HomeSort by relevance Sort by last modified time
    Searched full:ack (Results 451 - 475 of 931) sorted by null

<<11121314151617181920>>

  /external/kernel-headers/original/asm-mips/sn/sn0/
hubio.h 541 ackcnt: 11, /* Invalidate ack count */
543 ack: 1, /* indicates data ack received */ member in struct:icrbb_u::__anon21564
589 ackcnt: 11, /* Invalidate ack count */
591 ack: 1, /* indicates data ack received */ member in struct:h1_icrbb_u::__anon21565
890 ack: 1, /* 17: Data ack received. */ member in struct:icrbp_a::__anon21571
  /external/nist-sip/java/gov/nist/javax/sip/parser/
ServerParser.java 179 * suppress sending ack to TU when retransFilter is enabled and ack is retransmitted.
  /external/tcpdump/
print-gre.c 75 { GRE_AP, "ack present"},
280 printf(", ack %u", EXTRACT_32BITS(bp));
  /external/valgrind/main/coregrind/m_gdbserver/
remote-utils.c 723 or send it over and over until we get a positive ack. */
732 dlog(1, "putpkt (\"%s\"); [no ack]\n", buf2);
734 dlog(1,"putpkt (\"%s\"); [looking for ack]\n", buf2);
791 read system call. Otherwise, when reading an ack character
901 dlog(1, "getpkt (\"%s\"); [no ack] \n", buf);
903 dlog(1, "getpkt (\"%s\"); [sending ack] \n", buf);
907 dlog(1, "getpkt(write ack) no write_remote_desc");
910 dlog(1, "[sent ack]\n");
  /frameworks/base/services/java/com/android/server/am/
NativeCrashListener.java 144 // Always ack debuggerd's connection to us. The actual
152 Slog.d(TAG, "Exception writing ack: " + e.getMessage());
  /external/bluetooth/bluedroid/audio_a2dp_hw/
audio_a2dp_hw.c 268 char ack; local
281 /* wait for ack byte */
282 if (recv(out->ctrl_fd, &ack, 1, MSG_NOSIGNAL) < 0)
284 ERROR("ack failed (%s)", strerror(errno));
290 DEBUG("A2DP COMMAND %s DONE STATUS %d", dump_a2dp_ctrl_event(cmd), ack);
292 if (ack != A2DP_CTRL_ACK_SUCCESS)
  /external/bluetooth/bluedroid/stack/l2cap/
l2c_int.h 185 UINT8 last_rx_ack; /* Last sequence number ack'ed by the peer */
187 UINT8 last_ack_sent; /* Last peer sequence number ack'ed */
196 BOOLEAN wait_ack; /* Transmitter is waiting ack (poll sent) */
203 BUFFER_Q waiting_for_ack_q; /* Buffers sent and waiting for peer to ack */
221 UINT32 xmit_ack_touts; /* # of xmit ack timouts */
421 UINT16 link_ack_thresh; /* Threshold at which to ack pkts */
    [all...]
  /external/chromium_org/content/browser/renderer_host/
render_widget_host_view_aura.cc 326 // Swap ack for the renderer when kCompositeToMailbox is enabled.
335 cc::CompositorFrameAck ack; local
336 ack.gl_frame_data.reset(new cc::GLFrameData());
342 reinterpret_cast<char*>(ack.gl_frame_data->mailbox.name));
343 ack.gl_frame_data->size = texture_to_produce->size();
344 ack.gl_frame_data->sync_point =
349 ack.gl_frame_data->size = received_size;
350 ack.gl_frame_data->mailbox = received_mailbox;
354 route_id, output_surface_id, renderer_host_id, ack);
363 AcceleratedSurfaceMsg_BufferPresented_Params ack; local
1450 cc::CompositorFrameAck ack; local
1479 cc::CompositorFrameAck ack; local
1550 cc::CompositorFrameAck ack; local
    [all...]
render_widget_host_impl.cc 384 // Send the ack along with the information on placement.
581 // We don't expect to receive an ACK when the requested size or the physical
1480 cc::CompositorFrameAck ack; local
    [all...]
  /external/chromium_org/third_party/libjingle/source/talk/p2p/base/
pseudotcp_unittest.cc 653 // Test sending data with 10% packet loss and Delayed ACK disabled.
672 // Test sending data with 50ms delay and Delayed ACK disabled.
762 // Should take ~1s, due to interaction between Nagling and Delayed ACK.
769 // Test sending 1x-2x MTU of data in each ping/pong with Delayed ACK off.
788 // Should take ~1s, due to Delayed ACK interaction with Nagling.
807 // Test sending <= 1x MTU of data ping/pong, in two segments, no Delayed ACK.
  /external/dnsmasq/src/
tftp.c 376 struct ack { struct
378 } *mess = (struct ack *)daemon->packet;
390 if ((len = recv(transfer->sockfd, daemon->packet, daemon->packet_buff_sz, 0)) >= (ssize_t)sizeof(struct ack))
394 /* Got ack, ensure we take the (re)transmit path */
402 char *p = daemon->packet + sizeof(struct ack);
445 ACK, some clients never send it */
  /external/qemu/slirp/
tcp_output.c 92 * slow start to get ack "clock" running again.
