Searched refs:packet (Results 26 - 50 of 135) sorted by relevance

123456

/macosx-10.10/IOFireWireFamily-456/IOFireWireFamily.kmodproj/
H A DIOFireWireMultiIsochReceive.cpp186 IOFireWireMultiIsochReceivePacket * packet; local
188 packet = OSTypeAlloc( IOFireWireMultiIsochReceivePacket );
190 if( packet != NULL && !packet->init(fwController))
192 packet->release();
193 packet = NULL;
196 return packet;
/macosx-10.10/libpcap-48/libpcap/msdos/
H A Dpkt_rx1.s20 .destinAdr resb 6 ; packet destination address
21 .sourceAdr resb 6 ; packet source address
22 .protocol resw 1 ; packet protocol number
32 _pktDrop dw 0,0 ; packet drop counter
70 ; This routine gets called by the packet driver twice:
71 ; 1st time (AX=0) it requests an address where to put the packet
73 ; 2nd time (AX=1) the packet has been copied to this location (DS:SI)
75 ; CX has # of bytes in packet on both call. They should be equal.
97 SHOW_RX ; show that a packet is received
121 @dump: add word [_pktDrop+0], 1 ; discard the packet o
[all...]
H A Dpkt_rx0.asm49 destinAdr db 6 dup (0) ; packet destination address
50 sourceAdr db 6 dup (0) ; packet source address
51 protocol dw 0 ; packet protocol number
57 _pktDrop dw 0,0 ; packet drop counter
107 ;; NOTE. rxInOfs is updated after the packet has been copied
108 ;; to ES:DI (= DS:SI on 2nd call) by the packet driver
114 ; This routine gets called by the packet driver twice:
115 ; 1st time (AX=0) it requests an address where to put the packet
117 ; 2nd time (AX=1) the packet has been copied to this location (DS:SI)
119 ; CX has # of bytes in packet o
[all...]
/macosx-10.10/Heimdal-398.1.2/appl/test/
H A Duu_server.c48 krb5_data packet; local
139 krb5_data_zero (&packet);
141 status = krb5_read_message(context, &sock, &packet);
147 &packet,
153 printf ("safe packet: %.*s\n", (int)data.length,
156 status = krb5_read_message(context, &sock, &packet);
162 &packet,
168 printf ("priv packet: %.*s\n", (int)data.length,
/macosx-10.10/bootp-298/bootplib/
H A Ddhcplib.c129 dhcp_packet_match(struct bootp * packet, u_int32_t xid, argument
143 if (packet->bp_op != BOOTREPLY
144 || ntohl(packet->bp_xid) != xid
145 || (packet->bp_htype != hwtype)
146 || (packet->bp_hlen != check_len)
147 || (check_len != 0 && bcmp(packet->bp_chaddr, hwaddr, check_len))) {
H A Ddhcplib.h43 * Return whether packet is a DHCP packet.
44 * If the packet contains DHCP message ids, then its a DHCP packet.
65 dhcp_packet_match(struct bootp * packet, u_int32_t xid,
/macosx-10.10/Heimdal-398.1.2/lib/roken/
H A Dsocket_wrapper.c162 can't tell which port a packet came from with recvfrom()
782 struct swrap_packet *packet; local
785 size_t nonwire_len = sizeof(packet->frame);
797 wire_hdr_len = sizeof(packet->ip.hdr) + sizeof(packet->ip.p.tcp);
803 wire_hdr_len = sizeof(packet->ip.hdr) + sizeof(packet->ip.p.udp);
814 icmp_hdr_len = sizeof(packet->ip.hdr) + sizeof(packet->ip.p.icmp);
827 packet
942 struct swrap_packet *packet; local
[all...]
/macosx-10.10/xnu-2782.1.97/osfmk/kdp/
H A Dkdp_serial.c38 void kdp_serialize_packet(unsigned char *packet, unsigned int len, void (*outFunc)(char)) argument
43 unsigned char byte = *packet++;
100 if(dsPos == sizeof(dsBuffer)) //too much data...forget this packet
/macosx-10.10/xnu-2782.1.97/bsd/net/
H A Dkpi_protocol.c237 mbuf_t packet; local
239 for (packet = packet_list;
240 packet != NULL;
241 packet = packet_list) {
243 mbuf_nextpkt(packet);
244 mbuf_setnextpkt(packet, NULL);
246 packet);
278 mbuf_t packet; local
280 for (packet = packet_list; packet !
