Searched refs:packet (Results 126 - 135 of 135) sorted by relevance
123456
/macosx-10.10/eap8021x-198/eapolclient.tproj/ |
H A D | Supplicant.c | 883 * Verify that the signature in the key packet is valid. 886 * compute the HMAC-MD5 hash over the entire EAPOL key packet 889 * the packet. If they match, the packet is valid, if not 895 eapol_key_verify_signature(EAPOLPacketRef packet, int packet_length, argument 904 /* make a copy of the entire packet */ 906 bcopy(packet, packet_copy, packet_length); 913 descr_p = (EAPOLKeyDescriptorRef)packet->body; 983 /* decrypt the key from the packet */ 1637 /* this should not happen, but if it does, ignore the packet */ [all...] |
/macosx-10.10/ppp-786.1.1/Helpers/pppd/ |
H A D | sys-MacOSX.c | 1601 Output PPP packet 1695 get a PPP packet from the serial device 1948 * result of an error detected after decompression of a packet, 3994 u_char *packet; local 4013 packet = outpack; 4021 if ((i = sendto(s, (char *)packet, ICMP_MINLEN, 0, (struct sockaddr *)dst, sizeof(*dst))) != ICMP_MINLEN) {
|
/macosx-10.10/OpenSSL098-52/src/include/openssl/ |
H A D | ssl.h | 933 /* used internally to point at a raw packet */ 934 unsigned char *packet; member in struct:ssl_st
|
/macosx-10.10/OpenSSL098-52/src/ssl/ |
H A D | ssl.h | 933 /* used internally to point at a raw packet */ 934 unsigned char *packet; member in struct:ssl_st
|
/macosx-10.10/Security-57031.1.35/Security/sec/SOSCircle/SecureObjectSync/ |
H A D | SOSMessage.c | 115 -- Message Sequence Number for tracking packet loss in transport
|
/macosx-10.10/xnu-2782.1.97/bsd/netinet6/ |
H A D | nd6.c | 3403 * At this point, the destination of the packet must be a unicast 3482 * The first time we send a packet to a neighbor whose entry is 3499 * send the packet. 3610 /* discard the packet if IPv6 operation is disabled on the interface */ 3785 mbuf_t packet) 3811 if ((packet->m_flags & M_MCAST) != 0) { 3783 nd6_lookup_ipv6(ifnet_t ifp, const struct sockaddr_in6 *ip6_dest, struct sockaddr_dl *ll_dest, size_t ll_dest_len, route_t hint, mbuf_t packet) argument
|
/macosx-10.10/xnu-2782.1.97/bsd/net/ |
H A D | if_bridge.c | 1883 /* Adjust packet back to original */ 2023 bridge_proto_input(ifnet_t ifp, protocol_family_t protocol, mbuf_t packet, argument 2026 #pragma unused(protocol, packet, header) 2028 printf("%s: unexpected packet from %s\n", __func__, 3582 * Enqueue a packet on a bridge member interface. 3615 * then attach a packet tag that holds it. 3657 * Receive a queued packet from dummynet and pass it on to the output 3670 * The packet didnt originate from a member interface. This should only 3730 * If the packet is an 802.1X ethertype, then only send on the 3740 * go ahead and send out that interface. Otherwise, the packet [all...] |
/macosx-10.10/emacs-93/emacs/etc/ |
H A D | gnus-refcard.tex | 397 G s p & gnus-soup-pack-packet: not documented.\\
|
/macosx-10.10/mDNSResponder-561.1.1/mDNSMacOSX/ |
H A D | mDNSMacOSX.c | 238 // Name compression items for fake packet version number 1 308 mDNSu8 *ptr = compression_lhs; // pointer to the end of our fake packet 314 // Copy the LHS onto our fake wire packet 318 // Check the 'fake packet' version number, to ensure that we know how to decompress this data 327 // Copy the RHS length into the RDLENGTH of our fake wire packet 330 // Copy the RHS onto our fake wire packet 862 // For SRV records, update packet filter if p2p interface already exists, otherwise, 897 // For SRV records, update packet filter to to remove this port from list 1489 // Calculate packets per hour given total packet count and interval in seconds. 1495 // Put packet rat [all...] |
/macosx-10.10/vim-55/runtime/autoload/ |
H A D | phpcomplete.vim | 4696 \ 'wddx_unserialize(': 'string packet | mixed',
|
Completed in 408 milliseconds
123456