Searched refs:packet (Results 1 – 5 of 5) sorted by relevance
/system/core/libnetutils/ |
D | packet.c | 164 } packet; in receive_packet() local 170 nread = read(s, &packet, sizeof(packet)); in receive_packet() 184 } else if (packet.ip.version != IPVERSION || packet.ip.ihl != (sizeof(packet.ip) >> 2)) { in receive_packet() 188 } else if (nread < ntohs(packet.ip.tot_len)) { in receive_packet() 190 ALOGD("Packet was truncated (read %d, needed %d)", nread, ntohs(packet.ip.tot_len)); in receive_packet() 192 } else if (packet.ip.protocol != IPPROTO_UDP) { in receive_packet() 194 ALOGD("IP protocol (%d) is not UDP", packet.ip.protocol); in receive_packet() 196 } else if (packet.udp.dest != htons(PORT_BOOTP_CLIENT)) { in receive_packet() 198 ALOGD("UDP dest port (%d) is not DHCP client", ntohs(packet.udp.dest)); in receive_packet() 210 sum = finish_sum(checksum(&packet.ip, sizeof(packet.ip), 0)); in receive_packet() [all …]
|
D | Android.mk | 9 packet.c
|
/system/core/libcutils/ |
D | mq.c | 115 void (*free)(OutgoingPacket* packet); 265 static void outgoingPacketFree(OutgoingPacket* packet) { in outgoingPacketFree() argument 267 free(packet); in outgoingPacketFree() 635 OutgoingPacket* packet = NULL; in peerProxyGetOrCreate() local 637 packet = calloc(1, sizeof(OutgoingPacket)); in peerProxyGetOrCreate() 638 if (packet == NULL) { in peerProxyGetOrCreate() 643 packet->header.type = CONNECTION_REQUEST; in peerProxyGetOrCreate() 644 packet->header.credentials = credentials; in peerProxyGetOrCreate() 645 packet->free = &outgoingPacketFree; in peerProxyGetOrCreate() 650 free(packet); in peerProxyGetOrCreate() [all …]
|
/system/core/fastboot/ |
D | fastboot_protocol.txt | 15 * Max packet size must be 64 bytes for full-speed and 512 bytes for 25 packet no greater than 64 bytes. 27 2. Client response with a single packet no greater than 64 bytes. 43 A DATA response packet will be 12 bytes long, in the form of 53 4. Client responds with a single packet no greater than 64 bytes.
|
/system/core/adb/ |
D | protocol.txt | 83 AUTH packet where type is SIGNATURE(2) and data is the signature. If the 84 signature verification succeeds, the sender replies with a CONNECT packet. 87 packet and a new random token, so that the recipient can retry signing 91 AUTH packet where type is RSAPUBLICKEY(3) and data is the public key. If
|