/external/grub/netboot/ |
main.c | 111 static unsigned short udpchksum (struct iphdr *packet); 367 tr = (struct tftp_t *) &nic.packet[ETH_HLEN]; 424 /* This ensures that the packet does not get processed as data! */ 481 /* arp and rarp requests share the same packet structure. */ 684 UDPCHKSUM - Checksum UDP Packet (one of the rare cases when assembly is 688 RX if (packet->udp.chksum && udpchksum(packet)) 690 TX packet->udp.chksum=0; 691 if (0==(packet->udp.chksum=udpchksum(packet))) [all...] |
tiara.c | 9 TIARA.ASM Packet driver by Brian Fisher, Queens U, Kingston, Ontario 143 /* Ack packet */ 150 insw(ioaddr + BMPR_MEM_PORT, nic->packet, len / 2); 152 if (memcmp(nic->packet + ETH_ALEN, nic->node_addr, ETH_ALEN) == 0) 166 const char *p) /* Packet */
|
eepro100.c | 78 * looks at the recieve buffer to see if there is already a packet there. 234 char packet[1518]; member in struct:RxFD 365 * This transmits a packet. 369 * unsigned short s: size of the data-part of the packet. 370 * char *p: the data for the packet. 390 printf ("transmitting type %hX packet (%d bytes). status = %hX, cmd=%hX\n", 432 * This recieves a packet from the network. 436 * returns: 1 if a packet was recieved. 439 * returns the packet in the array nic->packet [all...] |
rtl8139.c | 47 get the next packet. Oh well, what fun. 108 RxCnt=0x72, /* packet received counter */ 419 /* Received a good packet */ 424 memcpy(nic->packet, rx_ring + ring_offs + 4, semi_count); 425 memcpy(nic->packet+semi_count, rx_ring, rx_size-4-semi_count); 427 printf("rx packet %d+%d bytes", semi_count,rx_size-4-semi_count); 430 memcpy(nic->packet, rx_ring + ring_offs + 4, nic->packetlen); 432 printf("rx packet %d bytes", rx_size-4); 438 nic->packet[12], nic->packet[13], rx_status) [all...] |
/external/qemu/ |
net-android.c | 473 VLANPacket *packet; local 475 while ((packet = vc->vlan->send_queue) != NULL) { 478 vc->vlan->send_queue = packet->next; 480 ret = qemu_deliver_packet(packet->sender, packet->data, packet->size); 481 if (ret == 0 && packet->sent_cb != NULL) { 482 packet->next = vc->vlan->send_queue; 483 vc->vlan->send_queue = packet; 487 if (packet->sent_cb 498 VLANPacket *packet; local 611 VLANPacket *packet; local [all...] |
net.c | 444 VLANPacket *packet; local 446 while ((packet = vc->vlan->send_queue) != NULL) { 449 vc->vlan->send_queue = packet->next; 451 ret = qemu_deliver_packet(packet->sender, packet->data, packet->size); 452 if (ret == 0 && packet->sent_cb != NULL) { 453 packet->next = vc->vlan->send_queue; 454 vc->vlan->send_queue = packet; 458 if (packet->sent_cb 469 VLANPacket *packet; local 582 VLANPacket *packet; local [all...] |
/external/quake/quake/src/QW/ |
qwcl.spec.sh | 29 packet loss - the game would freeze and resume several seconds later; and
|
qwsv.spec.sh | 29 packet loss - the game would freeze and resume several seconds later; and
|
/external/openssl/include/openssl/ |
dtls1.h | 223 unsigned int mtu; /* max DTLS packet size */ 250 unsigned char *packet; member in struct:dtls1_record_data_st
|
/external/openssl/ssl/ |
dtls1.h | 223 unsigned int mtu; /* max DTLS packet size */ 250 unsigned char *packet; member in struct:dtls1_record_data_st
|
s23_clnt.c | 535 p=s->packet; 598 s->packet= &(s->s2->rbuf[0]); 599 memcpy(s->packet,buf,n); 674 s->packet= &(s->s3->rbuf.buf[0]); 675 memcpy(s->packet,buf,n);
|
s2_pkt.c | 182 p=s->packet; 199 p=s->packet; 229 p= &(s->packet[2]); 283 /* Possibly the packet that we just read had 0 actual data bytes. 332 s->packet= &(s->s2->rbuf[s->s2->rbuf_offs]); 354 if (s->packet != s->s2->rbuf) 355 memcpy(s->s2->rbuf,s->packet, 373 s->packet=s->s2->rbuf;
|
d1_pkt.c | 195 s->packet = rdata->packet; 201 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6); 228 rdata->packet = s->packet; 243 s->packet = NULL; 354 s->packet = rdata->packet; 387 * and we have that many bytes in s->packet 389 rr->input= &(s->packet[DTLS1_RT_HEADER_LENGTH]) [all...] |
