/freebsd-10.0-release/contrib/llvm/tools/lldb/source/Plugins/Process/gdb-remote/ |
H A D | GDBRemoteCommunicationServer.h | 78 SendUnimplementedResponse (const char *packet); 87 Handle_A (StringExtractorGDBRemote &packet); 90 Handle_qLaunchSuccess (StringExtractorGDBRemote &packet); 93 Handle_qHostInfo (StringExtractorGDBRemote &packet); 96 Handle_qLaunchGDBServer (StringExtractorGDBRemote &packet); 99 Handle_qProcessInfoPID (StringExtractorGDBRemote &packet); 102 Handle_qfProcessInfo (StringExtractorGDBRemote &packet); 105 Handle_qsProcessInfo (StringExtractorGDBRemote &packet); 108 Handle_qC (StringExtractorGDBRemote &packet); 111 Handle_qUserName (StringExtractorGDBRemote &packet); [all...] |
H A D | GDBRemoteCommunicationServer.cpp | 67 // StringExtractorGDBRemote packet; 71 // if (packet. 87 StringExtractorGDBRemote packet; local 88 if (WaitForPacketWithTimeoutMicroSecondsNoLock (packet, timeout_usec)) 90 const StringExtractorGDBRemote::ServerPacketType packet_type = packet.GetServerPacketType (); 98 error.SetErrorString("invalid packet"); 108 return SendUnimplementedResponse (packet.GetStringRef().c_str()) > 0; 111 return Handle_A (packet); 114 return Handle_qfProcessInfo (packet); 117 return Handle_qsProcessInfo (packet); 187 char packet[16]; local [all...] |
H A D | GDBRemoteCommunicationClient.cpp | 338 log->Printf ("async: async packet = %s", m_async_packet.c_str()); 368 // Make sure we wait until the continue packet has been sent again... 376 log->Printf ("async: async packet sent"); 392 // Send the packet normally since we got the lock 417 log->Printf("error: failed to get packet sequence mutex, not sending packet '%*s'", (int) payload_length, payload); 540 // Set the starting continue packet into "continue_packet". This packet 541 // may change if we are interrupted and we continue after an async packet... 551 log->Printf ("GDBRemoteCommunicationClient::%s () sending continue packet 950 StreamString packet; local 980 StreamString packet; local 1000 StreamString packet; local 1329 char packet[64]; local [all...] |
H A D | GDBRemoteCommunication.cpp | 57 m_packets[idx].packet.assign (1, packet_char); 75 m_packets[idx].packet.assign (src, 0, src_len); 93 if (entry.type == ePacketTypeInvalid || entry.packet.empty()) 95 strm.Printf ("history[%u] tid=0x%4.4" PRIx64 " <%4u> %s packet: %s\n", 100 entry.packet.c_str()); 117 if (entry.type == ePacketTypeInvalid || entry.packet.empty()) 119 log->Printf ("history[%u] tid=0x%4.4" PRIx64 " <%4u> %s packet: %s", 124 entry.packet.c_str()); 176 log->Printf ("<%4zu> send packet: %c", bytes_written, ch); 189 log->Printf ("<%4zu> send packet 256 StringExtractorGDBRemote packet; local 280 WaitForPacketWithTimeoutMicroSecondsNoLock(StringExtractorGDBRemote &packet, uint32_t timeout_usec) argument 335 CheckForPacket(const uint8_t *src, size_t src_len, StringExtractorGDBRemote &packet) argument [all...] |
/freebsd-10.0-release/contrib/ldns/ |
