/macosx-10.10/IOFireWireFamily-456/IOFireWireFamily.kmodproj/ |
H A D | IOFireWireMultiIsochReceive.cpp | 186 IOFireWireMultiIsochReceivePacket * packet; local 188 packet = OSTypeAlloc( IOFireWireMultiIsochReceivePacket ); 190 if( packet != NULL && !packet->init(fwController)) 192 packet->release(); 193 packet = NULL; 196 return packet;
|
/macosx-10.10/libpcap-48/libpcap/msdos/ |
H A D | pkt_rx1.s | 20 .destinAdr resb 6 ; packet destination address
21 .sourceAdr resb 6 ; packet source address
22 .protocol resw 1 ; packet protocol number
32 _pktDrop dw 0,0 ; packet drop counter
70 ; This routine gets called by the packet driver twice:
71 ; 1st time (AX=0) it requests an address where to put the packet
73 ; 2nd time (AX=1) the packet has been copied to this location (DS:SI)
75 ; CX has # of bytes in packet on both call. They should be equal.
97 SHOW_RX ; show that a packet is received
121 @dump: add word [_pktDrop+0], 1 ; discard the packet o [all...] |
H A D | pkt_rx0.asm | 49 destinAdr db 6 dup (0) ; packet destination address
50 sourceAdr db 6 dup (0) ; packet source address
51 protocol dw 0 ; packet protocol number
57 _pktDrop dw 0,0 ; packet drop counter
107 ;; NOTE. rxInOfs is updated after the packet has been copied
108 ;; to ES:DI (= DS:SI on 2nd call) by the packet driver
114 ; This routine gets called by the packet driver twice:
115 ; 1st time (AX=0) it requests an address where to put the packet
117 ; 2nd time (AX=1) the packet has been copied to this location (DS:SI)
119 ; CX has # of bytes in packet o [all...] |
/macosx-10.10/Heimdal-398.1.2/appl/test/ |
H A D | uu_server.c | 48 krb5_data packet; local 139 krb5_data_zero (&packet); 141 status = krb5_read_message(context, &sock, &packet); 147 &packet, 153 printf ("safe packet: %.*s\n", (int)data.length, 156 status = krb5_read_message(context, &sock, &packet); 162 &packet, 168 printf ("priv packet: %.*s\n", (int)data.length,
|
/macosx-10.10/bootp-298/bootplib/ |
H A D | dhcplib.c | 129 dhcp_packet_match(struct bootp * packet, u_int32_t xid, argument 143 if (packet->bp_op != BOOTREPLY 144 || ntohl(packet->bp_xid) != xid 145 || (packet->bp_htype != hwtype) 146 || (packet->bp_hlen != check_len) 147 || (check_len != 0 && bcmp(packet->bp_chaddr, hwaddr, check_len))) {
|
H A D | dhcplib.h | 43 * Return whether packet is a DHCP packet. 44 * If the packet contains DHCP message ids, then its a DHCP packet. 65 dhcp_packet_match(struct bootp * packet, u_int32_t xid,
|
/macosx-10.10/Heimdal-398.1.2/lib/roken/ |
H A D | socket_wrapper.c | 162 can't tell which port a packet came from with recvfrom() 782 struct swrap_packet *packet; local 785 size_t nonwire_len = sizeof(packet->frame); 797 wire_hdr_len = sizeof(packet->ip.hdr) + sizeof(packet->ip.p.tcp); 803 wire_hdr_len = sizeof(packet->ip.hdr) + sizeof(packet->ip.p.udp); 814 icmp_hdr_len = sizeof(packet->ip.hdr) + sizeof(packet->ip.p.icmp); 827 packet 942 struct swrap_packet *packet; local [all...] |
/macosx-10.10/xnu-2782.1.97/osfmk/kdp/ |
H A D | kdp_serial.c | 38 void kdp_serialize_packet(unsigned char *packet, unsigned int len, void (*outFunc)(char)) argument 43 unsigned char byte = *packet++; 100 if(dsPos == sizeof(dsBuffer)) //too much data...forget this packet
|
/macosx-10.10/xnu-2782.1.97/bsd/net/ |
H A D | kpi_protocol.c | 237 mbuf_t packet; local 239 for (packet = packet_list; 240 packet != NULL; 241 packet = packet_list) { 243 mbuf_nextpkt(packet); 244 mbuf_setnextpkt(packet, NULL); 246 packet); 278 mbuf_t packet; local 280 for (packet = packet_list; packet ! [all...] |
