| /src/external/bsd/ppp/usr.sbin/pppdump/ |
| pppdump.h | 32 struct packet { struct 37 #define PACKETPTR struct packet *
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| read_message.c | 81 krb5_data packet; local 83 ret = krb5_read_message(context, p_fd, &packet); 86 ret = krb5_rd_priv (context, ac, &packet, data, NULL); 87 krb5_data_free(&packet); 98 krb5_data packet; local 100 ret = krb5_read_message(context, p_fd, &packet); 103 ret = krb5_rd_safe (context, ac, &packet, data, NULL); 104 krb5_data_free(&packet);
|
| write_message.c | 65 krb5_data packet; local 67 ret = krb5_mk_priv (context, ac, data, &packet, NULL); 70 ret = krb5_write_message(context, p_fd, &packet); 71 krb5_data_free(&packet); 82 krb5_data packet; local 83 ret = krb5_mk_safe (context, ac, data, &packet, NULL); 86 ret = krb5_write_message(context, p_fd, &packet); 87 krb5_data_free(&packet);
|
| /src/external/mpl/dhcp/dist/server/tests/ |
| load_bal_unittest.c | 29 * packet => the "packet" being processed 32 * packet->raw->secs => amount of time the client has been trying 33 * packet->raw->hlen => the length of the mac address of the client 34 * packet->raw->chaddr => the mac address of the client 58 struct packet packet; local 63 memset(&packet, 0, sizeof(struct packet)); 65 packet.raw = &raw 139 struct packet packet; local [all...] |
| /src/sys/external/bsd/drm2/dist/drm/amd/amdkfd/ |
| kfd_packet_manager_v9.c | 38 struct pm4_mes_map_process *packet; local 41 packet = (struct pm4_mes_map_process *)buffer; 44 packet->header.u32All = pm_build_pm4_header(IT_MAP_PROCESS, 46 packet->bitfields2.diq_enable = (qpd->is_debug) ? 1 : 0; 47 packet->bitfields2.process_quantum = 1; 48 packet->bitfields2.pasid = qpd->pqm->process->pasid; 49 packet->bitfields14.gds_size = qpd->gds_size & 0x3F; 50 packet->bitfields14.gds_size_hi = (qpd->gds_size >> 6) & 0xF; 51 packet->bitfields14.num_gws = qpd->num_gws; 52 packet->bitfields14.num_oac = qpd->num_oac 84 struct pm4_mes_runlist *packet; local 122 struct pm4_mes_set_resources *packet; local 150 struct pm4_mes_map_queues *packet; local 220 struct pm4_mes_unmap_queues *packet; local 293 struct pm4_mes_query_status *packet; local [all...] |
| kfd_packet_manager_vi.c | 49 struct pm4_mes_map_process *packet; local 51 packet = (struct pm4_mes_map_process *)buffer; 55 packet->header.u32All = pm_build_pm4_header(IT_MAP_PROCESS, 57 packet->bitfields2.diq_enable = (qpd->is_debug) ? 1 : 0; 58 packet->bitfields2.process_quantum = 1; 59 packet->bitfields2.pasid = qpd->pqm->process->pasid; 60 packet->bitfields3.page_table_base = qpd->page_table_base; 61 packet->bitfields10.gds_size = qpd->gds_size; 62 packet->bitfields10.num_gws = qpd->num_gws; 63 packet->bitfields10.num_oac = qpd->num_oac 82 struct pm4_mes_runlist *packet; local 121 struct pm4_mes_set_resources *packet; local 149 struct pm4_mes_map_queues *packet; local 210 struct pm4_mes_unmap_queues *packet; local 273 struct pm4_mes_query_status *packet; local 297 struct pm4_mec_release_mem *packet; local [all...] |
| /src/usr.bin/rump_dhcpclient/ |
| bpf.c | 159 * So we pass the buffer in the API so we can loop on >1 packet. */ 165 struct bpf_hdr packet; local 179 else if ((size_t)bytes < sizeof(packet)) 185 memcpy(&packet, iface->buffer + iface->buffer_pos, 186 sizeof(packet)); 187 if (packet.bh_caplen != packet.bh_datalen) 188 goto next; /* Incomplete packet, drop. */ 189 if (iface->buffer_pos + packet.bh_caplen + packet.bh_hdrlen [all...] |
