/external/android-clat/ |
H A D | clatd.c | 107 * Binds the packet socket and attaches the receive filter to it. 118 logmsg(ANDROID_LOG_FATAL, "binding packet socket: %s", strerror(errno)); 127 // doesn't match, jump ahead to statement that returns 0 (ignore packet). Repeat for the other 128 // three words of the IPv6 address, and if they all match, return PACKETLEN (accept packet). 146 logmsg(ANDROID_LOG_FATAL, "attach packet filter failed: %s", strerror(errno)); 232 * opens a packet socket to receive IPv6 packets and a raw socket to send them 255 logmsg(ANDROID_LOG_FATAL, "packet socket failed: %s", strerror(errno)); 263 * picks the clat IPv6 address and configures packet translation to use it. 306 // Update our packet socket filter to reflect the new 464xlat IP address. 360 * reads a packet fro 366 uint8_t buf[PACKETLEN], *packet; local [all...] |
H A D | clatd_test.cpp | 43 // Test packet portions. Defined as macros because it's easy to concatenate them to make packets. 174 uint8_t ip_version(const uint8_t *packet) { argument 175 uint8_t version = packet[0] >> 4; 180 // A packet is a fragment if its fragment offset is nonzero or if the MF flag is set. 201 void check_packet(const uint8_t *packet, size_t len, const char *msg) { argument 206 int version = ip_version(packet); 209 struct iphdr *ip = (struct iphdr *) packet; 210 ASSERT_GE(len, sizeof(*ip)) << msg << ": IPv4 packet shorter than IPv4 header\n"; 225 struct ip6_hdr *ip6 = (struct ip6_hdr *) packet; 226 ASSERT_GE(len, sizeof(*ip6)) << msg << ": IPv6 packet shorte 295 const uint8_t *packet = fragments[i]; local 396 fix_udp_checksum(uint8_t* packet) argument 521 get_transport_checksum(const uint8_t *packet) argument [all...] |
H A D | ipv4.c | 27 * translates an icmp packet 28 * out - output packet 29 * icmp - pointer to icmp header in packet 51 * translates an ipv4 packet 52 * out - output packet 53 * packet - packet data 54 * len - size of packet 57 int ipv4_packet(clat_packet out, clat_packet_index pos, const uint8_t *packet, size_t len) { argument 58 const struct iphdr *header = (struct iphdr *) packet; [all...] |
H A D | ipv6.c | 30 * takes an icmp6 packet and sets it up for translation 31 * out - output packet 32 * icmp6 - pointer to icmp6 header in packet 72 * takes an ipv6 packet and hands it off to the layer 4 protocol function 73 * out - output packet 74 * packet - packet data 75 * len - size of packet 78 int ipv6_packet(clat_packet out, clat_packet_index pos, const uint8_t *packet, size_t len) { argument 79 const struct ip6_hdr *ip6 = (struct ip6_hdr *) packet; [all...] |
H A D | translate.c | 30 * calculates the checksum over all the packet components starting from pos 31 * checksum - checksum of packet components before pos 32 * packet - packet to calculate the checksum of 36 uint16_t packet_checksum(uint32_t checksum, clat_packet packet, clat_packet_index pos) { argument 39 if (packet[i].iov_len > 0) { 40 checksum = ip_checksum_add(checksum, packet[i].iov_base, packet[i].iov_len); 47 * returns the total length of all the packet components after pos 48 * packet 52 packet_length(clat_packet packet, clat_packet_index pos) argument 499 translate_packet(int fd, int to_ipv6, const uint8_t *packet, size_t packetsize) argument [all...] |
/external/apache-harmony/jdwp/src/test/java/org/apache/harmony/jpda/tests/framework/jdwp/ |
