/external/tcpdump/ |
packetdat.awk | 13 # <1st ack time> 14 # <last ack time> 20 if ($6 != "ack") { 47 # for packets that were implicitly acked, make the ack time 48 # be the ack time of next explicitly acked packet.
|
print-decnet.c | 305 #define SGQ_ACK 0100000 /* ack */ 306 #define SGQ_NAK 0110000 /* negative ack */ 307 #define SGQ_OACK 0120000 /* other channel ack */ 308 #define SGQ_ONAK 0130000 /* other channel negative ack */ 311 #define SGQ_DELAY 010000 /* ack delay flag */ 875 int ack; local 881 ack = EXTRACT_LE_16BITS(shp->sh_seq[0]); 882 if (ack & SGQ_ACK) { /* acknum field */ 883 if ((ack & SGQ_NAK) == SGQ_NAK) 884 ND_PRINT((ndo, "nak %d ", ack & SGQ_MASK)) 911 int ack; local 949 int ack; local 1013 int ack; local 1038 int ack; local [all...] |
/external/tcpdump/tests/ |
bgp_infloop-v.out | 2 196.59.48.65.14214 > 192.168.1.1.179: Flags [P.], cksum 0xbec1 (correct), seq 2470159403:2470159437, ack 160570221, win 8192, length 34: BGP 5 235.101.90.12.60082 > 192.168.1.1.179: Flags [P.], cksum 0x742d (correct), seq 1978178:1978212, ack 2473062416, win 4096, length 34: BGP 8 179.110.109.87.40936 > 192.168.1.1.179: Flags [P.], cksum 0xd82d (correct), seq 3014673177:3014673211, ack 1498443316, win 4096, length 34: BGP 11 114.227.144.98.32757 > 192.168.1.1.179: Flags [P.], cksum 0xb456 (correct), seq 1117364848:1117364882, ack 3778435416, win 4096, length 34: BGP 14 114.227.144.98.32757 > 192.168.1.1.179: Flags [P.], cksum 0xb456 (correct), seq 0:34, ack 1, win 4096, length 34: BGP
|
lmp.out | 4 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 Config ACK Message, length: 48 6 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 Link Summary ACK Message, length: 16 8 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 Begin Verify ACK Message, length: 40 11 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 End Verify ACK Message, length: 24 14 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 Test Status ACK Message, length: 24 15 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 Channel Status ACK Message, length: 16
|
resp_2.out | 2 IP 127.0.0.1.6379 > 127.0.0.1.35934: Flags [S.], seq 3524975383, ack 270581734, win 43690, options [mss 65495,sackOK,TS val 2004413385 ecr 2004413385,nop,wscale 7], length 0 3 IP 127.0.0.1.35934 > 127.0.0.1.6379: Flags [.], ack 1, win 342, options [nop,nop,TS val 2004413385 ecr 2004413385], length 0 4 IP 127.0.0.1.35934 > 127.0.0.1.6379: Flags [P.], seq 1:13, ack 1, win 342, options [nop,nop,TS val 2004413683 ecr 2004413385], length 12: RESP "set test 1" 5 IP 127.0.0.1.6379 > 127.0.0.1.35934: Flags [.], ack 13, win 342, options [nop,nop,TS val 2004413683 ecr 2004413683], length 0 6 IP 127.0.0.1.35934 > 127.0.0.1.6379: Flags [P.], seq 13:157, ack 1, win 342, options [nop,nop,TS val 2004413683 ecr 2004413683], length 144: RESP "incr test" "set test2 redis" "get test2" "lpush test3 r" "lpush test3 e" "lpush test3 d" "lpush test3 i" "lpush test3 s" "lrange test3 0 -1" "del test4" 7 IP 127.0.0.1.6379 > 127.0.0.1.35934: Flags [.], ack 157, win 350, options [nop,nop,TS val 2004413683 ecr 2004413683], length 0 8 IP 127.0.0.1.35934 > 127.0.0.1.6379: Flags [P.], seq 157:168, ack 1, win 342, options [nop,nop,TS val 2004413683 ecr 2004413683], length 11: RESP "get test4" 9 IP 127.0.0.1.6379 > 127.0.0.1.35934: Flags [.], ack 168, win 350, options [nop,nop,TS val 2004413683 ecr 2004413683], length 0 10 IP 127.0.0.1.6379 > 127.0.0.1.35934: Flags [P.], seq 1:1289, ack 168, win 350, options [nop,nop,TS val 2004413683 ecr 2004413683], length 1288: RESP "OK" "2" "OK" "redis" "170" "171" "172" "173" "174" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "i" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "d" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "s" "i" "d" "e" "r" "i" "s" "i" "e" "r" "s" "i" "d" "e" "r" "0" null 11 IP 127.0.0.1.35934 > 127.0.0.1.6379: Flags [.], ack 1289, win 1365, options [nop,nop,TS val 2004413683 ecr 2004413683], length [all...] |