| net.c | 48 # include <netpacket/packet.h> 400 make_udp_packet(uint8_t **packet, const uint8_t *data, size_t length, 412 * We copy the data to our packet and then create a small part of the 415 * of the whole packet into the udp checksum. 442 *packet = (uint8_t *)udpp; 449 struct udp_dhcp_packet packet; local 451 memcpy(&packet, udp, sizeof(packet)); 453 return ntohs(packet.ip.ip_len) - 454 sizeof(packet.ip) 461 struct udp_dhcp_packet packet; local [all...] |
| /src/external/mpl/dhcp/dist/tests/DHCPv6/ |
| dhcp_client.pm | 291 sub packet { subroutine 294 my $packet = ""; 295 $packet .= chr($this->{msg_type}); 296 $packet .= $this->{trans_id}; 297 $packet .= $this->packed_options(); 298 return $packet; 428 # XXX: we aren't careful about packet boundaries and values... 431 my ($packet, $print) = @_; 433 my $msg_type = ord(substr($packet, 0, 1)); 434 my $trans_id = substr($packet, 1, 3) [all...] |
| /src/lib/libresolv/ |
| res_update.c | 61 * Create a dynamic update packet for each zone and send it to the 102 u_char *packet; local 108 packet = malloc(NS_MAXMSG); 109 if (packet == NULL) { 164 packet, NS_MAXMSG); 175 n = res_nsendsigned(statp, packet, n, key, 178 n = res_nsend(statp, packet, n, answer, 204 free(packet);
|
| /src/tests/lib/libc/sys/ |
| t_sendrecv.c | 50 union packet { union 67 union packet p; 84 union packet p;
|
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| validate.h | 54 unsigned packet; member in struct:__anon1055
|
| /src/external/bsd/libbind/dist/resolv/ |
| res_update.c | 58 * Create a dynamic update packet for each zone and send it to the 99 u_char *packet; local 105 packet = malloc(NS_MAXMSG); 106 if (packet == NULL) { 162 packet, NS_MAXMSG); 173 n = res_nsendsigned(statp, packet, n, key, 176 n = res_nsend(statp, packet, n, answer, sizeof answer); 200 free(packet);
|
| /src/external/bsd/ppp/dist/pppd/plugins/pppoe/ |
| common.c | 37 * packet -- the PPPoE discovery packet to parse 38 * func -- function called for each tag in the packet 43 * Parses a PPPoE discovery packet, calling "func" for each tag in the packet. 47 parsePacket(PPPoEPacket *packet, ParseFunc *func, void *extra) 49 UINT16_t len = ntohs(packet->length); 53 if (PPPOE_VER(packet->vertype) != 1) { 54 error("Invalid PPPoE version (%d)", PPPOE_VER(packet->vertype)); 57 if (PPPOE_TYPE(packet->vertype) != 1) 100 PPPoEPacket packet; local [all...] |
| discovery.c | 103 * packet -- a received PPPoE packet 105 * 1 if packet is for this PPPoE daemon; 0 otherwise. 107 * If we are using the Host-Unique tag, verifies that packet contains 111 packetIsForMe(PPPoEConnection *conn, PPPoEPacket *packet) 115 /* If packet is not directed to our MAC address, forget it */ 116 if (memcmp(packet->ethHdr.h_dest, conn->myEth, ETH_ALEN)) return 0; 118 /* If we're not using the Host-Unique tag, then accept the packet */ 121 parsePacket(packet, parseForHostUniq, &hostUniq); 137 * Picks interesting tags out of a PADO packet 307 PPPoEPacket packet; local 390 PPPoEPacket packet; local 499 PPPoEPacket packet; local 588 PPPoEPacket packet; local [all...] |
| /src/external/bsd/wpa/dist/src/ap/ |
| eth_p_oui.c | 58 /* too short packet */ 165 u8 *packet, *p; local 171 packet = os_zalloc(packet_len); 172 if (!packet) 174 p = packet; 176 ethhdr = (struct l2_ethhdr *) packet; 188 ret = l2_packet_send(iface->l2, NULL, 0, packet, packet_len); 189 os_free(packet);
|
| /src/external/mpl/dhcp/dist/relay/tests/ |
