Searched refs:pkt (Results 26 - 50 of 182) sorted by relevance

12345678

/macosx-10.10/bootp-298/IPConfiguration.bproj/
H A DIPv6Socket.h45 const void * pkt, int pkt_size, int hlim);
H A Dbootp.c110 make_bootp_request(struct bootp * pkt, argument
113 bzero(pkt, sizeof (*pkt));
114 pkt->bp_op = BOOTREQUEST;
115 pkt->bp_htype = hwtype;
116 pkt->bp_hlen = hwlen;
118 pkt->bp_unused = htons(DHCP_FLAGS_BROADCAST);
119 bcopy(hwaddr, pkt->bp_chaddr, hwlen);
120 bcopy(G_rfc_magic, pkt->bp_vend, sizeof(G_rfc_magic));
121 pkt
425 bootp_receive_data_t *pkt = (bootp_receive_data_t *)event_data; local
[all...]
H A Ddhcp_thread.h46 uint32_t pkt[1500/sizeof(uint32_t)]; member in struct:saved_pkt
/macosx-10.10/bootp-298/bootplib/
H A Dbpflib.h36 int bpf_write(int fd, void * pkt, int len);
H A Din_cksum.c59 in_cksum(void * pkt, int len) argument
64 w = (u_short *)pkt;
/macosx-10.10/ntp-92/ntpd/
H A Dntp_signd.c127 struct pkt *xpkt
151 struct pkt pkt; member in struct:samba_key_in
158 struct pkt pkt; member in struct:samba_key_out
178 samba_pkt.pkt = *xpkt;
196 if (send_packet(fd, (char *)&samba_pkt, offsetof(struct samba_key_in, pkt) + LEN_PKT_NOMAC) != 0) {
218 if (ntohl(samba_reply.op) == 3 && reply_len > offsetof(struct samba_key_out, pkt)) {
219 sendlen = reply_len - offsetof(struct samba_key_out, pkt);
220 xpkt = &samba_reply.pkt;
[all...]
/macosx-10.10/bind9-45.101/bind9/lib/lwres/
H A Dlwres_gabn.c65 header structure pkt is initialised and transferred to buffer b. The
72 packet pkt to a lwres_gabnrequest_t structure. Buffer b provides space
122 lwres_lwpacket_t *pkt, lwres_buffer_t *b)
133 REQUIRE(pkt != NULL);
147 pkt->length = buflen;
148 pkt->version = LWRES_LWPACKETVERSION_0;
149 pkt->pktflags &= ~LWRES_LWPACKETFLAG_RESPONSE;
150 pkt->opcode = LWRES_OPCODE_GETADDRSBYNAME;
151 pkt->result = 0;
152 pkt
121 lwres_gabnrequest_render(lwres_context_t *ctx, lwres_gabnrequest_t *req, lwres_lwpacket_t *pkt, lwres_buffer_t *b) argument
188 lwres_gabnresponse_render(lwres_context_t *ctx, lwres_gabnresponse_t *req, lwres_lwpacket_t *pkt, lwres_buffer_t *b) argument
285 lwres_gabnrequest_parse(lwres_context_t *ctx, lwres_buffer_t *b, lwres_lwpacket_t *pkt, lwres_gabnrequest_t **structp) argument
335 lwres_gabnresponse_parse(lwres_context_t *ctx, lwres_buffer_t *b, lwres_lwpacket_t *pkt, lwres_gabnresponse_t **structp) argument
[all...]
H A Dlwres_grbn.c41 lwres_lwpacket_t *pkt, lwres_buffer_t *b)
52 REQUIRE(pkt != NULL);
66 pkt->length = buflen;
67 pkt->version = LWRES_LWPACKETVERSION_0;
68 pkt->pktflags &= ~LWRES_LWPACKETFLAG_RESPONSE;
69 pkt->opcode = LWRES_OPCODE_GETRDATABYNAME;
70 pkt->result = 0;
71 pkt->authtype = 0;
72 pkt->authlength = 0;
74 ret = lwres_lwpacket_renderheader(b, pkt);
40 lwres_grbnrequest_render(lwres_context_t *ctx, lwres_grbnrequest_t *req, lwres_lwpacket_t *pkt, lwres_buffer_t *b) argument
113 lwres_grbnresponse_render(lwres_context_t *ctx, lwres_grbnresponse_t *req, lwres_lwpacket_t *pkt, lwres_buffer_t *b) argument
201 lwres_grbnrequest_parse(lwres_context_t *ctx, lwres_buffer_t *b, lwres_lwpacket_t *pkt, lwres_grbnrequest_t **structp) argument
255 lwres_grbnresponse_parse(lwres_context_t *ctx, lwres_buffer_t *b, lwres_lwpacket_t *pkt, lwres_grbnresponse_t **structp) argument
[all...]
