HomeSort by relevance Sort by last modified time
    Searched full:packet (Results 826 - 850 of 3660) sorted by null

<<31323334353637383940>>

  /external/chromium/net/spdy/
spdy_test_util.h 108 // Construct a SPDY packet.
109 // |head| is the start of the packet, up to but not including
187 // Constructs a standard SPDY GET SYN packet, optionally compressed
197 // Constructs a standard SPDY GET SYN packet, optionally compressed.
207 // Constructs a standard SPDY GET SYN packet, optionally compressed.
224 // Constructs a standard SPDY push SYN packet.
252 // Constructs a standard SPDY SYN_REPLY packet to match the SPDY GET.
260 // Constructs a standard SPDY SYN_REPLY packet to match the SPDY GET.
266 // Constructs a standard SPDY SYN_REPLY packet with an Internal Server
271 // Constructs a standard SPDY SYN_REPLY packet with the specified status code
    [all...]
  /external/srtp/googlepatches/
vidyo-1-srtp-win.patch 122 - void *packet;
123 + uint8_t *packet;
131 - packet = base_tag + base_tag_len;
132 + packet = (uint8_t*)base_tag + base_tag_len;
134 /* copy encrypted master key into packet */
137 packet += emk_len;
139 /* copy ROC into packet */
142 *((uint32_t *)packet) = be32_to_cpu(roc);
144 octet_string_hex_string(packet, sizeof(roc)));
145 packet += sizeof(roc)
    [all...]
  /external/tcpdump/
README 32 packet capture. Before building tcpdump, you must first retrieve and
97 we just note if the packet is a "send" or an "ack".
100 Field 1 is the packet time in decimal seconds, relative
102 from last packet. Field 3 is packet type/direction.
107 (i.e., missing packet(s)), a "#" means an odd-size (not max
108 seg size) packet. Field 4 has the packet flags
112 the delta-time from the first send of the packet to the
114 delta-time from the first send of the packet to th
    [all...]
  /external/webrtc/src/modules/audio_coding/codecs/isac/fix/interface/
isacfix.h 195 * - packet_size : size of the packet.
196 * - rtp_seq_number : the RTP number of the packet.
197 * - arr_ts : the arrival time of the packet (from NetEq)
218 * - packet_size : size of the packet.
219 * - rtp_seq_number : the RTP number of the packet.
220 * - send_ts : the send time of the packet from RTP header,
222 * - arr_ts : the arrival time of the packet (from NetEq)
350 * This function returns the length of the frame represented in the packet.
356 * - frameLength : Length of frame in packet (in samples)
485 * singel packet. The maximum rate is set in bits per second
    [all...]
  /external/iproute2/man/man8/
tc.8 94 packet to an interface, it is
108 When the kernel tries to dequeue a packet from such a
117 is used by a classful qdisc to determine in which class a packet will
138 assigned to a packet.
147 gets to send a packet in turn.
177 performed using link idle time calculations based on average packet size and
209 When a packet enters a classful qdisc it can be
216 for relevant instructions. Filters can match on all fields of a packet header,
346 output more statistics about packet usage.
tc-htb.8 40 how to decide which simulated link to use for a given packet to be sent.
55 When enqueueing a packet, HTB starts at the root and uses various methods to
61 children), we enqueue the packet there. If it is not yet a leaf node, we do
74 This algorithm makes sure that a packet always ends up somewhere, even while
135 packet. Should be at least as high as the highest cburst of all children.
  /external/kernel-headers/original/linux/
tcp.h 180 __u16 saw_tstamp : 1, /* Saw TIMESTAMP on last packet */
181 tstamp_ok : 1, /* TIMESTAMP seen on SYN packet */
183 wscale_ok : 1, /* Wscale seen on SYN packet */
184 sack_ok : 4, /* SACK seen on SYN packet */
188 __u8 eff_sacks; /* Size of SACK array to send with next packet */
225 __u32 snd_sml; /* Last byte of the most recently transmitted small packet */
227 __u32 lsndtime; /* timestamp of last sent data packet (for restart window) */
256 __u8 reordering; /* Packet reordering metric. */
272 * Options received (usually on last packet, some only on SYN packets).
