Home | History | Annotate | Download | only in quic

Lines Matching defs:packet

53 // Default and initial maximum size in bytes of a QUIC packet.
55 // The maximum packet size of any QUIC packet, based on ethernet's max size,
58 // max packet size is 1500 bytes, 1500 - 48 = 1452.
60 // Default maximum packet size used in Linux TCP implementations.
80 // Number of bytes reserved for public flags in the packet header.
82 // Number of bytes reserved for version number in the packet header.
84 // Number of bytes reserved for private flags in the packet header.
86 // Number of bytes reserved for FEC group in the packet header.
92 // Index of the first byte in a QUIC packet which is used in hash calculation.
221 // Bit 0: Does the packet header contains version info?
224 // Bit 1: Is this packet a public reset packet?
237 // Bits 4 and 5 describe the packet sequence number length as follows:
255 // Bit 0: Does this packet contain an entropy bit?
338 // Size in bytes of the data or fec packet header.
347 // Index of the first byte in a QUIC packet of FEC protected data.
352 // Index of the first byte in a QUIC packet of encrypted data.
402 // The packet contained no payload.
426 // Version negotiation packet is malformed.
428 // Public RST packet is malformed.
434 // The packet exceeded kMaxPacketSize.
581 // Server-side this implies we've sent a version negotiation packet and are
583 // implies we've gotten a version negotiation packet, are retransmitting the
585 // packet from the server.
587 // This indicates this endpoint has received a packet from the peer with a
624 // If this is set, then when this packet is ACKed the AckNotifier will be
646 // The highest packet sequence number we've observed from the peer.
648 // In general, this should be the largest packet number we've received. In
651 // don't fit in the missing packet list due to size limitations. In this
652 // case, largest_observed may be a packet which is also in the missing packets
694 // packet.
696 // The lowest packet we've sent which is unacked, and we expect an ack for.
775 // that stream. This can be done through normal termination (data packet with
842 // progresses through. When retransmitting a packet, the encryption level needs
892 // FEC protected packet. The last protected packet's sequence number will
893 // be one less than the sequence number of the FEC packet.
975 // Clones the packet into a new packet which owns the buffer.
1021 QuicPacket* packet,
1028 QuicPacket* packet;
1032 // If set, these will be called when this packet is ACKed by the peer.
1056 // Zero when the packet is serialized, non-zero once it's sent.
1058 // Zero when the packet is serialized, non-zero once it's sent.
1061 // Reason why this packet was transmitted.
1063 // Stores the sequence numbers of all transmissions of this packet.