148 * just wait for an ACK.
213 * Send if we owe peer an ACK.
412 * not reflect the first unsent octet. For ACK only
504 * and not doing an ack or a keep-alive probe.
571 * Any pending ACK has now been sent.
  /external/qemu/slirp-android/
tcp_output.c 92 * slow start to get ack "clock" running again.
148 * just wait for an ACK.
213 * Send if we owe peer an ACK.
412 * not reflect the first unsent octet. For ACK only
504 * and not doing an ack or a keep-alive probe.
571 * Any pending ACK has now been sent.
  /external/ppp/pppd/
sys-solaris.c 2640 struct T_optmgmt_ack ack; member in union:__anon26268
2642 } ack; local
    [all...]
ipv6cp.c 174 ipv6cp_options ipv6cp_gotoptions[NUM_PPP]; /* Options that peer ack'd */
176 ipv6cp_options ipv6cp_hisoptions[NUM_PPP]; /* Options that we ack'd */
188 static int ipv6cp_ackci __P((fsm *, u_char *, int)); /* Peer ack'd our CI */
202 ipv6cp_ackci, /* ACK our Configuration Information */
306 #define CODENAME(x) ((x) == CONFACK ? "ACK" : \
595 * ipv6cp_ackci - Ack our CIs.
598 * 0 - Ack was bad.
599 * 1 - Ack was good.
659 IPV6CPDEBUG(("ipv6cp_ackci: received bad Ack!"));
1022 if (rc == CONFACK) { /* Ack'd all prior CIs? *
    [all...]
ipcp.c 68 ipcp_options ipcp_gotoptions[NUM_PPP]; /* Options that peer ack'd */
70 ipcp_options ipcp_hisoptions[NUM_PPP]; /* Options that we ack'd */
105 static int ipcp_ackci __P((fsm *, u_char *, int)); /* Peer ack'd our CI */
119 ipcp_ackci, /* ACK our Configuration Information */
280 #define CODENAME(x) ((x) == CONFACK ? "ACK" : \
831 * ipcp_ackci - Ack our CIs.
832 * Called by fsm_rconfack, Receive Configure ACK.
835 * 0 - Ack was bad.
836 * 1 - Ack was good.
949 IPCPDEBUG(("ipcp_ackci: received bad Ack!"));
    [all...]
upap.c 392 upap_sresp(u, UPAP_AUTHACK, id, "", 0); /* return auth-ack */
466 * upap_rauthack - Receive Authenticate-Ack.
581 * upap_sresp - Send a response (ack or nak).
  /external/chromium_org/net/quic/
quic_framer_test.cc 393 void ValidateTruncatedAck(const QuicAckFrame* ack, size_t keys) {
395 EXPECT_TRUE(ContainsKey(ack->received_info.missing_packets, i)) << i;
397 EXPECT_EQ(keys, ack->received_info.largest_observed);
    [all...]
quic_packet_generator_test.cc 57 // Use this when only ack and feedback frames should be allowed to be written.
458 // When the first write operation is invoked, the ack and feedback
494 // When the first write operation is invoked, the ack and feedback
  /external/tcpdump/tests/
print-x.new 6 23:57:35.938122 IP 127.0.0.1.80 > 127.0.0.1.55920: S 930778609:930778609(0) ack 928549247 win 32767 <mss 16396,sackOK,timestamp 1306300950 1306300950,nop,wscale 2>
11 23:57:35.938167 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 1 win 8192 <nop,nop,timestamp 1306300950 1306300950>
16 23:57:35.939423 IP 127.0.0.1.55920 > 127.0.0.1.80: P 1:203(202) ack 1 win 8192 <nop,nop,timestamp 1306300951 1306300950>
33 23:57:35.940474 IP 127.0.0.1.80 > 127.0.0.1.55920: . ack 203 win 8192 <nop,nop,timestamp 1306300952 1306300951>
38 23:57:35.941232 IP 127.0.0.1.80 > 127.0.0.1.55920: P 1:5560(5559) ack 203 win 8192 <nop,nop,timestamp 1306300953 1306300951>
390 23:57:35.941260 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 5560 win 12383 <nop,nop,timestamp 1306300953 1306300953>
395 23:57:37.229575 IP 127.0.0.1.55920 > 127.0.0.1.80: F 203:203(0) ack 5560 win 12383 <nop,nop,timestamp 1306302241 1306300953>
400 23:57:37.230839 IP 127.0.0.1.80 > 127.0.0.1.55920: F 5560:5560(0) ack 204 win 8192 <nop,nop,timestamp 1306302243 1306302241>
405 23:57:37.230900 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 5561 win 12383 <nop,nop,timestamp 1306302243 1306302243>
print-x.out 6 23:57:35.938122 IP 127.0.0.1.80 > 127.0.0.1.55920: S 930778609:930778609(0) ack 928549247 win 32767 <mss 16396,sackOK,timestamp 1306300950 1306300950,nop,wscale 2>
