HomeSort by: relevance | last modified time | path
    Searched defs:packet (Results 1 - 25 of 104) sorted by relevancy

1 2 3 4 5

  /src/external/bsd/ppp/usr.sbin/pppdump/
pppdump.h 32 struct packet { struct
37 #define PACKETPTR struct packet *
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
read_message.c 81 krb5_data packet; local
83 ret = krb5_read_message(context, p_fd, &packet);
86 ret = krb5_rd_priv (context, ac, &packet, data, NULL);
87 krb5_data_free(&packet);
98 krb5_data packet; local
100 ret = krb5_read_message(context, p_fd, &packet);
103 ret = krb5_rd_safe (context, ac, &packet, data, NULL);
104 krb5_data_free(&packet);
write_message.c 65 krb5_data packet; local
67 ret = krb5_mk_priv (context, ac, data, &packet, NULL);
70 ret = krb5_write_message(context, p_fd, &packet);
71 krb5_data_free(&packet);
82 krb5_data packet; local
83 ret = krb5_mk_safe (context, ac, data, &packet, NULL);
86 ret = krb5_write_message(context, p_fd, &packet);
87 krb5_data_free(&packet);
  /src/external/mpl/dhcp/dist/server/tests/
load_bal_unittest.c 29 * packet => the "packet" being processed
32 * packet->raw->secs => amount of time the client has been trying
33 * packet->raw->hlen => the length of the mac address of the client
34 * packet->raw->chaddr => the mac address of the client
58 struct packet packet; local
63 memset(&packet, 0, sizeof(struct packet));
65 packet.raw = &raw
139 struct packet packet; local
    [all...]
  /src/sys/external/bsd/drm2/dist/drm/amd/amdkfd/
kfd_packet_manager_v9.c 38 struct pm4_mes_map_process *packet; local
41 packet = (struct pm4_mes_map_process *)buffer;
44 packet->header.u32All = pm_build_pm4_header(IT_MAP_PROCESS,
46 packet->bitfields2.diq_enable = (qpd->is_debug) ? 1 : 0;
47 packet->bitfields2.process_quantum = 1;
48 packet->bitfields2.pasid = qpd->pqm->process->pasid;
49 packet->bitfields14.gds_size = qpd->gds_size & 0x3F;
50 packet->bitfields14.gds_size_hi = (qpd->gds_size >> 6) & 0xF;
51 packet->bitfields14.num_gws = qpd->num_gws;
52 packet->bitfields14.num_oac = qpd->num_oac
84 struct pm4_mes_runlist *packet; local
122 struct pm4_mes_set_resources *packet; local
150 struct pm4_mes_map_queues *packet; local
220 struct pm4_mes_unmap_queues *packet; local
293 struct pm4_mes_query_status *packet; local
    [all...]
kfd_packet_manager_vi.c 49 struct pm4_mes_map_process *packet; local
51 packet = (struct pm4_mes_map_process *)buffer;
55 packet->header.u32All = pm_build_pm4_header(IT_MAP_PROCESS,
57 packet->bitfields2.diq_enable = (qpd->is_debug) ? 1 : 0;
58 packet->bitfields2.process_quantum = 1;
59 packet->bitfields2.pasid = qpd->pqm->process->pasid;
60 packet->bitfields3.page_table_base = qpd->page_table_base;
61 packet->bitfields10.gds_size = qpd->gds_size;
62 packet->bitfields10.num_gws = qpd->num_gws;
63 packet->bitfields10.num_oac = qpd->num_oac
82 struct pm4_mes_runlist *packet; local
121 struct pm4_mes_set_resources *packet; local
149 struct pm4_mes_map_queues *packet; local
210 struct pm4_mes_unmap_queues *packet; local
273 struct pm4_mes_query_status *packet; local
297 struct pm4_mec_release_mem *packet; local
    [all...]
  /src/usr.bin/rump_dhcpclient/
bpf.c 159 * So we pass the buffer in the API so we can loop on >1 packet. */
165 struct bpf_hdr packet; local
179 else if ((size_t)bytes < sizeof(packet))
185 memcpy(&packet, iface->buffer + iface->buffer_pos,
186 sizeof(packet));
187 if (packet.bh_caplen != packet.bh_datalen)
188 goto next; /* Incomplete packet, drop. */
189 if (iface->buffer_pos + packet.bh_caplen + packet.bh_hdrlen
    [all...]
net.c 48 # include <netpacket/packet.h>
400 make_udp_packet(uint8_t **packet, const uint8_t *data, size_t length,
412 * We copy the data to our packet and then create a small part of the
415 * of the whole packet into the udp checksum.
