/freebsd-12-stable/sys/dev/qlnx/qlnxe/ |
H A D | ecore_ll2_api.h | 267 * @param pkt - info regarding the tx packet 275 struct ecore_ll2_tx_pkt_info *pkt,
|
/freebsd-12-stable/contrib/ntp/sntp/tests/ |
H A D | packetProcessing.c | 43 /* [Bug 2998] There are some issues whith the definition of 'struct pkt' 56 struct pkt p; 57 u_char b[sizeof(struct pkt) + EXTRA_BUFSIZE];
|
/freebsd-12-stable/contrib/bsnmp/snmp_ntp/ |
H A D | snmp_ntp.c | 292 dump_packet(const u_char *pkt, size_t ret) argument 300 sprintf(buf + strlen(buf), " %02x", pkt[i + j]); 379 u_char pkt[NTPC_MAX + 1]; local 429 ret = recv(ntpd_sock, pkt, sizeof(pkt), 0); 438 dump_packet(pkt, (size_t)ret); 441 ptr = pkt; 457 syslog(LOG_ERR, "error response: %.*s", (int)z, pkt + 12);
|
/freebsd-12-stable/tools/tools/netmap/ |
H A D | bridge.c | 109 uint32_t pkt = ts->buf_idx; local 111 rs->buf_idx = pkt;
|
/freebsd-12-stable/contrib/amd/amd/ |
H A D | ops_nfs.c | 180 got_nfs_fh_mount(voidp pkt, int len, struct sockaddr_in *sa, struct sockaddr_in *ia, opaque_t arg, int done) argument 199 fp->fh_error = pickup_rpc_reply(pkt, len, (voidp) &res3, 214 fp->fh_error = pickup_rpc_reply(pkt, len, (voidp) &res, 248 got_nfs_fh_webnfs(voidp pkt, int len, struct sockaddr_in *sa, struct sockaddr_in *ia, opaque_t arg, int done) argument 267 fp->fh_error = pickup_rpc_reply(pkt, len, (voidp) &res3, 278 fp->fh_error = pickup_rpc_reply(pkt, len, (voidp) &res,
|
/freebsd-12-stable/sys/dev/usb/net/ |
H A D | if_aue.c | 738 struct aue_intrpkt pkt; local 748 actlen >= (int)sizeof(pkt)) { 751 usbd_copy_out(pc, 0, &pkt, sizeof(pkt)); 753 if (pkt.aue_txstat0) 755 if (pkt.aue_txstat0 & (AUE_TXSTAT0_LATECOLL |
|
H A D | if_ure.c | 513 struct ure_rxpkt pkt; local 520 if (actlen < (int)(sizeof(pkt))) { 525 usbd_copy_out(pc, 0, &pkt, sizeof(pkt)); 526 len = le32toh(pkt.ure_pktlen) & URE_RXPKT_LEN_MASK; 528 if (actlen < (int)(len + sizeof(pkt))) { 533 uether_rxbuf(ue, pc, sizeof(pkt), len);
|
/freebsd-12-stable/contrib/ldns/ |
H A D | dnssec.c | 198 ldns_dnssec_pkt_has_rrsigs(const ldns_pkt *pkt) argument 201 for (i = 0; i < ldns_pkt_ancount(pkt); i++) { 202 if (ldns_rr_get_type(ldns_rr_list_rr(ldns_pkt_answer(pkt), i)) == 207 for (i = 0; i < ldns_pkt_nscount(pkt); i++) { 208 if (ldns_rr_get_type(ldns_rr_list_rr(ldns_pkt_authority(pkt), i)) == 217 ldns_dnssec_pkt_get_rrsigs_for_name_and_type(const ldns_pkt *pkt, argument 226 sigs = ldns_pkt_rr_list_by_name_and_type(pkt, 244 ldns_dnssec_pkt_get_rrsigs_for_type(const ldns_pkt *pkt, ldns_rr_type type) argument 251 sigs = ldns_pkt_rr_list_by_type(pkt,
|
