/external/tcpdump/ |
D | token.h | 37 #define BROADCAST(trp) ((ntohs((trp)->token_rcf) & 0xE000) >> 13) 38 #define RIF_LENGTH(trp) ((ntohs((trp)->token_rcf) & 0x1f00) >> 8) 39 #define DIRECTION(trp) ((ntohs((trp)->token_rcf) & 0x0080) >> 7) 40 #define LARGEST_FRAME(trp) ((ntohs((trp)->token_rcf) & 0x0070) >> 4) 41 #define RING_NUMBER(trp, x) ((ntohs((trp)->token_rseg[x]) & 0xfff0) >> 4) 42 #define BRIDGE_NUMBER(trp, x) ((ntohs((trp)->token_rseg[x]) & 0x000f))
|
D | print-ether.c | 90 if (ntohs(ep->ether_type) <= ETHERMTU) in ether_hdr_print() 94 tok2str(ethertype_values,"Unknown", ntohs(ep->ether_type)), in ether_hdr_print() 95 ntohs(ep->ether_type)); in ether_hdr_print() 97 if (ntohs(ep->ether_type) <= ETHERMTU) in ether_hdr_print() 100 …oid)printf(", %s", tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", ntohs(ep->ether_type)));… in ether_hdr_print() 126 ether_type = ntohs(ep->ether_type); in ether_print() 225 ntohs(*(u_int16_t *)p) & 0xfff, in ether_encap_print() 226 ntohs(*(u_int16_t *)p) >> 13, in ether_encap_print() 227 (ntohs(*(u_int16_t *)p) & 0x1000) ? ", CFI" : ""); in ether_encap_print() 229 ether_type = ntohs(*(u_int16_t *)(p + 2)); in ether_encap_print() [all …]
|
D | print-isakmp.c | 647 printf(" key len=%d", ntohs(e.len) - 4); in isakmp_ke_print() 648 if (2 < vflag && 4 < ntohs(e.len)) { in isakmp_ke_print() 650 if (!rawprint((caddr_t)(ext + 1), ntohs(e.len) - 4)) in isakmp_ke_print() 653 return (u_char *)ext + ntohs(e.len); in isakmp_ke_print() 733 printf(" port=%d", ntohs(id.port)); in isakmp_id_print() 913 printf(" len=%d", ntohs(e.len) - 4); in isakmp_hash_print() 914 if (2 < vflag && 4 < ntohs(e.len)) { in isakmp_hash_print() 916 if (!rawprint((caddr_t)(ext + 1), ntohs(e.len) - 4)) in isakmp_hash_print() 919 return (u_char *)ext + ntohs(e.len); in isakmp_hash_print() 936 printf(" len=%d", ntohs(e.len) - 4); in isakmp_sig_print() [all …]
|
D | print-ap1394.c | 68 tok2str(ethertype_values,"Unknown", ntohs(fp->firewire_type)), in ap1394_hdr_print() 69 ntohs(fp->firewire_type)); in ap1394_hdr_print() 71 …(void)printf(", %s", tok2str(ethertype_values,"Unknown Ethertype (0x%04x)", ntohs(fp->firewire_typ… in ap1394_hdr_print() 105 ether_type = ntohs(fp->firewire_type); in ap1394_if_print()
|
/external/ppp/pppd/plugins/rp-pppoe/ |
D | common.c | 48 UINT16_t len = ntohs(packet->length); in parsePacket() 103 UINT16_t len = ntohs(packet->length); in findTag() 281 len = (int) ntohs(packet->length); in clampMSS() 449 ntohs(conn->cookie.length) + TAG_HDR_SIZE); in sendPADT() 450 memcpy(cursor, &conn->cookie, ntohs(conn->cookie.length) + TAG_HDR_SIZE); in sendPADT() 451 cursor += ntohs(conn->cookie.length) + TAG_HDR_SIZE; in sendPADT() 452 plen += ntohs(conn->cookie.length) + TAG_HDR_SIZE; in sendPADT() 457 ntohs(conn->relayId.length) + TAG_HDR_SIZE); in sendPADT() 458 memcpy(cursor, &conn->relayId, ntohs(conn->relayId.length) + TAG_HDR_SIZE); in sendPADT() 459 cursor += ntohs(conn->relayId.length) + TAG_HDR_SIZE; in sendPADT() [all …]
|