442 *packet = (uint8_t *)udpp;
449 struct udp_dhcp_packet packet; local
451 memcpy(&packet, udp, sizeof(packet));
453 return ntohs(packet.ip.ip_len) -
454 sizeof(packet.ip)
461 struct udp_dhcp_packet packet; local
    [all...]
  /src/external/mpl/dhcp/dist/tests/DHCPv6/
dhcp_client.pm 291 sub packet { subroutine
294 my $packet = "";
295 $packet .= chr($this->{msg_type});
296 $packet .= $this->{trans_id};
297 $packet .= $this->packed_options();
298 return $packet;
428 # XXX: we aren't careful about packet boundaries and values...
431 my ($packet, $print) = @_;
433 my $msg_type = ord(substr($packet, 0, 1));
434 my $trans_id = substr($packet, 1, 3)
    [all...]
  /src/lib/libresolv/
res_update.c 61 * Create a dynamic update packet for each zone and send it to the
102 u_char *packet; local
108 packet = malloc(NS_MAXMSG);
109 if (packet == NULL) {
164 packet, NS_MAXMSG);
175 n = res_nsendsigned(statp, packet, n, key,
178 n = res_nsend(statp, packet, n, answer,
204 free(packet);
  /src/tests/lib/libc/sys/
t_sendrecv.c 50 union packet { union
67 union packet p;
84 union packet p;
  /src/crypto/external/bsd/netpgp/dist/src/lib/
validate.h 54 unsigned packet; member in struct:__anon1055
  /src/external/bsd/libbind/dist/resolv/
res_update.c 58 * Create a dynamic update packet for each zone and send it to the
99 u_char *packet; local
105 packet = malloc(NS_MAXMSG);
106 if (packet == NULL) {
162 packet, NS_MAXMSG);
173 n = res_nsendsigned(statp, packet, n, key,
176 n = res_nsend(statp, packet, n, answer, sizeof answer);
200 free(packet);
  /src/external/bsd/ppp/dist/pppd/plugins/pppoe/
common.c 37 * packet -- the PPPoE discovery packet to parse
38 * func -- function called for each tag in the packet
43 * Parses a PPPoE discovery packet, calling "func" for each tag in the packet.
47 parsePacket(PPPoEPacket *packet, ParseFunc *func, void *extra)
49 UINT16_t len = ntohs(packet->length);
53 if (PPPOE_VER(packet->vertype) != 1) {
54 error("Invalid PPPoE version (%d)", PPPOE_VER(packet->vertype));
57 if (PPPOE_TYPE(packet->vertype) != 1)
100 PPPoEPacket packet; local
    [all...]
discovery.c 103 * packet -- a received PPPoE packet
105 * 1 if packet is for this PPPoE daemon; 0 otherwise.
107 * If we are using the Host-Unique tag, verifies that packet contains
111 packetIsForMe(PPPoEConnection *conn, PPPoEPacket *packet)
115 /* If packet is not directed to our MAC address, forget it */
116 if (memcmp(packet->ethHdr.h_dest, conn->myEth, ETH_ALEN)) return 0;
118 /* If we're not using the Host-Unique tag, then accept the packet */
121 parsePacket(packet, parseForHostUniq, &hostUniq);
137 * Picks interesting tags out of a PADO packet
307 PPPoEPacket packet; local
390 PPPoEPacket packet; local
499 PPPoEPacket packet; local
588 PPPoEPacket packet; local
    [all...]
  /src/external/bsd/wpa/dist/src/ap/
eth_p_oui.c 58 /* too short packet */
165 u8 *packet, *p; local
171 packet = os_zalloc(packet_len);
172 if (!packet)
174 p = packet;
176 ethhdr = (struct l2_ethhdr *) packet;
188 ret = l2_packet_send(iface->l2, NULL, 0, packet, packet_len);
189 os_free(packet);
  /src/external/mpl/dhcp/dist/relay/tests/
relay_unittests.c 48 /* @brief Add the given option data to a DHCPv4 packet
50 * It first fills the packet.options buffer with the given pad character.
54 * @param packet pointer to the packet
55 * @param data pointer to the option data to copy into the packet's options
58 * @param pad byte value with which to initialize the packet's options buffer
60 * @return returns the new length of the packet
62 unsigned set_packet_options(struct dhcp_packet *packet,
66 memset(packet->options, pad, DHCP_MAX_OPTION_LEN);
70 memcpy(packet->options, DHCP_OPTIONS_COOKIE, new_len)
128 struct dhcp_packet packet; local
245 struct dhcp_packet packet; member in union:__anon24480
286 struct dhcp_packet packet; local
    [all...]
