Home
last modified time | relevance | path

Searched refs:packets (Results 1 – 25 of 216) sorted by relevance

123456789

/external/speex/libspeex/
Djitter.c145 JitterBufferPacket packets[SPEEX_JITTER_MAX_BUFFER_SIZE]; /**< Packets stored in the buffer */ member
280 jitter->packets[i].data=NULL; in jitter_buffer_init()
302 if (jitter->packets[i].data) in jitter_buffer_reset()
305 jitter->destroy(jitter->packets[i].data); in jitter_buffer_reset()
307 speex_free(jitter->packets[i].data); in jitter_buffer_reset()
308 jitter->packets[i].data = NULL; in jitter_buffer_reset()
380 …if (jitter->packets[i].data && LE32(jitter->packets[i].timestamp + jitter->packets[i].span, jitter… in jitter_buffer_put()
384 jitter->destroy(jitter->packets[i].data); in jitter_buffer_put()
386 speex_free(jitter->packets[i].data); in jitter_buffer_put()
387 jitter->packets[i].data = NULL; in jitter_buffer_put()
[all …]
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/auth/
DAuthenticationManager.java14 import ch.ethz.ssh2.packets.PacketServiceAccept;
15 import ch.ethz.ssh2.packets.PacketServiceRequest;
16 import ch.ethz.ssh2.packets.PacketUserauthBanner;
17 import ch.ethz.ssh2.packets.PacketUserauthFailure;
18 import ch.ethz.ssh2.packets.PacketUserauthInfoRequest;
19 import ch.ethz.ssh2.packets.PacketUserauthInfoResponse;
20 import ch.ethz.ssh2.packets.PacketUserauthRequestInteractive;
21 import ch.ethz.ssh2.packets.PacketUserauthRequestNone;
22 import ch.ethz.ssh2.packets.PacketUserauthRequestPassword;
23 import ch.ethz.ssh2.packets.PacketUserauthRequestPublicKey;
[all …]
/external/eigen/test/eigen2/
Deigen2_packetmath.cpp51 EIGEN_ALIGN_128 Packet packets[PacketSize*2]; in packetmath() local
76 packets[0] = ei_pload(data1); in packetmath()
77 packets[1] = ei_pload(data1+PacketSize); in packetmath()
78 if (offset==0) ei_palign<0>(packets[0], packets[1]); in packetmath()
79 else if (offset==1) ei_palign<1>(packets[0], packets[1]); in packetmath()
80 else if (offset==2) ei_palign<2>(packets[0], packets[1]); in packetmath()
81 else if (offset==3) ei_palign<3>(packets[0], packets[1]); in packetmath()
82 ei_pstore(data2, packets[0]); in packetmath()
118 packets[j] = ei_pload(data1+j*PacketSize); in packetmath()
120 ei_pstore(data2, ei_preduxp(packets)); in packetmath()
/external/smack/src/org/jivesoftware/smackx/workgroup/packet/
DTranscript.java39 private List<Packet> packets; field in Transcript
48 this.packets = new ArrayList<Packet>(); in Transcript()
58 public Transcript(String sessionID, List<Packet> packets) { in Transcript() argument
60 this.packets = packets; in Transcript()
79 return Collections.unmodifiableList(packets); in getPackets()
89 for (Iterator<Packet> it=packets.iterator(); it.hasNext();) { in getChildElementXML()
DTranscriptProvider.java44 List<Packet> packets = new ArrayList<Packet>(); in parseIQ() local
51 packets.add(PacketParserUtils.parseMessage(parser)); in parseIQ()
54 packets.add(PacketParserUtils.parsePresence(parser)); in parseIQ()
64 return new Transcript(sessionID, packets); in parseIQ()
/external/iptables/extensions/
Dlibxt_connbytes.man1 Match by how many bytes or packets a connection (or one of the two
20 match packets from a connection whose packets/bytes/average packet
21 size is more than FROM and less than TO bytes/packets. if TO is
22 omitted only FROM check is done. "!" is used to match packets not
26 which packets to consider
29 whether to check the amount of packets, number of bytes transferred or
30 the average size (in bytes) of all packets received so far. Note that
33 be about half of the actual data packets.
