/external/linux-kselftest/tools/testing/selftests/bpf/ |
test_pkt_access.c | 15 #include <linux/tcp.h> 29 struct tcphdr *tcp = NULL; local 43 tcp = (struct tcphdr *)((void *)(iph) + ihl_len); 51 tcp = (struct tcphdr *)((void *)(ip6h) + ihl_len); 54 if (tcp) { 55 if (((void *)(tcp) + 20) > data_end || proto != 6) 58 if (((void *)(tcp) + 18) > data_end) 60 if (tcp->urg_ptr == 123)
|
/bionic/libc/kernel/uapi/linux/netfilter/ |
xt_ecn.h | 35 } tcp; member in union:xt_ecn_info::__anon897
|
nf_conntrack_tuple_common.h | 33 } tcp; member in union:nf_conntrack_man_proto
|
/bionic/libc/kernel/uapi/linux/netfilter_ipv4/ |
ipt_ECN.h | 34 } tcp; member in union:ipt_ECN_info::__anon935
|
/external/bcc/examples/networking/http_filter/ |
http-parse-simple.c | 9 Filter IP and TCP packets, having payload not empty 27 //filter TCP packets (ip next protocol = 0x06) 50 struct tcp_t *tcp = cursor_advance(cursor, sizeof(*tcp)); local 52 //calculate tcp header length 54 //e.g. tcp->offset = 5 ; TCP Header Length = 5 x 4 byte = 20 byte 55 tcp_header_length = tcp->offset << 2; //SHL 2 -> *4 multiply
|
http-parse-complete.c | 25 Filter IP and TCP packets, having payload not empty 47 //filter TCP packets (ip next protocol = 0x06) 72 struct tcp_t *tcp = cursor_advance(cursor, sizeof(*tcp)); local 78 key.dst_port = tcp->dst_port; 79 key.src_port = tcp->src_port; 81 //calculate tcp header length 83 //e.g. tcp->offset = 5 ; TCP Header Length = 5 x 4 byte = 20 byte 84 tcp_header_length = tcp->offset << 2; //SHL 2 -> *4 multipl [all...] |
/external/iptables/include/linux/netfilter/ |
xt_ecn.h | 1 /* iptables module for matching the ECN header in IPv4 and TCP header 29 } tcp; member in union:xt_ecn_info::__anon25010
|
nf_conntrack_tuple_common.h | 19 } tcp; member in union:nf_conntrack_man_proto
|
/external/iptables/include/linux/netfilter_ipv4/ |
ipt_ECN.h | 18 #define IPT_ECN_OP_SET_ECE 0x10 /* set ECE bit of TCP header */ 19 #define IPT_ECN_OP_SET_CWR 0x20 /* set CWR bit of TCP header */ 28 __u8 ece:1, cwr:1; /* TCP ECT bits */ 29 } tcp; member in union:ipt_ECN_info::__anon25038
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
xt_ecn.h | 2 /* iptables module for matching the ECN header in IPv4 and TCP header 32 } tcp; member in union:xt_ecn_info::__anon25787
|
nf_conntrack_tuple_common.h | 26 } tcp; member in union:nf_conntrack_man_proto
|
/external/kernel-headers/original/uapi/linux/netfilter_ipv4/ |
ipt_ECN.h | 19 #define IPT_ECN_OP_SET_ECE 0x10 /* set ECE bit of TCP header */ 20 #define IPT_ECN_OP_SET_CWR 0x20 /* set CWR bit of TCP header */ 29 __u8 ece:1, cwr:1; /* TCP ECT bits */ 30 } tcp; member in union:ipt_ECN_info::__anon25825
|
/external/mesa3d/src/mesa/drivers/dri/i965/ |
brw_tcs_surface_state.c | 44 struct brw_program *tcp = local 47 if (!tcp) 55 brw_upload_pull_constants(brw, BRW_NEW_TCS_CONSTBUF, &tcp->program, 98 const struct gl_program *tcp = brw->programs[MESA_SHADER_TESS_CTRL]; local 100 if (tcp) { 102 brw_upload_image_surfaces(brw, tcp, &brw->tcs.base,
|
brw_tes.c | 151 struct brw_program *tcp = local 168 if (tcp) { 169 struct gl_program *tcp_prog = &tcp->program; 235 struct gl_program *tcp = local 237 key.inputs_read |= tcp->nir->info.outputs_written & 239 key.patch_inputs_read |= tcp->nir->info.patch_outputs_written;
|
/external/bcc/src/lua/bpf/ |
proto.lua | 294 M.tcp = function (...) return dissector(ffi.typeof('struct tcp_t'), ...) end 324 tcp = function(e, dst) next_offset(e, dst, ffi.typeof('uint8_t'), 0, 0x0f, 2) end, 334 tcp = function(e, dst) next_skip(e, dst, ffi.sizeof('struct ip6_t'), 0) end, 345 tcp = function(e, dst) next_offset(e, dst, ffi.typeof('uint8_t'), ip6_opt_ext_len_off) end, 352 -- Skip TCP header length (stored as number of words) 409 proto_tcp = 6, -- TCP
|
/external/parameter-framework/asio-1.10.6/include/asio/ip/ |
