/barrelfish-2018-10-04/include/ |
H A D | arranet.h | 14 struct packet { struct 15 struct packet *next; 26 int recvfrom_arranet(int sockfd, void **buf, struct packet **p, 28 void arranet_recv_free(struct packet *p);
|
/barrelfish-2018-10-04/lib/net_queue_manager/ |
H A D | frag.c | 63 static bool is_fragmented(void *packet, size_t len) argument 68 if ((((uint8_t *) packet)[IP_MAGIC_OFFSET] != IP_MAGIC_1) || 69 (((uint8_t *) packet)[IP_MAGIC_OFFSET + 1] != IP_MAGIC_2)) { 74 ((uint8_t *) packet)[IP_OPTIONS_OFFSET]; 86 static uint64_t get_ip_id(void *packet, size_t len) argument 93 id = (uint64_t) (((uint8_t *) packet)[IP_ID_OFFSET]); 95 id |= (uint64_t) (((uint8_t *) packet)[IP_ID_OFFSET + 1]); 103 // this assumes that the packet is fragmented 104 static bool has_headers(void *packet, size_t len) argument 110 ((uint8_t *) packet)[FRAGMENT_OFFSET_OFFSE 118 add_packet_to_fragment_list(void *packet, size_t len, uint64_t ip_id, uint64_t flags) argument 193 struct ip_packet *packet = frag_packets, *prev_packet = NULL; local 212 handle_fragmented_packet(void *packet, size_t len, uint64_t flags) argument [all...] |
H A D | net_soft_filters_srv_impl.c | 579 ETHERSRV_DEBUG("### Sending the ARP packet to all, %"PRIx64" \n", len); 622 // received a corrupted packet. 731 // Checks if packet belongs to specific application and sends to it 732 static bool handle_application_packet(void *packet, size_t len, uint64_t flags) argument 737 struct filter *filter = execute_filters(packet, len); 747 (uint32_t) ((uintptr_t) packet)); 751 // Matching filter found, sending packet to application 759 // printf("packet for application arrived!!\n"); 782 // memcpy_fast(bd->pkt_data, packet, len); 795 (uint32_t) ((uintptr_t) packet)); 826 handle_arp_packet(void *packet, size_t len, uint64_t flags) argument 848 handle_netd_packet(void *packet, size_t len, uint64_t flags) argument [all...] |
/barrelfish-2018-10-04/lib/devif/backends/net/mlx4/drivers/infiniband/core/ |
H A D | user_mad.c | 54 MODULE_DESCRIPTION("InfiniBand userspace MAD packet access"); 166 struct ib_umad_packet *packet) 172 for (packet->mad.hdr.id = 0; 173 packet->mad.hdr.id < IB_UMAD_MAX_AGENTS; 174 packet->mad.hdr.id++) 175 if (agent == __get_agent(file, packet->mad.hdr.id)) { 176 list_add_tail(&packet->list, &file->recv_list); 189 struct ib_umad_packet *packet) 192 list_del(&packet->list); 200 struct ib_umad_packet *packet local 164 queue_packet(struct ib_umad_file *file, struct ib_mad_agent *agent, struct ib_umad_packet *packet) argument 188 dequeue_send(struct ib_umad_file *file, struct ib_umad_packet *packet) argument 219 struct ib_umad_packet *packet; local 263 copy_recv_mad(struct ib_umad_file *file, char __user *buf, struct ib_umad_packet *packet, size_t count) argument 313 copy_send_mad(struct ib_umad_file *file, char __user *buf, struct ib_umad_packet *packet, size_t count) argument 336 struct ib_umad_packet *packet; local 412 is_duplicate(struct ib_umad_file *file, struct ib_umad_packet *packet) argument 449 struct ib_umad_packet *packet; local 842 struct ib_umad_packet *packet, *tmp; local [all...] |
/barrelfish-2018-10-04/lib/arranet/ |
H A D | inet_chksum.h | 78 u16_t inet_chksum_pseudo(struct packet *p, 81 u16_t inet_chksum_pseudo_partial(struct packet *p,
|
H A D | inet_chksum.c | 272 inet_chksum_pseudo(struct packet *p, 278 struct packet *q; 332 inet_chksum_pseudo_partial(struct packet *p, 338 struct packet *q;
|
