/external/grub/netboot/ |
nic.h | 26 char *packet; member in struct:nic
|
config.c | 473 static char packet[ETH_FRAME_LEN]; variable 490 packet, /* packet */
|
/bionic/libc/kernel/common/linux/netfilter/ |
xt_statistic.h | 36 u_int32_t packet; member in struct:xt_statistic_info::__anon319::__anon321
|
/development/ndk/platforms/android-3/include/linux/netfilter/ |
xt_statistic.h | 36 u_int32_t packet; member in struct:xt_statistic_info::__anon946::__anon948
|
/external/dhcpcd/ |
bpf.c | 160 * So we pass the buffer in the API so we can loop on >1 packet. */ 166 struct bpf_hdr packet; local 180 else if ((size_t)bytes < sizeof(packet)) 186 memcpy(&packet, iface->buffer + iface->buffer_pos, 187 sizeof(packet)); 188 if (packet.bh_caplen != packet.bh_datalen) 189 goto next; /* Incomplete packet, drop. */ 190 if (iface->buffer_pos + packet.bh_caplen + packet.bh_hdrlen [all...] |
net.c | 39 #include <netpacket/packet.h> 576 make_udp_packet(uint8_t **packet, const uint8_t *data, size_t length, 588 * We copy the data to our packet and then create a small part of the 591 * of the whole packet into the udp checksum. 622 *packet = (uint8_t *)udpp; 629 struct udp_dhcp_packet packet; local 631 memcpy(&packet, udp, sizeof(packet)); 633 return ntohs(packet.ip.ip_len) - sizeof(packet.ip) - sizeof(packet.udp) 639 struct udp_dhcp_packet packet; local [all...] |
/external/kernel-headers/original/linux/netfilter/ |
xt_statistic.h | 25 u_int32_t packet; member in struct:xt_statistic_info::__anon4923::__anon4925
|
/prebuilt/ndk/android-ndk-r4/platforms/android-3/arch-arm/usr/include/linux/netfilter/ |
xt_statistic.h | 36 u_int32_t packet; member in struct:xt_statistic_info::__anon13662::__anon13664
|
/prebuilt/ndk/android-ndk-r4/platforms/android-4/arch-arm/usr/include/linux/netfilter/ |
xt_statistic.h | 36 u_int32_t packet; member in struct:xt_statistic_info::__anon14016::__anon14018
|
/prebuilt/ndk/android-ndk-r4/platforms/android-5/arch-arm/usr/include/linux/netfilter/ |
xt_statistic.h | 36 u_int32_t packet; member in struct:xt_statistic_info::__anon14370::__anon14372
|
/prebuilt/ndk/android-ndk-r4/platforms/android-5/arch-x86/usr/include/linux/netfilter/ |
xt_statistic.h | 36 u_int32_t packet; member in struct:xt_statistic_info::__anon14789::__anon14791
|
/prebuilt/ndk/android-ndk-r4/platforms/android-8/arch-arm/usr/include/linux/netfilter/ |
xt_statistic.h | 36 u_int32_t packet; member in struct:xt_statistic_info::__anon15152::__anon15154
|
/prebuilt/ndk/android-ndk-r4/platforms/android-8/arch-x86/usr/include/linux/netfilter/ |
xt_statistic.h | 36 u_int32_t packet; member in struct:xt_statistic_info::__anon15576::__anon15578
|
/sdk/ddms/libs/ddmlib/src/com/android/ddmlib/ |
HandleExit.java | 66 JdwpPacket packet = new JdwpPacket(rawBuf); local 71 finishChunkPacket(packet, CHUNK_EXIT, buf.position()); 73 client.sendAndConsume(packet, mInst);
|
MonitorThread.java | 314 * See if we have a full packet in the buffer. It's possible we have 315 * more than one packet, so we have to loop. 317 JdwpPacket packet = client.getJdwpPacket(); local 318 while (packet != null) { 319 if (packet.isDdmPacket()) { 321 assert !packet.isReply(); 322 callHandler(client, packet, null); 323 packet.consume(); 324 } else if (packet.isReply() 325 && client.isResponseToUs(packet.getId()) != null) 524 JdwpPacket packet = dbg.getJdwpPacket(); local [all...] |
HandleHello.java | 134 JdwpPacket packet = new JdwpPacket(rawBuf); local 139 finishChunkPacket(packet, CHUNK_HELO, buf.position()); 141 + " ID=0x" + Integer.toHexString(packet.getId())); 142 client.sendAndConsume(packet, mInst); 167 JdwpPacket packet = new JdwpPacket(rawBuf); local 172 finishChunkPacket(packet, CHUNK_FEAT, buf.position()); 174 client.sendAndConsume(packet, mInst);
|
/frameworks/base/core/java/com/android/internal/nfc/ |
LlcpConnectionlessSocket.java | 58 * @param packet Service Access Point number related to a LLCP 62 public void sendTo(LlcpPacket packet) throws IOException { 64 int result = mService.sendTo(mHandle, packet); 83 LlcpPacket packet = mService.receiveFrom(mHandle); local 84 if (packet != null) { 85 return packet;
