Searched refs:packet (Results 1 - 17 of 17) sorted by relevance

/darwin-on-arm/xnu/bsd/net/
H A Dif_ether.h45 errno_t ether_demux(ifnet_t interface, mbuf_t packet, char* header,
51 errno_t ether_frameout(ifnet_t interface, mbuf_t *packet,
H A Dkpi_protocol.h52 @discussion protocol_input_handler is called to input a packet. If
55 @pararm protocol The protocol this packet is intended for.
56 @param packet The packet that should be input.
58 typedef void (*proto_input_handler)(protocol_family_t protocol, mbuf_t packet);
73 packet for a protocol is received.
76 @param input The function called when a packet is input.
77 @param chains Input function supports packet chains.
94 @param input The function called when a packet is input.
95 @param inject The function to called when a packet i
[all...]
H A Dkpi_protocol.c251 mbuf_t packet; local
253 for (packet = packet_list;
254 packet != NULL;
255 packet = packet_list) {
257 mbuf_nextpkt(packet);
258 mbuf_setnextpkt(packet, NULL);
260 packet);
292 mbuf_t packet; local
294 for (packet = packet_list; packet !
[all...]
H A Dether_inet6_pr_module.c105 * Process a received Ethernet packet;
106 * the packet is in the mbuf chain m without
111 mbuf_t packet, char *header)
123 * since the packet could have been injected via
125 * different than the one where the packet really
128 mifp = mbuf_pkthdr_rcvif(packet);
137 if (proto_input(protocol, packet) != 0)
138 m_freem(packet);
140 m_freem(packet);
157 * Tell ether_frameout it's ok to loop packet i
110 ether_inet6_input(ifnet_t ifp, protocol_family_t protocol, mbuf_t packet, char *header) argument
[all...]
H A Dkpi_interface.h165 clusters. In this case, the data area of a packet in the
168 and the packet size. Such a use of larger than system page
226 @param data The packet to be transmitted or received.
240 @param data The packet to be sent.
289 @discussion ifnet_demux_func is called for each inbound packet to
290 determine which protocol family the packet belongs to. This
292 protocol to pass the packet to. This function may return
295 packet will be discarded.
296 @param interface The interface the packet was received on.
297 @param packet Th
[all...]
H A Dbpf.h32 * This code is derived from the Stanford/CMU enet packet filter,
204 * Structure prepended to each packet.
209 bpf_u_int32 bh_datalen; /* original length of packet */
230 bpf_u_int32 bh_datalen; /* original length of packet */
515 used to send a raw packet on the interface. The mbuf and data
518 @param interface The interface the packet is being sent on.
520 @param packet The packet to be sent.
523 mbuf_t packet);
579 packet
[all...]
H A Dif_utun.c74 static errno_t utun_framer(ifnet_t interface, mbuf_t *packet,
94 mbuf_t *packet, const struct sockaddr *dest, void *route,
664 mbuf_t *packet,
675 if (mbuf_prepend(packet, sizeof(protocol_family_t), MBUF_DONTWAIT) != 0) {
689 *(protocol_family_t *)mbuf_data(*packet) = htonl(*(protocol_family_t *)(uintptr_t)(size_t)frame_type);
779 __unused mbuf_t *packet,
662 utun_framer( __unused ifnet_t interface, mbuf_t *packet, __unused const struct sockaddr *dest, __unused const char *desk_linkaddr, const char *frame_type , u_int32_t *prepend_len, u_int32_t *postpend_len ) argument
776 utun_proto_pre_output( __unused ifnet_t interface, protocol_family_t protocol, __unused mbuf_t *packet, __unused const struct sockaddr *dest, __unused void *route, __unused char *frame_type, __unused char *link_layer_dest) argument
H A Ddlil.c440 /* sanity checking of input packet lists received */
1254 /* Initialize the packet filter */
1261 /* Initialize packet schedulers */
1472 * d) packet injections
1575 * the corresponding input thread where the packet arrived
1663 * the corresponding input thread where the packet arrived
1931 * Drop the packet(s) if the parameters are invalid, or if the
1984 panic_plain("%s: invalid input packet chain for %s%d, "
1990 * Assert packet count only for the extended variant, for backwards
1997 panic_plain("%s: input packet coun
4187 ifproto_media_input_v1(struct ifnet *ifp, protocol_family_t protocol, struct mbuf *packet, char *header) argument
4195 ifproto_media_input_v2(struct ifnet *ifp, protocol_family_t protocol, struct mbuf *packet) argument
4204 ifproto_media_preout(struct ifnet *ifp, protocol_family_t protocol, mbuf_t *packet, const struct sockaddr *dest, void *route, char *frame_type, char *link_layer_dest) argument
[all...]
H A Dif_bridge.c1217 * see if the packet has been checksummed already (I think)
1620 /* Adjust packet back to original */
1743 __unused mbuf_t packet, __unused char *header)
1745 printf("%s: unexpected packet from %s%d\n", __func__,
2886 * Enqueue a packet on a bridge member interface.