H A D | necp.h | 354 int necp_mark_packet_from_socket(struct mbuf *packet, struct inpcb *inp, necp_kernel_policy_id policy_id); 355 necp_kernel_policy_id necp_get_policy_id_from_packet(struct mbuf *packet); 356 u_int32_t necp_get_last_interface_index_from_packet(struct mbuf *packet); 359 necp_kernel_policy_id necp_ip_output_find_policy_match(struct mbuf *packet, int flags, struct ip_out_args *ipoa, necp_kernel_policy_result *result, necp_kernel_policy_result_parameter *result_parameter); 360 necp_kernel_policy_id necp_ip6_output_find_policy_match(struct mbuf *packet, int flags, struct ip6_out_args *ip6oa, necp_kernel_policy_result *result, necp_kernel_policy_result_parameter *result_parameter); 362 int necp_mark_packet_from_ip(struct mbuf *packet, necp_kernel_policy_id policy_id); 363 int necp_mark_packet_from_interface(struct mbuf *packet, ifnet_t interface); 366 bool necp_packet_can_rebind_to_ifnet(struct mbuf *packet, struct ifnet *interface, struct route *new_route, int family); 368 int necp_mark_packet_as_keepalive(struct mbuf *packet, bool is_keepalive); 369 bool necp_get_is_keepalive_from_packet(struct mbuf *packet); [all...] |
H A D | necp.c | 91 * ID1 and let the packet pass. This is handled in necp_apply_policy. The 283 * For example, a packet with policy ID of 7, when there are 4 ID buckets, will map to bucket (7%3 + 1) = 2. 297 static void necp_handle_policy_add(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset); 298 static void necp_handle_policy_get(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset); 299 static void necp_handle_policy_delete(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset); 300 static void necp_handle_policy_apply_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset); 301 static void necp_handle_policy_list_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset); 302 static void necp_handle_policy_delete_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset); 303 static void necp_handle_set_session_priority(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset); 304 static void necp_handle_lock_session_to_proc(struct necp_session *session, u_int32_t message_id, mbuf_t packet, in 574 necp_packet_find_tlv(mbuf_t packet, int offset, u_int8_t type, int *err, int next) argument 610 necp_packet_get_tlv_at_offset(mbuf_t packet, int tlv_offset, size_t buff_len, void *buff, size_t *value_size) argument 640 necp_packet_get_tlv(mbuf_t packet, int offset, u_int8_t type, size_t buff_len, void *buff, size_t *value_size) argument 827 necp_ctl_send(kern_ctl_ref kctlref, u_int32_t unit, void *unitinfo, mbuf_t packet, int flags) argument 1207 necp_handle_set_session_priority(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1258 necp_handle_lock_session_to_proc(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1267 necp_handle_register_service(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1317 necp_handle_unregister_service(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1363 necp_handle_policy_add(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1513 necp_handle_policy_get(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1574 necp_handle_policy_delete(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1607 necp_handle_policy_apply_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1615 necp_handle_policy_list_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1658 necp_handle_policy_delete_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 4721 necp_ip_output_find_policy_match(struct mbuf *packet, int flags, struct ip_out_args *ipoa, necp_kernel_policy_result *result, necp_kernel_policy_result_parameter *result_parameter) argument 4862 necp_ip6_output_find_policy_match(struct mbuf *packet, int flags, struct ip6_out_args *ip6oa, necp_kernel_policy_result *result, necp_kernel_policy_result_parameter *result_parameter) argument 5493 necp_mark_packet_from_socket(struct mbuf *packet, struct inpcb *inp, necp_kernel_policy_id policy_id) argument 5514 necp_mark_packet_from_ip(struct mbuf *packet, necp_kernel_policy_id policy_id) argument 5531 necp_mark_packet_from_interface(struct