| /netbsd-src/usr.sbin/altq/altqstat/ |
| H A D | qdisc_jobs.c | 126 (sp->rout.packets == 0)? in jobs_stat_loop() 127 -1.:(double)sp->avgdel/(double)sp->rout.packets, in jobs_stat_loop() 128 (i > 0)?((sp->rout.packets > 0 && (&new[i-1])->rout.packets > 0)? in jobs_stat_loop() 129 …(double)(sp->avgdel*(&new[i-1])->rout.packets)/((double)sp->rout.packets*(&new[i-1])->avgdel):0):-… in jobs_stat_loop() 130 (sp->arrival.packets == 0)? in jobs_stat_loop() 131 0:(double)100.*sp->adc_violations/(double)sp->arrival.packets, in jobs_stat_loop()
|
| H A D | qdisc_cdnr.c | 97 (ull)get_stats.cnts[TCACODE_PASS].packets, in cdnr_stat_loop() 98 (ull)get_stats.cnts[TCACODE_DROP].packets, in cdnr_stat_loop() 99 (ull)get_stats.cnts[TCACODE_MARK].packets, in cdnr_stat_loop() 100 (ull)get_stats.cnts[TCACODE_NEXT].packets, in cdnr_stat_loop() 101 (ull)get_stats.cnts[TCACODE_RETURN].packets, in cdnr_stat_loop() 102 (ull)get_stats.cnts[TCACODE_NONE].packets); in cdnr_stat_loop() 137 (ull)sp->tce_cnts[j].packets, in cdnr_stat_loop()
|
| H A D | qdisc_rio.c | 99 (ull)rio_stats.q_stats[0].xmit_cnt.packets, in rio_stat_loop() 100 (ull)rio_stats.q_stats[0].drop_cnt.packets, in rio_stat_loop() 101 (ull)rio_stats.q_stats[1].xmit_cnt.packets, in rio_stat_loop() 102 (ull)rio_stats.q_stats[1].drop_cnt.packets, in rio_stat_loop() 103 (ull)rio_stats.q_stats[2].xmit_cnt.packets, in rio_stat_loop() 104 (ull)rio_stats.q_stats[2].drop_cnt.packets); in rio_stat_loop() 150 (ull)rp[dp].xmit_cnt.packets, in print_riostats()
|
| H A D | qdisc_wfq.c | 131 top[j]->stats.xmit_cnt.packets < in wfq_stat_loop() 132 qinfo[i].stats.xmit_cnt.packets)) { in wfq_stat_loop() 152 (ull)top[j]->stats.xmit_cnt.packets, in wfq_stat_loop() 154 (ull)top[j]->stats.drop_cnt.packets, in wfq_stat_loop()
|
| H A D | qdisc_red.c | 82 (ull)red_stats.xmit_cnt.packets, in red_stat_loop() 83 (ull)red_stats.drop_cnt.packets, in red_stat_loop() 116 (ull)rp->xmit_cnt.packets, in print_redstats()
|
| /netbsd-src/external/gpl3/binutils.old/dist/gprofng/src/ |
| H A D | DbeView.cc | 1863 DataView *packets = get_filtered_events (index, DATA_SAMPLE); in get_stats_data() local 1864 if (packets == NULL) in get_stats_data() 1866 return new Stats_data (packets); in get_stats_data() 1872 DataView *packets = get_filtered_events (index, DATA_SAMPLE); in get_ovw_data() local 1877 if (packets == NULL) in get_ovw_data() 1879 return new Ovw_data (packets, starttime); in get_ovw_data() 2271 DataView *packets = get_filtered_events (idx, DATA_CLOCK); in dump_profile() local 2272 if (packets && packets->getSize () != 0) in dump_profile() 2277 (int) packets->getSize (), exp->get_expt_name ()); in dump_profile() 2278 for (long i = 0; i < packets->getSize (); i++) in dump_profile() [all …]
|
| H A D | Stats_data.cc | 56 packets = NULL; in Stats_data() 62 packets = _packets; in Stats_data() 116 if (packets->getSize () > 0) in fetchPrUsage() 118 Sample* sample = (Sample*) packets->getObjValue (PROP_SMPLOBJ, index); in fetchPrUsage() 134 long size = packets->getSize (); in compute_data()
|
| H A D | Dbe.cc | 7423 DataView *packets = dbev->get_filtered_events (exp_id, data_id, in getTimelinePackets() local 7425 return packets; in getTimelinePackets() 7429 getIdxByVals (DataView * packets, int aux, int entity_prop_val, in getIdxByVals() argument 7437 long idx = packets->getIdxByVals (tval, rel); in getIdxByVals() 7442 isValidIdx (DataView * packets, int entity_prop_id, in isValidIdx() argument 7445 if (idx < 0 || idx >= packets->getSize ()) in isValidIdx() 7447 int pkt_aux = packets->getIntValue (PROP_HWCTAG, idx); in isValidIdx() 7454 int pkt_ent = packets->getIntValue (entity_prop_id, idx); in isValidIdx() 7469 isVisibleTLEvent (Experiment *exp, VMode view_mode, DataView* packets, long idx) in isVisibleTLEvent() argument 7473 JThread *jthread = (JThread*) packets->getObjValue (PROP_JTHREAD, idx); in isVisibleTLEvent() [all …]