forces1.out | 7 IP 150.140.254.202.48316 > 211.129.72.8.6706: sctp[ForCES LP] (1) [SACK] [cum ack 18398476] [a_rwnd 57320] [#gap acks 0] [#dup tsns 0] 14 IP 150.140.254.202.57077 > 211.129.72.8.6704: sctp[ForCES HP] (1) [SACK] [cum ack 167996939] [a_rwnd 57228] [#gap acks 0] [#dup tsns 0] 21 IP 150.140.254.202.57077 > 211.129.72.8.6704: sctp[ForCES HP] (1) [SACK] [cum ack 167996941] [a_rwnd 57100] [#gap acks 0] [#dup tsns 0] 25 IP 211.129.72.8.6706 > 150.140.254.202.48316: sctp[ForCES LP] (1) [SACK] [cum ack 1830592459] [a_rwnd 55272] [#gap acks 0] [#dup tsns 0] 28 IP 150.140.254.202.57077 > 211.129.72.8.6704: sctp[ForCES HP] (1) [HB ACK] 32 IP 211.129.72.8.6704 > 150.140.254.202.57077: sctp[ForCES HP] (1) [HB ACK] 39 IP 211.129.72.8.6706 > 150.140.254.202.48316: sctp[ForCES LP] (1) [SACK] [cum ack 1830592477] [a_rwnd 55272] [#gap acks 0] [#dup tsns 0] 40 IP 150.140.254.202.48316 > 211.129.72.8.6706: sctp[ForCES LP] (1) [SACK] [cum ack 18398573] [a_rwnd 56144] [#gap acks 0] [#dup tsns 0]
|
kday3.out | 2 204.9.54.80.22 > 204.9.51.132.50079: Flags [P.], cksum 0x0282 (incorrect -> 0x3217), seq 1819218606:1819218722, ack 1238485076, win 1039, options [nop,nop,TS val 1340592078 ecr 941371882], length 116 5 204.9.51.132.50079 > 204.243.53.80.22: Flags [.], cksum 0x858b (incorrect -> 0x85a1), ack 1819218722, win 4092, options [nop,nop,TS val 941371913 ecr 1340592084], length 0 7 204.9.64.80.55936 > 204.9.40.10.443: Flags [.], cksum 0x0594 (incorrect -> 0x7767), ack 3587398274, win 1040, options [nop,nop,TS val 647770294 ecr 2364779354], length 0 9 204.0.55.10.323 > 204.9.54.80.55936: Flags [P.], cksum 0xc9b6 (incorrect -> 0x0cf1), seq 3589495407:3589495754, ack 370428050, win 1040, options [nop,nop,TS val 2381534627 ecr 3084508609], length 347 18 204.9.51.132.50079 > 204.9.54.80.22: Flags [.], cksum 0x8611 (incorrect -> 0xa678), ack 0, win 4094, options [nop,nop,TS val 941371775 ecr 4294967242], length 0 20 204.9.51.132.50079 > 204.243.53.80.22: Flags [.], cksum 0x858b (incorrect -> 0x85a1), ack 1, win 4092, options [nop,nop,TS val 941371913 ecr 1340592084], length 0 22 204.9.64.80.55936 > 204.9.40.10.443: Flags [.], cksum 0x0594 (incorrect -> 0x8d67), ack 1, win 1040, options [nop,nop,TS val 647770294 ecr 2364773722], length 0 24 204.0.55.10.323 > 204.9.54.80.55936: Flags [P.], cksum 0xc9b6 (incorrect -> 0xa6b3), seq 0:347, ack 1, win 1040, options [nop,nop,TS val 2364757411 ecr 3084508609], length 347
|
of10_7050q-v.out | 2 10.0.0.80.6633 > 86.139.225.177.57145: Flags [P.], cksum 0xddb3 (correct), seq 3804035784:3804035836, ack 3936946676, win 136, options [nop,nop,TS val 256259488 ecr 12980962], length 52: OpenFlow 9 86.139.225.177.57145 > 10.0.0.80.6633: Flags [P.], cksum 0xf75f (correct), seq 1:25, ack 52, win 54, options [nop,nop,TS val 12980987 ecr 256259488], length 24: OpenFlow 13 10.0.0.80.6633 > 86.139.225.177.57145: Flags [.], cksum 0x42b3 (incorrect -> 0x0ee3), ack 25, win 136, options [nop,nop,TS val 256259628 ecr 12980987], length 0 15 86.139.225.177.57145 > 10.0.0.80.6633: Flags [P.], cksum 0xf55e (correct), seq 25:53, ack 52, win 54, options [nop,nop,TS val 12981023 ecr 256259628], length 28: OpenFlow
