/freebsd-12-stable/sys/dev/liquidio/base/ |
H A D | lio_droq.c | 136 * (64K is max pkt size from Octeon) 360 * below the threshold to receive a 64K pkt, new buffers are first allocated 578 lio_dev_err(oct, "DROQ: In drop: pkt with len 0\n"); 594 uint32_t pkt, pkt_count, total_len = 0; local 598 for (pkt = 0; pkt < pkt_count; pkt++) { 613 pkt++; 710 droq->stats.pkts_received += pkt; 715 if ((droq->ops.drop_on_max) && (pkts_to_process - pkt)) { [all...] |
/freebsd-12-stable/sys/dev/cxgbe/tom/ |
H A D | t4_tom.c | 1447 char *pkt; local 1457 pkt = malloc(maxlen, M_CXGBE, M_ZERO | M_NOWAIT); 1458 if (pkt == NULL) 1465 struct ether_header *eh = (void *)pkt; 1474 struct ether_vlan_header *evh = (void *)pkt; 1487 struct ip6_hdr *ip6 = (void *)&pkt[len]; 1502 struct ip *ip = (void *)&pkt[len]; 1521 th = (void *)&pkt[len]; 1532 return (pkt); 1540 char *pkt; local [all...] |
/freebsd-12-stable/contrib/ntp/sntp/tests/ |
H A D | Makefile.am | 8 debug-output-pkt \ 62 data/debug-input-pkt \ 79 data/debug-output-pkt \
|
/freebsd-12-stable/contrib/ntp/include/ |
H A D | ntp_crypto.h | 149 u_int32 pkt[1]; /* start of value field */ member in struct:exten
|
H A D | ntpd.h | 130 extern void sendpkt (sockaddr_u *, struct interface *, int, struct pkt *, int); 196 extern int crypto_xmit (struct peer *, struct pkt *, 224 extern void process_packet (struct peer *, struct pkt *, u_int); 534 struct pkt *);
|
/freebsd-12-stable/contrib/unbound/iterator/ |
H A D | iter_utils.h | 105 * @param pkt: packet. 110 struct dns_msg* dns_alloc_msg(struct sldns_buffer* pkt, struct msg_parse* msg,
|
/freebsd-12-stable/contrib/unbound/libunbound/ |
H A D | context.h | 291 * @param pkt: the packet to add, can be NULL. 296 struct sldns_buffer* pkt, uint32_t* len);
|
/freebsd-12-stable/stand/efi/libefi/ |
H A D | efinet.c | 136 efinet_put(struct iodesc *desc, void *pkt, size_t len) argument 147 status = net->Transmit(net, 0, len, pkt, NULL, NULL, NULL); 166 efinet_get(struct iodesc *desc, void **pkt, time_t timeout) argument 190 *pkt = buf;
|
/freebsd-12-stable/contrib/ntp/ntpd/ |
H A D | ntp_crypto.c | 433 u_int32 *pkt; /* receive packet pointer */ local 469 pkt = (u_int32 *)&rbufp->recv_pkt + authlen / 4; 470 ep = (struct exten *)pkt; 473 // HMS: Why pkt[1] instead of ep->associd ? 474 associd = (associd_t)ntohl(pkt[1]); 632 memcpy(peer->subject, ep->pkt, vallen); 845 (u_char *)ep->pkt, 926 ap = (struct autokey *)ep->pkt; 1000 leapsec_autokey_tai(ntohl(ep->pkt[0]), 1006 "%d seconds", ntohl(ep->pkt[ 1102 u_int32 *pkt; /* packet pointer */ local [all...] |
H A D | ntp_peer.c | 310 struct pkt * pkt; local 342 pkt = &rbufp->recv_pkt; 343 NTOHL_FP(&pkt->org, &pkt_org); 1079 struct pkt *pkt; local 1092 pkt = &rbufp->recv_pkt; 1095 NTOHL_FP(&pkt->org, &p_org);
|
/freebsd-12-stable/sys/netpfil/ipfw/ |
H A D | ip_dn_io.c | 490 /* Update statistics, then check reasons to drop pkt. */ 538 struct dn_pkt_tag *pkt = NULL; local 542 pkt = dn_tag_get(m); 543 if (!DN_KEY_LEQ(pkt->output_time, now)) 551 heap_insert(&V_dn_cfg.evheap, pkt->output_time, dline); 750 struct dn_pkt_tag *pkt = dn_tag_get(m); local 754 if (pkt->dn_dir == (DIR_OUT | PROTO_LAYER2) && 755 pkt->ifp == NULL) { 758 dst = pkt->dn_dir; 759 ifp = pkt [all...] |
/freebsd-12-stable/crypto/openssl/ssl/statem/ |