|
/external/ppp/pppd/ |
demand.c | 64 struct packet { struct 66 struct packet *next; 70 struct packet *pend_q; 71 struct packet *pend_qtail; 138 struct packet *pkt, *nextpkt; 265 * We apply the active_filter to see if we want this packet to 273 struct packet *pkt; 283 pkt = (struct packet *) malloc(sizeof(struct packet) + len); 305 struct packet *pkt, *prev, *nextpkt [all...] |
/external/ppp/pppd/plugins/rp-pppoe/ |
common.c | 36 * packet -- the PPPoE discovery packet to parse 37 * func -- function called for each tag in the packet 42 * Parses a PPPoE discovery packet, calling "func" for each tag in the packet. 46 parsePacket(PPPoEPacket *packet, ParseFunc *func, void *extra) 48 UINT16_t len = ntohs(packet->length); 52 if (packet->ver != 1) { 53 syslog(LOG_ERR, "Invalid PPPoE version (%d)", (int) packet->ver); 56 if (packet->type != 1) 398 PPPoEPacket packet; local [all...] |
discovery.c | 73 * packet -- a received PPPoE packet 75 * 1 if packet is for this PPPoE daemon; 0 otherwise. 77 * If we are using the Host-Unique tag, verifies that packet contains 81 packetIsForMe(PPPoEConnection *conn, PPPoEPacket *packet) 85 /* If packet is not directed to our MAC address, forget it */ 86 if (memcmp(packet->ethHdr.h_dest, conn->myEth, ETH_ALEN)) return 0; 88 /* If we're not using the Host-Unique tag, then accept the packet */ 91 parsePacket(packet, parseForHostUniq, &forMe); 107 * Picks interesting tags out of a PADO packet 246 PPPoEPacket packet; local 316 PPPoEPacket packet; local 416 PPPoEPacket packet; local 500 PPPoEPacket packet; local [all...] |
/frameworks/base/media/libstagefright/mpeg2ts/ |
MPEG2TSExtractor.cpp | 212 uint8_t packet[kTSPacketSize]; local 213 ssize_t n = mDataSource->readAt(mOffset, packet, kTSPacketSize); 215 if (isDiscontinuity(packet, n)) { 221 mParser->feedTSPacket(packet, kTSPacketSize);
|
/frameworks/base/tests/CoreTests/android/core/ |
DatagramTest.java | 48 DatagramPacket packet; field in class:DatagramTest.Reflector 58 packet.setLength(buffer.length); 59 socket.receive(packet); 60 String s = stringFromPacket(packet); 61 // System.out.println(s + " (from " + packet.getAddress() + ":" + packet.getPort() + ")"); 69 stringToPacket(s.toUpperCase(), packet); local 71 packet.setAddress(InetAddress.getLocalHost()); 72 packet.setPort(2345); 74 socket.send(packet); 131 DatagramPacket packet = new DatagramPacket(buffer, buffer.length); local [all...] |
/libcore/luni/src/test/java/libcore/java/net/ |
OldDatagramPacketTest.java | 52 DatagramPacket packet = new DatagramPacket(new byte[256], 54 socket.receive(packet); 55 socket.send(packet); 70 DatagramPacket packet = new DatagramPacket(new byte[] { 1, 2, 3, 4, local 80 socket.send(packet); 81 socket.receive(packet); 83 assertTrue("datagram received wrong port: " + packet.getPort(), 84 packet.getPort() == port);
|
/system/core/libnetutils/ |
packet.c | 164 } packet; local 170 nread = read(s, &packet, sizeof(packet)); 175 * The raw packet interface gives us all packets received by the 182 LOGD("Packet is too small (%d) to be a UDP datagram", nread); 184 } else if (packet.ip.version != IPVERSION || packet.ip.ihl != (sizeof(packet.ip) >> 2)) { 186 LOGD("Not a valid IP packet"); 188 } else if (nread < ntohs(packet.ip.tot_len)) [all...] |
/external/nist-sip/java/gov/nist/javax/sip/stack/ |
UDPMessageChannel.java | 163 * Constructor - takes a datagram packet and a stack structure Extracts the 164 * address of the other from the datagram packet and stashes away the 196 * @param packet 197 * is the incoming datagram packet. 200 UDPMessageProcessor messageProcessor, DatagramPacket packet) { 202 this.incomingPacket = packet; 255 DatagramPacket packet; local 286 packet = (DatagramPacket) ((UDPMessageProcessor) messageProcessor).messageQueue 290 this.incomingPacket = packet; 292 packet = this.incomingPacket [all...] |