Lines Matching defs:from

17  * from this software without specific prior written permission.
137 * targets obtained from the routing table, is still valid, so the
296 * we can do from here.
348 * probe targets become disjoint from the rtt probe targets.
364 * Incoming IPv4 data from wire, is received here. Called from main.
369 struct sockaddr_in from;
391 msg.msg_name = (struct sockaddr *)&from;
392 msg.msg_namelen = sizeof (from);
413 (void) inet_ntop(AF_INET, &from.sin_addr, abuf, sizeof (abuf));
418 logdebug("Truncated message: msg_flags 0x%x from %s\n",
430 " from %s\n", len, abuf);
437 * reply, starting from the icmp hdr.
458 logtrace("probe reply code %d from %s on %s\n",
464 logtrace("probe reply too short: %d bytes from %s on %s\n",
471 logtrace("message without timestamp from %s on %s\n",
476 IN6_INADDR_TO_V4MAPPED(&from.sin_addr, &fromaddr);
487 logtrace("probe reply type: %d from %s on %s\n",
494 * Incoming IPv6 data from wire is received here. Called from main.
499 struct sockaddr_in6 from;
519 msg.msg_name = (struct sockaddr *)&from;
520 msg.msg_namelen = sizeof (from);
537 (void) inet_ntop(AF_INET6, &from.sin6_addr, abuf, sizeof (abuf));
540 logdebug("Truncated message: msg_flags 0x%x from %s\n",
548 logdebug("Truncated message: msg_flags 0x%x from %s\n",
566 if (!IN6_IS_ADDR_LINKLOCAL(&from.sin6_addr)) {
567 logtrace("ICMPv6 echo reply source address not linklocal from "
574 logtrace("message with routing header from %s on %s\n",
580 logtrace("probe reply code: %d from %s on %s\n",
585 logtrace("probe reply too short: %d bytes from %s on %s\n",
592 logtrace("message without timestamp from %s on %s\n",
598 incoming_echo_reply(pii, reply, from.sin6_addr, recv_tvp);
600 incoming_mcast_reply(pii, reply, from.sin6_addr);
602 incoming_rtt_reply(pii, reply, from.sin6_addr);
605 logtrace("probe reply type: %d from %s on %s\n",
709 hrtime_t cur_hrtime; /* in ns from some arbitrary point */
734 logtrace("out of window probe seq %u snxt %u on %s from %s\n",
778 "snxt %u on %s from %s\n",
790 "snxt %u on %s from %s\n",
808 "snxt %u on %s from %s\n",
1002 * Start from the most recent probe and walk back, trying to find
1151 * Guard against response from 0.0.0.0
1154 logtrace("probe response from %s on %s\n",
1186 * and a new rtt time. The formula is from Jacobson and Karels'
1987 * Process any changes in link state passed up from the interfaces.
2079 * will eventually remove this target (if router) from the
2178 * If failure was detected via a link down notification sent from
2187 /* Exclude ourself from comparison */
2606 * Get the current flags from the kernel, and set/clear the
2664 * back all the carry bits from the top 16 bits into the lower
2679 * add back carry outs from top 16 bits to low 16 bits