/external/c-ares/ |
H A D | ares_send.c | 41 void ares_send(ares_channel channel, const unsigned char *qbuf, int qlen, argument 49 if (qlen < HFIXEDSZ || qlen >= (1 << 16)) 62 query->tcpbuf = malloc(qlen + 2); 84 /* Form the TCP query buffer by prepending qlen (as two 87 query->tcpbuf[0] = (unsigned char)((qlen >> 8) & 0xff); 88 query->tcpbuf[1] = (unsigned char)(qlen & 0xff); 89 memcpy(query->tcpbuf + 2, qbuf, qlen); 90 query->tcplen = qlen + 2; 94 query->qlen [all...] |
H A D | ares_query.c | 113 int qlen, rd, status; local 118 &qlen); 140 ares_send(channel, qbuf, qlen, qcallback, qquery);
|
H A D | ares_private.h | 201 int qlen; member in struct:query
|
H A D | ares_process.c | 96 static int same_questions(const unsigned char *qbuf, int qlen, 568 if ((q->qid == id) && same_questions(q->qbuf, q->qlen, abuf, alen)) 785 if (swrite(server->udp_socket, query->qbuf, query->qlen) == -1) 1100 static int same_questions(const unsigned char *qbuf, int qlen, argument 1113 if (qlen < HFIXEDSZ || alen < HFIXEDSZ) 1127 if (ares_expand_name(q.p, qbuf, qlen, &q.name, &q.namelen) 1131 if (q.p + QFIXEDSZ > qbuf + qlen)
|
/external/curl/lib/ |
H A D | dotdot.c | 168 size_t qlen; local 173 qlen = strlen(&input[oindex]); 174 memcpy(outptr, &input[oindex], qlen+1); /* include the ending zero byte */
|
/external/libnl/src/lib/ |
H A D | link.c | 83 uint32_t qlen = nl_cli_parse_u32(arg); local 84 rtnl_link_set_txqlen(link, qlen);
|
/external/iproute2/include/linux/ |
H A D | gen_stats.h | 53 * @qlen: queue length 60 __u32 qlen; member in struct:gnet_stats_queue
|
H A D | pkt_sched.h | 40 __u32 qlen; member in struct:tc_stats
|
/external/kernel-headers/original/uapi/linux/ |
H A D | gen_stats.h | 54 * @qlen: queue length 61 __u32 qlen; member in struct:gnet_stats_queue
|
H A D | i2o-dev.h | 91 unsigned int qlen; /* Length in bytes of query string buffer */ member in struct:i2o_html
|
H A D | pkt_sched.h | 40 __u32 qlen; member in struct:tc_stats
|
/external/libnl/include/linux-private/linux/ |
H A D | gen_stats.h | 42 * @qlen: queue length 49 __u32 qlen; member in struct:gnet_stats_queue
|
H A D | pkt_sched.h | 40 __u32 qlen; member in struct:tc_stats
|
/external/syslinux/gpxe/src/drivers/net/ |
H A D | pnic.c | 121 uint16_t qlen; local 126 &qlen, sizeof ( qlen ), NULL ) 129 if ( qlen == 0 )
|
/external/webrtc/webrtc/base/ |
H A D | base64.cc | 226 size_t qlen = GetNextQuantum(parse_flags, (DO_PAD_NO == pad_flags), local 229 if (qlen >= 2) { 232 if (qlen >= 3) { 235 if (qlen >= 4) { 241 if (qlen < 4) {
|
/external/syslinux/gpxe/src/net/udp/ |
H A D | dns.c | 289 size_t qlen; local 300 qlen = ( ( ( void * ) dns->qinfo ) - ( ( void * ) &dns->query ) 302 return xfer_deliver_raw ( &dns->socket, &dns->query, qlen );
|
/external/toybox/toys/pending/ |
