/osnet-11/usr/src/grub/grub-0.97/netboot/ |
H A D | nic.h | 33 unsigned char *packet; member in struct:nic
|
H A D | e1000.c | 91 static char packet[2096]; variable 3361 rd->buffer_addr = virt_to_bus(&packet); 3440 /* return true if there's an ethernet packet ready to read */ 3441 /* nic->packet should contain data on return */ 3451 // printf("recv: packet %! -> %! len=%d \n", packet+6, packet,rd->Length); 3452 memcpy (nic->packet, packet, rd->length); 3467 /* send the packet t [all...] |
H A D | eepro100.c | 78 * looks at the recieve buffer to see if there is already a packet there. 249 char packet[1518]; member in struct:RxFD 378 * This transmits a packet. 382 * unsigned short s: size of the data-part of the packet. 383 * char *p: the data for the packet. 402 printf ("transmitting type %hX packet (%d bytes). status = %hX, cmd=%hX\n", 471 * This recieves a packet from the network. 475 * returns: 1 if a packet was recieved. 478 * returns the packet in the array nic->packet [all...] |
H A D | tg3.c | 1704 /* Initialize tx/rx rings for packet processing. 2994 /* return true if there's an ethernet packet ready to read */ 2995 /* nic->packet should contain data on return */ 3016 memcpy(nic->packet, bus_to_virt(desc->addr_lo), len); 3056 unsigned int type, unsigned int size, const char *packet) 3066 /* send the packet to destination */ 3072 /* Wait until there is a free packet frame */ 3091 /* Copy the packet to the our local buffer */ 3096 memcpy(&frame[frame_idx].data, packet, size); 3205 * on descriptor entries, anything which isn't packet dat 3055 tg3_transmit(struct nic *nic, const char *dst_addr, unsigned int type, unsigned int size, const char *packet) argument [all...] |
/osnet-11/usr/src/lib/libresolv2/common/resolv/ |
H A D | res_update.c | 56 * Create a dynamic update packet for each zone and send it to the 97 u_char *packet; local 103 packet = malloc(NS_MAXMSG); 104 if (packet == NULL) { 160 packet, NS_MAXMSG); 171 n = res_nsendsigned(statp, packet, n, key, 174 n = res_nsend(statp, packet, n, answer, sizeof answer); 198 free(packet);
|
/osnet-11/usr/src/lib/krb5/kadm5/clnt/ |
H A D | chpw.c | 22 krb5_data *packet) 43 packet->length = 6 + ap_req->length + cipherpw.length; 44 packet->data = (char *) malloc(packet->length); 45 if (packet->data == NULL) 50 ptr = packet->data; 54 *ptr++ = (packet->length>> 8) & 0xff; 55 *ptr++ = packet->length & 0xff; 87 krb5int_rd_chpw_rep(krb5_context context, krb5_auth_context auth_context, krb5_data *packet, int *result_code, krb5_data *result_data) argument 101 if (packet 17 krb5int_mk_chpw_req( krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | chpw.c | 16 krb5_data *packet) 37 packet->length = 6 + ap_req->length + cipherpw.length; 38 packet->data = (char *) malloc(packet->length); 39 if (packet->data == NULL) { 43 ptr = packet->data; 47 store_16_be(packet->length, ptr); 78 krb5_data *packet, int *result_code, krb5_data *result_data) 91 if (packet->length < 4) 96 ptr = packet 12 krb5int_mk_chpw_req(krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, char *passwd, krb5_data *packet) argument 77 krb5int_rd_chpw_rep(krb5_context context, krb5_auth_context auth_context, krb5_data *packet, int *result_code, krb5_data *result_data) argument 264 krb5int_mk_setpw_req(krb5_context context, krb5_auth_context auth_context, krb5_data *ap_req, krb5_principal targprinc, char *passwd, krb5_data *packet) argument 338 krb5int_rd_setpw_rep(krb5_context context, krb5_auth_context auth_context, krb5_data *packet, int *result_code, krb5_data *result_data) argument [all...] |
H A D | get_in_tkt.c | 148 * reponse is a KRB_ERROR or a KRB_AS_REP packet. If it is some other 159 krb5_data *packet, 176 k4_version = packet->data[0]; 181 * krb5_kdc_req encoded in "packet". 183 retval = krb5_sendto_kdc(context, packet, request, 246 /* It must be a KRB_AS_REP message, or an bad returned packet */ 493 krb5_data * packet; local 526 if ((retval = encode_krb5_ticket(as_reply->ticket, &packet))) 529 creds->ticket = *packet; 530 free(packet); 158 send_as_request(krb5_context context, krb5_data *packet, krb5_kdc_req *request, const krb5_data *realm, krb5_error ** ret_err_reply, krb5_kdc_rep ** ret_as_reply, int *use_master) argument [all...] |