H A D | statem_dtls.c | 910 int dtls_construct_change_cipher_spec(SSL *s, WPACKET *pkt) argument 915 if (!WPACKET_put_bytes_u16(pkt, s->d1->handshake_write_seq)) { 1233 int dtls1_set_handshake_header(SSL *s, WPACKET *pkt, int htype) argument 1241 if (!WPACKET_put_bytes_u8(pkt, SSL3_MT_CCS)) 1249 if (!WPACKET_allocate_bytes(pkt, DTLS1_HM_HEADER_LENGTH, &header) 1250 || !WPACKET_start_sub_packet(pkt)) 1257 int dtls1_close_construct_packet(SSL *s, WPACKET *pkt, int htype) argument 1261 if ((htype != SSL3_MT_CHANGE_CIPHER_SPEC && !WPACKET_close(pkt)) 1262 || !WPACKET_get_length(pkt, &msglen)
|
/freebsd-12-stable/contrib/unbound/services/ |
H A D | outside_network.h | 336 uint8_t* pkt; member in struct:pending 395 uint8_t* pkt; member in struct:waiting_tcp
|
H A D | outside_network.c | 533 pend->c->tcp_write_pkt = w->pkt; 559 log_assert(w->pkt); 818 pend->c->tcp_write_pkt == pend->query->pkt && 823 LDNS_QDCOUNT(pend->query->pkt) > 0 && 824 dname_valid(pend->query->pkt+12, pend->query->pkt_len-12)) { 826 dname_str(pend->query->pkt+12, buf); 848 LDNS_QDCOUNT(w->pkt) > 0 && 849 dname_valid(w->pkt+12, w->pkt_len-12)) { 851 dname_str(w->pkt+12, buf); 1015 (pend->reuse.tree_by_id.count?"for reading pkt" 2578 serviced_check_qname(sldns_buffer* pkt, uint8_t* qbuf, size_t qbuflen) argument [all...] |
/freebsd-12-stable/contrib/libpcap/ |
H A D | pcap-int.h | 214 u_char *pkt; member in struct:pcap 381 const u_char **pkt; member in struct:oneshot_userdata
|
/freebsd-12-stable/contrib/ldns/ldns/ |
H A D | resolver.h | 124 keep the current pkt */ 614 * \param[out] pkt a packet with the reply from the nameserver 623 ldns_status ldns_resolver_search_status(ldns_pkt** pkt, ldns_resolver *r, const ldns_rdf *rdf, ldns_rr_type t, ldns_rr_class c, uint16_t flags); 661 * \param[out] pkt a packet with the reply from the nameserver 671 ldns_status ldns_resolver_query_status(ldns_pkt** pkt, ldns_resolver *r, const ldns_rdf *name, ldns_rr_type t, ldns_rr_class c, uint16_t flags);
|
/freebsd-12-stable/contrib/ntp/libntp/ |
H A D | authkeys.c | 879 u_int32 * pkt, 889 pkt[length / 4] = htonl(keyno); 899 pkt, length); 911 u_int32 * pkt, 928 pkt, length, size); 877 authencrypt( keyid_t keyno, u_int32 * pkt, size_t length ) argument 909 authdecrypt( keyid_t keyno, u_int32 * pkt, size_t length, size_t size ) argument
|
/freebsd-12-stable/sys/netpfil/pf/ |
H A D | if_pfsync.c | 644 struct pfsync_pkt pkt; local 706 pkt.ip = ip; 707 pkt.src = ip->ip_src; 708 pkt.flags = 0; 716 pkt.flags |= PFSYNC_SI_CKSUM; 731 rv = (*pfsync_acts[subh.action])(&pkt, m, offset, count); 747 pfsync_in_clr(struct pfsync_pkt *pkt, struct mbuf *m, int offset, int count) argument 789 pfsync_in_ins(struct pfsync_pkt *pkt, struct mbuf *m, int offset, int count) argument 818 if (pfsync_state_import(sp, pkt->flags) == ENOMEM) 827 pfsync_in_iack(struct pfsync_pkt *pkt, struc argument 898 pfsync_in_upd(struct pfsync_pkt *pkt, struct mbuf *m, int offset, int count) argument 984 pfsync_in_upd_c(struct pfsync_pkt *pkt, struct mbuf *m, int offset, int count) argument 1071 pfsync_in_ureq(struct pfsync_pkt *pkt, struct mbuf *m, int offset, int count) argument 1112 pfsync_in_del(struct pfsync_pkt *pkt, struct mbuf *m, int offset, int count) argument 1143 pfsync_in_del_c(struct pfsync_pkt *pkt, struct mbuf *m, int offset, int count) argument 1175 pfsync_in_bus(struct pfsync_pkt *pkt, struct mbuf *m, int offset, int count) argument 1237 pfsync_in_tdb(struct pfsync_pkt *pkt, struct mbuf *m, int offset, int count) argument 1303 pfsync_in_eof(struct pfsync_pkt *pkt, struct mbuf *m, int offset, int count) argument 1315 pfsync_in_error(struct pfsync_pkt *pkt, struct mbuf *m, int offset, int count) argument [all...] |
