/dragonfly/contrib/tcpdump/ |
H A D | print-tftp.c | 43 #define ACK 04 /* acknowledgement */ macro 65 { ACK, "ACK" }, /* acknowledgement */ 165 case ACK: in tftp_print()
|
H A D | CHANGES | 628 PGM: Add ACK decoding and add PGMCC DATA and FEEDBACK options.
|
/dragonfly/sys/bus/iicbus/pcf/ |
H A D | pcf.c | 60 #define ACK 0x01 macro 300 PCF_SET_S1(pcf, PIN|ES0|ENI|STO|ACK); in pcf_stop() 332 PCF_SET_S1(pcf, ES0|STA|STO|ACK); in pcf_repeated_start() 369 PCF_SET_S1(pcf, PIN|ES0|STA|ACK); in pcf_start() 490 PCF_SET_S1(pcf, PIN|ES0|ENI|ACK); in pcfintr() 537 PCF_SET_S1(pcf, PIN|ES0|ENI|ACK); in pcf_rst_card()
|
/dragonfly/usr.bin/tftp/ |
H A D | tftp.c | 167 if (ap->th_opcode == ACK) { in xmitfile() 233 ap->th_opcode = htons((u_short)ACK); in recvfile() 308 ap->th_opcode = htons((u_short)ACK); /* has seen err msg */ in recvfile() 407 case ACK: in tpacket()
|
/dragonfly/libexec/tftpd/ |
H A D | tftpd.c | 631 if (ap->th_opcode == ACK) { in xmitfile() 671 ap->th_opcode = htons((u_short)ACK); in recvfile() 714 ap->th_opcode = htons((u_short)ACK); /* send the "final" ack */ in recvfile() 863 if (ap->th_opcode == ACK && ap->th_block == 0) in oack()
|
/dragonfly/include/arpa/ |
H A D | tftp.h | 48 #define ACK 04 /* acknowledgement */ macro
|
/dragonfly/share/examples/pf/ |
H A D | faq-example2 | 13 # ACK queue. 24 # tcp_ack_out - TCP ACK packets with no data payload.
|
/dragonfly/etc/ |
H A D | pf.os | 36 # performance control (max. amount of data to be sent without ACK). 96 # - Selective ACK permitted - a flag set by systems that implement 97 # selective ACK functionality. 99 # - The sequence of TCP all options (MSS, window scaling, selective ACK 103 # header padding) and sackOK option (selective ACK feature). 144 # S - selective ACK OK 170 # at SYN+ACK - does it look similar? 173 # functionality, enable or disable timestamps or selective ACK, 247 # selective ACK: 553 # Another hardcore MSS, one of the ACK leakers hunted down.
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | eap_testing.txt | 361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 384 - sends tunneled EAP-Success with MPPE keys and expects to receive TLS ACK 389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
|
H A D | ChangeLog | 823 - extra waits to get ACK frames through 996 * Allow AP mode to disconnect STAs based on low ACK condition (when 2199 ACK, not tunneled EAP-Success (of which only the first byte was
|
/dragonfly/sys/dev/drm/amd/display/dc/core/ |
H A D | dc_link_dp.c | 1980 test_response.bits.ACK = 1; in handle_automated_test() 1988 test_response.bits.ACK = 0; in handle_automated_test() 1992 test_response.bits.ACK = 1; in handle_automated_test() 1996 test_response.bits.ACK = 1; in handle_automated_test() 2002 test_response.bits.ACK = 1; in handle_automated_test() 2004 if (test_response.bits.ACK) in handle_automated_test()
|
/dragonfly/usr.sbin/kbdcontrol/ |
H A D | lex.l | 81 ACK|ack { number = 6; return TNUM; }
|
/dragonfly/sys/netinet/ |
H A D | tcp_debug.c | 189 pf(SYN); pf(ACK); pf(FIN); pf(RST); pf(PUSH); pf(URG); in tcp_trace()
|
/dragonfly/sys/dev/drm/amd/display/dc/ |
H A D | dc_dp_types.h | 444 uint8_t ACK :1; member
|
/dragonfly/stand/lib/ |
H A D | tftp.c | 249 wbuf.t.th_opcode = htons((u_short) ACK); in tftp_getnextblock()
|
/dragonfly/tools/tools/net80211/wlaninject/ |
H A D | README | 22 -N Mark transmitted frames such that no ACK is expected. In practice,
|
/dragonfly/usr.sbin/ppp/ |
H A D | ppp.8.m4 | 1875 returns an ACK to the requester. 1881 send an ACK), IPCP is set to the open state and a network level connection 2586 means that the option will be ACK'd if the peer asks for it.
|