/osnet-11/usr/src/lib/libslp/javalib/com/sun/slp/ |
H A D | RequestHandler.java | 56 private DatagramPacket packet = null; // Packet for datagram requests. field in class:RequestHandler 122 // Request arrived via datagram. Set the incoming packet, spawn 137 packet = packet_in; 138 clientAddr = packet.getAddress(); 139 port = packet.getPort(); 237 byte[] inbuf = packet.getData(); 439 // Format the outgoing packet. 655 * @param dis The input stream containing the packet. 709 // otherwise, the packet is from an earlier version 732 // If we've come via TCP, clear the packet lengt [all...] |
/osnet-11/usr/src/lib/libfru/libfrupicl/ |
H A D | frupicl.c | 1066 picl_prophdl_t packet, payloadh = 0; local 1087 &packet, sizeof (packet))) 1093 while ((status = picl_get_next_by_col(packet, &packet)) 1095 if (((status = picl_get_propval(packet, &tag, sizeof (tag))) 1097 ((status = picl_get_next_by_row(packet, &payloadh))
|
/osnet-11/usr/src/lib/libfru/libfrupicltree/ |
H A D | frupicltree.c | 1081 picl_prophdl_t packet, payloadh = 0; local 1102 &packet, sizeof (packet))) 1108 while ((status = ptree_get_next_by_col(packet, &packet)) 1110 if (((status = ptree_get_propval(packet, &tag, sizeof (tag))) 1112 ((status = ptree_get_next_by_row(packet, &payloadh))
|
/osnet-11/usr/src/lib/libfru/libfruraw/ |
H A D | raw_access.c | 242 /* add the packet object in the end of list */ 755 /* traverse the packet object list for all the tags and payload */ 1033 fru_get_packets(segment_hdl_t segment, packet_t *packet, int maxpackets, argument 1055 for (count = 0; count < maxpackets; count++, packet++) { 1056 packet->handle = pkt_hash_obj->obj_hdl; 1057 packet->tag = 0; 1058 (void) memcpy(&packet->tag, &pkt_hash_obj->u.pkt_obj->tag, 1068 fru_get_payload(packet_hdl_t packet, void *buffer, size_t nbytes, argument 1073 /* packet hash object */ 1074 packet_hash_obj = lookup_handle_object(packet, PACKET_TYP [all...] |
/osnet-11/usr/src/lib/libsmbns/common/ |
H A D | smbns_netbios_name.c | 48 * A REQUEST packet is always sent to the well known UDP port 137. 51 * initialization time. In rare cases, a request packet will be sent to 54 * A RESPONSE packet is always sent to the source UDP port and source IP 55 * address of the request packet. 57 * A DEMAND packet must always be sent to the well known UDP port 137. 129 struct name_packet *packet; member in struct:nbt_name_reply 158 struct name_packet *packet); 189 struct name_packet packet; local 193 * The response packet has in it the address of the presumed owner 199 if ((answer = reply_info->packet 292 smb_reply_ready(struct name_packet *packet, addr_entry_t *addr) argument 323 smb_netbios_process_response(uint16_t tid, addr_entry_t *addr, struct name_packet *packet, uint32_t timeout) argument 896 smb_send_name_service_packet(addr_entry_t *addr, struct name_packet *packet) argument 922 smb_netbios_send_rcv(int bcast, addr_entry_t *destination, struct name_packet *packet, uint32_t retries, uint32_t timeout) argument 966 struct name_packet packet; local 1041 struct name_packet packet; local 1135 struct name_packet packet; local 1176 struct name_packet packet; local 1224 struct name_packet packet; local 1262 struct name_packet packet; local 1325 struct name_packet packet; local 1385 struct name_packet packet; local 1829 smb_name_process_Bnode_packet(struct name_packet *packet, addr_entry_t *addr) argument 1909 smb_name_process_Pnode_packet(struct name_packet *packet, addr_entry_t *addr) argument 2008 smb_name_process_Mnode_packet(struct name_packet *packet, addr_entry_t *addr) argument 2017 smb_name_process_Hnode_packet(struct name_packet *packet, addr_entry_t *addr) argument 2184 struct name_packet *packet; local [all...] |