/external/tcpdump/tests/ |
D | lmp.out | 4 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 Config ACK Message, length: 48 6 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 Link Summary ACK Message, length: 16 8 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 Begin Verify ACK Message, length: 40 11 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 End Verify ACK Message, length: 24 14 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 Test Status ACK Message, length: 24 15 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 Channel Status ACK Message, length: 16
|
D | mstp-v.out | 8 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 11 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root 21 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root 24 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 34 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 37 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root 47 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root 50 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 60 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 63 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root [all …]
|
D | forces2vvv.out | 6 1) [INIT ACK] [init tag: 3861163764] [rwnd: 57344] [OS: 1] [MIS: 1] [init TSN: 2413889661] 12 1) [COOKIE ACK] 18 1) [INIT ACK] [init tag: 562272820] [rwnd: 57344] [OS: 1] [MIS: 1] [init TSN: 2275981483] 24 1) [COOKIE ACK] 30 1) [INIT ACK] [init tag: 2538997808] [rwnd: 57344] [OS: 1] [MIS: 1] [init TSN: 2244318871] 36 1) [COOKIE ACK] 102 1) [HB ACK] 108 1) [HB ACK] 114 1) [HB ACK] 120 1) [HB ACK] [all …]
|
D | forces2vv.out | 6 1) [INIT ACK] [init tag: 970400624] [rwnd: 57344] [OS: 1] [MIS: 1] [init TSN: 918167005] 12 1) [COOKIE ACK] 18 1) [INIT ACK] [init tag: 3835501490] [rwnd: 57344] [OS: 1] [MIS: 1] [init TSN: 2895206285] 24 1) [COOKIE ACK] 30 1) [INIT ACK] [init tag: 1840401365] [rwnd: 57344] [OS: 1] [MIS: 1] [init TSN: 1469124988] 36 1) [COOKIE ACK] 132 1) [HB ACK] 138 1) [HB ACK] 144 1) [HB ACK] 150 1) [HB ACK] [all …]
|
D | radius-rfc5176-v.out | 7 Disconnect-ACK (41), id: 0x02, Authenticator: 3bc9c343f689990756b96c583a56890a 19 CoA-ACK (44), id: 0x05, Authenticator: 55ab6cb78aa161d692753fa9130c5019
|
D | lmp-v.out | 43 LMPv1, msg-type: Config ACK, Flags: [none], length: 48 68 LMPv1, msg-type: Link Summary ACK, Flags: [none], length: 16 102 LMPv1, msg-type: Begin Verify ACK, Flags: [none], length: 40 107 Verify Begin ACK Object (9), Class-Type: 1 (1) Flags: [negotiable], length: 8 130 LMPv1, msg-type: End Verify ACK, Flags: [none], length: 24 151 LMPv1, msg-type: Test Status ACK, Flags: [none], length: 24 158 LMPv1, msg-type: Channel Status ACK, Flags: [none], length: 16
|
D | forces1.out | 28 IP 150.140.254.202.57077 > 211.129.72.8.6704: sctp[ForCES HP] (1) [HB ACK] 32 IP 211.129.72.8.6704 > 150.140.254.202.57077: sctp[ForCES HP] (1) [HB ACK]
|
D | dhcp-rfc5859-v.out | 39 DHCP-Message Option 53, length 1: ACK
|
/external/iptables/extensions/ |
D | libxt_tcp.man | 25 .BR "SYN ACK FIN RST URG PSH ALL NONE" . 28 iptables \-A FORWARD \-p tcp \-\-tcp\-flags SYN,ACK,FIN,RST SYN 30 will only match packets with the SYN flag set, and the ACK, FIN and 34 Only match TCP packets with the SYN bit set and the ACK,RST and FIN bits 39 It is equivalent to \fB\-\-tcp\-flags SYN,RST,ACK,FIN SYN\fP.
|
D | libxt_tcpmss.man | 1 …nt size) field of the TCP header. You can only use this on TCP SYN or SYN/ACK packets, since the …
|
D | libxt_dccp.man | 9 .BR "REQUEST RESPONSE DATA ACK DATAACK CLOSEREQ CLOSE RESET SYNC SYNCACK INVALID" .
