Home
last modified time | relevance | path

Searched refs:packet (Results 1 – 5 of 5) sorted by relevance

/system/core/libnetutils/
Dpacket.c164 } packet; in receive_packet() local
170 nread = read(s, &packet, sizeof(packet)); in receive_packet()
184 } else if (packet.ip.version != IPVERSION || packet.ip.ihl != (sizeof(packet.ip) >> 2)) { in receive_packet()
188 } else if (nread < ntohs(packet.ip.tot_len)) { in receive_packet()
190 ALOGD("Packet was truncated (read %d, needed %d)", nread, ntohs(packet.ip.tot_len)); in receive_packet()
192 } else if (packet.ip.protocol != IPPROTO_UDP) { in receive_packet()
194 ALOGD("IP protocol (%d) is not UDP", packet.ip.protocol); in receive_packet()
196 } else if (packet.udp.dest != htons(PORT_BOOTP_CLIENT)) { in receive_packet()
198 ALOGD("UDP dest port (%d) is not DHCP client", ntohs(packet.udp.dest)); in receive_packet()
210 sum = finish_sum(checksum(&packet.ip, sizeof(packet.ip), 0)); in receive_packet()
[all …]
DAndroid.mk9 packet.c
/system/core/libcutils/
Dmq.c115 void (*free)(OutgoingPacket* packet);
265 static void outgoingPacketFree(OutgoingPacket* packet) { in outgoingPacketFree() argument
267 free(packet); in outgoingPacketFree()
635 OutgoingPacket* packet = NULL; in peerProxyGetOrCreate() local
637 packet = calloc(1, sizeof(OutgoingPacket)); in peerProxyGetOrCreate()
638 if (packet == NULL) { in peerProxyGetOrCreate()
643 packet->header.type = CONNECTION_REQUEST; in peerProxyGetOrCreate()
644 packet->header.credentials = credentials; in peerProxyGetOrCreate()
645 packet->free = &outgoingPacketFree; in peerProxyGetOrCreate()
650 free(packet); in peerProxyGetOrCreate()
[all …]
/system/core/fastboot/
Dfastboot_protocol.txt15 * Max packet size must be 64 bytes for full-speed and 512 bytes for
25 packet no greater than 64 bytes.
27 2. Client response with a single packet no greater than 64 bytes.
43 A DATA response packet will be 12 bytes long, in the form of
53 4. Client responds with a single packet no greater than 64 bytes.
/system/core/adb/
Dprotocol.txt83 AUTH packet where type is SIGNATURE(2) and data is the signature. If the
84 signature verification succeeds, the sender replies with a CONNECT packet.
87 packet and a new random token, so that the recipient can retry signing
91 AUTH packet where type is RSAPUBLICKEY(3) and data is the public key. If