/macosx-10.10/mDNSResponder-561.1.1/mDNSShared/
H A Ddnsextd.c104 PktMsg pkt; member in struct:__anon11107
113 PktMsg pkt; member in struct:__anon11108
205 mDNSlocal void HdrNToH(PktMsg *pkt) argument
208 mDNSu8 *ptr = (mDNSu8 *)&pkt->msg.h.numQuestions;
209 pkt->msg.h.numQuestions = (mDNSu16)((mDNSu16)ptr[0] << 8 | ptr[1]);
210 pkt->msg.h.numAnswers = (mDNSu16)((mDNSu16)ptr[2] << 8 | ptr[3]);
211 pkt->msg.h.numAuthorities = (mDNSu16)((mDNSu16)ptr[4] << 8 | ptr[5]);
212 pkt->msg.h.numAdditionals = (mDNSu16)((mDNSu16)ptr[6] << 8 | ptr[7]);
216 mDNSlocal void HdrHToN(PktMsg *pkt) argument
218 mDNSu16 numQuestions = pkt
351 SendPacket(TCPSocket *sock, PktMsg *pkt) argument
423 PktMsg * pkt = NULL; local
543 IsNotify(PktMsg *pkt) argument
549 IsLLQRequest(PktMsg *pkt) argument
581 IsLLQAck(PktMsg *pkt) argument
880 PutUpdateSRV(DaemonInfo *d, DNSZone * zone, PktMsg *pkt, mDNSu8 *ptr, char *regtype, mDNSIPPort port, mDNSBool registration) argument
919 PktMsg pkt; local
1295 PktMsg pkt; local
1374 UpdateLeaseTable(PktMsg *pkt, DaemonInfo *d, mDNSs32 lease) argument
1709 SendLLQ(DaemonInfo *d, PktMsg *pkt, struct sockaddr_in dst, TCPSocket *sock) argument
2321 RecvLLQ( DaemonInfo *d, PktMsg *pkt, TCPSocket *sock ) argument
2385 IsAuthorized( DaemonInfo * d, PktMsg * pkt, DomainAuthInfo ** key, mDNSu16 * rcode, mDNSu16 * tcode ) argument
2716 PktMsg * pkt; local
[all...]
/macosx-10.10/xnu-2782.1.97/bsd/net/classq/
H A Dclassq_sfb.c714 sfb_pcheck(struct sfb *sp, struct pkthdr *pkt) argument
733 if (SFB_BINST(sp, 0, SFB_BINMASK(pkt->pkt_sfb_hash8[(s << 1)]),
735 SFB_BINST(sp, 1, SFB_BINMASK(pkt->pkt_sfb_hash8[(s << 1) + 1]),
741 n = SFB_BINMASK(pkt->pkt_sfb_hash8[i]);
743 n = SFB_BINMASK(pkt->pkt_sfb_hash8[i + 2]);
753 sfb_penalize(struct sfb *sp, struct pkthdr *pkt, struct timespec *now) argument
758 if (!sfb_ratelimit || !sfb_pcheck(sp, pkt))
777 n = SFB_BINMASK(pkt->pkt_sfb_hash8[(w << 1)]);
783 n = SFB_BINMASK(pkt->pkt_sfb_hash8[(w << 1) + 1]);
790 n = SFB_BINMASK(pkt
851 sfb_dq_update_bins(struct sfb *sp, struct pkthdr *pkt, struct timespec *now, u_int32_t qsize) argument
934 sfb_eq_update_bins(struct sfb *sp, struct pkthdr *pkt) argument
975 sfb_bin_addfcentry(struct sfb *sp, struct pkthdr *pkt) argument
1047 sfb_drop_early(struct sfb *sp, struct pkthdr *pkt, u_int16_t *pmin, struct timespec *now) argument
1144 struct pkthdr *pkt = &m->m_pkthdr; local
1280 struct pkthdr *pkt; local
[all...]
/macosx-10.10/ppp-786.1.1/Helpers/pppdump/
H A Dpppdump.c227 struct pkt { struct
254 struct pkt *pkt; local
265 pkt = c==1? &spkt: &rpkt;
282 if (pkt->cnt > 0) {
284 if (pkt->esc) {
288 nb = pkt->cnt;
289 p = pkt->buf;
290 pkt->cnt = 0;
291 pkt
[all...]