D | discovery.c | 348 if (ntohs(packet.length) + HDR_SIZE > len) { in waitForPADO() 350 (unsigned int) ntohs(packet.length)); in waitForPADO() 461 ntohs(conn->cookie.length) + TAG_HDR_SIZE); in sendPADR() 462 memcpy(cursor, &conn->cookie, ntohs(conn->cookie.length) + TAG_HDR_SIZE); in sendPADR() 463 cursor += ntohs(conn->cookie.length) + TAG_HDR_SIZE; in sendPADR() 464 plen += ntohs(conn->cookie.length) + TAG_HDR_SIZE; in sendPADR() 469 ntohs(conn->relayId.length) + TAG_HDR_SIZE); in sendPADR() 470 memcpy(cursor, &conn->relayId, ntohs(conn->relayId.length) + TAG_HDR_SIZE); in sendPADR() 471 cursor += ntohs(conn->relayId.length) + TAG_HDR_SIZE; in sendPADR() 472 plen += ntohs(conn->relayId.length) + TAG_HDR_SIZE; in sendPADR() [all …]
|
D | debug.c | 88 int len = ntohs(packet->length); in dumpPacket() 123 (int) ntohs(packet->session), in dumpPacket() 142 dumpHex(fp, packet->payload, ntohs(packet->length)); in dumpPacket()
|
/external/ipsec-tools/src/racoon/ |
D | security.c | 115 len = ntohs(prop->h.len) - 130 len = ntohs(trns->h.len) - sizeof(struct isakmp_pl_t); 134 type = ntohs(d->type) & ~ISAKMP_GEN_MASK; 135 flag = ntohs(d->type) & ISAKMP_GEN_MASK; 136 lorv = ntohs(d->lorv); 149 flag = ntohs(d->type & ISAKMP_GEN_MASK); 156 p->sec_ctx.ctx_strlen = ntohs(p->sec_ctx.ctx_strlen);
|
D | isakmp_cfg.c | 201 if (tlen < ntohs(ph->len)) { 208 plogdump(LLV_DEBUG, ph, ntohs(ph->len)); 217 plen = ntohs(ph->len); 219 plen = ntohs(nph->len); 264 tlen -= ntohs(ph->len); 266 ph = (struct isakmp_gen *)(npp + ntohs(ph->len)); 328 tlen = ntohs(attrpl->h.len); 333 type = ntohs(attr->type); 341 s_isakmp_cfg_type(type), ntohs(attr->lorv)); 346 attr, ntohs(attrpl->id))) != 0) [all …]
|
D | ipsec_doi.c | 562 tlen = ntohs(trns->h.len) - sizeof(*trns); 576 type = ntohs(d->type) & ~ISAKMP_GEN_MASK; 577 flag = ntohs(d->type) & ISAKMP_GEN_MASK; 582 s_oakley_attr_v(type, ntohs(d->lorv))); 597 len = ntohs(d->lorv); 612 sa->enctype = (u_int16_t)ntohs(d->lorv); 616 sa->hashtype = (u_int16_t)ntohs(d->lorv); 620 sa->authmethod = ntohs(d->lorv); 624 sa->dh_group = (u_int16_t)ntohs(d->lorv); 629 int type = (int)ntohs(d->lorv); [all …]
|
D | isakmp_inf.c | 195 if (msg->l < sizeof(*isakmp) + ntohs(gen->len) + sizeof(*nd)) { 203 nd = (struct isakmp_gen *) ((caddr_t) gen + ntohs(gen->len)); 206 if (ntohs(nd->len) > msg->l - (sizeof(struct isakmp) + 207 ntohs(gen->len))) { 213 if (ntohs(nd->len) < sizeof(*nd)) { 219 payload = vmalloc(ntohs(nd->len)); 226 memcpy(payload->v, (caddr_t) nd, ntohs(nd->len)); 238 if (ntohs(gen->len) - sizeof(struct isakmp_gen) != hash->l) { 342 type = ntohs(notify->type); 405 if (ntohs(notify->h.len) < sizeof(*notify) + notify->spi_size) { [all …]
|
/external/grub/netboot/ |
D | fsys_tftp.c | 104 if (tr->opcode == ntohs (TFTP_ERROR)) in buf_fill() 107 ntohs (tr->u.err.errcode), in buf_fill() 112 if (tr->opcode == ntohs (TFTP_OACK)) in buf_fill() 128 len = ntohs (tr->udp.len) - sizeof (struct udphdr) - 2; in buf_fill() 170 iport, ntohs (tr->udp.src), in buf_fill() 189 else if (tr->opcode == ntohs (TFTP_DATA)) in buf_fill() 194 len = ntohs (tr->udp.len) - sizeof (struct udphdr) - 4; in buf_fill() 205 block = ntohs (tp.u.ack.block = tr->u.data.block); in buf_fill() 217 oport = ntohs (tr->udp.src); in buf_fill()