[all...]
H A Dnecp.h354 int necp_mark_packet_from_socket(struct mbuf *packet, struct inpcb *inp, necp_kernel_policy_id policy_id);
355 necp_kernel_policy_id necp_get_policy_id_from_packet(struct mbuf *packet);
356 u_int32_t necp_get_last_interface_index_from_packet(struct mbuf *packet);
359 necp_kernel_policy_id necp_ip_output_find_policy_match(struct mbuf *packet, int flags, struct ip_out_args *ipoa, necp_kernel_policy_result *result, necp_kernel_policy_result_parameter *result_parameter);
360 necp_kernel_policy_id necp_ip6_output_find_policy_match(struct mbuf *packet, int flags, struct ip6_out_args *ip6oa, necp_kernel_policy_result *result, necp_kernel_policy_result_parameter *result_parameter);
362 int necp_mark_packet_from_ip(struct mbuf *packet, necp_kernel_policy_id policy_id);
363 int necp_mark_packet_from_interface(struct mbuf *packet, ifnet_t interface);
366 bool necp_packet_can_rebind_to_ifnet(struct mbuf *packet, struct ifnet *interface, struct route *new_route, int family);
368 int necp_mark_packet_as_keepalive(struct mbuf *packet, bool is_keepalive);
369 bool necp_get_is_keepalive_from_packet(struct mbuf *packet);
[all...]
H A Dnecp.c91 * ID1 and let the packet pass. This is handled in necp_apply_policy. The
283 * For example, a packet with policy ID of 7, when there are 4 ID buckets, will map to bucket (7%3 + 1) = 2.
297 static void necp_handle_policy_add(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset);
298 static void necp_handle_policy_get(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset);
299 static void necp_handle_policy_delete(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset);
300 static void necp_handle_policy_apply_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset);
301 static void necp_handle_policy_list_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset);
302 static void necp_handle_policy_delete_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset);
303 static void necp_handle_set_session_priority(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset);
304 static void necp_handle_lock_session_to_proc(struct necp_session *session, u_int32_t message_id, mbuf_t packet, in
574 necp_packet_find_tlv(mbuf_t packet, int offset, u_int8_t type, int *err, int next) argument
610 necp_packet_get_tlv_at_offset(mbuf_t packet, int tlv_offset, size_t buff_len, void *buff, size_t *value_size) argument
640 necp_packet_get_tlv(mbuf_t packet, int offset, u_int8_t type, size_t buff_len, void *buff, size_t *value_size) argument
827 necp_ctl_send(kern_ctl_ref kctlref, u_int32_t unit, void *unitinfo, mbuf_t packet, int flags) argument
1207 necp_handle_set_session_priority(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1258 necp_handle_lock_session_to_proc(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1267 necp_handle_register_service(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1317 necp_handle_unregister_service(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1363 necp_handle_policy_add(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1513 necp_handle_policy_get(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1574 necp_handle_policy_delete(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1607 necp_handle_policy_apply_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1615 necp_handle_policy_list_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
1658 necp_handle_policy_delete_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument
4721 necp_ip_output_find_policy_match(struct mbuf *packet, int flags, struct ip_out_args *ipoa, necp_kernel_policy_result *result, necp_kernel_policy_result_parameter *result_parameter) argument
4862 necp_ip6_output_find_policy_match(struct mbuf *packet, int flags, struct ip6_out_args *ip6oa, necp_kernel_policy_result *result, necp_kernel_policy_result_parameter *result_parameter) argument
5493 necp_mark_packet_from_socket(struct mbuf *packet, struct inpcb *inp, necp_kernel_policy_id policy_id) argument
5514 necp_mark_packet_from_ip(struct mbuf *packet, necp_kernel_policy_id policy_id) argument
5531 necp_mark_packet_from_interface(struct mbuf *packet, ifnet_t interface) argument
5546 necp_mark_packet_as_keepalive(struct mbuf *packet, bool is_keepalive) argument
5562 necp_get_policy_id_from_packet(struct mbuf *packet) argument
5572 necp_get_last_interface_index_from_packet(struct mbuf *packet) argument
5582 necp_get_is_keepalive_from_packet(struct mbuf *packet) argument
5661 necp_packet_can_rebind_to_ifnet(struct mbuf *packet, struct ifnet *interface, struct route *new_route, int family) argument
5735 necp_is_loopback(struct sockaddr *local_addr, struct sockaddr *remote_addr, struct inpcb *inp, struct mbuf *packet) argument
[all...]