H A D | packet.c | 2 * packet.c 4 * dns packet implementation 39 ldns_pkt_id(const ldns_pkt *packet) argument 41 return packet->_header->_id; 45 ldns_pkt_qr(const ldns_pkt *packet) argument 47 return packet->_header->_qr; 51 ldns_pkt_aa(const ldns_pkt *packet) argument 53 return packet->_header->_aa; 57 ldns_pkt_tc(const ldns_pkt *packet) argument 59 return packet 63 ldns_pkt_rd(const ldns_pkt *packet) argument 69 ldns_pkt_cd(const ldns_pkt *packet) argument 75 ldns_pkt_ra(const ldns_pkt *packet) argument 81 ldns_pkt_ad(const ldns_pkt *packet) argument 87 ldns_pkt_get_opcode(const ldns_pkt *packet) argument 93 ldns_pkt_get_rcode(const ldns_pkt *packet) argument 99 ldns_pkt_qdcount(const ldns_pkt *packet) argument 105 ldns_pkt_ancount(const ldns_pkt *packet) argument 111 ldns_pkt_nscount(const ldns_pkt *packet) argument 117 ldns_pkt_arcount(const ldns_pkt *packet) argument 123 ldns_pkt_question(const ldns_pkt *packet) argument 129 ldns_pkt_answer(const ldns_pkt *packet) argument 135 ldns_pkt_authority(const ldns_pkt *packet) argument 141 ldns_pkt_additional(const ldns_pkt *packet) argument 148 ldns_pkt_all(const ldns_pkt *packet) argument 167 ldns_pkt_all_noquestion(const ldns_pkt *packet) argument 182 ldns_pkt_size(const ldns_pkt *packet) argument 188 ldns_pkt_querytime(const ldns_pkt *packet) argument 194 ldns_pkt_answerfrom(const ldns_pkt *packet) argument 200 ldns_pkt_timestamp(const ldns_pkt *packet) argument 206 ldns_pkt_edns_udp_size(const ldns_pkt *packet) argument 212 ldns_pkt_edns_extended_rcode(const ldns_pkt *packet) argument 218 ldns_pkt_edns_version(const ldns_pkt *packet) argument 224 ldns_pkt_edns_z(const ldns_pkt *packet) argument 230 ldns_pkt_edns_do(const ldns_pkt *packet) argument 236 ldns_pkt_set_edns_do(ldns_pkt *packet, bool value) argument 246 ldns_pkt_edns_data(const ldns_pkt *packet) argument 253 ldns_pkt_rr_list_by_name(ldns_pkt *packet, ldns_rdf *ownername, ldns_pkt_section sec) argument 284 ldns_pkt_rr_list_by_type(const ldns_pkt *packet, ldns_rr_type type, ldns_pkt_section sec) argument 320 ldns_pkt_rr_list_by_name_and_type(const ldns_pkt *packet, const ldns_rdf *ownername, ldns_rr_type type, ldns_pkt_section sec) argument 383 ldns_pkt_section_count(const ldns_pkt *packet, ldns_pkt_section s) argument 423 ldns_pkt_get_section_clone(const ldns_pkt *packet, ldns_pkt_section s) argument 450 ldns_pkt_set_id(ldns_pkt *packet, uint16_t id) argument 456 ldns_pkt_set_random_id(ldns_pkt *packet) argument 464 ldns_pkt_set_qr(ldns_pkt *packet, bool qr) argument 470 ldns_pkt_set_aa(ldns_pkt *packet, bool aa) argument 476 ldns_pkt_set_tc(ldns_pkt *packet, bool tc) argument 482 ldns_pkt_set_rd(ldns_pkt *packet, bool rd) argument 512 ldns_pkt_set_cd(ldns_pkt *packet, bool cd) argument 518 ldns_pkt_set_ra(ldns_pkt *packet, bool ra) argument 524 ldns_pkt_set_ad(ldns_pkt *packet, bool ad) argument 530 ldns_pkt_set_opcode(ldns_pkt *packet, ldns_pkt_opcode opcode) argument 536 ldns_pkt_set_rcode(ldns_pkt *packet, uint8_t rcode) argument 542 ldns_pkt_set_qdcount(ldns_pkt *packet, uint16_t qdcount) argument 548 ldns_pkt_set_ancount(ldns_pkt *packet, uint16_t ancount) argument 554 ldns_pkt_set_nscount(ldns_pkt *packet, uint16_t nscount) argument 560 ldns_pkt_set_arcount(ldns_pkt *packet, uint16_t arcount) argument 566 ldns_pkt_set_querytime(ldns_pkt *packet, uint32_t time) argument 572 ldns_pkt_set_answerfrom(ldns_pkt *packet, ldns_rdf *answerfrom) argument 