/macosx-10.9.5/xnu-2422.115.4/bsd/netinet/ |
H A D | in_gif.c | 137 m = m_pullup(m, sizeof (*ip)); 152 m = m_pullup(m, sizeof (*ip6)); 191 m = m_pullup(m, sizeof (struct ip)); 269 m = m_pullup(m, sizeof (*ip)); 288 m = m_pullup(m, sizeof (*ip6));
|
H A D | kpi_ipfilter.c | 276 m = m_pullup(m, sizeof (struct ip)); 350 m = m_pullup(m, sizeof(struct ip6_hdr)); 419 m = m_pullup(m, 1);
|
H A D | ip6.h | 309 (((m) = m_pullup((m), (off) + (hlen))) == NULL)) { \
|
H A D | ip_divert.c | 233 (m = m_pullup(m, sizeof(struct ip))) == 0) { 560 (m = m_pullup(m, sizeof (struct ip))) == 0) {
|
H A D | ip_mroute.c | 1172 mb0 = m_pullup(mb0, hlen); 1395 mm = m_pullup(mm, hlen); 1489 mb_copy = m_pullup(mb_copy, hlen); 1527 mb_copy = m_pullup(mb_copy, i);
|
H A D | tcp_lro.c | 423 if ((lro_mb = m_pullup(lro_mb, sizeof(struct tcpiphdr))) == 0) { 704 if (lrodebug) printf("tcp_lro m_pullup \n"); 705 if ((m = m_pullup(m, sizeof (struct tcpiphdr))) == 0) {
|
H A D | ip_input.c | 768 (m = m_pullup(m, sizeof (struct ip))) == NULL) { 788 if ((m = m_pullup(m, hlen)) == NULL) { 1186 (m = m_pullup(m, sizeof (struct udpiphdr))) == NULL) {
|
H A D | udp_usrreq.c | 332 m = m_pullup(m, iphlen + sizeof (struct udphdr)); 595 if ((m = m_pullup(m, iphlen + sizeof (struct udphdr) +
|
H A D | ip_icmp.c | 347 if (m->m_len < i && (m = m_pullup(m, i)) == 0) {
|
/macosx-10.9.5/xnu-2422.115.4/bsd/netinet6/ |
H A D | in6_gif.c | 132 m = m_pullup(m, sizeof (*ip)); 146 m = m_pullup(m, sizeof (*ip6)); 167 m = m_pullup(m, sizeof (struct ip6_hdr)); 271 m = m_pullup(m, sizeof (*ip)); 288 m = m_pullup(m, sizeof (*ip6));
|
H A D | ah_input.c | 145 m = m_pullup(m, off + sizeof(struct newah)); 263 m = m_pullup(m, off + sizeof(struct ah) + sizoff + siz1); 369 m = m_pullup(m, off + sizeof(struct ah) 448 m = m_pullup(m, sizeof(*ip)); 561 m = m_pullup(m, sizeof(*ip)); 883 * m_pullup is prohibited in KAME IPv6 input processing 886 m = m_pullup(m, sizeof(*ip6));
|
H A D | esp_input.c | 189 m = m_pullup(m, off + ESPMAXLEN); 363 m = m_pullup(m, off + esplen + ivlen); 428 m = m_pullup(m, off); 485 m = m_pullup(m, sizeof(*ip)); 516 * m_pullup is prohibited in KAME IPv6 input processing 523 m = m_pullup(m, sizeof(*ip6)); 656 m = m_pullup(m, off + sizeof(struct udphdr)); 1001 * m_pullup is prohibited in KAME IPv6 input processing 1007 m = m_pullup(m, sizeof(*ip6));
|
H A D | ip6_mroute.c | 1073 mb0 = m_pullup(mb0, sizeof(struct ip6_hdr)); 1354 mm = m_pullup(mm, sizeof(struct ip6_hdr)); 1487 mb_copy = m_pullup(mb_copy, sizeof(struct ip6_hdr)); 1638 mm = m_pullup(mm, i); 1713 * possible m_pullup() later.