|
rpl-26-senddaovv.out | 1 IP6 (hlim 64, next-header ICMPv6 (58) payload length: 24) fe80::216:3eff:fe11:3424 > ff02::1: [icmp6 sum ok] ICMP6, RPL, (CLR)Destination Advertisement Object Ack [dagid:7468:6973:6973:6d79:6469:6365:6461:6732,seq:11,instance:43,status:0]
|
eigrp3-v.out | 4 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 12 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 20 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 28 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 36 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 44 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 52 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 60 seq: 0x00000034, ack: 0x00000000, AS: 100, length: 28 67 seq: 0x00000000, ack: 0x00000034, AS: 100, length: 0 71 seq: 0x0000002e, ack: 0x00000000, AS: 100, length: 2 [all...] |
eigrp2-v.out | 4 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 12 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 20 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 28 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 36 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 44 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 52 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 60 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 68 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 76 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 2 [all...] |
eigrp4-v.out | 4 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 12 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 20 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 28 seq: 0x0000002d, ack: 0x00000000, AS: 100, length: 28 35 seq: 0x0000002f, ack: 0x00000000, AS: 100, length: 28 42 seq: 0x00000000, ack: 0x0000002d, AS: 100, length: 0 46 seq: 0x00000000, ack: 0x0000002f, AS: 100, length: 0 50 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 58 seq: 0x00000032, ack: 0x00000000, AS: 100, length: 28 65 seq: 0x00000000, ack: 0x00000032, AS: 100, length: [all...] |
eigrp1-v.out | 4 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 12 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 20 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 28 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 36 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 44 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 52 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 60 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 68 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 20 76 seq: 0x00000000, ack: 0x00000000, AS: 100, length: 2 [all...] |
/external/iptables/extensions/ |
libxt_SYNPROXY.man | 23 tcpdump -pni eth0 -c 1 'tcp[tcpflags] == (tcp-syn|tcp-ack)' 31 Flags [S.], seq 360414582, ack 788841994, win 14480, 51 Catch UNTRACKED (SYN packets) and INVALID (3WHS ACK packets) states 53 SYN+ACK syncookies, create ESTABLISHED for valid client response (3WHS ACK 55 during 3WHS will not match and continue (e.g. SYN+FIN, SYN+ACK).
|
libxt_tcpmss.man | 1 This matches the TCP MSS (maximum segment size) field of the TCP header. You can only use this on TCP SYN or SYN/ACK packets, since the MSS is only negotiated during the TCP handshake at connection startup time.
