/external/tcpdump/tests/ |
D | lmp.out | 4 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 Config ACK Message, length: 48 6 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 Link Summary ACK Message, length: 16 8 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 Begin Verify ACK Message, length: 40 11 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 End Verify ACK Message, length: 24 14 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 Test Status ACK Message, length: 24 15 IP 10.0.12.1.49998 > 10.0.12.2.49998: LMPv1 Channel Status ACK Message, length: 16
|
D | mstp-v.out | 8 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 11 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root 21 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root 24 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 34 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 37 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root 47 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root 50 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 60 MSTI 1, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Designated 63 MSTI 2, Flags [Learn, Forward, Agreement, Topology change ACK], port-role Root [all …]
|
D | forces2vvv.out | 6 1) [INIT ACK] [init tag: 3861163764] [rwnd: 57344] [OS: 1] [MIS: 1] [init TSN: 2413889661] 12 1) [COOKIE ACK] 18 1) [INIT ACK] [init tag: 562272820] [rwnd: 57344] [OS: 1] [MIS: 1] [init TSN: 2275981483] 24 1) [COOKIE ACK] 30 1) [INIT ACK] [init tag: 2538997808] [rwnd: 57344] [OS: 1] [MIS: 1] [init TSN: 2244318871] 36 1) [COOKIE ACK] 102 1) [HB ACK] 108 1) [HB ACK] 114 1) [HB ACK] 120 1) [HB ACK] [all …]
|
D | forces2vv.out | 6 1) [INIT ACK] [init tag: 970400624] [rwnd: 57344] [OS: 1] [MIS: 1] [init TSN: 918167005] 12 1) [COOKIE ACK] 18 1) [INIT ACK] [init tag: 3835501490] [rwnd: 57344] [OS: 1] [MIS: 1] [init TSN: 2895206285] 24 1) [COOKIE ACK] 30 1) [INIT ACK] [init tag: 1840401365] [rwnd: 57344] [OS: 1] [MIS: 1] [init TSN: 1469124988] 36 1) [COOKIE ACK] 132 1) [HB ACK] 138 1) [HB ACK] 144 1) [HB ACK] 150 1) [HB ACK] [all …]
|
D | radius-rfc5176-v.out | 7 Disconnect-ACK (41), id: 0x02, Authenticator: 3bc9c343f689990756b96c583a56890a 19 CoA-ACK (44), id: 0x05, Authenticator: 55ab6cb78aa161d692753fa9130c5019
|
D | lmp-v.out | 43 LMPv1, msg-type: Config ACK, Flags: [none], length: 48 68 LMPv1, msg-type: Link Summary ACK, Flags: [none], length: 16 102 LMPv1, msg-type: Begin Verify ACK, Flags: [none], length: 40 107 Verify Begin ACK Object (9), Class-Type: 1 (1) Flags: [negotiable], length: 8 130 LMPv1, msg-type: End Verify ACK, Flags: [none], length: 24 151 LMPv1, msg-type: Test Status ACK, Flags: [none], length: 24 158 LMPv1, msg-type: Channel Status ACK, Flags: [none], length: 16
|
D | forces1.out | 28 IP 150.140.254.202.57077 > 211.129.72.8.6704: sctp[ForCES HP] (1) [HB ACK] 32 IP 211.129.72.8.6704 > 150.140.254.202.57077: sctp[ForCES HP] (1) [HB ACK]
|
D | trunc_aack.out | 1 PAP, Auth-ACK (0x02), id 1[|pap]
|
/external/iptables/iptables/tests/shell/testcases/ipt-save/dumps/ |
D | wireless.txt | 29 -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m multiport --dports 22,80,443,873,1723 -j … 32 -A INPUT -s 10.31.70.8/29 -i bond0.208 -p tcp -m tcp --dport 179 --tcp-flags FIN,SYN,RST,ACK SYN -j… 33 -A INPUT -s 10.44.224.8/29 -i bond0.686 -p tcp -m tcp --dport 179 --tcp-flags FIN,SYN,RST,ACK SYN -… 56 -A CUST_I15_IN -p tcp -m tcp --dport 22 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT 57 -A CUST_I15_IN -p tcp -m tcp --dport 80 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT 58 -A CUST_I15_IN -p tcp -m tcp --dport 433 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT 59 -A CUST_I15_IN -p tcp -m tcp --dport 3306 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT 60 -A CUST_I15_IN -p tcp -m tcp --dport 3390 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT 62 -A CUST_I15_OUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -m multiport --dports 80,443 -j L_ACC… 64 -A CUST_I16_IN -p tcp -m tcp --dport 3390 --tcp-flags FIN,SYN,RST,ACK SYN -j L_ACCEPT [all …]
|
/external/iptables/extensions/ |
D | libxt_tcp.t | 20 -p tcp -m tcp --syn;-p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN;OK 21 -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN;=;OK 22 -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG SYN;=;OK 23 -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,PSH,ACK,URG SYN;=;OK 24 -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG RST;=;OK
|
D | libxt_tcp.man | 24 .BR "SYN ACK FIN RST URG PSH ALL NONE" . 27 iptables \-A FORWARD \-p tcp \-\-tcp\-flags SYN,ACK,FIN,RST SYN 29 will only match packets with the SYN flag set, and the ACK, FIN and 33 Only match TCP packets with the SYN bit set and the ACK,RST and FIN bits 38 It is equivalent to \fB\-\-tcp\-flags SYN,RST,ACK,FIN SYN\fP.
