/external/ppp/pppd/plugins/rp-pppoe/ |
debug.c | 78 * packet -- a PPPoE packet 83 * Dumps the PPPoE packet to fp in an easy-to-read format 86 dumpPacket(FILE *fp, PPPoEPacket *packet, char const *dir) 88 int len = ntohs(packet->length); 97 UINT16_t type = etherType(packet); 113 switch(packet->code) { 123 (int) ntohs(packet->session), 130 (unsigned) packet->ethHdr.h_source[0], 131 (unsigned) packet->ethHdr.h_source[1] [all...] |
common.c | 36 * packet -- the PPPoE discovery packet to parse 37 * func -- function called for each tag in the packet 42 * Parses a PPPoE discovery packet, calling "func" for each tag in the packet. 46 parsePacket(PPPoEPacket *packet, ParseFunc *func, void *extra) 48 UINT16_t len = ntohs(packet->length); 52 if (packet->ver != 1) { 53 syslog(LOG_ERR, "Invalid PPPoE version (%d)", (int) packet->ver); 56 if (packet->type != 1) 398 PPPoEPacket packet; local [all...] |
discovery.c | 73 * packet -- a received PPPoE packet 75 * 1 if packet is for this PPPoE daemon; 0 otherwise. 77 * If we are using the Host-Unique tag, verifies that packet contains 81 packetIsForMe(PPPoEConnection *conn, PPPoEPacket *packet) 85 /* If packet is not directed to our MAC address, forget it */ 86 if (memcmp(packet->ethHdr.h_dest, conn->myEth, ETH_ALEN)) return 0; 88 /* If we're not using the Host-Unique tag, then accept the packet */ 91 parsePacket(packet, parseForHostUniq, &forMe); 107 * Picks interesting tags out of a PADO packet 246 PPPoEPacket packet; local 316 PPPoEPacket packet; local 416 PPPoEPacket packet; local 500 PPPoEPacket packet; local [all...] |
/frameworks/base/tests/CoreTests/android/core/ |
DatagramTest.java | 48 DatagramPacket packet; field in class:DatagramTest.Reflector 58 packet.setLength(buffer.length); 59 socket.receive(packet); 60 String s = stringFromPacket(packet); 61 // System.out.println(s + " (from " + packet.getAddress() + ":" + packet.getPort() + ")"); 69 stringToPacket(s.toUpperCase(), packet); local 71 packet.setAddress(InetAddress.getLocalHost()); 72 packet.setPort(2345); 74 socket.send(packet); 131 DatagramPacket packet = new DatagramPacket(buffer, buffer.length); local [all...] |
/external/qemu/ |
shaper.c | 46 * we're going to implement a scheme where, when we send a packet of 47 * 'count' bytes, no other packet will go through in the same direction for 48 * at least 'count*8/MAX_RATE' seconds. any successive packet that is "sent" 69 QueuedPacket packet; local 70 size_t packet_size = sizeof(*packet); 75 packet = qemu_malloc(packet_size); 76 packet->next = NULL; 77 packet->expiration = 0; 78 packet->size = (size_t)size; 79 packet->opaque = opaque 120 QueuedPacket packet = shaper->packets; local 137 QueuedPacket packet; local 188 QueuedPacket packet = shaper->packets; local 229 QueuedPacket packet; local 297 QueuedPacket packet; member in struct:SessionRec_ 433 QueuedPacket packet = session->packet; local 488 QueuedPacket packet = session->packet; local [all...] |
/system/core/libnetutils/ |
packet.c | 164 } packet; local 170 nread = read(s, &packet, sizeof(packet)); 175 * The raw packet interface gives us all packets received by the 182 LOGD("Packet is too small (%d) to be a UDP datagram", nread); 184 } else if (packet.ip.version != IPVERSION || packet.ip.ihl != (sizeof(packet.ip) >> 2)) { 186 LOGD("Not a valid IP packet"); 188 } else if (nread < ntohs(packet.ip.tot_len)) [all...] |
Android.mk | 9 packet.c
|
/external/dnsmasq/contrib/wrt/ |
dhcp_lease_time.c | 76 return NULL; /* malformed packet */ 83 return NULL; /* malformed packet */ 86 return NULL; /* malformed packet */ 137 struct dhcp_packet packet; local 138 unsigned char *p = packet.options; 157 memset(&packet, 0, sizeof(packet)); 159 packet.hlen = 0; 160 packet.htype = 0; 162 packet.op = BOOTREQUEST [all...] |
