/external/chromium/net/spdy/ |
spdy_test_util.h | 108 // Construct a SPDY packet. 109 // |head| is the start of the packet, up to but not including 187 // Constructs a standard SPDY GET SYN packet, optionally compressed 197 // Constructs a standard SPDY GET SYN packet, optionally compressed. 207 // Constructs a standard SPDY GET SYN packet, optionally compressed. 224 // Constructs a standard SPDY push SYN packet. 252 // Constructs a standard SPDY SYN_REPLY packet to match the SPDY GET. 260 // Constructs a standard SPDY SYN_REPLY packet to match the SPDY GET. 266 // Constructs a standard SPDY SYN_REPLY packet with an Internal Server 271 // Constructs a standard SPDY SYN_REPLY packet with the specified status code [all...] |
/external/srtp/googlepatches/ |
vidyo-1-srtp-win.patch | 122 - void *packet; 123 + uint8_t *packet; 131 - packet = base_tag + base_tag_len; 132 + packet = (uint8_t*)base_tag + base_tag_len; 134 /* copy encrypted master key into packet */ 137 packet += emk_len; 139 /* copy ROC into packet */ 142 *((uint32_t *)packet) = be32_to_cpu(roc); 144 octet_string_hex_string(packet, sizeof(roc))); 145 packet += sizeof(roc) [all...] |
/external/tcpdump/ |
README | 32 packet capture. Before building tcpdump, you must first retrieve and 97 we just note if the packet is a "send" or an "ack". 100 Field 1 is the packet time in decimal seconds, relative 102 from last packet. Field 3 is packet type/direction. 107 (i.e., missing packet(s)), a "#" means an odd-size (not max 108 seg size) packet. Field 4 has the packet flags 112 the delta-time from the first send of the packet to the 114 delta-time from the first send of the packet to th [all...] |
/external/webrtc/src/modules/audio_coding/codecs/isac/fix/interface/ |
isacfix.h | 195 * - packet_size : size of the packet. 196 * - rtp_seq_number : the RTP number of the packet. 197 * - arr_ts : the arrival time of the packet (from NetEq) 218 * - packet_size : size of the packet. 219 * - rtp_seq_number : the RTP number of the packet. 220 * - send_ts : the send time of the packet from RTP header, 222 * - arr_ts : the arrival time of the packet (from NetEq) 350 * This function returns the length of the frame represented in the packet. 356 * - frameLength : Length of frame in packet (in samples) 485 * singel packet. The maximum rate is set in bits per second [all...] |
/external/iproute2/man/man8/ |
tc.8 | 94 packet to an interface, it is 108 When the kernel tries to dequeue a packet from such a 117 is used by a classful qdisc to determine in which class a packet will 138 assigned to a packet. 147 gets to send a packet in turn. 177 performed using link idle time calculations based on average packet size and 209 When a packet enters a classful qdisc it can be 216 for relevant instructions. Filters can match on all fields of a packet header, 346 output more statistics about packet usage.
|
tc-htb.8 | 40 how to decide which simulated link to use for a given packet to be sent. 55 When enqueueing a packet, HTB starts at the root and uses various methods to 61 children), we enqueue the packet there. If it is not yet a leaf node, we do 74 This algorithm makes sure that a packet always ends up somewhere, even while 135 packet. Should be at least as high as the highest cburst of all children.
|
/external/kernel-headers/original/linux/ |
tcp.h | 180 __u16 saw_tstamp : 1, /* Saw TIMESTAMP on last packet */ 181 tstamp_ok : 1, /* TIMESTAMP seen on SYN packet */ 183 wscale_ok : 1, /* Wscale seen on SYN packet */ 184 sack_ok : 4, /* SACK seen on SYN packet */ 188 __u8 eff_sacks; /* Size of SACK array to send with next packet */ 225 __u32 snd_sml; /* Last byte of the most recently transmitted small packet */ 227 __u32 lsndtime; /* timestamp of last sent data packet (for restart window) */ 256 __u8 reordering; /* Packet reordering metric. */ 272 * Options received (usually on last packet, some only on SYN packets).
