/external/nist-sip/java/javax/sip/ |
Timeout.java | 4 RETRANSMIT,
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/ |
RequestTest.java | 39 assertEquals("Retransmit body", "616263", bodyToHex(body)); 64 assertEquals("Retransmit body", "616263", bodyToHex(body)); 73 assertEquals("Retransmit body", "616263", bodyToHex(body)); 87 assertEquals("Retransmit body", "616263", bodyToHex(body));
|
/external/nist-sip/java/gov/nist/javax/sip/ |
ClientTransactionExt.java | 16 * listener will get a Timeout.RETRANSMIT event on each retransmission.
|
SipProviderImpl.java | [all...] |
/external/nist-sip/java/gov/nist/javax/sip/stack/ |
SIPTransaction.java | 89 * The maximum retransmit interval for non-INVITE requests and INVITE 107 * INVITE request retransmit interval, for UDP only 814 // Retransmit notifications are just an alert to the 859 * Returns the current value of the retransmit timer in milliseconds used to 860 * retransmit messages over unreliable transports. 862 * @return the integer value of the retransmit timer in milliseconds. [all...] |
SIPTransactionErrorEvent.java | 61 * Retransmit signal to application layer.
|
SIPClientTransaction.java | [all...] |
SIPServerTransaction.java | [all...] |
/external/wpa_supplicant_8/src/radius/ |
radius_client.c | 16 /* Defaults for RADIUS retransmit values (exponential backoff) */ 31 * Maximum number of retransmit attempts before the entry is removed from 32 * retransmit list. 39 * Maximum number of entries in retransmit list (oldest entries will be 79 * struct radius_msg_list - RADIUS client message retransmit list 380 /* retransmit; remove entry if too many attempts */ 399 wpa_printf(MSG_INFO, "RADIUS: Removing un-ACKed message due to too many failed retransmit attempts"); 475 "retransmit in %ld seconds", 570 HOSTAPD_LEVEL_DEBUG, "Next RADIUS client retransmit in" 584 /* No point in adding entries to retransmit queue since even [all...] |
/external/ppp/pppd/ |
fsm.c | 315 /* Retransmit the configure-request */ 316 if (f->callbacks->retransmit) 317 (*f->callbacks->retransmit)(f); 745 fsm_sconfreq(f, retransmit) 747 int retransmit; 760 if( !retransmit ){ 784 /* start the retransmit timer */
|
eap.h | 110 int ea_timeout; /* Time to wait (for retransmit/fail) */
|
fsm.h | 112 void (*retransmit) /* Retransmission is necessary */ member in struct:fsm_callbacks
|
/frameworks/av/media/libstagefright/wifi-display/rtp/ |
RTPSender.cpp | 717 bool retransmit = false; local 719 retransmit = true; 725 retransmit = true; 730 if (retransmit) {
|
/external/boringssl/src/ssl/test/runner/ |
dtls.go | 170 // interpreting it as a retransmit request. 200 // retain |c.pendingFragments| for a future retransmit. 353 // need to be cleverer if we ever test BoringSSL's retransmit
|
runner.go | [all...] |
/external/libnfc-nci/halimpl/pn54x/tml/ |
phTmlNfc.h | 143 uint32_t dwTimerId; /* Timer used to retransmit nci packet */
|
/external/tcpdump/ |
sctpConstants.h | 76 * the fast retransmit algorithm. With this defined 82 /* default max I can burst out after a fast retransmit */
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_wsc.c | 481 /* Recommended retransmit times: retransmit timeout 5 seconds,
|
eap_server.c | 319 SM_STATE(EAP, RETRANSMIT) 321 SM_ENTRY(EAP, RETRANSMIT); 1187 SM_ENTER(EAP, RETRANSMIT); [all...] |
/external/ipsec-tools/src/racoon/ |
TODO | 114 o IKE retransmit behavior
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.11-4.8/sysroot/usr/include/netinet/ |
icmp6.h | 127 uint32_t nd_ra_retransmit; /* retransmit timer */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/netinet/ |
icmp6.h | 127 uint32_t nd_ra_retransmit; /* retransmit timer */
|
/external/libnl/lib/route/ |
neightbl.c | 260 nl_dump(p, "reachable-time %s retransmit-time %s", 706 * Set the retransmit time of a neighbour table to the specified value 708 * @arg ms new retransmit time
|
/external/boringssl/src/ssl/ |
d1_pkt.c | 362 * buffered. For simplicity, drop it and expect retransmit to handle it 488 * packet and expect the peer to retransmit. */ 653 /* Retransmit our last flight of messages. If the peer sends the second
|
/external/kernel-headers/original/uapi/linux/ |
sctp.h | 443 * When the SCTP stack has no more user data to send or retransmit, this 446 * retransmit, the stack will immediately send up this notification.
|