/freebsd-13-stable/sys/dev/iwm/ |
H A D | if_iwm_time_event.c | 218 iwm_rx_time_event_notif(struct iwm_softc *sc, struct iwm_rx_packet *pkt) argument 220 struct iwm_time_event_notif *notif = (void *)pkt->data; 231 iwm_te_notif(struct iwm_softc *sc, struct iwm_rx_packet *pkt, argument 235 int resp_len = iwm_rx_packet_payload_len(pkt); 237 if (pkt->hdr.code != IWM_TIME_EVENT_NOTIFICATION || 244 resp = (void *)pkt->data; 262 iwm_time_event_response(struct iwm_softc *sc, struct iwm_rx_packet *pkt, argument 266 int resp_len = iwm_rx_packet_payload_len(pkt); 268 if (pkt->hdr.code != IWM_TIME_EVENT_CMD || 275 resp = (void *)pkt [all...] |
/freebsd-13-stable/contrib/lib9p/pytest/ |
H A D | p9conn.py | 585 pkt, is_full = super(P9Client, self).read() 586 if pkt == b'': 597 resp = self.proto.unpack(pkt) 599 resp = protocol.plain.unpack(pkt) 604 resp = self.proto.unpack(pkt, noerror=True) 606 header = self.proto.unpack_header(pkt, noerror=True) 784 pkt = self.proto.Tattach(tag=tag, fid=fid, afid=afid, 787 super(P9Client, self).write(pkt) 816 pkt = self.proto.Twalk(tag=tag, fid=fid, newfid=newfid, nwname=0, 818 super(P9Client, self).write(pkt) [all...] |
/freebsd-13-stable/contrib/unbound/util/data/ |
H A D | msgreply.c | 75 parse_create_qinfo(sldns_buffer* pkt, struct msg_parse* msg, argument 84 dname_pkt_copy(pkt, qinf->qname, msg->qname); 183 rdata_copy(sldns_buffer* pkt, struct packed_rrset_data* data, uint8_t* to, argument 215 sldns_buffer_set_position(pkt, (size_t) 216 (rr->ttl_data - sldns_buffer_begin(pkt) + sizeof(uint32_t))); 223 pkt_len = sldns_buffer_read_u16(pkt); 224 if(sldns_buffer_remaining(pkt) < pkt_len) 236 oldpos = sldns_buffer_position(pkt); 237 dname_pkt_copy(pkt, to, 238 sldns_buffer_current(pkt)); 270 parse_rr_copy(sldns_buffer* pkt, struct rrset_parse* pset, struct packed_rrset_data* data) argument 313 parse_create_rrset(sldns_buffer* pkt, struct rrset_parse* pset, struct packed_rrset_data** data, struct regional* region) argument 377 parse_copy_decompress_rrset(sldns_buffer* pkt, struct msg_parse* msg, struct rrset_parse *pset, struct regional* region, struct ub_packed_rrset_key* pk) argument 415 parse_copy_decompress(sldns_buffer* pkt, struct msg_parse* msg, struct reply_info* rep, struct regional* region) argument 443 parse_create_msg(sldns_buffer* pkt, struct msg_parse* msg, struct alloc_cache* alloc, struct query_info* qinf, struct reply_info** rep, struct regional* region) argument 463 reply_info_parse(sldns_buffer* pkt, struct alloc_cache* alloc, struct query_info* qinf, struct reply_info** rep, struct regional* region, struct edns_data* edns) argument 930 parse_reply_in_temp_region(sldns_buffer* pkt, struct regional* region, struct query_info* qi) argument [all...] |
/freebsd-13-stable/sys/dev/hyperv/vmbus/ |
