/external/libpcap/tests/ |
opentest.c | 54 int dorfmon, dopromisc, snaplen, useactivate, bufsize; local 62 snaplen = MAXIMUM_SNAPLEN; 90 snaplen = strtol(optarg, &end, 0); 92 || snaplen < 0 || snaplen > MAXIMUM_SNAPLEN) 93 error("invalid snaplen %s", optarg); 94 else if (snaplen == 0) 95 snaplen = MAXIMUM_SNAPLEN; 120 status = pcap_set_snaplen(pd, snaplen); 177 "Usage: %s [ -Ipa ] [ -i interface ] [ -s snaplen ] [ -B bufsize ]\n" [all...] |
filtertest.c | 167 long snaplen; local 181 snaplen = 68; 217 snaplen = strtol(optarg, &end, 0); 219 || snaplen < 0 || snaplen > 65535) 220 error("invalid snaplen %s", optarg); 221 else if (snaplen == 0) 222 snaplen = 65535; 246 pd = pcap_open_dead(dlt, snaplen); 263 "Usage: %s [-dO] [ -F file ] [ -m netmask] [ -s snaplen ] dlt [ expression ]\n" [all...] |
/external/qemu/android/ |
qemu-tcpdump.c | 52 uint32_t snaplen; member in struct:__anon12858 63 h.snaplen = PCAP_SNAPLEN;
|
/external/tcpdump/ |
interface.h | 418 #define snaplen gndo->ndo_snaplen macro
|
/external/chromium_org/third_party/webrtc/test/ |
rtp_file_reader.cc | 356 uint32_t snaplen; // Max length of captured packets, in octets. local 360 TRY_PCAP(Read(&snaplen, false));
|
/external/libpcap/pcap/ |
pcap.h | 130 bpf_u_int32 snaplen; /* max length saved portion of each pkt */ member in struct:pcap_file_header
|
/external/libpcap/ |
sf-pcap-ng.c | 133 bpf_u_int32 snaplen; member in struct:interface_description_block 881 idbp->snaplen = SWAPLONG(idbp->snaplen); 913 p->snapshot = idbp->snaplen; 1084 idbp->snaplen = SWAPLONG(idbp->snaplen); 1101 if (p->snapshot != idbp->snaplen) { 1104 idbp->snaplen);
|
gencode.c | 399 static int snaplen; variable 462 snaplen = pcap_snapshot(p); 463 if (snaplen == 0) { 465 "snaplen of 0 rejects all packets"); 477 root = gen_retblk(snaplen); 604 backpatch(p, gen_retblk(snaplen)); [all...] |
/external/qemu/net/ |
net-android.c | 2014 uint32_t snaplen; member in struct:pcap_file_hdr [all...] |
net.c | 1935 uint32_t snaplen; member in struct:pcap_file_hdr [all...] |