/external/ppp/pppd/ |
sys-solaris.c | 2648 struct T_optmgmt_ack ack; member in union:__anon32074 2650 } ack; local [all...] |
/cts/tests/tests/telephony/src/android/telephony/embms/cts/ |
MbmsDownloadFlowTest.java | 167 downloadResultAck.forEach((ack) -> assertEquals(MbmsDownloadReceiver.RESULT_OK, 168 ack.getInt(CtsDownloadService.ARGUMENT_RESULT_CODE, -1)));
|
/external/google-tv-pairing-protocol/cpp/src/polo/pairing/ |
pairingsession.cc | 238 message::SecretAckMessage ack(*alpha); 241 wire_->SendSecretAckMessage(ack);
|
/external/ltp/testcases/kernel/connectors/pec/ |
pec_listener.c | 166 cnmsg->ack = 0; 193 printf("none err: %u\n", pe->event_data.ack.err);
|
/external/scapy/scapy/modules/ |
nmap.py | 99 res["ACK"] = "S++" if pkt.ack == 2 else "S" if pkt.ack == 1 else "O" 208 "Resp", "DF", "W", "ACK", "Flags", "Ops",
|
p0f.py | 104 # SYN/ACK 107 # RST RST/ACK 110 # ACK 127 # raise TypeError("Not a SYN or SYN/ACK packet") 207 # RST+ACK packets" 213 if pkt.payload.seq == pkt.payload.ack: 215 # equal to ACK number." 231 if pkt.payload.ack != 0: 384 # 'K' quirk <=> RST+ACK 529 elif qq == 'A': pkt.payload.ack = RandInt( [all...] |
/external/wpa_supplicant_8/src/ap/ |
ieee802_11.h | 84 const u8 *buf, size_t len, int ack); 86 const u8 *data, size_t len, int ack);
|
/kernel/tests/net/test/ |
tcp_fastopen_test.py | 89 # Receive a SYN+ACK with a TFO cookie and expect the connection to proceed 96 desc, ack = packets.ACK(version, myaddr, remoteaddr, synack) 97 msg = "First connect: got SYN+ACK, expected %s" % desc 98 self.ExpectPacketOn(netid, msg, ack)
|
/external/okhttp/okhttp-tests/src/test/java/com/squareup/okhttp/internal/framed/ |
Http2ConnectionTest.java | 75 assertTrue(ping.ack); 97 assertFalse(pingFrame.ack); 109 peer.acceptFrame(); // ACK 111 peer.acceptFrame(); // ACK 2 120 // Verify the peer received the ACK. 124 assertTrue(ackFrame.ack); 128 assertTrue(ackFrame.ack); 468 peer.acceptFrame(); // ACK 476 // verify the peer received the ACK 480 assertTrue(ackFrame.ack); [all...] |
/external/tcpdump/ |
print-pgm.c | 106 PGM_ACK = 11, /* ACK for congestion control */ 403 const struct pgm_ack *ack; local 405 ack = (const struct pgm_ack *)(pgm + 1); 406 ND_TCHECK(*ack); 407 ND_PRINT((ndo, "ACK seq %u", 408 EXTRACT_32BITS(&ack->pgma_rx_max_seq))); 409 bp = (const u_char *) (ack + 1);
|
/system/tpm/trunks/ftdi/ |
mpsse.c | 284 SetAck(mpsse, ACK); 706 * read back each individual ACK bit, so set the transmit size to 1. 722 /* Read in the ACK bit and store it in mpsse->rack */ 918 * Returns the last received ACK bit. 922 * Returns either an ACK (0) or a NACK (1). 925 int ack = 0; local 928 ack = (mpsse->rack & 0x01); 931 return ack; 935 * Sets the transmitted ACK bit. 938 * @ack - 0 to send ACKs, 1 to send NACKs [all...] |
/external/webrtc/webrtc/p2p/base/ |
pseudotcp.cc | 548 << "><ACK=" << m_rcv_nxt 557 // Note: When len is 0, this is an ACK packet. We don't read the return value for those, 580 seg.ack = bytes_to_long(buffer + 8); 594 << "><ACK=" << seg.ack 650 // packet(tcb, seg.ack, 0, FLAG_RST, 0, 0); 709 // Check if this is a valuable ack 710 if ((seg.ack > m_snd_una) && (seg.ack <= m_snd_nxt)) { 741 uint32_t nAcked = seg.ack - m_snd_una [all...] |
pseudotcp.h | 89 OPT_ACKDELAY, // The Delayed ACK timeout (0 == off). 114 uint32_t conv, seq, ack; member in struct:cricket::PseudoTcp::Segment 139 // send payload or just an ACK packet. 145 // value is 0 then this is an ACK packet, otherwise this packet has payload.