H A D | ParsedEvent.java | 44 protected ParsedEvent(byte suspendPolicy, Packet packet, byte eventKind) { argument 46 this.requestID = packet.getNextValueAsInt(); 86 * @param packet 88 protected EventThread(byte suspendPolicy, Packet packet, byte eventKind) { argument 89 super(suspendPolicy, packet, eventKind); 90 this.threadID = packet.getNextValueAsThreadID(); 112 * @param packet 114 protected EventThreadLocation(byte suspendPolicy, Packet packet, argument 116 super(suspendPolicy, packet, eventKind); 117 this.location = packet 142 EventThreadMonitor(byte suspendPolicy, Packet packet, byte eventKind) argument 175 Event_VM_START(byte suspendPolicy, Packet packet) argument 191 Event_SINGLE_STEP(byte suspendPolicy, Packet packet) argument 207 Event_BREAKPOINT(byte suspendPolicy, Packet packet) argument 223 Event_METHOD_ENTRY(byte suspendPolicy, Packet packet) argument 239 Event_METHOD_EXIT(byte suspendPolicy, Packet packet) argument 257 Event_METHOD_EXIT_WITH_RETURN_VALUE(byte suspendPolicy, Packet packet) argument 278 Event_MONITOR_CONTENDED_ENTER(byte suspendPolicy, Packet packet) argument 295 Event_MONITOR_CONTENDED_ENTERED(byte suspendPolicy, Packet packet) argument 314 Event_MONITOR_WAIT(byte suspendPolicy, Packet packet) argument 337 Event_MONITOR_WAITED(byte suspendPolicy, Packet packet) argument 362 Event_EXCEPTION(byte suspendPolicy, Packet packet) argument 394 Event_THREAD_START(byte suspendPolicy, Packet packet) argument 410 Event_THREAD_DEATH(byte suspendPolicy, Packet packet) argument 434 Event_CLASS_PREPARE(byte suspendPolicy, Packet packet) argument 484 Event_CLASS_UNLOAD(byte suspendPolicy, Packet packet) argument 516 Event_FIELD_ACCESS(byte suspendPolicy, Packet packet) argument 573 Event_FIELD_MODIFICATION(byte suspendPolicy, Packet packet) argument 628 Event_VM_DEATH(byte suspendPolicy, Packet packet) argument 640 parseEventPacket(Packet packet) argument [all...] |
H A D | SocketTransportWrapper.java | 217 * Reads packet bytes from transport connection. 219 * @return packet as byte array or null or empty packet if connection was closed 223 // read packet header 244 throw new IOException("Connection closed in reading packet header"); 247 // extract packet length 250 throw new IOException("Wrong packet size detected: " + len); 253 // allocate packet bytes and store header there 257 // read packet data 266 throw new IOException("Connection closed in reading packet dat 278 writePacket(byte[] packet) argument [all...] |
H A D | TransportWrapper.java | 84 * Reads packet from transport connection. 86 * @return packet as byte array or null or empty packet if connection was closed 91 * Writes packet to transport connection. 93 * @param packet packet as byte array 95 public void writePacket(byte[] packet) throws IOException; argument
|
/external/bluetooth/bluedroid/btif/src/ |
H A D | btif_pan.c | 454 char packet[2000]; local 455 memcpy(packet, ð_hdr, sizeof(tETH_HDR)); 458 ALOGE("btpan_tap_send eth packet size:%d is exceeded limit!", len); 461 memcpy(packet + sizeof(tETH_HDR), buf, len); 465 //dump_bin("packet to network", packet, len + sizeof(tETH_HDR)); 466 int ret = write(tap_fd, packet, len + sizeof(tETH_HDR)); 689 BTIF_TRACE_WARNING("%s unable to allocate buffer for packet.", __func__); 695 UINT8 *packet = (UINT8 *)buffer + sizeof(BT_HDR) + buffer->offset; local 697 // If we don't have an undelivered packet lef [all...] |
H A D | btif_sock_rfc.c | 92 uint8_t* packet; member in struct:__anon1095
|
/external/bluetooth/bluedroid/hci/src/ |
H A D | btsnoop.c | 74 static void btsnoop_write_packet(packet_type_t type, const uint8_t *packet, bool is_received) { argument 81 length_he = packet[2] + 4; 85 length_he = (packet[3] << 8) + packet[2] + 5; 89 length_he = packet[2] + 4; 93 length_he = packet[1] + 3; 118 btsnoop_write(packet, length_he - 1);
