HomeSort by relevance Sort by last modified time
    Searched refs:packet (Results 76 - 100 of 176) sorted by null

1 2 34 5 6 7 8

  /external/grub/netboot/
main.c 111 static unsigned short udpchksum (struct iphdr *packet);
367 tr = (struct tftp_t *) &nic.packet[ETH_HLEN];
424 /* This ensures that the packet does not get processed as data! */
481 /* arp and rarp requests share the same packet structure. */
684 UDPCHKSUM - Checksum UDP Packet (one of the rare cases when assembly is
688 RX if (packet->udp.chksum && udpchksum(packet))
690 TX packet->udp.chksum=0;
691 if (0==(packet->udp.chksum=udpchksum(packet)))
    [all...]
tiara.c 9 TIARA.ASM Packet driver by Brian Fisher, Queens U, Kingston, Ontario
143 /* Ack packet */
150 insw(ioaddr + BMPR_MEM_PORT, nic->packet, len / 2);
152 if (memcmp(nic->packet + ETH_ALEN, nic->node_addr, ETH_ALEN) == 0)
166 const char *p) /* Packet */
eepro100.c 78 * looks at the recieve buffer to see if there is already a packet there.
234 char packet[1518]; member in struct:RxFD
365 * This transmits a packet.
369 * unsigned short s: size of the data-part of the packet.
370 * char *p: the data for the packet.
390 printf ("transmitting type %hX packet (%d bytes). status = %hX, cmd=%hX\n",
432 * This recieves a packet from the network.
436 * returns: 1 if a packet was recieved.
439 * returns the packet in the array nic->packet
    [all...]
rtl8139.c 47 get the next packet. Oh well, what fun.
108 RxCnt=0x72, /* packet received counter */
419 /* Received a good packet */
424 memcpy(nic->packet, rx_ring + ring_offs + 4, semi_count);
425 memcpy(nic->packet+semi_count, rx_ring, rx_size-4-semi_count);
427 printf("rx packet %d+%d bytes", semi_count,rx_size-4-semi_count);
430 memcpy(nic->packet, rx_ring + ring_offs + 4, nic->packetlen);
432 printf("rx packet %d bytes", rx_size-4);
438 nic->packet[12], nic->packet[13], rx_status)
    [all...]
  /external/qemu/
net-android.c 473 VLANPacket *packet; local
475 while ((packet = vc->vlan->send_queue) != NULL) {
478 vc->vlan->send_queue = packet->next;
480 ret = qemu_deliver_packet(packet->sender, packet->data, packet->size);
481 if (ret == 0 && packet->sent_cb != NULL) {
482 packet->next = vc->vlan->send_queue;
483 vc->vlan->send_queue = packet;
487 if (packet->sent_cb
498 VLANPacket *packet; local
611 VLANPacket *packet; local
    [all...]
net.c 444 VLANPacket *packet; local
446 while ((packet = vc->vlan->send_queue) != NULL) {
449 vc->vlan->send_queue = packet->next;
451 ret = qemu_deliver_packet(packet->sender, packet->data, packet->size);
452 if (ret == 0 && packet->sent_cb != NULL) {
453 packet->next = vc->vlan->send_queue;
454 vc->vlan->send_queue = packet;
458 if (packet->sent_cb
469 VLANPacket *packet; local
582 VLANPacket *packet; local
    [all...]
  /external/quake/quake/src/QW/
qwcl.spec.sh 29 packet loss - the game would freeze and resume several seconds later; and
qwsv.spec.sh 29 packet loss - the game would freeze and resume several seconds later; and
  /external/openssl/include/openssl/
dtls1.h 223 unsigned int mtu; /* max DTLS packet size */
250 unsigned char *packet; member in struct:dtls1_record_data_st
  /external/openssl/ssl/
dtls1.h 223 unsigned int mtu; /* max DTLS packet size */
250 unsigned char *packet; member in struct:dtls1_record_data_st
s23_clnt.c 535 p=s->packet;
598 s->packet= &(s->s2->rbuf[0]);
599 memcpy(s->packet,buf,n);
674 s->packet= &(s->s3->rbuf.buf[0]);
675 memcpy(s->packet,buf,n);
s2_pkt.c 182 p=s->packet;
199 p=s->packet;
229 p= &(s->packet[2]);
283 /* Possibly the packet that we just read had 0 actual data bytes.
332 s->packet= &(s->s2->rbuf[s->s2->rbuf_offs]);
354 if (s->packet != s->s2->rbuf)
355 memcpy(s->s2->rbuf,s->packet,
373 s->packet=s->s2->rbuf;
d1_pkt.c 195 s->packet = rdata->packet;
201 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6);
228 rdata->packet = s->packet;
243 s->packet = NULL;
354 s->packet = rdata->packet;
387 * and we have that many bytes in s->packet
389 rr->input= &(s->packet[DTLS1_RT_HEADER_LENGTH])
    [all...]
s3_pkt.c 125 /* If extend == 0, obtain new n-byte packet; if extend == 1, increase
126 * packet by another n bytes.
