| /external/kernel-headers/original/asm-mips/sn/sn0/ |
| hubio.h | 541 ackcnt: 11, /* Invalidate ack count */ 543 ack: 1, /* indicates data ack received */ member in struct:icrbb_u::__anon21564 589 ackcnt: 11, /* Invalidate ack count */ 591 ack: 1, /* indicates data ack received */ member in struct:h1_icrbb_u::__anon21565 890 ack: 1, /* 17: Data ack received. */ member in struct:icrbp_a::__anon21571
|
| /external/nist-sip/java/gov/nist/javax/sip/parser/ |
| ServerParser.java | 179 * suppress sending ack to TU when retransFilter is enabled and ack is retransmitted.
|
| /external/tcpdump/ |
| print-gre.c | 75 { GRE_AP, "ack present"}, 280 printf(", ack %u", EXTRACT_32BITS(bp));
|
| /external/valgrind/main/coregrind/m_gdbserver/ |
| remote-utils.c | 723 or send it over and over until we get a positive ack. */ 732 dlog(1, "putpkt (\"%s\"); [no ack]\n", buf2); 734 dlog(1,"putpkt (\"%s\"); [looking for ack]\n", buf2); 791 read system call. Otherwise, when reading an ack character 901 dlog(1, "getpkt (\"%s\"); [no ack] \n", buf); 903 dlog(1, "getpkt (\"%s\"); [sending ack] \n", buf); 907 dlog(1, "getpkt(write ack) no write_remote_desc"); 910 dlog(1, "[sent ack]\n");
|
| /frameworks/base/services/java/com/android/server/am/ |
| NativeCrashListener.java | 144 // Always ack debuggerd's connection to us. The actual 152 Slog.d(TAG, "Exception writing ack: " + e.getMessage());
|
| /external/bluetooth/bluedroid/audio_a2dp_hw/ |
| audio_a2dp_hw.c | 268 char ack; local 281 /* wait for ack byte */ 282 if (recv(out->ctrl_fd, &ack, 1, MSG_NOSIGNAL) < 0) 284 ERROR("ack failed (%s)", strerror(errno)); 290 DEBUG("A2DP COMMAND %s DONE STATUS %d", dump_a2dp_ctrl_event(cmd), ack); 292 if (ack != A2DP_CTRL_ACK_SUCCESS)
|
| /external/bluetooth/bluedroid/stack/l2cap/ |
| l2c_int.h | 185 UINT8 last_rx_ack; /* Last sequence number ack'ed by the peer */ 187 UINT8 last_ack_sent; /* Last peer sequence number ack'ed */ 196 BOOLEAN wait_ack; /* Transmitter is waiting ack (poll sent) */ 203 BUFFER_Q waiting_for_ack_q; /* Buffers sent and waiting for peer to ack */ 221 UINT32 xmit_ack_touts; /* # of xmit ack timouts */ 421 UINT16 link_ack_thresh; /* Threshold at which to ack pkts */ [all...] |
| /external/chromium_org/content/browser/renderer_host/ |
| render_widget_host_view_aura.cc | 326 // Swap ack for the renderer when kCompositeToMailbox is enabled. 335 cc::CompositorFrameAck ack; local 336 ack.gl_frame_data.reset(new cc::GLFrameData()); 342 reinterpret_cast<char*>(ack.gl_frame_data->mailbox.name)); 343 ack.gl_frame_data->size = texture_to_produce->size(); 344 ack.gl_frame_data->sync_point = 349 ack.gl_frame_data->size = received_size; 350 ack.gl_frame_data->mailbox = received_mailbox; 354 route_id, output_surface_id, renderer_host_id, ack); 363 AcceleratedSurfaceMsg_BufferPresented_Params ack; local 1450 cc::CompositorFrameAck ack; local 1479 cc::CompositorFrameAck ack; local 1550 cc::CompositorFrameAck ack; local [all...] |
| render_widget_host_impl.cc | 384 // Send the ack along with the information on placement. 581 // We don't expect to receive an ACK when the requested size or the physical 1480 cc::CompositorFrameAck ack; local [all...] |
| /external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
| pseudotcp_unittest.cc | 653 // Test sending data with 10% packet loss and Delayed ACK disabled. 672 // Test sending data with 50ms delay and Delayed ACK disabled. 762 // Should take ~1s, due to interaction between Nagling and Delayed ACK. 769 // Test sending 1x-2x MTU of data in each ping/pong with Delayed ACK off. 788 // Should take ~1s, due to Delayed ACK interaction with Nagling. 807 // Test sending <= 1x MTU of data ping/pong, in two segments, no Delayed ACK.
|
| /external/dnsmasq/src/ |
| tftp.c | 376 struct ack { struct 378 } *mess = (struct ack *)daemon->packet; 390 if ((len = recv(transfer->sockfd, daemon->packet, daemon->packet_buff_sz, 0)) >= (ssize_t)sizeof(struct ack)) 394 /* Got ack, ensure we take the (re)transmit path */ 402 char *p = daemon->packet + sizeof(struct ack); 445 ACK, some clients never send it */
|
| /external/qemu/slirp/ |
| tcp_output.c | 92 * slow start to get ack "clock" running again. 148 * just wait for an ACK. 213 * Send if we owe peer an ACK. 412 * not reflect the first unsent octet. For ACK only 504 * and not doing an ack or a keep-alive probe. 571 * Any pending ACK has now been sent.
