Searched refs:packet (Results 1 - 25 of 39) sorted by relevance

12

/barrelfish-2018-10-04/include/
H A Darranet.h14 struct packet { struct
15 struct packet *next;
26 int recvfrom_arranet(int sockfd, void **buf, struct packet **p,
28 void arranet_recv_free(struct packet *p);
/barrelfish-2018-10-04/lib/net_queue_manager/
H A Dfrag.c63 static bool is_fragmented(void *packet, size_t len) argument
68 if ((((uint8_t *) packet)[IP_MAGIC_OFFSET] != IP_MAGIC_1) ||
69 (((uint8_t *) packet)[IP_MAGIC_OFFSET + 1] != IP_MAGIC_2)) {
74 ((uint8_t *) packet)[IP_OPTIONS_OFFSET];
86 static uint64_t get_ip_id(void *packet, size_t len) argument
93 id = (uint64_t) (((uint8_t *) packet)[IP_ID_OFFSET]);
95 id |= (uint64_t) (((uint8_t *) packet)[IP_ID_OFFSET + 1]);
103 // this assumes that the packet is fragmented
104 static bool has_headers(void *packet, size_t len) argument
110 ((uint8_t *) packet)[FRAGMENT_OFFSET_OFFSE
118 add_packet_to_fragment_list(void *packet, size_t len, uint64_t ip_id, uint64_t flags) argument
193 struct ip_packet *packet = frag_packets, *prev_packet = NULL; local
212 handle_fragmented_packet(void *packet, size_t len, uint64_t flags) argument
[all...]
H A Dnet_soft_filters_srv_impl.c579 ETHERSRV_DEBUG("### Sending the ARP packet to all, %"PRIx64" \n", len);
622 // received a corrupted packet.
731 // Checks if packet belongs to specific application and sends to it
732 static bool handle_application_packet(void *packet, size_t len, uint64_t flags) argument
737 struct filter *filter = execute_filters(packet, len);
747 (uint32_t) ((uintptr_t) packet));
751 // Matching filter found, sending packet to application
759 // printf("packet for application arrived!!\n");
782 // memcpy_fast(bd->pkt_data, packet, len);
795 (uint32_t) ((uintptr_t) packet));
826 handle_arp_packet(void *packet, size_t len, uint64_t flags) argument
848 handle_netd_packet(void *packet, size_t len, uint64_t flags) argument
[all...]
/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/drivers/infiniband/core/
H A Duser_mad.c54 MODULE_DESCRIPTION("InfiniBand userspace MAD packet access");
166 struct ib_umad_packet *packet)
172 for (packet->mad.hdr.id = 0;
173 packet->mad.hdr.id < IB_UMAD_MAX_AGENTS;
174 packet->mad.hdr.id++)
175 if (agent == __get_agent(file, packet->mad.hdr.id)) {
176 list_add_tail(&packet->list, &file->recv_list);
189 struct ib_umad_packet *packet)
192 list_del(&packet->list);
200 struct ib_umad_packet *packet local
164 queue_packet(struct ib_umad_file *file, struct ib_mad_agent *agent, struct ib_umad_packet *packet) argument
188 dequeue_send(struct ib_umad_file *file, struct ib_umad_packet *packet) argument
219 struct ib_umad_packet *packet; local
263 copy_recv_mad(struct ib_umad_file *file, char __user *buf, struct ib_umad_packet *packet, size_t count) argument
313 copy_send_mad(struct ib_umad_file *file, char __user *buf, struct ib_umad_packet *packet, size_t count) argument
336 struct ib_umad_packet *packet; local
412 is_duplicate(struct ib_umad_file *file, struct ib_umad_packet *packet) argument
449 struct ib_umad_packet *packet; local
842 struct ib_umad_packet *packet, *tmp; local
[all...]