| relay_unittests.c | 48 /* @brief Add the given option data to a DHCPv4 packet 50 * It first fills the packet.options buffer with the given pad character. 54 * @param packet pointer to the packet 55 * @param data pointer to the option data to copy into the packet's options 58 * @param pad byte value with which to initialize the packet's options buffer 60 * @return returns the new length of the packet 62 unsigned set_packet_options(struct dhcp_packet *packet, 66 memset(packet->options, pad, DHCP_MAX_OPTION_LEN); 70 memcpy(packet->options, DHCP_OPTIONS_COOKIE, new_len) 128 struct dhcp_packet packet; local 245 struct dhcp_packet packet; member in union:__anon24480 286 struct dhcp_packet packet; local [all...] |
| /src/sys/dev/pckbport/ |
| pmsvar.h | 58 int inputstate; /* number of bytes received for this packet */ 61 unsigned char packet[6]; member in struct:pms_softc
|
| /src/usr.bin/login/ |
| k5login.c | 130 krb5_data packet; local 156 0, ccache, &packet); 164 * in the database, therefore this error packet could 185 kerror = krb5_rd_req(c, &auth_context, &packet, 223 /* possibly ticket and packet need freeing here as well */
|
| /src/usr.sbin/timed/timed/ |
| measure.c | 85 u_char packet[PACKET_IN]; local 115 ret = recvfrom(sock_raw, (char *)packet, PACKET_IN, 0, 190 ret = recvfrom(sock_raw, (char *)packet, PACKET_IN, 0, 201 memcpy(&ip, packet, sizeof(ip)); 207 memcpy(&icp, &packet[ip.ip_hl << 2],
|
| /src/external/bsd/nsd/dist/ |
| xfrd-notify.c | 18 #include "packet.h" 155 reply_pkt_is_ack(struct notify_zone* zone, buffer_type* packet, int index) 157 if((OPCODE(packet) != OPCODE_NOTIFY) || 158 (QR(packet) == 0)) { 165 if(ID(packet) != zone->pkts[index].notify_query_id) { 171 if(RCODE(packet) != RCODE_OK) { 173 zone->apex_str, rcode2str(RCODE(packet)), 175 if(RCODE(packet) == RCODE_IMPL) 251 xfrd_handle_notify_reply(struct notify_zone* zone, buffer_type* packet, 262 if(reply_pkt_is_ack(zone, packet, i)) 278 buffer_type* packet = xfrd_get_temp_buffer(); local 427 buffer_type* packet = xfrd_get_temp_buffer(); local [all...] |
| /src/external/bsd/ppp/dist/pppd/ |
| demand.c | 70 struct packet { struct 72 struct packet *next; 76 struct packet *pend_q; 77 struct packet *pend_qtail; 145 struct packet *pkt, *nextpkt; 271 * We apply the active_filter to see if we want this packet to 277 struct packet *pkt; 287 pkt = (struct packet *) malloc(sizeof(struct packet) + len); 308 struct packet *pkt, *prev, *nextpkt [all...] |
| /src/sys/arch/hpcmips/dev/ |
| optpoint.c | 63 char packet[4]; member in struct:optpoint_softc 64 int index; /* number of bytes received for this packet */ 159 memset(sc->packet, 0, 3); 170 sc->packet[sc->index++] = data; 172 u_int newbuttons = ((sc->packet[1] & LBUTMASK) ? 0x1 : 0) 173 | ((sc->packet[1] & RBUTMASK) ? 0x2 : 0); 174 int dx = sc->packet[2]; 175 int dy = sc->packet[0]; 188 memset(sc->packet, 0, 3); 210 sc->packet[0] = 0xf5; /* Disable * [all...] |
| /src/sys/arch/sgimips/dev/ |
| zs_ms.c | 72 /* 5-byte packet as described above */ 78 int8_t packet[5]; member in struct:zsms_softc 228 * Here's the real action. Read a full packet and 237 sc->packet[ZSMS_PACKET_SYNC] = c; 243 sc->packet[ZSMS_PACKET_X1] = c; 248 sc->packet[ZSMS_PACKET_Y1] = c; 253 sc->packet[ZSMS_PACKET_X2] = c; 258 sc->packet[ZSMS_PACKET_Y2] = c; 281 btns = (uint8_t)sc->packet[ZSMS_PACKET_SYNC] & ZSMS_SYNC_BTN_MASK; 290 x = (int)sc->packet[ZSMS_PACKET_X1] + (int)sc->packet[ZSMS_PACKET_X2] [all...] |
| /src/tests/net/net/ |
| t_ip_reass.c | 106 struct lopacket *packet; local 109 pktlen = sizeof(*packet) + payloadlen; 110 packet = malloc(pktlen); 111 ATF_REQUIRE(packet != NULL); 113 memset(packet, 0, pktlen); 114 packet->family = AF_INET; 116 ip = &packet->hdr; 130 return (packet); 134 free_lopacket(struct lopacket *packet) 137 free(packet); [all...] |