/external/speex/libspeex/ |
D | jitter.c | 145 JitterBufferPacket packets[SPEEX_JITTER_MAX_BUFFER_SIZE]; /**< Packets stored in the buffer */ member 280 jitter->packets[i].data=NULL; in jitter_buffer_init() 302 if (jitter->packets[i].data) in jitter_buffer_reset() 305 jitter->destroy(jitter->packets[i].data); in jitter_buffer_reset() 307 speex_free(jitter->packets[i].data); in jitter_buffer_reset() 308 jitter->packets[i].data = NULL; in jitter_buffer_reset() 380 …if (jitter->packets[i].data && LE32(jitter->packets[i].timestamp + jitter->packets[i].span, jitter… in jitter_buffer_put() 384 jitter->destroy(jitter->packets[i].data); in jitter_buffer_put() 386 speex_free(jitter->packets[i].data); in jitter_buffer_put() 387 jitter->packets[i].data = NULL; in jitter_buffer_put() [all …]
|
/external/iptables/extensions/ |
D | libipt_connbytes.man | 1 Match by how many bytes or packets a connection (or one of the two 14 match packets from a connection whose packets/bytes/average packet 15 size is more than FROM and less than TO bytes/packets. if TO is 16 omitted only FROM check is done. "!" is used to match packets not 20 which packets to consider 23 whether to check the amount of packets, number of bytes transferred or 24 the average size (in bytes) of all packets received so far. Note that 27 be about half of the actual data packets.
|
D | libipt_helper.man | 1 This module matches packets related to a specific conntrack-helper. 4 Matches packets related to the specified conntrack-helper. 7 string can be "ftp" for packets related to a ftp-session on default port.
|
D | libip6t_tcp.man | 31 will only match packets with the SYN flag set, and the ACK, FIN and 35 Only match TCP packets with the SYN bit set and the ACK and RST bits 36 cleared. Such packets are used to request TCP connection initiation; 37 for example, blocking such packets coming in an interface will prevent
|
D | libipt_tcp.man | 31 will only match packets with the SYN flag set, and the ACK, FIN and 35 Only match TCP packets with the SYN bit set and the ACK,RST and FIN bits 36 cleared. Such packets are used to request TCP connection initiation; 37 for example, blocking such packets coming in an interface will prevent
|
D | libipt_ULOG.man | 1 This target provides userspace logging of matching packets. When this 6 multicast groups and receive the packets. 24 accumulates ten packets inside the kernel and transmits them as one
|
D | libipt_TCPMSS.man | 1 This target allows to alter the MSS value of TCP SYN packets, to control 11 which block ICMP Fragmentation Needed packets. The symptoms of this 14 packets:
|
D | libip6t_LOG.man | 1 Turn on kernel logging of matching packets. When this option is set 3 matching packets (like most IPv6 IPv6-header fields) via the kernel log 9 the next rule. So if you want to LOG the packets you refuse, use two
|
D | libipt_LOG.man | 1 Turn on kernel logging of matching packets. When this option is set 3 matching packets (like most IP header fields) via the kernel log 9 the next rule. So if you want to LOG the packets you refuse, use two
|
D | libip6t_TCPMSS.man | 1 This target allows to alter the MSS value of TCP SYN packets, to control 11 which block ICMPv6 Packet Too Big packets or are unable to send them. 14 packets:
|
D | libipt_CONNSECMARK.man | 1 This module copies security markings from packets to connections 2 (if unlabeled), and from connections back to packets (also only
|
D | libip6t_CONNSECMARK.man | 1 This module copies security markings from packets to connections 2 (if unlabeled), and from connections back to packets (also only
|
D | libip6t_owner.man | 2 creator, for locally-generated packets. It is only valid in the 4 chain, and even this some packets (such as ICMPv6 ping responses) may
|
D | libipt_state.man | 13 packets in both directions, 16 associated with a connection which has not seen packets in both
|
/external/iproute2/doc/actions/ |
D | mirred-usage | 4 mirror and redirect packets. The main difference with say a vannila 42 without affecting other packets not interested in this feature 52 device. Instead of redirecting it puts packets at the exact spot 55 packets will all be dropped (this is much simpler to detect 65 1) Mirror all packets arriving on eth0 to be sent out on eth1. 79 # redirect all packets arriving on ingress of lo to eth0 90 Ping would fail since all packets are heading out eth0 97 Then you should see the packets on both host A and the local 103 #allow 1 out 10 packets on ingress of lo to randomly make it to the 114 # for packets from 10.0.0.9 going out on eth0 (could be local [all …]
|
D | ifb-README | 31 selectively either query/create contrack state on incoming packets. 33 on incoming packets; if we find they are of known state we could send to 57 # redirect all IP packets arriving in eth0 to ifb0 69 from another machine ping so that you have packets going into the box: 78 3 packets transmitted, 3 packets received, 0% packet loss 115 RX packets:6 errors:0 dropped:3 overruns:0 frame:0 116 TX packets:3 errors:0 dropped:0 overruns:0 carrier:0 122 [In this case the three dropped packets were ipv6 ndisc].
