Home
last modified time | relevance | path

Searched refs:packets (Results 1 – 25 of 114) sorted by relevance

12345

/external/speex/libspeex/
Djitter.c145 JitterBufferPacket packets[SPEEX_JITTER_MAX_BUFFER_SIZE]; /**< Packets stored in the buffer */ member
280 jitter->packets[i].data=NULL; in jitter_buffer_init()
302 if (jitter->packets[i].data) in jitter_buffer_reset()
305 jitter->destroy(jitter->packets[i].data); in jitter_buffer_reset()
307 speex_free(jitter->packets[i].data); in jitter_buffer_reset()
308 jitter->packets[i].data = NULL; in jitter_buffer_reset()
380 …if (jitter->packets[i].data && LE32(jitter->packets[i].timestamp + jitter->packets[i].span, jitter… in jitter_buffer_put()
384 jitter->destroy(jitter->packets[i].data); in jitter_buffer_put()
386 speex_free(jitter->packets[i].data); in jitter_buffer_put()
387 jitter->packets[i].data = NULL; in jitter_buffer_put()
[all …]
/external/iptables/extensions/
Dlibipt_connbytes.man1 Match by how many bytes or packets a connection (or one of the two
14 match packets from a connection whose packets/bytes/average packet
15 size is more than FROM and less than TO bytes/packets. if TO is
16 omitted only FROM check is done. "!" is used to match packets not
20 which packets to consider
23 whether to check the amount of packets, number of bytes transferred or
24 the average size (in bytes) of all packets received so far. Note that
27 be about half of the actual data packets.
Dlibipt_helper.man1 This module matches packets related to a specific conntrack-helper.
4 Matches packets related to the specified conntrack-helper.
7 string can be "ftp" for packets related to a ftp-session on default port.
Dlibip6t_tcp.man31 will only match packets with the SYN flag set, and the ACK, FIN and
35 Only match TCP packets with the SYN bit set and the ACK and RST bits
36 cleared. Such packets are used to request TCP connection initiation;
37 for example, blocking such packets coming in an interface will prevent
Dlibipt_tcp.man31 will only match packets with the SYN flag set, and the ACK, FIN and
35 Only match TCP packets with the SYN bit set and the ACK,RST and FIN bits
36 cleared. Such packets are used to request TCP connection initiation;
37 for example, blocking such packets coming in an interface will prevent
Dlibipt_ULOG.man1 This target provides userspace logging of matching packets. When this
6 multicast groups and receive the packets.
24 accumulates ten packets inside the kernel and transmits them as one
Dlibipt_TCPMSS.man1 This target allows to alter the MSS value of TCP SYN packets, to control
11 which block ICMP Fragmentation Needed packets. The symptoms of this
14 packets:
Dlibip6t_LOG.man1 Turn on kernel logging of matching packets. When this option is set
3 matching packets (like most IPv6 IPv6-header fields) via the kernel log
9 the next rule. So if you want to LOG the packets you refuse, use two
Dlibipt_LOG.man1 Turn on kernel logging of matching packets. When this option is set
3 matching packets (like most IP header fields) via the kernel log
9 the next rule. So if you want to LOG the packets you refuse, use two
Dlibip6t_TCPMSS.man1 This target allows to alter the MSS value of TCP SYN packets, to control
11 which block ICMPv6 Packet Too Big packets or are unable to send them.
14 packets:
Dlibipt_CONNSECMARK.man1 This module copies security markings from packets to connections
2 (if unlabeled), and from connections back to packets (also only
Dlibip6t_CONNSECMARK.man1 This module copies security markings from packets to connections
2 (if unlabeled), and from connections back to packets (also only
Dlibip6t_owner.man2 creator, for locally-generated packets. It is only valid in the
4 chain, and even this some packets (such as ICMPv6 ping responses) may
Dlibipt_state.man13 packets in both directions,
16 associated with a connection which has not seen packets in both
/external/iproute2/doc/actions/
Dmirred-usage4 mirror and redirect packets. The main difference with say a vannila
42 without affecting other packets not interested in this feature
52 device. Instead of redirecting it puts packets at the exact spot
55 packets will all be dropped (this is much simpler to detect
65 1) Mirror all packets arriving on eth0 to be sent out on eth1.
79 # redirect all packets arriving on ingress of lo to eth0
90 Ping would fail since all packets are heading out eth0
97 Then you should see the packets on both host A and the local
103 #allow 1 out 10 packets on ingress of lo to randomly make it to the
114 # for packets from 10.0.0.9 going out on eth0 (could be local
[all …]
Difb-README31 selectively either query/create contrack state on incoming packets.
33 on incoming packets; if we find they are of known state we could send to