dhcp_release.c | 252 struct dhcp_packet packet; local 253 unsigned char *p = packet.options; 275 /* This voodoo fakes up a packet coming from the correct interface, which really matters for 288 memset(&packet, 0, sizeof(packet)); 290 packet.hlen = parse_hex(argv[3], packet.chaddr, DHCP_CHADDR_MAX, &mac_type); 292 packet.htype = ARPHRD_ETHER; 294 packet.htype = mac_type; 296 packet.op = BOOTREQUEST [all...] |
/frameworks/base/core/java/android/nfc/ |
ILlcpConnectionlessSocket.aidl | 29 int sendTo(int nativeHandle, in LlcpPacket packet);
|
/libcore/luni/src/test/java/libcore/java/net/ |
OldDatagramPacketTest.java | 52 DatagramPacket packet = new DatagramPacket(new byte[256], 54 socket.receive(packet); 55 socket.send(packet); 70 DatagramPacket packet = new DatagramPacket(new byte[] { 1, 2, 3, 4, local 80 socket.send(packet); 81 socket.receive(packet); 83 assertTrue("datagram received wrong port: " + packet.getPort(), 84 packet.getPort() == port);
|
/frameworks/base/core/java/com/android/internal/nfc/ |
LlcpConnectionlessSocket.java | 58 * @param packet Service Access Point number related to a LLCP 62 public void sendTo(LlcpPacket packet) throws IOException { 64 int result = mService.sendTo(mHandle, packet); 83 LlcpPacket packet = mService.receiveFrom(mHandle); local 84 if (packet != null) { 85 return packet;
|
/sdk/ddms/libs/ddmlib/src/com/android/ddmlib/ |
HandleExit.java | 66 JdwpPacket packet = new JdwpPacket(rawBuf); local 71 finishChunkPacket(packet, CHUNK_EXIT, buf.position()); 73 client.sendAndConsume(packet, mInst);
|
MonitorThread.java | 314 * See if we have a full packet in the buffer. It's possible we have 315 * more than one packet, so we have to loop. 317 JdwpPacket packet = client.getJdwpPacket(); local 318 while (packet != null) { 319 if (packet.isDdmPacket()) { 321 assert !packet.isReply(); 322 callHandler(client, packet, null); 323 packet.consume(); 324 } else if (packet.isReply() 325 && client.isResponseToUs(packet.getId()) != null) 524 JdwpPacket packet = dbg.getJdwpPacket(); local [all...] |
HandleProfiling.java | 100 JdwpPacket packet = new JdwpPacket(rawBuf); local 108 finishChunkPacket(packet, CHUNK_MPRS, buf.position()); 111 client.sendAndConsume(packet, mInst); 126 JdwpPacket packet = new JdwpPacket(rawBuf); local 131 finishChunkPacket(packet, CHUNK_MPRE, buf.position()); 133 client.sendAndConsume(packet, mInst); 180 JdwpPacket packet = new JdwpPacket(rawBuf); local 186 finishChunkPacket(packet, CHUNK_MPSS, buf.position()); 189 client.sendAndConsume(packet, mInst); 201 JdwpPacket packet = new JdwpPacket(rawBuf) local 235 JdwpPacket packet = new JdwpPacket(rawBuf); local [all...] |
/bionic/libc/netbsd/resolv/ |
res_cache.c | 44 * - it takes raw DNS query packet data as input, and returns raw DNS 45 * answer packet data as output 321 /* dump the content of a query of packet to the log */ 346 /* reminder: the general format of a DNS packet is the following: 411 * OFFSET : 14 : offset to another part of the DNS packet 413 * The offset is relative to the start of the DNS packet and must point 448 _dnsPacket_init( DnsPacket* packet, const uint8_t* buff, int bufflen ) 450 packet->base = buff; 451 packet->end = buff + bufflen; 452 packet->cursor = buff [all...] |
/external/grub/netboot/ |
nic.h | 26 char *packet; member in struct:nic
|
/external/speex/include/speex/ |