|
/external/qemu/ |
D | shaper.c | 99 QueuedPacket packets; /* list of queued packets, ordered by expiration date */ member 119 while (shaper->packets) { in netshaper_destroy() 120 QueuedPacket packet = shaper->packets; in netshaper_destroy() 121 shaper->packets = packet->next; in netshaper_destroy() 139 while ((packet = shaper->packets) != NULL) { in netshaper_expires() 145 shaper->packets = packet->next; in netshaper_expires() 152 if (shaper->packets) { in netshaper_expires() 153 shaper->block_until = shaper->packets->expiration; in netshaper_expires() 168 shaper->packets = NULL; in netshaper_create() 187 while (shaper->packets) { in netshaper_set_rate() [all …]
|
/external/libpcap/ |
D | README.linux | 1 In order for libpcap to be able to capture packets on a Linux system, 48 executed in the kernel, so that packets that don't pass the filter won't 49 be copied from the kernel to the program, rather than having all packets 52 Copying packets from the kernel to the program consumes a significant 54 capturing packets if a filter has been specified that discards a 55 significant number of packets. (If no filter is specified, it makes no 79 ps_recv Number of packets that were accepted by the pcap filter 84 ps_rec Number of packets that were accepted by the pcap filter 85 ps_drops Number of packets that had passed filtering but were not 87 This is useful because these are packets you are interested in
|
/external/bluetooth/bluez/compat/ |
D | fakehid.txt | 16 <3-slot packets> <5-slot packets> <encryption> <slot offset> 18 <park state> <RSSI> <channel quality> <SCO link> <HV2 packets> 19 <HV3 packets> <u-law log> <A-law log> <CVSD> <paging scheme> 98 <3-slot packets> <5-slot packets> <encryption> <slot offset> 100 <park state> <RSSI> <channel quality> <SCO link> <HV2 packets> 101 <HV3 packets> <u-law log> <A-law log> <CVSD> <paging scheme>
|
/external/iproute2/doc/ |
D | ip-tunnels.tex | 90 packets to another endpoint is not hidden. If you dislike this, or if you 91 are going to use some routing protocol expecting that packets 110 to receive tunneled packets. 177 packets. It must be an address on another interface of this host. 190 have some not wildcard \verb|remote| address and deliver all the packets 212 you have to explain to driver, where it should deliver packets to. 227 will route \verb|3FFE::/16| via \verb|sit0|, sending all the packets 235 \item \verb|ttl N| --- set fixed TTL \verb|N| on tunneled packets. 237 meaning that packets inherit TTL value. 240 \item \verb|tos T| --- set fixed tos \verb|T| on tunneled packets. [all …]
|
D | ip-cref.tex | 378 i.e.\ packets send through it are encapsulated and sent via the ``master'' 387 mode i.e.\ all packets sent to it are immediately discarded. 389 in packets. 395 packets for transmission and it may inject into the kernel packets received 399 hosts. All packets sent through it will be returned 400 and nothing but bounced packets can be received. 402 \item \verb|BROADCAST| --- the device has the facility to send packets 406 attached to each end. All packets sent to this link will reach the peer 407 and all packets received by us came from this single peer. 416 is aware of multicasting i.e.\ sending packets to some subset of neighbouring [all …]
|
/external/quake/quake/src/QW/server/ |
D | newnet.txt | 7 problem with reconnect to same server out of order packets 13 seperate accept/reject list for server packets and client packets 78 execute all unaknowledged movement packets
|
/external/tcpdump/ |
D | CHANGES | 116 Support for sending packets 159 fixes for print-aodv.c - check for too short packets 161 check for too short packets: print-bgp.c, print-bootp.c, print-cdp.c, 179 Added a count of packets received and processed to clarify numbers. 209 Fixed infinite loop when parsing malformed isakmp packets. 211 Fixed infinite loop when parsing malformed BGP packets. 212 Fixed buffer overflow with certain malformed NFS packets. 214 Handle truncated nbp (appletalk) packets. 249 Added a "netbeui" keyword, which selects NetBEUI packets. 346 SNMP packets. [all …]
|
/external/iproute2/include/linux/ |
D | gen_stats.h | 24 __u32 packets; member 29 __u32 packets; member
|
/external/iproute2/examples/diffserv/ |
D | regression-testing | 40 Marking: the should be a variation of marked packets: 72 TODO: Testing on how each color shares when all 4 types of packets 89 Marking: the should be a variation of marked packets: 124 TODO: Testing on how each color shares when all 4 types of packets
|