/barrelfish-master/lib/lwip2/src/netif/ppp/ |
H A D | demand.c | 146 struct packet *pkt, *nextpkt; local 156 for (pkt = pend_q; pkt != NULL; pkt = nextpkt) { 157 nextpkt = pkt->next; 158 free(pkt); 289 struct packet *pkt; local 299 pkt = (struct packet *) malloc(sizeof(struct packet) + len); 300 if (pkt != NULL) { 301 pkt 322 struct packet *pkt, *prev, *nextpkt; local [all...] |
H A D | chap-new.c | 94 unsigned char *pkt, int len); 101 unsigned char *pkt, int len); 103 unsigned char *pkt, int len); 105 static void chap_input(ppp_pcb *pcb, unsigned char *pkt, int pktlen); 283 unsigned char *pkt, int len) { 301 response = pkt; 302 GETCHAR(response_len, pkt); 304 name = (char *)pkt + response_len; 436 unsigned char *pkt, int len) { 454 if (len < 2 || len < pkt[ 282 chap_handle_response(ppp_pcb *pcb, int id, unsigned char *pkt, int len) argument 435 chap_respond(ppp_pcb *pcb, int id, unsigned char *pkt, int len) argument 497 chap_handle_status(ppp_pcb *pcb, int code, int id, unsigned char *pkt, int len) argument 535 chap_input(ppp_pcb *pcb, unsigned char *pkt, int pktlen) argument [all...] |
H A D | ecp.c | 90 static void ecp_input (int unit, u_char *pkt, int len); 94 static int ecp_printpkt (const u_char *pkt, int len, 99 static void ecp_datainput (int unit, u_char *pkt, int len);
|
H A D | ipv6cp.c | 271 static int ipv6_active_pkt(u_char *pkt, int len); 1513 static int ipv6_active_pkt(u_char *pkt, int len) { argument 1517 pkt += PPP_HDRLEN; 1520 if (get_ip6nh(pkt) == IP6_NHDR_FRAG) 1522 if (get_ip6nh(pkt) != IPPROTO_TCP) 1526 tcp = pkt + IP6_HDRLEN;
|
H A D | ipcp.c | 2393 ip_active_pkt(pkt, len) 2394 u_char *pkt; 2401 pkt += PPP_HDRLEN; 2404 if ((get_ipoff(pkt) & IP_OFFMASK) != 0) 2406 if (get_ipproto(pkt) != IPPROTO_TCP) 2408 hlen = get_iphl(pkt) * 4; 2411 tcp = pkt + hlen;
|
H A D | ccp.c | 173 static void ccp_input(ppp_pcb *pcb, u_char *pkt, int len); 179 static void ccp_datainput(ppp_pcb *pcb, u_char *pkt, int len); 1660 static void ccp_datainput(ppp_pcb *pcb, u_char *pkt, int len) { argument 1665 LWIP_UNUSED_ARG(pkt);
|
H A D | lcp.c | 220 static void lcp_addci(fsm *f, u_char *ucp, int *lenp); /* Add our CI to pkt */ 2716 u_char pkt[4], *pktp; local 2753 pktp = pkt; 2755 fsm_sdata(f, ECHOREQ, pcb->lcp_echo_number++, pkt, pktp - pkt);
|
/barrelfish-master/include/lwip2/netif/ppp/ |
H A D | demand.c | 146 struct packet *pkt, *nextpkt; local 156 for (pkt = pend_q; pkt != NULL; pkt = nextpkt) { 157 nextpkt = pkt->next; 158 free(pkt); 289 struct packet *pkt; local 299 pkt = (struct packet *) malloc(sizeof(struct packet) + len); 300 if (pkt != NULL) { 301 pkt 322 struct packet *pkt, *prev, *nextpkt; local [all...] |
