HomeSort by relevance Sort by last modified time
    Searched refs:ack (Results 76 - 100 of 174) sorted by null

1 2 34 5 6 7

  /external/ppp/pppd/
sys-solaris.c 2648 struct T_optmgmt_ack ack; member in union:__anon32074
2650 } ack; local
    [all...]
  /cts/tests/tests/telephony/src/android/telephony/embms/cts/
MbmsDownloadFlowTest.java 167 downloadResultAck.forEach((ack) -> assertEquals(MbmsDownloadReceiver.RESULT_OK,
168 ack.getInt(CtsDownloadService.ARGUMENT_RESULT_CODE, -1)));
  /external/google-tv-pairing-protocol/cpp/src/polo/pairing/
pairingsession.cc 238 message::SecretAckMessage ack(*alpha);
241 wire_->SendSecretAckMessage(ack);
  /external/ltp/testcases/kernel/connectors/pec/
pec_listener.c 166 cnmsg->ack = 0;
193 printf("none err: %u\n", pe->event_data.ack.err);
  /external/scapy/scapy/modules/
nmap.py 99 res["ACK"] = "S++" if pkt.ack == 2 else "S" if pkt.ack == 1 else "O"
208 "Resp", "DF", "W", "ACK", "Flags", "Ops",
p0f.py 104 # SYN/ACK
107 # RST RST/ACK
110 # ACK
127 # raise TypeError("Not a SYN or SYN/ACK packet")
207 # RST+ACK packets"
213 if pkt.payload.seq == pkt.payload.ack:
215 # equal to ACK number."
231 if pkt.payload.ack != 0:
384 # 'K' quirk <=> RST+ACK
529 elif qq == 'A': pkt.payload.ack = RandInt(
    [all...]
  /external/wpa_supplicant_8/src/ap/
ieee802_11.h 84 const u8 *buf, size_t len, int ack);
86 const u8 *data, size_t len, int ack);
  /kernel/tests/net/test/
tcp_fastopen_test.py 89 # Receive a SYN+ACK with a TFO cookie and expect the connection to proceed
96 desc, ack = packets.ACK(version, myaddr, remoteaddr, synack)
97 msg = "First connect: got SYN+ACK, expected %s" % desc
98 self.ExpectPacketOn(netid, msg, ack)
  /external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/framed/
Http2ConnectionTest.java 75 assertTrue(ping.ack);
97 assertFalse(pingFrame.ack);
109 peer.acceptFrame(); // ACK
111 peer.acceptFrame(); // ACK 2
120 // Verify the peer received the ACK.
124 assertTrue(ackFrame.ack);
128 assertTrue(ackFrame.ack);
468 peer.acceptFrame(); // ACK
476 // verify the peer received the ACK
480 assertTrue(ackFrame.ack);
    [all...]
  /external/tcpdump/
print-pgm.c 106 PGM_ACK = 11, /* ACK for congestion control */
403 const struct pgm_ack *ack; local
405 ack = (const struct pgm_ack *)(pgm + 1);
406 ND_TCHECK(*ack);
407 ND_PRINT((ndo, "ACK seq %u",
408 EXTRACT_32BITS(&ack->pgma_rx_max_seq)));
409 bp = (const u_char *) (ack + 1);
  /system/tpm/trunks/ftdi/
mpsse.c 284 SetAck(mpsse, ACK);
706 * read back each individual ACK bit, so set the transmit size to 1.
722 /* Read in the ACK bit and store it in mpsse->rack */
918 * Returns the last received ACK bit.
922 * Returns either an ACK (0) or a NACK (1).
925 int ack = 0; local
928 ack = (mpsse->rack & 0x01);
931 return ack;
935 * Sets the transmitted ACK bit.
938 * @ack - 0 to send ACKs, 1 to send NACKs
    [all...]
  /external/webrtc/webrtc/p2p/base/
pseudotcp.cc 548 << "><ACK=" << m_rcv_nxt
557 // Note: When len is 0, this is an ACK packet. We don't read the return value for those,
580 seg.ack = bytes_to_long(buffer + 8);
594 << "><ACK=" << seg.ack
650 // packet(tcb, seg.ack, 0, FLAG_RST, 0, 0);
709 // Check if this is a valuable ack
710 if ((seg.ack > m_snd_una) && (seg.ack <= m_snd_nxt)) {
741 uint32_t nAcked = seg.ack - m_snd_una
    [all...]
pseudotcp.h 89 OPT_ACKDELAY, // The Delayed ACK timeout (0 == off).
114 uint32_t conv, seq, ack; member in struct:cricket::PseudoTcp::Segment
139 // send payload or just an ACK packet.
145 // value is 0 then this is an ACK packet, otherwise this packet has payload.
  /device/linaro/hikey/installer/hikey/
hisi-idt.py 107 ack = self.s.read()
108 if len(ack) == 1:
109 if ack == chr(0xaa):
  /external/iptables/utils/
nfsynproxy.c 34 if (!th->syn || !th->ack)
  /external/syslinux/gpxe/src/net/udp/
