Lines Matching defs:receive

625  * receive - receive procedure called for each packet received
628 receive(
633 register struct pkt *pkt; /* receive packet pointer */
654 l_fp p_rec; /* receive timestamp */
701 DPRINTF(2, ("receive: drop: RES_IGNORE\n"));
707 DPRINTF(2, ("receive: drop: !mode7 or RES_NOQUERY\n"));
716 DPRINTF(2, ("receive: drop: RES_NOQUERY\n"));
724 DPRINTF(2, ("receive: drop: RES_DONTSERVE\n"));
744 DPRINTF(1, ("receive: at %ld %s<-%s ippeerlimit %d mode %d iflags %s "
759 DPRINTF(2, ("receive: drop: RES_FLAKE\n"));
787 DPRINTF(2, ("receive: drop: RES_VERSION\n"));
802 DPRINTF(2, ("receive: drop: MODE_UNSPEC\n"));
825 DPRINTF(2, ("receive: drop: Invalid ppoll (%d) from %s\n",
830 DPRINTF(2, ("receive: info: Invalid ppoll (%d) from %s\n",
868 DPRINTF(2, ("receive: drop: bad post-packet length\n"));
886 DPRINTF(2, ("receive: drop: bad EF length\n"));
903 DPRINTF(2, ("receive: drop: bad autokey hostname length\n"));
911 DPRINTF(2, ("receive: drop: empty autokey groupname\n"));
927 DPRINTF(2, ("receive: drop: post-packet under-read\n"));
947 DPRINTF(2, ("receive: drop: RES_DONTTRUST\n"));
968 DPRINTF(2, ("receive: drop: RES_KOD\n"));
1054 DPRINTF(1, ("receive: at %ld %s<-%s mode %d/%s:%s len %d org 0x%x.%08x xmt 0x%x.%08x NOMAC\n",
1063 DPRINTF(1, ("receive: at %ld %s<-%s mode %d/%s:%s keyid %08x len %d auth %d org 0x%x.%08x xmt 0x%x.%08x CRYPTONAK\n",
1086 DPRINTF(1, ("receive: at %ld %s<-%s mode %d/%s:%s len %d org %x.%08x xmt %x.%08x SIGND\n",
1138 DPRINTF(2, ("receive: drop: MD5 digest too short\n"));
1155 DPRINTF(2, ("receive: drop: BCAST from wildcard\n"));
1209 DPRINTF(1, ("receive: at %ld %s<-%s mode %d/%s:%s keyid %08x len %d auth %d org 0x%x.%08x xmt 0x%x.%08x MAC\n",
1238 DPRINTF(2, ("receive: drop: Wanted keyID %d, got %d from %s\n",
1254 DPRINTF(2, ("receive: 3454 check: AUTH_UNKNOWN from %s\n",
1265 DPRINTF(2, ("receive: drop: missing or bad MAC from %s\n",
1301 DPRINTF(1, ("receive: MATCH_ASSOC dispatch: mode %d/%s:%s \n",
1346 DPRINTF(2, ("receive: AM_FXMIT drop: !mcast restricted\n"));
1358 DPRINTF(2, ("receive: AM_FXMIT drop: Not manycastserver\n"));
1368 DPRINTF(2, ("receive: AM_FXMIT drop: empty groupname\n"));
1388 DPRINTF(2, ("receive: sys leap: %0x, sys_stratum %d > hisstratum+1 %d, !sys_cohort %d && sys_stratum == hisstratum+1, loop refid %#x == pkt refid %#x\n", sys_leap, sys_stratum, hisstratum + 1, !sys_cohort, rbufp->dstadr->addr_refid, pkt->refid));
1389 DPRINTF(2, ("receive: AM_FXMIT drop: LEAP_NOTINSYNC || stratum || loop\n"));
1400 DPRINTF(2, ("receive: declining manycast solicitation on link-local IPv6\n"));
1458 DPRINTF(2, ("receive: AM_MANYCAST drop: empty groupname\n"));
1465 DPRINTF(2, ("receive: AM_MANYCAST drop: link-local server\n"));
1470 DPRINTF(2, ("receive: AM_MANYCAST drop: No manycast peer\n"));
1480 DPRINTF(2, ("receive: AM_MANYCAST drop: bad auth || (NOPEER|DONTTRUST)\n"));
1492 DPRINTF(2, ("receive: AM_MANYCAST drop: unsync/stratum\n"));
1506 DPRINTF(2, ("receive: AM_MANYCAST drop: duplicate\n"));
1543 DPRINTF(2, ("receive: AM_NEWBCL drop: groupname mismatch\n"));
1549 DPRINTF(2, ("receive: AM_NEWBCL drop: not a bclient/mclient\n"));
1557 DPRINTF(2, ("receive: AM_NEWBCL drop: AUTH failed\n"));
1569 DPRINTF(2, ("receive: AM_NEWBCL drop: Unsync or bad stratum\n"));
1581 DPRINTF(2, ("receive: AM_NEWBCL drop: Autokey but not CRYPTO_ASSOC\n"));
1612 DPRINTF(2, ("receive: AM_NEWBCL drop: Autokey but not 2-way\n"));