57 # redirect all IP packets arriving in eth0 to ifb0
69 from another machine ping so that you have packets going into the box:
78 3 packets transmitted, 3 packets received, 0% packet loss
115 RX packets:6 errors:0 dropped:3 overruns:0 frame:0
116 TX packets:3 errors:0 dropped:0 overruns:0 carrier:0
122 [In this case the three dropped packets were ipv6 ndisc].
/external/qemu/
Dshaper.c99 QueuedPacket packets; /* list of queued packets, ordered by expiration date */ member
119 while (shaper->packets) { in netshaper_destroy()
120 QueuedPacket packet = shaper->packets; in netshaper_destroy()
121 shaper->packets = packet->next; in netshaper_destroy()
139 while ((packet = shaper->packets) != NULL) { in netshaper_expires()
145 shaper->packets = packet->next; in netshaper_expires()
152 if (shaper->packets) { in netshaper_expires()
153 shaper->block_until = shaper->packets->expiration; in netshaper_expires()
168 shaper->packets = NULL; in netshaper_create()
187 while (shaper->packets) { in netshaper_set_rate()
[all …]
/external/libpcap/
DREADME.linux1 In order for libpcap to be able to capture packets on a Linux system,
48 executed in the kernel, so that packets that don't pass the filter won't
49 be copied from the kernel to the program, rather than having all packets
52 Copying packets from the kernel to the program consumes a significant
54 capturing packets if a filter has been specified that discards a
55 significant number of packets. (If no filter is specified, it makes no
79 ps_recv Number of packets that were accepted by the pcap filter
84 ps_rec Number of packets that were accepted by the pcap filter
85 ps_drops Number of packets that had passed filtering but were not
87 This is useful because these are packets you are interested in
/external/bluetooth/bluez/compat/
Dfakehid.txt16 <3-slot packets> <5-slot packets> <encryption> <slot offset>
18 <park state> <RSSI> <channel quality> <SCO link> <HV2 packets>
19 <HV3 packets> <u-law log> <A-law log> <CVSD> <paging scheme>
98 <3-slot packets> <5-slot packets> <encryption> <slot offset>
100 <park state> <RSSI> <channel quality> <SCO link> <HV2 packets>
101 <HV3 packets> <u-law log> <A-law log> <CVSD> <paging scheme>
/external/iproute2/doc/
Dip-tunnels.tex90 packets to another endpoint is not hidden. If you dislike this, or if you
91 are going to use some routing protocol expecting that packets
110 to receive tunneled packets.
177 packets. It must be an address on another interface of this host.
190 have some not wildcard \verb|remote| address and deliver all the packets
212 you have to explain to driver, where it should deliver packets to.
227 will route \verb|3FFE::/16| via \verb|sit0|, sending all the packets
235 \item \verb|ttl N| --- set fixed TTL \verb|N| on tunneled packets.
237 meaning that packets inherit TTL value.
240 \item \verb|tos T| --- set fixed tos \verb|T| on tunneled packets.
[all …]
Dip-cref.tex378 i.e.\ packets send through it are encapsulated and sent via the ``master''
387 mode i.e.\ all packets sent to it are immediately discarded.
389 in packets.
395 packets for transmission and it may inject into the kernel packets received
399 hosts. All packets sent through it will be returned
400 and nothing but bounced packets can be received.
402 \item \verb|BROADCAST| --- the device has the facility to send packets
406 attached to each end. All packets sent to this link will reach the peer
407 and all packets received by us came from this single peer.
416 is aware of multicasting i.e.\ sending packets to some subset of neighbouring
[all …]
/external/quake/quake/src/QW/server/
Dnewnet.txt7 problem with reconnect to same server out of order packets
13 seperate accept/reject list for server packets and client packets
78 execute all unaknowledged movement packets
/external/tcpdump/
DCHANGES116 Support for sending packets
159 fixes for print-aodv.c - check for too short packets
161 check for too short packets: print-bgp.c, print-bootp.c, print-cdp.c,
179 Added a count of packets received and processed to clarify numbers.
209 Fixed infinite loop when parsing malformed isakmp packets.
211 Fixed infinite loop when parsing malformed BGP packets.
212 Fixed buffer overflow with certain malformed NFS packets.
214 Handle truncated nbp (appletalk) packets.
249 Added a "netbeui" keyword, which selects NetBEUI packets.
346 SNMP packets.
[all …]
/external/iproute2/include/linux/
Dgen_stats.h24 __u32 packets; member
29 __u32 packets; member
/external/iproute2/examples/diffserv/
Dregression-testing40 Marking: the should be a variation of marked packets:
72 TODO: Testing on how each color shares when all 4 types of packets
89 Marking: the should be a variation of marked packets:
124 TODO: Testing on how each color shares when all 4 types of packets

12345