HomeSort by relevance Sort by last modified time
    Searched refs:mbuf (Results 51 - 75 of 110) sorted by null

1 23 4 5

  /external/qemu/slirp-android/
ip.h 186 struct mbuf *mptr;
191 struct mbuf *mptr;
202 struct mbuf_ptr ih_mbuf; /* backpointer to mbuf */
243 * Structure stored in mbuf in inpcb.ip_options
tcp_timer.c 300 tcp_respond(tp, &tp->t_template, (struct mbuf *)NULL,
303 tcp_respond(tp, &tp->t_template, (struct mbuf *)NULL,
cksum.c 41 * XXX Since we will never span more than 1 mbuf, we can optimise this
47 int cksum(struct mbuf *m, int len)
129 /* The last mbuf has odd # of bytes. Follow the
ip_icmp.c 72 icmp_input(struct mbuf *m, int hlen)
86 * Locate icmp structure in mbuf, and check
197 * mbuf *msrc is used as a template, but is NOT m_free()'d.
206 icmp_error(struct mbuf *msrc, u_char type, u_char code, int minsize,
212 register struct mbuf *m;
244 if(!(m=m_get())) goto end_error; /* get mbuf */
322 icmp_reflect(struct mbuf *m)
347 * mbuf's data back, and adjust the IP length.
tftp.c 136 struct mbuf *m;
179 struct mbuf *m;
224 struct mbuf *m;
418 void tftp_input(struct mbuf *m)
ip_input.c 76 ip_input(struct mbuf *m)
156 /* Should drop packet if mbuf too long? hmmm... */
270 register struct mbuf *m = dtom(ip);
292 struct mbuf *t;
373 struct mbuf *t = dtom(q);
387 * If the fragments concatenated to an mbuf that's
390 * the old buffer (in the mbuf), so we must point ip
501 struct mbuf *m;
704 ip_stripoptions(register struct mbuf *m, struct mbuf *mopt
    [all...]
bootp.c 161 struct mbuf *m;
323 void bootp_input(struct mbuf *m)
  /external/qemu/slirp/
cksum.c 41 * XXX Since we will never span more than 1 mbuf, we can optimise this
47 int cksum(struct mbuf *m, int len)
129 /* The last mbuf has odd # of bytes. Follow the
ip_icmp.c 71 icmp_input(struct mbuf *m, int hlen)
85 * Locate icmp structure in mbuf, and check
195 * mbuf *msrc is used as a template, but is NOT m_free()'d.
204 icmp_error(struct mbuf *msrc, u_char type, u_char code, int minsize,
210 register struct mbuf *m;
242 if(!(m=m_get())) goto end_error; /* get mbuf */
320 icmp_reflect(struct mbuf *m)
345 * mbuf's data back, and adjust the IP length.
tftp.c 136 struct mbuf *m;
177 struct mbuf *m;
220 struct mbuf *m;
412 void tftp_input(struct mbuf *m)
ip_input.c 76 ip_input(struct mbuf *m)
156 /* Should drop packet if mbuf too long? hmmm... */
270 register struct mbuf *m = dtom(ip);
292 struct mbuf *t;
373 struct mbuf *t = dtom(q);
387 * If the fragments concatenated to an mbuf that's
390 * the old buffer (in the mbuf), so we must point ip
501 struct mbuf *m;
704 ip_stripoptions(register struct mbuf *m, struct mbuf *mopt
    [all...]
udp.c 51 static void udp_emu(struct socket *so, struct mbuf *m);
75 udp_input(register struct mbuf *m, int iphlen)
79 /* struct mbuf *opts = 0;*/
97 ip_stripoptions(m, (struct mbuf *)0);
102 * Get IP and UDP header together in first mbuf.
108 * Make mbuf data length reflect UDP length.
242 /* restore the orig mbuf packet */
255 int udp_output2(struct socket *so, struct mbuf *m,
275 * Fill in mbuf with extended UDP header
310 int udp_output(struct socket *so, struct mbuf *m
    [all...]
bootp.c 156 struct mbuf *m;
319 void bootp_input(struct mbuf *m)
  /frameworks/base/cmds/stagefright/
stagefright.cpp 143 MediaBuffer *mbuf; local
144 err = source->read(&mbuf);
153 fwrite((const uint8_t *)mbuf->data() + mbuf->range_offset(),
155 mbuf->range_length(),
157 (ssize_t)mbuf->range_length());
159 mbuf->release();
160 mbuf = NULL;
    [all...]
  /external/openssl/apps/
enc.c 105 char mbuf[sizeof magic-1]; local
538 } else if(BIO_read(rbio,mbuf,sizeof mbuf) != sizeof mbuf
544 } else if(memcmp(mbuf,magic,sizeof magic-1)) {
  /frameworks/base/media/libstagefright/matroska/
MatroskaExtractor.cpp 376 MediaBuffer *mbuf = new MediaBuffer(frame.len); local
377 mbuf->meta_data()->setInt64(kKeyTime, timeUs);
378 mbuf->meta_data()->setInt32(kKeyIsSyncFrame, block->IsKey());
380 long n = frame.Read(mExtractor->mReader, (unsigned char *)mbuf->data());
388 mPendingFrames.push_back(mbuf);
  /external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/
peerkey.c 338 u8 *mbuf; local
344 mbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY, NULL,
347 if (mbuf == NULL)
376 os_free(mbuf);
386 mbuf, mlen, NULL);
395 u8 *mbuf, *pos; local
403 mbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY, NULL,
406 if (mbuf == NULL)
441 ETH_P_EAPOL, mbuf, mlen, msg->key_mic);
    [all...]
  /external/wpa_supplicant_8/src/rsn_supp/
peerkey.c 339 u8 *mbuf; local
345 mbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY, NULL,
348 if (mbuf == NULL)
377 os_free(mbuf);
387 mbuf, mlen, NULL);
396 u8 *mbuf, *pos; local
404 mbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY, NULL,
407 if (mbuf == NULL)
442 ETH_P_EAPOL, mbuf, mlen, msg->key_mic);
    [all...]
  /bionic/libc/include/net/
if_ether.h 43 #include <sys/mbuf.h>
105 * Ethernet-specific mbuf flags.
  /development/ndk/platforms/android-3/include/net/
if_ether.h 41 #include <sys/mbuf.h>
103 * Ethernet-specific mbuf flags.
  /external/ipsec-tools/src/libipsec/
key_debug.c 57 #include <sys/mbuf.h>
777 struct mbuf *m;
783 printf("mbuf(%p){ m_next:%p m_nextpkt:%p m_data:%p "
807 struct mbuf *m0;
809 struct mbuf *m = m0;
  /prebuilt/ndk/android-ndk-r4/platforms/android-3/arch-arm/usr/include/net/
if_ether.h 41 #include <sys/mbuf.h>
103 * Ethernet-specific mbuf flags.
  /prebuilt/ndk/android-ndk-r4/platforms/android-4/arch-arm/usr/include/net/
if_ether.h 41 #include <sys/mbuf.h>
103 * Ethernet-specific mbuf flags.
  /prebuilt/ndk/android-ndk-r4/platforms/android-5/arch-arm/usr/include/net/
if_ether.h 41 #include <sys/mbuf.h>
103 * Ethernet-specific mbuf flags.
  /prebuilt/ndk/android-ndk-r4/platforms/android-5/arch-x86/usr/include/net/
if_ether.h 41 #include <sys/mbuf.h>
103 * Ethernet-specific mbuf flags.

Completed in 1185 milliseconds

1 23 4 5