Searched refs:packet (Results 1 - 25 of 39) sorted by relevance

12

/osnet-11/usr/src/lib/libsmbns/common/
H A Dsmbns_netbios_name.c48 * A REQUEST packet is always sent to the well known UDP port 137.
51 * initialization time. In rare cases, a request packet will be sent to
54 * A RESPONSE packet is always sent to the source UDP port and source IP
55 * address of the request packet.
57 * A DEMAND packet must always be sent to the well known UDP port 137.
129 struct name_packet *packet; member in struct:nbt_name_reply
158 struct name_packet *packet);
189 struct name_packet packet; local
193 * The response packet has in it the address of the presumed owner
199 if ((answer = reply_info->packet
292 smb_reply_ready(struct name_packet *packet, addr_entry_t *addr) argument
323 smb_netbios_process_response(uint16_t tid, addr_entry_t *addr, struct name_packet *packet, uint32_t timeout) argument
896 smb_send_name_service_packet(addr_entry_t *addr, struct name_packet *packet) argument
922 smb_netbios_send_rcv(int bcast, addr_entry_t *destination, struct name_packet *packet, uint32_t retries, uint32_t timeout) argument
966 struct name_packet packet; local
1041 struct name_packet packet; local
1135 struct name_packet packet; local
1176 struct name_packet packet; local
1224 struct name_packet packet; local
1262 struct name_packet packet; local
1325 struct name_packet packet; local
1385 struct name_packet packet; local
1829 smb_name_process_Bnode_packet(struct name_packet *packet, addr_entry_t *addr) argument
1909 smb_name_process_Pnode_packet(struct name_packet *packet, addr_entry_t *addr) argument
2008 smb_name_process_Mnode_packet(struct name_packet *packet, addr_entry_t *addr) argument
2017 smb_name_process_Hnode_packet(struct name_packet *packet, addr_entry_t *addr) argument
2184 struct name_packet *packet; local
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dchpw.c16 krb5_data *packet)
37 packet->length = 6 + ap_req->length + cipherpw.length;
38 packet->data = (char *) malloc(packet->length);
39 if (packet->data == NULL) {
43 ptr = packet->data;
47 store_16_be(packet->length, ptr);
78 krb5_data *packet, int *result_code, krb5_data *result_data)
91 if (packet->length < 4)
96 ptr = packet
12 krb5int_mk_chpw_req(krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument
77 krb5int_rd_chpw_rep(krb5_context context, krb5_auth_context auth_context, krb5_data *packet, int *result_code, krb5_data *result_data) argument
264 krb5int_mk_setpw_req(krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, krb5_principal targprinc, char *passwd, krb5_data *packet) argument
338 krb5int_rd_setpw_rep(krb5_context context, krb5_auth_context auth_context, krb5_data *packet, int *result_code, krb5_data *result_data) argument
[all...]
H A Dget_in_tkt.c148 * reponse is a KRB_ERROR or a KRB_AS_REP packet. If it is some other
159 krb5_data *packet,
176 k4_version = packet->data[0];
181 * krb5_kdc_req encoded in "packet".
183 retval = krb5_sendto_kdc(context, packet, request,
246 /* It must be a KRB_AS_REP message, or an bad returned packet */
493 krb5_data * packet; local
526 if ((retval = encode_krb5_ticket(as_reply->ticket, &packet)))
529 creds->ticket = *packet;
530 free(packet);
158 send_as_request(krb5_context context, krb5_data *packet, krb5_kdc_req *request, const krb5_data *realm, krb5_error ** ret_err_reply, krb5_kdc_rep ** ret_as_reply, int *use_master) argument
[all...]
/osnet-11/usr/src/lib/krb5/kadm5/clnt/
H A Dchpw.c22 krb5_data *packet)
43 packet->length = 6 + ap_req->length + cipherpw.length;
44 packet->data = (char *) malloc(packet->length);
45 if (packet->data == NULL)
50 ptr = packet->data;
54 *ptr++ = (packet->length>> 8) & 0xff;
55 *ptr++ = packet->length & 0xff;
87 krb5int_rd_chpw_rep(krb5_context context, krb5_auth_context auth_context, krb5_data *packet, int *result_code, krb5_data *result_data) argument
101 if (packet
17 krb5int_mk_chpw_req( krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument
[all...]
