/macosx-10.10/Heimdal-398.1.2/lib/gssapi/krb5/ |
H A D | init_sec_context.c | 1621 GSS_KRB5_FINISHED pkt; local 1625 memset(&pkt, 0, sizeof(pkt)); 1639 &pkt.gss_mic); 1646 &pkt, &size, ret); 1647 free_GSS_KRB5_FINISHED(&pkt);
|
/macosx-10.10/IONetworkingFamily-101/ |
H A D | IOKernelDebugger.cpp | 276 typedef void (*kdp_send_t)( void * pkt, UInt pkt_len ); 277 typedef void (*kdp_receive_t)( void * pkt, UInt * pkt_len, UInt timeout );
|
H A D | IONetworkInterface.cpp | 781 //DLOG("push pkt cnt %u\n", count); 799 inline static const char *get_icmp_data(mbuf_t *pkt, int hdrlen, int datalen) argument 808 if (mbuf_len(*pkt) < (sizeof(*ip) + hdrlen)) 812 ip = (struct ip *) ((char *) mbuf_data(*pkt) + hdrlen); 819 if (mbuf_pullup(pkt, hlen + icmplen) != 0) 823 ip = (struct ip *) ((char *) mbuf_data(*pkt) + hdrlen); 832 icmp = (struct icmp *) (((char *) mbuf_data(*pkt) + hdrlen) + hlen); 836 return (const char *) (((char *) mbuf_data(*pkt) + hdrlen) + icmplen);
|
/macosx-10.10/bootp-298/bootplib/ |
H A D | DHCPv6Options.c | 341 DHCPv6OptionListCreateWithPacket(const DHCPv6PacketRef pkt, int pkt_len, argument 350 return (DHCPv6OptionListCreate(pkt->options, option_len, err_p));
|
/macosx-10.10/dcerpc-61/dcerpc/ncklib/ |
H A D | cnpkt.c | 646 rpc_cn_packet_p_t pkt; 701 ptrs.pkt = pkt_p; 750 rpc_cn_auth_tlr_p_t authp; /* ptr to pkt authentication data */ 751 rpc_cn_pres_cont_list_p_t pconp; /* ptr to pkt presentation context lists */ 752 rpc_cn_pres_result_list_p_t presp; /* ptr to pkt presentation result lists */ 753 rpc_cn_port_any_p_t secadrp; /* ptr to pkt secondary address data */ 754 rpc_cn_versions_supported_p_t versp; /* ptr to pkt versions supported data */ 755 unsigned8 *drepp; /* ptr to pkt drep[] data */ 640 rpc_cn_packet_p_t pkt; member in union:__anon8217
|
H A D | dgslsn.c | 186 * A cancel-ack manifests itself as an embellished 'quack' pkt. 208 * Create a pkt header initialized with the prototype hdr. 261 rpc_dg_quitpkt_body_p_t bodyp = (rpc_dg_quitpkt_body_p_t) &rqe->pkt->body; 796 * existing SCALLs. Returns the disposition of the pkt / call. 847 * If this isn't the first pkt in a non-idem call, just ignore 868 * Treat the (probably duplicate) pkt as a ping and retransmit 877 * The pkt is for the current in progress call and 880 * is the fast path; just add the pkt to the recvq. 888 * (probably duplicate) pkt. 891 ("(do_request_common) Duplicate pkt [ [all...] |
H A D | dgclsn.c | 216 * If the call has been orphaned, our interest in various pkt types 269 * info for the last pkt of the response stream, however, it's 307 * This is really only necesssary on the last pkt of a response, but it's 409 * Stash the fault pkt away for eventual retrieval by the client 661 * Make sure the pkt is for the current call, that we are in the 752 * If this is an idempotent call (which must mean a single pkt 805 rpc_dg_quackpkt_body_p_t bodyp = (rpc_dg_quackpkt_body_p_t) &rqe->pkt->body;
|