tftp.c 128 /** Send ACK packets */
193 /* Disable ACK sending. */
384 * Transmit ACK
390 struct tftp_ack *ack; local
399 DBGC2 ( tftp, "TFTP %p sending ACK for block %d\n", tftp, block );
402 iobuf = xfer_alloc_iob ( &tftp->socket, sizeof ( *ack ) );
406 /* Build ACK */
407 ack = iob_put ( iobuf, sizeof ( *ack ) );
408 ack->opcode = htons ( TFTP_ACK )
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_fast.c 538 struct eap_tlv_pac_ack_tlv *ack; local
540 buf = wpabuf_alloc(sizeof(*res) + sizeof(*ack));
544 wpa_printf(MSG_DEBUG, "EAP-FAST: Add PAC TLV (ack)");
545 ack = wpabuf_put(buf, sizeof(*ack));
546 ack->tlv_type = host_to_be16(EAP_TLV_PAC_TLV |
548 ack->length = host_to_be16(sizeof(*ack) - sizeof(struct eap_tlv_hdr));
549 ack->pac_type = host_to_be16(PAC_TYPE_PAC_ACKNOWLEDGEMENT);
550 ack->pac_len = host_to_be16(2)
    [all...]
  /external/mdnsresponder/mDNSShared/
dnsextd.c 2122 PktMsg ack; local
2160 PktMsg ack; local
    [all...]
  /external/scapy/scapy/layers/
inet.py 515 IntField("ack", 0),
550 # We do not support the four-way handshakes with the SYN+ACK
551 # answer split in two packets (one ACK and one SYN): in that
552 # case the ACK will be seen as an answer, but not the SYN.
554 # SYN packets without ACK are not answers
557 # SYN+ACK packets answer SYN packets
564 # Do not check ack value for SYN packets without ACK
566 and abs(other.ack - self.seq) > 2:
568 # Do not check ack value for RST packets without AC
    [all...]
  /prebuilts/go/darwin-x86/src/sync/atomic/
atomic_test.go 1210 ack := [2][3]int32{{-1, -1, -1}, {-1, -1, -1}}
1217 StoreInt32(&ack[me][i%3], my)
1218 for w := 1; LoadInt32(&ack[he][i%3]) == -1; w++ {
1223 his := LoadInt32(&ack[he][i%3])
1232 StoreInt32(&ack[me][(i-1)%3], -1)
1255 ack := [2][3]int64{{-1, -1, -1}, {-1, -1, -1}}
1262 StoreInt64(&ack[me][i%3], my)
1263 for w := 1; LoadInt64(&ack[he][i%3]) == -1; w++ {
1268 his := LoadInt64(&ack[he][i%3])
1277 StoreInt64(&ack[me][(i-1)%3], -1
    [all...]
  /prebuilts/go/linux-x86/src/sync/atomic/
atomic_test.go 1210 ack := [2][3]int32{{-1, -1, -1}, {-1, -1, -1}}
1217 StoreInt32(&ack[me][i%3], my)
1218 for w := 1; LoadInt32(&ack[he][i%3]) == -1; w++ {
1223 his := LoadInt32(&ack[he][i%3])
1232 StoreInt32(&ack[me][(i-1)%3], -1)
1255 ack := [2][3]int64{{-1, -1, -1}, {-1, -1, -1}}
1262 StoreInt64(&ack[me][i%3], my)
1263 for w := 1; LoadInt64(&ack[he][i%3]) == -1; w++ {
1268 his := LoadInt64(&ack[he][i%3])
1277 StoreInt64(&ack[me][(i-1)%3], -1
    [all...]
  /device/google/marlin/camera/QCamera2/stack/mm-camera-test/src/
mm_qcamera_socket.c 54 /* send ack back to client upon req */
90 /*Ack the command here*/
105 static ssize_t tuneserver_send_command_ack( uint8_t ack,
109 /* send ack back to client upon req */
110 rc = send(tsctrl->clientsocket_id, &ack, sizeof(ack), 0);
112 LOGE("ACK send returns error %s\n", strerror(errno));
135 LOGE(" Ack Failed for cmd %d\n", p->current_cmd);
152 LOGE(" Ack Failed for cmd %d\n", p->current_cmd);
169 LOGE(" Ack Failed for cmd %d\n", p->current_cmd)
    [all...]
  /external/antlr/antlr-3.4/runtime/Java/src/main/java/org/antlr/runtime/debug/
RemoteDebugEventSocketListener.java 177 ack(); method
243 ack(); method
247 protected void ack() { method in class:RemoteDebugEventSocketListener
248 out.println("ack");
  /external/libpcap/
pcap-netfilter-linux.c 249 netfilter_send_config_msg(const pcap_t *handle, u_int16_t msg_type, int ack, u_int8_t family, u_int16_t res_id, const struct my_nfattr *mynfa)
265 nlh->nlmsg_flags = NLM_F_REQUEST | (ack ? NLM_F_ACK : 0);
288 if (!ack)
  /frameworks/opt/net/voip/src/java/com/android/server/sip/
SipHelper.java 422 * @param event the INVITE ACK request event
429 Request ack = dialog.createAck(cseq); local
430 if (DBG) log("send ACK: " + ack);
431 dialog.sendAck(ack);

Completed in 738 milliseconds

1 2 34 5 6 7