  /external/libnfc-nxp/src/
phFriNfc_Llcp.h 91 * \name LLCP packet types.
190 * \name LLCP packet field sizes.
194 #define PHFRINFC_LLCP_PACKET_HEADER_SIZE 2 /**< Size of the general packet header (DSAP+PTYPE+SSAP).*/
199 PHFRINFC_LLCP_TLV_MIUX_MASK) /**< Maximum size of a packet */
248 /**< The packet type*/
354 /**< DISC packet send pending flag*/
357 /**< FRMR packet send pending flag*/
360 /**< Header of pending FRMR packet*/
363 /**< Info field of pending FRMR packet*/
phLlcNfc_Frame.h 114 /** Number of CRC bytes in a LLC packet */
176 * \param[in/out] psList List inofrmation to know where shall the packet should be stored
177 * \param[in] packetInfo Llc packet information
239 * \copydoc page_reg This function is used to create a LLC packet with U frame
242 * \param[in/out] psLlcPacket Llc packet sent by the upper layer
243 * \param[in/out] pLlcPacketLength Length of the llc packet
263 * \copydoc page_reg This function is used to create a LLC packet with I frame
267 * \param[in/out] psLlcPacket Llc packet sent by the upper layer
436 * \param[in/out] psLlcPacket Llc packet sent by the upper layer
  /frameworks/base/core/java/android/net/
DnsPinger.java 43 * Performs a simple DNS "ping" by sending a "server status" query packet to the
79 * Async response packet for dns pings.
84 /** An error code for a {@link #DNS_PING_RESULT} packet */
86 /** An error code for a {@link #DNS_PING_RESULT} packet */
166 DatagramPacket packet = new DatagramPacket(buf, local
174 newActivePing.socket.send(packet);
193 // Check that ID field matches (we're throwing out the rest of the packet)
200 log("response ID didn't match, ignoring packet");
281 log("Responding to packet " + internalId +
  /cts/tests/tests/net/src/android/net/rtp/cts/
AudioGroupTest.java 78 DatagramPacket packet = new DatagramPacket(new byte[length + 1], length + 1); local
80 socket.receive(packet);
81 assertEquals(packet.getLength(), length);
85 DatagramPacket packet = new DatagramPacket(new byte[1], 1); local
91 socket.receive(packet);
  /external/bluetooth/bluedroid/stack/l2cap/
l2c_ucd.c 459 /* channel based, packet based flushable or non-flushable */
731 ** Description enqueue outgoing UCD packet into security pending queue
749 ** Return TRUE if any UCD packet for security
777 ** Description dequeue UCD packet from security pending queue and
800 ** Description dequeue UCD packet from security pending queue and
826 ** Return TRUE if any UCD packet for security
854 ** Description dequeue UCD packet from security pending queue and
876 ** Description dequeue UCD packet from security pending queue and
899 ** Process received UCD packet if application is expecting.
971 /* check if any outgoing UCD packet is waiting security check *
    [all...]
  /external/chromium-trace/trace-viewer/src/tracing/importer/
timeline_stream_importer.js 115 var packet = JSON.parse(event.data);
116 var command = packet['cmd'];
117 var pid = packet['pid'];
121 var threadData = packet['td'];
138 var counterData = packet['cd'];
  /external/chromium_org/media/cast/framer/
frame_id_map.cc 32 // Update the last received packet id.
80 << " packet:" << static_cast<int>(rtp_header.packet_id)
81 << " max packet:" << static_cast<int>(rtp_header.max_packet_id);
92 // Does this packet belong to a new frame?
105 // Insert packet to existing frame.
  /external/chromium_org/media/cast/net/pacing/
paced_sender_unittest.cc 36 virtual bool SendPacket(const Packet& packet) OVERRIDE {
70 packets.push_back(Packet(packet_size, kValue));
90 EXPECT_TRUE(paced_sender_->SendRtcpPacket(Packet(kSize2, kValue)));
158 // End of NACK plus a packet from the oldest frame.
