Searched refs:pkt (Results 276 - 300 of 340) sorted by relevance

<<11121314

/freebsd-13-stable/contrib/bsnmp/snmp_ntp/
H A Dsnmp_ntp.c292 dump_packet(const u_char *pkt, size_t ret) argument
300 sprintf(buf + strlen(buf), " %02x", pkt[i + j]);
379 u_char pkt[NTPC_MAX + 1]; local
429 ret = recv(ntpd_sock, pkt, sizeof(pkt), 0);
438 dump_packet(pkt, (size_t)ret);
441 ptr = pkt;
457 syslog(LOG_ERR, "error response: %.*s", (int)z, pkt + 12);
/freebsd-13-stable/contrib/ntp/sntp/tests/
H A DpacketProcessing.c43 /* [Bug 2998] There are some issues whith the definition of 'struct pkt'
56 struct pkt p;
57 u_char b[sizeof(struct pkt) + EXTRA_BUFSIZE];
/freebsd-13-stable/tools/tools/netmap/
H A Dbridge.c109 uint32_t pkt = ts->buf_idx; local
111 rs->buf_idx = pkt;
/freebsd-13-stable/contrib/lib9p/pytest/
H A Dprotocol.py104 >>> pkt = dotu.pack(fcall='Tversion', args=args)
105 >>> len(pkt)
119 >>> struct.unpack('<IBHIHB', pkt)
130 >>> pkt = dotu.pack(fcall='Tversion', args=args)
131 >>> len(pkt)
137 >>> pkt == pkt2
146 >>> pkt == pkt2
169 pkt = protocol.plain.pack(fcall='Rerror',
173 pkt = proto.pack(fcall='Rversion', args={'tag': tag, 'msize': msize})
185 pkt
[all...]
/freebsd-13-stable/sys/dev/usb/net/
H A Dif_aue.c746 struct aue_intrpkt pkt; local
756 actlen >= (int)sizeof(pkt)) {
758 usbd_copy_out(pc, 0, &pkt, sizeof(pkt));
760 if (pkt.aue_txstat0)
762 if (pkt.aue_txstat0 & (AUE_TXSTAT0_LATECOLL |
/freebsd-13-stable/contrib/ldns/
H A Ddnssec.c198 ldns_dnssec_pkt_has_rrsigs(const ldns_pkt *pkt) argument
201 for (i = 0; i < ldns_pkt_ancount(pkt); i++) {
202 if (ldns_rr_get_type(ldns_rr_list_rr(ldns_pkt_answer(pkt), i)) ==
207 for (i = 0; i < ldns_pkt_nscount(pkt); i++) {
208 if (ldns_rr_get_type(ldns_rr_list_rr(ldns_pkt_authority(pkt), i)) ==
217 ldns_dnssec_pkt_get_rrsigs_for_name_and_type(const ldns_pkt *pkt, argument
226 sigs = ldns_pkt_rr_list_by_name_and_type(pkt,
244 ldns_dnssec_pkt_get_rrsigs_for_type(const ldns_pkt *pkt, ldns_rr_type type) argument
251 sigs = ldns_pkt_rr_list_by_type(pkt,
/freebsd-13-stable/crypto/openssl/ssl/
H A Dt1_enc.c97 PACKET pkt, subpkt; local
100 if (!PACKET_buf_init(&pkt, rbuf->buf + rbuf->offset, rbuf->left))
103 while (PACKET_remaining(&pkt) > 0) {
105 if (!PACKET_forward(&pkt, 3))
109 if (PACKET_get_length_prefixed_2(&pkt, &subpkt))
H A Ds3_lib.c3273 int ssl3_set_handshake_header(SSL *s, WPACKET *pkt, int htype) argument
3280 if (!WPACKET_put_bytes_u8(pkt, htype)
3281 || !WPACKET_start_sub_packet_u24(pkt))
4104 int ssl3_put_cipher_by_char(const SSL_CIPHER *c, WPACKET *pkt, size_t *len) argument
4111 if (!WPACKET_put_bytes_u16(pkt, c->id & 0xffff))
4326 int ssl3_get_req_cert_type(SSL *s, WPACKET *pkt) argument
4332 return WPACKET_memcpy(pkt, s->cert->ctype, s->cert->ctype_len);
4340 return WPACKET_put_bytes_u8(pkt, TLS_CT_GOST01_SIGN)
4341 && WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_SIGN)
4342 && WPACKET_put_bytes_u8(pkt, TLS_CT_GOST12_512_SIG
[all...]