|
/external/chromium_org/chrome/browser/local_discovery/ |
H A D | privet_local_printer_lister_unittest.cc | 138 void SimulateReceive(const uint8* packet, size_t size) { argument 139 test_service_discovery_client_->SimulateReceive(packet, size);
|
H A D | test_service_discovery_client.cc | 53 void TestServiceDiscoveryClient::SimulateReceive(const uint8* packet, argument 55 mock_socket_factory_.SimulateReceive(packet, size);
|
/external/chromium_org/cloud_print/gcp20/prototype/ |
H A D | dns_packet_parser.cc | 10 DnsPacketParser::DnsPacketParser(const char* packet, size_t length) argument 11 : packet_(packet), 13 record_parser_(packet, length, sizeof(header_)) { 14 base::BigEndianReader reader(packet, length);
|
/external/chromium_org/components/devtools_bridge/android/java/src/org/chromium/components/devtools_bridge/ |
H A D | SocketTunnelBase.java | 29 * CLIENT_OPEN packet to the server with newly assigned connection id. On receiving this packet 48 // Structure of control packet: 53 // Structure of data packet: 167 ByteBuffer packet = ByteBuffer.allocateDirect(CONTROL_PACKET_SIZE); 168 packet.put((byte) CONTROL_CONNECTION_ID); 169 packet.put(opCode); 170 packet.put((byte) connectionId); 171 return packet; 175 ByteBuffer packet 181 sendToDataChannel(ByteBuffer packet) argument 199 decodePacket(ByteBuffer packet) argument [all...] |
/external/chromium_org/components/devtools_bridge/test/android/javatests/src/org/chromium/components/devtools_bridge/ |
H A D | LocalTunnelBridge.java | 42 protected void sendToDataChannel(ByteBuffer packet) { 44 Log.d(TAG, "Sending " + stringifyServerPacket(packet)); 45 super.sendToDataChannel(packet); 52 Log.d(TAG, "Received client data packet with " + 62 Log.d(TAG, "Received client control packet"); 99 Log.d(TAG, "Received server data packet with " 109 Log.d(TAG, "Received server control packet"); 115 protected void sendToDataChannel(ByteBuffer packet) { 117 Log.d(TAG, "Sending " + stringifyClientPacket(packet)); 119 super.sendToDataChannel(packet); 152 stringifyClientPacket(ByteBuffer packet) argument 166 stringifyServerPacket(ByteBuffer packet) argument 180 decode(ByteBuffer packet) argument [all...] |
H A D | PacketDecoder.java | 32 public static PacketDecoder tryDecode(ByteBuffer packet) throws SocketTunnelBase.ProtocolError { argument 34 decoder.decodePacket(packet); 38 public static PacketDecoder decode(ByteBuffer packet) { argument 40 return tryDecode(packet);
|
/external/chromium_org/content/browser/renderer_host/p2p/ |
H A D | socket_host.cc | 33 // enabled. HMAC in packet will be compared against this value before updating 34 // packet with actual HMAC value. 160 // Assumes |length| is actual packet length + tag length. Updates HMAC at end of 161 // the RTP packet. 197 // Copy ROC after end of rtp packet. 199 // Authentication of a RTP packet will have RTP packet + ROC size. 208 // Copy HMAC from output to packet. This is required as auth tag length 226 // PacketOptions, nothing to be updated in this packet. 235 // If there is a srtp auth key present then packet mus 264 GetRtpPacketStartPositionAndLength(const char* packet, size_t length, size_t* rtp_start_pos, size_t* rtp_packet_length) argument 614 DumpRtpPacket(const char* packet, size_t length, bool incoming) argument [all...] |
