Home | History | Annotate | Download | only in quic

Lines Matching defs:packet

298     // PADDING implies end of packet.
305 // Frame fits within packet. Note that acks may be truncated.
308 // Only truncate the first frame in a packet, so if subsequent ones go
314 // Truncate the frame so the packet will not exceed kMaxPacketSize.
322 LOG(DFATAL) << "Packet size too small to fit frame.";
447 QuicPacket* packet = QuicPacket::NewDataPacket(
454 packet->FecProtectedData());
458 header.public_header.sequence_number_length, packet,
494 const QuicPublicResetPacket& packet) {
495 DCHECK(packet.public_header.reset_flag);
499 reset.SetValue(kRNON, packet.nonce_proof);
500 reset.SetValue(kRSEQ, packet.rejected_sequence_number);
501 if (!packet.client_address.address().empty()) {
502 // packet.client_address is non-empty.
503 QuicSocketAddressCoder address_coder(packet.client_address);
522 if (!writer.WriteUInt64(packet.public_header.connection_id)) {
559 bool QuicFramer::ProcessPacket(const QuicEncryptedPacket& packet) {
561 reader_.reset(new QuicDataReader(packet.data(), packet.length()));
574 // The visitor suppresses further processing of the packet.
593 rv = ProcessDataPacket(public_header, packet);
603 // Try reading at least once to raise error if the packet is invalid.
619 const QuicEncryptedPacket& packet) {
621 if (!ProcessPacketHeader(&header, packet)) {
622 DLOG(WARNING) << "Unable to process data packet header.";
627 // The visitor suppresses further processing of the packet.
631 if (packet.length() > kMaxPacketSize) {
632 DLOG(WARNING) << "Packet too large: " << packet.length();
660 QuicPublicResetPacket packet(public_header);
673 if (reset->GetUint64(kRNON, &packet.nonce_proof) != QUIC_NO_ERROR) {
679 if (reset->GetUint64(kRSEQ, &packet.rejected_sequence_number) !=
689 packet.client_address = IPEndPoint(address_coder.ip(),
694 visitor_->OnPublicResetPacket(packet);
711 set_detailed_error("Revived packet too large.");
807 // protected packet, or 0 if this packet is not protected.
811 // Offset from the current packet sequence number to the first fec
812 // protected packet.
867 set_detailed_error("Got version flag in reset packet");
921 // Read the version only if the packet is from the client.
922 // version flag from the server means version negotiation packet.
930 // If the version from the new packet is the same as the version of this
1013 const QuicEncryptedPacket& packet) {
1021 set_detailed_error("Packet sequence numbers cannot be 0.");
1029 if (!DecryptPayload(*header, packet)) {
1052 set_detailed_error("Unable to read first fec protected packet offset.");
1056 set_detailed_error("First fec protected packet offset must be less "
1065 // Set the last sequence number after we have decrypted the packet
1089 set_detailed_error("Packet has no frames.");
1152 // We're done with the packet.
1379 set_detailed_error("Unable to read num missing packet ranges.");
1417 set_detailed_error("Unable to read revived packet.");
1500 QuicPacketSequenceNumber packet = smallest_received + sequence_delta;
1502 make_pair(packet, time_received.Add(
1706 const QuicPacket& packet) {
1710 packet_sequence_number, packet.AssociatedData(), packet.Plaintext()));
1715 StringPiece header_data = packet.BeforePlaintext();
1742 const QuicEncryptedPacket& packet) {
1751 packet,
1762 packet,