|
| /netbsd-src/external/gpl3/binutils/dist/gprofng/src/ |
| H A D | DbeView.cc | 1863 DataView *packets = get_filtered_events (index, DATA_SAMPLE); in get_stats_data() local 1864 if (packets == NULL) in get_stats_data() 1866 return new Stats_data (packets); in get_stats_data() 1872 DataView *packets = get_filtered_events (index, DATA_SAMPLE); in get_ovw_data() local 1877 if (packets == NULL) in get_ovw_data() 1879 return new Ovw_data (packets, starttime); in get_ovw_data() 2271 DataView *packets = get_filtered_events (idx, DATA_CLOCK); in dump_profile() local 2272 if (packets && packets->getSize () != 0) in dump_profile() 2277 (int) packets->getSize (), exp->get_expt_name ()); in dump_profile() 2278 for (long i = 0; i < packets->getSize (); i++) in dump_profile() [all …]
|
| H A D | Stats_data.cc | 56 packets = NULL; in Stats_data() 62 packets = _packets; in Stats_data() 116 if (packets->getSize () > 0) in fetchPrUsage() 118 Sample* sample = (Sample*) packets->getObjValue (PROP_SMPLOBJ, index); in fetchPrUsage() 134 long size = packets->getSize (); in compute_data()
|
| H A D | Dbe.cc | 7423 DataView *packets = dbev->get_filtered_events (exp_id, data_id, in getTimelinePackets() local 7425 return packets; in getTimelinePackets() 7429 getIdxByVals (DataView * packets, int aux, int entity_prop_val, in getIdxByVals() argument 7437 long idx = packets->getIdxByVals (tval, rel); in getIdxByVals() 7442 isValidIdx (DataView * packets, int entity_prop_id, in isValidIdx() argument 7445 if (idx < 0 || idx >= packets->getSize ()) in isValidIdx() 7447 int pkt_aux = packets->getIntValue (PROP_HWCTAG, idx); in isValidIdx() 7454 int pkt_ent = packets->getIntValue (entity_prop_id, idx); in isValidIdx() 7469 isVisibleTLEvent (Experiment *exp, VMode view_mode, DataView* packets, long idx) in isVisibleTLEvent() argument 7473 JThread *jthread = (JThread*) packets->getObjValue (PROP_JTHREAD, idx); in isVisibleTLEvent() [all …]
|
| /netbsd-src/external/bsd/ipf/dist/rules/ |
| H A D | example.sr | 7 # block any inbound packets on le0 which are fragmented and "too short" to 9 # packets which can be missing the flags/ports (depending on which part 14 # log all inbound TCP packets with the SYN flag (only) set 25 # block and log any inbound UDP packets on le0 which are going to port 2049 30 # quickly allow any packets to/from a particular pair of hosts 45 # block any inbound UDP packets destined for these subnets. 51 # block any inbound TCP packets with only the SYN flag set that are 58 # block any inbound ICMP packets destined for these subnets.
|
| H A D | example.5 | 5 # allow packets coming from foo to bar through. 9 # allow any TCP packets from the same subnet as foo is on through to host 14 # allow in UDP packets which are NOT from port 53 and are destined for 23 # allow packets through which have a non-standard IP header length (ie there
|
| H A D | example.3 | 3 # block all inbound packets. 7 # pass through packets to and from localhost. 24 # block all outbound packets. 28 # allow any packets destined for localhost out.
