Searched refs:seq_num (Results 1 – 12 of 12) sorted by relevance
/external/wpa_supplicant_8/src/ap/ |
D | iapp.c | 83 be16 seq_num; member 104 u16 seq_num; member 115 u16 seq_num; member 132 u16 seq_num; member 145 u16 seq_num; member 178 static void iapp_send_add(struct iapp_data *iapp, u8 *mac_addr, u16 seq_num) in iapp_send_add() argument 199 add->seq_num = host_to_be16(seq_num); in iapp_send_add() 290 be_to_host16(add->seq_num), in iapp_process_add_notify()
|
/external/srtp/srtp/ |
D | srtp.c | 1457 uint32_t seq_num; in srtp_protect_rtcp() local 1549 seq_num = rdb_get_value(&stream->rtcp_rdb); in srtp_protect_rtcp() 1550 *trailer |= htonl(seq_num); in srtp_protect_rtcp() 1551 debug_print(mod_srtp, "srtcp index: %x", seq_num); in srtp_protect_rtcp() 1561 iv.v32[2] = htonl(seq_num >> 16); in srtp_protect_rtcp() 1562 iv.v32[3] = htonl(seq_num << 16); in srtp_protect_rtcp() 1572 iv.v32[3] = htonl(seq_num); in srtp_protect_rtcp() 1643 uint32_t seq_num; in srtp_unprotect_rtcp() local 1744 seq_num = ntohl(*trailer) & SRTCP_INDEX_MASK; in srtp_unprotect_rtcp() 1745 debug_print(mod_srtp, "srtcp index: %x", seq_num); in srtp_unprotect_rtcp() [all …]
|
/external/bluetooth/bluedroid/btif/include/ |
D | btif_media.h | 189 extern void btif_media_aa_writebuf(BT_HDR *pBuf, UINT32 timestamp, UINT16 seq_num); 201 UINT32 timestamp, UINT16 seq_num);
|
/external/openssl/ssl/ |
D | d1_pkt.c | 317 s->s3->rrec.seq_num); in dtls1_process_buffered_records() 704 dtls1_buffer_record(s, &(s->d1->unprocessed_rcds), rr->seq_num); in dtls1_get_record() 862 dtls1_buffer_record(s, &(s->d1->buffered_app_data), rr->seq_num); in dtls1_read_bytes() 1694 memcpy (s->s3->rrec.seq_num,seq,8); in dtls1_record_replay_check() 1703 memcpy (s->s3->rrec.seq_num,seq,8); in dtls1_record_replay_check() 1840 unsigned short seq_num; 1847 seq_num = msg_hdr.seq; 1853 seq_num = ccs_hdr.seq; 1860 if ( seq_num < s->d1->handshake_read_seq) 1863 seq_num == s->d1->handshake_read_seq && [all …]
|
D | d1_both.c | 167 unsigned long len, unsigned short seq_num, unsigned long frag_off, 1211 fprintf( stderr, "\t\t\t\t\tseq_num = %d\n", msg_buf->seq_num); in dtls1_buffer_message() 1346 unsigned long len, unsigned short seq_num, unsigned long frag_off, in dtls1_set_message_header_int() argument 1353 msg_hdr->seq = seq_num; in dtls1_set_message_header_int()
|
D | ssl3.h | 367 /*r */ unsigned char seq_num[8]; /* sequence number, needed by DTLS1 */ member
|
D | s3_lib.c | 2946 memset(s3->rrec.seq_num,0,sizeof(s3->rrec.seq_num)); in ssl3_new() 2947 memset(s3->wrec.seq_num,0,sizeof(s3->wrec.seq_num)); in ssl3_new()
|
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
D | rtpdump.cc | 66 bool RtpDumpPacket::GetRtpSeqNum(uint16* seq_num) const { in GetRtpSeqNum() 67 if (!seq_num || !IsValidRtpPacket()) { in GetRtpSeqNum() 70 *seq_num = talk_base::GetBE16(&data[2]); in GetRtpSeqNum()
|
D | rtpdump.h | 77 bool GetRtpSeqNum(uint16* seq_num) const;
|
/external/srtp/googlepatches/ |
D | google-7-srtp-security-fix.patch | 46 uint32_t seq_num;
|
/external/openssl/include/openssl/ |
D | ssl3.h | 367 /*r */ unsigned char seq_num[8]; /* sequence number, needed by DTLS1 */ member
|
/external/bluetooth/bluedroid/stack/include/ |
D | avdt_api.h | 376 UINT32 time_stamp, UINT16 seq_num, UINT8 m_pt, UINT8 marker);
|