H A D | vmbus_chan.c | 1089 struct vmbus_chanpkt pkt; local 1095 hlen = sizeof(pkt); 1101 pkt.cp_hdr.cph_type = type; 1102 pkt.cp_hdr.cph_flags = flags; 1103 VMBUS_CHANPKT_SETLEN(pkt.cp_hdr.cph_hlen, hlen); 1104 VMBUS_CHANPKT_SETLEN(pkt.cp_hdr.cph_tlen, pad_pktlen); 1105 pkt.cp_hdr.cph_xactid = xactid; 1107 iov[0].iov_base = &pkt; 1124 struct vmbus_chanpkt_sglist pkt; local 1136 pkt 1164 struct vmbus_chanpkt_prplist pkt; local 1204 struct vmbus_chanpkt_hdr pkt; local 1243 vmbus_chan_recv_pkt(struct vmbus_channel *chan, struct vmbus_chanpkt_hdr *pkt, int *pktlen0) argument [all...] |
/freebsd-13-stable/sys/dev/hyperv/include/ |
H A D | vmbus.h | 97 #define VMBUS_CHANPKT_CONST_DATA(pkt) \ 98 (const void *)((const uint8_t *)(pkt) + \ 99 VMBUS_CHANPKT_GETLEN((pkt)->cph_hlen)) 102 #define VMBUS_CHANPKT_DATALEN(pkt) \ 103 (VMBUS_CHANPKT_GETLEN((pkt)->cph_tlen) -\ 104 VMBUS_CHANPKT_GETLEN((pkt)->cph_hlen)) 208 struct vmbus_chanpkt_hdr *pkt, int *pktlen);
|
/freebsd-13-stable/stand/libsa/ |
H A D | nfs.c | 187 void *pkt = NULL; local 222 args, len, (void **)&repl, &pkt); 224 free(pkt); 229 free(pkt); 233 free(pkt); 240 free(pkt); 251 void *pkt = NULL; local 291 args, len, (void **)&repl, &pkt); 293 free(pkt); 297 free(pkt); 324 void *pkt = NULL; local 395 void *pkt = NULL; local 770 static void *pkt = NULL; local [all...] |
/freebsd-13-stable/stand/uboot/lib/ |
H A D | net.c | 236 net_put(struct iodesc *desc, void *pkt, size_t len) argument 246 printf("net_put: desc %p, pkt %p, len %d\n", desc, pkt, len); 247 eh = pkt; 259 memcpy(sc->sc_txbufp, pkt, len); 275 net_get(struct iodesc *desc, void **pkt, time_t timeout) argument 285 printf("net_get: pkt %p, timeout %d\n", pkt, timeout); 309 *pkt = buf;
|
/freebsd-13-stable/contrib/ipfilter/ipsend/ |
H A D | sbpf.c | 139 int sendip(fd, pkt, len) 141 char *pkt; 143 if (write(fd, pkt, len) == -1)
|
H A D | sdlpi.c | 130 int sendip(fd, pkt, len) 132 char *pkt; 150 dp->buf = pkt;
|
/freebsd-13-stable/crypto/openssl/ssl/statem/ |
H A D | statem.c | 544 PACKET pkt; local 545 MSG_PROCESS_RETURN(*process_message) (SSL *s, PACKET *pkt); 631 if (!PACKET_buf_init(&pkt, s->init_msg, len)) { 636 ret = process_message(s, &pkt); 761 int (*get_construct_message_f) (SSL *s, WPACKET *pkt, 762 int (**confunc) (SSL *s, WPACKET *pkt), 765 int (*confunc) (SSL *s, WPACKET *pkt); 767 WPACKET pkt; local 826 if (!get_construct_message_f(s, &pkt, &confunc, &mt)) { 836 if (!WPACKET_init(&pkt, [all...] |