/barrelfish-2018-10-04/lib/arranet/
H A Dinet_chksum.h78 u16_t inet_chksum_pseudo(struct packet *p,
81 u16_t inet_chksum_pseudo_partial(struct packet *p,
H A Dinet_chksum.c272 inet_chksum_pseudo(struct packet *p,
278 struct packet *q;
332 inet_chksum_pseudo_partial(struct packet *p,
338 struct packet *q;
H A Darranet.c136 static struct packet rx_packets[MAX_PACKETS];
142 static struct packet *inpkt = NULL;
148 static int lwip_send_time[POSIX_TRANSA]; // Time until packet was delivered to network interface
150 int posix_recv_time[POSIX_TRANSA]; // Time until packet at exit of recvfrom
152 static int posix_send_time[POSIX_TRANSA]; // Time until packet at entry to sendto
155 int memcache_times[20][POSIX_TRANSA]; // Time until packet was delivered to network interface
632 static struct packet tx_packets[MAX_PACKETS];
639 static void packet_output(struct packet *p)
659 for (struct packet *q = p; q != NULL; q = q->next) {
791 void arranet_recv_free(struct packet *
[all...]
/barrelfish-2018-10-04/usr/tests/e10ktest/
H A De10ktest_latencies.c39 struct packet { struct
45 static struct packet rx_packets[MAX_PACKETS], tx_packets[MAX_PACKETS];
68 static struct packet *get_tx_packet(void)
71 struct packet *p = &tx_packets[idx];
73 // Busy-wait until packet not in flight
82 static void packet_output(struct packet *p)
136 struct packet *p = buffer->opaque;
141 /* printf("Incoming packet\n"); */
162 /* printf("Is an ARP packet\n"); */
183 struct packet *out
[all...]
H A De10ktest.c108 static struct packet rx_packets[MAX_PACKETS];
187 static struct packet tx_packets[MAX_PACKETS];
194 static void packet_output(struct packet *p)
199 for (struct packet *q = p; q != NULL; q = q->next) {
328 static struct packet *get_tx_packet(void)
330 struct packet *p = &tx_packets[tx_idx];
332 // Busy-wait until packet not in flight
351 struct packet *p = buffer->opaque;
356 /* printf("Incoming packet\n"); */
386 struct packet out
[all...]
H A Dsubways.c124 static struct packet rx_packets[MAX_PACKETS];
208 static struct packet tx_packets[MAX_PACKETS];
215 static void packet_output(struct packet *p)
220 for (struct packet *q = p; q != NULL; q = q->next) {
307 printf("Using VT-d to send this packet\n");
354 static struct packet *get_tx_packet(void)
356 struct packet *p = &tx_packets[tx_idx];
358 // Busy-wait until packet not in flight
386 printf("Sending packet finally\n");
398 struct packet *
[all...]
/barrelfish-2018-10-04/lib/openssl-1.0.0d/ssl/
H A Ds23_srvr.c264 p=s->packet;
402 p=s->packet;
416 ssl3_finish_mac(s, s->packet+2, s->packet_length-2);
418 s->msg_callback(0, SSL2_VERSION, 0, s->packet+2, s->packet_length-2, s, s->msg_callback_arg); /* CLIENT-HELLO */
420 p=s->packet;
474 while (p < s->packet+s->packet_length)
530 s->packet= &(s->s2->rbuf[0]);
531 memcpy(s->packet,buf,n);
559 s->packet= &(s->s3->rbuf.buf[0]);
560 memcpy(s->packet,bu
[all...]
H A Ds23_pkt.c100 p=s->packet;
H A Ddtls1.h223 unsigned int mtu; /* max DTLS packet size */
250 unsigned char *packet; member in struct:dtls1_record_data_st
H A Ds23_clnt.c535 p=s->packet;
598 s->packet= &(s->s2->rbuf[0]);
599 memcpy(s->packet,buf,n);
674 s->packet= &(s->s3->rbuf.buf[0]);
675 memcpy(s->packet,buf,n);
H A Ds2_pkt.c182 p=s->packet;
199 p=s->packet;
229 p= &(s->packet[2]);
283 /* Possibly the packet that we just read had 0 actual data bytes.