|
/device/linaro/hikey/installer/hikey/ |
hisi-idt.py | 107 ack = self.s.read() 108 if len(ack) == 1: 109 if ack == chr(0xaa):
|
/external/iptables/utils/ |
nfsynproxy.c | 34 if (!th->syn || !th->ack)
|
/external/syslinux/gpxe/src/net/udp/ |
tftp.c | 128 /** Send ACK packets */ 193 /* Disable ACK sending. */ 384 * Transmit ACK 390 struct tftp_ack *ack; local 399 DBGC2 ( tftp, "TFTP %p sending ACK for block %d\n", tftp, block ); 402 iobuf = xfer_alloc_iob ( &tftp->socket, sizeof ( *ack ) ); 406 /* Build ACK */ 407 ack = iob_put ( iobuf, sizeof ( *ack ) ); 408 ack->opcode = htons ( TFTP_ACK ) [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
eap_fast.c | 538 struct eap_tlv_pac_ack_tlv *ack; local 540 buf = wpabuf_alloc(sizeof(*res) + sizeof(*ack)); 544 wpa_printf(MSG_DEBUG, "EAP-FAST: Add PAC TLV (ack)"); 545 ack = wpabuf_put(buf, sizeof(*ack)); 546 ack->tlv_type = host_to_be16(EAP_TLV_PAC_TLV | 548 ack->length = host_to_be16(sizeof(*ack) - sizeof(struct eap_tlv_hdr)); 549 ack->pac_type = host_to_be16(PAC_TYPE_PAC_ACKNOWLEDGEMENT); 550 ack->pac_len = host_to_be16(2) [all...] |
/external/mdnsresponder/mDNSShared/ |
dnsextd.c | 2122 PktMsg ack; local 2160 PktMsg ack; local [all...] |
/external/scapy/scapy/layers/ |
inet.py | 515 IntField("ack", 0), 550 # We do not support the four-way handshakes with the SYN+ACK 551 # answer split in two packets (one ACK and one SYN): in that 552 # case the ACK will be seen as an answer, but not the SYN. 554 # SYN packets without ACK are not answers 557 # SYN+ACK packets answer SYN packets 564 # Do not check ack value for SYN packets without ACK 566 and abs(other.ack - self.seq) > 2: 568 # Do not check ack value for RST packets without AC [all...] |
/prebuilts/go/darwin-x86/src/sync/atomic/ |
atomic_test.go | 1210 ack := [2][3]int32{{-1, -1, -1}, {-1, -1, -1}} 1217 StoreInt32(&ack[me][i%3], my) 1218 for w := 1; LoadInt32(&ack[he][i%3]) == -1; w++ { 1223 his := LoadInt32(&ack[he][i%3]) 1232 StoreInt32(&ack[me][(i-1)%3], -1) 1255 ack := [2][3]int64{{-1, -1, -1}, {-1, -1, -1}} 1262 StoreInt64(&ack[me][i%3], my) 1263 for w := 1; LoadInt64(&ack[he][i%3]) == -1; w++ { 1268 his := LoadInt64(&ack[he][i%3]) 1277 StoreInt64(&ack[me][(i-1)%3], -1 [all...] |
/prebuilts/go/linux-x86/src/sync/atomic/ |
atomic_test.go | 1210 ack := [2][3]int32{{-1, -1, -1}, {-1, -1, -1}} 1217 StoreInt32(&ack[me][i%3], my) 1218 for w := 1; LoadInt32(&ack[he][i%3]) == -1; w++ { 1223 his := LoadInt32(&ack[he][i%3]) 1232 StoreInt32(&ack[me][(i-1)%3], -1) 1255 ack := [2][3]int64{{-1, -1, -1}, {-1, -1, -1}} 1262 StoreInt64(&ack[me][i%3], my) 1263 for w := 1; LoadInt64(&ack[he][i%3]) == -1; w++ { 1268 his := LoadInt64(&ack[he][i%3]) 1277 StoreInt64(&ack[me][(i-1)%3], -1 [all...] |
/device/google/marlin/camera/QCamera2/stack/mm-camera-test/src/ |
mm_qcamera_socket.c | 54 /* send ack back to client upon req */ 90 /*Ack the command here*/ 105 static ssize_t tuneserver_send_command_ack( uint8_t ack, 109 /* send ack back to client upon req */ 110 rc = send(tsctrl->clientsocket_id, &ack, sizeof(ack), 0); 112 LOGE("ACK send returns error %s\n", strerror(errno)); 135 LOGE(" Ack Failed for cmd %d\n", p->current_cmd); 152 LOGE(" Ack Failed for cmd %d\n", p->current_cmd); 169 LOGE(" Ack Failed for cmd %d\n", p->current_cmd) [all...] |
/external/antlr/antlr-3.4/runtime/Java/src/main/java/org/antlr/runtime/debug/ |
RemoteDebugEventSocketListener.java | 177 ack(); method 243 ack(); method 247 protected void ack() { method in class:RemoteDebugEventSocketListener 248 out.println("ack");
|
/external/libpcap/ |
pcap-netfilter-linux.c | 249 netfilter_send_config_msg(const pcap_t *handle, u_int16_t msg_type, int ack, u_int8_t family, u_int16_t res_id, const struct my_nfattr *mynfa) 265 nlh->nlmsg_flags = NLM_F_REQUEST | (ack ? NLM_F_ACK : 0); 288 if (!ack)
|
/frameworks/opt/net/voip/src/java/com/android/server/sip/ |
SipHelper.java | 422 * @param event the INVITE ACK request event 429 Request ack = dialog.createAck(cseq); local 430 if (DBG) log("send ACK: " + ack); 431 dialog.sendAck(ack);
|