail now that this 479 * handled when we abort packet output to handle 480 * this packet in cuda_intr(). Thus, we ignore 539 * This is an unexpected packet, so grab the first (dummy) 541 * starting to receive the packet by setting the TIP bit. 594 /* Queue up the packet */ 597 /* If we have a free packet, process it */ 694 /* If we have another packet waiting, set it up */ 707 uint8_t packet[16]; local 710 /* construct an ADB command packet an [all...] |
/freebsd-11-stable/sys/dev/drm/ |
H A D | radeon_drm.h | 69 /* New style per-packet identifiers for use in cmd_buffer ioctl with 71 * state bits and the packet size: 177 #define RADEON_CMD_PACKET3 5 /* emit hw packet */ 178 #define RADEON_CMD_PACKET3_CLIP 6 /* emit hw packet wrapped in cliprects */ 192 } packet; member in union:__anon9798 260 unsigned char cmd_type, packet, pad0, pad1; member in struct:__anon9806::__anon9810 263 unsigned char cmd_type, packet; member in struct:__anon9806::__anon9811 622 * - allows updating of tcl packet, vector and scalar state
|
/freebsd-11-stable/sbin/routed/rtquery/ |
H A D | rtquery.c | 99 char packet[MAXPACKETSIZE+MAXPATHLEN]; member in union:__anon7090 106 char packet[MAXPACKETSIZE+1024]; member in union:__anon7091 435 cc = recvfrom(soc, imsg_buf.packet, 436 sizeof(imsg_buf.packet), 0, 596 * Handle an incoming RIP packet.
|
/freebsd-11-stable/secure/lib/libssh/ |
H A D | Makefile | 14 log.c match.c md-sha256.c moduli.c nchan.c packet.c opacket.c \
|
/freebsd-11-stable/contrib/unbound/util/ |
H A D | alloc.h | 44 * so that they are reused for other packet rrset allocations. 189 # include <sldns/packet.h>
|
/freebsd-11-stable/contrib/llvm-project/lldb/source/Plugins/Process/gdb-remote/ |
H A D | GDBRemoteCommunication.h | 61 kLoUserBroadcastBit << 1 // Sent when we received a notify packet. 68 ErrorSendFailed, // Status sending the packet 69 ErrorSendAck, // Didn't get an ack back after sending a packet 72 ErrorReplyInvalid, // Got a reply but it wasn't valid for the packet that 76 ErrorNoSequenceLock // We couldn't get the sequence lock for a multi-packet 92 // Don't ever reduce the timeout for a packet, only increase it. If the 111 StringExtractorGDBRemote &packet); 115 // Set the global packet timeout. 169 // Pop a packet from the queue in a thread safe manner 181 // If compression is enabled, decompress the packet i [all...] |
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | wpa_auth_ft.c | 133 /* get first tlv record in packet matching type 134 * @data (decrypted) packet 489 /* encryption not needed, return plaintext as packet */ 512 * @packet Pointer to return the pointer to the allocated packet buffer; 524 u8 **packet, size_t *packet_len) 531 *packet = NULL; 563 *packet = os_zalloc(*packet_len); 564 if (!*packet) 567 pos = *packet; 518 wpa_ft_rrb_build(const u8 *key, const size_t key_len, const struct tlv_list *tlvs_enc0, const struct tlv_list *tlvs_enc1, const struct tlv_list *tlvs_auth, const struct vlan_description *vlan, const u8 *src_addr, u8 type, u8 **packet, size_t *packet_len) argument 937 u8 *packet = NULL; local 1933 u8 *packet = NULL; local 3503 wpa_ft_rrb_build_r0(const u8 *key, const size_t key_len, const struct tlv_list *tlvs, const struct wpa_ft_pmk_r0_sa *pmk_r0, const u8 *r1kh_id, const u8 *s1kh_id, const struct tlv_list *tlv_auth, const u8 *src_addr, u8 type, u8 **packet, size_t *packet_len) argument 3584 u8 *plain = NULL, *packet = NULL; local 4161 u8 *packet = NULL, *key = NULL; local 4509 u8 *packet; local [all...] |