/external/dnsmasq/contrib/wrt/ |
H A D | dhcp_release.c | 252 struct dhcp_packet packet; local 253 unsigned char *p = packet.options; 275 /* This voodoo fakes up a packet coming from the correct interface, which really matters for 288 memset(&packet, 0, sizeof(packet)); 290 packet.hlen = parse_hex(argv[3], packet.chaddr, DHCP_CHADDR_MAX, &mac_type); 292 packet.htype = ARPHRD_ETHER; 294 packet.htype = mac_type; 296 packet [all...] |
/external/dnsmasq/src/ |
H A D | tftp.c | 23 static ssize_t tftp_err(int err, char *packet, char *mess, char *file); 24 static ssize_t tftp_err_oops(char *packet, char *file); 25 static ssize_t get_block(char *packet, struct tftp_transfer *transfer); 44 char *packet = daemon->packet; local 77 iov.iov_base = packet; 187 p = packet + 2; 188 end = packet + len; 190 if (ntohs(*((unsigned short *)packet)) != OP_RRQ || 194 len = tftp_err(ERR_ILL, packet, 290 char *packet = daemon->packet, *namebuff = daemon->namebuff; local 494 tftp_err(int err, char *packet, char *message, char *file) argument 511 tftp_err_oops(char *packet, char *file) argument 517 get_block(char *packet, struct tftp_transfer *transfer) argument [all...] |
H A D | util.c | 490 int read_write(int fd, unsigned char *packet, int size, int rw) argument 498 n = read(fd, &packet[done], (size_t)(size - done)); 500 n = write(fd, &packet[done], (size_t)(size - done));
|
H A D | dnsmasq.c | 121 daemon->packet = safe_malloc(daemon->packet_buff_sz); 1269 } packet; local 1291 memset(&packet.icmp, 0, sizeof(packet.icmp)); 1292 packet.icmp.icmp_type = ICMP_ECHO; 1293 packet.icmp.icmp_id = id; 1295 j += ((u16 *)&packet.icmp)[i]; 1298 packet.icmp.icmp_cksum = (j == 0xffff) ? j : ~j; 1300 while (sendto(fd, (char *)&packet.icmp, sizeof(struct icmp), 0, 1338 recvfrom(fd, &packet, sizeo [all...] |
H A D | forward.c | 27 /* Send a UDP packet with its source address set as "source" 29 static void send_from(int fd, int nowild, char *packet, size_t len, argument 47 iov[0].iov_base = packet; 279 packet straight away (helps modem users when offline) */ 332 /* Keep info in case we want to re-send this packet */ 387 /* If upstream is advertising a larger UDP packet size 453 sections of the packet. Find the new length here and put back pseudoheader 461 /* packet from peer server, extract data for cache, and send to 467 ssize_t n = recvfrom(fd, daemon->packet, daemon->edns_pktsz, 0, &serveraddr.sa, &addrlen); 471 /* packet buffe 729 unsigned char *packet = whine_malloc(65536 + MAXDNAME + RRFIXEDSZ); local [all...] |
/external/eigen/Eigen/src/Core/ |
H A D | PlainObjectBase.h | 163 EIGEN_STRONG_INLINE PacketScalar packet(Index row, Index col) const function in class:Eigen::PlainObjectBase 173 EIGEN_STRONG_INLINE PacketScalar packet(Index index) const function in class:Eigen::PlainObjectBase
|
H A D | Transpose.h | 153 inline const PacketScalar packet(Index row, Index col) const function in class:Eigen::TransposeImpl 155 return derived().nestedExpression().template packet<LoadMode>(col, row); 165 inline const PacketScalar packet(Index index) const function in class:Eigen::TransposeImpl 167 return derived().nestedExpression().template packet<LoadMode>(index);
|
/external/libnfc-nxp/src/ |
H A D | phHciNfc_Generic.c | 643 * This function Sends the HCI Data in the HCP packet format to the below 725 * This function receives the HCI Data in the HCP packet format from the below 742 phHciNfc_HCP_Packet_t *packet = NULL; local 746 packet = (phHciNfc_HCP_Packet_t *)pdata; 747 chainbit = (uint8_t) GET_BITS8( packet->hcp_header, 811 * This function receives the HCI Data in the HCP packet format from the below 828 phHciNfc_HCP_Packet_t *packet = NULL; local 846 packet = (phHciNfc_HCP_Packet_t *)psHciContext->recv_buffer; 852 message = &packet->msg.message; 861 pHwRef, (void *)packet, lengt 902 phHciNfc_HCP_Packet_t *packet = NULL; local 990 phHciNfc_HCP_Packet_t *packet = (phHciNfc_HCP_Packet_t *)pdata; local 1066 phHciNfc_HCP_Packet_t *packet = NULL; local 1184 phHciNfc_HCP_Packet_t *packet = NULL; local [all...] |
/external/mtpd/ |
H A D | pptp.c | 84 static struct packet { struct
|
H A D | l2tp.c | 115 static struct packet { struct 211 /* Check if the packet is duplicated and send ACK if necessary. */ 224 * this packet if it is their next one and they received our last one. */
|
/external/qemu/distrib/sdl-1.2.15/src/video/fbcon/ |
H A D | SDL_fbelo.c | 87 /* Check if we have a touch packet */ 187 int eloSendPacket(unsigned char* packet, int fd) argument 192 packet[0] = ELO_START_BYTE; 194 sum += packet[i]; 197 packet[ELO_PACKET_SIZE-1] = sum; 199 result = write(fd, packet, ELO_PACKET_SIZE); 273 unsigned char packet[ELO_PACKET_SIZE]; local 276 if (eloWaitReply(ELO_ACK, packet, fd)) { 278 if (packet[2 + i] != '0') { 285 fprintf(stderr, "Elographics acknowledge packet report [all...] |
