Home
last modified time | relevance | path

Searched refs:ACK (Results 1 – 25 of 29) sorted by relevance

12

/external/iptables/extensions/
Dlibip6t_tcp.man26 .BR "SYN ACK FIN RST URG PSH ALL NONE" .
29 ip6tables -A FORWARD -p tcp --tcp-flags SYN,ACK,FIN,RST SYN
31 will only match packets with the SYN flag set, and the ACK, FIN and
35 Only match TCP packets with the SYN bit set and the ACK and RST bits
40 It is equivalent to \fB--tcp-flags SYN,RST,ACK SYN\fP.
Dlibipt_tcp.man26 .BR "SYN ACK FIN RST URG PSH ALL NONE" .
29 iptables -A FORWARD -p tcp --tcp-flags SYN,ACK,FIN,RST SYN
31 will only match packets with the SYN flag set, and the ACK, FIN and
35 Only match TCP packets with the SYN bit set and the ACK,RST and FIN bits
40 It is equivalent to \fB--tcp-flags SYN,RST,ACK,FIN SYN\fP.
Dlibipt_tcpmss.man1 …nt size) field of the TCP header. You can only use this on TCP SYN or SYN/ACK packets, since the …
Dlibipt_dccp.man9 .BR "REQUEST RESPONSE DATA ACK DATAACK CLOSEREQ CLOSE RESET SYNC SYNCACK INVALID" .
/external/mtpd/
Dl2tp.c41 ACK = 0, enumerator
200 incoming.message = ACK; in recv_packet()
209 if (incoming.message != ACK) { in recv_packet()
225 if (incoming.message != ACK) { in recv_packet()
476 case ACK: in l2tp_process()
495 if (incoming.message == ACK) { in l2tp_process()
505 state = ACK; in l2tp_process()
/external/tcpdump/tests/
Dlmp.new40 LMPv1, msg-type: Config ACK, Flags: [Control Channel Down], length: 48
63 LMPv1, msg-type: Link Summary ACK, Flags: [Control Channel Down], length: 16
100 LMPv1, msg-type: Begin Verify ACK, Flags: [Control Channel Down], length: 40
105 Verify Begin ACK Object (9), Class-Type: 1 (1) Flags: [negotiable], length: 8
128 LMPv1, msg-type: End Verify ACK, Flags: [Control Channel Down], length: 24
146 LMPv1, msg-type: Test Status ACK, Flags: [Control Channel Down], length: 24
152 LMPv1, msg-type: Channel Status ACK, Flags: [Control Channel Down], length: 16
Dlmp.out40 LMPv1, msg-type: Config ACK, Flags: [Control Channel Down], length: 48
63 LMPv1, msg-type: Link Summary ACK, Flags: [Control Channel Down], length: 16
100 LMPv1, msg-type: Begin Verify ACK, Flags: [Control Channel Down], length: 40
105 Verify Begin ACK Object (9), Class-Type: 1 (1) Flags: [negotiable], length: 8
128 LMPv1, msg-type: End Verify ACK, Flags: [Control Channel Down], length: 24
146 LMPv1, msg-type: Test Status ACK, Flags: [Control Channel Down], length: 24
152 LMPv1, msg-type: Channel Status ACK, Flags: [Control Channel Down], length: 16
/external/tcpdump/
Dprint-tftp.c52 { ACK, "ACK" }, /* acknowledgement */
134 case ACK: in tftp_print()
Dtftp.h51 #define ACK 04 /* acknowledgement */ macro
/external/nist-sip/java/gov/nist/javax/sip/parser/
DTokenNames.java46 public static final String ACK = Request.ACK; field
DParser.java83 || token.getTokenType() == ACK in method()
DLexer.java100 addKeyword(TokenNames.ACK, TokenTypes.ACK); in selectLexer()
DTokenTypes.java43 public static final int ACK = START + 6; field
/external/nist-sip/java/gov/nist/javax/sip/message/
DSIPRequest.java119 putName(Request.ACK);
821 newRequest.setMethod(Request.ACK); in createAckRequest()
853 cseq.setMethod(Request.ACK); in createAckRequest()
918 newRequest.setMethod(Request.ACK); in createErrorAck()
927 newRequest.getCSeq().setMethod(Request.ACK); in createErrorAck()
1065 requestLine.setMethod(Request.ACK); in createACKRequest()
DSIPResponse.java628 if (method.equals( Request.ACK ) ) { in setBranch()
/external/wpa_supplicant/
Deap_testing.txt320 sent successfully; ACS is replying with empty PEAP packet (TLS ACK);
321 wpa_supplicant tries to decrypt this.. Replying with TLS ACK and and
328 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
334 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
351 - sends tunneled EAP-Success with MPPE keys and expects to receive TLS ACK
356 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
/external/nist-sip/java/javax/sip/message/
DRequest.java7 String ACK = "ACK"; field
/external/nist-sip/java/gov/nist/javax/sip/
DEventScanner.java180 if (sipRequest.getMethod().equals(Request.ACK) in deliverEvent()
263 .equals(Request.ACK)) { in deliverEvent()
DSipProviderImpl.java285 if ( sipRequest.getMethod().equals(Request.ACK)) { in getNewClientTransaction()
286 …throw new TransactionUnavailableException ("Cannot create client transaction for " + Request.ACK); in getNewClientTransaction()
465 if ( request.getMethod().equals(Request.ACK)) { in getNewServerTransaction()
672 && request.getMethod().equals(Request.ACK)) { in sendRequest()
DDialogFilter.java439 } else if (sipRequest.getMethod().equals(Request.ACK)) { in processRequest()
865 && !sipRequest.getMethod().equals(Request.ACK) in processRequest()
DSipStackImpl.java675 || em.equalsIgnoreCase(Request.ACK) in SipStackImpl()
/external/nist-sip/java/gov/nist/javax/sip/stack/
DSIPClientTransaction.java426 if (transactionRequest.getMethod().equals(Request.ACK)) { in sendMessage()
458 } else if (transactionRequest.getMethod().equals(Request.ACK)) { in sendMessage()
1111 if (originalRequest.getMethod().equalsIgnoreCase(Request.ACK)) in createCancel()
1129 if (getMethod().equalsIgnoreCase(Request.ACK)) { in createAck()
DSIPServerTransaction.java745 && transactionRequest.getMethod().equals(Request.ACK)) { in processRequest()
793 } else if (transactionRequest.getMethod().equals(Request.ACK)) { in processRequest()
829 && transactionRequest.getMethod().equals(Request.ACK) in processRequest()
1703 if (this.getMethod() == null || !this.getMethod().equals(Request.ACK)) { in scheduleAckRemoval()
DSIPDialog.java938 if (!ackRequest.getMethod().equals(Request.ACK)) in sendAck()
1175 if (dialogRequest.getMethod().equals(Request.ACK)) in isRequestConsumable()
1854 if (method.equals(Request.ACK) || method.equals(Request.PRACK)) { in createRequest()
2032 if (dialogRequest.getMethod().equals(Request.ACK) in sendRequest()
2448 sipRequest.setMethod(Request.ACK); in createAck()
2451 sipRequest.setCSeq(new CSeq(cseqno, Request.ACK)); in createAck()
/external/wpa_supplicant_6/wpa_supplicant/
Deap_testing.txt361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
384 - sends tunneled EAP-Success with MPPE keys and expects to receive TLS ACK
389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE

12