/third_party/gstreamer/gstreamer/docs/random/wtay/ |
D | threads_hilevel | 49 wait for ACK (release lock) ! 72 wait for ACK (release lock) ! 92 wait for ACK (release lock) ! 135 wait for ACK (release lock) ! 153 wait for ACK (release lock) !
|
/third_party/libcoap/man/ |
D | coap_async.txt.in | 57 For separate responses, there is an initial empty ACK response (Confirmable 114 * response (empty ACK followed by data response at a later stage). 154 * Not setting response code will cause empty ACK to be sent
|
D | coap_pdu_setup.txt.in | 126 of type CONFIRMABLE, then the response PDU is transmitted as an empty ACK 204 responses, the initial empty ACK response matches the _message_id_ of the 240 valid token which is used for matching. The exception is an empty ACK packet.
|
D | coap_handler.txt.in | 107 this is an ACK or RST response to the request. In general, matching of
|
/third_party/musl/porting/liteos_m/kernel/include/arpa/ |
D | tftp.h | 7 #define ACK 04 macro
|
/third_party/musl/porting/liteos_m_iccarm/kernel/include/arpa/ |
D | tftp.h | 7 #define ACK 04 macro
|
/third_party/musl/ndk_musl_include/arpa/ |
D | tftp.h | 7 #define ACK 04 macro
|
/third_party/musl/porting/uniproton/kernel/include/arpa/ |
D | tftp.h | 7 #define ACK 04 macro
|
/third_party/musl/include/arpa/ |
D | tftp.h | 7 #define ACK 04 macro
|
/third_party/openssl/doc/man3/ |
D | SSL_connect.pod | 40 corresponding ACK has been received yet from the peer. This can have performance 44 typical for many protocols) then this data could be buffered until an ACK has
|
D | SSL_read_early_data.pod | 254 yet received an ACK for from the peer. The buffered data will only be 256 the ACK is received from the peer. The initial ClientHello will be sent in the 261 buffered by the OS and not sent until an ACK is received for the first packet
|
/third_party/python/Lib/curses/ |
D | ascii.py | 9 ACK = 0x06 # ^F variable
|
D | textpad.py | 123 elif ch in (curses.ascii.ACK, curses.KEY_RIGHT): # ^f
|
/third_party/jerryscript/targets/curie_bsp/ |
D | README.md | 114 js e print ('Hello World!');js e 1 ACK 120 `js e 1 ACK` and `js e 1 OK` are debug info of Curie BSP uart commands, which mean it receive and e…
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | eap_testing.txt | 361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 384 - sends tunneled EAP-Success with MPPE keys and expects to receive TLS ACK 389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
|
D | ChangeLog | 876 - extra waits to get ACK frames through 1049 * Allow AP mode to disconnect STAs based on low ACK condition (when 2253 ACK, not tunneled EAP-Success (of which only the first byte was
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | eap_testing.txt | 361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 384 - sends tunneled EAP-Success with MPPE keys and expects to receive TLS ACK 389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
|
D | ChangeLog | 823 - extra waits to get ACK frames through 996 * Allow AP mode to disconnect STAs based on low ACK condition (when 2199 ACK, not tunneled EAP-Success (of which only the first byte was
|
/third_party/python/Doc/library/ |
D | curses.ascii.rst | 29 | :const:`ENQ` | Enquiry, goes with :const:`ACK` flow control | 31 | :const:`ACK` | Acknowledgement |
|
/third_party/nghttp2/ |
D | README.rst | 561 ; ACK 585 ; ACK 662 ; ACK 722 ; ACK 789 ; ACK 813 ; ACK
|
/third_party/iptables/ |
D | tests-extensions-add-some-testcases.patch | 425 -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG SYN;=;OK 426 -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,PSH,ACK,URG SYN;=;OK 427 -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG RST;=;OK
|
/third_party/python/Tools/unicode/python-mappings/ |
D | CP273.TXT | 47 0x2E 0x0006 #ACKNOWLEDGE (ACK)
|
/third_party/lwip/ |
D | CHANGELOG | 399 * tcpi_in.c: fixed bug #49717 (window size in received SYN and SYN-ACK 1051 * tcp_in.c: Fixed bug #36210 lwIP does not elicit an empty ACK when received 1052 unacceptable ACK 1457 * tcp_in.c: fixed bug #34111 RST for ACK to listening pcb has wrong seqno 1812 * tcp_in.c: Fixed bug #30577: tcp_input: don't discard ACK-only packets after 2237 value for TCP_WND to 4*TCP_MSS to keep delayed ACK working. 2244 * tcp_in.c: fix BUG#27445: grow cwnd with every duplicate ACK 3401 with SYN+ACK. 3998 * tcp_in.c: Duplicate FIN ACK race condition fix by Kelvin Lawson. 4054 * tcp.c: Increment pcb->snd_buf when ACK is received in SYN_SENT state. [all …]
|
/third_party/node/test/common/ |
D | README.md | 822 // ack is a boolean indicating whether or not to set the ACK flag.
|
/third_party/libwebsockets/lib/secure-streams/ |
D | README.md | 34 eg, a 200 for http, or an ACK from MQTT, the stream state is called back with
|