/osnet-11/usr/src/lib/libsmbns/common/ |
H A D | smbns_netbios_name.c | 48 * A REQUEST packet is always sent to the well known UDP port 137. 51 * initialization time. In rare cases, a request packet will be sent to 54 * A RESPONSE packet is always sent to the source UDP port and source IP 55 * address of the request packet. 57 * A DEMAND packet must always be sent to the well known UDP port 137. 129 struct name_packet *packet; member in struct:nbt_name_reply 158 struct name_packet *packet); 189 struct name_packet packet; local 193 * The response packet has in it the address of the presumed owner 199 if ((answer = reply_info->packet 292 smb_reply_ready(struct name_packet *packet, addr_entry_t *addr) argument 323 smb_netbios_process_response(uint16_t tid, addr_entry_t *addr, struct name_packet *packet, uint32_t timeout) argument 896 smb_send_name_service_packet(addr_entry_t *addr, struct name_packet *packet) argument 922 smb_netbios_send_rcv(int bcast, addr_entry_t *destination, struct name_packet *packet, uint32_t retries, uint32_t timeout) argument 966 struct name_packet packet; local 1041 struct name_packet packet; local 1135 struct name_packet packet; local 1176 struct name_packet packet; local 1224 struct name_packet packet; local 1262 struct name_packet packet; local 1325 struct name_packet packet; local 1385 struct name_packet packet; local 1829 smb_name_process_Bnode_packet(struct name_packet *packet, addr_entry_t *addr) argument 1909 smb_name_process_Pnode_packet(struct name_packet *packet, addr_entry_t *addr) argument 2008 smb_name_process_Mnode_packet(struct name_packet *packet, addr_entry_t *addr) argument 2017 smb_name_process_Hnode_packet(struct name_packet *packet, addr_entry_t *addr) argument 2184 struct name_packet *packet; local [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | chpw.c | 16 krb5_data *packet) 37 packet->length = 6 + ap_req->length + cipherpw.length; 38 packet->data = (char *) malloc(packet->length); 39 if (packet->data == NULL) { 43 ptr = packet->data; 47 store_16_be(packet->length, ptr); 78 krb5_data *packet, int *result_code, krb5_data *result_data) 91 if (packet->length < 4) 96 ptr = packet 12 krb5int_mk_chpw_req(krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument 77 krb5int_rd_chpw_rep(krb5_context context, krb5_auth_context auth_context, krb5_data *packet, int *result_code, krb5_data *result_data) argument 264 krb5int_mk_setpw_req(krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, krb5_principal targprinc, char *passwd, krb5_data *packet) argument 338 krb5int_rd_setpw_rep(krb5_context context, krb5_auth_context auth_context, krb5_data *packet, int *result_code, krb5_data *result_data) argument [all...] |
H A D | get_in_tkt.c | 148 * reponse is a KRB_ERROR or a KRB_AS_REP packet. If it is some other 159 krb5_data *packet, 176 k4_version = packet->data[0]; 181 * krb5_kdc_req encoded in "packet". 183 retval = krb5_sendto_kdc(context, packet, request, 246 /* It must be a KRB_AS_REP message, or an bad returned packet */ 493 krb5_data * packet; local 526 if ((retval = encode_krb5_ticket(as_reply->ticket, &packet))) 529 creds->ticket = *packet; 530 free(packet); 158 send_as_request(krb5_context context, krb5_data *packet, krb5_kdc_req *request, const krb5_data *realm, krb5_error ** ret_err_reply, krb5_kdc_rep ** ret_as_reply, int *use_master) argument [all...] |
/osnet-11/usr/src/lib/krb5/kadm5/clnt/ |
H A D | chpw.c | 22 krb5_data *packet) 43 packet->length = 6 + ap_req->length + cipherpw.length; 44 packet->data = (char *) malloc(packet->length); 45 if (packet->data == NULL) 50 ptr = packet->data; 54 *ptr++ = (packet->length>> 8) & 0xff; 55 *ptr++ = packet->length & 0xff; 87 krb5int_rd_chpw_rep(krb5_context context, krb5_auth_context auth_context, krb5_data *packet, int *result_code, krb5_data *result_data) argument 101 if (packet 17 krb5int_mk_chpw_req( krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument [all...] |
H A D | changepw.c | 48 krb5_data *packet); 52 krb5_data *packet, int *result_code,
|
/osnet-11/usr/src/lib/libfru/libfruraw/ |