|
/external/tcpdump/ |
D | print-tftp.c | 46 #define ACK 04 /* acknowledgement */ macro 84 { ACK, "ACK" }, /* acknowledgement */ 158 case ACK: in tftp_print()
|
/external/testng/src/main/java/org/testng/remote/ |
D | RemoteArgs.java | 14 public static final String ACK = "-ack"; field in RemoteArgs 15 @Parameter(names = ACK, description = "Use ACK's")
|
/external/mtpd/ |
D | l2tp.c | 43 ACK = 0, enumerator 205 incoming.message = ACK; in recv_packet() 214 if (incoming.message != ACK) { in recv_packet() 230 if (incoming.message != ACK) { in recv_packet() 477 case ACK: in l2tp_process() 496 if (incoming.message == ACK) { in l2tp_process() 506 state = ACK; in l2tp_process()
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
D | TokenNames.java | 46 public static final String ACK = Request.ACK; field
|
D | Parser.java | 83 || token.getTokenType() == ACK in method()
|
/external/nist-sip/java/gov/nist/javax/sip/message/ |
D | SIPRequest.java | 119 putName(Request.ACK); 821 newRequest.setMethod(Request.ACK); in createAckRequest() 853 cseq.setMethod(Request.ACK); in createAckRequest() 918 newRequest.setMethod(Request.ACK); in createErrorAck() 927 newRequest.getCSeq().setMethod(Request.ACK); in createErrorAck() 1065 requestLine.setMethod(Request.ACK); in createACKRequest()
|
/external/nist-sip/java/javax/sip/message/ |
D | Request.java | 7 String ACK = "ACK"; field
|
/external/iputils/ |
D | tftpd.c | 392 if (ap->th_opcode == ACK) { in sendfile() 432 ap->th_opcode = htons((u_short)ACK); in recvfile() 477 ap->th_opcode = htons((u_short)ACK); /* send the "final" ack */ in recvfile()
|
D | tftp.h | 49 #define ACK 04 /* acknowledgement */ macro
|
/external/nist-sip/java/gov/nist/javax/sip/ |
D | EventScanner.java | 180 if (sipRequest.getMethod().equals(Request.ACK) in deliverEvent() 263 .equals(Request.ACK)) { in deliverEvent()
|
D | SipProviderImpl.java | 285 if ( sipRequest.getMethod().equals(Request.ACK)) { in getNewClientTransaction() 286 …throw new TransactionUnavailableException ("Cannot create client transaction for " + Request.ACK); in getNewClientTransaction() 465 if ( request.getMethod().equals(Request.ACK)) { in getNewServerTransaction() 672 && request.getMethod().equals(Request.ACK)) { in sendRequest()
|
/external/iptables/utils/ |
D | pf.os | 35 # performance control (max. amount of data to be sent without ACK). 95 # - Selective ACK permitted - a flag set by systems that implement 96 # selective ACK functionality. 98 # - The sequence of TCP all options (MSS, window scaling, selective ACK 102 # header padding) and sackOK option (selective ACK feature). 143 # S - selective ACK OK 169 # at SYN+ACK - does it look similar? 172 # functionality, enable or disable timestamps or selective ACK, 240 # selective ACK: 531 # Another hardcore MSS, one of the ACK leakers hunted down.
|
/external/nist-sip/java/gov/nist/javax/sip/stack/ |
D | SIPClientTransaction.java | 426 if (transactionRequest.getMethod().equals(Request.ACK)) { in sendMessage() 458 } else if (transactionRequest.getMethod().equals(Request.ACK)) { in sendMessage() 1111 if (originalRequest.getMethod().equalsIgnoreCase(Request.ACK)) in createCancel() 1129 if (getMethod().equalsIgnoreCase(Request.ACK)) { in createAck()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | eap_testing.txt | 361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 384 - sends tunneled EAP-Success with MPPE keys and expects to receive TLS ACK 389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
|