Searched refs:pkt (Results 1 - 19 of 19) sorted by relevance

/barrelfish-master/lib/lwip2/src/netif/ppp/
H A Ddemand.c146 struct packet *pkt, *nextpkt; local
156 for (pkt = pend_q; pkt != NULL; pkt = nextpkt) {
157 nextpkt = pkt->next;
158 free(pkt);
289 struct packet *pkt; local
299 pkt = (struct packet *) malloc(sizeof(struct packet) + len);
300 if (pkt != NULL) {
301 pkt
322 struct packet *pkt, *prev, *nextpkt; local
[all...]
H A Dchap-new.c94 unsigned char *pkt, int len);
101 unsigned char *pkt, int len);
103 unsigned char *pkt, int len);
105 static void chap_input(ppp_pcb *pcb, unsigned char *pkt, int pktlen);
283 unsigned char *pkt, int len) {
301 response = pkt;
302 GETCHAR(response_len, pkt);
304 name = (char *)pkt + response_len;
436 unsigned char *pkt, int len) {
454 if (len < 2 || len < pkt[
282 chap_handle_response(ppp_pcb *pcb, int id, unsigned char *pkt, int len) argument
435 chap_respond(ppp_pcb *pcb, int id, unsigned char *pkt, int len) argument
497 chap_handle_status(ppp_pcb *pcb, int code, int id, unsigned char *pkt, int len) argument
535 chap_input(ppp_pcb *pcb, unsigned char *pkt, int pktlen) argument
[all...]
H A Decp.c90 static void ecp_input (int unit, u_char *pkt, int len);
94 static int ecp_printpkt (const u_char *pkt, int len,
99 static void ecp_datainput (int unit, u_char *pkt, int len);
H A Dipv6cp.c271 static int ipv6_active_pkt(u_char *pkt, int len);
1513 static int ipv6_active_pkt(u_char *pkt, int len) { argument
1517 pkt += PPP_HDRLEN;
1520 if (get_ip6nh(pkt) == IP6_NHDR_FRAG)
1522 if (get_ip6nh(pkt) != IPPROTO_TCP)
1526 tcp = pkt + IP6_HDRLEN;
H A Dipcp.c2393 ip_active_pkt(pkt, len)
2394 u_char *pkt;
2401 pkt += PPP_HDRLEN;
2404 if ((get_ipoff(pkt) & IP_OFFMASK) != 0)
2406 if (get_ipproto(pkt) != IPPROTO_TCP)
2408 hlen = get_iphl(pkt) * 4;
2411 tcp = pkt + hlen;
H A Dccp.c173 static void ccp_input(ppp_pcb *pcb, u_char *pkt, int len);
179 static void ccp_datainput(ppp_pcb *pcb, u_char *pkt, int len);
1660 static void ccp_datainput(ppp_pcb *pcb, u_char *pkt, int len) { argument
1665 LWIP_UNUSED_ARG(pkt);
H A Dlcp.c220 static void lcp_addci(fsm *f, u_char *ucp, int *lenp); /* Add our CI to pkt */
2716 u_char pkt[4], *pktp; local
2753 pktp = pkt;
2755 fsm_sdata(f, ECHOREQ, pcb->lcp_echo_number++, pkt, pktp - pkt);
/barrelfish-master/include/lwip2/netif/ppp/
H A Ddemand.c146 struct packet *pkt, *nextpkt; local
156 for (pkt = pend_q; pkt != NULL; pkt = nextpkt) {
157 nextpkt = pkt->next;
158 free(pkt);
289 struct packet *pkt; local
299 pkt = (struct packet *) malloc(sizeof(struct packet) + len);
300 if (pkt != NULL) {
301 pkt
322 struct packet *pkt, *prev, *nextpkt; local
[all...]
