Home
last modified time | relevance | path

Searched refs:ACK (Results 1 – 17 of 17) sorted by relevance

/dragonfly/contrib/tcpdump/
H A Dprint-tftp.c43 #define ACK 04 /* acknowledgement */ macro
65 { ACK, "ACK" }, /* acknowledgement */
165 case ACK: in tftp_print()
H A DCHANGES628 PGM: Add ACK decoding and add PGMCC DATA and FEEDBACK options.
/dragonfly/sys/bus/iicbus/pcf/
H A Dpcf.c60 #define ACK 0x01 macro
300 PCF_SET_S1(pcf, PIN|ES0|ENI|STO|ACK); in pcf_stop()
332 PCF_SET_S1(pcf, ES0|STA|STO|ACK); in pcf_repeated_start()
369 PCF_SET_S1(pcf, PIN|ES0|STA|ACK); in pcf_start()
490 PCF_SET_S1(pcf, PIN|ES0|ENI|ACK); in pcfintr()
537 PCF_SET_S1(pcf, PIN|ES0|ENI|ACK); in pcf_rst_card()
/dragonfly/usr.bin/tftp/
H A Dtftp.c167 if (ap->th_opcode == ACK) { in xmitfile()
233 ap->th_opcode = htons((u_short)ACK); in recvfile()
308 ap->th_opcode = htons((u_short)ACK); /* has seen err msg */ in recvfile()
407 case ACK: in tpacket()
/dragonfly/libexec/tftpd/
H A Dtftpd.c631 if (ap->th_opcode == ACK) { in xmitfile()
671 ap->th_opcode = htons((u_short)ACK); in recvfile()
714 ap->th_opcode = htons((u_short)ACK); /* send the "final" ack */ in recvfile()
863 if (ap->th_opcode == ACK && ap->th_block == 0) in oack()
/dragonfly/include/arpa/
H A Dtftp.h48 #define ACK 04 /* acknowledgement */ macro
/dragonfly/share/examples/pf/
H A Dfaq-example213 # ACK queue.
24 # tcp_ack_out - TCP ACK packets with no data payload.
/dragonfly/etc/
H A Dpf.os36 # performance control (max. amount of data to be sent without ACK).
96 # - Selective ACK permitted - a flag set by systems that implement
97 # selective ACK functionality.
99 # - The sequence of TCP all options (MSS, window scaling, selective ACK
103 # header padding) and sackOK option (selective ACK feature).
144 # S - selective ACK OK
170 # at SYN+ACK - does it look similar?
173 # functionality, enable or disable timestamps or selective ACK,
247 # selective ACK:
553 # Another hardcore MSS, one of the ACK leakers hunted down.
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/
H A Deap_testing.txt361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
384 - sends tunneled EAP-Success with MPPE keys and expects to receive TLS ACK
389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
H A DChangeLog823 - extra waits to get ACK frames through
996 * Allow AP mode to disconnect STAs based on low ACK condition (when
2199 ACK, not tunneled EAP-Success (of which only the first byte was
/dragonfly/sys/dev/drm/amd/display/dc/core/
H A Ddc_link_dp.c1980 test_response.bits.ACK = 1; in handle_automated_test()
1988 test_response.bits.ACK = 0; in handle_automated_test()
1992 test_response.bits.ACK = 1; in handle_automated_test()
1996 test_response.bits.ACK = 1; in handle_automated_test()
2002 test_response.bits.ACK = 1; in handle_automated_test()
2004 if (test_response.bits.ACK) in handle_automated_test()
/dragonfly/usr.sbin/kbdcontrol/
H A Dlex.l81 ACK|ack { number = 6; return TNUM; }
/dragonfly/sys/netinet/
H A Dtcp_debug.c189 pf(SYN); pf(ACK); pf(FIN); pf(RST); pf(PUSH); pf(URG); in tcp_trace()
/dragonfly/sys/dev/drm/amd/display/dc/
H A Ddc_dp_types.h444 uint8_t ACK :1; member
/dragonfly/stand/lib/
H A Dtftp.c249 wbuf.t.th_opcode = htons((u_short) ACK); in tftp_getnextblock()
/dragonfly/tools/tools/net80211/wlaninject/
H A DREADME22 -N Mark transmitted frames such that no ACK is expected. In practice,
/dragonfly/usr.sbin/ppp/
H A Dppp.8.m41875 returns an ACK to the requester.
1881 send an ACK), IPCP is set to the open state and a network level connection
2586 means that the option will be ACK'd if the peer asks for it.