H A D | arranet.c | 136 static struct packet rx_packets[MAX_PACKETS]; 142 static struct packet *inpkt = NULL; 148 static int lwip_send_time[POSIX_TRANSA]; // Time until packet was delivered to network interface 150 int posix_recv_time[POSIX_TRANSA]; // Time until packet at exit of recvfrom 152 static int posix_send_time[POSIX_TRANSA]; // Time until packet at entry to sendto 155 int memcache_times[20][POSIX_TRANSA]; // Time until packet was delivered to network interface 632 static struct packet tx_packets[MAX_PACKETS]; 639 static void packet_output(struct packet *p) 659 for (struct packet *q = p; q != NULL; q = q->next) { 791 void arranet_recv_free(struct packet * [all...] |
/barrelfish-2018-10-04/usr/tests/e10ktest/ |
H A D | e10ktest_latencies.c | 39 struct packet { struct 45 static struct packet rx_packets[MAX_PACKETS], tx_packets[MAX_PACKETS]; 68 static struct packet *get_tx_packet(void) 71 struct packet *p = &tx_packets[idx]; 73 // Busy-wait until packet not in flight 82 static void packet_output(struct packet *p) 136 struct packet *p = buffer->opaque; 141 /* printf("Incoming packet\n"); */ 162 /* printf("Is an ARP packet\n"); */ 183 struct packet *out [all...] |
H A D | e10ktest.c | 108 static struct packet rx_packets[MAX_PACKETS]; 187 static struct packet tx_packets[MAX_PACKETS]; 194 static void packet_output(struct packet *p) 199 for (struct packet *q = p; q != NULL; q = q->next) { 328 static struct packet *get_tx_packet(void) 330 struct packet *p = &tx_packets[tx_idx]; 332 // Busy-wait until packet not in flight 351 struct packet *p = buffer->opaque; 356 /* printf("Incoming packet\n"); */ 386 struct packet out [all...] |
H A D | subways.c | 124 static struct packet rx_packets[MAX_PACKETS]; 208 static struct packet tx_packets[MAX_PACKETS]; 215 static void packet_output(struct packet *p) 220 for (struct packet *q = p; q != NULL; q = q->next) { 307 printf("Using VT-d to send this packet\n"); 354 static struct packet *get_tx_packet(void) 356 struct packet *p = &tx_packets[tx_idx]; 358 // Busy-wait until packet not in flight 386 printf("Sending packet finally\n"); 398 struct packet * [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/ssl/ |
H A D | s23_srvr.c | 264 p=s->packet; 402 p=s->packet; 416 ssl3_finish_mac(s, s->packet+2, s->packet_length-2); 418 s->msg_callback(0, SSL2_VERSION, 0, s->packet+2, s->packet_length-2, s, s->msg_callback_arg); /* CLIENT-HELLO */ 420 p=s->packet; 474 while (p < s->packet+s->packet_length) 530 s->packet= &(s->s2->rbuf[0]); 531 memcpy(s->packet,buf,n); 559 s->packet= &(s->s3->rbuf.buf[0]); 560 memcpy(s->packet,bu [all...] |
H A D | s23_pkt.c | 100 p=s->packet;
|
H A D | dtls1.h | 223 unsigned int mtu; /* max DTLS packet size */ 250 unsigned char *packet; member in struct:dtls1_record_data_st
|
H A D | s23_clnt.c | 535 p=s->packet; 598 s->packet= &(s->s2->rbuf[0]); 599 memcpy(s->packet,buf,n); 674 s->packet= &(s->s3->rbuf.buf[0]); 675 memcpy(s->packet,buf,n);
|
H A D | s2_pkt.c | 182 p=s->packet; 199 p=s->packet; 229 p= &(s->packet[2]); 283 /* Possibly the packet that we just read had 0 actual data bytes. 332 s->packet= &(s->s2->rbuf[s->s2->rbuf_offs]); 354 if (s->packet != s->s2->rbuf) 355 memcpy(s->s2->rbuf,s->packet, 373 s->packet=s->s2->rbuf;
|
H A D | d1_pkt.c | 195 s->packet = rdata->packet; 201 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6); 228 rdata->packet = s->packet; 243 s->packet = NULL; 351 s->packet = rdata->packet; 384 * and we have that many bytes in s->packet 386 rr->input= &(s->packet[DTLS1_RT_HEADER_LENGT [all...] |
