/external/android-clat/ |
checksum.c | 22 #include <netinet/tcp.h> 85 * calculate the pseudo header checksum for use in tcp/udp/icmp headers 105 * calculate the pseudo header checksum for use in tcp/udp headers
|
/external/antlr/antlr-3.4/runtime/ObjC/ANTLR.framework/Headers/ |
ANTLRDebugEventProxy.h | 32 #import <netinet/tcp.h>
|
/external/antlr/antlr-3.4/runtime/ObjC/ANTLR.framework/Versions/A/Headers/ |
ANTLRDebugEventProxy.h | 32 #import <netinet/tcp.h>
|
/external/antlr/antlr-3.4/runtime/ObjC/ANTLR.framework/Versions/Current/Headers/ |
ANTLRDebugEventProxy.h | 32 #import <netinet/tcp.h>
|
/external/antlr/antlr-3.4/runtime/ObjC/Framework/ |
ANTLRDebugEventProxy.h | 32 #import <netinet/tcp.h>
|
/external/iptables/extensions/ |
libxt_TCPOPTSTRIP.c | 10 #include <netinet/tcp.h> 46 " --strip-options value strip specified TCP options denoted by value\n" 47 " (separated by comma) from TCP header\n" 77 "Bad TCP option value \"%s\"", arg);
|
/external/iw/ |
wowlan.c | 24 struct nlattr *tcp; local 28 tcp = nla_nest_start(msg, NL80211_WOWLAN_TRIG_TCP_CONNECTION); 29 if (!tcp) 180 nla_nest_end(msg, tcp); 237 else if (strcmp(argv[0], "tcp") == 0) { 317 " [tcp <config-file>] [patterns [offset1+]<pattern1> ...]", 325 "The TCP configuration file contains:\n" 468 printf(" * wake up on TCP connection\n");
|
/external/toybox/ |
toys.h | 53 #include <netinet/tcp.h>
|
/system/core/fastboot/ |
Android.mk | 34 tcp.cpp \ 120 tcp.cpp \
|
tcp.cpp | 29 #include "tcp.h" 34 namespace tcp { namespace 106 "No initialization message received (%s). Target may not support TCP fastboot", 112 *error = "Unrecognized initialization message. Target may not support TCP fastboot"; 118 *error = android::base::StringPrintf("Unknown TCP protocol version %s (host version %02d)", 199 } // namespace tcp
|
/external/mdnsresponder/mDNSCore/ |
uDNS.c | 519 const char *prot = n->Protocol == NATOp_MapUDP ? "UDP" : n->Protocol == NATOp_MapTCP ? "TCP" : "?"; 652 // Even if we DIDN'T make a successful UPnP mapping yet, we might still have a partially-open TCP connection we need to clean up 731 // with LLQs over TLS/TCP we're doing a weird thing where instead of requesting packets be sent to ExternalAddress:ExternalPort 732 // we're requesting that packets be sent to ExternalPort, but at the source address of our outgoing TCP connection. 733 // Normally, after going through the NAT gateway, the source address of our outgoing TCP connection is the same as ExternalAddress, 734 // so this is fine, except when the TCP connection ends up going over a VPN tunnel instead. 735 // To work around this, if we find that the source address for our TCP connection is not a private address, we tell the Dot Mac 753 if (q->tcp) { LogMsg("sendChallengeResponse: ERROR!!: question %##s (%s) tcp non-NULL", q->qname.c, DNSTypeName(q->qtype)); return; } 775 q->ThisQInterval = q->tcp ? 0 : (kLLQ_INIT_RESEND * q->ntries * mDNSPlatformOneSecond); // If using TCP, don't need to retr (…) [all...] |
uDNS.h | 47 // so that the first retry does not happen until 3 seconds which should be enough for TCP/TLS to be done. 121 extern void DisposeTCPConn(struct tcpInfo_t *tcp);
|
/external/pdfium/third_party/libopenjpeg20/ |
tcd.c | 212 for (layno = 0; layno < tcd->tcp->numlayers; layno++) { 311 opj_tcp_t *tcd_tcp = tcd->tcp; 411 opj_tcp_t *tcd_tcp = tcd->tcp; 1276 opj_tcp_t *tcp = &p_tcd->cp->tcps[0]; local [all...] |
j2k.c | 160 * Updates the rates of the tcp. 1643 opj_tcp_t *tcp = 00; local 1705 opj_tcp_t *tcp; local 6435 opj_tcp_t *tcp = &cp->tcps[tileno]; local [all...] |
/external/mesa3d/src/gallium/drivers/nvc0/ |
nvc0_program.c | 228 /* Common part of header generation for VP, TCP, TEP and GP. */ 347 nvc0_tcp_gen_header(struct nvc0_program *tcp, struct nv50_ir_prog_info *info) 351 tcp->tp.input_patch_size = info->prop.tp.inputPatchSize; 356 tcp->hdr[0] = 0x20061 | (2 << 10); 358 tcp->hdr[1] = opcs << 24; 359 tcp->hdr[2] = info->prop.tp.outputPatchSize << 24; 361 tcp->hdr[4] = 0xff000; /* initial min/max parallel output read address */ 363 nvc0_vtgp_gen_header(tcp, info); 365 nvc0_tp_get_tess_mode(tcp, info);
|
/external/autotest/client/site_tests/network_WiFiTxRx/ |
network-flipflop.sh | 183 progress Contacting AP at "/dev/tcp/$gateway/80" to collect TX strength; 184 if exec {http}<>/dev/tcp/$gateway/80; then
|
/external/libmicrohttpd/src/examples/ |
mhd2spdy_structures.h | 46 #include <netinet/tcp.h>
|
/external/opencv3/3rdparty/libjasper/ |
jpc_enc.h | 243 jpc_enc_tcp_t tcp; member in struct:__anon20299
|
/external/parameter-framework/asio-1.10.6/include/asio/detail/ |
socket_types.hpp | 32 # include <netinet/tcp.h>
|
/external/tcpdump/ |
Android.mk | 139 print-tcp.c \
|
/external/mksh/src/ |
syn.c | 343 char *tcp; local 349 tcp = XPptrv(vars)[(vars.len = 0)]; 351 tcp[wdscan(tcp, EOS) - tcp - 3] = EOS; 356 XPput(args, tcp);
|
/external/c-ares/ |
ares_process.c | 30 # include <netinet/tcp.h> 86 int alen, int whichserver, int tcp, 203 /* If any TCP sockets select true for writing, write out queued data 297 /* Consume the given number of bytes from the head of the TCP send queue. */ 327 /* If any TCP socket selects true for reading, read some data, 536 int alen, int whichserver, int tcp, 578 * don't accept the packet, and switch the query to TCP if we hadn't 581 if ((tc || alen > PACKETSZ) && !tcp && !(channel->flags & ARES_FLAG_IGNTC)) 591 /* Limit alen to PACKETSZ if we aren't using TCP (only relevant if we 594 if (alen > PACKETSZ && !tcp) [all...] |
ares_private.h | 37 #include <tcp.h> 152 /* Buffer for reading actual TCP data */ 156 /* TCP output queue */ 195 /* Query buf with length at beginning, for TCP transmission */ 217 int tcp_connection_generation; /* into which TCP connection did we send? */ 282 /* Generation number to use for the next TCP socket open/close */
|
/system/sepolicy/ |
property_contexts | 41 service.adb.tcp.port u:object_r:shell_prop:s0
|
/external/autotest/client/deps/lansim/src/py/ |
simulator.py | 294 simu.add_match({"ip.tcp.dport": 80}, some_callback)
|