|
| /external/qemu/slirp-android/ |
| tcp_output.c | 92 * slow start to get ack "clock" running again. 148 * just wait for an ACK. 213 * Send if we owe peer an ACK. 412 * not reflect the first unsent octet. For ACK only 504 * and not doing an ack or a keep-alive probe. 571 * Any pending ACK has now been sent.
|
| /external/ppp/pppd/ |
| sys-solaris.c | 2640 struct T_optmgmt_ack ack; member in union:__anon26268 2642 } ack; local [all...] |
| ipv6cp.c | 174 ipv6cp_options ipv6cp_gotoptions[NUM_PPP]; /* Options that peer ack'd */ 176 ipv6cp_options ipv6cp_hisoptions[NUM_PPP]; /* Options that we ack'd */ 188 static int ipv6cp_ackci __P((fsm *, u_char *, int)); /* Peer ack'd our CI */ 202 ipv6cp_ackci, /* ACK our Configuration Information */ 306 #define CODENAME(x) ((x) == CONFACK ? "ACK" : \ 595 * ipv6cp_ackci - Ack our CIs. 598 * 0 - Ack was bad. 599 * 1 - Ack was good. 659 IPV6CPDEBUG(("ipv6cp_ackci: received bad Ack!")); 1022 if (rc == CONFACK) { /* Ack'd all prior CIs? * [all...] |
| ipcp.c | 68 ipcp_options ipcp_gotoptions[NUM_PPP]; /* Options that peer ack'd */ 70 ipcp_options ipcp_hisoptions[NUM_PPP]; /* Options that we ack'd */ 105 static int ipcp_ackci __P((fsm *, u_char *, int)); /* Peer ack'd our CI */ 119 ipcp_ackci, /* ACK our Configuration Information */ 280 #define CODENAME(x) ((x) == CONFACK ? "ACK" : \ 831 * ipcp_ackci - Ack our CIs. 832 * Called by fsm_rconfack, Receive Configure ACK. 835 * 0 - Ack was bad. 836 * 1 - Ack was good. 949 IPCPDEBUG(("ipcp_ackci: received bad Ack!")); [all...] |
| upap.c | 392 upap_sresp(u, UPAP_AUTHACK, id, "", 0); /* return auth-ack */ 466 * upap_rauthack - Receive Authenticate-Ack. 581 * upap_sresp - Send a response (ack or nak).
|
| /external/chromium_org/net/quic/ |
| quic_framer_test.cc | 393 void ValidateTruncatedAck(const QuicAckFrame* ack, size_t keys) { 395 EXPECT_TRUE(ContainsKey(ack->received_info.missing_packets, i)) << i; 397 EXPECT_EQ(keys, ack->received_info.largest_observed); [all...] |
| quic_packet_generator_test.cc | 57 // Use this when only ack and feedback frames should be allowed to be written. 458 // When the first write operation is invoked, the ack and feedback 494 // When the first write operation is invoked, the ack and feedback
|
| /external/tcpdump/tests/ |
| print-x.new | 6 23:57:35.938122 IP 127.0.0.1.80 > 127.0.0.1.55920: S 930778609:930778609(0) ack 928549247 win 32767 <mss 16396,sackOK,timestamp 1306300950 1306300950,nop,wscale 2> 11 23:57:35.938167 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 1 win 8192 <nop,nop,timestamp 1306300950 1306300950> 16 23:57:35.939423 IP 127.0.0.1.55920 > 127.0.0.1.80: P 1:203(202) ack 1 win 8192 <nop,nop,timestamp 1306300951 1306300950> 33 23:57:35.940474 IP 127.0.0.1.80 > 127.0.0.1.55920: . ack 203 win 8192 <nop,nop,timestamp 1306300952 1306300951> 38 23:57:35.941232 IP 127.0.0.1.80 > 127.0.0.1.55920: P 1:5560(5559) ack 203 win 8192 <nop,nop,timestamp 1306300953 1306300951> 390 23:57:35.941260 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 5560 win 12383 <nop,nop,timestamp 1306300953 1306300953> 395 23:57:37.229575 IP 127.0.0.1.55920 > 127.0.0.1.80: F 203:203(0) ack 5560 win 12383 <nop,nop,timestamp 1306302241 1306300953> 400 23:57:37.230839 IP 127.0.0.1.80 > 127.0.0.1.55920: F 5560:5560(0) ack 204 win 8192 <nop,nop,timestamp 1306302243 1306302241> 405 23:57:37.230900 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 5561 win 12383 <nop,nop,timestamp 1306302243 1306302243>
|