578 ldns_pkt_set_timestamp(ldns_pkt *packet, struct timeval timeval) argument 585 ldns_pkt_set_size(ldns_pkt *packet, size_t s) argument 591 ldns_pkt_set_edns_udp_size(ldns_pkt *packet, uint16_t s) argument 597 ldns_pkt_set_edns_extended_rcode(ldns_pkt *packet, uint8_t c) argument 603 ldns_pkt_set_edns_version(ldns_pkt *packet, uint8_t v) argument 609 ldns_pkt_set_edns_z(ldns_pkt *packet, uint16_t z) argument 615 ldns_pkt_set_edns_data(ldns_pkt *packet, ldns_rdf *data) argument 621 ldns_pkt_set_section_count(ldns_pkt *packet, ldns_pkt_section s, uint16_t count) argument 648 ldns_pkt_push_rr(ldns_pkt *packet, ldns_pkt_section section, ldns_rr *rr) argument 734 ldns_pkt *packet; local 784 ldns_pkt_free(ldns_pkt *packet) argument 800 ldns_pkt_set_flags(ldns_pkt *packet, uint16_t flags) argument 831 ldns_pkt_add_authsoa(ldns_pkt* packet, ldns_rdf* rr_name, ldns_rr_class rr_class) argument 913 ldns_pkt *packet; local 974 ldns_pkt *packet; local [all...] |
H A D | wire2host.c | 333 ldns_wire2pkt_hdr(ldns_pkt *packet, const uint8_t *wire, size_t max, size_t *pos) argument 338 ldns_pkt_set_id(packet, LDNS_ID_WIRE(wire)); 339 ldns_pkt_set_qr(packet, LDNS_QR_WIRE(wire)); 340 ldns_pkt_set_opcode(packet, LDNS_OPCODE_WIRE(wire)); 341 ldns_pkt_set_aa(packet, LDNS_AA_WIRE(wire)); 342 ldns_pkt_set_tc(packet, LDNS_TC_WIRE(wire)); 343 ldns_pkt_set_rd(packet, LDNS_RD_WIRE(wire)); 344 ldns_pkt_set_ra(packet, LDNS_RA_WIRE(wire)); 345 ldns_pkt_set_ad(packet, LDNS_AD_WIRE(wire)); 346 ldns_pkt_set_cd(packet, LDNS_CD_WIR 361 ldns_buffer2pkt_wire(ldns_pkt **packet, ldns_buffer *buffer) argument 375 ldns_pkt *packet = ldns_pkt_new(); local [all...] |
H A D | host2wire.c | 228 * Copies the packet header data to the buffer in wire format 231 ldns_hdr2buffer_wire(ldns_buffer *buffer, const ldns_pkt *packet) argument 237 ldns_buffer_write_u16(buffer, ldns_pkt_id(packet)); 239 flags = ldns_pkt_qr(packet) << 7 240 | ldns_pkt_get_opcode(packet) << 3 241 | ldns_pkt_aa(packet) << 2 242 | ldns_pkt_tc(packet) << 1 | ldns_pkt_rd(packet); 245 flags = ldns_pkt_ra(packet) << 7 246 /*| ldns_pkt_z(packet) << 269 ldns_pkt2buffer_wire(ldns_buffer *buffer, const ldns_pkt *packet) argument 377 ldns_pkt2wire(uint8_t **dest, const ldns_pkt *packet, size_t *result_size) argument [all...] |
/freebsd-10.0-release/sys/dev/wtap/ |
H A D | if_medium.h | 41 struct packet { struct 42 STAILQ_ENTRY(packet) pf_list; 46 typedef STAILQ_HEAD(, packet) md_pkthead; 54 STAILQ_HEAD(stailhead, packet) pktbuf; 55 STAILQ_HEAD(stailhead, packet) pktbuf; 70 extern struct packet *medium_get_next_packet(struct wtap_medium *);
|
/freebsd-10.0-release/tools/regression/netipx/ipxdgramloopback/ |
H A D | ipxdgramloopback.c | 31 * socket pair and send a packet from one to the other. 51 u_char packet[PACKETLEN]; local 73 * packet doesn't end up in the right place. 91 packet[i] = (i & 0xff); 93 len = sendto(sock_send, packet, sizeof(packet), 0, 97 if (len != sizeof(packet)) 99 sizeof(packet), len); 103 bzero(packet, sizeof(packet)); [all...] |
/freebsd-10.0-release/sys/boot/i386/common/ |
