| /prebuilts/ndk/9/platforms/android-19/arch-mips64/usr/include/linux/netfilter/ |
| xt_osf.h | 71 struct tcphdr tcp; member in struct:xt_osf_nlmsg
|
| /prebuilts/ndk/9/platforms/android-19/arch-x86_64/usr/include/linux/netfilter/ |
| xt_osf.h | 71 struct tcphdr tcp; member in struct:xt_osf_nlmsg
|
| /sdk/emulator/opengl/shared/OpenglCodecCommon/ |
| TcpStream.cpp | 27 #include <netinet/tcp.h>
|
| UnixStream.cpp | 27 #include <netinet/tcp.h>
|
| SocketStream.cpp | 25 #include <netinet/tcp.h>
|
| /external/chromium_org/third_party/libjingle/source/talk/session/tunnel/ |
| pseudotcpchannel.cc | 153 // TCP negotiation. 331 LOG_F(LS_WARNING) << "NULL tcp"; 355 LOG_F(LS_WARNING) << "NULL tcp"; 373 LOG_F(LS_WARNING) << "NULL tcp"; 397 void PseudoTcpChannel::OnTcpOpen(PseudoTcp* tcp) { 401 ASSERT(tcp == tcp_); 410 void PseudoTcpChannel::OnTcpReadable(PseudoTcp* tcp) { 414 ASSERT(tcp == tcp_); 424 void PseudoTcpChannel::OnTcpWriteable(PseudoTcp* tcp) { 428 ASSERT(tcp == tcp_) [all...] |
| pseudotcpchannel.h | 122 virtual IPseudoTcpNotify::WriteResult TcpWritePacket(PseudoTcp* tcp,
|
| /external/chromium_org/extensions/common/api/sockets/ |
| sockets_manifest_permission.cc | 125 if (sockets->tcp) { 128 sockets->tcp->connect, 209 sockets.tcp.reset(new Sockets::Tcp()); 211 sockets.tcp->connect, this, SocketPermissionRequest::TCP_CONNECT); 212 if (sockets.tcp->connect->as_strings->size() == 0) { 213 sockets.tcp.reset(NULL);
|
| /device/generic/goldfish/opengl/shared/OpenglCodecCommon/ |
| UnixStream.cpp | 25 #include <netinet/tcp.h>
|
| SocketStream.cpp | 26 #include <netinet/tcp.h>
|
| /external/iptables/extensions/ |
| libxt_osf.c | 27 #include <netinet/tcp.h>
|
| libxt_TCPOPTSTRIP.c | 10 #include <netinet/tcp.h> 46 " --strip-options value strip specified TCP options denoted by value\n" 47 " (separated by comma) from TCP header\n" 77 "Bad TCP option value \"%s\"", arg);
|
| /external/pdfium/core/src/fxcodec/fx_libopenjpeg/libopenjpeg20/ |
| t1.h | 125 @param tcp Tile coding parameters 130 opj_tcp_t *tcp,
|
| tcd.c | 202 for (layno = 0; layno < tcd->tcp->numlayers; layno++) { 301 opj_tcp_t *tcd_tcp = tcd->tcp; 401 opj_tcp_t *tcd_tcp = tcd->tcp; 1207 opj_tcp_t *tcp = &p_tcd->cp->tcps[0]; local [all...] |
| /external/chromium_org/native_client_sdk/src/examples/api/socket/ |
| socket.cc | 43 void Connect(const std::string& host, bool tcp); 128 void ExampleInstance::Connect(const std::string& host, bool tcp) { 134 if (tcp) {
|
| example.js | 32 if (type == 'tcp') {
|
| /external/smack/src/org/jivesoftware/smackx/bytestreams/socks5/packet/ |
| Bytestream.java | 33 private Mode mode = Mode.tcp;
82 * @param mode the transport mode, either UDP or TCP
446 * The stream can be either a TCP stream or a UDP stream.
453 * A TCP based stream.
455 tcp,
enum constant in enum:Bytestream.Mode 468 mode = tcp;
|
| /external/libpcap/ |
| scanner.l | 199 tcp return TCP; 380 tcp-fin { yylval.i = 0x01; return NUM; } 381 tcp-syn { yylval.i = 0x02; return NUM; } 382 tcp-rst { yylval.i = 0x04; return NUM; } 383 tcp-push { yylval.i = 0x08; return NUM; } 384 tcp-ack { yylval.i = 0x10; return NUM; } 385 tcp-urg { yylval.i = 0x20; return NUM; }
|
| /external/android-clat/ |
| checksum.c | 22 #include <netinet/tcp.h> 86 * calculate the pseudo header checksum for use in tcp/udp/icmp headers 106 * calculate the pseudo header checksum for use in tcp/udp headers
|
| /external/antlr/antlr-3.4/runtime/ObjC/ANTLR.framework/Headers/ |
| ANTLRDebugEventProxy.h | 32 #import <netinet/tcp.h>
|
| /external/antlr/antlr-3.4/runtime/ObjC/ANTLR.framework/Versions/A/Headers/ |
| ANTLRDebugEventProxy.h | 32 #import <netinet/tcp.h>
|
| /external/antlr/antlr-3.4/runtime/ObjC/ANTLR.framework/Versions/Current/Headers/ |
| ANTLRDebugEventProxy.h | 32 #import <netinet/tcp.h>
|
| /external/antlr/antlr-3.4/runtime/ObjC/Framework/ |
| ANTLRDebugEventProxy.h | 32 #import <netinet/tcp.h>
|
| /external/mdnsresponder/mDNSCore/ |
| uDNS.c | 519 const char *prot = n->Protocol == NATOp_MapUDP ? "UDP" : n->Protocol == NATOp_MapTCP ? "TCP" : "?"; 652 // Even if we DIDN'T make a successful UPnP mapping yet, we might still have a partially-open TCP connection we need to clean up 731 // with LLQs over TLS/TCP we're doing a weird thing where instead of requesting packets be sent to ExternalAddress:ExternalPort 732 // we're requesting that packets be sent to ExternalPort, but at the source address of our outgoing TCP connection. 733 // Normally, after going through the NAT gateway, the source address of our outgoing TCP connection is the same as ExternalAddress, 734 // so this is fine, except when the TCP connection ends up going over a VPN tunnel instead. 735 // To work around this, if we find that the source address for our TCP connection is not a private address, we tell the Dot Mac 753 if (q->tcp) { LogMsg("sendChallengeResponse: ERROR!!: question %##s (%s) tcp non-NULL", q->qname.c, DNSTypeName(q->qtype)); return; } 775 q->ThisQInterval = q->tcp ? 0 : (kLLQ_INIT_RESEND * q->ntries * mDNSPlatformOneSecond); // If using TCP, don't need to retr (…) [all...] |
| /external/chromium_org/third_party/mesa/src/src/gallium/drivers/nvc0/ |
| nvc0_program.c | 228 /* Common part of header generation for VP, TCP, TEP and GP. */ 347 nvc0_tcp_gen_header(struct nvc0_program *tcp, struct nv50_ir_prog_info *info) 351 tcp->tp.input_patch_size = info->prop.tp.inputPatchSize; 356 tcp->hdr[0] = 0x20061 | (2 << 10); 358 tcp->hdr[1] = opcs << 24; 359 tcp->hdr[2] = info->prop.tp.outputPatchSize << 24; 361 tcp->hdr[4] = 0xff000; /* initial min/max parallel output read address */ 363 nvc0_vtgp_gen_header(tcp, info); 365 nvc0_tp_get_tess_mode(tcp, info);
|