Searched
full:packet (Results
926 -
950 of
3660) sorted by null
<<31323334353637383940>>
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
ssrcmuxfilter.h | 41 // SignalReadPacket when packet received on transport channel. This requires 52 // Determines packet belongs to valid cricket::BaseChannel.
|
/external/chromium_org/third_party/opus/src/silk/ |
errors.h | 45 /* Input length is not a multiple of 10 ms, or length is longer than the packet length */ 51 /* Packet size not 10, 20, 40, or 60 ms */
|
/external/dropbear/libtomcrypt/src/pk/dsa/ |
dsa_import.c | 22 @param in The binary packet to import from 23 @param inlen The length of the binary packet
|
/external/dropbear/libtomcrypt/src/pk/katja/ |
katja_decrypt_key.c | 77 /* rsa decode the packet */ 89 /* now OAEP decode the packet */
|
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_v1_5_decode.c | 43 /* default to invalid packet */ 99 /* valid packet */
|
/external/e2fsprogs/lib/et/test_cases/ |
heimdal2.et | 15 # /* Building and unbuilding the packet errors */ 22 ec KADM_NO_ROOM, "Packet is too large"
|
/external/flac/libFLAC/include/private/ |
ogg_decoder_aspect.h | 54 ogg_packet working_packet; /* as we work through the packet we will move working_packet.packet forward and working_packet.bytes down */
|
/external/grub/netboot/ |
otulip.c | 208 /* construct setup packet which is used by the 21143 to 214 txd.buf1sz = 192; /* setup packet must be 192 bytes */ 216 txd.control = 0x020; /* setup packet */ 233 udelay(50000); /* wait for the setup packet to be processed */ 285 txd.buf2addr = p; /* packet to transmit */ 318 /* copy packet to working buffer */ 323 memcpy(nic->packet, rxb + rxd_tail * BUFLEN, nic->packetlen); 357 /* Clear the missed-packet counter. */
|
/external/iptables/extensions/ |
libxt_CONNSECMARK.c | 25 " --save Copy security mark from packet to conntrack\n" 26 " --restore Copy security mark from connection to packet\n");
|
libxt_TCPMSS.man | 9 which block "ICMP Fragmentation Needed" or "ICMPv6 Packet Too Big" 28 Explicitly sets MSS option to specified value. If the MSS of the packet is
|
libxt_policy.man | 1 This modules matches the policy used by IPsec for handling a packet. 16 Matches if the packet is subject to IPsec processing. \fB\-\-pol none\fP
|
libxt_quota2.man | 2 on a per-match basis. Available modes are packet counting or byte counting. 17 counting a packet twice.
|
/external/libnfc-nci/halimpl/bcm2079x/hal/hal/ |
nfc_hal_nci.c | 46 ** response/notification packet, if required. 77 /* data packet reassembly is performed in NFC task */ 87 /* save octet0 and octet1 of an NCI header in layer_specific for the received packet */ 113 /* adjust the NCI packet length */ 141 /* still report the data packet, if the incoming packet is too big */ 155 /* clear the error flags, so the next NCI packet is clean */ 338 p_cb->rcv_state = NFC_HAL_RCV_IDLE_ST; /* Next, wait for packet type of next message */ 362 p_cb->rcv_state = NFC_HAL_RCV_IDLE_ST; /* Next, wait for packet type of next message */ 495 HAL_TRACE_ERROR1 ("Unknown packet type drop this byte 0x%x", byte) [all...] |
/external/libogg/doc/libogg/ |
ogg_page.html | 24 They are made up of packet segments of 255 bytes each. There can be as many as 25 255 packet segments per page, for a maximum page size of a little under 64 kB.
|
ogg_stream_pagein.html | 22 <p>Internally, this function breaks the page into packet segments in preparation for outputting a valid packet to the codec decoding layer.
|
/external/libpcap/ |
fad-null.c | 53 * packet capture. 61 * for packet capture.
|
sunatmpos.h | 35 /* SunATM header for ATM packet */ 39 #define SUNATM_PKT_BEGIN_POS 4 /* Start of ATM packet */
|
/external/libpcap/packaging/ |
pcap.spec | 4 Summary: packet capture library 15 Packet-capture library LIBPCAP 0.9.4
|
pcap.spec.in | 4 Summary: packet capture library 15 Packet-capture library LIBPCAP @VERSION@
|
/external/mdnsresponder/ |
PrivateDNS.txt | 32 the server. Every private packet must also have a TSIG record; 36 TCP's standard three-way handshake makes the full four-packet LLQ setup 61 information back to the caller. If the packet is allowed access, dnsextd 94 packet with the IP Address and port number of the setup packet. Because 117 All of this just to avoid sending two bytes in the LLQ setup packet 122 the LLQ setup packet to specify a different UDP port for change event 127 packet on interface 2, it will reply on interface 1 causing an error in
|
/external/openssh/ |
auth2-passwd.c | 34 #include "packet.h" 60 /* discard new password from packet */
|
/external/smack/src/org/jivesoftware/smack/sasl/ |
SASLMechanism.java | 25 import org.jivesoftware.smack.packet.Packet;
144 Packet responseStanza;
194 public class AuthMechanism extends Packet {
222 public static class Challenge extends Packet {
244 public class Response extends Packet {
274 public static class Success extends Packet {
296 public static class Failure extends Packet {
|
/external/smack/src/org/jivesoftware/smackx/bytestreams/ibb/ |
InBandBytestreamRequest.java | 18 import org.jivesoftware.smack.packet.IQ;
20 import org.jivesoftware.smackx.bytestreams.ibb.packet.Open;
|
/external/smack/src/org/jivesoftware/smackx/commands/ |
AdHocCommandManager.java | 26 import org.jivesoftware.smack.packet.IQ;
27 import org.jivesoftware.smack.packet.Packet;
28 import org.jivesoftware.smack.packet.PacketExtension;
29 import org.jivesoftware.smack.packet.XMPPError;
36 import org.jivesoftware.smackx.packet.AdHocCommandData;
37 import org.jivesoftware.smackx.packet.DiscoverInfo;
38 import org.jivesoftware.smackx.packet.DiscoverInfo.Identity;
39 import org.jivesoftware.smackx.packet.DiscoverItems;
258 * <li>Adds packet listeners to handle execution requests</li> [all...] |
/external/smack/src/org/jivesoftware/smackx/provider/ |
DiscoverItemsProvider.java | 23 import org.jivesoftware.smack.packet.IQ; 25 import org.jivesoftware.smackx.packet.*;
|
Completed in 600 milliseconds
<<31323334353637383940>>