Dlibxt_NFLOG.man1 This target provides logging of matching packets. When this target is
8 may subscribe to the group to receive the packets. Like LOG, this is a
12 The netlink group (1 \- 2^32\-1) to which packets are (only applicable for
25 Number of packets to queue inside the kernel before sending them
28 packets reach userspace. The default value is 1.
Dlibxt_helper.man1 This module matches packets related to a specific conntrack-helper.
4 Matches packets related to the specified conntrack-helper.
7 string can be "ftp" for packets related to a ftp-session on default port.
Dlibxt_TCPMSS.man1 This target allows to alter the MSS value of TCP SYN packets, to control
10 packets. The symptoms of this
13 packets:
36 packets from itself to the source and destination IP addresses. Prior to
Dlibipt_ULOG.man1 This target provides userspace logging of matching packets. When this
6 multicast groups and receive the packets.
24 accumulates ten packets inside the kernel and transmits them as one
Dlibxt_hashlimit.man4 and/or per-port. It gives you the ability to express "\fIN\fP packets per time
18 Maximum initial number of packets to match: this number gets recharged by one
55 "1000 packets per second for every host in 192.168.0.0/16" =>
59 "100 packets per second for every service of 192.168.1.1" =>
63 "10000 packets per minute for every /28 subnet (groups of 8 addresses)
Dlibxt_tcp.man30 will only match packets with the SYN flag set, and the ACK, FIN and
34 Only match TCP packets with the SYN bit set and the ACK,RST and FIN bits
35 cleared. Such packets are used to request TCP connection initiation;
36 for example, blocking such packets coming in an interface will prevent
Dlibip6t_LOG.man1 Turn on kernel logging of matching packets. When this option is set
3 matching packets (like most IPv6 IPv6-header fields) via the kernel log
9 the next rule. So if you want to LOG the packets you refuse, use two
Dlibipt_LOG.man1 Turn on kernel logging of matching packets. When this option is set
3 matching packets (like most IP header fields) via the kernel log
9 the next rule. So if you want to LOG the packets you refuse, use two
Dlibxt_conntrack.man39 Match packets that are flowing in the specified direction. If this flag is not
40 specified at all, matches packets in both directions.
49 with a connection which has not seen packets in both directions, and
52 meaning that the packet is associated with a connection which has seen packets
80 Conntrack has seen packets in both directions.
/external/iproute2/doc/actions/
Dmirred-usage4 mirror and redirect packets. The main difference with say a vannila
42 without affecting other packets not interested in this feature
52 device. Instead of redirecting it puts packets at the exact spot
55 packets will all be dropped (this is much simpler to detect
65 1) Mirror all packets arriving on eth0 to be sent out on eth1.
79 # redirect all packets arriving on ingress of lo to eth0
90 Ping would fail since all packets are heading out eth0
97 Then you should see the packets on both host A and the local
103 #allow 1 out 10 packets on ingress of lo to randomly make it to the
114 # for packets from 10.0.0.9 going out on eth0 (could be local
[all …]
Difb-README31 selectively either query/create contrack state on incoming packets.
33 on incoming packets; if we find they are of known state we could send to
57 # redirect all IP packets arriving in eth0 to ifb0
69 from another machine ping so that you have packets going into the box:
78 3 packets transmitted, 3 packets received, 0% packet loss
115 RX packets:6 errors:0 dropped:3 overruns:0 frame:0
116 TX packets:3 errors:0 dropped:0 overruns:0 carrier:0
122 [In this case the three dropped packets were ipv6 ndisc].
