Home
last modified time | relevance | path

Searched refs:ACK (Results 1 – 25 of 37) sorted by relevance

12

/third_party/gstreamer/gstreamer/docs/random/wtay/
Dthreads_hilevel49 wait for ACK (release lock) !
72 wait for ACK (release lock) !
92 wait for ACK (release lock) !
135 wait for ACK (release lock) !
153 wait for ACK (release lock) !
/third_party/libcoap/man/
Dcoap_async.txt.in57 For separate responses, there is an initial empty ACK response (Confirmable
114 * response (empty ACK followed by data response at a later stage).
154 * Not setting response code will cause empty ACK to be sent
Dcoap_pdu_setup.txt.in126 of type CONFIRMABLE, then the response PDU is transmitted as an empty ACK
204 responses, the initial empty ACK response matches the _message_id_ of the
240 valid token which is used for matching. The exception is an empty ACK packet.
Dcoap_handler.txt.in107 this is an ACK or RST response to the request. In general, matching of
/third_party/musl/porting/liteos_m/kernel/include/arpa/
Dtftp.h7 #define ACK 04 macro
/third_party/musl/porting/liteos_m_iccarm/kernel/include/arpa/
Dtftp.h7 #define ACK 04 macro
/third_party/musl/ndk_musl_include/arpa/
Dtftp.h7 #define ACK 04 macro
/third_party/musl/porting/uniproton/kernel/include/arpa/
Dtftp.h7 #define ACK 04 macro
/third_party/musl/include/arpa/
Dtftp.h7 #define ACK 04 macro
/third_party/openssl/doc/man3/
DSSL_connect.pod40 corresponding ACK has been received yet from the peer. This can have performance
44 typical for many protocols) then this data could be buffered until an ACK has
DSSL_read_early_data.pod254 yet received an ACK for from the peer. The buffered data will only be
256 the ACK is received from the peer. The initial ClientHello will be sent in the
261 buffered by the OS and not sent until an ACK is received for the first packet
/third_party/python/Lib/curses/
Dascii.py9 ACK = 0x06 # ^F variable
Dtextpad.py123 elif ch in (curses.ascii.ACK, curses.KEY_RIGHT): # ^f
/third_party/jerryscript/targets/curie_bsp/
DREADME.md114 js e print ('Hello World!');js e 1 ACK
120 `js e 1 ACK` and `js e 1 OK` are debug info of Curie BSP uart commands, which mean it receive and e…
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
Deap_testing.txt361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
384 - sends tunneled EAP-Success with MPPE keys and expects to receive TLS ACK
389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
DChangeLog876 - extra waits to get ACK frames through
1049 * Allow AP mode to disconnect STAs based on low ACK condition (when
2253 ACK, not tunneled EAP-Success (of which only the first byte was
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
Deap_testing.txt361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
384 - sends tunneled EAP-Success with MPPE keys and expects to receive TLS ACK
389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
DChangeLog823 - extra waits to get ACK frames through
996 * Allow AP mode to disconnect STAs based on low ACK condition (when
2199 ACK, not tunneled EAP-Success (of which only the first byte was
/third_party/python/Doc/library/
Dcurses.ascii.rst29 | :const:`ENQ` | Enquiry, goes with :const:`ACK` flow control |
31 | :const:`ACK` | Acknowledgement |
/third_party/nghttp2/
DREADME.rst561 ; ACK
585 ; ACK
662 ; ACK
722 ; ACK
789 ; ACK
813 ; ACK
/third_party/iptables/
Dtests-extensions-add-some-testcases.patch425 -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG SYN;=;OK
426 -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,PSH,ACK,URG SYN;=;OK
427 -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG RST;=;OK
/third_party/python/Tools/unicode/python-mappings/
DCP273.TXT47 0x2E 0x0006 #ACKNOWLEDGE (ACK)
/third_party/lwip/
DCHANGELOG399 * tcpi_in.c: fixed bug #49717 (window size in received SYN and SYN-ACK
1051 * tcp_in.c: Fixed bug #36210 lwIP does not elicit an empty ACK when received
1052 unacceptable ACK
1457 * tcp_in.c: fixed bug #34111 RST for ACK to listening pcb has wrong seqno
1812 * tcp_in.c: Fixed bug #30577: tcp_input: don't discard ACK-only packets after
2237 value for TCP_WND to 4*TCP_MSS to keep delayed ACK working.
2244 * tcp_in.c: fix BUG#27445: grow cwnd with every duplicate ACK
3401 with SYN+ACK.
3998 * tcp_in.c: Duplicate FIN ACK race condition fix by Kelvin Lawson.
4054 * tcp.c: Increment pcb->snd_buf when ACK is received in SYN_SENT state.
[all …]
/third_party/node/test/common/
DREADME.md822 // ack is a boolean indicating whether or not to set the ACK flag.
/third_party/libwebsockets/lib/secure-streams/
DREADME.md34 eg, a 200 for http, or an ACK from MQTT, the stream state is called back with

12