H A Dchangepw.c48 krb5_data *packet);
52 krb5_data *packet, int *result_code,
/osnet-11/usr/src/lib/libfru/libfruraw/
H A Dfru_access.h73 packet_hdl_t handle; /* for use in operations on packet */
97 int fru_get_packets(segment_hdl_t segment, packet_t *packet,
99 ssize_t fru_get_payload(packet_hdl_t packet, void *buffer,
101 int fru_update_payload(packet_hdl_t packet, const void *data, size_t nbytes,
103 int fru_append_packet(segment_hdl_t segment, packet_t *packet,
106 int fru_delete_packet(packet_hdl_t packet, segment_hdl_t *newsegment,
H A Draw_access.c242 /* add the packet object in the end of list */
755 /* traverse the packet object list for all the tags and payload */
1033 fru_get_packets(segment_hdl_t segment, packet_t *packet, int maxpackets, argument
1055 for (count = 0; count < maxpackets; count++, packet++) {
1056 packet->handle = pkt_hash_obj->obj_hdl;
1057 packet->tag = 0;
1058 (void) memcpy(&packet->tag, &pkt_hash_obj->u.pkt_obj->tag,
1068 fru_get_payload(packet_hdl_t packet, void *buffer, size_t nbytes, argument
1073 /* packet hash object */
1074 packet_hash_obj = lookup_handle_object(packet, PACKET_TYP
[all...]
/osnet-11/usr/src/lib/libresolv2/common/resolv/
H A Dres_update.c56 * Create a dynamic update packet for each zone and send it to the
97 u_char *packet; local
103 packet = malloc(NS_MAXMSG);
104 if (packet == NULL) {
160 packet, NS_MAXMSG);
171 n = res_nsendsigned(statp, packet, n, key,
174 n = res_nsend(statp, packet, n, answer, sizeof answer);
198 free(packet);
/osnet-11/usr/src/grub/grub-0.97/netboot/
H A Dnic.h33 unsigned char *packet; member in struct:nic
H A Dw89c840.c108 bonding and packet priority.
115 full-size packet.
381 /* return true if there's an ethernet packet ready to read */
382 /* nic->packet should contain data on return */
449 /* Check if the packet is long enough to accept without copying
452 memcpy(nic->packet, le32desc_to_virt(w840private.rx_ring[entry].buffer1), pkt_len);
463 nic->packet[0], nic->packet[1], nic->packet[2], nic->packet[
[all...]
H A D3c595.c179 len=s+ETH_HLEN; /* actual length of packet */
208 /* write packet */
265 /* read packet */
269 insw(BASE + VX_W1_RX_PIO_RD_1, nic->packet, rx_fifo / 2);
271 nic->packet[rx_fifo-1]=inb(BASE + VX_W1_RX_PIO_RD_1);
282 insw(BASE + VX_W1_RX_PIO_RD_1, nic->packet+nic->packetlen, rx_fifo / 2);
284 nic->packet[nic->packetlen+rx_fifo-1]=inb(BASE + VX_W1_RX_PIO_RD_1);
299 /* acknowledge reception of packet */
305 type = (nic->packet[12]<<8) | nic->packet[1
[all...]
H A Drtl8139.c49 get the next packet. Oh well, what fun.
109 RxCnt=0x72, /* packet received counter */
433 /* There is a packet ready */
456 /* Received a good packet */
461 memcpy(nic->packet, rx_ring + ring_offs + 4, semi_count);
462 memcpy(nic->packet+semi_count, rx_ring, rx_size-4-semi_count);
464 printf("rx packet %d+%d bytes", semi_count,rx_size-4-semi_count);
467 memcpy(nic->packet, rx_ring + ring_offs + 4, nic->packetlen);
469 printf("rx packet %d bytes", rx_size-4);
475 nic->packet[1
[all...]
H A Dnic.c116 * (the ip hdr and arp requests) we offset the packet by 2 bytes.
120 static char packet[ETH_FRAME_LEN + ETH_DATA_ALIGN] __aligned;
147 packet + ETH_DATA_ALIGN, /* packet */
286 arpreply = (struct arprequest *)&nic.packet[ETH_HLEN];
395 /* Sum the rest of the udp packet */
463 arpreply = (struct arprequest *)&nic.packet[ETH_HLEN];
480 /* arp and rarp requests share the same packet structure. */
535 &nic.packet[ETH_HLEN + sizeof(struct iphdr) + sizeof(struct udphdr)];
632 &nic.packet[ETH_HLE
[all...]
H A Deepro100.c78 * looks at the recieve buffer to see if there is already a packet there.
249 char packet[1518]; member in struct:RxFD
378 * This transmits a packet.
382 * unsigned short s: size of the data-part of the packet.
383 * char *p: the data for the packet.
402 printf ("transmitting type %hX packet (%d bytes). status = %hX, cmd=%hX\n",
471 * This recieves a packet from the network.
475 * returns: 1 if a packet was recieved.
478 * returns the packet in the array nic->packet
[all...]