|
/external/libnfc-nxp/src/ |
phFriNfc_Llcp.h | 91 * \name LLCP packet types. 190 * \name LLCP packet field sizes. 194 #define PHFRINFC_LLCP_PACKET_HEADER_SIZE 2 /**< Size of the general packet header (DSAP+PTYPE+SSAP).*/ 199 PHFRINFC_LLCP_TLV_MIUX_MASK) /**< Maximum size of a packet */ 248 /**< The packet type*/ 354 /**< DISC packet send pending flag*/ 357 /**< FRMR packet send pending flag*/ 360 /**< Header of pending FRMR packet*/ 363 /**< Info field of pending FRMR packet*/
|
phLlcNfc_Frame.h | 114 /** Number of CRC bytes in a LLC packet */ 176 * \param[in/out] psList List inofrmation to know where shall the packet should be stored 177 * \param[in] packetInfo Llc packet information 239 * \copydoc page_reg This function is used to create a LLC packet with U frame 242 * \param[in/out] psLlcPacket Llc packet sent by the upper layer 243 * \param[in/out] pLlcPacketLength Length of the llc packet 263 * \copydoc page_reg This function is used to create a LLC packet with I frame 267 * \param[in/out] psLlcPacket Llc packet sent by the upper layer 436 * \param[in/out] psLlcPacket Llc packet sent by the upper layer
|
/frameworks/base/core/java/android/net/ |
DnsPinger.java | 43 * Performs a simple DNS "ping" by sending a "server status" query packet to the 79 * Async response packet for dns pings. 84 /** An error code for a {@link #DNS_PING_RESULT} packet */ 86 /** An error code for a {@link #DNS_PING_RESULT} packet */ 166 DatagramPacket packet = new DatagramPacket(buf, local 174 newActivePing.socket.send(packet); 193 // Check that ID field matches (we're throwing out the rest of the packet) 200 log("response ID didn't match, ignoring packet"); 281 log("Responding to packet " + internalId +
|
/cts/tests/tests/net/src/android/net/rtp/cts/ |
AudioGroupTest.java | 78 DatagramPacket packet = new DatagramPacket(new byte[length + 1], length + 1); local 80 socket.receive(packet); 81 assertEquals(packet.getLength(), length); 85 DatagramPacket packet = new DatagramPacket(new byte[1], 1); local 91 socket.receive(packet);
|
/external/bluetooth/bluedroid/stack/l2cap/ |
l2c_ucd.c | 459 /* channel based, packet based flushable or non-flushable */ 731 ** Description enqueue outgoing UCD packet into security pending queue 749 ** Return TRUE if any UCD packet for security 777 ** Description dequeue UCD packet from security pending queue and 800 ** Description dequeue UCD packet from security pending queue and 826 ** Return TRUE if any UCD packet for security 854 ** Description dequeue UCD packet from security pending queue and 876 ** Description dequeue UCD packet from security pending queue and 899 ** Process received UCD packet if application is expecting. 971 /* check if any outgoing UCD packet is waiting security check * [all...] |
/external/chromium-trace/trace-viewer/src/tracing/importer/ |
timeline_stream_importer.js | 115 var packet = JSON.parse(event.data); 116 var command = packet['cmd']; 117 var pid = packet['pid']; 121 var threadData = packet['td']; 138 var counterData = packet['cd'];
|
/external/chromium_org/media/cast/framer/ |
frame_id_map.cc | 32 // Update the last received packet id. 80 << " packet:" << static_cast<int>(rtp_header.packet_id) 81 << " max packet:" << static_cast<int>(rtp_header.max_packet_id); 92 // Does this packet belong to a new frame? 105 // Insert packet to existing frame.
|
/external/chromium_org/media/cast/net/pacing/ |
paced_sender_unittest.cc | 36 virtual bool SendPacket(const Packet& packet) OVERRIDE { 70 packets.push_back(Packet(packet_size, kValue)); 90 EXPECT_TRUE(paced_sender_->SendRtcpPacket(Packet(kSize2, kValue))); 158 // End of NACK plus a packet from the oldest frame.