  /src/sys/dev/pckbport/
pmsvar.h 58 int inputstate; /* number of bytes received for this packet */
61 unsigned char packet[6]; member in struct:pms_softc
  /src/usr.bin/login/
k5login.c 130 krb5_data packet; local
156 0, ccache, &packet);
164 * in the database, therefore this error packet could
185 kerror = krb5_rd_req(c, &auth_context, &packet,
223 /* possibly ticket and packet need freeing here as well */
  /src/usr.sbin/timed/timed/
measure.c 85 u_char packet[PACKET_IN]; local
115 ret = recvfrom(sock_raw, (char *)packet, PACKET_IN, 0,
190 ret = recvfrom(sock_raw, (char *)packet, PACKET_IN, 0,
201 memcpy(&ip, packet, sizeof(ip));
207 memcpy(&icp, &packet[ip.ip_hl << 2],
  /src/external/bsd/nsd/dist/
xfrd-notify.c 18 #include "packet.h"
155 reply_pkt_is_ack(struct notify_zone* zone, buffer_type* packet, int index)
157 if((OPCODE(packet) != OPCODE_NOTIFY) ||
158 (QR(packet) == 0)) {
165 if(ID(packet) != zone->pkts[index].notify_query_id) {
171 if(RCODE(packet) != RCODE_OK) {
173 zone->apex_str, rcode2str(RCODE(packet)),
175 if(RCODE(packet) == RCODE_IMPL)
251 xfrd_handle_notify_reply(struct notify_zone* zone, buffer_type* packet,
262 if(reply_pkt_is_ack(zone, packet, i))
278 buffer_type* packet = xfrd_get_temp_buffer(); local
427 buffer_type* packet = xfrd_get_temp_buffer(); local
    [all...]
  /src/external/bsd/ppp/dist/pppd/
demand.c 70 struct packet { struct
72 struct packet *next;
76 struct packet *pend_q;
77 struct packet *pend_qtail;
145 struct packet *pkt, *nextpkt;
271 * We apply the active_filter to see if we want this packet to
277 struct packet *pkt;
287 pkt = (struct packet *) malloc(sizeof(struct packet) + len);
308 struct packet *pkt, *prev, *nextpkt
    [all...]
  /src/sys/arch/hpcmips/dev/
optpoint.c 63 char packet[4]; member in struct:optpoint_softc
64 int index; /* number of bytes received for this packet */
159 memset(sc->packet, 0, 3);
170 sc->packet[sc->index++] = data;
172 u_int newbuttons = ((sc->packet[1] & LBUTMASK) ? 0x1 : 0)
173 | ((sc->packet[1] & RBUTMASK) ? 0x2 : 0);
174 int dx = sc->packet[2];
175 int dy = sc->packet[0];
188 memset(sc->packet, 0, 3);
210 sc->packet[0] = 0xf5; /* Disable *
    [all...]
  /src/sys/arch/sgimips/dev/
zs_ms.c 72 /* 5-byte packet as described above */
78 int8_t packet[5]; member in struct:zsms_softc
228 * Here's the real action. Read a full packet and
237 sc->packet[ZSMS_PACKET_SYNC] = c;
243 sc->packet[ZSMS_PACKET_X1] = c;
248 sc->packet[ZSMS_PACKET_Y1] = c;
253 sc->packet[ZSMS_PACKET_X2] = c;
258 sc->packet[ZSMS_PACKET_Y2] = c;
281 btns = (uint8_t)sc->packet[ZSMS_PACKET_SYNC] & ZSMS_SYNC_BTN_MASK;
290 x = (int)sc->packet[ZSMS_PACKET_X1] + (int)sc->packet[ZSMS_PACKET_X2]
    [all...]
  /src/tests/net/net/
t_ip_reass.c 106 struct lopacket *packet; local
109 pktlen = sizeof(*packet) + payloadlen;
110 packet = malloc(pktlen);
111 ATF_REQUIRE(packet != NULL);
113 memset(packet, 0, pktlen);
114 packet->family = AF_INET;
116 ip = &packet->hdr;
130 return (packet);
134 free_lopacket(struct lopacket *packet)
137 free(packet);
    [all...]

Completed in 47 milliseconds

1 2 3 4 5