1626 DPRINTF(2, ("receive: AM_NEWBCL drop: duplicate\n"));
1651 DPRINTF(2, ("receive: AM_NEWBCL drop: empty newpeer() failed\n"));
1682 DPRINTF(2, ("receive: AM_NEWPASS drop: Autokey group mismatch\n"));
1712 DPRINTF(2, ("receive: AM_NEWPASS drop: NOEPEER\n"));
1729 DPRINTF(2, ("receive: at %ld refusing to mobilize passive association"
1739 DPRINTF(2, ("receive: AM_NEWPASS drop: NOEPEER\n"));
1756 DPRINTF(2, ("receive: AM_NEWPASS drop: Remote stratum (%d) out of range\n",
1771 DPRINTF(2, ("receive: AM_NEWPASS drop: newpeer() failed\n"));
1790 DPRINTF(2, ("receive: AM_PROCPKT drop: Autokey group mismatch\n"));
1801 DPRINTF(2, ("receive: PROCPKT/BROADCAST: prev pkt %ld seconds ago, ppoll: %d, %d secs\n",
1816 msyslog(LOG_INFO, "receive: broadcast poll from %s changed from %u to %u",
1824 msyslog(LOG_INFO, "receive: broadcast poll of %u from %s is out-of-range (%d to %d)!",
1844 msyslog(LOG_INFO, "receive: broadcast packet from %s arrived after %lu, not %lu seconds!",
1869 * broadcast packets as we receive them. But
1890 msyslog(LOG_INFO, "receive: broadcast packet from %s contains non-monotonic timestamp: 0x%x.%08x -> 0x%x.%08x",
1899 DPRINTF(2, ("receive: AM_PROCPKT drop: bail\n"));
1915 DPRINTF(2, ("receive: AM_ERR drop.\n"));
1923 DPRINTF(2, ("receive: default drop.\n"));
1937 DPRINTF(2, ("receive: drop: Autokey but wrong/bad auth\n"));
1966 "receive: Unexpected zero transmit timestamp in KoD from %s",
1979 DPRINTF(2, ("receive: drop: Duplicate xmit\n"));
1999 "receive: Unexpected stratum (%d) in broadcast from %s",
2023 "receive: KoD packet from %s has a zero org or rec timestamp. Ignoring.",
2032 "receive: KoD packet from %s has inconsistent xmt/org/rec timestamps. Ignoring.",
2041 "receive: flip 0 KoD origin timestamp 0x%x.%08x from %s does not match 0x%x.%08x - ignoring.",
2049 "receive: flip 1 KoD origin timestamp 0x%x.%08x from %s does not match interleave 0x%x.%08x - ignoring.",
2098 "receive: BUG 3361: Clearing peer->aorg ");
2121 INSIST(!"receive(): impossible hismode");
2126 "receive: %s 0 origin timestamp from %s@%s xmt 0x%x.%08x",
2150 "receive: Dynamic interleave from %s@%s denied",
2174 DPRINTF(2, ("receive: drop: Bogus packet in interleaved symmetric mode\n"));
2198 DPRINTF(2, ("receive: drop: PREEMPT crypto_NAK\n"));
2206 DPRINTF(2, ("receive: drop: crypto_NAK\n"));
2222 "receive: Bad auth in packet with bad timestamps from %s denied - spoof?",
2244 DPRINTF(2, ("receive: drop: Bad or missing AUTH\n"));
2267 "receive: Broadcast server at %s is in interleave mode",
2277 "receive: Broadcast server at %s is no longer in interleave mode",
2283 "receive: Bad broadcast auth (%d) from %s",
2389 "receive: Unexpected mode (%d) in packet from %s",
2460 * If server mode, verify the receive key ID matches
2537 * receive branch, but too much is going on here... at least we
2605 * receive() routine.
3091 * between the receive process and the poll process.
3121 * progress and we get called from the receive process, just
4592 struct recvbuf* rbufp, /* receive packet pointer */
4593 int xmode, /* receive mode */ /* XXX: HMS: really? */
4599 struct pkt* rpkt; /* receive packet structure */
4607 * Initialize transmit packet header fields from the receive
4609 * set the peer poll at the maximum of the receive peer poll and
4673 * - the packet receive time,
4676 * reftime isn't later than the transmit/receive times.