/external/qemu/
Dshaper.c99 QueuedPacket packets; /* list of queued packets, ordered by expiration date */ member
119 while (shaper->packets) { in netshaper_destroy()
120 QueuedPacket packet = shaper->packets; in netshaper_destroy()
121 shaper->packets = packet->next; in netshaper_destroy()
139 while ((packet = shaper->packets) != NULL) { in netshaper_expires()
145 shaper->packets = packet->next; in netshaper_expires()
152 if (shaper->packets) { in netshaper_expires()
153 shaper->block_until = shaper->packets->expiration; in netshaper_expires()
168 shaper->packets = NULL; in netshaper_create()
187 while (shaper->packets) { in netshaper_set_rate()
[all …]
/external/libpcap/
DREADME.linux1 In order for libpcap to be able to capture packets on a Linux system,
48 executed in the kernel, so that packets that don't pass the filter won't
49 be copied from the kernel to the program, rather than having all packets
52 Copying packets from the kernel to the program consumes a significant
54 capturing packets if a filter has been specified that discards a
55 significant number of packets. (If no filter is specified, it makes no
79 ps_recv Number of packets that were accepted by the pcap filter
84 ps_rec Number of packets that were accepted by the pcap filter
85 ps_drops Number of packets that had passed filtering but were not
87 This is useful because these are packets you are interested in
/external/eigen/test/
Dpacketmath.cpp109 EIGEN_ALIGN16 Packet packets[PacketSize*2]; in packetmath() local
136 packets[0] = internal::pload<Packet>(data1); in packetmath()
137 packets[1] = internal::pload<Packet>(data1+PacketSize); in packetmath()
138 if (offset==0) internal::palign<0>(packets[0], packets[1]); in packetmath()
139 else if (offset==1) internal::palign<1>(packets[0], packets[1]); in packetmath()
140 else if (offset==2) internal::palign<2>(packets[0], packets[1]); in packetmath()
141 else if (offset==3) internal::palign<3>(packets[0], packets[1]); in packetmath()
142 internal::pstore(data2, packets[0]); in packetmath()
197 packets[j] = internal::pload<Packet>(data1+j*PacketSize); in packetmath()
199 internal::pstore(data2, internal::preduxp(packets)); in packetmath()
/external/libogg/src/
Dframing.c1462 int i,j,packets,pageout=pageskip; in test_pack() local
1472 for(packets=0;packets<packetskip;packets++) in test_pack()
1473 depacket+=pl[packets]; in test_pack()
1475 for(packets=0;;packets++)if(pl[packets]==-1)break; in test_pack()
1477 for(i=0;i<packets;i++){ in test_pack()
1644 const int packets[]={17, -1}; in main() local
1648 test_pack(packets,headret,0,0,0); in main()
1653 const int packets[]={17, 254, 255, 256, 500, 510, 600, -1}; in main() local
1657 test_pack(packets,headret,0,0,0); in main()
1662 const int packets[]={0,17, 254, 255, 0, 256, 0, 500, 510, 600, 0, -1}; in main() local
[all …]
/external/iproute2/doc/
Dip-tunnels.tex90 packets to another endpoint is not hidden. If you dislike this, or if you
91 are going to use some routing protocol expecting that packets
110 to receive tunneled packets.
177 packets. It must be an address on another interface of this host.
190 have some not wildcard \verb|remote| address and deliver all the packets
212 you have to explain to driver, where it should deliver packets to.
227 will route \verb|3FFE::/16| via \verb|sit0|, sending all the packets
235 \item \verb|ttl N| --- set fixed TTL \verb|N| on tunneled packets.
237 meaning that packets inherit TTL value.
240 \item \verb|tos T| --- set fixed tos \verb|T| on tunneled packets.
[all …]
/external/quake/quake/src/QW/server/
Dnewnet.txt7 problem with reconnect to same server out of order packets
13 seperate accept/reject list for server packets and client packets
78 execute all unaknowledged movement packets
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/transport/
DKexManager.java21 import ch.ethz.ssh2.packets.PacketKexDHInit;
22 import ch.ethz.ssh2.packets.PacketKexDHReply;
23 import ch.ethz.ssh2.packets.PacketKexDhGexGroup;
24 import ch.ethz.ssh2.packets.PacketKexDhGexInit;
25 import ch.ethz.ssh2.packets.PacketKexDhGexReply;
26 import ch.ethz.ssh2.packets.PacketKexDhGexRequest;
27 import ch.ethz.ssh2.packets.PacketKexDhGexRequestOld;
28 import ch.ethz.ssh2.packets.PacketKexInit;
29 import ch.ethz.ssh2.packets.PacketNewKeys;
30 import ch.ethz.ssh2.packets.Packets;
/external/iproute2/include/linux/
Dgen_stats.h23 __u32 packets; member
27 __u32 packets; member

123456789