H A D | drv.c | 56 static struct edd_packet packet; variable in typeref:struct:edd_packet 67 packet.len = sizeof(struct edd_packet); 68 packet.count = nblk; 69 packet.off = VTOPOFF(buf); 70 packet.seg = VTOPSEG(buf); 71 packet.lba = lba; 76 v86.ds = VTOPSEG(&packet); 77 v86.esi = VTOPOFF(&packet); 101 packet.len = sizeof(struct edd_packet); 102 packet [all...] |
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | read_message.c | 79 krb5_data packet; local 81 ret = krb5_read_message(context, p_fd, &packet); 84 ret = krb5_rd_priv (context, ac, &packet, data, NULL); 85 krb5_data_free(&packet); 96 krb5_data packet; local 98 ret = krb5_read_message(context, p_fd, &packet); 101 ret = krb5_rd_safe (context, ac, &packet, data, NULL); 102 krb5_data_free(&packet);
|
H A D | write_message.c | 63 krb5_data packet; local 65 ret = krb5_mk_priv (context, ac, data, &packet, NULL); 68 ret = krb5_write_message(context, p_fd, &packet); 69 krb5_data_free(&packet); 80 krb5_data packet; local 81 ret = krb5_mk_safe (context, ac, data, &packet, NULL); 84 ret = krb5_write_message(context, p_fd, &packet); 85 krb5_data_free(&packet);
|
/freebsd-10.0-release/crypto/heimdal/appl/test/ |
H A D | tcp_client.c | 46 krb5_data packet; local 86 krb5_data_zero (&packet); 91 &packet, 96 len = packet.length; 101 if (krb5_net_write (context, &sock, packet.data, len) != len) 107 krb5_data_free (&packet); 112 &packet, 117 len = packet.length; 122 if (krb5_net_write (context, &sock, packet.data, len) != len)
|
H A D | tcp_server.c | 48 krb5_data packet; local 96 krb5_data_zero (&packet); 106 krb5_data_alloc (&packet, len); 108 n = krb5_net_read (context, &sock, packet.data, len); 116 &packet, 122 fprintf (stderr, "safe packet: %.*s\n", (int)data.length, 133 krb5_data_alloc (&packet, len); 135 n = krb5_net_read (context, &sock, packet.data, len); 143 &packet, 149 fprintf (stderr, "priv packet [all...] |
/freebsd-10.0-release/contrib/gdb/gdb/ |
H A D | xmodem.c | 142 /* Take 128 bytes of data and make a packet out of it. 144 * Each packet looks like this: 157 * start 3 bytes after the beginning of the packet to leave room for the 158 * XMODEM header. LEN is the length of the data portion of the packet (and 163 xmodem_send_packet (struct serial *desc, unsigned char *packet, int len, int hashmark) argument 170 /* build the packet header */ 172 packet[1] = blknum; 173 packet[2] = ~blknum; 179 packet[0] = SOH; 184 packet[ [all...] |
H A D | xmodem.h | 24 void send_xmodem_packet (struct serial *desc, unsigned char *packet, int len, 30 #define XMODEM_PACKETSIZE 133 /* data + packet headers and crc */ 31 #define XMODEM_1KPACKETSIZE 1024 + 5 /* data + packet headers and crc */
|
/freebsd-10.0-release/sys/dev/wtap/plugins/ |
H A D | wtap_plugin.h | 44 void (*work)(struct wtap_plugin *, struct packet *p);
|
/freebsd-10.0-release/tools/regression/sbin/dhclient/ |
H A D | fake.c | 57 bootp(struct packet *packet) argument 62 dhcp(struct packet *packet) argument
|
/freebsd-10.0-release/share/doc/psd/20.ipctut/ |
H A D | dgramread.c | 80 perror("receiving datagram packet");
|
H A D | udgramread.c | 76 perror("receiving datagram packet");
|
/freebsd-10.0-release/tools/tools/ether_reflect/ |
