/macosx-10.10/bootp-298/IPConfiguration.bproj/ |
H A D | IPv6Socket.h | 45 const void * pkt, int pkt_size, int hlim);
|
H A D | bootp.c | 110 make_bootp_request(struct bootp * pkt, argument 113 bzero(pkt, sizeof (*pkt)); 114 pkt->bp_op = BOOTREQUEST; 115 pkt->bp_htype = hwtype; 116 pkt->bp_hlen = hwlen; 118 pkt->bp_unused = htons(DHCP_FLAGS_BROADCAST); 119 bcopy(hwaddr, pkt->bp_chaddr, hwlen); 120 bcopy(G_rfc_magic, pkt->bp_vend, sizeof(G_rfc_magic)); 121 pkt 425 bootp_receive_data_t *pkt = (bootp_receive_data_t *)event_data; local [all...] |
H A D | dhcp_thread.h | 46 uint32_t pkt[1500/sizeof(uint32_t)]; member in struct:saved_pkt
|
/macosx-10.10/bootp-298/bootplib/ |
H A D | bpflib.h | 36 int bpf_write(int fd, void * pkt, int len);
|
H A D | in_cksum.c | 59 in_cksum(void * pkt, int len) argument 64 w = (u_short *)pkt;
|
/macosx-10.10/ntp-92/ntpd/ |
H A D | ntp_signd.c | 127 struct pkt *xpkt 151 struct pkt pkt; member in struct:samba_key_in 158 struct pkt pkt; member in struct:samba_key_out 178 samba_pkt.pkt = *xpkt; 196 if (send_packet(fd, (char *)&samba_pkt, offsetof(struct samba_key_in, pkt) + LEN_PKT_NOMAC) != 0) { 218 if (ntohl(samba_reply.op) == 3 && reply_len > offsetof(struct samba_key_out, pkt)) { 219 sendlen = reply_len - offsetof(struct samba_key_out, pkt); 220 xpkt = &samba_reply.pkt; [all...] |
/macosx-10.10/bind9-45.101/bind9/lib/lwres/ |
H A D | lwres_gabn.c | 65 header structure pkt is initialised and transferred to buffer b. The 72 packet pkt to a lwres_gabnrequest_t structure. Buffer b provides space 122 lwres_lwpacket_t *pkt, lwres_buffer_t *b) 133 REQUIRE(pkt != NULL); 147 pkt->length = buflen; 148 pkt->version = LWRES_LWPACKETVERSION_0; 149 pkt->pktflags &= ~LWRES_LWPACKETFLAG_RESPONSE; 150 pkt->opcode = LWRES_OPCODE_GETADDRSBYNAME; 151 pkt->result = 0; 152 pkt 121 lwres_gabnrequest_render(lwres_context_t *ctx, lwres_gabnrequest_t *req, lwres_lwpacket_t *pkt, lwres_buffer_t *b) argument 188 lwres_gabnresponse_render(lwres_context_t *ctx, lwres_gabnresponse_t *req, lwres_lwpacket_t *pkt, lwres_buffer_t *b) argument 285 lwres_gabnrequest_parse(lwres_context_t *ctx, lwres_buffer_t *b, lwres_lwpacket_t *pkt, lwres_gabnrequest_t **structp) argument 335 lwres_gabnresponse_parse(lwres_context_t *ctx, lwres_buffer_t *b, lwres_lwpacket_t *pkt, lwres_gabnresponse_t **structp) argument [all...] |
H A D | lwres_grbn.c | 41 lwres_lwpacket_t *pkt, lwres_buffer_t *b) 52 REQUIRE(pkt != NULL); 66 pkt->length = buflen; 67 pkt->version = LWRES_LWPACKETVERSION_0; 68 pkt->pktflags &= ~LWRES_LWPACKETFLAG_RESPONSE; 69 pkt->opcode = LWRES_OPCODE_GETRDATABYNAME; 70 pkt->result = 0; 71 pkt->authtype = 0; 72 pkt->authlength = 0; 74 ret = lwres_lwpacket_renderheader(b, pkt); 40 lwres_grbnrequest_render(lwres_context_t *ctx, lwres_grbnrequest_t *req, lwres_lwpacket_t *pkt, lwres_buffer_t *b) argument 113 lwres_grbnresponse_render(lwres_context_t *ctx, lwres_grbnresponse_t *req, lwres_lwpacket_t *pkt, lwres_buffer_t *b) argument 201 lwres_grbnrequest_parse(lwres_context_t *ctx, lwres_buffer_t *b, lwres_lwpacket_t *pkt, lwres_grbnrequest_t **structp) argument 255 lwres_grbnresponse_parse(lwres_context_t *ctx, lwres_buffer_t *b, lwres_lwpacket_t *pkt, lwres_grbnresponse_t **structp) argument [all...] |