/external/qemu/distrib/sdl-1.2.15/src/video/ps2gs/ |
H A D | SDL_gsvideo.c | 186 struct ps2_packet packet[1 + MAXTAGS * 2]; local 194 plist.packet = packet; 196 /* make BITBLT packet */ 197 packet[pnum].ptr = hm; 198 packet[pnum].len = sizeof(head_tags); 214 packet[pnum].ptr = &im[it]; 215 packet[pnum].len = sizeof(unsigned long long) * 2; 220 packet[pnum].ptr = (void *)data; 221 packet[pnu 259 struct ps2_packet packet[2]; local [all...] |
/external/qemu/ |
H A D | shaper.c | 46 * we're going to implement a scheme where, when we send a packet of 47 * 'count' bytes, no other packet will go through in the same direction for 48 * at least 'count*8/MAX_RATE' seconds. any successive packet that is "sent" 69 QueuedPacket packet; local 70 size_t packet_size = sizeof(*packet); 75 packet = qemu_malloc(packet_size); 76 packet->next = NULL; 77 packet->expiration = 0; 78 packet->size = (size_t)size; 79 packet 120 QueuedPacket packet = shaper->packets; local 137 QueuedPacket packet; local 188 QueuedPacket packet = shaper->packets; local 229 QueuedPacket packet; local 297 QueuedPacket packet; member in struct:SessionRec_ 433 QueuedPacket packet = session->packet; local 488 QueuedPacket packet = session->packet; local [all...] |
/external/smack/src/org/jivesoftware/smack/ |
H A D | Roster.java | 26 import org.jivesoftware.smack.packet.IQ; 27 import org.jivesoftware.smack.packet.Packet; 28 import org.jivesoftware.smack.packet.Presence; 29 import org.jivesoftware.smack.packet.RosterPacket; 65 // The roster is marked as initialized when at least a single roster packet 165 * {@link org.jivesoftware.smack.packet.Presence.Type#subscribe}. 180 * {@link org.jivesoftware.smack.packet.Presence.Type#subscribe}. 203 RosterPacket packet = new RosterPacket(); 205 packet.setVersion(persistentStorage.getRosterVersion()); 207 requestPacketId = packet 841 processPacket(Packet packet) argument 960 processPacket(Packet packet) argument 988 processPacket(Packet packet) argument [all...] |
H A D | XMPPConnection.java | 25 import org.jivesoftware.smack.packet.Packet; 26 import org.jivesoftware.smack.packet.Presence; 27 import org.jivesoftware.smack.packet.XMPPError; 103 * Set to true by packet writer if the server acknowledged the compression 399 * packet reader, packet writer, and {@link Roster} will not be removed; thus 402 * @param unavailablePresence the presence packet to send during shutdown. 500 public void sendPacket(Packet packet) { argument 504 if (packet == null) { 507 packetWriter.sendPacket(packet); [all...] |
/external/tremolo/Tremolo/ |
H A D | ogg.h | 126 packet in the logical bitstream */ 151 ogg_reference *packet; member in struct:__anon13914
|
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_pan.c | 401 char packet[2000]; local 402 memcpy(packet, ð_hdr, sizeof(tETH_HDR)); 405 ALOGE("btpan_tap_send eth packet size:%d is exceeded limit!", len); 408 memcpy(packet + sizeof(tETH_HDR), buf, len); 412 //dump_bin("packet to network", packet, len + sizeof(tETH_HDR)); 413 int ret = write(tap_fd, packet, len + sizeof(tETH_HDR)); 491 static void forward_bnep(tETH_HDR* eth_hdr, char * packet, int size) argument 504 ntohs(eth_hdr->h_proto), (UINT8*)packet, size, 0); 607 char packet[MAX_PACKET_SIZ local [all...] |
/external/chromium/third_party/libjingle/source/talk/p2p/base/ |
H A D | pseudotcp.cc | 41 // The following logging is for detailed (packet-level) analysis only. 77 // Note: we removed lowest level because packet overhead was larger! 178 S_SENT_PACKET, // All packet sends 179 S_RESENT_PACKET, // All packet sends that are retransmits 180 S_RECV_PACKET, // All packet receives 181 S_RECV_NEW, // All packet receives that are too new 182 S_RECV_OLD, // All packet receives that are too old 335 packet(m_snd_nxt - 1, 0, 0, 0); 344 packet(m_snd_nxt, 0, 0, 0); 356 packet(m_snd_nx 481 IPseudoTcpNotify::WriteResult PseudoTcp::packet(uint32 seq, uint8 flags, function in class:cricket::PseudoTcp [all...] |
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
H A D | filemediaengine.h | 147 virtual void OnPacketReceived(talk_base::Buffer* packet); 148 virtual void OnRtcpReceived(talk_base::Buffer* packet) {} argument 149 virtual void SetSendSsrc(uint32 id) {} // TODO: change RTP packet? 182 virtual void OnPacketReceived(talk_base::Buffer* packet); 183 virtual void OnRtcpReceived(talk_base::Buffer* packet) {} argument 184 virtual void SetSendSsrc(uint32 id) {} // TODO: change RTP packet?