2917 * then attach a packet tag that holds it.
2960 * Receive a queued packet from dummynet and pass it on to the output
2973 * The packet didnt originate from a member interface. This should only
3037 * If the packet is an 802.1X ethertype, then only send on the
3047 * go ahead and send out that interface. Otherwise, the packet
1742 bridge_proto_input(ifnet_t ifp, __unused protocol_family_t protocol, __unused mbuf_t packet, __unused char *header) argument
[all...]
/darwin-on-arm/xnu/bsd/netinet/
H A Din_arp.h49 interface is called to create an arp request packet.
50 @param interface The interface the packet is being sent on.
51 @param ip_dest The ip destination of the packet.
55 @param packet The packet being transmitted.
57 this function returns EJUSTRETURN, the packet has been queued
60 the packet.
67 size_t ll_dest_len, route_t hint, mbuf_t packet);
78 size_t ll_dest_len, route_t hint, mbuf_t packet);
84 inbound arp packets. The caller should parse the ARP packet t
[all...]
H A Din_arp.c133 struct mbuf *la_hold; /* last packet until resolved/timeout */
375 * entries and a packet has recently been received
389 * entries, and a packet has recently been received
897 mbuf_t packet)
928 if (packet->m_flags & M_BCAST) {
941 if (packet->m_flags & M_MCAST) {
1023 if (packet != NULL) {
1026 llinfo->la_hold = packet;
1067 * Clear la_hold; don't free the packet since
1078 /* The packet i
895 arp_lookup_ip(ifnet_t ifp, const struct sockaddr_in *net_dest, struct sockaddr_dl *ll_dest, size_t ll_dest_len, route_t hint, mbuf_t packet) argument
[all...]
H A Dip_input.c201 "Maximum number of IPv4 fragments allowed per packet");
232 &ip_checkinterface, 0, "Verify packet arrives on correct interface");
326 * to an incoming packet over the same route if the packet got here
544 mbuf_t packet; local
549 for (packet = packet_list; packet; packet = packet_list) {
551 packet_list = mbuf_nextpkt(packet);
552 mbuf_setnextpkt(packet, NUL
[all...]
/darwin-on-arm/xnu/osfmk/kdp/
H A Dkdp_serial.c38 void kdp_serialize_packet(unsigned char *packet, unsigned int len, void (*outFunc)(char)) argument
43 unsigned char byte = *packet++;
100 if(dsPos == sizeof(dsBuffer)) //too much data...forget this packet
H A Dkdp_udp.c79 #define DO_ALIGN 1 /* align all packet data accesses */
92 static u_short ip_id; /* ip packet ctr, for ids */
294 inline static void kdp_send_data(void *packet, unsigned int len) argument
297 (*kdp_en_send_pkt)(packet, len);
301 inline static void kdp_receive_data(void *packet, unsigned int *len, argument
305 (*kdp_en_recv_pkt)(packet, len, timeout);
897 /* If we receive a kernel debugging packet whilst a
919 * Calculate kdp packet length.
995 if (!flag_panic_dump_in_progress || pkt.input) /* we received a debugging packet, bail*/
997 printf("Received a debugger packet,transferrin
2056 unsigned char *packet; local
[all...]
/darwin-on-arm/xnu/bsd/netinet6/
H A Dnd6.h87 struct mbuf *ln_hold; /* last packet until resolved/timeout */
886 @param interface The interface the packet is being sent on.
887 @param ip6_dest The IPv6 destination of the packet.
891 @param packet The packet being transmitted.
893 this function returns EJUSTRETURN, the packet has been queued
896 the packet.
900 size_t ll_dest_len, route_t hint, mbuf_t packet);
H A Dip6_input.c294 mbuf_t packet)
296 ip6_input(packet);
494 /* Check if the packet we received is valid after interface filter
522 * No need to proccess packet twice if we've
536 * should the inner packet be considered authentic?
573 * Drop the packet if IPv6 operation is disabled on the IF;
645 /* If ipfw says divert, we have to just drop packet */
671 * In this case, the packet should come from the loopback
740 /* Invoke inbound packet filter */
750 panic("%s: unexpected packet
292 ip6_proto_input( __unused protocol_family_t protocol, mbuf_t packet) argument
[all...]
H A Dnd6.c3140 * At this point, the destination of the packet must be a unicast
3216 * The first time we send a packet to a neighbor whose entry is
3231 * send the packet.
3313 /* discard the packet if IPv6 operation is disabled on the interface */
3339 * Do not simply drop the packet just like a
3500 mbuf_t packet)
3526 if ((packet->m_flags & M_MCAST) != 0) {
3498 nd6_lookup_ipv6(ifnet_t ifp, const struct sockaddr_in6 *ip6_dest, struct sockaddr_dl *ll_dest, size_t ll_dest_len, route_t hint, mbuf_t packet) argument

Completed in 139 milliseconds