s3_pkt.c | 125 /* If extend == 0, obtain new n-byte packet; if extend == 1, increase 126 * packet by another n bytes. 127 * The packet will be in the sub-array of s->s3->rbuf.buf specified 128 * by s->packet and s->packet_length. 152 /* start with empty packet ... */ 157 /* check if next packet length is large 163 /* Note that even if packet is corrupted 174 s->packet = rb->buf + rb->offset; 180 * because the read operation returns the whole packet 202 * 'len' bytes already pointed to by 'packet', [all...] |
/external/wpa_supplicant/ |
l2_packet_pcap.c | 2 * WPA Supplicant - Layer2 packet handling with libpcap/libdnet and WinPcap 128 const u_char *packet; local 133 packet = pcap_next(pcap, &hdr); 135 if (packet == NULL || hdr.caplen < sizeof(*ethhdr)) 138 ethhdr = (struct l2_ethhdr *) packet;
|
/external/wpa_supplicant_6/wpa_supplicant/src/l2_packet/ |
l2_packet_pcap.c | 2 * WPA Supplicant - Layer2 packet handling with libpcap/libdnet and WinPcap 128 const u_char *packet; local 133 packet = pcap_next(pcap, &hdr); 135 if (packet == NULL || hdr.caplen < sizeof(*ethhdr)) 138 ethhdr = (struct l2_ethhdr *) packet;
|
/external/dnsmasq/src/ |
util.c | 490 int read_write(int fd, unsigned char *packet, int size, int rw) 498 n = read(fd, &packet[done], (size_t)(size - done)); 500 n = write(fd, &packet[done], (size_t)(size - done));
|
lease.c | 73 borrow DNS packet buffer which is always larger than 1000 bytes */ 77 daemon->dhcp_buff, daemon->packet) == 5) 88 if (strcmp(daemon->packet, "*") != 0) 89 clid_len = parse_hex(daemon->packet, (unsigned char *)daemon->packet, 255, NULL, NULL); 106 lease_set_hwaddr(lease, (unsigned char *)daemon->dhcp_buff2, (unsigned char *)daemon->packet, hw_len, hw_type, clid_len);
|
/libcore/dalvik/src/main/java/dalvik/system/ |
BlockGuard.java | 318 public int recv(FileDescriptor fd, DatagramPacket packet, byte[] data, int offset, 321 return mNetwork.recv(fd, packet, data, offset, length, peek, connected); 324 public int recvDirect(FileDescriptor fd, DatagramPacket packet, int address, int offset, 327 return mNetwork.recvDirect(fd, packet, address, offset, length, peek, connected);
|
/external/chromium/third_party/libevent/ |
evdns.c | 151 #define MAX_ADDRS 32 /* maximum number of addresses from a single packet */ 162 u8 *request; /* the dns packet data */ 165 int tx_count; /* the number of times that this packet has been sent */ 459 /* and wait longer to send the next probe packet. */ 680 /* this processes a parsed reply packet */ 756 name_parse(u8 *packet, int length, int *idx, char *name_out, int name_out_len) { 760 #define GET32(x) do { if (j + 4 > length) goto err; memcpy(&_t32, packet + j, 4); j += 4; x = ntohl(_t32); } while(0) 761 #define GET16(x) do { if (j + 2 > length) goto err; memcpy(&_t, packet + j, 2); j += 2; x = ntohs(_t); } while(0) 762 #define GET8(x) do { if (j >= length) goto err; x = packet[j++]; } while(0) 771 /* packet. * 1170 u8 packet[1500]; local 1197 u8 packet[1500]; local [all...] |
/prebuilt/common/ddmlib/ |
ddmlib-prebuilt.jar | |
/external/libpcap/packaging/ |
pcap.spec | 4 Summary: packet capture library 15 Packet-capture library LIBPCAP 0.9.4
|
/external/tremolo/Tremolo/ |
dsp.c | 178 oggpack_readinit(&opb,op->packet); 180 /* Check the packet type */ 182 /* Oops. This is not an audio data packet */ 213 oggpack_readinit(&vd->opb,op->packet); 215 /* Check the packet type */ 217 /* Oops. This is not an audio data packet */ 238 /* packet decode and portions of synthesis that rely on only this block */ 252 making sure our last packet doesn't end with added padding.
|
/external/ipsec-tools/src/racoon/ |
isakmp_cfg.c | 133 * Handle an ISAKMP config mode packet 141 struct isakmp *packet; local 149 /* Check that the packet is long enough to have a header */ 150 if (msg->l < sizeof(*packet)) { 151 plog(LLV_ERROR, LOCATION, NULL, "Unexpected short packet\n"); 155 packet = (struct isakmp *)msg->v; 158 if ((packet->flags & ISAKMP_FLAG_E) == 0) { 165 * Decrypt the packet. If this is the beginning of a new 169 iph1->mode_cfg->last_msgid != packet->msgid ) 171 isakmp_cfg_newiv(iph1, packet->msgid) [all...] |
/external/bluetooth/bluez/network/ |
server.c | 377 uint8_t packet[BNEP_MTU]; local 378 struct bnep_setup_conn_req *req = (void *) packet; 393 n = read(sk, packet, sizeof(packet));
|