H A D | socket_host_tcp_unittest.cc | 172 std::vector<char> packet; local 173 CreateRandomPacket(&packet); 174 socket_host_->Send(dest_.ip_address, packet, options, 0); 182 // Receive packet from |dest_|. 199 std::vector<char> packet; local 200 CreateRandomPacket(&packet); 201 socket_host_->Send(dest_.ip_address, packet, options, 0); 204 expected_data.append(IntToSize(packet.size())); 205 expected_data.append(packet.begin(), packet 260 std::vector<char> packet; local 355 std::vector<char> packet; local [all...] |
H A D | socket_host_test_utils.cc | 175 void CreateRandomPacket(std::vector<char>* packet) { argument 177 packet->resize(size); 179 (*packet)[i] = rand() % 256; 181 // Always set the first bit to ensure that generated packet is not 182 // valid STUN packet. 183 (*packet)[0] = (*packet)[0] | 0x80; 186 static void CreateStunPacket(std::vector<char>* packet, uint16 type) { argument 187 CreateRandomPacket(packet); 188 *reinterpret_cast<uint16*>(&*packet 195 CreateStunRequest(std::vector<char>* packet) argument 199 CreateStunResponse(std::vector<char>* packet) argument 203 CreateStunError(std::vector<char>* packet) argument [all...] |
H A D | socket_host_udp.cc | 169 LOG(ERROR) << "Received unexpected data packet from " 201 LOG(ERROR) << "Page tried to send a data packet to " << to.ToString() 222 PendingPacket packet(to, data, options, packet_id); 223 DoSend(packet); 227 void P2PSocketHostUdp::DoSend(const PendingPacket& packet) { argument 228 TRACE_EVENT_ASYNC_STEP_INTO1("p2p", "Send", packet.id, "UdpAsyncSendTo", 229 "size", packet.size); 231 // 1. If the outgoing packet is set to DSCP_NO_CHANGE 232 // 2. If no change in DSCP value from last packet 235 static_cast<net::DiffServCodePoint>(packet 288 PendingPacket packet = send_queue_.front(); local [all...] |
H A D | socket_host_udp_unittest.cc | 251 std::vector<char> packet; local 252 CreateRandomPacket(&packet); 253 socket_host_->Send(dest1_, packet, options, 0); 261 // Receive packet from |dest1_|. 275 std::vector<char> packet; local 276 CreateRandomPacket(&packet); 277 socket_host_->Send(dest1_, packet, options, 0); 286 // Receive packet from |dest1_|. 300 std::vector<char> packet; local 301 CreateRandomPacket(&packet); 321 std::vector<char> packet; local [all...] |
/external/chromium_org/device/usb/ |
H A D | usb_device_handle_impl.cc | 622 PlatformUsbIsoPacketDescriptor packet = &handle->iso_packet_desc[i]; local 623 if (packet->actual_length > 0) { 625 // all the data the packet can hold. 627 CHECK(packet_buffer_start + packet->actual_length <= 631 packet->actual_length); 633 actual_length += packet->actual_length; 636 packet_buffer_start += packet->length;
|
/external/chromium_org/google_apis/gcm/engine/ |
H A D | mcs_client.cc | 421 MCSPacketInternal packet = PopMessageForSend(); local 422 if (GetTTL(*packet->protobuf) > 0 && 423 !HasTTLExpired(*packet->protobuf, clock_)) { 424 new_to_send.push_back(packet); 428 if (!packet->persistent_id.empty()) 429 expired_ttl_ids.push_back(packet->persistent_id); 430 NotifyMessageSendStatus(*packet->protobuf, TTL_EXCEEDED); 473 MCSPacketInternal packet = PopMessageForSend(); 474 if (HasTTLExpired(*packet->protobuf, clock_)) { 475 DCHECK(!packet 900 MCSPacketInternal packet = to_send_.front(); local [all...] |
/external/chromium_org/media/audio/alsa/ |
H A D | alsa_output.cc | 232 // Buffer size is at least twice of packet size. 344 // If stopped, simulate a 0-length packet. 360 scoped_refptr<media::DataBuffer> packet = local 374 // Adjust packet size for downmix. 382 frames_filled, bytes_per_sample_, packet->writable_data()); 385 packet->set_data_size(packet_size); 386 // Add the packet to the buffer. 387 buffer_->Append(packet);
|