/macosx-10.10/ntp-92/include/ |
H A D | ntpsim.h | 72 struct pkt evnt_pkt; 134 struct pkt *rpkt);
|
/macosx-10.10/xnu-2782.1.97/bsd/net/ |
H A D | if_utun_crypto_dtls.h | 100 utun_pkt_dtls_output(struct utun_pcb *pcb, mbuf_t *pkt); 103 utun_pkt_dtls_input(struct utun_pcb *pcb, mbuf_t *pkt, protocol_family_t family);
|
/macosx-10.10/xnu-2782.1.97/bsd/netinet/ |
H A D | dhcp_options.c | 369 * First the pkt->dp_options is parsed. If that contains 370 * the overload option, it parses pkt->dp_file if specified, 371 * then parses pkt->dp_sname if specified. 374 dhcpol_parse_packet(dhcpol_t * options, const struct dhcp * pkt, int len) argument 380 if (len < (sizeof(*pkt) + RFC_MAGIC_SIZE)) { 382 len, (int)sizeof(*pkt) + RFC_MAGIC_SIZE)); 385 if (bcmp(pkt->dp_options, rfc_magic, RFC_MAGIC_SIZE)) { 389 if (dhcpol_parse_buffer(options, pkt->dp_options + RFC_MAGIC_SIZE, 390 len - sizeof(*pkt) - RFC_MAGIC_SIZE) == FALSE) 404 if (dhcpol_parse_buffer(&extra, pkt 634 struct dhcp * pkt = (struct dhcp *)buf; local [all...] |
H A D | ip_dummynet.c | 717 * event handled is the finish time of the head pkt. 720 * event handled is the start time of the head pkt. 730 struct dn_pkt_tag *pkt = NULL; local 737 pkt = dn_tag_get(m); 738 if (!DN_KEY_LEQ(pkt->dn_output_time, curr_time)) 753 schedule_time = pkt == NULL || DN_KEY_LEQ(pkt->dn_output_time, curr_time) ? 754 curr_time + 1 : pkt->dn_output_time; 758 pkt = dn_tag_get(m); 783 * extract pkt fro 787 move_pkt(struct mbuf *pkt, struct dn_flow_queue *q, struct dn_pipe *p, int len) argument 816 struct mbuf *pkt; local 907 struct mbuf *pkt = q->head; local 1102 struct dn_pkt_tag *pkt; local 1527 struct dn_pkt_tag *pkt; local 1923 struct dn_pkt_tag *pkt = dn_tag_get(m) ; local 1937 struct dn_pkt_tag *pkt ; local [all...] |
H A D | in_dhcp.c | 152 struct mbuf * ip_pkt_to_mbuf(caddr_t pkt, int pktsize); 181 init_dhcp_packet_header(struct dhcp_packet * pkt, int pkt_size) argument 183 bzero(&pkt->ip, sizeof(pkt->ip)); 184 bzero(&pkt->udp, sizeof(pkt->udp)); 185 pkt->ip.ip_v = IPVERSION; 186 pkt->ip.ip_hl = sizeof(struct ip) >> 2; 187 pkt->ip.ip_ttl = MAXTTL; 188 pkt 249 ip_pkt_to_mbuf(caddr_t pkt, int pktsize) argument 303 send_packet(struct ifnet * ifp, struct dhcp_packet * pkt, int pkt_size) argument [all...] |
/macosx-10.10/mDNSResponder-561.1.1/mDNSPosix/ |
H A D | NetMonitor.c | 452 DNSQuestion *q, LargeCacheRecord *pkt) 458 ptr = GetLargeResourceRecord(m, query, ptr, end, q->InterfaceID, kDNSRecordTypePacketAuth, pkt); 460 if (m->rec.r.resrec.RecordType != kDNSRecordTypePacketNegative && ResourceRecordAnswersQuestion(&pkt->r.resrec, q)) return(p2); 609 LargeCacheRecord pkt; local 625 p2 = (mDNSu8 *)FindUpdate(m, msg, auth, end, &q, &pkt); 629 DisplayResourceRecord(srcaddr, ucbit ? "(PU)" : "(PM)", &pkt.r.resrec); 648 ptr = GetLargeResourceRecord(m, msg, ptr, end, InterfaceID, kDNSRecordTypePacketAns, &pkt); 650 DisplayResourceRecord(srcaddr, "(KA)", &pkt.r.resrec); 656 recordstat(entry, pkt.r.resrec.name, OP_query, pkt 451 FindUpdate(mDNS *const m, const DNSMessage *const query, const mDNSu8 *ptr, const mDNSu8 *const end, DNSQuestion *q, LargeCacheRecord *pkt) argument 686 LargeCacheRecord pkt; local 757 LargeCacheRecord pkt; local [all...] |