127 * The packet will be in the sub-array of s->s3->rbuf.buf specified
128 * by s->packet and s->packet_length.
152 /* start with empty packet ... */
157 /* check if next packet length is large
163 /* Note that even if packet is corrupted
174 s->packet = rb->buf + rb->offset;
180 * because the read operation returns the whole packet
202 * 'len' bytes already pointed to by 'packet',
    [all...]
  /external/wpa_supplicant/
l2_packet_pcap.c 2 * WPA Supplicant - Layer2 packet handling with libpcap/libdnet and WinPcap
128 const u_char *packet; local
133 packet = pcap_next(pcap, &hdr);
135 if (packet == NULL || hdr.caplen < sizeof(*ethhdr))
138 ethhdr = (struct l2_ethhdr *) packet;
  /external/wpa_supplicant_6/wpa_supplicant/src/l2_packet/
l2_packet_pcap.c 2 * WPA Supplicant - Layer2 packet handling with libpcap/libdnet and WinPcap
128 const u_char *packet; local
133 packet = pcap_next(pcap, &hdr);
135 if (packet == NULL || hdr.caplen < sizeof(*ethhdr))
138 ethhdr = (struct l2_ethhdr *) packet;
  /external/dnsmasq/src/
util.c 490 int read_write(int fd, unsigned char *packet, int size, int rw)
498 n = read(fd, &packet[done], (size_t)(size - done));
500 n = write(fd, &packet[done], (size_t)(size - done));
lease.c 73 borrow DNS packet buffer which is always larger than 1000 bytes */
77 daemon->dhcp_buff, daemon->packet) == 5)
88 if (strcmp(daemon->packet, "*") != 0)
89 clid_len = parse_hex(daemon->packet, (unsigned char *)daemon->packet, 255, NULL, NULL);
106 lease_set_hwaddr(lease, (unsigned char *)daemon->dhcp_buff2, (unsigned char *)daemon->packet, hw_len, hw_type, clid_len);
  /libcore/dalvik/src/main/java/dalvik/system/
BlockGuard.java 318 public int recv(FileDescriptor fd, DatagramPacket packet, byte[] data, int offset,
321 return mNetwork.recv(fd, packet, data, offset, length, peek, connected);
324 public int recvDirect(FileDescriptor fd, DatagramPacket packet, int address, int offset,
327 return mNetwork.recvDirect(fd, packet, address, offset, length, peek, connected);
  /external/chromium/third_party/libevent/
evdns.c 151 #define MAX_ADDRS 32 /* maximum number of addresses from a single packet */
162 u8 *request; /* the dns packet data */
165 int tx_count; /* the number of times that this packet has been sent */
459 /* and wait longer to send the next probe packet. */
680 /* this processes a parsed reply packet */
756 name_parse(u8 *packet, int length, int *idx, char *name_out, int name_out_len) {
760 #define GET32(x) do { if (j + 4 > length) goto err; memcpy(&_t32, packet + j, 4); j += 4; x = ntohl(_t32); } while(0)
761 #define GET16(x) do { if (j + 2 > length) goto err; memcpy(&_t, packet + j, 2); j += 2; x = ntohs(_t); } while(0)
762 #define GET8(x) do { if (j >= length) goto err; x = packet[j++]; } while(0)
771 /* packet. *
1170 u8 packet[1500]; local
1197 u8 packet[1500]; local
    [all...]
  /prebuilt/common/ddmlib/
ddmlib-prebuilt.jar 
  /external/libpcap/packaging/
pcap.spec 4 Summary: packet capture library
15 Packet-capture library LIBPCAP 0.9.4
  /external/tremolo/Tremolo/
dsp.c 178 oggpack_readinit(&opb,op->packet);
180 /* Check the packet type */
182 /* Oops. This is not an audio data packet */
213 oggpack_readinit(&vd->opb,op->packet);
215 /* Check the packet type */
217 /* Oops. This is not an audio data packet */
238 /* packet decode and portions of synthesis that rely on only this block */
252 making sure our last packet doesn't end with added padding.
  /external/ipsec-tools/src/racoon/
isakmp_cfg.c 133 * Handle an ISAKMP config mode packet
141 struct isakmp *packet; local
149 /* Check that the packet is long enough to have a header */
150 if (msg->l < sizeof(*packet)) {
151 plog(LLV_ERROR, LOCATION, NULL, "Unexpected short packet\n");
155 packet = (struct isakmp *)msg->v;
158 if ((packet->flags & ISAKMP_FLAG_E) == 0) {
165 * Decrypt the packet. If this is the beginning of a new
169 iph1->mode_cfg->last_msgid != packet->msgid )
171 isakmp_cfg_newiv(iph1, packet->msgid)
    [all...]
  /external/bluetooth/bluez/network/
server.c 377 uint8_t packet[BNEP_MTU]; local
378 struct bnep_setup_conn_req *req = (void *) packet;
393 n = read(sk, packet, sizeof(packet));

Completed in 410 milliseconds

1 2 34 5 6 7 8