mbuf *packet, ifnet_t interface) argument 5546 necp_mark_packet_as_keepalive(struct mbuf *packet, bool is_keepalive) argument 5562 necp_get_policy_id_from_packet(struct mbuf *packet) argument 5572 necp_get_last_interface_index_from_packet(struct mbuf *packet) argument 5582 necp_get_is_keepalive_from_packet(struct mbuf *packet) argument 5661 necp_packet_can_rebind_to_ifnet(struct mbuf *packet, struct ifnet *interface, struct route *new_route, int family) argument 5735 necp_is_loopback(struct sockaddr *local_addr, struct sockaddr *remote_addr, struct inpcb *inp, struct mbuf *packet) argument [all...] |
H A D | ether_inet6_pr_module.c | 105 * Process a received Ethernet packet; 106 * the packet is in the mbuf chain m without 111 mbuf_t packet, char *header) 123 * since the packet could have been injected via 125 * different than the one where the packet really 128 mifp = mbuf_pkthdr_rcvif(packet); 141 ip6a = ip6_addaux(packet); 149 if (proto_input(protocol, packet) != 0) 150 m_freem(packet); 152 m_freem(packet); 110 ether_inet6_input(ifnet_t ifp, protocol_family_t protocol, mbuf_t packet, char *header) argument [all...] |
/macosx-10.10/libpcap-48/libpcap/ |
H A D | pcap-enet.c | 41 u_char packet[8] 75 * Loop through each packet. 82 if (bpf_filter(fcode, (char *)ph->packet, 86 (*printit)((char *)ph->packet, 96 if (bpf_filter(fcode, buf.hdr.packet, cc, caplen)) { 99 (*printit)(buf.hdr.packet, &tv, cc, caplen); 107 /* Call ONLY if read() has returned an error on packet filter */
|
/macosx-10.10/libresolv-57/ |
H A D | res_update.c | 61 * Create a dynamic update packet for each zone and send it to the 101 u_char answer[NS_PACKETSZ], packet[2*NS_PACKETSZ]; local 159 packet, sizeof packet); 170 n = res_nsendsigned(statp, packet, n, key, 173 n = res_nsend(statp, packet, n, answer, sizeof answer);
|
/macosx-10.10/xnu-2782.1.97/bsd/netinet/ |
H A D | flow_divert.c | 347 flow_divert_packet_init(struct flow_divert_pcb *fd_cb, uint8_t packet_type, mbuf_t *packet) argument 352 error = mbuf_gethdr(MBUF_DONTWAIT, MBUF_TYPE_HEADER, packet); 362 error = mbuf_copyback(*packet, 0, sizeof(hdr), &hdr, MBUF_DONTWAIT); 365 mbuf_freem(*packet); 366 *packet = NULL; 374 flow_divert_packet_append_tlv(mbuf_t packet, uint8_t type, size_t length, const void *value) argument 379 error = mbuf_copyback(packet, mbuf_pkthdr_len(packet), sizeof(type), &type, MBUF_DONTWAIT); 385 error = mbuf_copyback(packet, mbuf_pkthdr_len(packet), sizeo 401 flow_divert_packet_find_tlv(mbuf_t packet, int offset, uint8_t type, int *err, int next) argument 438 flow_divert_packet_get_tlv(mbuf_t packet, int offset, uint8_t type, size_t buff_len, void *buff, size_t *val_size) argument 472 flow_divert_packet_compute_hmac(mbuf_t packet, struct flow_divert_group *group, uint8_t *hmac) argument 494 flow_divert_packet_verify_hmac(mbuf_t packet, uint32_t ctl_unit) argument 838 flow_divert_send_packet(struct flow_divert_pcb *fd_cb, mbuf_t packet, Boolean enqueue) argument 966 mbuf_t packet = NULL; local 1005 mbuf_t packet = NULL; local 1102 mbuf_t packet; local 1264 mbuf_t packet = NULL; local 1296 mbuf_t packet = NULL; local 1324 flow_divert_handle_connect_result(struct flow_divert_pcb *fd_cb, mbuf_t packet, int offset) argument 1499 flow_divert_handle_close(struct flow_divert_pcb *fd_cb, mbuf_t packet, int offset) argument 1544 flow_divert_handle_data(struct flow_divert_pcb *fd_cb, mbuf_t packet, size_t offset) argument 1589 flow_divert_handle_read_notification(struct flow_divert_pcb *fd_cb, mbuf_t packet, int offset) argument 1613 flow_divert_handle_group_init(struct flow_divert_group *group, mbuf_t packet, int offset) argument 1653 flow_divert_handle_properties_update(struct flow_divert_pcb *fd_cb, mbuf_t packet, int offset) argument 1719 flow_divert_handle_app_map_create(mbuf_t packet, int offset) argument 1835 flow_divert_handle_app_map_update(struct flow_divert_group *group, mbuf_t packet, int offset) argument 1895 flow_divert_input(mbuf_t packet, struct flow_divert_group *group) argument [all...] |