H A Dether_inet6_pr_module.c105 * Process a received Ethernet packet;
106 * the packet is in the mbuf chain m without
111 mbuf_t packet, char *header)
123 * since the packet could have been injected via
125 * different than the one where the packet really
128 mifp = mbuf_pkthdr_rcvif(packet);
141 ip6a = ip6_addaux(packet);
149 if (proto_input(protocol, packet) != 0)
150 m_freem(packet);
152 m_freem(packet);
110 ether_inet6_input(ifnet_t ifp, protocol_family_t protocol, mbuf_t packet, char *header) argument
[all...]
/macosx-10.10/libpcap-48/libpcap/
H A Dpcap-enet.c41 u_char packet[8]
75 * Loop through each packet.
82 if (bpf_filter(fcode, (char *)ph->packet,
86 (*printit)((char *)ph->packet,
96 if (bpf_filter(fcode, buf.hdr.packet, cc, caplen)) {
99 (*printit)(buf.hdr.packet, &tv, cc, caplen);
107 /* Call ONLY if read() has returned an error on packet filter */
/macosx-10.10/libresolv-57/
H A Dres_update.c61 * Create a dynamic update packet for each zone and send it to the
101 u_char answer[NS_PACKETSZ], packet[2*NS_PACKETSZ]; local
159 packet, sizeof packet);
170 n = res_nsendsigned(statp, packet, n, key,
173 n = res_nsend(statp, packet, n, answer, sizeof answer);
/macosx-10.10/xnu-2782.1.97/bsd/netinet/
H A Dflow_divert.c347 flow_divert_packet_init(struct flow_divert_pcb *fd_cb, uint8_t packet_type, mbuf_t *packet) argument
352 error = mbuf_gethdr(MBUF_DONTWAIT, MBUF_TYPE_HEADER, packet);
362 error = mbuf_copyback(*packet, 0, sizeof(hdr), &hdr, MBUF_DONTWAIT);
365 mbuf_freem(*packet);
366 *packet = NULL;
374 flow_divert_packet_append_tlv(mbuf_t packet, uint8_t type, size_t length, const void *value) argument
379 error = mbuf_copyback(packet, mbuf_pkthdr_len(packet), sizeof(type), &type, MBUF_DONTWAIT);
385 error = mbuf_copyback(packet, mbuf_pkthdr_len(packet), sizeo
401 flow_divert_packet_find_tlv(mbuf_t packet, int offset, uint8_t type, int *err, int next) argument
438 flow_divert_packet_get_tlv(mbuf_t packet, int offset, uint8_t type, size_t buff_len, void *buff, size_t *val_size) argument
472 flow_divert_packet_compute_hmac(mbuf_t packet, struct flow_divert_group *group, uint8_t *hmac) argument
494 flow_divert_packet_verify_hmac(mbuf_t packet, uint32_t ctl_unit) argument
838 flow_divert_send_packet(struct flow_divert_pcb *fd_cb, mbuf_t packet, Boolean enqueue) argument
966 mbuf_t packet = NULL; local
1005 mbuf_t packet = NULL; local
1102 mbuf_t packet; local
1264 mbuf_t packet = NULL; local
1296 mbuf_t packet = NULL; local
1324 flow_divert_handle_connect_result(struct flow_divert_pcb *fd_cb, mbuf_t packet, int offset) argument
1499 flow_divert_handle_close(struct flow_divert_pcb *fd_cb, mbuf_t packet, int offset) argument
1544 flow_divert_handle_data(struct flow_divert_pcb *fd_cb, mbuf_t packet, size_t offset) argument
1589 flow_divert_handle_read_notification(struct flow_divert_pcb *fd_cb, mbuf_t packet, int offset) argument
1613 flow_divert_handle_group_init(struct flow_divert_group *group, mbuf_t packet, int offset) argument
1653 flow_divert_handle_properties_update(struct flow_divert_pcb *fd_cb, mbuf_t packet, int offset) argument
1719 flow_divert_handle_app_map_create(mbuf_t packet, int offset) argument
1835 flow_divert_handle_app_map_update(struct flow_divert_group *group, mbuf_t packet, int offset) argument
1895 flow_divert_input(mbuf_t packet, struct flow_divert_group *group) argument
[all...]