|
D | libxt_SYNPROXY.man | 53 Catch UNTRACKED (SYN packets) and INVALID (3WHS ACK packets) states 55 SYN+ACK syncookies, create ESTABLISHED for valid client response (3WHS ACK 57 during 3WHS will not match and continue (e.g. SYN+FIN, SYN+ACK).
|
D | libxt_TCPMSS.t | 5 -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -j TCPMSS --set-mss 42;=;OK 6 -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN -j TCPMSS --clamp-mss-to-pmtu;=;OK
|
D | libxt_dccp.t | 21 -p dccp -m dccp --dccp-types REQUEST,RESPONSE,DATA,ACK,DATAACK,CLOSEREQ,CLOSE,RESET,SYNC,SYNCACK,IN… 22 -p dccp -m dccp ! --dccp-types REQUEST,RESPONSE,DATA,ACK,DATAACK,CLOSEREQ,CLOSE,RESET,SYNC,SYNCACK,…
|
D | libxt_tcpmss.man | 1 …nt size) field of the TCP header. You can only use this on TCP SYN or SYN/ACK packets, since the …
|
D | libxt_dccp.man | 9 .BR "REQUEST RESPONSE DATA ACK DATAACK CLOSEREQ CLOSE RESET SYNC SYNCACK INVALID" .
|
/external/testng/src/main/java/org/testng/remote/ |
D | RemoteArgs.java | 14 public static final String ACK = "-ack"; field in RemoteArgs 15 @Parameter(names = ACK, description = "Use ACK's")
|
/external/tcpdump/ |
D | print-tftp.c | 45 #define ACK 04 /* acknowledgement */ macro 68 { ACK, "ACK" }, /* acknowledgement */ 167 case ACK: in tftp_print()
|
/external/mtpd/ |
D | l2tp.c | 48 ACK = 0, enumerator 210 incoming.message = ACK; in recv_packet() 219 if (incoming.message != ACK) { in recv_packet() 235 if (incoming.message != ACK) { in recv_packet() 577 case ACK: in l2tp_process() 597 if (incoming.message == ACK) { in l2tp_process() 607 state = ACK; in l2tp_process()
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
D | TokenNames.java | 46 public static final String ACK = Request.ACK; field
|
/external/bcc/tools/ |
D | tcpdrop_example.txt | 9 20:49:06 0 4 10.32.119.56:443 > 10.66.65.252:22912 CLOSE (ACK) 40 20:49:50 12431 4 127.0.0.1:8198 > 127.0.0.1:48280 CLOSE (RST|ACK)
|
/external/nist-sip/java/gov/nist/javax/sip/message/ |
D | SIPRequest.java | 119 putName(Request.ACK); 821 newRequest.setMethod(Request.ACK); in createAckRequest() 853 cseq.setMethod(Request.ACK); in createAckRequest() 918 newRequest.setMethod(Request.ACK); in createErrorAck() 927 newRequest.getCSeq().setMethod(Request.ACK); in createErrorAck() 1065 requestLine.setMethod(Request.ACK); in createACKRequest()
|
/external/nist-sip/java/javax/sip/message/ |
D | Request.java | 7 String ACK = "ACK"; field
|
/external/iputils/ |
D | tftp.h | 49 #define ACK 04 /* acknowledgement */ macro
|
D | tftpd.c | 392 if (ap->th_opcode == ACK) { in sendfile() 432 ap->th_opcode = htons((u_short)ACK); in recvfile() 477 ap->th_opcode = htons((u_short)ACK); /* send the "final" ack */ in recvfile()
|