/freebsd-12-stable/contrib/ntp/ntpd/ |
H A D | ntp_control.c | 1176 struct ntp_control *pkt; local 1192 pkt = (struct ntp_control *)&rbufp->recv_pkt; 1207 if ( (CTL_RESPONSE | CTL_MORE | CTL_ERROR) & pkt->r_m_e_op 1208 || pkt->offset != 0) { 1210 if (CTL_RESPONSE & pkt->r_m_e_op) 1212 if (CTL_MORE & pkt->r_m_e_op) 1214 if (CTL_ERROR & pkt->r_m_e_op) 1216 if (pkt->offset != 0) 1221 res_version = PKT_VERSION(pkt->li_vn_mode); 1235 res_opcode = pkt [all...] |
H A D | ntp_io.c | 3137 struct pkt * pkt, 3213 cc = simulate_server(dest, src, pkt); 3215 cc = io_completion_port_sendto(src, src->fd, pkt, 3218 cc = sendto(src->fd, (char *)pkt, (u_int)len, 0, 3232 /* HMS: pkt->rootdisp is usually random here */ 3233 NTOHL_FP(&pkt->org, &org); 3234 NTOHL_FP(&pkt->rec, &rec); 3235 NTOHL_FP(&pkt->xmt, &xmt); 3238 PKT_LEAP(pkt 3133 sendpkt( sockaddr_u * dest, struct interface * ep, int ttl, struct pkt * pkt, int len ) argument [all...] |
H A D | ntpsim.c | 259 struct pkt *rpkt /* Packet sent to the server that 263 struct pkt xpkt; /* Packet to be transmitted back
|
/freebsd-12-stable/contrib/netbsd-tests/net/ndp/ |
H A D | t_ra.sh | 609 local pkt="$2 > $3: .+ echo request" 612 $DEBUG && echo $pkt 614 atf_check -s exit:0 -o match:"$pkt" cat ./out
|
/freebsd-12-stable/sys/kern/ |
H A D | tty_pts.c | 120 char pkt; local 134 pkt = psc->pts_pkt; 138 error = ureadc(pkt, uio);
|
/freebsd-12-stable/contrib/ntp/ntpdate/ |
H A D | ntpdate.c | 217 static void sendpkt (sockaddr_u *, struct pkt *, int); 664 struct pkt xpkt; 748 register struct pkt *rpkt; 807 printf("receive: pkt.org and peer.xmt differ\n"); 879 t10 = server->org; /* pkt.xmt == t1 */ 882 t23 = rec; /* pkt.rec == t2 */ 883 L_SUB(&t23, &org); /* pkt->org == t3 */ 1848 struct pkt *pkt, 1874 cc = sendto(sock, (char *)pkt, le 1846 sendpkt( sockaddr_u *dest, struct pkt *pkt, int len ) argument [all...] |
/freebsd-12-stable/contrib/wpa/src/rsn_supp/ |
H A D | wpa_i.h | 398 const u8 *pkt, size_t pkt_len) 401 sm->ctx->fils_hlp_rx(sm->ctx->ctx, dst, src, pkt, pkt_len); 396 wpa_sm_fils_hlp_rx(struct wpa_sm *sm, const u8 *dst, const u8 *src, const u8 *pkt, size_t pkt_len) argument
|
/freebsd-12-stable/sys/dev/drm/ |
H A D | r128_drv.h | 413 #define CCE_PACKET3( pkt, n ) (R128_CCE_PACKET3 | \ 414 (pkt) | ((n) << 16))
|
/freebsd-12-stable/sys/dev/usb/serial/ |
H A D | u3g.c | 1220 struct usb_cdc_notification pkt; local 1234 usbd_copy_out(pc, 0, &pkt, actlen); 1236 wLen = UGETW(pkt.wLength); 1242 if (pkt.bmRequestType == UCDC_NOTIFICATION 1243 && pkt.bNotification == UCDC_N_SERIAL_STATE) { 1249 pkt.data[0], pkt.data[1]); 1255 mstatus = pkt.data[0];