|
D | main.c | 368 if (tr->opcode == ntohs (TFTP_ERROR)) in tftp() 371 ntohs (tr->u.err.errcode), in tftp() 376 if (tr->opcode == ntohs (TFTP_OACK)) in tftp() 385 len = ntohs (tr->udp.len) - sizeof (struct udphdr) - 2; in tftp() 415 iport, ntohs (tr->udp.src), in tftp() 427 else if (tr->opcode == ntohs (TFTP_DATA)) in tftp() 429 len = ntohs (tr->udp.len) - sizeof (struct udphdr) - 4; in tftp() 435 block = ntohs (tp.u.ack.block = tr->u.data.block); in tftp() 447 oport = ntohs (tr->udp.src); in tftp() 716 int len = ntohs (packet->len); in udpchksum() [all …]
|
/external/kernel-headers/original/linux/ |
D | kernel.h | 236 ntohs((addr).s6_addr16[0]), \ 237 ntohs((addr).s6_addr16[1]), \ 238 ntohs((addr).s6_addr16[2]), \ 239 ntohs((addr).s6_addr16[3]), \ 240 ntohs((addr).s6_addr16[4]), \ 241 ntohs((addr).s6_addr16[5]), \ 242 ntohs((addr).s6_addr16[6]), \ 243 ntohs((addr).s6_addr16[7])
|
/external/iptables/extensions/ |
D | libxt_TPROXY.c | 56 ntohs(info->lport), (unsigned int)info->mark_value, in tproxy_tg_print() 69 ntohs(info->lport), (unsigned int)info->mark_value, in tproxy_tg_print4() 82 ntohs(info->lport), (unsigned int)info->mark_value, in tproxy_tg_print6() 90 printf(" --on-port %u", ntohs(info->lport)); in tproxy_tg_save() 103 printf(" --on-port %u", ntohs(info->lport)); in tproxy_tg_save4() 115 printf(" --on-port %u", ntohs(info->lport)); in tproxy_tg_save6()
|
D | libipt_MASQUERADE.c | 112 printf("%hu", ntohs(r->min.tcp.port)); in MASQUERADE_print() 114 printf("-%hu", ntohs(r->max.tcp.port)); in MASQUERADE_print() 128 printf(" --to-ports %hu", ntohs(r->min.tcp.port)); in MASQUERADE_save() 130 printf("-%hu", ntohs(r->max.tcp.port)); in MASQUERADE_save()
|
D | libipt_REDIRECT.c | 115 printf("%hu", ntohs(r->min.tcp.port)); in REDIRECT_print() 117 printf("-%hu", ntohs(r->max.tcp.port)); in REDIRECT_print() 130 printf("%hu", ntohs(r->min.tcp.port)); in REDIRECT_save() 132 printf("-%hu", ntohs(r->max.tcp.port)); in REDIRECT_save()
|
/external/webkit/Source/WebCore/platform/graphics/ |
D | WOFFFileFormat.cpp | 43 #define ntohs(x) std_ntohs(x) macro 48 #define ntohs(x) ((uint16_t)(x)) macro 53 #define ntohs(x) ((unit16_t)(x)) macro 58 #define ntohs(x) ((uint16_t)((((uint16_t)(x) & 0xff00) >> 8) | (((uint16_t)(x) & 0x00ff) << 8))) macro 59 #define htons(x) ntohs(x) 86 value = ntohs(*reinterpret_cast<const uint16_t*>(buffer->data() + offset)); in readUInt16()
|
/external/kernel-headers/original/linux/byteorder/ |
D | generic.h | 146 #undef ntohs 156 extern __u16 ntohs(__be16); 169 #define ntohs(x) ___ntohs(x) macro
|
/external/qemu/slirp/ |