H A D | host.c | 71 i, j, ret, sec, count, rcode, qlen, alen, pllen = 0; local 116 qlen = res_mkquery(0, name, 1, type, 0, 0, 0, qbuf, sizeof qbuf); 117 if (qlen < 0) error_exit("Invalid query parameters: %s", name); 130 send(s, qbuf, qlen, 0); 132 } else alen = res_send(qbuf, qlen, abuf, sizeof abuf);
|
/external/libnl/python/netlink/route/ |
H A D | tc.py | 223 def qlen(self): member in class:Tc 228 return fmt.nl('{t|packets} {t|bytes} {t|qlen}')
|
/external/curl/lib/vauth/ |
H A D | digest.c | 251 * qlen [in] - The length of the qop buffer. 259 char *qop, size_t qlen) 298 if(!auth_digest_get_key_value((char *) chlg, "qop=\"", qop, qlen, '\"')) { 255 auth_decode_digest_md5_message(const char *chlg64, char *nonce, size_t nlen, char *realm, size_t rlen, char *alg, size_t alen, char *qop, size_t qlen) argument
|
/external/iproute2/ip/ |
H A D | iplink.c | 410 int qlen = -1; local 454 strcmp(*argv, "qlen") == 0 || 457 if (qlen != -1) 459 if (get_integer(&qlen, *argv, 0)) 461 addattr_l(&req->n, sizeof(*req), IFLA_TXQLEN, &qlen, 4); 928 static int set_qlen(const char *dev, int qlen) argument 939 ifr.ifr_qlen = qlen; 1053 int qlen = -1; local 1079 strcmp(*argv, "qlen") == 0 || 1082 if (qlen ! [all...] |
H A D | ipaddress.c | 172 int qlen; local 175 qlen = *(int *)RTA_DATA(tb[IFLA_TXQLEN]); 191 qlen = ifr.ifr_qlen; 193 if (qlen) 194 fprintf(f, "qlen %d", qlen);
|
/external/dnsmasq/src/ |
H A D | rfc1035.c | 530 static unsigned char *do_doctor(unsigned char *p, int count, HEADER *header, size_t qlen) argument 537 if (!(p = skip_name(p, header, qlen, 10))) 550 if (!CHECK_LEN(header, p, qlen, INADDRSZ)) 576 if (!ADD_RDLEN(header, p, qlen, rdlen)) 583 static int find_soa(HEADER *header, size_t qlen) argument 591 if (!(p = skip_questions(header, qlen)) || 592 !(p = do_doctor(p, ntohs(header->ancount), header, qlen))) 597 if (!(p = skip_name(p, header, qlen, 10))) 612 if (!(p = skip_name(p, header, qlen, 0))) 615 if (!(p = skip_name(p, header, qlen, 2 641 extract_addresses(HEADER *header, size_t qlen, char *name, time_t now) argument 866 extract_request(HEADER *header, size_t qlen, char *name, unsigned short *typep) argument 902 setup_reply(HEADER *header, size_t qlen, struct all_addr *addrp, unsigned short flags, unsigned long ttl) argument 977 check_for_bogus_wildcard(HEADER *header, size_t qlen, char *name, struct bogus_addr *baddr, time_t now) argument 1130 answer_request(HEADER *header, char *limit, size_t qlen, struct in_addr local_addr, struct in_addr local_netmask, time_t now) argument [all...] |
/external/kmod/tools/ |
H A D | modprobe.c | 599 size_t qlen = 0; local 608 qlen = 2; 612 tmp = realloc(opts, optslen + len + qlen + 2); 625 if (qlen == 0) {
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | events.c | 3517 size_t qlen = plen - 1; local 3521 qlen > 2 && pos[0] == WLAN_EID_QOS_MAP_SET && 3522 pos[1] <= qlen - 2 && pos[1] >= 16)
|
/external/libnl/include/netlink-private/ |
H A D | types.h | 460 uint32_t qlen; member in struct:rtnl_tstats::__anon11232
|