H A D | ether_reflect.c | 75 unsigned char *packet = NULL; local 131 (const unsigned char **)&packet); 135 usage("packet read error"); 140 printf ("got packet of %d length\n", header->len); 143 &packet[0])); 146 &packet[ETHER_ADDR_LEN])); 154 bcopy(packet, &tmp, ETHER_ADDR_LEN); 155 bcopy(&packet[ETHER_ADDR_LEN], packet, ETHER_ADDR_LEN); 156 bcopy(&tmp, &packet[ETHER_ADDR_LE [all...] |
/freebsd-10.0-release/sys/ofed/drivers/infiniband/core/ |
H A D | user_mad.c | 55 MODULE_DESCRIPTION("InfiniBand userspace MAD packet access"); 167 struct ib_umad_packet *packet) 173 for (packet->mad.hdr.id = 0; 174 packet->mad.hdr.id < IB_UMAD_MAX_AGENTS; 175 packet->mad.hdr.id++) 176 if (agent == __get_agent(file, packet->mad.hdr.id)) { 177 list_add_tail(&packet->list, &file->recv_list); 190 struct ib_umad_packet *packet) 193 list_del(&packet->list); 201 struct ib_umad_packet *packet local 165 queue_packet(struct ib_umad_file *file, struct ib_mad_agent *agent, struct ib_umad_packet *packet) argument 189 dequeue_send(struct ib_umad_file *file, struct ib_umad_packet *packet) argument 220 struct ib_umad_packet *packet; local 264 copy_recv_mad(struct ib_umad_file *file, char __user *buf, struct ib_umad_packet *packet, size_t count) argument 314 copy_send_mad(struct ib_umad_file *file, char __user *buf, struct ib_umad_packet *packet, size_t count) argument 337 struct ib_umad_packet *packet; local 413 is_duplicate(struct ib_umad_file *file, struct ib_umad_packet *packet) argument 450 struct ib_umad_packet *packet; local 843 struct ib_umad_packet *packet, *tmp; local [all...] |
/freebsd-10.0-release/tools/regression/netipx/spxloopback/ |
H A D | spxloopback.c | 32 * Purposefully pick a small packet length that should fit into the buffers 52 packet_fill(u_char *packet) argument 57 packet[i] = (i & 0xff); 61 packet_check(u_char *packet, size_t totlen, ssize_t len) argument 66 if (packet[i] != (i & 0xff)) 75 u_char packet[PACKETLEN]; local 81 packet_fill(packet); 83 len = send(sock, packet + totlen, PACKETLEN - totlen, 0); 101 u_char packet[PACKETLEN]; local 107 bzero(packet, sizeo [all...] |
/freebsd-10.0-release/usr.sbin/IPXrouted/ |
H A D | trace.h | 53 char *ift_packet; /* pointer to packet */ 54 short ift_size; /* size of packet */ 59 * Per interface packet tracing buffers. An incoming and 91 &packet[sizeof(struct ipx)], size, \ 96 &packet[sizeof(struct ipx)], size); \ 103 &packet[sizeof(struct ipx)], \ 108 &packet[sizeof(struct ipx)], size); \ 116 &packet[sizeof(struct ipx)], \ 121 &packet[sizeof(struct ipx)], size); \
|
/freebsd-10.0-release/sbin/dhclient/ |
H A D | options.c | 54 void parse_options(struct packet *); 55 void parse_option_buffer(struct packet *, unsigned char *, int); 58 void expand_domain_search(struct packet *packet); 65 * Parse all available options out of the specified packet. 68 parse_options(struct packet *packet) argument 71 memset(packet->options, 0, sizeof(packet->options)); 74 if (memcmp(packet 114 parse_option_buffer(struct packet *packet, unsigned char *buffer, int length) argument 212 expand_domain_search(struct packet *packet) argument 862 do_packet(struct interface_info *interface, struct dhcp_packet *packet, int len, unsigned int from_port, struct iaddr from, struct hardware *hfrom) argument [all...] |