speex_jitter.h | 56 /** Definition of an incoming packet */ 59 /** Definition of an incoming packet */ 61 char *data; /**< Data bytes contained in the packet */ 62 spx_uint32_t len; /**< Length of the packet in bytes */ 63 spx_uint32_t timestamp; /**< Timestamp for the packet */ 64 spx_uint32_t span; /**< Time covered by the packet (same units as timestamp) */ 69 /** Packet has been retrieved */ 71 /** Packet is lost or is late */ 73 /** A "fake" packet is meant to be inserted here to increase buffering */ 92 /** Assign a function to destroy unused packet. When setting that, the jitter [all...] |
/external/speex/libspeex/ |
jitter.c | 85 int curr_count; /**< Number of packet timings we got (including those we discarded) */ 96 /* Add the timing of a new packet to the TimingBuffer */ 100 /* Discard packet that won't make it into the list because they're too early */ 140 spx_uint32_t last_returned_timestamp; /**< Useful for getting the next packet with the same timestamp (for fragmented media) */ 146 spx_uint32_t arrival[SPEEX_JITTER_MAX_BUFFER_SIZE]; /**< Packet arrival time (0 means it was late, even though it's a valid timestamp) */ 148 void (*destroy) (void *); /**< Callback for destroying a packet */ 151 spx_int32_t concealment_size; /**< Size of the packet loss concealment "units" */ 154 int late_cutoff; /**< How late must a packet be for it not to be considered at all */ 192 /* Number of packet timings we have received (including those we didn't keep) */ 199 /* Compute cost for one lost packet */ [all...] |
/external/qemu/distrib/sdl-1.2.12/src/video/ps2gs/ |
SDL_gsyuv.c | 86 struct ps2_packet *packet; local 203 hwdata->plist.packet = (struct ps2_packet *)SDL_malloc( 205 if ( ! hwdata->plist.packet ) { 211 packet = hwdata->plist.packet; 224 packet[pnum].ptr = &tags[0]; 225 packet[pnum].len = 10 * sizeof(*tags); 242 packet[pnum].ptr = &tags[10]; 243 packet[pnum].len = 2 * sizeof(*tags); 247 packet[pnum].ptr = (void *)base 322 struct ps2_packet packet; local [all...] |
/external/dnsmasq/src/ |
tftp.c | 23 static ssize_t tftp_err(int err, char *packet, char *mess, char *file); 24 static ssize_t tftp_err_oops(char *packet, char *file); 25 static ssize_t get_block(char *packet, struct tftp_transfer *transfer); 44 char *packet = daemon->packet; local 77 iov.iov_base = packet; 187 p = packet + 2; 188 end = packet + len; 190 if (ntohs(*((unsigned short *)packet)) != OP_RRQ || 194 len = tftp_err(ERR_ILL, packet, _("unsupported request from %s"), inet_ntoa(peer.sin_addr)) 290 char *packet = daemon->packet, *namebuff = daemon->namebuff; local [all...] |
/system/core/libcutils/ |
mq.c | 72 /** A generic packet of bytes. */ 77 /** Reading a packet header. */ 87 /** A packet header. */ 92 /** Packet size. Used for BYTES. */ 100 /** A packet which will be sent to a peer. */ 103 /** Packet header. */ 114 /** Frees all resources associated with this packet. */ 115 void (*free)(OutgoingPacket* packet); 120 /** Next packet in the queue. */ 264 /** Frees a simple, i.e. header-only, outgoing packet. * 635 OutgoingPacket* packet = NULL; local 853 OutgoingPacket* packet = calloc(1, sizeof(OutgoingPacket)); local 1137 OutgoingPacket* packet = calloc(1, sizeof(OutgoingPacket)); local 1205 OutgoingPacket* packet = calloc(1, sizeof(OutgoingPacket)); local [all...] |
/bionic/libc/kernel/common/linux/netfilter/ |
xt_statistic.h | 36 u_int32_t packet; member in struct:xt_statistic_info::__anon319::__anon321
|
/development/ndk/platforms/android-3/include/linux/netfilter/ |
xt_statistic.h | 36 u_int32_t packet; member in struct:xt_statistic_info::__anon946::__anon948
|
/external/kernel-headers/original/linux/netfilter/ |
xt_statistic.h | 25 u_int32_t packet; member in struct:xt_statistic_info::__anon4923::__anon4925
|