/macosx-10.10/mDNSResponder-561.1.1/mDNSShared/ |
H A D | dnsextd.c | 104 PktMsg pkt; member in struct:__anon11107 113 PktMsg pkt; member in struct:__anon11108 205 mDNSlocal void HdrNToH(PktMsg *pkt) argument 208 mDNSu8 *ptr = (mDNSu8 *)&pkt->msg.h.numQuestions; 209 pkt->msg.h.numQuestions = (mDNSu16)((mDNSu16)ptr[0] << 8 | ptr[1]); 210 pkt->msg.h.numAnswers = (mDNSu16)((mDNSu16)ptr[2] << 8 | ptr[3]); 211 pkt->msg.h.numAuthorities = (mDNSu16)((mDNSu16)ptr[4] << 8 | ptr[5]); 212 pkt->msg.h.numAdditionals = (mDNSu16)((mDNSu16)ptr[6] << 8 | ptr[7]); 216 mDNSlocal void HdrHToN(PktMsg *pkt) argument 218 mDNSu16 numQuestions = pkt 351 SendPacket(TCPSocket *sock, PktMsg *pkt) argument 423 PktMsg * pkt = NULL; local 543 IsNotify(PktMsg *pkt) argument 549 IsLLQRequest(PktMsg *pkt) argument 581 IsLLQAck(PktMsg *pkt) argument 880 PutUpdateSRV(DaemonInfo *d, DNSZone * zone, PktMsg *pkt, mDNSu8 *ptr, char *regtype, mDNSIPPort port, mDNSBool registration) argument 919 PktMsg pkt; local 1295 PktMsg pkt; local 1374 UpdateLeaseTable(PktMsg *pkt, DaemonInfo *d, mDNSs32 lease) argument 1709 SendLLQ(DaemonInfo *d, PktMsg *pkt, struct sockaddr_in dst, TCPSocket *sock) argument 2321 RecvLLQ( DaemonInfo *d, PktMsg *pkt, TCPSocket *sock ) argument 2385 IsAuthorized( DaemonInfo * d, PktMsg * pkt, DomainAuthInfo ** key, mDNSu16 * rcode, mDNSu16 * tcode ) argument 2716 PktMsg * pkt; local [all...] |
/macosx-10.10/xnu-2782.1.97/bsd/net/classq/ |
H A D | classq_sfb.c | 714 sfb_pcheck(struct sfb *sp, struct pkthdr *pkt) argument 733 if (SFB_BINST(sp, 0, SFB_BINMASK(pkt->pkt_sfb_hash8[(s << 1)]), 735 SFB_BINST(sp, 1, SFB_BINMASK(pkt->pkt_sfb_hash8[(s << 1) + 1]), 741 n = SFB_BINMASK(pkt->pkt_sfb_hash8[i]); 743 n = SFB_BINMASK(pkt->pkt_sfb_hash8[i + 2]); 753 sfb_penalize(struct sfb *sp, struct pkthdr *pkt, struct timespec *now) argument 758 if (!sfb_ratelimit || !sfb_pcheck(sp, pkt)) 777 n = SFB_BINMASK(pkt->pkt_sfb_hash8[(w << 1)]); 783 n = SFB_BINMASK(pkt->pkt_sfb_hash8[(w << 1) + 1]); 790 n = SFB_BINMASK(pkt 851 sfb_dq_update_bins(struct sfb *sp, struct pkthdr *pkt, struct timespec *now, u_int32_t qsize) argument 934 sfb_eq_update_bins(struct sfb *sp, struct pkthdr *pkt) argument 975 sfb_bin_addfcentry(struct sfb *sp, struct pkthdr *pkt) argument 1047 sfb_drop_early(struct sfb *sp, struct pkthdr *pkt, u_int16_t *pmin, struct timespec *now) argument 1144 struct pkthdr *pkt = &m->m_pkthdr; local 1280 struct pkthdr *pkt; local [all...] |
/macosx-10.10/ppp-786.1.1/Helpers/pppdump/ |
H A D | pppdump.c | 227 struct pkt { struct 254 struct pkt *pkt; local 265 pkt = c==1? &spkt: &rpkt; 282 if (pkt->cnt > 0) { 284 if (pkt->esc) { 288 nb = pkt->cnt; 289 p = pkt->buf; 290 pkt->cnt = 0; 291 pkt [all...] |
/macosx-10.10/xnu-2782.1.97/bsd/net/ |
