/external/qemu/slirp-android/ |
ip.h | 186 struct mbuf *mptr; 191 struct mbuf *mptr; 202 struct mbuf_ptr ih_mbuf; /* backpointer to mbuf */ 243 * Structure stored in mbuf in inpcb.ip_options
|
tcp_timer.c | 300 tcp_respond(tp, &tp->t_template, (struct mbuf *)NULL, 303 tcp_respond(tp, &tp->t_template, (struct mbuf *)NULL,
|
cksum.c | 41 * XXX Since we will never span more than 1 mbuf, we can optimise this 47 int cksum(struct mbuf *m, int len) 129 /* The last mbuf has odd # of bytes. Follow the
|
ip_icmp.c | 72 icmp_input(struct mbuf *m, int hlen) 86 * Locate icmp structure in mbuf, and check 197 * mbuf *msrc is used as a template, but is NOT m_free()'d. 206 icmp_error(struct mbuf *msrc, u_char type, u_char code, int minsize, 212 register struct mbuf *m; 244 if(!(m=m_get())) goto end_error; /* get mbuf */ 322 icmp_reflect(struct mbuf *m) 347 * mbuf's data back, and adjust the IP length.
|
tftp.c | 136 struct mbuf *m; 179 struct mbuf *m; 224 struct mbuf *m; 418 void tftp_input(struct mbuf *m)
|
ip_input.c | 76 ip_input(struct mbuf *m) 156 /* Should drop packet if mbuf too long? hmmm... */ 270 register struct mbuf *m = dtom(ip); 292 struct mbuf *t; 373 struct mbuf *t = dtom(q); 387 * If the fragments concatenated to an mbuf that's 390 * the old buffer (in the mbuf), so we must point ip 501 struct mbuf *m; 704 ip_stripoptions(register struct mbuf *m, struct mbuf *mopt [all...] |
bootp.c | 161 struct mbuf *m; 323 void bootp_input(struct mbuf *m)
|
/external/qemu/slirp/ |
cksum.c | 41 * XXX Since we will never span more than 1 mbuf, we can optimise this 47 int cksum(struct mbuf *m, int len) 129 /* The last mbuf has odd # of bytes. Follow the
|
ip_icmp.c | 71 icmp_input(struct mbuf *m, int hlen) 85 * Locate icmp structure in mbuf, and check 195 * mbuf *msrc is used as a template, but is NOT m_free()'d. 204 icmp_error(struct mbuf *msrc, u_char type, u_char code, int minsize, 210 register struct mbuf *m; 242 if(!(m=m_get())) goto end_error; /* get mbuf */ 320 icmp_reflect(struct mbuf *m) 345 * mbuf's data back, and adjust the IP length.
|
tftp.c | 136 struct mbuf *m; 177 struct mbuf *m; 220 struct mbuf *m; 412 void tftp_input(struct mbuf *m)
|
ip_input.c | 76 ip_input(struct mbuf *m) 156 /* Should drop packet if mbuf too long? hmmm... */ 270 register struct mbuf *m = dtom(ip); 292 struct mbuf *t; 373 struct mbuf *t = dtom(q); 387 * If the fragments concatenated to an mbuf that's 390 * the old buffer (in the mbuf), so we must point ip 501 struct mbuf *m; 704 ip_stripoptions(register struct mbuf *m, struct mbuf *mopt [all...] |
udp.c | 51 static void udp_emu(struct socket *so, struct mbuf *m); 75 udp_input(register struct mbuf *m, int iphlen) 79 /* struct mbuf *opts = 0;*/ 97 ip_stripoptions(m, (struct mbuf *)0); 102 * Get IP and UDP header together in first mbuf. 108 * Make mbuf data length reflect UDP length. 242 /* restore the orig mbuf packet */ 255 int udp_output2(struct socket *so, struct mbuf *m, 275 * Fill in mbuf with extended UDP header 310 int udp_output(struct socket *so, struct mbuf *m [all...] |
bootp.c | 156 struct mbuf *m; 319 void bootp_input(struct mbuf *m)
|
/frameworks/base/cmds/stagefright/ |
stagefright.cpp | 143 MediaBuffer *mbuf; local 144 err = source->read(&mbuf); 153 fwrite((const uint8_t *)mbuf->data() + mbuf->range_offset(), 155 mbuf->range_length(), 157 (ssize_t)mbuf->range_length()); 159 mbuf->release(); 160 mbuf = NULL; [all...] |
/external/openssl/apps/ |
enc.c | 105 char mbuf[sizeof magic-1]; local 538 } else if(BIO_read(rbio,mbuf,sizeof mbuf) != sizeof mbuf 544 } else if(memcmp(mbuf,magic,sizeof magic-1)) {
|
/frameworks/base/media/libstagefright/matroska/ |
MatroskaExtractor.cpp | 376 MediaBuffer *mbuf = new MediaBuffer(frame.len); local 377 mbuf->meta_data()->setInt64(kKeyTime, timeUs); 378 mbuf->meta_data()->setInt32(kKeyIsSyncFrame, block->IsKey()); 380 long n = frame.Read(mExtractor->mReader, (unsigned char *)mbuf->data()); 388 mPendingFrames.push_back(mbuf);
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
peerkey.c | 338 u8 *mbuf; local 344 mbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY, NULL, 347 if (mbuf == NULL) 376 os_free(mbuf); 386 mbuf, mlen, NULL); 395 u8 *mbuf, *pos; local 403 mbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY, NULL, 406 if (mbuf == NULL) 441 ETH_P_EAPOL, mbuf, mlen, msg->key_mic); [all...] |
/external/wpa_supplicant_8/src/rsn_supp/ |
peerkey.c | 339 u8 *mbuf; local 345 mbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY, NULL, 348 if (mbuf == NULL) 377 os_free(mbuf); 387 mbuf, mlen, NULL); 396 u8 *mbuf, *pos; local 404 mbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY, NULL, 407 if (mbuf == NULL) 442 ETH_P_EAPOL, mbuf, mlen, msg->key_mic); [all...] |
/bionic/libc/include/net/ |
if_ether.h | 43 #include <sys/mbuf.h> 105 * Ethernet-specific mbuf flags.
|
/development/ndk/platforms/android-3/include/net/ |
if_ether.h | 41 #include <sys/mbuf.h> 103 * Ethernet-specific mbuf flags.
|
/external/ipsec-tools/src/libipsec/ |
key_debug.c | 57 #include <sys/mbuf.h> 777 struct mbuf *m; 783 printf("mbuf(%p){ m_next:%p m_nextpkt:%p m_data:%p " 807 struct mbuf *m0; 809 struct mbuf *m = m0;
|
/prebuilt/ndk/android-ndk-r4/platforms/android-3/arch-arm/usr/include/net/ |
if_ether.h | 41 #include <sys/mbuf.h> 103 * Ethernet-specific mbuf flags.
|
/prebuilt/ndk/android-ndk-r4/platforms/android-4/arch-arm/usr/include/net/ |
if_ether.h | 41 #include <sys/mbuf.h> 103 * Ethernet-specific mbuf flags.
|
/prebuilt/ndk/android-ndk-r4/platforms/android-5/arch-arm/usr/include/net/ |
if_ether.h | 41 #include <sys/mbuf.h> 103 * Ethernet-specific mbuf flags.
|
/prebuilt/ndk/android-ndk-r4/platforms/android-5/arch-x86/usr/include/net/ |
if_ether.h | 41 #include <sys/mbuf.h> 103 * Ethernet-specific mbuf flags.
|