|
DataMuseum.dkPresents historical artifacts from the history of: Regnecentalen RC-900 |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about Regnecentalen RC-900 Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - download
Length: 3604 (0xe14) Types: TextFile Notes: Uncompressed file
└─⟦0f0f313e4⟧ Bits:30004764 SW95709I.2F TCP/IP Update 1 └─⟦0f0f313e4⟧ UNIX Filesystem └─⟦80b31af81⟧ »SSU.4a/new/usr/include/netinet/ip_var.h.Z« └─⟦this⟧
/* * Copyright (c) 1982, 1986 Regents of the University of California. * All rights reserved. The Berkeley software License Agreement * specifies the terms and conditions for redistribution. * * @(#)ip_var.h 2.1 - 89/04/21 */ #ifndef _h_IP_VAR #define _h_IP_VAR #ident "@(#)ip_var.h 2.2 - 90/11/02" /* * Overlay for ip header used by other protocols (tcp, udp). */ struct ipovly { caddr_t ih_next, ih_prev; /* for protocol sequence q's */ u_char ih_x1; /* (unused) */ u_char ih_pr; /* protocol */ short ih_len; /* protocol length */ struct in_addr ih_src; /* source internet address */ struct in_addr ih_dst; /* destination internet address */ }; /* * Ip reassembly queue structure. Each fragment * being reassembled is attached to one of these structures. * They are timed out after ipq_ttl drops to 0, and may also * be reclaimed if memory becomes tight. */ struct ipq { mblk_t *next,*prev; /* to other reass headers */ u_char ipq_ttl; /* time for reass q to live */ u_char ipq_p; /* protocol of this fragment */ u_short ipq_id; /* sequence id for reassembly */ mblk_t *ipq_next,*ipq_prev; /* to ip headers of fragments */ struct in_addr ipq_src,ipq_dst; }; /* * Ip header, when holding a fragment. * * Note: ipf_next must be at same offset as ipq_next above */ struct ipasfrag { #if defined(vax) || defined(i386) u_char ip_hl:4, ip_v:4; #else u_char ip_v:4, ip_hl:4; #endif u_char ipf_mff; /* copied from (ip_off&IP_MF) */ short ip_len; u_short ip_id; short ip_off; u_char ip_ttl; u_char ip_p; u_short ip_sum; mblk_t *ipf_next; /* next fragment */ mblk_t *ipf_prev; /* previous fragment */ }; /* * Structure stored in mbuf (mblk_t) in inpcb.ip_options * and passed to ip_output when ip options are in use. * The actual length of the options (including ipopt_dst) * is in m_len. */ #define MAX_IPOPTLEN 40 struct ipoption { struct in_addr ipopt_dst; /* first-hop dst if source routed */ char ipopt_list[MAX_IPOPTLEN]; /* options proper */ }; struct ipstat { long ips_total; /* total packets received */ long ips_badsum; /* checksum bad */ long ips_tooshort; /* packet too short */ long ips_toosmall; /* not enough data */ long ips_badhlen; /* ip header length < data size */ long ips_badlen; /* ip length < ip header length */ long ips_fragments; /* fragments received */ long ips_fragdropped; /* frags dropped (dups, out of space) */ long ips_fragtimeout; /* fragments timed out */ long ips_forward; /* packets forwarded */ long ips_cantforward; /* packets rcvd for unreachable dest */ long ips_redirectsent; /* packets forwarded on same net */ #ifndef OLDSTAT long ips_noproto; /* unknown or unsupported protocol */ long ips_delivered; /* packets consumed here */ long ips_localout; /* total ip packets generated here */ long ips_odropped; /* lost packets due to nobufs, etc. */ long ips_reassembled; /* total packets reassembled ok */ long ips_fragmented; /* output packets fragmented ok */ long ips_ofragments; /* output fragments created */ long ips_cantfrag; /* don't fragment flag was set, etc. */ #endif /* OLDSTAT */ }; #ifdef KERNEL /* flags passed to ip_output as last parameter */ #define IP_FORWARDING 0x1 /* most of ip header exists */ #define IP_ROUTETOIF SO_DONTROUTE /* bypass routing tables */ #define IP_ALLOWBROADCAST SO_BROADCAST /* can send broadcast packets */ extern struct ipstat ipstat; extern mblk_t ipq; /* ip reass. queue */ extern u_short ip_id; /* ip packet ctr, for ids */ extern mblk_t *ip_srcroute(); #endif #endif /* _h_IP_VAR */