|
/external/dhcpcd/ |
H A D | net.c | 48 # include <netpacket/packet.h> 703 make_udp_packet(uint8_t **packet, const uint8_t *data, size_t length, argument 715 * We copy the data to our packet and then create a small part of the 718 * of the whole packet into the udp checksum. 745 *packet = (uint8_t *)udpp; 752 struct udp_dhcp_packet packet; local 754 memcpy(&packet, udp, sizeof(packet)); 756 return ntohs(packet.ip.ip_len) - 757 sizeof(packet 765 struct udp_dhcp_packet packet; local [all...] |
/external/grub/netboot/ |
H A D | main.c | 111 static unsigned short udpchksum (struct iphdr *packet); 367 tr = (struct tftp_t *) &nic.packet[ETH_HLEN]; 424 /* This ensures that the packet does not get processed as data! */ 481 /* arp and rarp requests share the same packet structure. */ 688 RX if (packet->udp.chksum && udpchksum(packet)) 690 TX packet->udp.chksum=0; 691 if (0==(packet->udp.chksum=udpchksum(packet))) 692 packet 714 udpchksum(struct iphdr *packet) argument [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | isakmp_cfg.c | 135 * Handle an ISAKMP config mode packet 143 struct isakmp *packet; local 151 /* Check that the packet is long enough to have a header */ 152 if (msg->l < sizeof(*packet)) { 153 plog(LLV_ERROR, LOCATION, NULL, "Unexpected short packet\n"); 157 packet = (struct isakmp *)msg->v; 160 if ((packet->flags & ISAKMP_FLAG_E) == 0) { 167 * Decrypt the packet. If this is the beginning of a new 171 iph1->mode_cfg->last_msgid != packet->msgid ) 173 isakmp_cfg_newiv(iph1, packet [all...] |
/external/libppp/src/ |
H A D | ip.c | 173 * open/read/close system call sequence per packet, approximately 197 * Check a packet against the given filter 198 * Returns 0 to accept the packet, non-zero to drop the packet. 209 FilterCheck(const unsigned char *packet, argument 220 u_short sport, dport; /* src, dest port from packet if (gotinfo) */ 233 return 0; /* No rule is given. Permit this packet */ 237 const struct ip6_hdr *pip6 = (const struct ip6_hdr *)packet; 242 payload = packet + sizeof *pip6; 248 * Deny any packet fragmen 558 PacketCheck(struct bundle *bundle, u_int32_t family, const unsigned char *packet, int nb, struct filter *filter, const char *prefix, unsigned *psecs) argument [all...] |
/external/libusb_aah/libusb/ |
H A D | io.c | 174 * constraints on packet size defined by endpoint descriptors. The host must 175 * not send data payloads larger than the endpoint's maximum packet size. 177 * libusb and the underlying OS abstract out the packet concept, allowing you 180 * packet sizes, but there is one exception when considering overflows. 203 * Overflows can only happen if the final packet in an incoming data transfer 204 * is smaller than the actual packet that the device wants to transfer. 206 * multiple of the endpoint's packet size: the final packet will either 341 * include specific fields for the control-specific setup packet structure. 344 * packet a 1072 libusb_get_iso_packet_buffer( struct libusb_transfer *transfer, unsigned int packet) argument 1114 libusb_get_iso_packet_buffer_simple( struct libusb_transfer *transfer, unsigned int packet) argument [all...] |
/external/openssl/include/openssl/ |
H A D | dtls1.h | 232 unsigned int mtu; /* max DTLS packet size */ 266 unsigned char *packet; member in struct:dtls1_record_data_st
|