/macosx-10.10/eap8021x-198/EAP8021X.fproj/ |
H A D | EAPSIMAKAUtil.h | 173 EAPPacketRef pkt, 184 EAPPacketRef pkt, 190 EAPPacketRef pkt, 221 EAPSIMAKAPacketCopyDescription(const EAPPacketRef pkt, bool * packet_is_valid); 225 EAPSIMAKAPacketDump(FILE * out_f, EAPPacketRef pkt);
|
H A D | eapmschapv2_plugin.c | 119 * pkt.ms_length is always (pkt.length - 5) because ms_length is the number of 120 * bytes starting with the op_code field (offsetof(pkt.op_code) == 5). 131 uint8_t ms_length[2]; /* must be pkt.length - 5 */ 142 uint8_t ms_length[2]; /* pkt.length - 5 */ 155 uint8_t ms_length[2]; /* pkt.length - 5 */ 168 uint8_t ms_length[2]; /* pkt.length - 5 */ 188 uint8_t ms_length[2]; /* pkt.length - 5 */ 207 uint8_t ms_length[2]; /* pkt.length - 5 */ 212 EAPMSCHAPv2PacketSetMSLength(EAPMSCHAPv2PacketRef pkt, uint16_ argument 219 EAPMSCHAPv2PacketGetMSLength(const EAPMSCHAPv2PacketRef pkt) argument 974 eapmschapv2_challenge_append(CFMutableStringRef str, const EAPPacketRef pkt, int length) argument 1017 eapmschapv2_response_append(CFMutableStringRef str, const EAPPacketRef pkt, int length) argument 1073 eapmschapv2_success_request_append(CFMutableStringRef str, const EAPPacketRef pkt, int length) argument 1112 eapmschapv2_failure_request_append(CFMutableStringRef str, const EAPPacketRef pkt, int length) argument 1146 eapmschapv2_change_password_append(CFMutableStringRef str, const EAPPacketRef pkt, int length) argument 1200 eapmschapv2_copy_packet_description(const EAPPacketRef pkt, bool * packet_is_valid) argument [all...] |
H A D | eapsim_plugin.c | 150 uint8_t pkt[1500]; member in struct:__anon8657 700 EAPSIMPacketRef pkt; local 702 pkt = (EAPSIMPacketRef)context->pkt; 703 TLVBufferInit(tb_p, pkt->attrs, 704 sizeof(context->pkt) - offsetof(EAPSIMPacket, attrs)); 705 pkt->code = kEAPCodeResponse; 706 pkt->identifier = in_pkt->identifier; 707 pkt->type = kEAPTypeEAPSIM; 708 pkt 718 EAPPacketRef pkt; local 768 EAPPacketRef pkt = NULL; local 1019 EAPPacketRef pkt = NULL; local 1203 EAPPacketRef pkt = NULL; local 1398 EAPPacketRef pkt = NULL; local 1794 eapsim_copy_packet_description(const EAPPacketRef pkt, bool * packet_is_valid) argument [all...] |
H A D | EAP.h | 133 EAPPacketSetLength(EAPPacketRef pkt, uint16_t length); 136 EAPPacketGetLength(const EAPPacketRef pkt);
|
H A D | EAPUtil.c | 176 const EAPPacketRef pkt = (const EAPPacketRef)rd_p; local 179 = EAPClientModulePluginCopyPacketDescription(module, pkt, 299 EAPPacketSetLength(EAPPacketRef pkt, uint16_t length) argument 301 net_uint16_set(pkt->length, length); 306 EAPPacketGetLength(const EAPPacketRef pkt) argument 308 return net_uint16_get(pkt->length);