H A D | if_utun_crypto_ipsec.h | 95 utun_pkt_ipsec_output(struct utun_pcb *pcb, mbuf_t *pkt); 98 utun_pkt_is_ipsec_keepalive(struct utun_pcb *pcb, mbuf_t *pkt, u_int16_t nxt, u_int32_t flags, size_t off); 101 utun_pkt_ipsec_input(struct utun_pcb *pcb, mbuf_t *pkt, protocol_family_t family);
|
H A D | if_utun_crypto_dtls.c | 185 mbuf_t *pkt, 192 p = mtod(*pkt, __typeof__(p)); 196 if (m_pktlen(*pkt) < utun_crypto_framer_state_dtls_in(cur_framer).in_pattern_len) { 199 if ((*pkt)->m_len < utun_crypto_framer_state_dtls_in(cur_framer).in_pattern_len) { 200 *pkt = m_pullup(*pkt, utun_crypto_framer_state_dtls_in(cur_framer).in_pattern_len); 201 if (!*pkt || 202 (*pkt)->m_len < utun_crypto_framer_state_dtls_in(cur_framer).in_pattern_len) { 205 p = mtod(*pkt, __typeof__(p)); 233 mbuf_t *pkt, 184 utun_pkt_dtls_input_frame_is_data(utun_crypto_ctx_t *crypto_ctx, mbuf_t *pkt, protocol_family_t family, int *striplen) argument 232 utun_pkt_dtls_output_frame_encapsulate(utun_crypto_ctx_t *crypto_ctx, mbuf_t *pkt, protocol_family_t proto) argument 923 utun_pkt_dtls_output(struct utun_pcb *pcb, mbuf_t *pkt) argument 988 utun_pkt_dtls_input(struct utun_pcb *pcb, mbuf_t *pkt, __unused protocol_family_t family) argument [all...] |
/macosx-10.10/ntp-92/sntp/ |
H A D | networking.h | 43 int sendpkt (SOCKET rsock, sockaddr_u *dest, struct pkt *pkt, int len); 47 int recvpkt (SOCKET rsock, struct timeval timeout, struct pkt *rpkt, struct pkt *spkt); 51 int recv_bcst_pkt (SOCKET rsock, struct pkt *rpkt, sockaddr_u *sas);
|
H A D | utilities.c | 8 struct pkt *dpkg, 14 u_char *pkt; local 16 pkt = (u_char *)dpkg; 24 fprintf(output, "%d: %x \t", a, pkt[a]);
|
H A D | utilities.h | 16 void pkt_output (struct pkt *dpkg, int pkt_length, FILE *output);
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/ |
H A D | lwres_test.c | 74 lwres_lwpacket_t pkt, pkt2; local 79 pkt.pktflags = 0; 80 pkt.serial = 0x11223344; 81 pkt.recvlength = 0x55667788; 82 pkt.result = 0; 87 ret = lwres_nooprequest_render(ctx, &nooprequest, &pkt, &b); 115 pkt.pktflags = 0; 116 pkt.serial = 0x11223344; 117 pkt.recvlength = 0x55667788; 118 pkt [all...] |
/macosx-10.10/dcerpc-61/dcerpc/ncklib/ |
H A D | dgpkt.c | 109 rpc_dg_pkt_pool_elt_p_t /*pkt*/, 375 rpc_dg_pkt_pool_elt_p_t pkt; local 441 RPC_MEM_ALLOC(pkt, rpc_dg_pkt_pool_elt_p_t, 445 pkt->u.next = pool->free_list; 446 pkt->is_on_free_list = true; 447 pool->free_list = pkt; 453 pool->free_list_tail = pkt; 473 rpc_dg_pkt_pool_elt_p_t pkt, next_pkt; local 487 pkt = pool->free_list; 490 next_pkt = pkt 518 rpc_dg_pkt_pool_elt_p_t pkt; local 635 rpc_dg_pkt_pool_elt_p_t pkt; local 814 rpc_dg_pkt_pool_elt_p_t pkt; local 921 pkt_free( rpc_dg_pkt_pool_elt_p_t pkt, rpc_dg_call_p_t call ) argument [all...] |
H A D | dgrq.h | 134 (data)->data_addr = (byte_p_t) &(rqe)->pkt->body; \
|
H A D | dgsoc.c | 400 rpc_dg_pkt_pool_elt_p_t pkt; local 402 RPC_MEM_ALLOC(pkt, rpc_dg_pkt_pool_elt_p_t, 406 eltp->xqe = &pkt->u.xqe.xqe; 407 eltp->xqe->body = &pkt->u.xqe.pkt; 416 RPC_MEM_ALLOC(pkt, rpc_dg_pkt_pool_elt_p_t, 420 eltp->rqe = &pkt->u.rqe.rqe; 421 eltp->rqe->pkt_real = &pkt->u.rqe.pkt; 422 eltp->rqe->pkt [all...] |
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/ |