/macosx-10.10/xnu-2782.1.97/bsd/net/
H A Dif_utun_crypto_ipsec.h95 utun_pkt_ipsec_output(struct utun_pcb *pcb, mbuf_t *pkt);
98 utun_pkt_is_ipsec_keepalive(struct utun_pcb *pcb, mbuf_t *pkt, u_int16_t nxt, u_int32_t flags, size_t off);
101 utun_pkt_ipsec_input(struct utun_pcb *pcb, mbuf_t *pkt, protocol_family_t family);
H A Dif_utun_crypto_dtls.c185 mbuf_t *pkt,
192 p = mtod(*pkt, __typeof__(p));
196 if (m_pktlen(*pkt) < utun_crypto_framer_state_dtls_in(cur_framer).in_pattern_len) {
199 if ((*pkt)->m_len < utun_crypto_framer_state_dtls_in(cur_framer).in_pattern_len) {
200 *pkt = m_pullup(*pkt, utun_crypto_framer_state_dtls_in(cur_framer).in_pattern_len);
201 if (!*pkt ||
202 (*pkt)->m_len < utun_crypto_framer_state_dtls_in(cur_framer).in_pattern_len) {
205 p = mtod(*pkt, __typeof__(p));
233 mbuf_t *pkt,
184 utun_pkt_dtls_input_frame_is_data(utun_crypto_ctx_t *crypto_ctx, mbuf_t *pkt, protocol_family_t family, int *striplen) argument
232 utun_pkt_dtls_output_frame_encapsulate(utun_crypto_ctx_t *crypto_ctx, mbuf_t *pkt, protocol_family_t proto) argument
923 utun_pkt_dtls_output(struct utun_pcb *pcb, mbuf_t *pkt) argument
988 utun_pkt_dtls_input(struct utun_pcb *pcb, mbuf_t *pkt, __unused protocol_family_t family) argument
[all...]
/macosx-10.10/ntp-92/sntp/
H A Dnetworking.h43 int sendpkt (SOCKET rsock, sockaddr_u *dest, struct pkt *pkt, int len);
47 int recvpkt (SOCKET rsock, struct timeval timeout, struct pkt *rpkt, struct pkt *spkt);
51 int recv_bcst_pkt (SOCKET rsock, struct pkt *rpkt, sockaddr_u *sas);
H A Dutilities.c8 struct pkt *dpkg,
14 u_char *pkt; local
16 pkt = (u_char *)dpkg;
24 fprintf(output, "%d: %x \t", a, pkt[a]);
H A Dutilities.h16 void pkt_output (struct pkt *dpkg, int pkt_length, FILE *output);
/macosx-10.10/bind9-45.101/bind9/bin/tests/
H A Dlwres_test.c74 lwres_lwpacket_t pkt, pkt2; local
79 pkt.pktflags = 0;
80 pkt.serial = 0x11223344;
81 pkt.recvlength = 0x55667788;
82 pkt.result = 0;
87 ret = lwres_nooprequest_render(ctx, &nooprequest, &pkt, &b);
115 pkt.pktflags = 0;
116 pkt.serial = 0x11223344;
117 pkt.recvlength = 0x55667788;
118 pkt
[all...]
/macosx-10.10/dcerpc-61/dcerpc/ncklib/
H A Ddgpkt.c109 rpc_dg_pkt_pool_elt_p_t /*pkt*/,
375 rpc_dg_pkt_pool_elt_p_t pkt; local
441 RPC_MEM_ALLOC(pkt, rpc_dg_pkt_pool_elt_p_t,
445 pkt->u.next = pool->free_list;
446 pkt->is_on_free_list = true;
447 pool->free_list = pkt;
453 pool->free_list_tail = pkt;
473 rpc_dg_pkt_pool_elt_p_t pkt, next_pkt; local
487 pkt = pool->free_list;
490 next_pkt = pkt
518 rpc_dg_pkt_pool_elt_p_t pkt; local
635 rpc_dg_pkt_pool_elt_p_t pkt; local
814 rpc_dg_pkt_pool_elt_p_t pkt; local
921 pkt_free( rpc_dg_pkt_pool_elt_p_t pkt, rpc_dg_call_p_t call ) argument
[all...]
H A Ddgrq.h134 (data)->data_addr = (byte_p_t) &(rqe)->pkt->body; \
H A Ddgsoc.c400 rpc_dg_pkt_pool_elt_p_t pkt; local
402 RPC_MEM_ALLOC(pkt, rpc_dg_pkt_pool_elt_p_t,
406 eltp->xqe = &pkt->u.xqe.xqe;
407 eltp->xqe->body = &pkt->u.xqe.pkt;
416 RPC_MEM_ALLOC(pkt, rpc_dg_pkt_pool_elt_p_t,
420 eltp->rqe = &pkt->u.rqe.rqe;
421 eltp->rqe->pkt_real = &pkt->u.rqe.pkt;
422 eltp->rqe->pkt
[all...]
