Lines Matching full:packet
237 // PADDING implies end of packet.
243 // Only truncate the first frame in a packet, so if subsequent ones go
249 // Truncate the frame so the packet will not exceed kMaxPacketSize.
354 QuicPacket* packet = QuicPacket::NewDataPacket(
361 packet->FecProtectedData());
365 header.public_header.sequence_number_length, packet,
399 const QuicPublicResetPacket& packet) {
400 DCHECK(packet.public_header.reset_flag);
411 if (!writer.WriteUInt64(packet.public_header.guid)) {
415 if (!writer.WriteUInt64(packet.nonce_proof)) {
420 packet.rejected_sequence_number,
455 bool QuicFramer::ProcessPacket(const QuicEncryptedPacket& packet) {
457 reader_.reset(new QuicDataReader(packet.data(), packet.length()));
483 rv = ProcessDataPacket(public_header, packet);
493 // Try reading at least once to raise error if the packet is invalid.
509 const QuicEncryptedPacket& packet) {
511 if (!ProcessPacketHeader(&header, packet)) {
512 DLOG(WARNING) << "Unable to process data packet header.";
517 // The visitor suppresses further processing of the packet.
521 if (packet.length() > kMaxPacketSize) {
522 DLOG(WARNING) << "Packet too large: " << packet.length();
550 QuicPublicResetPacket packet(public_header);
551 if (!reader_->ReadUInt64(&packet.nonce_proof)) {
557 if (!reader_->ReadUInt48(&packet.rejected_sequence_number)) {
561 visitor_->OnPublicResetPacket(packet);
578 set_detailed_error("Revived packet too large.");
667 // protected packet, or 0 if this packet is not protected.
671 // Offset from the current packet sequence number to the first fec
672 // protected packet.
726 set_detailed_error("Got version flag in reset packet");
777 // Read the version only if the packet is from the client.
778 // version flag from the server means version negotiation packet.
786 // If the version from the new packet is the same as the version of this
800 bool QuicFramer::ReadGuidFromPacket(const QuicEncryptedPacket& packet,
802 QuicDataReader reader(packet.data(), packet.length());
903 const QuicEncryptedPacket& packet) {
911 set_detailed_error("Packet sequence numbers cannot be 0.");
919 if (!DecryptPayload(*header, packet)) {
942 set_detailed_error("Unable to read first fec protected packet offset.");
946 set_detailed_error("First fec protected packet offset must be less "
955 // Set the last sequence number after we have decrypted the packet
979 set_detailed_error("Packet has no frames.");
1042 // We're done with the packet.
1208 set_detailed_error("Unable to read num missing packet ranges.");
1317 QuicPacketSequenceNumber packet = smallest_received + sequence_delta;
1319 make_pair(packet, time_received.Add(
1507 const QuicPacket& packet) {
1511 packet_sequence_number, packet.AssociatedData(), packet.Plaintext()));
1516 StringPiece header_data = packet.BeforePlaintext();
1543 const QuicEncryptedPacket& packet) {
1552 packet,
1561 packet,
1772 bool QuicFramer::HasVersionFlag(const QuicEncryptedPacket& packet) {
1773 return packet.length() > 0 &&
1774 (packet.data()[0] & PACKET_PUBLIC_FLAGS_VERSION) != 0;
1786 // non-missing packet we can return it.
1791 // Otherwise return the largest missing packet, as indirectly observed.