/external/qemu/ |
net.c | 444 VLANPacket *packet; local 446 while ((packet = vc->vlan->send_queue) != NULL) { 449 vc->vlan->send_queue = packet->next; 451 ret = qemu_deliver_packet(packet->sender, packet->data, packet->size); 452 if (ret == 0 && packet->sent_cb != NULL) { 453 packet->next = vc->vlan->send_queue; 454 vc->vlan->send_queue = packet; 458 if (packet->sent_cb 469 VLANPacket *packet; local 582 VLANPacket *packet; local [all...] |
/external/quake/quake/src/QW/ |
qwcl.spec.sh | 29 packet loss - the game would freeze and resume several seconds later; and
|
qwsv.spec.sh | 29 packet loss - the game would freeze and resume several seconds later; and
|
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
mediachannel.h | 73 virtual bool SendPacket(talk_base::Buffer* packet) = 0; 74 virtual bool SendRtcp(talk_base::Buffer* packet) = 0; 89 // Called when a RTP packet is received. 90 virtual void OnPacketReceived(talk_base::Buffer* packet) = 0; 91 // Called when a RTCP packet is received. 92 virtual void OnRtcpReceived(talk_base::Buffer* packet) = 0;
|
channel.h | 156 virtual bool SendPacket(talk_base::Buffer* packet); 157 virtual bool SendRtcp(talk_base::Buffer* packet); 164 bool SendPacket(bool rtcp, talk_base::Buffer* packet); 165 void HandlePacket(bool rtcp, talk_base::Buffer* packet);
|
mediaengine.h | 253 virtual void OnPacketReceived(talk_base::Buffer* packet) {} 254 virtual void OnRtcpReceived(talk_base::Buffer* packet) {}
|
/external/openssl/include/openssl/ |
dtls1.h | 223 unsigned int mtu; /* max DTLS packet size */ 250 unsigned char *packet; member in struct:dtls1_record_data_st
|
/external/openssl/ssl/ |
dtls1.h | 223 unsigned int mtu; /* max DTLS packet size */ 250 unsigned char *packet; member in struct:dtls1_record_data_st
|
s23_clnt.c | 535 p=s->packet; 598 s->packet= &(s->s2->rbuf[0]); 599 memcpy(s->packet,buf,n); 674 s->packet= &(s->s3->rbuf.buf[0]); 675 memcpy(s->packet,buf,n);
|
s2_pkt.c | 182 p=s->packet; 199 p=s->packet; 229 p= &(s->packet[2]); 283 /* Possibly the packet that we just read had 0 actual data bytes. 332 s->packet= &(s->s2->rbuf[s->s2->rbuf_offs]); 354 if (s->packet != s->s2->rbuf) 355 memcpy(s->s2->rbuf,s->packet, 373 s->packet=s->s2->rbuf;
|
d1_pkt.c | 195 s->packet = rdata->packet; 201 memcpy(&(s->s3->read_sequence[2]), &(rdata->packet[5]), 6); 228 rdata->packet = s->packet; 243 s->packet = NULL; 351 s->packet = rdata->packet; 384 * and we have that many bytes in s->packet 386 rr->input= &(s->packet[DTLS1_RT_HEADER_LENGTH]) [all...] |
/external/wpa_supplicant/ |
l2_packet_pcap.c | 2 * WPA Supplicant - Layer2 packet handling with libpcap/libdnet and WinPcap 128 const u_char *packet; local 133 packet = pcap_next(pcap, &hdr); 135 if (packet == NULL || hdr.caplen < sizeof(*ethhdr)) 138 ethhdr = (struct l2_ethhdr *) packet;
|
/external/wpa_supplicant_6/wpa_supplicant/src/l2_packet/ |
l2_packet_pcap.c | 2 * WPA Supplicant - Layer2 packet handling with libpcap/libdnet and WinPcap 128 const u_char *packet; local 133 packet = pcap_next(pcap, &hdr); 135 if (packet == NULL || hdr.caplen < sizeof(*ethhdr)) 138 ethhdr = (struct l2_ethhdr *) packet;
|
/external/wpa_supplicant_8/src/l2_packet/ |
l2_packet_freebsd.c | 2 * WPA Supplicant - Layer2 packet handling with FreeBSD 86 const u_char *packet; local 91 packet = pcap_next(pcap, &hdr); 93 if (packet == NULL || hdr.caplen < sizeof(*ethhdr)) 96 ethhdr = (struct l2_ethhdr *) packet;
|
l2_packet_pcap.c | 2 * WPA Supplicant - Layer2 packet handling with libpcap/libdnet and WinPcap 128 const u_char *packet; local 133 packet = pcap_next(pcap, &hdr); 135 if (packet == NULL || hdr.caplen < sizeof(*ethhdr)) 138 ethhdr = (struct l2_ethhdr *) packet;
|
/hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib/ |
driver_nl80211.h | 32 #include <netpacket/packet.h>
|
/external/chromium/chrome/browser/sync/notifier/ |
cache_invalidation_packet_handler.cc | 36 // all the packet sending/receiving classes. 64 LOG(ERROR) << "Could not get packet data"; 98 LOG(ERROR) << "Could not find cache invalidation IQ packet element"; 237 const std::string& packet) { 242 if (!base::Base64Decode(packet, &decoded_message)) { 244 << packet;
|
/frameworks/base/media/libstagefright/mpeg2ts/ |
MPEG2TSExtractor.cpp | 208 uint8_t packet[kTSPacketSize]; local 209 ssize_t n = mDataSource->readAt(mOffset, packet, kTSPacketSize); 216 return mParser->feedTSPacket(packet, kTSPacketSize);
|
/external/grub/netboot/ |
eepro100.c | 78 * looks at the recieve buffer to see if there is already a packet there. 234 char packet[1518]; member in struct:RxFD 365 * This transmits a packet. 369 * unsigned short s: size of the data-part of the packet. 370 * char *p: the data for the packet. 390 printf ("transmitting type %hX packet (%d bytes). status = %hX, cmd=%hX\n", 432 * This recieves a packet from the network. 436 * returns: 1 if a packet was recieved. 439 * returns the packet in the array nic->packet [all...] |
rtl8139.c | 47 get the next packet. Oh well, what fun. 108 RxCnt=0x72, /* packet received counter */ 419 /* Received a good packet */ 424 memcpy(nic->packet, rx_ring + ring_offs + 4, semi_count); 425 memcpy(nic->packet+semi_count, rx_ring, rx_size-4-semi_count); 427 printf("rx packet %d+%d bytes", semi_count,rx_size-4-semi_count); 430 memcpy(nic->packet, rx_ring + ring_offs + 4, nic->packetlen); 432 printf("rx packet %d bytes", rx_size-4); 438 nic->packet[12], nic->packet[13], rx_status) [all...] |
/external/dnsmasq/src/ |
util.c | 490 int read_write(int fd, unsigned char *packet, int size, int rw) 498 n = read(fd, &packet[done], (size_t)(size - done)); 500 n = write(fd, &packet[done], (size_t)(size - done));
|
/libcore/luni/src/main/java/java/nio/ |
DatagramChannelImpl.java | 179 // receive real data packet, (not peek) 215 // copy the data of received packet 234 // copy the data of received packet 551 public void receive(DatagramPacket packet) throws IOException { 555 super.receive(packet); 562 public void send(DatagramPacket packet) throws IOException { 566 super.send(packet);
|
/external/chromium/third_party/libevent/ |
evdns.c | 151 #define MAX_ADDRS 32 /* maximum number of addresses from a single packet */ 162 u8 *request; /* the dns packet data */ 165 int tx_count; /* the number of times that this packet has been sent */ 459 /* and wait longer to send the next probe packet. */ 680 /* this processes a parsed reply packet */ 756 name_parse(u8 *packet, int length, int *idx, char *name_out, int name_out_len) { 760 #define GET32(x) do { if (j + 4 > length) goto err; memcpy(&_t32, packet + j, 4); j += 4; x = ntohl(_t32); } while(0) 761 #define GET16(x) do { if (j + 2 > length) goto err; memcpy(&_t, packet + j, 2); j += 2; x = ntohs(_t); } while(0) 762 #define GET8(x) do { if (j >= length) goto err; x = packet[j++]; } while(0) 771 /* packet. * 1170 u8 packet[1500]; local 1197 u8 packet[1500]; local [all...] |
/external/libpcap/packaging/ |
pcap.spec | 4 Summary: packet capture library 15 Packet-capture library LIBPCAP 0.9.4
|
/external/tremolo/Tremolo/ |
dsp.c | 178 oggpack_readinit(&opb,op->packet); 180 /* Check the packet type */ 182 /* Oops. This is not an audio data packet */ 213 oggpack_readinit(&vd->opb,op->packet); 215 /* Check the packet type */ 217 /* Oops. This is not an audio data packet */ 238 /* packet decode and portions of synthesis that rely on only this block */ 252 making sure our last packet doesn't end with added padding.
|