tcp.hpp | 2 // ip/tcp.hpp 31 /// Encapsulates the flags needed for TCP. 33 * The asio::ip::tcp class contains flags necessary for TCP sockets. 42 class tcp class in namespace:asio::ip 45 /// The type of a TCP endpoint. 46 typedef basic_endpoint<tcp> endpoint; 48 /// Construct to represent the IPv4 TCP protocol. 49 static tcp v4() 51 return tcp(ASIO_OS_DEF(AF_INET)) 131 explicit tcp(int protocol_family) function in class:asio::ip::tcp [all...] |
/external/bcc/tests/python/ |
test_xlate1.c | 72 case 6: goto tcp; 87 tcp: { 88 struct tcp_t *tcp = cursor_advance(cursor, sizeof(*tcp)); local 90 incr_cksum_l4(&tcp->cksum, orig_dip, xleaf.xdip, 1); 91 incr_cksum_l4(&tcp->cksum, orig_sip, xleaf.xsip, 1);
|
test_clang_complex.c | 107 case 6: goto tcp; 112 tcp: { 113 struct tcp_t *tcp = cursor_advance(cursor, sizeof(*tcp)); local
|
/external/parameter-framework/upstream/asio/stub/ |
asio.hpp | 122 namespace tcp namespace in namespace:asio::ip
|
/external/grpc-grpc/test/core/security/ |
secure_endpoint_test.cc | 55 grpc_endpoint_pair tcp; local 62 tcp = grpc_iomgr_create_endpoint_pair("fixture", &args); 63 grpc_endpoint_add_to_pollset(tcp.client, g_pollset); 64 grpc_endpoint_add_to_pollset(tcp.server, g_pollset); 69 tcp.client, nullptr, 0); 112 fake_read_protector, fake_read_zero_copy_protector, tcp.client, 120 tcp.server, nullptr, 0);
|
/external/iptables/extensions/ |
libxt_tcp.c | 1 /* Shared library add-on to iptables to add TCP support. */ 15 "tcp match options:\n" 16 "[!] --tcp-flags mask comp match when TCP flags & mask == comp\n" 19 " (equivalent to --tcp-flags SYN,RST,ACK,FIN SYN)\n" 26 "[!] --tcp-option number match if TCP option set\n"); 35 {.name = "tcp-flags", .has_arg = true, .val = '4'}, 36 {.name = "tcp-option", .has_arg = true, .val = '5'}, 48 ports[0] = ports[1] = xtables_parse_port(buffer, "tcp"); 295 const struct xt_tcp *tcp = (struct xt_tcp *)match->data; local [all...] |
/external/mesa3d/src/mesa/state_tracker/ |
st_atom_constbuf.c | 162 struct st_common_program *tcp = st->tcp; local 164 if (tcp) 165 st_upload_constants(st, &tcp->Base);
|
st_context.c | 138 struct st_common_program *tcp = local 152 if (tcp) 153 active_shader_states |= tcp->affected_states; 643 st_reference_prog(st, &st->tcp, NULL);
|
/external/grpc-grpc/src/core/lib/iomgr/ |
tcp_custom.cc | 76 custom_tcp_endpoint* tcp = (custom_tcp_endpoint*)s->endpoint; local 77 grpc_resource_user_unref(tcp->resource_user); 78 gpr_free(tcp->peer_string); 79 gpr_free(tcp); 88 #define TCP_UNREF(tcp, reason) tcp_unref((tcp), (reason), __FILE__, __LINE__) 89 #define TCP_REF(tcp, reason) tcp_ref((tcp), (reason), __FILE__, __LINE__) 90 static void tcp_unref(custom_tcp_endpoint* tcp, const char* reason, 93 gpr_atm val = gpr_atm_no_barrier_load(&tcp->refcount.count) 151 custom_tcp_endpoint* tcp = (custom_tcp_endpoint*)socket->endpoint; local 172 custom_tcp_endpoint* tcp = (custom_tcp_endpoint*)tcpp; local 197 custom_tcp_endpoint* tcp = (custom_tcp_endpoint*)ep; local 212 custom_tcp_endpoint* tcp = (custom_tcp_endpoint*)socket->endpoint; local 225 custom_tcp_endpoint* tcp = (custom_tcp_endpoint*)ep; local 282 custom_tcp_endpoint* tcp = (custom_tcp_endpoint*)ep; local 306 custom_tcp_endpoint* tcp = (custom_tcp_endpoint*)socket->endpoint; local 313 custom_tcp_endpoint* tcp = (custom_tcp_endpoint*)ep; local 318 custom_tcp_endpoint* tcp = (custom_tcp_endpoint*)ep; local 323 custom_tcp_endpoint* tcp = (custom_tcp_endpoint*)ep; local 343 custom_tcp_endpoint* tcp = local [all...] |
tcp_uv.cc | 74 /* All tcp errors are marked with UNAVAILABLE so that application may 109 error = tcp_error_create("TCP Read failed", nread); 139 error = tcp_error_create("TCP Read failed at start", status); 148 uv_socket->write_cb(socket, tcp_error_create("TCP Write failed", status)); 189 uv_tcp_t* tcp = (uv_tcp_t*)gpr_malloc(sizeof(uv_tcp_t)); local 190 uv_socket->handle = tcp; 191 int status = uv_tcp_init_ex(uv_default_loop(), tcp, (unsigned int)domain); 193 return tcp_error_create("Failed to initialize UV tcp handle", status); 199 uv_fileno((uv_handle_t*)tcp, &fd);
|