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/
H A Dgetrrsetbyname-ldns.c75 ldns_pkt *pkt = NULL; local
113 pkt = ldns_resolver_query(ldns_res, domain, rdtype, rdclass, LDNS_RD);
116 if (!pkt || ldns_pkt_ancount(pkt) < 1) {
128 rrdata = ldns_pkt_rr_list_by_type(pkt, rdtype, LDNS_SECTION_ANSWER);
151 if (ldns_pkt_ad(pkt)) {
158 rrsigs = ldns_pkt_rr_list_by_type(pkt, LDNS_RR_TYPE_RRSIG,
198 for (i=0, index_ans=0, index_sig=0; i< pkt->_header->_ancount; i++) {
200 rr = ldns_rr_list_rr(ldns_pkt_answer(pkt), i);
244 ldns_pkt_free(pkt);
[all...]
/macosx-10.10/ppp-786.1.1/Family/
H A Dppp_ip.c265 int ppp_ip_af_src_out(ifnet_t ifp, char *pkt) argument
271 ip = (struct ip *)(void*)pkt;
278 int ppp_ip_af_src_in(ifnet_t ifp, char *pkt) argument
284 ip = (struct ip *)(void*)pkt;
291 int ppp_ip_bootp_client_in(ifnet_t ifp, char *pkt) argument
298 ip = (struct ip *)(void*)pkt;
301 memcpy(&udp, pkt + sizeof(struct ip), sizeof(struct udphdr));
313 int ppp_ip_bootp_server_in(ifnet_t ifp, char *pkt) argument
321 ip = (struct ip *)(void*)pkt;
325 memcpy(&udp, pkt
[all...]
/macosx-10.10/ppp-786.1.1/Helpers/pppd/
H A Dchap-new.h138 int (*check_success)(unsigned char *pkt, int len, unsigned char *priv);
139 int (*handle_failure)(unsigned char *pkt, int len, char *message, int message_max_len);
163 unsigned char *challenge, unsigned char *pkt, int pkt_len,
H A Dchap-new.c80 unsigned char *challenge, unsigned char *pkt, int pkt_len,
154 unsigned char *pkt, int len);
160 unsigned char *pkt, int len);
162 unsigned char *pkt, int len);
164 static void chap_input(int unit, unsigned char *pkt, int pktlen);
390 unsigned char *pkt, int len)
404 response = pkt;
405 GETCHAR(response_len, pkt);
407 name = pkt + response_len;
488 unsigned char *pkt, in
389 chap_handle_response(struct chap_server_state *ss, int id, unsigned char *pkt, int len) argument
487 chap_handle_default(struct chap_server_state *ss, int code, int id, unsigned char *pkt, int len) argument
583 chap_respond(struct chap_client_state *cs, int id, unsigned char *pkt, int len) argument
781 chap_ask_password(struct chap_client_state *cs, int id, unsigned char *pkt, int len, int change) argument
815 chap_handle_status(struct chap_client_state *cs, int code, int id, unsigned char *pkt, int len) argument
890 chap_input(int unit, unsigned char *pkt, int pktlen) argument
[all...]
/macosx-10.10/eap8021x-198/EAP8021X.fproj/
H A Deapaka_plugin.c117 uint8_t pkt[1500]; member in struct:__anon8632
389 EAPAKAPacketRef pkt; local
391 pkt = (EAPAKAPacketRef)context->pkt;
392 TLVBufferInit(tb_p, pkt->attrs,
393 sizeof(context->pkt) - offsetof(EAPAKAPacket, attrs));
394 pkt->code = kEAPCodeResponse;
395 pkt->identifier = in_pkt->identifier;
396 pkt->type = kEAPTypeEAPAKA;
397 pkt
407 EAPPacketRef pkt; local
454 EAPPacketRef pkt = NULL; local
649 EAPPacketRef pkt = NULL; local
856 EAPPacketRef pkt = NULL; local
1051 EAPPacketRef pkt = NULL; local
1538 eapaka_copy_packet_description(const EAPPacketRef pkt, bool * packet_is_valid) argument
1839 EAPAKAPacketRef pkt; local
1862 EAPPacketRef pkt; local
[all...]

Completed in 155 milliseconds

12345678