|
/external/chromium_org/net/tools/quic/test_tools/ |
packet_dropping_test_writer.cc | 36 // An alarm that is scheduled every time a new packet is to be written at a 63 LOG(INFO) << "Seeding packet loss with " << seed; 89 DLOG(INFO) << "Dropping packet."; 109 DLOG(INFO) << "Dropping packet because the buffer is full."; 160 DLOG(INFO) << "Releasing packet. " << (delayed_packets_.size() - 1)
|
/external/chromium_org/third_party/libjingle/source/talk/media/base/ |
rtputils.cc | 169 // This method returns SSRC first of RTCP packet, except if packet is SDES. 173 // Packet should be at least of 8 bytes, to get SSRC from a RTCP packet. 177 // SDES packet parsing is not supported.
|
/external/dhcpcd/ |
bpf-filter.h | 35 /* Make sure this is an ARP packet... */ 45 /* If we passed all the tests, ask for the whole packet. */ 80 /* Make sure this is an IP packet... */ 84 /* Make sure it's a UDP packet... */ 95 /* If we passed all the tests, ask for the whole packet. */
|
/external/grub/netboot/ |
sk_g16.h | 39 #define CSR0_MISS 0x1000 /* Missed packet (RC) */ 89 #define RX_STP 0x02 /* Start of Packet */ 90 #define RX_ENP 0x01 /* End of Packet */ 102 #define TX_STP 0x02 /* Start of Packet */ 103 #define TX_ENP 0x01 /* End of Packet */
|
/external/iputils/doc/ |
pg3.sgml | 33 are <command/pg/ to start packet injection and to get the results of run; 34 and <command/pgset/ to setup packet generator. 57 Size of packet to generate. The size includes all the headers: UDP, IP, 66 Each packet will contain <replaceable/NUMBER/ of fragments. 108 Abort packet injection.
|
/external/libppp/src/ |
slcompress.c | 173 * Bail if this is an IP fragment or if the TCP packet isn't `compressible' 175 * the caller has already made sure the packet is IP proto TCP). 191 * Packet is compressible -- we're going to send either a COMPRESSED_TCP or 192 * UNCOMPRESSED_TCP packet. Either way we need to locate (or create) the 226 * Didn't find it -- re-use oldest cstate. Send an uncompressed packet 327 * Nothing changed. If this packet contains data and the last one didn't, 328 * this is probably a data packet following an ack (normal on an 343 * actual changes match one of our special case encodings -- send packet 376 * this packet's header. 382 * We want to use the original packet as our compressed packet. (cp [all...] |
/external/llvm/lib/Analysis/ |
ProfileDataLoader.cpp | 67 /// packet. 76 /// packet and then accumulate the entries into 'Data'. 99 /// run with when the current profiling data packet(s) were generated. 131 // If the low eight bits of the packet are zero, we must be dealing with an 149 + ": Unknown profiling packet type");
|
/external/qemu/slirp/ |
ip_output.c | 50 * IP output. The packet in mbuf chain m contains a skeletal IP 52 * The mbuf chain containing the packet will be freed. 85 * the packet or packet fragments 117 len = (IF_MTU - hlen) &~ 7; /* ip databytes per packet */
|
/external/qemu/slirp-android/ |
ip_output.c | 50 * IP output. The packet in mbuf chain m contains a skeletal IP 52 * The mbuf chain containing the packet will be freed. 85 * the packet or packet fragments 117 len = (IF_MTU - hlen) &~ 7; /* ip databytes per packet */
|
/external/smack/src/org/jivesoftware/smack/ |
BOSHPacketReader.java | 40 * packet objects. 49 * Create a packet reader which listen on a BOSHConnection for received 61 * @param event the BOSH client response which includes the received packet. 134 * @param parser the XML parser, positioned at the start of a message packet. 135 * @throws Exception if an exception occurs while parsing the packet.
|