H A D | dgexec.c | 184 * help pkt rationing. It's likely that the recvq is already empty 192 * queue just as if it were a response (but whack the proto pkt header 193 * to the fault pkt type). The call will now be in the xmit state if it 199 * fault is really just a special response pkt. 384 "(rpc__dg_execute_call) Cancelled while awaiting pkt reservation\n")); 456 * Dequeue the first pkt off of the receive queue (including it's hdr). 516 * Perform some of the request pkt verification that was defered. 810 cksum = rqe->pkt->body.args + raw_bodysize; 818 ("(rpc__dg_execute_call) pkt didn't verify -- %x\n", st)); 1017 * not a maybe call; we still need to generate a response pkt [all...] |
/macosx-10.10/xnu-2782.1.97/bsd/net/ |
H A D | kpi_interface.c | 2067 ifnet_transmit_burst_start(ifnet_t ifp, mbuf_t pkt) argument 2072 if (ifp == NULL || !(pkt->m_flags & M_PKTHDR)) 2082 ifp->if_bw.start_seq = pkt->m_pkthdr.pkt_bwseq; 2085 #pragma unused(ifp, pkt) 2090 ifnet_transmit_burst_end(ifnet_t ifp, mbuf_t pkt) argument 2096 if ( ifp == NULL || !(pkt->m_flags & M_PKTHDR)) 2114 oseq = pkt->m_pkthdr.pkt_bwseq; 2153 #pragma unused(ifp, pkt)
|
H A D | if_utun_crypto.h | 425 typedef errno_t (*utun_crypto_kpi_send_func)(caddr_t ref, mbuf_t *pkt);
|
H A D | kpi_interface.h | 1541 extern void ifnet_transmit_burst_start(ifnet_t interface, mbuf_t pkt); 1557 extern void ifnet_transmit_burst_end(ifnet_t interface, mbuf_t pkt);
|
H A D | if_bond.c | 4364 packet_buffer_ref pkt; local 4404 pkt = packet_buffer_allocate(sizeof(*out_lacpdu_p)); 4405 if (pkt == NULL) { 4410 out_lacpdu_p = (lacpdu_ref)packet_buffer_byteptr(pkt); 4446 bondport_slow_proto_transmit(p, pkt);
|
/macosx-10.10/AppleUSBCDCDriver-4205.2.2/AppleUSBCDCEEM/Classes/ |
H A D | AppleUSBCDCEEM.cpp | 1384 UInt32 AppleUSBCDCEEM::outputPacket(mbuf_t pkt, void *param) argument 1394 freePacket(pkt); 1398 ior = USBTransmitPacket(pkt); 1401 freePacket(pkt);
|
/macosx-10.10/IOFireWireIP-226.2/KernelHeaders/IOKit/ |
H A D | IOFireWireIP.h | 271 virtual void receivePackets(mbuf_t pkt, UInt32 pkt_len, UInt32 options);
|
/macosx-10.10/xnu-2782.1.97/bsd/netinet/ |
H A D | tcp_output.c | 2059 * Embed the flow hash in pkt hdr and mark the packet as 2289 tcp_ip_output(struct socket *so, struct tcpcb *tp, struct mbuf *pkt, argument 2418 while (pkt != NULL) { 2419 struct mbuf *npkt = pkt->m_nextpkt; 2422 pkt->m_nextpkt = NULL; 2438 error = ip6_output_list(pkt, cnt, 2444 error = ip_output_list(pkt, cnt, opt, &ro, flags, NULL, 2459 pkt = npkt;
|
/macosx-10.10/mDNSResponder-561.1.1/mDNSCore/ |
H A D | mDNS.c | 6821 // CacheRecord *pkt is the Resource Record from the response packet we've witnessed on the network 6825 mDNSlocal int CompareRData(const AuthRecord *const our, const CacheRecord *const pkt) argument 6830 if (!pkt) { LogMsg("CompareRData ERROR: pkt is NULL"); return(+1); } 6833 pktend = putRData(mDNSNULL, pktdata, pktdata + sizeof(pktdata), &pkt->resrec); 10203 mDNSexport void mDNSCoreReceive(mDNS *const m, void *const pkt, const mDNSu8 *const end, argument 10208 DNSMessage *msg = (DNSMessage *)pkt; 10225 LNT_ConfigureRouterInfo(m, InterfaceID, pkt, (mDNSu16)(end - (mDNSu8 *)pkt)); 10233 uDNS_ReceiveNATPacket(m, InterfaceID, pkt, (mDNSu1 14001 const NetworkLayerPacket *const pkt = (const NetworkLayerPacket *)(eth+1); local [all...] |