H A D | fru_access.h | 73 packet_hdl_t handle; /* for use in operations on packet */ 97 int fru_get_packets(segment_hdl_t segment, packet_t *packet, 99 ssize_t fru_get_payload(packet_hdl_t packet, void *buffer, 101 int fru_update_payload(packet_hdl_t packet, const void *data, size_t nbytes, 103 int fru_append_packet(segment_hdl_t segment, packet_t *packet, 106 int fru_delete_packet(packet_hdl_t packet, segment_hdl_t *newsegment,
|
H A D | raw_access.c | 242 /* add the packet object in the end of list */ 755 /* traverse the packet object list for all the tags and payload */ 1033 fru_get_packets(segment_hdl_t segment, packet_t *packet, int maxpackets, argument 1055 for (count = 0; count < maxpackets; count++, packet++) { 1056 packet->handle = pkt_hash_obj->obj_hdl; 1057 packet->tag = 0; 1058 (void) memcpy(&packet->tag, &pkt_hash_obj->u.pkt_obj->tag, 1068 fru_get_payload(packet_hdl_t packet, void *buffer, size_t nbytes, argument 1073 /* packet hash object */ 1074 packet_hash_obj = lookup_handle_object(packet, PACKET_TYP [all...] |
/osnet-11/usr/src/lib/libresolv2/common/resolv/ |
H A D | res_update.c | 56 * Create a dynamic update packet for each zone and send it to the 97 u_char *packet; local 103 packet = malloc(NS_MAXMSG); 104 if (packet == NULL) { 160 packet, NS_MAXMSG); 171 n = res_nsendsigned(statp, packet, n, key, 174 n = res_nsend(statp, packet, n, answer, sizeof answer); 198 free(packet);
|
/osnet-11/usr/src/grub/grub-0.97/netboot/ |
H A D | nic.h | 33 unsigned char *packet; member in struct:nic
|
H A D | w89c840.c | 108 bonding and packet priority. 115 full-size packet. 381 /* return true if there's an ethernet packet ready to read */ 382 /* nic->packet should contain data on return */ 449 /* Check if the packet is long enough to accept without copying 452 memcpy(nic->packet, le32desc_to_virt(w840private.rx_ring[entry].buffer1), pkt_len); 463 nic->packet[0], nic->packet[1], nic->packet[2], nic->packet[ [all...] |
H A D | 3c595.c | 179 len=s+ETH_HLEN; /* actual length of packet */ 208 /* write packet */ 265 /* read packet */ 269 insw(BASE + VX_W1_RX_PIO_RD_1, nic->packet, rx_fifo / 2); 271 nic->packet[rx_fifo-1]=inb(BASE + VX_W1_RX_PIO_RD_1); 282 insw(BASE + VX_W1_RX_PIO_RD_1, nic->packet+nic->packetlen, rx_fifo / 2); 284 nic->packet[nic->packetlen+rx_fifo-1]=inb(BASE + VX_W1_RX_PIO_RD_1); 299 /* acknowledge reception of packet */ 305 type = (nic->packet[12]<<8) | nic->packet[1 [all...] |
H A D | rtl8139.c | 49 get the next packet. Oh well, what fun. 109 RxCnt=0x72, /* packet received counter */ 433 /* There is a packet ready */ 456 /* Received a good packet */ 461 memcpy(nic->packet, rx_ring + ring_offs + 4, semi_count); 462 memcpy(nic->packet+semi_count, rx_ring, rx_size-4-semi_count); 464 printf("rx packet %d+%d bytes", semi_count,rx_size-4-semi_count); 467 memcpy(nic->packet, rx_ring + ring_offs + 4, nic->packetlen); 469 printf("rx packet %d bytes", rx_size-4); 475 nic->packet[1 [all...] |
H A D | nic.c | 116 * (the ip hdr and arp requests) we offset the packet by 2 bytes. 120 static char packet[ETH_FRAME_LEN + ETH_DATA_ALIGN] __aligned; 147 packet + ETH_DATA_ALIGN, /* packet */ 286 arpreply = (struct arprequest *)&nic.packet[ETH_HLEN]; 395 /* Sum the rest of the udp packet */ 463 arpreply = (struct arprequest *)&nic.packet[ETH_HLEN]; 480 /* arp and rarp requests share the same packet structure. */ 535 &nic.packet[ETH_HLEN + sizeof(struct iphdr) + sizeof(struct udphdr)]; 632 &nic.packet[ETH_HLE [all...] |
H A D | eepro100.c | 78 * looks at the recieve buffer to see if there is already a packet there. 249 char packet[1518]; member in struct:RxFD 378 * This transmits a packet. 382 * unsigned short s: size of the data-part of the packet. 383 * char *p: the data for the packet. 402 printf ("transmitting type %hX packet (%d bytes). status = %hX, cmd=%hX\n", 471 * This recieves a packet from the network. 475 * returns: 1 if a packet was recieved. 478 * returns the packet in the array nic->packet [all...] |
H A D | fsys_tftp.c | 141 tr = (struct tftp_t *)&nic.packet[ETH_HLEN]; 195 /* the packet does not get */ 290 tr = (struct tftp_t *) &nic.packet[ETH_HLEN]; 372 /* This ensures that the packet does not get processed as 477 /* Send the packet. */ 615 /* Construct the TFTP request packet. */ 626 /* Save the TFTP packet so that we can reopen the file later. */ 699 buf = (char *)&nic.packet;
|