/freebsd-12-stable/crypto/openssl/ssl/ |
H A D | ssl_local.h | 462 int (*put_cipher_by_char) (const SSL_CIPHER *cipher, WPACKET *pkt, 1972 int (*set_handshake_header) (SSL *s, WPACKET *pkt, int type); 1974 int (*close_construct_packet) (SSL *s, WPACKET *pkt, int htype); 1979 # define ssl_set_handshake_header(s, pkt, htype) \ 1980 s->method->ssl3_enc->set_handshake_header((s), (pkt), (htype)) 1981 # define ssl_close_construct_packet(s, pkt, htype) \ 1982 s->method->ssl3_enc->close_construct_packet((s), (pkt), (htype)) 2339 __owur int ssl3_put_cipher_by_char(const SSL_CIPHER *c, WPACKET *pkt, 2350 __owur int ssl3_get_req_cert_type(SSL *s, WPACKET *pkt); 2360 __owur unsigned long ssl3_output_cert_chain(SSL *s, WPACKET *pkt, [all...] |
/freebsd-12-stable/contrib/ldns/ |
H A D | dnssec_verify.c | 101 const ldns_pkt *pkt, 113 pkt, 143 pkt, 273 const ldns_pkt *pkt, 291 assert(pkt != NULL); 293 if (!ldns_dnssec_pkt_has_rrsigs(pkt)) { 305 pkt, 307 new_chain->packet_rcode = ldns_pkt_get_rcode(pkt); 309 if (ldns_pkt_ancount(pkt) == 0) { 316 /* hmm, no data, do we have denial? only works if pkt wa 99 ldns_dnssec_build_data_chain_dnskey(ldns_resolver *res, uint16_t qflags, const ldns_pkt *pkt, ldns_rr_list *signatures, ldns_dnssec_data_chain *new_chain, ldns_rdf *key_name, ldns_rr_class c) argument 270 ldns_dnssec_build_data_chain(ldns_resolver *res, uint16_t qflags, const ldns_rr_list *rrset, const ldns_pkt *pkt, ldns_rr *orig_rr) argument [all...] |
/freebsd-12-stable/sys/dev/firewire/ |
H A D | fwdev.c | 396 struct fw_pkt pkt; local 400 bzero(&pkt, sizeof(struct fw_pkt)); 401 if ((err = uiomove((caddr_t)&pkt, sizeof(uint32_t), uio))) 403 tinfo = &d->fc->tcode[pkt.mode.hdr.tcode]; 404 if ((err = uiomove((caddr_t)&pkt + sizeof(uint32_t), 412 bcopy(&pkt, &xfer->send.hdr, sizeof(struct fw_pkt)); 647 fp = &asyreq->pkt;
|
/freebsd-12-stable/sys/dev/usb/net/ |
H A D | if_rue.c | 639 struct rue_intrpkt pkt; local 649 actlen >= (int)sizeof(pkt)) { 652 usbd_copy_out(pc, 0, &pkt, sizeof(pkt)); 654 if_inc_counter(ifp, IFCOUNTER_IERRORS, pkt.rue_rxlost_cnt); 655 if_inc_counter(ifp, IFCOUNTER_IERRORS, pkt.rue_crcerr_cnt); 656 if_inc_counter(ifp, IFCOUNTER_COLLISIONS, pkt.rue_col_cnt);
|
/freebsd-12-stable/sys/dev/drm2/radeon/ |
H A D | si.c | 2641 u32 *ib, struct radeon_cs_packet *pkt) 2643 switch (pkt->opcode) { 2656 DRM_ERROR("Invalid CE packet3: 0x%x\n", pkt->opcode); 2663 u32 *ib, struct radeon_cs_packet *pkt) 2665 u32 idx = pkt->idx + 1; 2670 switch (pkt->opcode) { 2731 for (i = 0; i < (pkt->count - 2); i++) { 2755 end_reg = 4 * pkt->count + start_reg - 4; 2762 for (i = 0; i < pkt->count; i++) { 2815 DRM_ERROR("Invalid GFX packet3: 0x%x\n", pkt 2640 si_vm_packet3_ce_check(struct radeon_device *rdev, u32 *ib, struct radeon_cs_packet *pkt) argument 2662 si_vm_packet3_gfx_check(struct radeon_device *rdev, u32 *ib, struct radeon_cs_packet *pkt) argument 2821 si_vm_packet3_compute_check(struct radeon_device *rdev, u32 *ib, struct radeon_cs_packet *pkt) argument 2907 struct radeon_cs_packet pkt; local [all...] |
/freebsd-12-stable/contrib/netbsd-tests/net/net/ |
H A D | t_mtudisc.sh | 85 local pkt=
|
H A D | t_mtudisc6.sh | 86 local pkt=
|