  /external/chromium_org/net/tools/quic/test_tools/
packet_dropping_test_writer.cc 36 // An alarm that is scheduled every time a new packet is to be written at a
63 LOG(INFO) << "Seeding packet loss with " << seed;
89 DLOG(INFO) << "Dropping packet.";
109 DLOG(INFO) << "Dropping packet because the buffer is full.";
160 DLOG(INFO) << "Releasing packet. " << (delayed_packets_.size() - 1)
  /external/chromium_org/third_party/libjingle/source/talk/media/base/
rtputils.cc 169 // This method returns SSRC first of RTCP packet, except if packet is SDES.
173 // Packet should be at least of 8 bytes, to get SSRC from a RTCP packet.
177 // SDES packet parsing is not supported.
  /external/dhcpcd/
bpf-filter.h 35 /* Make sure this is an ARP packet... */
45 /* If we passed all the tests, ask for the whole packet. */
80 /* Make sure this is an IP packet... */
84 /* Make sure it's a UDP packet... */
95 /* If we passed all the tests, ask for the whole packet. */
  /external/grub/netboot/
sk_g16.h 39 #define CSR0_MISS 0x1000 /* Missed packet (RC) */
89 #define RX_STP 0x02 /* Start of Packet */
90 #define RX_ENP 0x01 /* End of Packet */
102 #define TX_STP 0x02 /* Start of Packet */
103 #define TX_ENP 0x01 /* End of Packet */
  /external/iputils/doc/
pg3.sgml 33 are <command/pg/ to start packet injection and to get the results of run;
34 and <command/pgset/ to setup packet generator.
57 Size of packet to generate. The size includes all the headers: UDP, IP,
66 Each packet will contain <replaceable/NUMBER/ of fragments.
108 Abort packet injection.
  /external/libppp/src/
slcompress.c 173 * Bail if this is an IP fragment or if the TCP packet isn't `compressible'
175 * the caller has already made sure the packet is IP proto TCP).
191 * Packet is compressible -- we're going to send either a COMPRESSED_TCP or
192 * UNCOMPRESSED_TCP packet. Either way we need to locate (or create) the
226 * Didn't find it -- re-use oldest cstate. Send an uncompressed packet
327 * Nothing changed. If this packet contains data and the last one didn't,
328 * this is probably a data packet following an ack (normal on an
343 * actual changes match one of our special case encodings -- send packet
376 * this packet's header.
382 * We want to use the original packet as our compressed packet. (cp
    [all...]
  /external/llvm/lib/Analysis/
ProfileDataLoader.cpp 67 /// packet.
76 /// packet and then accumulate the entries into 'Data'.
99 /// run with when the current profiling data packet(s) were generated.
131 // If the low eight bits of the packet are zero, we must be dealing with an
149 + ": Unknown profiling packet type");
  /external/qemu/slirp/
ip_output.c 50 * IP output. The packet in mbuf chain m contains a skeletal IP
52 * The mbuf chain containing the packet will be freed.
85 * the packet or packet fragments
117 len = (IF_MTU - hlen) &~ 7; /* ip databytes per packet */
  /external/qemu/slirp-android/
ip_output.c 50 * IP output. The packet in mbuf chain m contains a skeletal IP
52 * The mbuf chain containing the packet will be freed.
85 * the packet or packet fragments
117 len = (IF_MTU - hlen) &~ 7; /* ip databytes per packet */
  /external/smack/src/org/jivesoftware/smack/
BOSHPacketReader.java 40 * packet objects.
49 * Create a packet reader which listen on a BOSHConnection for received
61 * @param event the BOSH client response which includes the received packet.
134 * @param parser the XML parser, positioned at the start of a message packet.
135 * @throws Exception if an exception occurs while parsing the packet.

Completed in 529 milliseconds

<<31323334353637383940>>