H A Din_proto.c328 mbuf_t packet; local
332 for (packet = packet_list; packet; packet = packet_list) {
334 packet_list = mbuf_nextpkt(packet);
335 mbuf_setnextpkt(packet, NULL);
336 ip_input(packet);
/macosx-10.10/OpenSSL098-52/src/ssl/
H A Ds23_srvr.c264 p=s->packet;
411 p=s->packet;
425 ssl3_finish_mac(s, s->packet+2, s->packet_length-2);
427 s->msg_callback(0, SSL2_VERSION, 0, s->packet+2, s->packet_length-2, s, s->msg_callback_arg); /* CLIENT-HELLO */
429 p=s->packet;
528 s->packet= &(s->s2->rbuf[0]);
529 memcpy(s->packet,buf,n);
553 s->packet= &(s->s3->rbuf.buf[0]);
554 memcpy(s->packet,buf,n);
/macosx-10.10/ppp-786.1.1/Helpers/pppd/
H A Ddemand.c95 struct packet { struct
97 struct packet *next;
101 struct packet *pend_q;
102 struct packet *pend_qtail;
169 struct packet *pkt, *nextpkt;
296 * We apply the active_filter to see if we want this packet to
304 struct packet *pkt;
314 pkt = (struct packet *) malloc(sizeof(struct packet) + len);
336 struct packet *pk
[all...]
/macosx-10.10/ruby-106/ruby/sample/drb/
H A Dhttp0.rb69 raise TypeError, 'too large packet'
/macosx-10.10/eap8021x-198/EAP8021X.fproj/
H A DEAPClientModule.h140 FILE * out_f, const EAPPacketRef packet);
152 const EAPPacketRef packet,
H A DEAPClientPlugin.h232 * This function takes an input EAP packet, returns its current state,
233 * and produces an optional output EAP packet to be delivered to the
238 * on *out_pkt_p. The size of the packet pointed to by *out_pkt_p must
268 * This function is called to free the output packet
269 * provided by the EAPClientPlugin's "process" function after the packet
375 * FALSE if did not dump packet, TRUE otherwise.
378 (EAPClientPluginFuncPacketDump)(FILE * out_f, const EAPPacketRef packet);
420 * Non-NULL CFStringRef containing packet description, NULL if failed.
423 (EAPClientPluginFuncCopyPacketDescription)(const EAPPacketRef packet, bool * packet_is_valid);
/macosx-10.10/ntp-92/scripts/monitoring/
H A Dntp.pl32 ;# access routines for ntp control packet
46 ;# first byte of packet
51 ;# second byte of packet
82 local($junksize,$junk,$packet,$offset,$ret);
92 $packet
107 $ret = send($fh, $packet, 0, $address);
111 $ret = send($fh, $packet, 0);
119 elsif ($ret != length($packet))
121 warn "send failed: sent only $ret from ".length($packet). "bytes\n";
319 ;# process a NTP control message (response) packet
[all...]
/macosx-10.10/passwordserver_sasl-193/cyrus_sasl/saslauthd/
H A Dauth_krb5.c272 krb5_data packet; local
280 memset(&packet, 0, sizeof(packet));
314 thishost, NULL, ccache, &packet))) {
327 if ((k5_retcode = krb5_rd_req(context, &auth_context, &packet,
342 krb5_free_data_contents(context, &packet);
/macosx-10.10/remote_cmds-47/timed.tproj/timed.tproj/
H A Dmeasure.c83 u_char packet[PACKET_IN], opacket[64]; local
84 register struct icmp *icp = (struct icmp *) packet;
86 struct ip *ip = (struct ip *) packet;
112 cc = recvfrom(sock_raw, (char *)packet, PACKET_IN, 0,
187 cc = recvfrom(sock_raw, (char *)packet, PACKET_IN, 0,
195 icp = (struct icmp *)(packet + (ip->ip_hl << 2));
/macosx-10.10/AppleUSBIrDA-145.2.4/DumpLog/
H A Ddumplog.cpp94 UInt8 packet[MAX_KDP_PKT_SIZE]; // just need one packet variable
356 kdp_connect_req_t *request = (kdp_connect_req_t *)packet;
357 kdp_connect_reply_t *reply = (kdp_connect_reply_t *)packet;
362 bzero(packet, sizeof(packet));
369 ok = DoRequest(KDP_CONNECT, length); // send packet, wait for response
379 // Do minimal checking on response packet
387 kdp_hdr_t *hdr = (kdp_hdr_t *)packet;
399 // send the request in the packet buffe
[all...]

Completed in 311 milliseconds

123456