H A D | chap-new.c | 94 unsigned char *pkt, int len); 101 unsigned char *pkt, int len); 103 unsigned char *pkt, int len); 105 static void chap_input(ppp_pcb *pcb, unsigned char *pkt, int pktlen); 283 unsigned char *pkt, int len) { 301 response = pkt; 302 GETCHAR(response_len, pkt); 304 name = (char *)pkt + response_len; 436 unsigned char *pkt, int len) { 454 if (len < 2 || len < pkt[ 282 chap_handle_response(ppp_pcb *pcb, int id, unsigned char *pkt, int len) argument 435 chap_respond(ppp_pcb *pcb, int id, unsigned char *pkt, int len) argument 497 chap_handle_status(ppp_pcb *pcb, int code, int id, unsigned char *pkt, int len) argument 535 chap_input(ppp_pcb *pcb, unsigned char *pkt, int pktlen) argument [all...] |
H A D | chap-new.h | 144 int (*check_success)(ppp_pcb *pcb, unsigned char *pkt, int len, unsigned char *priv); 145 void (*handle_failure)(ppp_pcb *pcb, unsigned char *pkt, int len);
|
H A D | ecp.c | 90 static void ecp_input (int unit, u_char *pkt, int len); 94 static int ecp_printpkt (const u_char *pkt, int len, 99 static void ecp_datainput (int unit, u_char *pkt, int len);
|
H A D | ppp_impl.h | 282 void (*input) (ppp_pcb *pcb, u_char *pkt, int len); 295 int (*printpkt) (const u_char *pkt, int len, 301 void (*datainput) (ppp_pcb *pcb, u_char *pkt, int len); 315 /* Say whether to bring up link for this pkt */ 316 int (*active_pkt) (u_char *pkt, int len);
|
H A D | ipv6cp.c | 271 static int ipv6_active_pkt(u_char *pkt, int len); 1513 static int ipv6_active_pkt(u_char *pkt, int len) { argument 1517 pkt += PPP_HDRLEN; 1520 if (get_ip6nh(pkt) == IP6_NHDR_FRAG) 1522 if (get_ip6nh(pkt) != IPPROTO_TCP) 1526 tcp = pkt + IP6_HDRLEN;
|
H A D | ipcp.c | 2393 ip_active_pkt(pkt, len) 2394 u_char *pkt; 2401 pkt += PPP_HDRLEN; 2404 if ((get_ipoff(pkt) & IP_OFFMASK) != 0) 2406 if (get_ipproto(pkt) != IPPROTO_TCP) 2408 hlen = get_iphl(pkt) * 4; 2411 tcp = pkt + hlen;
|
H A D | ccp.c | 173 static void ccp_input(ppp_pcb *pcb, u_char *pkt, int len); 179 static void ccp_datainput(ppp_pcb *pcb, u_char *pkt, int len); 1660 static void ccp_datainput(ppp_pcb *pcb, u_char *pkt, int len) { argument 1665 LWIP_UNUSED_ARG(pkt);
|
H A D | lcp.c | 220 static void lcp_addci(fsm *f, u_char *ucp, int *lenp); /* Add our CI to pkt */ 2716 u_char pkt[4], *pktp; local 2753 pktp = pkt; 2755 fsm_sdata(f, ECHOREQ, pcb->lcp_echo_number++, pkt, pktp - pkt);
|
/barrelfish-master/tools/tracing/ |
H A D | analyze_traces.py | 176 0X0004: "pkt processed", 177 0X0005: "pkt uploaded" 181 0X0006: "pkt entered app", 182 0X0007: "pkt processed app" 329 def print_packet(pkt): 333 c2t(pkt['PDIFF'])) 334 start = pkt['EL'][0]['TS'] 335 for e in pkt['EL']: 341 c2t(pkt['STOP'] - pkt['STAR [all...] |
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | s3_pkt.c | 134 unsigned char *pkt; local 159 pkt = rb->buf + rb->offset; 160 if (pkt[0] == SSL3_RT_APPLICATION_DATA 161 && (pkt[3]<<8|pkt[4]) >= 128) 170 memmove (rb->buf+align,pkt,left); 200 pkt = rb->buf+align; 204 if (s->packet != pkt) /* len > 0 */ 206 memmove(pkt, s->packet, len+left); 207 s->packet = pkt; [all...] |
/barrelfish-master/usr/tests/e10ktest/ |
H A D | subways.c | 379 uint64_t pkt; member in struct:send_packet_args 389 subways_binding->tx_vtbl.send(subways_binding, NOP_CONT, a->p, a->len, a->pkt); 534 args.pkt = (uint64_t)p;
|