H A D | statem_lib.c | 75 int tls_close_construct_packet(SSL *s, WPACKET *pkt, int htype) argument 79 if ((htype != SSL3_MT_CHANGE_CIPHER_SPEC && !WPACKET_close(pkt)) 80 || !WPACKET_get_length(pkt, &msglen) 230 int tls_construct_cert_verify(SSL *s, WPACKET *pkt) argument 268 if (SSL_USE_SIGALGS(s) && !WPACKET_put_bytes_u16(pkt, lu->sigalg)) { 324 if (!WPACKET_sub_memcpy_u16(pkt, sig, siglen)) { 345 MSG_PROCESS_RETURN tls_process_cert_verify(SSL *s, PACKET *pkt) argument 386 if (!PACKET_get_net_2(pkt, &sigalg)) { 420 && ((PACKET_remaining(pkt) == 64 423 || (PACKET_remaining(pkt) 532 tls_construct_finished(SSL *s, WPACKET *pkt) argument 611 tls_construct_key_update(SSL *s, WPACKET *pkt) argument 623 tls_process_key_update(SSL *s, PACKET *pkt) argument 700 tls_process_change_cipher_spec(SSL *s, PACKET *pkt) argument 762 tls_process_finished(SSL *s, PACKET *pkt) argument 870 tls_construct_change_cipher_spec(SSL *s, WPACKET *pkt) argument 882 ssl_add_cert_to_wpacket(SSL *s, WPACKET *pkt, X509 *x, int chain) argument 911 ssl_add_cert_chain(SSL *s, WPACKET *pkt, CERT_PKEY *cpk) argument 1007 ssl3_output_cert_chain(SSL *s, WPACKET *pkt, CERT_PKEY *cpk) argument 2255 parse_ca_names(SSL *s, PACKET *pkt) argument 2331 construct_ca_names(SSL *s, const STACK_OF(X509_NAME) *ca_sk, WPACKET *pkt) argument [all...] |
/freebsd-13-stable/contrib/ntp/ntpd/ |
H A D | ntp_proto.c | 306 struct pkt * rpkt; 620 register struct pkt *pkt; /* receive packet pointer */ local 680 pkt = &rbufp->recv_pkt; 681 hisversion = PKT_VERSION(pkt->li_vn_mode); 682 hismode = (int)PKT_MODE(pkt->li_vn_mode); 725 hisleap = PKT_LEAP(pkt->li_vn_mode); 726 hisstratum = PKT_TO_STRATUM(pkt->stratum); 735 ntohl(pkt->org.l_ui), ntohl(pkt 2474 process_packet( register struct peer *peer, register struct pkt *pkt, u_int len ) argument [all...] |
/freebsd-13-stable/sys/dev/hyperv/pcib/ |
H A D | vmbus_pcib.c | 537 struct pci_packet pkt; member in struct:__anon12212 542 int_pkt = (struct pci_delete_interrupt *)&ctxt.pkt.message; 589 struct pci_packet pkt; member in struct:__anon12213 602 ctxt.pkt.compl_ctxt = &comp_pkt; 603 ctxt.pkt.completion_func = q_resource_requirements; 605 res_req = (struct pci_child_message *)&ctxt.pkt.message; 611 res_req, sizeof(*res_req), (uint64_t)(uintptr_t)&ctxt.pkt); 902 struct pci_packet pkt; member in struct:__anon12214 909 eject_pkt = (struct pci_eject_response *)&ctxt.pkt.message; 955 struct vmbus_chanpkt_hdr *pkt local 1043 struct pci_packet pkt; member in struct:__anon12215 1102 struct pci_packet pkt; member in struct:__anon12216 1154 struct pci_packet *pkt; local 1203 struct pci_child_message pkt; local 1742 struct pci_packet pkt; member in struct:__anon12217 [all...] |
/freebsd-13-stable/contrib/opencsd/decoder/include/pkt_printers/ |
H A D | pkt_printer_t.h | 60 const P *pkt, 151 const P *pkt, 171 PacketDataIn(op,index_sop,pkt); 176 PacketDataIn(op,index_sop,pkt); 149 RawPacketDataMon( const ocsd_datapath_op_t op, const ocsd_trc_index_t index_sop, const P *pkt, const uint32_t size, const uint8_t *p_data) argument
|
/freebsd-13-stable/usr.sbin/fwcontrol/ |