H A D | in_proto.c | 328 mbuf_t packet; local 332 for (packet = packet_list; packet; packet = packet_list) { 334 packet_list = mbuf_nextpkt(packet); 335 mbuf_setnextpkt(packet, NULL); 336 ip_input(packet);
|
/macosx-10.10/OpenSSL098-52/src/ssl/ |
H A D | s23_srvr.c | 264 p=s->packet; 411 p=s->packet; 425 ssl3_finish_mac(s, s->packet+2, s->packet_length-2); 427 s->msg_callback(0, SSL2_VERSION, 0, s->packet+2, s->packet_length-2, s, s->msg_callback_arg); /* CLIENT-HELLO */ 429 p=s->packet; 528 s->packet= &(s->s2->rbuf[0]); 529 memcpy(s->packet,buf,n); 553 s->packet= &(s->s3->rbuf.buf[0]); 554 memcpy(s->packet,buf,n);
|
/macosx-10.10/ppp-786.1.1/Helpers/pppd/ |
H A D | demand.c | 95 struct packet { struct 97 struct packet *next; 101 struct packet *pend_q; 102 struct packet *pend_qtail; 169 struct packet *pkt, *nextpkt; 296 * We apply the active_filter to see if we want this packet to 304 struct packet *pkt; 314 pkt = (struct packet *) malloc(sizeof(struct packet) + len); 336 struct packet *pk [all...] |
/macosx-10.10/ruby-106/ruby/sample/drb/ |
H A D | http0.rb | 69 raise TypeError, 'too large packet'
|
/macosx-10.10/eap8021x-198/EAP8021X.fproj/ |
H A D | EAPClientModule.h | 140 FILE * out_f, const EAPPacketRef packet); 152 const EAPPacketRef packet,
|
H A D | EAPClientPlugin.h | 232 * This function takes an input EAP packet, returns its current state, 233 * and produces an optional output EAP packet to be delivered to the 238 * on *out_pkt_p. The size of the packet pointed to by *out_pkt_p must 268 * This function is called to free the output packet 269 * provided by the EAPClientPlugin's "process" function after the packet 375 * FALSE if did not dump packet, TRUE otherwise. 378 (EAPClientPluginFuncPacketDump)(FILE * out_f, const EAPPacketRef packet); 420 * Non-NULL CFStringRef containing packet description, NULL if failed. 423 (EAPClientPluginFuncCopyPacketDescription)(const EAPPacketRef packet, bool * packet_is_valid);
|
/macosx-10.10/ntp-92/scripts/monitoring/ |
H A D | ntp.pl | 32 ;# access routines for ntp control packet 46 ;# first byte of packet 51 ;# second byte of packet 82 local($junksize,$junk,$packet,$offset,$ret); 92 $packet 107 $ret = send($fh, $packet, 0, $address); 111 $ret = send($fh, $packet, 0); 119 elsif ($ret != length($packet)) 121 warn "send failed: sent only $ret from ".length($packet). "bytes\n"; 319 ;# process a NTP control message (response) packet [all...] |
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/saslauthd/ |
H A D | auth_krb5.c | 272 krb5_data packet; local 280 memset(&packet, 0, sizeof(packet)); 314 thishost, NULL, ccache, &packet))) { 327 if ((k5_retcode = krb5_rd_req(context, &auth_context, &packet, 342 krb5_free_data_contents(context, &packet);
|
/macosx-10.10/remote_cmds-47/timed.tproj/timed.tproj/ |
H A D | measure.c | 83 u_char packet[PACKET_IN], opacket[64]; local 84 register struct icmp *icp = (struct icmp *) packet; 86 struct ip *ip = (struct ip *) packet; 112 cc = recvfrom(sock_raw, (char *)packet, PACKET_IN, 0, 187 cc = recvfrom(sock_raw, (char *)packet, PACKET_IN, 0, 195 icp = (struct icmp *)(packet + (ip->ip_hl << 2));
|
/macosx-10.10/AppleUSBIrDA-145.2.4/DumpLog/ |
H A D | dumplog.cpp | 94 UInt8 packet[MAX_KDP_PKT_SIZE]; // just need one packet variable 356 kdp_connect_req_t *request = (kdp_connect_req_t *)packet; 357 kdp_connect_reply_t *reply = (kdp_connect_reply_t *)packet; 362 bzero(packet, sizeof(packet)); 369 ok = DoRequest(KDP_CONNECT, length); // send packet, wait for response 379 // Do minimal checking on response packet 387 kdp_hdr_t *hdr = (kdp_hdr_t *)packet; 399 // send the request in the packet buffe [all...] |