H A D | getrrsetbyname-ldns.c | 75 ldns_pkt *pkt = NULL; local 113 pkt = ldns_resolver_query(ldns_res, domain, rdtype, rdclass, LDNS_RD); 116 if (!pkt || ldns_pkt_ancount(pkt) < 1) { 128 rrdata = ldns_pkt_rr_list_by_type(pkt, rdtype, LDNS_SECTION_ANSWER); 151 if (ldns_pkt_ad(pkt)) { 158 rrsigs = ldns_pkt_rr_list_by_type(pkt, LDNS_RR_TYPE_RRSIG, 198 for (i=0, index_ans=0, index_sig=0; i< pkt->_header->_ancount; i++) { 200 rr = ldns_rr_list_rr(ldns_pkt_answer(pkt), i); 244 ldns_pkt_free(pkt); [all...] |
/macosx-10.10/ppp-786.1.1/Family/ |
H A D | ppp_ip.c | 265 int ppp_ip_af_src_out(ifnet_t ifp, char *pkt) argument 271 ip = (struct ip *)(void*)pkt; 278 int ppp_ip_af_src_in(ifnet_t ifp, char *pkt) argument 284 ip = (struct ip *)(void*)pkt; 291 int ppp_ip_bootp_client_in(ifnet_t ifp, char *pkt) argument 298 ip = (struct ip *)(void*)pkt; 301 memcpy(&udp, pkt + sizeof(struct ip), sizeof(struct udphdr)); 313 int ppp_ip_bootp_server_in(ifnet_t ifp, char *pkt) argument 321 ip = (struct ip *)(void*)pkt; 325 memcpy(&udp, pkt [all...] |
/macosx-10.10/ppp-786.1.1/Helpers/pppd/ |
H A D | chap-new.h | 138 int (*check_success)(unsigned char *pkt, int len, unsigned char *priv); 139 int (*handle_failure)(unsigned char *pkt, int len, char *message, int message_max_len); 163 unsigned char *challenge, unsigned char *pkt, int pkt_len,
|
H A D | chap-new.c | 80 unsigned char *challenge, unsigned char *pkt, int pkt_len, 154 unsigned char *pkt, int len); 160 unsigned char *pkt, int len); 162 unsigned char *pkt, int len); 164 static void chap_input(int unit, unsigned char *pkt, int pktlen); 390 unsigned char *pkt, int len) 404 response = pkt; 405 GETCHAR(response_len, pkt); 407 name = pkt + response_len; 488 unsigned char *pkt, in 389 chap_handle_response(struct chap_server_state *ss, int id, unsigned char *pkt, int len) argument 487 chap_handle_default(struct chap_server_state *ss, int code, int id, unsigned char *pkt, int len) argument 583 chap_respond(struct chap_client_state *cs, int id, unsigned char *pkt, int len) argument 781 chap_ask_password(struct chap_client_state *cs, int id, unsigned char *pkt, int len, int change) argument 815 chap_handle_status(struct chap_client_state *cs, int code, int id, unsigned char *pkt, int len) argument 890 chap_input(int unit, unsigned char *pkt, int pktlen) argument [all...] |
/macosx-10.10/eap8021x-198/EAP8021X.fproj/ |
H A D | eapaka_plugin.c | 117 uint8_t pkt[1500]; member in struct:__anon8632 389 EAPAKAPacketRef pkt; local 391 pkt = (EAPAKAPacketRef)context->pkt; 392 TLVBufferInit(tb_p, pkt->attrs, 393 sizeof(context->pkt) - offsetof(EAPAKAPacket, attrs)); 394 pkt->code = kEAPCodeResponse; 395 pkt->identifier = in_pkt->identifier; 396 pkt->type = kEAPTypeEAPAKA; 397 pkt 407 EAPPacketRef pkt; local 454 EAPPacketRef pkt = NULL; local 649 EAPPacketRef pkt = NULL; local 856 EAPPacketRef pkt = NULL; local 1051 EAPPacketRef pkt = NULL; local 1538 eapaka_copy_packet_description(const EAPPacketRef pkt, bool * packet_is_valid) argument 1839 EAPAKAPacketRef pkt; local 1862 EAPPacketRef pkt; local [all...] |