332 s->packet= &(s->s2->rbuf[s->s2->rbuf_offs]);
354 if (s->packet != s->s2->rbuf)
355 memcpy(s->s2->rbuf,s->packet,
373 s->packet=s->s2->rbuf;
H A Dd1_pkt.c195 s->packet = rdata->packet;
201 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6);
228 rdata->packet = s->packet;
243 s->packet = NULL;
351 s->packet = rdata->packet;
384 * and we have that many bytes in s->packet
386 rr->input= &(s->packet[DTLS1_RT_HEADER_LENGT
[all...]
H A Ds3_pkt.c125 /* If extend == 0, obtain new n-byte packet; if extend == 1, increase
126 * packet by another n bytes.
127 * The packet will be in the sub-array of s->s3->rbuf.buf specified
128 * by s->packet and s->packet_length.
152 /* start with empty packet ... */
157 /* check if next packet length is large
163 /* Note that even if packet is corrupted
174 s->packet = rb->buf + rb->offset;
180 * because the read operation returns the whole packet
202 * 'len' bytes already pointed to by 'packet',
[all...]
/barrelfish-2018-10-04/lib/libc/resolv/
H A Dres_update.c59 * Create a dynamic update packet for each zone and send it to the
100 u_char *packet; local
106 packet = malloc(NS_MAXMSG);
107 if (packet == NULL) {
163 packet, NS_MAXMSG);
179 n = res_nsendsigned(statp, packet, n, key,
183 n = res_nsend(statp, packet, n, answer, sizeof answer);
207 free(packet);
/barrelfish-2018-10-04/lib/lwip/src/netif/
H A Dethernetif.c107 * This function should do the actual transmission of the packet. The packet is
112 * @param p the MAC packet to send (e.g. IP packet including MAC addresses and type)
113 * @return ERR_OK if the packet could be sent
114 * an err_t value if the packet couldn't be sent
118 * to become availale since the stack doesn't retry to send a packet
140 signal that packet should be sent();
153 * packet from the interface into the pbuf.
156 * @return a pbuf filled with the received packet (includin
[all...]
/barrelfish-2018-10-04/lib/lwip2/src/netif/ppp/
H A Ddemand.c68 struct packet { struct
70 struct packet *next;
74 struct packet *pend_q;
75 struct packet *pend_qtail;
146 struct packet *pkt, *nextpkt;
281 * We apply the active_filter to see if we want this packet to
289 struct packet *pkt;
299 pkt = (struct packet *) malloc(sizeof(struct packet) + len);
322 struct packet *pk
[all...]
/barrelfish-2018-10-04/include/lwip2/netif/ppp/
H A Ddemand.c68 struct packet { struct
70 struct packet *next;
74 struct packet *pend_q;
75 struct packet *pend_qtail;
146 struct packet *pkt, *nextpkt;
281 * We apply the active_filter to see if we want this packet to
289 struct packet *pkt;
299 pkt = (struct packet *) malloc(sizeof(struct packet) + len);
322 struct packet *pk
[all...]
/barrelfish-2018-10-04/lib/lwip2/src/netif/
H A Dethernetif.c121 * This function should do the actual transmission of the packet. The packet is
126 * @param p the MAC packet to send (e.g. IP packet including MAC addresses and type)
127 * @return ERR_OK if the packet could be sent
128 * an err_t value if the packet couldn't be sent
132 * to become available since the stack doesn't retry to send a packet
155 signal that packet should be sent();
159 /* broadcast or multicast packet*/
162 /* unicast packet */
[all...]
/barrelfish-2018-10-04/include/openssl/
H A Ddtls1.h223 unsigned int mtu; /* max DTLS packet size */
250 unsigned char *packet; member in struct:dtls1_record_data_st
/barrelfish-2018-10-04/lib/lwip/src/barrelfish/
H A Didc_barrelfish.h79 uint64_t idc_get_next_packet(uint8_t * packet);
/barrelfish-2018-10-04/include/net_queue_manager/
H A Dnet_queue_manager.h122 #define MAX_CHUNKS 5 // Max no. of allowed chunks for single packet
131 /* Following two are used by packet transmit logic */
141 // Place to store data when there are multiple parts to the packet
241 bool handle_fragmented_packet(void* packet, size_t len, uint64_t flags);

Completed in 109 milliseconds

12