|
H A D | icmp6.c | 262 m = m_pullup(m, sizeof(struct ip6_hdr)); 306 m = m_pullup(m, sizeof(struct ip6_hdr)); 393 m = m_pullup(m, preplen); 630 * Prepare an internal mbuf. m_pullup() doesn't 3071 (m = m_pullup(m, sizeof(struct icmp6_hdr))) == NULL) {
|
H A D | raw_ip6.c | 396 (m = m_pullup(m, sizeof(struct icmp6_hdr))) == NULL) {
|
/macosx-10.9.5/xnu-2422.115.4/bsd/netkey/ |
H A D | keysock.c | 122 if ((m = m_pullup(m, sizeof(struct sadb_msg))) == 0) { 176 m = m_pullup(m, sizeof(struct sadb_msg)); 235 m = m_pullup(m, sizeof(struct sadb_msg));
|
H A D | key.c | 1010 result = m_pullup(result, 2501 n = m_pullup(n, sizeof(*newmsg)); 2860 n = m_pullup(n, sizeof(struct sadb_msg)); 2920 n = m_pullup(n, sizeof(struct sadb_msg)); 3278 result = m_pullup(result, sizeof(struct sadb_msg)); 3461 result = m_pullup(result, sizeof(struct sadb_msg)); 4911 result = m_pullup(result, sizeof(struct sadb_msg)); 6584 n = m_pullup(n, sizeof(struct sadb_msg)); 7220 n = m_pullup(n, sizeof(struct sadb_msg)); 7342 n = m_pullup( [all...] |
/macosx-10.9.5/xnu-2422.115.4/bsd/net/ |
H A D | if_stf.c | 552 m = m_pullup(m, sizeof(*ip6)); 584 m = m_pullup(m, sizeof(struct ip));
|
H A D | net_stubs.c | 2133 int m_pullup(void); 2134 int m_pullup(void) function
|
H A D | if_utun_crypto_ipsec.c | 727 if (!(*pkt = m_pullup(*pkt, sizeof(*ip)))) { 728 printf("%s: m_pullup failed\n", __FUNCTION__); 973 if ((*pkt = m_pullup(*pkt, (offs + 1))) == NULL) { 974 printf("%s: m_pullup failed\n", __FUNCTION__); 1023 if ((*pkt = m_pullup(*pkt, (sizeof(protocol_family_t) + size_diff))) == NULL) { 1024 printf("%s: m_pullup failed\n", __FUNCTION__);
|
H A D | if_bridge.c | 3577 m = m_pullup(m, ETHER_HDR_LEN); 5145 *mp = m_pullup(*mp, i); 5147 printf("%s: m_pullup failed\n", __func__); 5330 if ((*mp = m_pullup(*mp, hlen)) == 0) 5433 if ((m = m_pullup(m, sizeof (struct ip))) == NULL) { 5451 if ((m = m_pullup(m, hlen)) == 0) { 5533 if ((m = m_pullup(m, sizeof (struct ip6_hdr))) == NULL) { 5572 (m = m_pullup(m, sizeof (struct ip))) == NULL)
|
H A D | bridgestp.c | 557 (m = m_pullup(m, sizeof(tpdu))) == NULL) 624 (*mp = m_pullup(*mp, BSTP_BPDU_STP_LEN)) == NULL) 645 (*mp = m_pullup(*mp, BSTP_BPDU_RSTP_LEN)) == NULL)
|
H A D | if_utun_crypto_dtls.c | 200 *pkt = m_pullup(*pkt, utun_crypto_framer_state_dtls_in(cur_framer).in_pattern_len);
|
/macosx-10.9.5/xnu-2422.115.4/bsd/kern/ |
H A D | kpi_mbuf.c | 340 *mbuf = m_pullup(*mbuf, len);
|
/macosx-10.9.5/xnu-2422.115.4/bsd/sys/ |
H A D | mbuf.h | 899 u_int32_t m_mpfail; /* times m_pullup failed */ 921 u_int32_t m_mpfail; /* times m_pullup failed */ 1110 extern struct mbuf *m_pullup(struct mbuf *, int);
|