/macosx-10.10/ntp-92/ntpd/ |
H A D | ntp_request.c | 268 sendpkt(srcadr, inter, -1, (struct pkt *)&rpkt, RESP_HEADER_SIZE); 281 struct req_pkt *pkt, 285 DPRINTF(4, ("request: preparing pkt\n")); 291 rpkt.implementation = pkt->implementation; 292 rpkt.request = pkt->request; 323 DPRINTF(3, ("request: sending pkt\n")); 327 sendpkt(toaddr, frominter, -1, (struct pkt *)&rpkt, 384 sendpkt(toaddr, frominter, -1, (struct pkt *)&rpkt, 455 " failed, pkt from %s", 585 DPRINTF(5, ("failed auth %d info_auth_keyid %u pkt keyi 278 prepare_pkt( sockaddr_u *srcadr, struct interface *inter, struct req_pkt *pkt, size_t structsize ) argument [all...] |
H A D | ntp_io.c | 2951 struct pkt *pkt, 3020 cc = io_completion_port_sendto(inter, pkt, len, dest); 3024 cc = simulate_server(dest, inter, pkt); 3026 cc = sendto(inter->fd, (char *)pkt, (unsigned int)len, 0, 2947 sendpkt( sockaddr_u *dest, struct interface *inter, int ttl, struct pkt *pkt, int len ) argument
|
/macosx-10.10/eap8021x-198/eapolclient.tproj/ |
H A D | EAPOLSocket.c | 400 * If 'pkt' is NULL, then just clear the old packet that may be there. 401 * If 'pkt' is not NULL, clear the old packet, and make a copy of the 405 EAPOLSocketSetEAPTxPacket(EAPOLSocketRef sock, EAPPacketRef pkt, int length) argument 410 if (pkt == NULL) { 416 bcopy(pkt, sock->eap_tx_packet, length);
|
/macosx-10.10/bootp-298/bootpd.tproj/ |
H A D | bsdpd.c | 1438 struct dhcp * rq = request->pkt; 1524 struct dhcp * rq = request->pkt; 1579 bsdp_print_packet(request->pkt, request->pkt_length, 1); 2114 struct dhcp * rq = request->pkt;
|
H A D | bootpd.c | 1490 struct bootp * rq = (struct bootp *)request->pkt; 1962 request.pkt = (struct dhcp *)bp;
|
/macosx-10.10/eap8021x-198/EAP8021X.fproj/ |
H A D | EAPTLSUtil.c | 87 EAPTLSLengthIncludedPacketGetMessageLength(EAPTLSLengthIncludedPacketRef pkt) argument 89 return (net_uint32_get(pkt->tls_message_length)); 93 EAPTLSLengthIncludedPacketSetMessageLength(EAPTLSLengthIncludedPacketRef pkt, argument 96 return (net_uint32_set(pkt->tls_message_length, length));
|
/macosx-10.10/ntp-92/include/ |
H A D | ntp.h | 542 struct pkt { struct
|
/macosx-10.10/ppp-786.1.1/Helpers/pppd/ |
H A D | lcp.c | 243 static void lcp_addci __P((fsm *, u_char *, int *)); /* Add our CI to pkt */ 2376 u_char pkt[4], *pktp; local 2420 pktp = pkt; 2422 fsm_sdata(f, ECHOREQ, lcp_echo_number++ & 0xFF, pkt, pktp - pkt);
|
/macosx-10.10/xnu-2782.1.97/bsd/kern/ |
H A D | uipc_mbuf.c | 7217 struct pkthdr *pkt = &m->m_pkthdr; local 7222 if (pkt->pkt_flags & PKTF_PRIV_GUARDED) { 7224 "area: mbuf %p, pkt_flags 0x%x\n", m, pkt->pkt_flags); 7228 bzero(&pkt->pkt_mpriv, sizeof (pkt->pkt_mpriv)); 7241 struct pkthdr *pkt = &m->m_pkthdr; local 7246 if (pkt->pkt_flags & PKTF_PRIV_GUARDED) { 7248 "area: mbuf %p, pkt_flags 0x%x\n", m, pkt->pkt_flags); 7262 *p = (u_int8_t *)&pkt->pkt_mpriv; 7263 return (sizeof (pkt [all...] |