|
libxt_tcp.man | 24 .BR "SYN ACK FIN RST URG PSH ALL NONE" . 27 iptables \-A FORWARD \-p tcp \-\-tcp\-flags SYN,ACK,FIN,RST SYN 29 will only match packets with the SYN flag set, and the ACK, FIN and 33 Only match TCP packets with the SYN bit set and the ACK,RST and FIN bits 38 It is equivalent to \fB\-\-tcp\-flags SYN,RST,ACK,FIN SYN\fP.
|
libxt_tcp.t | 20 -p tcp -m tcp --syn;-p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN;OK 21 -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN;=;OK 22 -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG SYN;=;OK 23 -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,PSH,ACK,URG SYN;=;OK 24 -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG RST;=;OK
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/message/ |
configurationackmessage.h | 25 // Ack for a configuration message. 28 // Creates a new configuration ack message.
|
pairingrequestackmessage.h | 25 // Ack for a pairing request message. 28 // Creates a new pairing request ack with no server name. 31 // Creates a new pairing request ack with the given server name.
|
/device/linaro/bootloader/edk2/MdeModulePkg/Universal/Network/Tcp4Dxe/ |
Tcp4Input.c | 86 if (Seg->Ack == Tcb->SndUna) {
90 // If this is a duplicated ACK, increse Cwnd by SMSS.
98 " duplicated ACK (%d) for TCB %p\n", Seg->Ack, Tcb));
104 // full ACK or partial ACK
106 if (TCP_SEQ_GEQ (Seg->Ack, Tcb->Recover)) {
109 // Step 5 - Full ACK:
117 DEBUG ((EFI_D_INFO, "TcpFastRecover: received a full ACK(%d)"
118 " for TCB %p, exit fast recovery\n", Seg->Ack, Tcb)); [all...] |
/device/linaro/bootloader/edk2/NetworkPkg/TcpDxe/ |
TcpInput.c | 88 if (Seg->Ack == Tcb->SndUna) {
92 // If this is a duplicated ACK, increse Cwnd by SMSS.
101 "TcpFastRecover: received another duplicated ACK (%d) for TCB %p\n",
102 Seg->Ack,
110 // full ACK or partial ACK
112 if (TCP_SEQ_GEQ (Seg->Ack, Tcb->Recover)) {
115 // Step 5 - Full ACK:
125 "TcpFastRecover: received a full ACK(%d) for TCB %p, exit fast recovery\n",
126 Seg->Ack,
[all...] |
/external/llvm/test/Transforms/TailCallElim/ |
ackermann.ll | 5 define i32 @Ack(i32 %M.1, i32 %N.1) { 17 %tmp.8 = call i32 @Ack( i32 %tmp.10, i32 1 ) ; <i32> [#uses=1] 22 %tmp.14 = call i32 @Ack( i32 %M.1, i32 %tmp.17 ) ; <i32> [#uses=1] 23 %tmp.11 = call i32 @Ack( i32 %tmp.13, i32 %tmp.14 ) ; <i32> [#uses=1]
|
/external/swiftshader/third_party/LLVM/test/Transforms/TailCallElim/ |
ackermann.ll | 4 define i32 @Ack(i32 %M.1, i32 %N.1) {
16 %tmp.8 = call i32 @Ack( i32 %tmp.10, i32 1 ) ; <i32> [#uses=1]
21 %tmp.14 = call i32 @Ack( i32 %M.1, i32 %tmp.17 ) ; <i32> [#uses=1]
22 %tmp.11 = call i32 @Ack( i32 %tmp.13, i32 %tmp.14 ) ; <i32> [#uses=1]
|
/packages/apps/Bluetooth/res/values/ |
test_strings.xml | 6 <string name="ack_record">Ack record</string>
|
/device/linaro/bootloader/edk2/NetworkPkg/DnsDxe/ |
DnsDhcp.h | 59 Parse the ACK to get required information
65 @retval EFI_SUCCESS The DNS information is got from the DHCP ACK.
91 @retval EFI_SUCCESS The DNS information is got from the DHCP ACK.
104 Parse the DHCP ACK to get Dns4 server information.
110 @retval EFI_SUCCESS The Dns4 information is got from the DHCP ACK.
124 Parse the DHCP ACK to get Dns6 server information.
131 @retval EFI_SUCCESS The Dns6 information is got from the DHCP ACK.
|