Lines Matching full:packet
173 * open/read/close system call sequence per packet, approximately
197 * Check a packet against the given filter
198 * Returns 0 to accept the packet, non-zero to drop the packet.
209 FilterCheck(const unsigned char *packet,
220 u_short sport, dport; /* src, dest port from packet if (gotinfo) */
233 return 0; /* No rule is given. Permit this packet */
237 const struct ip6_hdr *pip6 = (const struct ip6_hdr *)packet;
242 payload = packet + sizeof *pip6;
248 * Deny any packet fragment that tries to over-write the header.
255 const struct ip *pip = (const struct ip *)packet;
274 payload = packet + (pip->ip_hl << 2);
476 } /* Explict match. Deny this packet */
492 return 1; /* No rule matched, deny this packet */
554 * Check if the given packet matches the given filter.
559 const unsigned char *packet, int nb, struct filter *filter,
585 const struct ip6_hdr *pip6 = (const struct ip6_hdr *)packet;
590 payload = packet + sizeof *pip6;
597 const struct ip *pip = (const struct ip *)packet;
602 payload = packet + (pip->ip_hl << 2);
682 nb - (payload - packet) - sizeof *uh - 4, filter,
749 result = PacketCheck(bundle, AF_INET6, payload, nb - (payload - packet),
770 result = PacketCheck(bundle, AF_INET, payload, nb - (payload - packet),
870 if (filter && FilterCheck(packet, family, filter, psecs)) {
881 FilterCheck(packet, family, &bundle->filter.alive, &alivesecs))
916 log_Printf(LogWARN, "ip_Input: %s: Packet too large (got %zd, max %d)\n",
961 log_Printf(LogWARN, "ipv4_Input: IPCP not open - packet dropped\n");
981 log_Printf(LogWARN, "ipv6_Input: IPV6CP not open - packet dropped\n");