H A D | fwcontrol.c | 217 asyreq->pkt.mode.rreqq.dst = FWLOCALBUS | node; 222 asyreq->pkt.mode.rreqq.tlrt = 0; 224 asyreq->pkt.mode.rreqq.tcode = FWTCODE_RREQQ; 226 asyreq->pkt.mode.rreqq.tcode = FWTCODE_WREQQ; 228 asyreq->pkt.mode.rreqq.dest_hi = 0xffff; 229 asyreq->pkt.mode.rreqq.dest_lo = addr_lo; 231 qld = (u_int32_t *)&asyreq->pkt; 233 asyreq->pkt.mode.wreqq.data = htonl(data); 271 asyreq->pkt.mode.ld[0] = 0; 272 asyreq->pkt [all...] |
H A D | fwdv.c | 103 struct fw_pkt *pkt; local 171 pkt = (struct fw_pkt *) ptr; 186 if (pkt->mode.stream.len <= sizeof(struct ciphdr)) 263 struct fw_pkt *pkt; local 296 pkt = (struct fw_pkt *) &iso_data; 297 pkt->mode.stream.len = DSIZE + sizeof(struct ciphdr); 298 pkt->mode.stream.sy = 0; 299 pkt->mode.stream.tcode = FWTCODE_STREAM; 300 pkt->mode.stream.chtag = ich; 302 pkt [all...] |
/freebsd-13-stable/contrib/ldns/drill/ |
H A D | dnssec.c | 176 ldns_verify_denial(ldns_pkt *pkt, ldns_rdf *name, ldns_rr_type type, ldns_rr_list **nsec_rrs, ldns_rr_list **nsec_rr_sigs) argument 186 ldns_pkt_print(stdout, pkt); 191 nsecs = ldns_pkt_rr_list_by_type(pkt, LDNS_RR_TYPE_NSEC, LDNS_SECTION_ANY_NOQUESTION); 219 (void) get_dnssec_rr(pkt, ldns_rr_owner(ldns_rr_list_rr(nsecs, nsec_i)), LDNS_RR_TYPE_NSEC, nsec_rrs, nsec_rr_sigs); 229 (void) get_dnssec_rr(pkt, ldns_rr_owner(ldns_rr_list_rr(nsecs, nsec_i)), LDNS_RR_TYPE_NSEC, nsec_rrs, nsec_rr_sigs); 238 } else if( (nsecs = ldns_pkt_rr_list_by_type(pkt, LDNS_RR_TYPE_NSEC3, LDNS_SECTION_ANY_NOQUESTION)) ) { 239 ldns_rr_list* sigs = ldns_pkt_rr_list_by_type(pkt, LDNS_RR_TYPE_RRSIG, LDNS_SECTION_ANY_NOQUESTION); 266 /* result = ldns_dnssec_verify_denial_nsec3(q, nsecs, sigs, ldns_pkt_get_rcode(pkt), type, ldns_pkt_ancount(pkt) == 0); */ 267 result = ldns_dnssec_verify_denial_nsec3_match(q, nsecs, sigs, ldns_pkt_get_rcode(pkt), typ [all...] |
H A D | drill.h | 76 /* verifies denial of existence of *name in *pkt (must contain NSEC or NSEC3 records 80 ldns_status ldns_verify_denial(ldns_pkt *pkt, 91 void dump_hex(const ldns_pkt *pkt, const char *file);
|
/freebsd-13-stable/contrib/netbsd-tests/net/bpfilter/ |
H A D | t_bpfilter.c | 159 char *pkt; local 176 pkt = NULL; 189 pkt = calloc(1, pktsize); 190 icmp = (struct icmp *)pkt; 191 if (pkt == NULL) 194 memcpy(pkt + pktsize - 7, tail, 7); 198 icmp->icmp_cksum = in_cksum(pkt, pktsize); 201 if (rump_sys_sendto(s, pkt, pktsize, 0, 206 if (rump_sys_recvfrom(s, pkt, pktsize, 0, 212 if (pkt ! [all...] |
/freebsd-13-stable/contrib/unbound/daemon/ |