|
| H A D | example.13 | 3 # Log all short TCP packets to qe3, with 10.3.3.3 as the intended 12 # Route all UDP packets through transparently. 16 # Route all ICMP packets to network 10 out through le1, to 10.3.3.1
|
| H A D | firewall | 4 Step 1 - Block out "bad" IP packets. 9 a) blocks all packets which might belong to an IP Spoofing attack; 10 b) blocks all packets with IP options; 11 c) blocks all packets which have a length which is too short for
|
| /netbsd-src/tests/kernel/ |
| H A D | t_pty.c | 50 static size_t packets = 2; variable 81 for (i = 0; i < packets; i++) { in run() 250 if (total != buffer_size * packets) in child_spawn() 252 "Lost data %zu != %zu\n", total, buffer_size * packets); in child_spawn() 280 packets = (size_t)atoi(optarg); in parse_args() 298 if (packets < 1 || packets > 100) in parse_args()
|
| /netbsd-src/external/bsd/file/dist/magic/magdir/ |
| H A D | pgp-binary-keys | 7 # they are sequences of packets: 15 # Happily most packets have a few fields that are constrained, which 73 # is only allowed for container packets (SEIP, Compressed Data and 117 # An indeterminate length is only allowed for container packets 123 # We check the first three packets to determine if a sequence of 124 # OpenPGP packets is likely to be a certificate. The grammar allows 135 # Any number of marker packets are also allowed between each packet, 142 # Key packets and signature packets are versioned. There are two 144 # v4 packets were introduced in RFC 2440, which was published in 1998. 145 # It also deprecated v3 packets. There are no actively used v3 [all …]
|
| /netbsd-src/dist/pf/sbin/pfctl/ |
| H A D | pfctl_qstats.c | 296 (unsigned long long)cur.data.cbq_stats.xmit_cnt.packets, in print_cbqstats() 298 (unsigned long long)cur.data.cbq_stats.drop_cnt.packets, in print_cbqstats() 317 (unsigned long long)cur.data.priq_stats.xmitcnt.packets, in print_priqstats() 319 (unsigned long long)cur.data.priq_stats.dropcnt.packets, in print_priqstats() 337 (unsigned long long)cur.data.hfsc_stats.xmit_cnt.packets, in print_hfscstats() 339 (unsigned long long)cur.data.hfsc_stats.drop_cnt.packets, in print_hfscstats() 382 p = qs->data.cbq_stats.xmit_cnt.packets; in update_avg() 386 p = qs->data.priq_stats.xmitcnt.packets; in update_avg() 390 p = qs->data.hfsc_stats.xmit_cnt.packets; in update_avg()
|
| /netbsd-src/external/bsd/ipf/dist/ |
| H A D | README | 8 filtering to packets going in and out of them. This package has been 35 discriminate between packets as they are on the 'wire', before they 39 generating tiny fragmented IP packets to generate a TCP packet which 41 on these types of packets is possible, but under the more general case 42 of the packets being "short". ICMP and UDP packets which are too small 44 asked. When filtering on fragmented packets, the last fragment will get 45 through for TCP/UDP/ICMP packets. 71 on all packets.
|
| H A D | WhatsNew40.txt | 33 - BPF syntax available for matching packets in ipf rules (1). 50 - PPS (packets per second) matching available for ipf rules. 85 - Can elect not to automatically match ICMP error packets. 89 (2) - On Solaris/HP-UX, broadcast packets are seen as multicast packets.
|
| /netbsd-src/external/bsd/nsd/dist/doc/ |
| H A D | differences.tex | 65 byte-comparison on the packets. If the packets are binary different, 110 {\em difference} & {\em packets} & {\em \%diff} \\ 127 Number of packets the same after normalization:&1474863 \\ 128 Number of packets exactly the same on the wire:& 59161 \\ 129 Total number of packets inspected: &2244616 \\ 132 For each type of difference the number of packets in the trace that 136 explained by the difference category is listed. Adding up the packets 140 The number of packets after normalization includes the number of 141 packets that are the same on the wire. 142 The total number of query packets is displayed at the bottom of the table. [all …]
|
| /netbsd-src/external/bsd/ipf/dist/ipsd/ |
| H A D | README | 5 This program is designed to be a passive listener for TCP packets sent to 8 detect all packets going to/through them. 11 the program. Any TCP packets which are seen sent to these ports are counted 15 After a given number of "hits", it will write the current table of packets
|
| /netbsd-src/crypto/dist/ipsec-tools/src/racoon/rfc/ |
| H A D | draft-ietf-ipsec-udp-encaps-03.txt | 47 packets inside UDP packets for the purpose of traversing NATs. 74 packets inside UDP packets for the purpose of traversing NATs. 85 ESP SPI field zero for ESP packets. (XXX To be changed to 87 IKE packets and ESP packets can be distinguished from each other. 89 UDP encapsulation of ESP packets as defined in this document is 167 When a tunnel mode has been used to transmit packets, the inner 174 for the encapsulated packets from the peer, check that the source 184 When a transport mode has been used to transmit packets, contained 275 The sole purpose of sending NAT-keepalive packets is to keep 277 the peers. Reception of NAT-keepalive packets MUST NOT be [all …]
|
| /netbsd-src/usr.sbin/spray/ |
| H A D | spray.c | 198 print_xferstats(int packets, int packetlen, double xfertime) in print_xferstats() argument 204 datalen = packets * packetlen; in print_xferstats() 205 pps = packets / xfertime; in print_xferstats()
|