/freebsd-13-stable/contrib/ntp/ntpd/
H A Dntp_control.c1176 struct ntp_control *pkt; local
1192 pkt = (struct ntp_control *)&rbufp->recv_pkt;
1207 if ( (CTL_RESPONSE | CTL_MORE | CTL_ERROR) & pkt->r_m_e_op
1208 || pkt->offset != 0) {
1210 if (CTL_RESPONSE & pkt->r_m_e_op)
1212 if (CTL_MORE & pkt->r_m_e_op)
1214 if (CTL_ERROR & pkt->r_m_e_op)
1216 if (pkt->offset != 0)
1221 res_version = PKT_VERSION(pkt->li_vn_mode);
1235 res_opcode = pkt
[all...]
H A Dntp_io.c3137 struct pkt * pkt,
3213 cc = simulate_server(dest, src, pkt);
3215 cc = io_completion_port_sendto(src, src->fd, pkt,
3218 cc = sendto(src->fd, (char *)pkt, (u_int)len, 0,
3232 /* HMS: pkt->rootdisp is usually random here */
3233 NTOHL_FP(&pkt->org, &org);
3234 NTOHL_FP(&pkt->rec, &rec);
3235 NTOHL_FP(&pkt->xmt, &xmt);
3238 PKT_LEAP(pkt
3133 sendpkt( sockaddr_u * dest, struct interface * ep, int ttl, struct pkt * pkt, int len ) argument
[all...]
H A Dntpsim.c259 struct pkt *rpkt /* Packet sent to the server that
263 struct pkt xpkt; /* Packet to be transmitted back
/freebsd-13-stable/contrib/netbsd-tests/net/ndp/
H A Dt_ra.sh609 local pkt="$2 > $3: .+ echo request"
612 $DEBUG && echo $pkt
614 atf_check -s exit:0 -o match:"$pkt" cat ./out
/freebsd-13-stable/sys/kern/
H A Dtty_pts.c120 char pkt; local
134 pkt = psc->pts_pkt;
138 error = ureadc(pkt, uio);
/freebsd-13-stable/contrib/ntp/ntpdate/
H A Dntpdate.c217 static void sendpkt (sockaddr_u *, struct pkt *, int);
664 struct pkt xpkt;
748 register struct pkt *rpkt;
807 printf("receive: pkt.org and peer.xmt differ\n");
879 t10 = server->org; /* pkt.xmt == t1 */
882 t23 = rec; /* pkt.rec == t2 */
883 L_SUB(&t23, &org); /* pkt->org == t3 */
1848 struct pkt *pkt,
1874 cc = sendto(sock, (char *)pkt, le
1846 sendpkt( sockaddr_u *dest, struct pkt *pkt, int len ) argument
[all...]