H A Dchap-new.c94 unsigned char *pkt, int len);
101 unsigned char *pkt, int len);
103 unsigned char *pkt, int len);
105 static void chap_input(ppp_pcb *pcb, unsigned char *pkt, int pktlen);
283 unsigned char *pkt, int len) {
301 response = pkt;
302 GETCHAR(response_len, pkt);
304 name = (char *)pkt + response_len;
436 unsigned char *pkt, int len) {
454 if (len < 2 || len < pkt[
282 chap_handle_response(ppp_pcb *pcb, int id, unsigned char *pkt, int len) argument
435 chap_respond(ppp_pcb *pcb, int id, unsigned char *pkt, int len) argument
497 chap_handle_status(ppp_pcb *pcb, int code, int id, unsigned char *pkt, int len) argument
535 chap_input(ppp_pcb *pcb, unsigned char *pkt, int pktlen) argument
[all...]
H A Dchap-new.h144 int (*check_success)(ppp_pcb *pcb, unsigned char *pkt, int len, unsigned char *priv);
145 void (*handle_failure)(ppp_pcb *pcb, unsigned char *pkt, int len);
H A Decp.c90 static void ecp_input (int unit, u_char *pkt, int len);
94 static int ecp_printpkt (const u_char *pkt, int len,
99 static void ecp_datainput (int unit, u_char *pkt, int len);
H A Dppp_impl.h282 void (*input) (ppp_pcb *pcb, u_char *pkt, int len);
295 int (*printpkt) (const u_char *pkt, int len,
301 void (*datainput) (ppp_pcb *pcb, u_char *pkt, int len);
315 /* Say whether to bring up link for this pkt */
316 int (*active_pkt) (u_char *pkt, int len);
H A Dipv6cp.c271 static int ipv6_active_pkt(u_char *pkt, int len);
1513 static int ipv6_active_pkt(u_char *pkt, int len) { argument
1517 pkt += PPP_HDRLEN;
1520 if (get_ip6nh(pkt) == IP6_NHDR_FRAG)
1522 if (get_ip6nh(pkt) != IPPROTO_TCP)
1526 tcp = pkt + IP6_HDRLEN;
H A Dipcp.c2393 ip_active_pkt(pkt, len)
2394 u_char *pkt;
2401 pkt += PPP_HDRLEN;
2404 if ((get_ipoff(pkt) & IP_OFFMASK) != 0)
2406 if (get_ipproto(pkt) != IPPROTO_TCP)
2408 hlen = get_iphl(pkt) * 4;
2411 tcp = pkt + hlen;
H A Dccp.c173 static void ccp_input(ppp_pcb *pcb, u_char *pkt, int len);
179 static void ccp_datainput(ppp_pcb *pcb, u_char *pkt, int len);
1660 static void ccp_datainput(ppp_pcb *pcb, u_char *pkt, int len) { argument
1665 LWIP_UNUSED_ARG(pkt);
H A Dlcp.c220 static void lcp_addci(fsm *f, u_char *ucp, int *lenp); /* Add our CI to pkt */
2716 u_char pkt[4], *pktp; local
2753 pktp = pkt;
2755 fsm_sdata(f, ECHOREQ, pcb->lcp_echo_number++, pkt, pktp - pkt);
/barrelfish-master/tools/tracing/
H A Danalyze_traces.py176 0X0004: "pkt processed",
177 0X0005: "pkt uploaded"
181 0X0006: "pkt entered app",
182 0X0007: "pkt processed app"
329 def print_packet(pkt):
333 c2t(pkt['PDIFF']))
334 start = pkt['EL'][0]['TS']
335 for e in pkt['EL']:
341 c2t(pkt['STOP'] - pkt['STAR
[all...]
/barrelfish-master/lib/openssl-1.0.0d/ssl/
H A Ds3_pkt.c134 unsigned char *pkt; local
159 pkt = rb->buf + rb->offset;
160 if (pkt[0] == SSL3_RT_APPLICATION_DATA
161 && (pkt[3]<<8|pkt[4]) >= 128)
170 memmove (rb->buf+align,pkt,left);
200 pkt = rb->buf+align;
204 if (s->packet != pkt) /* len > 0 */
206 memmove(pkt, s->packet, len+left);
207 s->packet = pkt;
[all...]
/barrelfish-master/usr/tests/e10ktest/
H A Dsubways.c379 uint64_t pkt; member in struct:send_packet_args
389 subways_binding->tx_vtbl.send(subways_binding, NOP_CONT, a->p, a->len, a->pkt);
534 args.pkt = (uint64_t)p;

Completed in 262 milliseconds