H A D | pnic.c | 135 * have to read out the packet, otherwise it's lost forever. 142 /* There is a packet ready. Return 1 if we're only checking. */ 145 /* Retrieve the packet */ 147 nic->packet, ETH_FRAME_LEN, &length ) 166 printf ( "pnic_transmit: packet too large\n" ); 170 /* Assemble packet */
|
H A D | epic100.c | 292 * This transmits a packet. 296 * unsigned short s: size of the data-part of the packet. 297 * char *p: the data for the packet. 356 * This receives a packet from the network. 360 * returns: 1 if a packet was received. 363 * returns the packet in the array nic->packet. 364 * returns the length of the packet in nic->packetlen. 381 /* We own the next entry, it's a new packet. Send it up. */ 389 printf("epic_poll: Giant packet\ [all...] |
H A D | 3c90x.c | 466 /*** a3c90x_transmit: exported function that transmits a packet. Does not 470 *** s - size of the non-header part of the packet that needs transmitted; 471 *** p - the pointer to the packet data itself. 501 /** Set the ethernet packet type **/ 519 /** Send the packet **/ 597 *** for a packet, and if it sees none, returns 0. This routine should 598 *** copy the packet to nic->packet if it gets a packet and set the size 599 *** in nic->packetlen. Return 1 if a packet wa [all...] |
H A D | davicom.c | 439 it transmit a packet and wait complete every time. */ 608 /* copy packet to working buffer */ 613 memcpy(nic->packet, rxb + rxd_tail * BUFLEN, nic->packetlen); 640 /* Clear the missed-packet counter. */ 689 /* Clear the missed-packet counter. */
|
H A D | e1000.c | 91 static char packet[2096]; variable 3361 rd->buffer_addr = virt_to_bus(&packet); 3440 /* return true if there's an ethernet packet ready to read */ 3441 /* nic->packet should contain data on return */ 3451 // printf("recv: packet %! -> %! len=%d \n", packet+6, packet,rd->Length); 3452 memcpy (nic->packet, packet, rd->length); 3467 /* send the packet t [all...] |
H A D | natsemi.c | 592 * Description: transmits a packet and waits for completion or timeout. 596 * unsigned short s: size of the data-part of the packet. 597 * char *p: the data for the packet. 633 /* pad to minimum packet size */ 645 printf("natsemi_transmit: Queued Tx packet size %d.\n", (int) s); 663 * Description: checks for a received packet and returns it if found. 667 * Returns: 1 if packet was received. 668 * 0 if no packet was received. 671 * Returns (copies) the packet to the array nic->packet [all...] |
/osnet-11/usr/src/lib/libfru/libfrupicl/ |
H A D | frupicl.c | 1066 picl_prophdl_t packet, payloadh = 0; local 1087 &packet, sizeof (packet))) 1093 while ((status = picl_get_next_by_col(packet, &packet)) 1095 if (((status = picl_get_propval(packet, &tag, sizeof (tag))) 1097 ((status = picl_get_next_by_row(packet, &payloadh))
|
/osnet-11/usr/src/lib/libfru/libfrupicltree/ |
H A D | frupicltree.c | 1081 picl_prophdl_t packet, payloadh = 0; local 1102 &packet, sizeof (packet))) 1108 while ((status = ptree_get_next_by_col(packet, &packet)) 1110 if (((status = ptree_get_propval(packet, &tag, sizeof (tag))) 1112 ((status = ptree_get_next_by_row(packet, &payloadh))
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Net/ |
H A D | Ping.pm | 29 $max_datasize = 1024; # Maximum data bytes in a packet 69 # included in the packet. 398 use constant ICMP_ECHOREPLY => 0; # ICMP packet types 400 use constant ICMP_STRUCT => "C2 n3 A"; # Structure of a minimal ICMP packet 413 $checksum, # Checksum of ICMP packet 414 $msg, # ICMP packet to send 423 $from_port, # Port packet was sent from 427 $from_chk, # ICMP packet checksum 428 $from_pid, # ICMP packet id 429 $from_seq, # ICMP packet sequenc [all...] |
/osnet-11/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | RequestHandler.java | 56 private DatagramPacket packet = null; // Packet for datagram requests. field in class:RequestHandler 122 // Request arrived via datagram. Set the incoming packet, spawn 137 packet = packet_in; 138 clientAddr = packet.getAddress(); 139 port = packet.getPort(); 237 byte[] inbuf = packet.getData(); 439 // Format the outgoing packet. 655 * @param dis The input stream containing the packet. 709 // otherwise, the packet is from an earlier version 732 // If we've come via TCP, clear the packet lengt [all...] |