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | vpn_control.c | 337 struct vpnctl_cmd_bind *pkt = ALIGNED_CAST(struct vpnctl_cmd_bind *)combuf; local 349 if (ntohs(pkt->vers_len)) { 350 addr->version = vmalloc(ntohs(pkt->vers_len)); 357 memcpy(addr->version->v, pkt + 1, ntohs(pkt->vers_len)); 359 addr->address = pkt->address; 367 struct vpnctl_cmd_unbind *pkt = ALIGNED_CAST(struct vpnctl_cmd_unbind *)combuf; local 374 if (pkt->address == 0xFFFFFFFF || 375 pkt->address == addr->address) { 431 struct vpnctl_cmd_xauth_info *pkt local 451 struct vpnctl_cmd_connect *pkt = ALIGNED_CAST(struct vpnctl_cmd_connect *)combuf; local 469 struct vpnctl_cmd_connect *pkt = ALIGNED_CAST(struct vpnctl_cmd_connect *)combuf; local 487 struct vpnctl_cmd_start_ph2 *pkt = ALIGNED_CAST(struct vpnctl_cmd_start_ph2 *)combuf; local 504 struct vpnctl_cmd_start_dpd *pkt = ALIGNED_CAST(struct vpnctl_cmd_start_dpd *)combuf; local 533 struct vpnctl_cmd_assert *pkt = ALIGNED_CAST(struct vpnctl_cmd_assert *)combuf; local 562 struct vpnctl_cmd_connect *pkt = ALIGNED_CAST(struct vpnctl_cmd_connect *)combuf; local [all...] |
/macosx-10.10/xnu-2782.1.97/tools/lldbmacros/ |
H A D | kdp.py | 11 length: int - 16 bit length of entire pkt including hdr 43 pkt = kern.GetValueFromAddress(data_addr, 'kdp_dumpinfo_req_t *') 53 if ( WriteInt64ToMemoryAddress((header_value), int(addressof(pkt.hdr))) and 54 WriteInt32ToMemoryAddress(subcmd, int(addressof(pkt.type))) and 55 WriteStringToMemoryAddress(file_name, int(addressof(pkt.name))) and 56 WriteStringToMemoryAddress(dest_ip, int(addressof(pkt.destip))) and 57 WriteStringToMemoryAddress(router_ip, int(addressof(pkt.routerip))) 61 if not WriteInt32ToMemoryAddress(port, int(addressof(pkt.port))):
|
/macosx-10.10/bootp-298/bootplib/ |
H A D | bsdplib.c | 126 bsdp_print_packet(struct dhcp * pkt, int length, int options_only) argument 136 dhcp_packet_print(pkt, length); 138 if (dhcpol_parse_packet(&options, pkt, length, &err) == FALSE) {
|
/macosx-10.10/bootp-298/IPConfiguration.bproj/ |
H A D | DHCPv6Client.c | 603 if (client->saved.pkt != NULL) { 604 free(client->saved.pkt); 605 client->saved.pkt = NULL; 668 client->saved.pkt = malloc(client->saved.pkt_len); 669 bcopy(data->pkt, client->saved.pkt, client->saved.pkt_len); 671 = DHCPv6OptionListCreateWithPacket(client->saved.pkt, 677 client->ia_na = get_ia_na_addr(client, client->saved.pkt->msg_type, 725 DHCPv6PacketRef pkt; local 727 pkt 762 DHCPv6PacketRef pkt; local 794 DHCPv6PacketRef pkt; local 836 DHCPv6PacketRef pkt; local [all...] |
H A D | DHCPv6Socket.c | 232 DHCPv6SocketDemux(int if_index, const DHCPv6PacketRef pkt, int pkt_len) argument 241 data.pkt = pkt; 243 data.options = DHCPv6OptionListCreateWithPacket(pkt, pkt_len, &err); 260 DHCPv6PacketPrintToString(str, pkt, pkt_len); 525 S_send_packet(int sockfd, int ifindex, DHCPv6PacketRef pkt, int pkt_size) argument 531 return (IPv6SocketSend(sockfd, ifindex, &dst, pkt, pkt_size, -1)); 536 DHCPv6PacketRef pkt, int pkt_len) 555 DHCPv6PacketPrintToString(str, pkt, pkt_len); 556 options = DHCPv6OptionListCreateWithPacket(pkt, pkt_le 535 DHCPv6SocketTransmit(DHCPv6SocketRef sock, DHCPv6PacketRef pkt, int pkt_len) argument [all...] |
