Lines Matching defs:flags

1031 /* TCP header sanity checking.  Look for bad combinations of TCP flags,     */
1039 int flags, tlen;
1068 flags = tcp->th_flags;
1076 if ((flags & TH_URG) != 0 && (tcp->th_urp == 0)) {
1078 } else if ((flags & TH_URG) == 0 && (tcp->th_urp != 0)) {
1081 flags = flags; /* LINT */
1082 } else if (((flags & (TH_SYN|TH_FIN)) != 0) &&
1083 ((flags & (TH_RST|TH_ACK)) == TH_RST)) {
1086 } else if (!(flags & TH_ACK)) {
1094 if ((flags == TH_SYN) && (tcp->th_ack != 0)) {
1103 flags = flags; /* LINT */
1104 } else if (!(flags & (TH_RST|TH_SYN))) {
1106 } else if ((flags & (TH_URG|TH_PUSH|TH_FIN)) != 0) {
1355 * set packet attribute flags based on the offset and
1429 * list of options present with this packet and set flags to indicate
1639 * TCP flags, then NO match. If not, then match (which should
1646 * Match the flags ? If not, abort this match.
1807 * Next we have 32 bits of packet flags.
1847 /* Returns: int - result flags of scanning filter list */
2840 /* Checks flags set to see how a packet should be logged, if it is to be */
3356 /* flags(I) - rule flags which describe the type of rule it is */
3364 frgroup_t *fr_addgroup(group, head, flags, unit, set, ifs)
3367 u_32_t flags;
3382 gflags = flags & FR_INOUT;
3442 /* flags(I) - which set of rules to find the rule in */
3505 /* flags(I) - which set of rules to flush */
3559 /* flags(I) - which set of rules to flush */
3562 /* and IPv6) as defined by the value of flags. */
3564 int frflush(unit, proto, flags, ifs)
3566 int proto, flags;
3575 if ((flags & FR_INACTIVE) == FR_INACTIVE)
3578 if (flags & FR_OUTQUE) {
3592 if (flags & FR_INQUE) {
3611 tmp = frflush(IPL_LOGCOUNT, proto, flags, ifs);
5248 printf("fr_freetimeoutqueue(%lx) flags 0x%x ttl %d ref %d\n",
6237 * container, value attribute flags