D | tcp_subr.c | 404 ntohs(addr.sin_port), inet_ntoa(addr.sin_addr))); in tcp_fconnect() 561 if ((tcptos[i].fport && (ntohs(so->so_fport) == tcptos[i].fport)) || in tcp_tos() 562 (tcptos[i].lport && (ntohs(so->so_lport) == tcptos[i].lport))) { in tcp_tos() 571 if ((emup->fport && (ntohs(so->so_fport) == emup->fport)) || in tcp_tos() 572 (emup->lport && (ntohs(so->so_lport) == emup->lport))) { in tcp_tos() 652 n2 = ntohs(addr.sin_port); in tcp_emu() 683 if (ntohs(so->so_lport) > 1023 || ntohs(so->so_lport) < 512 || in tcp_emu() 767 if (ntohs(so->so_lport) > 1023 || ntohs(so->so_lport) < 512 || in tcp_emu() 980 n6 = ntohs(so->so_fport); in tcp_emu() 1012 n6 = ntohs(so->so_fport); in tcp_emu() [all …]
|
/external/qemu/slirp-android/ |
D | udp.c | 118 len = ntohs((u_int16_t)uh->uh_ulen); in udp_input() 134 if (slirp_should_drop(ntohl(ip->ip_dst.addr), ntohs(uh->uh_dport.port), in udp_input() 139 ntohs(uh->uh_sport.port), in udp_input() 141 ntohs(uh->uh_dport.port), in udp_input() 150 ntohs(uh->uh_sport.port), in udp_input() 152 ntohs(uh->uh_dport.port), in udp_input() 204 if (ntohs(uh->uh_dport.port) == 53) { in udp_input()
|
/external/dnsmasq/src/ |
D | rfc1035.c | 341 for (q = ntohs(header->qdcount); q != 0; q--) in skip_questions() 380 for (q = ntohs(header->qdcount); q != 0; q--) in questions_crc() 424 …if (!(ansp = skip_section(ansp, ntohs(header->ancount) + ntohs(header->nscount) + ntohs(header->ar… in resize_packet() 429 if (pheader && ntohs(header->arcount) == 0) in resize_packet() 447 int i, arcount = ntohs(header->arcount); in find_pseudoheader() 458 for (i = ntohs(header->qdcount); i != 0; i--) in find_pseudoheader() 480 if (!(ansp = skip_section(ansp, ntohs(header->ancount) + ntohs(header->nscount), header, plen))) in find_pseudoheader() 590 !(p = do_doctor(p, ntohs(header->ancount), header, qlen))) in find_soa() 593 for (i = ntohs(header->nscount); i != 0; i--) in find_soa() 626 if (!do_doctor(p, ntohs(header->arcount), header, qlen)) in find_soa() [all …]
|
/external/bluetooth/bluez/lib/ |
D | uuid.c | 170 ntohl(data0), ntohs(data1), in bt_uuid_to_string() 171 ntohs(data2), ntohs(data3), in bt_uuid_to_string() 172 ntohl(data4), ntohs(data5)); in bt_uuid_to_string()
|
/external/wpa_supplicant_8/src/wps/ |
D | http_client.c | 62 ntohs(c->dst.sin_port)); in http_client_got_response() 68 ntohs(c->dst.sin_port)); in http_client_got_response() 91 inet_ntoa(c->dst.sin_addr), ntohs(c->dst.sin_port), in http_client_tx_ready() 116 inet_ntoa(c->dst.sin_addr), ntohs(c->dst.sin_port)); in http_client_tx_ready() 276 ntohs(dst.sin_port)); in http_client_url()
|
/external/ping6/ |
D | ping6.c | 952 src.sin6_port = ntohs(DUMMY_PORT); in main() 1255 *(u_int16_t *)nip->icmp6_ni_nonce = ntohs(seq); in pinger() 1270 *(u_int16_t *)nip->icmp6_ni_nonce = ntohs(seq); in pinger() 1282 *(u_int16_t *)nip->icmp6_ni_nonce = ntohs(seq); in pinger() 1297 *(u_int16_t *)nip->icmp6_ni_nonce = ntohs(seq); in pinger() 1304 icp->icmp6_seq = ntohs(seq); in pinger() 1346 if (ntohs(icp->icmp6_id) == ident) in myechoreply() 1483 seq = ntohs(icp->icmp6_seq); in pr_pack() 1547 seq = ntohs(*(u_int16_t *)ni->icmp6_ni_nonce); in pr_pack() 1563 switch (ntohs(ni->ni_code)) { in pr_pack() [all …]
|