H A D | DHCPLease.h | 63 uint8_t pkt[1]; member in struct:__anon6908 96 const uint8_t * pkt, int pkt_length,
|
H A D | ipconfigd_types.h | 152 const uint8_t * pkt; member in struct:__anon6950 160 DHCPv6PacketRef pkt; member in struct:__anon6951
|
/macosx-10.10/bootp-298/bootpd.tproj/ |
H A D | macNC.h | 83 boolean_t macNC_get_client_info(struct dhcp * pkt, int pkt_size,
|
/macosx-10.10/dcerpc-61/dcerpc/ncklib/ |
H A D | cnpkt.h | 98 #define RPC_CN_PKT_TRC(pkt)\ 102 rpc__cn_pkt_name(RPC_CN_PKT_PTYPE (pkt)),\ 103 RPC_CN_PKT_FLAGS (pkt),\ 104 RPC_CN_PKT_DREP (pkt)[0], \ 105 RPC_CN_PKT_DREP (pkt)[1], \ 106 RPC_CN_PKT_DREP (pkt)[2], \ 107 RPC_CN_PKT_DREP (pkt)[3], \ 108 RPC_CN_PKT_FRAG_LEN (pkt),\ 109 RPC_CN_PKT_AUTH_LEN (pkt),\ 110 RPC_CN_PKT_CALL_ID (pkt)));\ [all...] |
H A D | dgpkt.h | 169 rpc_dg_pkt_body_t pkt; member in struct:rpc_dg_pkt_pool_elt_t::__anon8326::__anon8327 173 rpc_dg_raw_pkt_t pkt; member in struct:rpc_dg_pkt_pool_elt_t::__anon8326::__anon8328 215 unsigned low_on_pkts: 1; /* T => pkt pool is low */ 261 rpc_dg_xmitq_elt_p_t /*pkt*/, 266 rpc_dg_recvq_elt_p_t /*pkt*/ 270 rpc_dg_recvq_elt_p_t /*pkt*/,
|
/macosx-10.10/bind9-45.101/bind9/bin/named/ |
H A D | lwdgnba.c | 126 client->pkt.recvlength = LWRES_RECVLENGTH; 127 client->pkt.authtype = 0; /* XXXMLG */ 128 client->pkt.authlength = 0; 129 client->pkt.result = LWRES_R_SUCCESS; 132 gnba, &client->pkt, &lwb); 220 b, &client->pkt, &req);
|
/macosx-10.10/ntp-92/ntpd/ |
H A D | ntp_monitor.c | 213 register struct pkt *pkt; local 223 pkt = &rbufp->recv_pkt; 227 mode = PKT_MODE(pkt->li_vn_mode); 244 md->version = PKT_VERSION(pkt->li_vn_mode); 338 md->version = PKT_VERSION(pkt->li_vn_mode);
|
/macosx-10.10/xnu-2782.1.97/bsd/kern/ |
H A D | netboot.c | 274 const void * pkt; local 281 pkt = IOBSDRegistryEntryGetData(entry, BSDP_RESPONSE, &pkt_len); 282 if (pkt != NULL && pkt_len >= (int)sizeof(struct dhcp)) { 286 pkt = IOBSDRegistryEntryGetData(entry, BOOTP_RESPONSE, 288 if (pkt != NULL && pkt_len >= (int)sizeof(struct dhcp)) { 292 if (pkt != NULL) { 298 reply = (const struct dhcp *)pkt; 486 const void * pkt; local 494 pkt = IOBSDRegistryEntryGetData(entry, DHCP_RESPONSE, &pkt_len); 495 if (pkt ! [all...] |
/macosx-10.10/ntp-92/sntp/ |
H A D | networking.c | 107 struct pkt *pkt, 115 pkt_output(pkt, len, stdout); 124 cc = sendto(rsock, (void *)pkt, len, 0, &dest->sa, SOCKLEN(dest)); 173 pkt_output((struct pkt *) rdata, recvc, stdout); 344 struct pkt *rpkt, 389 pkt_len = min(pkt_len, sizeof(struct pkt)); 524 struct pkt *rpkt, 525 struct pkt *spkt 585 pkt_len = min(pkt_len, sizeof(struct pkt)); 104 sendpkt( SOCKET rsock, sockaddr_u *dest, struct pkt *pkt, int len ) argument [all...] |