/src/sys/rump/net/lib/libnetinet6/ |
Makefile.inc | 11 ip6_forward.c ip6_input.c ip6_mroute.c ip6_output.c \
|
/src/sys/net/npf/ |
npf_sendpkt.c | 66 #define ip6_output(...) 0 macro 207 return ip6_output(m, NULL, NULL, IPV6_FORWARDING, NULL, NULL, NULL);
|
/src/sys/netinet6/ |
in6_gif.c | 162 #if 0 /* ip6->ip6_plen will be filled by ip6_output */ 249 error = ip6_output(m, 0, ro_pc, flags, NULL, NULL, NULL); 251 error = ip6_output(m, 0, ro_pc, 0, NULL, NULL, NULL);
|
ip6_var.h | 245 /* flags passed to ip6_output as last parameter */ 319 int ip6_output(struct mbuf *, struct ip6_pktopts *, struct route *, int,
|
in6_l2tp.c | 136 /* unlike IPv4, IP version must be filled by caller of ip6_output() */ 223 error = ip6_output(m, 0, ro_pc, 0, NULL, NULL, NULL);
|
nd6_nbr.c | 582 ip6_output(m, NULL, &ro, nonce != NULL ? IPV6_UNSPECSRC : 0, 1039 ip6_output(m, NULL, NULL, 0, &im6o, NULL, NULL);
|
raw_ip6.c | 363 * Generate IPv6 header and pass packet to ip6_output. 464 /* ip6_plen will be filled in ip6_output, so not fill it here. */ 507 error = ip6_output(m, optp, &inp->inp_route, 0,
|
mld6.c | 543 * will release in6_multilock before calling ip6_output and 544 * returning to avoid locking against myself in ip6_output. 625 /* XXX we cannot call ip6_output with holding in6_multilock */ 628 ip6_output(mh, &ip6_opts, NULL, ia ? 0 : IPV6_UNSPECSRC,
|
icmp6.c | 1135 * hack in ip6_output/ip6_setpmtu where we always include a frag header. 2216 if (ip6_output(m, NULL, NULL, flags, NULL, NULL, &outif) != 0 && 2718 if (ip6_output(m, NULL, NULL, 0, NULL, NULL, NULL) != 0)
|
udp6_usrreq.c | 995 #if 0 /* ip6_plen will be filled in ip6_output. */ 1009 error = ip6_output(m, optp, &inp->inp_route, 0,
|
ip6_mroute.c | 1539 * so that ip6_output() only scribbles on the copy. 1553 * If we sourced the packet, call ip6_output since we may divide 1563 /* XXX: ip6_output will override ip6->ip6_hlim */ 1566 error = ip6_output(mb_copy, NULL, &ro, IPV6_FORWARDING,
|
ip6_output.c | 1 /* $NetBSD: ip6_output.c,v 1.235 2024/04/19 00:55:35 riastradh Exp $ */ 2 /* $KAME: ip6_output.c,v 1.172 2001/03/25 09:55:56 itojun Exp $ */ 65 __KERNEL_RCSID(0, "$NetBSD: ip6_output.c,v 1.235 2024/04/19 00:55:35 riastradh Exp $"); 199 ip6_output( function in typeref:typename:int 238 panic("ip6_output: no HDR"); 241 panic("ip6_output: IPv4 checksum offload flags: %d", 246 panic("ip6_output: conflicting checksum offload flags: %d", 3230 * Routine called from ip6_output() to loop back a copy of an IP6 multicast
|
/src/sys/netipsec/ |
ipsec_output.c | 130 rv = ip6_output(m, NULL, ro, flags, NULL, NULL, NULL);
|
ipsecif.c | 586 #if 0 /* ip6->ip6_plen will be filled by ip6_output */ 685 error = ip6_output(m, 0, ro_pc, flags, 0, NULL, NULL);
|
/src/sys/netinet/ |
tcp_syncache.c | 1155 /* ip6_plen will be updated in ip6_output() */ 1348 error = ip6_output(m, NULL /*XXX*/, ro, 0, NULL,
|
tcp_output.c | 1568 /* ip6_plen will be filled in ip6_output(). */ 1599 error = ip6_output(m, opts, ro, so->so_options & SO_DONTROUTE,
|
tcp_subr.c | 860 error = ip6_output(m, NULL, ro, 0, NULL,
|
dccp_usrreq.c | 1506 error = ip6_output(m, in6p_outputopts(inp), &inp->inp_route,
|
ip_carp.c | 1208 error = ip6_output(m, NULL, NULL, 0, &sc->sc_im6o, NULL, NULL); 1213 CARP_LOG(sc, ("ip6_output failed: %d", error));
|
sctp_output.c | 2446 ret = ip6_output(m, ((struct in6pcb *)inp)->in6p_outputopts, 8140 printf("sctp_shutdown_complete2 calling ip6_output:\n"); 8145 ip6_output(mout, NULL, &ro, 0, NULL, NULL, NULL); 9078 printf("sctp_send_abort calling ip6_output:\n"); 9082 ip6_output(mout, NULL, &ro, 0, NULL, NULL, NULL); 9193 ip6_output(scm, NULL, &ro, 0, NULL, NULL, NULL);
|
/src/sys/dist/pf/net/ |
pf.c | 1844 ip6_output(m, NULL, NULL, 0, NULL, NULL, NULL); 5514 ip6_output(m0, NULL, NULL, 0, NULL, NULL, NULL);
|