H A D | s3_pkt.c | 125 /* If extend == 0, obtain new n-byte packet; if extend == 1, increase 126 * packet by another n bytes. 127 * The packet will be in the sub-array of s->s3->rbuf.buf specified 128 * by s->packet and s->packet_length. 152 /* start with empty packet ... */ 157 /* check if next packet length is large 163 /* Note that even if packet is corrupted 174 s->packet = rb->buf + rb->offset; 180 * because the read operation returns the whole packet 202 * 'len' bytes already pointed to by 'packet', [all...] |
/barrelfish-2018-10-04/lib/libc/resolv/ |
H A D | res_update.c | 59 * Create a dynamic update packet for each zone and send it to the 100 u_char *packet; local 106 packet = malloc(NS_MAXMSG); 107 if (packet == NULL) { 163 packet, NS_MAXMSG); 179 n = res_nsendsigned(statp, packet, n, key, 183 n = res_nsend(statp, packet, n, answer, sizeof answer); 207 free(packet);
|
/barrelfish-2018-10-04/lib/lwip/src/netif/ |
H A D | ethernetif.c | 107 * This function should do the actual transmission of the packet. The packet is 112 * @param p the MAC packet to send (e.g. IP packet including MAC addresses and type) 113 * @return ERR_OK if the packet could be sent 114 * an err_t value if the packet couldn't be sent 118 * to become availale since the stack doesn't retry to send a packet 140 signal that packet should be sent(); 153 * packet from the interface into the pbuf. 156 * @return a pbuf filled with the received packet (includin [all...] |
/barrelfish-2018-10-04/lib/lwip2/src/netif/ppp/ |
H A D | demand.c | 68 struct packet { struct 70 struct packet *next; 74 struct packet *pend_q; 75 struct packet *pend_qtail; 146 struct packet *pkt, *nextpkt; 281 * We apply the active_filter to see if we want this packet to 289 struct packet *pkt; 299 pkt = (struct packet *) malloc(sizeof(struct packet) + len); 322 struct packet *pk [all...] |
/barrelfish-2018-10-04/include/lwip2/netif/ppp/ |
H A D | demand.c | 68 struct packet { struct 70 struct packet *next; 74 struct packet *pend_q; 75 struct packet *pend_qtail; 146 struct packet *pkt, *nextpkt; 281 * We apply the active_filter to see if we want this packet to 289 struct packet *pkt; 299 pkt = (struct packet *) malloc(sizeof(struct packet) + len); 322 struct packet *pk [all...] |
/barrelfish-2018-10-04/lib/lwip2/src/netif/ |
H A D | ethernetif.c | 121 * This function should do the actual transmission of the packet. The packet is 126 * @param p the MAC packet to send (e.g. IP packet including MAC addresses and type) 127 * @return ERR_OK if the packet could be sent 128 * an err_t value if the packet couldn't be sent 132 * to become available since the stack doesn't retry to send a packet 155 signal that packet should be sent(); 159 /* broadcast or multicast packet*/ 162 /* unicast packet */ [all...] |
/barrelfish-2018-10-04/include/openssl/ |
H A D | dtls1.h | 223 unsigned int mtu; /* max DTLS packet size */ 250 unsigned char *packet; member in struct:dtls1_record_data_st
|
/barrelfish-2018-10-04/lib/lwip/src/barrelfish/ |
H A D | idc_barrelfish.h | 79 uint64_t idc_get_next_packet(uint8_t * packet);
|
/barrelfish-2018-10-04/include/net_queue_manager/ |
H A D | net_queue_manager.h | 122 #define MAX_CHUNKS 5 // Max no. of allowed chunks for single packet 131 /* Following two are used by packet transmit logic */ 141 // Place to store data when there are multiple parts to the packet 241 bool handle_fragmented_packet(void* packet, size_t len, uint64_t flags);
|