11 23:57:35.938167 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 1 win 8192 <nop,nop,timestamp 1306300950 1306300950>
16 23:57:35.939423 IP 127.0.0.1.55920 > 127.0.0.1.80: P 1:203(202) ack 1 win 8192 <nop,nop,timestamp 1306300951 1306300950>
33 23:57:35.940474 IP 127.0.0.1.80 > 127.0.0.1.55920: . ack 203 win 8192 <nop,nop,timestamp 1306300952 1306300951>
38 23:57:35.941232 IP 127.0.0.1.80 > 127.0.0.1.55920: P 1:5560(5559) ack 203 win 8192 <nop,nop,timestamp 1306300953 1306300951>
390 23:57:35.941260 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 5560 win 12383 <nop,nop,timestamp 1306300953 1306300953>
395 23:57:37.229575 IP 127.0.0.1.55920 > 127.0.0.1.80: F 203:203(0) ack 5560 win 12383 <nop,nop,timestamp 1306302241 1306300953>
400 23:57:37.230839 IP 127.0.0.1.80 > 127.0.0.1.55920: F 5560:5560(0) ack 204 win 8192 <nop,nop,timestamp 1306302243 1306302241>
405 23:57:37.230900 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 5561 win 12383 <nop,nop,timestamp 1306302243 1306302243>
print-xx.new 7 23:57:35.938122 IP 127.0.0.1.80 > 127.0.0.1.55920: S 930778609:930778609(0) ack 928549247 win 32767 <mss 16396,sackOK,timestamp 1306300950 1306300950,nop,wscale 2>
13 23:57:35.938167 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 1 win 8192 <nop,nop,timestamp 1306300950 1306300950>
19 23:57:35.939423 IP 127.0.0.1.55920 > 127.0.0.1.80: P 1:203(202) ack 1 win 8192 <nop,nop,timestamp 1306300951 1306300950>
37 23:57:35.940474 IP 127.0.0.1.80 > 127.0.0.1.55920: . ack 203 win 8192 <nop,nop,timestamp 1306300952 1306300951>
43 23:57:35.941232 IP 127.0.0.1.80 > 127.0.0.1.55920: P 1:5560(5559) ack 203 win 8192 <nop,nop,timestamp 1306300953 1306300951>
396 23:57:35.941260 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 5560 win 12383 <nop,nop,timestamp 1306300953 1306300953>
402 23:57:37.229575 IP 127.0.0.1.55920 > 127.0.0.1.80: F 203:203(0) ack 5560 win 12383 <nop,nop,timestamp 1306302241 1306300953>
408 23:57:37.230839 IP 127.0.0.1.80 > 127.0.0.1.55920: F 5560:5560(0) ack 204 win 8192 <nop,nop,timestamp 1306302243 1306302241>
414 23:57:37.230900 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 5561 win 12383 <nop,nop,timestamp 1306302243 1306302243>
print-xx.out 7 23:57:35.938122 IP 127.0.0.1.80 > 127.0.0.1.55920: S 930778609:930778609(0) ack 928549247 win 32767 <mss 16396,sackOK,timestamp 1306300950 1306300950,nop,wscale 2>
13 23:57:35.938167 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 1 win 8192 <nop,nop,timestamp 1306300950 1306300950>
19 23:57:35.939423 IP 127.0.0.1.55920 > 127.0.0.1.80: P 1:203(202) ack 1 win 8192 <nop,nop,timestamp 1306300951 1306300950>
37 23:57:35.940474 IP 127.0.0.1.80 > 127.0.0.1.55920: . ack 203 win 8192 <nop,nop,timestamp 1306300952 1306300951>
43 23:57:35.941232 IP 127.0.0.1.80 > 127.0.0.1.55920: P 1:5560(5559) ack 203 win 8192 <nop,nop,timestamp 1306300953 1306300951>
396 23:57:35.941260 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 5560 win 12383 <nop,nop,timestamp 1306300953 1306300953>
402 23:57:37.229575 IP 127.0.0.1.55920 > 127.0.0.1.80: F 203:203(0) ack 5560 win 12383 <nop,nop,timestamp 1306302241 1306300953>
408 23:57:37.230839 IP 127.0.0.1.80 > 127.0.0.1.55920: F 5560:5560(0) ack 204 win 8192 <nop,nop,timestamp 1306302243 1306302241>
414 23:57:37.230900 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 5561 win 12383 <nop,nop,timestamp 1306302243 1306302243>
  /external/libnfc-nxp/src/
phLlcNfc_Interface.c 266 /* Stop the ACK timer, as the ACK or I frame is sent */
268 /* ACK is sent, so reset the response received count */
414 be sent to upper layer only after the ACK is received for the
509 ack for written frame
    [all...]
  /external/bluetooth/bluedroid/stack/include/
uipc_msg.h 133 UINT8 ack; /* next ack seq, expected seq from peer */ member in struct:__anon3880
134 UINT8 sent_ack; /* last sent ack */

Completed in 1075 milliseconds

<<11121314151617181920>>