H A Dfsys_tftp.c141 tr = (struct tftp_t *)&nic.packet[ETH_HLEN];
195 /* the packet does not get */
290 tr = (struct tftp_t *) &nic.packet[ETH_HLEN];
372 /* This ensures that the packet does not get processed as
477 /* Send the packet. */
615 /* Construct the TFTP request packet. */
626 /* Save the TFTP packet so that we can reopen the file later. */
699 buf = (char *)&nic.packet;
H A Dpnic.c135 * have to read out the packet, otherwise it's lost forever.
142 /* There is a packet ready. Return 1 if we're only checking. */
145 /* Retrieve the packet */
147 nic->packet, ETH_FRAME_LEN, &length )
166 printf ( "pnic_transmit: packet too large\n" );
170 /* Assemble packet */
H A Depic100.c292 * This transmits a packet.
296 * unsigned short s: size of the data-part of the packet.
297 * char *p: the data for the packet.
356 * This receives a packet from the network.
360 * returns: 1 if a packet was received.
363 * returns the packet in the array nic->packet.
364 * returns the length of the packet in nic->packetlen.
381 /* We own the next entry, it's a new packet. Send it up. */
389 printf("epic_poll: Giant packet\
[all...]
H A D3c90x.c466 /*** a3c90x_transmit: exported function that transmits a packet. Does not
470 *** s - size of the non-header part of the packet that needs transmitted;
471 *** p - the pointer to the packet data itself.
501 /** Set the ethernet packet type **/
519 /** Send the packet **/
597 *** for a packet, and if it sees none, returns 0. This routine should
598 *** copy the packet to nic->packet if it gets a packet and set the size
599 *** in nic->packetlen. Return 1 if a packet wa
[all...]
H A Ddavicom.c439 it transmit a packet and wait complete every time. */
608 /* copy packet to working buffer */
613 memcpy(nic->packet, rxb + rxd_tail * BUFLEN, nic->packetlen);
640 /* Clear the missed-packet counter. */
689 /* Clear the missed-packet counter. */
H A De1000.c91 static char packet[2096]; variable
3361 rd->buffer_addr = virt_to_bus(&packet);
3440 /* return true if there's an ethernet packet ready to read */
3441 /* nic->packet should contain data on return */
3451 // printf("recv: packet %! -> %! len=%d \n", packet+6, packet,rd->Length);
3452 memcpy (nic->packet, packet, rd->length);
3467 /* send the packet t
[all...]
H A Dnatsemi.c592 * Description: transmits a packet and waits for completion or timeout.
596 * unsigned short s: size of the data-part of the packet.
597 * char *p: the data for the packet.
633 /* pad to minimum packet size */
645 printf("natsemi_transmit: Queued Tx packet size %d.\n", (int) s);
663 * Description: checks for a received packet and returns it if found.
667 * Returns: 1 if packet was received.
668 * 0 if no packet was received.
671 * Returns (copies) the packet to the array nic->packet
[all...]
/osnet-11/usr/src/lib/libfru/libfrupicl/
H A Dfrupicl.c1066 picl_prophdl_t packet, payloadh = 0; local
1087 &packet, sizeof (packet)))
1093 while ((status = picl_get_next_by_col(packet, &packet))
1095 if (((status = picl_get_propval(packet, &tag, sizeof (tag)))
1097 ((status = picl_get_next_by_row(packet, &payloadh))
/osnet-11/usr/src/lib/libfru/libfrupicltree/
H A Dfrupicltree.c1081 picl_prophdl_t packet, payloadh = 0; local
1102 &packet, sizeof (packet)))
1108 while ((status = ptree_get_next_by_col(packet, &packet))
1110 if (((status = ptree_get_propval(packet, &tag, sizeof (tag)))
1112 ((status = ptree_get_next_by_row(packet, &payloadh))
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Net/
H A DPing.pm29 $max_datasize = 1024; # Maximum data bytes in a packet
69 # included in the packet.
398 use constant ICMP_ECHOREPLY => 0; # ICMP packet types
400 use constant ICMP_STRUCT => "C2 n3 A"; # Structure of a minimal ICMP packet
413 $checksum, # Checksum of ICMP packet
414 $msg, # ICMP packet to send
423 $from_port, # Port packet was sent from
427 $from_chk, # ICMP packet checksum
428 $from_pid, # ICMP packet id
429 $from_seq, # ICMP packet sequenc
[all...]
/osnet-11/usr/src/lib/libslp/javalib/com/sun/slp/
H A DRequestHandler.java56 private DatagramPacket packet = null; // Packet for datagram requests. field in class:RequestHandler
122 // Request arrived via datagram. Set the incoming packet, spawn
137 packet = packet_in;
138 clientAddr = packet.getAddress();
139 port = packet.getPort();
237 byte[] inbuf = packet.getData();
439 // Format the outgoing packet.
655 * @param dis The input stream containing the packet.
709 // otherwise, the packet is from an earlier version
732 // If we've come via TCP, clear the packet lengt
[all...]

Completed in 107 milliseconds

12