| print-x.out | 6 23:57:35.938122 IP 127.0.0.1.80 > 127.0.0.1.55920: S 930778609:930778609(0) ack 928549247 win 32767 <mss 16396,sackOK,timestamp 1306300950 1306300950,nop,wscale 2> 11 23:57:35.938167 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 1 win 8192 <nop,nop,timestamp 1306300950 1306300950> 16 23:57:35.939423 IP 127.0.0.1.55920 > 127.0.0.1.80: P 1:203(202) ack 1 win 8192 <nop,nop,timestamp 1306300951 1306300950> 33 23:57:35.940474 IP 127.0.0.1.80 > 127.0.0.1.55920: . ack 203 win 8192 <nop,nop,timestamp 1306300952 1306300951> 38 23:57:35.941232 IP 127.0.0.1.80 > 127.0.0.1.55920: P 1:5560(5559) ack 203 win 8192 <nop,nop,timestamp 1306300953 1306300951> 390 23:57:35.941260 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 5560 win 12383 <nop,nop,timestamp 1306300953 1306300953> 395 23:57:37.229575 IP 127.0.0.1.55920 > 127.0.0.1.80: F 203:203(0) ack 5560 win 12383 <nop,nop,timestamp 1306302241 1306300953> 400 23:57:37.230839 IP 127.0.0.1.80 > 127.0.0.1.55920: F 5560:5560(0) ack 204 win 8192 <nop,nop,timestamp 1306302243 1306302241> 405 23:57:37.230900 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 5561 win 12383 <nop,nop,timestamp 1306302243 1306302243>
|
| print-xx.new | 7 23:57:35.938122 IP 127.0.0.1.80 > 127.0.0.1.55920: S 930778609:930778609(0) ack 928549247 win 32767 <mss 16396,sackOK,timestamp 1306300950 1306300950,nop,wscale 2> 13 23:57:35.938167 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 1 win 8192 <nop,nop,timestamp 1306300950 1306300950> 19 23:57:35.939423 IP 127.0.0.1.55920 > 127.0.0.1.80: P 1:203(202) ack 1 win 8192 <nop,nop,timestamp 1306300951 1306300950> 37 23:57:35.940474 IP 127.0.0.1.80 > 127.0.0.1.55920: . ack 203 win 8192 <nop,nop,timestamp 1306300952 1306300951> 43 23:57:35.941232 IP 127.0.0.1.80 > 127.0.0.1.55920: P 1:5560(5559) ack 203 win 8192 <nop,nop,timestamp 1306300953 1306300951> 396 23:57:35.941260 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 5560 win 12383 <nop,nop,timestamp 1306300953 1306300953> 402 23:57:37.229575 IP 127.0.0.1.55920 > 127.0.0.1.80: F 203:203(0) ack 5560 win 12383 <nop,nop,timestamp 1306302241 1306300953> 408 23:57:37.230839 IP 127.0.0.1.80 > 127.0.0.1.55920: F 5560:5560(0) ack 204 win 8192 <nop,nop,timestamp 1306302243 1306302241> 414 23:57:37.230900 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 5561 win 12383 <nop,nop,timestamp 1306302243 1306302243>
|
| print-xx.out | 7 23:57:35.938122 IP 127.0.0.1.80 > 127.0.0.1.55920: S 930778609:930778609(0) ack 928549247 win 32767 <mss 16396,sackOK,timestamp 1306300950 1306300950,nop,wscale 2> 13 23:57:35.938167 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 1 win 8192 <nop,nop,timestamp 1306300950 1306300950> 19 23:57:35.939423 IP 127.0.0.1.55920 > 127.0.0.1.80: P 1:203(202) ack 1 win 8192 <nop,nop,timestamp 1306300951 1306300950> 37 23:57:35.940474 IP 127.0.0.1.80 > 127.0.0.1.55920: . ack 203 win 8192 <nop,nop,timestamp 1306300952 1306300951> 43 23:57:35.941232 IP 127.0.0.1.80 > 127.0.0.1.55920: P 1:5560(5559) ack 203 win 8192 <nop,nop,timestamp 1306300953 1306300951> 396 23:57:35.941260 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 5560 win 12383 <nop,nop,timestamp 1306300953 1306300953> 402 23:57:37.229575 IP 127.0.0.1.55920 > 127.0.0.1.80: F 203:203(0) ack 5560 win 12383 <nop,nop,timestamp 1306302241 1306300953> 408 23:57:37.230839 IP 127.0.0.1.80 > 127.0.0.1.55920: F 5560:5560(0) ack 204 win 8192 <nop,nop,timestamp 1306302243 1306302241> 414 23:57:37.230900 IP 127.0.0.1.55920 > 127.0.0.1.80: . ack 5561 win 12383 <nop,nop,timestamp 1306302243 1306302243>
|
| /external/libnfc-nxp/src/ |
| phLlcNfc_Interface.c | 266 /* Stop the ACK timer, as the ACK or I frame is sent */ 268 /* ACK is sent, so reset the response received count */ 414 be sent to upper layer only after the ACK is received for the 509 ack for written frame [all...] |
| /external/bluetooth/bluedroid/stack/include/ |
| uipc_msg.h | 133 UINT8 ack; /* next ack seq, expected seq from peer */ member in struct:__anon3880 134 UINT8 sent_ack; /* last sent ack */
|