/freebsd-13-stable/contrib/wpa/src/rsn_supp/
H A Dwpa_i.h398 const u8 *pkt, size_t pkt_len)
401 sm->ctx->fils_hlp_rx(sm->ctx->ctx, dst, src, pkt, pkt_len);
396 wpa_sm_fils_hlp_rx(struct wpa_sm *sm, const u8 *dst, const u8 *src, const u8 *pkt, size_t pkt_len) argument
/freebsd-13-stable/sys/dev/usb/serial/
H A Du3g.c1217 struct usb_cdc_notification pkt; local
1231 usbd_copy_out(pc, 0, &pkt, actlen);
1233 wLen = UGETW(pkt.wLength);
1239 if (pkt.bmRequestType == UCDC_NOTIFICATION
1240 && pkt.bNotification == UCDC_N_SERIAL_STATE) {
1246 pkt.data[0], pkt.data[1]);
1252 mstatus = pkt.data[0];
/freebsd-13-stable/sys/dev/iwm/
H A Dif_iwm_phy_db.c314 struct iwm_rx_packet *pkt)
317 (struct iwm_calib_res_notif_phy_db *)pkt->data;
313 iwm_phy_db_set_section(struct iwm_phy_db *phy_db, struct iwm_rx_packet *pkt) argument
H A Dif_iwm_scan.c246 struct iwm_rx_packet *pkt)
248 struct iwm_periodic_scan_complete *scan_notif = (void *)pkt->data;
272 struct iwm_rx_packet *pkt)
274 struct iwm_umac_scan_complete *notif = (void *)pkt->data;
245 iwm_rx_lmac_scan_complete_notif(struct iwm_softc *sc, struct iwm_rx_packet *pkt) argument
271 iwm_rx_umac_scan_complete_notif(struct iwm_softc *sc, struct iwm_rx_packet *pkt) argument
/freebsd-13-stable/contrib/unbound/services/
H A Dauthzone.h614 int auth_zone_parse_notify_serial(struct sldns_buffer* pkt, uint32_t *serial);
/freebsd-13-stable/sbin/routed/
H A Drdisc.c945 } pkt; member in struct:__anon7894
971 hlen = buf.pkt.ip.ip_hl << 2;
974 p = (union ad_u *)&buf.pkt.b[hlen];
991 buf.pkt.ip.ip_dst.s_addr, p, cc);
/freebsd-13-stable/sys/netinet6/
H A Dsctp6_usrreq.c793 if (inp->pkt) {
797 inp->pkt_last = inp->pkt = m;
814 ret = sctp_output(inp, inp->pkt, addr, inp->control, p, flags);
816 inp->pkt = NULL;
/freebsd-13-stable/contrib/libpcap/
H A Dpcap.c436 pcap_oneshot(u_char *user, const struct pcap_pkthdr *h, const u_char *pkt) argument
441 *sp->pkt = pkt;
448 const u_char *pkt; local
451 s.pkt = &pkt;
455 return (pkt);
465 s.pkt = pkt_data;
3791 const u_char *pkt)
3796 return (bpf_filter(fcode, pkt,
[all...]
/freebsd-13-stable/contrib/unbound/libunbound/
H A Dlibworker.c717 add_bg_result(struct libworker* w, struct ctx_query* q, sldns_buffer* pkt, argument
733 if(pkt) {
734 q->msg_len = sldns_buffer_remaining(pkt);
735 q->msg = memdup(sldns_buffer_begin(pkt), q->msg_len);
749 msg = context_serialize_answer(q, err, pkt, &len);
/freebsd-13-stable/sys/compat/ndis/
H A Dsubr_ndis.c1816 ndis_packet *pkt; local
1834 pkt = (ndis_packet *)InterlockedPopEntrySList(&p->np_head);
1840 if (pkt == NULL) {
1845 bzero((char *)pkt, sizeof(ndis_packet));
1848 pkt->np_private.npp_pool = pool;
1851 pkt->np_private.npp_packetooboffset = offsetof(ndis_packet, np_oob);
1859 pkt->np_private.npp_ndispktflags = NDIS_PACKET_ALLOCATED_BY_NDIS;
1860 pkt->np_private.npp_validcounts = FALSE;
1862 *packet = pkt;
/freebsd-13-stable/crypto/openssl/ssl/record/
H A Dssl3_record.c187 PACKET pkt, sslv2pkt; local
241 if (!PACKET_buf_init(&pkt, RECORD_LAYER_get_packet(&s->rlayer),
247 sslv2pkt = pkt;
293 if (!PACKET_get_1(&pkt, &type)
294 || !PACKET_get_net_2(&pkt, &version)
295 || !PACKET_get_net_2_len(&pkt, &thisrr->length)) {

Completed in 315 milliseconds

<<11121314