H A D | worker.c | 323 * @param pkt: the wire packet to examine for sanity. 328 worker_check_request(sldns_buffer* pkt, struct worker* worker) argument 330 if(sldns_buffer_limit(pkt) < LDNS_HEADER_SIZE) { 334 if(sldns_buffer_limit(pkt) > NORMAL_UDP_SIZE && 339 if(LDNS_QR_WIRE(sldns_buffer_begin(pkt))) { 343 if(LDNS_TC_WIRE(sldns_buffer_begin(pkt))) { 344 LDNS_TC_CLR(sldns_buffer_begin(pkt)); 348 if(LDNS_OPCODE_WIRE(sldns_buffer_begin(pkt)) != LDNS_PACKET_QUERY && 349 LDNS_OPCODE_WIRE(sldns_buffer_begin(pkt)) != LDNS_PACKET_NOTIFY) { 351 LDNS_OPCODE_WIRE(sldns_buffer_begin(pkt))); 817 chaos_replystr(sldns_buffer* pkt, char** str, int num, struct edns_data* edns, struct worker* worker, struct comm_reply* repinfo) argument 861 chaos_replyonestr(sldns_buffer* pkt, const char* str, struct edns_data* edns, struct worker* worker, struct comm_reply* repinfo) argument 875 chaos_trustanchor(sldns_buffer* pkt, struct edns_data* edns, struct worker* w, struct comm_reply* repinfo) argument 935 answer_chaos(struct worker* w, struct query_info* qinfo, struct edns_data* edns, struct comm_reply* repinfo, sldns_buffer* pkt) argument 996 answer_notify(struct worker* w, struct query_info* qinfo, struct edns_data* edns, sldns_buffer* pkt, struct comm_reply* repinfo) argument [all...] |
/freebsd-13-stable/contrib/unbound/sldns/ |
H A D | wire2str.h | 157 * @param pkt: packet for decompression, if NULL no decompression. 159 * @param comprloop: if pkt, bool detects compression loops. 163 size_t* str_len, uint8_t* pkt, size_t pktlen, int* comprloop); 172 * @param pkt: packet for decompression, if NULL no decompression. 174 * @param comprloop: if pkt, bool detects compression loops. 178 size_t* str_len, uint8_t* pkt, size_t pktlen, int* comprloop); 187 * @param pkt: packet for decompression, if NULL no decompression. 189 * @param comprloop: if pkt, bool detects compression loops. 193 size_t* str_len, uint8_t* pkt, size_t pktlen, int* comprloop); 232 * @param pkt [all...] |
/freebsd-13-stable/contrib/ldns/ldns/ |
H A D | net.h | 83 * \param[out] pkt packet received from the nameserver 88 ldns_status ldns_send(ldns_pkt **pkt, ldns_resolver *r, const ldns_pkt *query_pkt); 94 * \param[out] pkt packet received from the nameserver 100 ldns_status ldns_send_buffer(ldns_pkt **pkt, ldns_resolver *r, ldns_buffer *qb, ldns_rdf *tsig_mac);
|
/freebsd-13-stable/contrib/opencsd/decoder/include/opencsd/c_api/ |
H A D | ocsd_c_api_custom.h | 153 const void *pkt, 165 const void *pkt);
|
/freebsd-13-stable/contrib/ntp/libntp/ |
H A D | socket.c | 201 struct pkt * pkt,
|
H A D | a_md5encrypt.c | 192 u_int32 * pkt, /* packet pointer */ 199 robuffT msgb = { pkt, length }; 206 memcpy((u_char *)pkt + length + KEY_MAC_LEN, digest, dlen); 221 u_int32 * pkt, /* packet pointer */ 229 robuffT msgb = { pkt, length }; 243 (u_char *)pkt + length + KEY_MAC_LEN, dlen); 188 MD5authencrypt( int type, const u_char * key, size_t klen, u_int32 * pkt, size_t length ) argument 217 MD5authdecrypt( int type, const u_char * key, size_t klen, u_int32 * pkt, size_t length, size_t size ) argument
|