|
/freebsd-12-stable/sys/dev/iwm/ |
H A D | if_iwm_phy_db.c | 314 struct iwm_rx_packet *pkt) 317 (struct iwm_calib_res_notif_phy_db *)pkt->data; 313 iwm_phy_db_set_section(struct iwm_phy_db *phy_db, struct iwm_rx_packet *pkt) argument
|
H A D | if_iwm_scan.c | 246 struct iwm_rx_packet *pkt) 248 struct iwm_periodic_scan_complete *scan_notif = (void *)pkt->data; 272 struct iwm_rx_packet *pkt) 274 struct iwm_umac_scan_complete *notif = (void *)pkt->data; 245 iwm_rx_lmac_scan_complete_notif(struct iwm_softc *sc, struct iwm_rx_packet *pkt) argument 271 iwm_rx_umac_scan_complete_notif(struct iwm_softc *sc, struct iwm_rx_packet *pkt) argument
|
/freebsd-12-stable/contrib/unbound/services/ |
H A D | authzone.h | 614 int auth_zone_parse_notify_serial(struct sldns_buffer* pkt, uint32_t *serial);
|
/freebsd-12-stable/sys/netinet6/ |
H A D | sctp6_usrreq.c | 750 if (inp->pkt) { 754 inp->pkt_last = inp->pkt = m; 769 ret = sctp_output(inp, inp->pkt, addr, inp->control, p, flags); 770 inp->pkt = NULL;
|
/freebsd-12-stable/sbin/routed/ |
H A D | rdisc.c | 952 } pkt; member in struct:__anon8900 978 hlen = buf.pkt.ip.ip_hl << 2; 981 p = (union ad_u *)&buf.pkt.b[hlen]; 998 buf.pkt.ip.ip_dst.s_addr, p, cc);
|
/freebsd-12-stable/contrib/libpcap/ |
H A D | pcap.c | 436 pcap_oneshot(u_char *user, const struct pcap_pkthdr *h, const u_char *pkt) argument 441 *sp->pkt = pkt; 448 const u_char *pkt; local 451 s.pkt = &pkt; 455 return (pkt); 465 s.pkt = pkt_data; 3791 const u_char *pkt) 3796 return (bpf_filter(fcode, pkt, [all...] |
/freebsd-12-stable/contrib/unbound/libunbound/ |
H A D | libworker.c | 717 add_bg_result(struct libworker* w, struct ctx_query* q, sldns_buffer* pkt, argument 733 if(pkt) { 734 q->msg_len = sldns_buffer_remaining(pkt); 735 q->msg = memdup(sldns_buffer_begin(pkt), q->msg_len); 749 msg = context_serialize_answer(q, err, pkt, &len);
|
/freebsd-12-stable/crypto/openssl/ssl/ |
H A D | s3_lib.c | 3273 int ssl3_set_handshake_header(SSL *s, WPACKET *pkt, int htype) argument 3280 if (!WPACKET_put_bytes_u8(pkt, htype) 3281 || !WPACKET_start_sub_packet_u24(pkt)) 4104 int ssl3_put_cipher_by_char(const SSL_CIPHER *c, WPACKET *pkt, size_t *len) argument 4111 if (!WPACKET_put_bytes_u16(pkt, c->id & 0xffff)) 4326 int ssl3_get_req_cert_type(SSL *s, WPACKET *pkt) argument 4332 return WPACKET_memcpy(pkt, s->cert->ctype, s->cert->ctype_len); 4340 return WPACKET_put_bytes_u8(pkt, TLS_CT_GOST01_SIGN) 4341 && WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_SIGN) 4342 && WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_512_SIG [all...] |