/external/iptables/extensions/ |
D | libxt_tcp.man | 25 .BR "SYN ACK FIN RST URG PSH ALL NONE" . 28 iptables \-A FORWARD \-p tcp \-\-tcp\-flags SYN,ACK,FIN,RST SYN 30 will only match packets with the SYN flag set, and the ACK, FIN and 34 Only match TCP packets with the SYN bit set and the ACK,RST and FIN bits 39 It is equivalent to \fB\-\-tcp\-flags SYN,RST,ACK,FIN SYN\fP.
|
D | libxt_tcpmss.man | 1 …nt size) field of the TCP header. You can only use this on TCP SYN or SYN/ACK packets, since the …
|
D | libxt_dccp.man | 9 .BR "REQUEST RESPONSE DATA ACK DATAACK CLOSEREQ CLOSE RESET SYNC SYNCACK INVALID" .
|
D | libxt_cluster.man | 59 to avoid marking TCP ACK packets coming in the reply direction as
|
/external/mtpd/ |
D | l2tp.c | 42 ACK = 0, enumerator 204 incoming.message = ACK; in recv_packet() 213 if (incoming.message != ACK) { in recv_packet() 229 if (incoming.message != ACK) { in recv_packet() 476 case ACK: in l2tp_process() 495 if (incoming.message == ACK) { in l2tp_process() 505 state = ACK; in l2tp_process()
|
/external/tcpdump/ |
D | print-tftp.c | 52 { ACK, "ACK" }, /* acknowledgement */ 134 case ACK: in tftp_print()
|
D | tftp.h | 51 #define ACK 04 /* acknowledgement */ macro
|
/external/tcpdump/tests/ |
D | lmp.out | 40 LMPv1, msg-type: Config ACK, Flags: [Control Channel Down], length: 48 63 LMPv1, msg-type: Link Summary ACK, Flags: [Control Channel Down], length: 16 100 LMPv1, msg-type: Begin Verify ACK, Flags: [Control Channel Down], length: 40 105 Verify Begin ACK Object (9), Class-Type: 1 (1) Flags: [negotiable], length: 8 128 LMPv1, msg-type: End Verify ACK, Flags: [Control Channel Down], length: 24 146 LMPv1, msg-type: Test Status ACK, Flags: [Control Channel Down], length: 24 152 LMPv1, msg-type: Channel Status ACK, Flags: [Control Channel Down], length: 16
|
D | lmp.new | 40 LMPv1, msg-type: Config ACK, Flags: [Control Channel Down], length: 48 63 LMPv1, msg-type: Link Summary ACK, Flags: [Control Channel Down], length: 16 100 LMPv1, msg-type: Begin Verify ACK, Flags: [Control Channel Down], length: 40 105 Verify Begin ACK Object (9), Class-Type: 1 (1) Flags: [negotiable], length: 8 128 LMPv1, msg-type: End Verify ACK, Flags: [Control Channel Down], length: 24 146 LMPv1, msg-type: Test Status ACK, Flags: [Control Channel Down], length: 24 152 LMPv1, msg-type: Channel Status ACK, Flags: [Control Channel Down], length: 16
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
D | TokenNames.java | 46 public static final String ACK = Request.ACK; field
|
D | Parser.java | 83 || token.getTokenType() == ACK in method()
|
D | Lexer.java | 100 addKeyword(TokenNames.ACK, TokenTypes.ACK); in selectLexer()
|
D | TokenTypes.java | 43 public static final int ACK = START + 6; field
|
/external/nist-sip/java/gov/nist/javax/sip/message/ |
D | SIPRequest.java | 119 putName(Request.ACK); 821 newRequest.setMethod(Request.ACK); in createAckRequest() 853 cseq.setMethod(Request.ACK); in createAckRequest() 918 newRequest.setMethod(Request.ACK); in createErrorAck() 927 newRequest.getCSeq().setMethod(Request.ACK); in createErrorAck() 1065 requestLine.setMethod(Request.ACK); in createACKRequest()
|
/external/nist-sip/java/javax/sip/message/ |
D | Request.java | 7 String ACK = "ACK"; field
|
/external/smack/src/com/kenai/jbosh/ |
D | Attributes.java | 38 static final BodyQName ACK = BodyQName.createBOSH("ack"); field in Attributes
|
D | CMSessionParams.java | 85 resp.getAttribute(Attributes.ACK)); in fromSessionInit()
|
/external/guava/guava/src/com/google/common/base/ |
D | Ascii.java | 111 public static final byte ACK = 6; field in Ascii
|
/external/nist-sip/java/gov/nist/javax/sip/ |
D | EventScanner.java | 180 if (sipRequest.getMethod().equals(Request.ACK) in deliverEvent() 263 .equals(Request.ACK)) { in deliverEvent()
|
D | SipProviderImpl.java | 285 if ( sipRequest.getMethod().equals(Request.ACK)) { in getNewClientTransaction() 286 …throw new TransactionUnavailableException ("Cannot create client transaction for " + Request.ACK); in getNewClientTransaction() 465 if ( request.getMethod().equals(Request.ACK)) { in getNewServerTransaction() 672 && request.getMethod().equals(Request.ACK)) { in sendRequest()
|
/external/iptables/utils/ |
D | pf.os | 35 # performance control (max. amount of data to be sent without ACK). 95 # - Selective ACK permitted - a flag set by systems that implement 96 # selective ACK functionality. 98 # - The sequence of TCP all options (MSS, window scaling, selective ACK 102 # header padding) and sackOK option (selective ACK feature). 143 # S - selective ACK OK 169 # at SYN+ACK - does it look similar? 172 # functionality, enable or disable timestamps or selective ACK, 240 # selective ACK: 531 # Another hardcore MSS, one of the ACK leakers hunted down.
|
/external/iptables/tests/ |
D | options-most.rules | 41 -A INPUT -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN 42 -A INPUT -p tcp -m tcp --tcp-flags FIN,SYN,RST,ACK SYN 47 …-cpu 1 -m tcp --sport 1:2 --dport 1:2 --tcp-option 1 --tcp-flags FIN,SYN,RST,ACK SYN -m cpu --cpu 1 53 -A INPUT -p tcp -m tcpmss --mss 1:2 -m tcp --tcp-flags FIN,SYN,RST,ACK SYN
|
/external/nist-sip/java/gov/nist/javax/sip/stack/ |
D | SIPClientTransaction.java | 426 if (transactionRequest.getMethod().equals(Request.ACK)) { in sendMessage() 458 } else if (transactionRequest.getMethod().equals(Request.ACK)) { in sendMessage() 1111 if (originalRequest.getMethod().equalsIgnoreCase(Request.ACK)) in createCancel() 1129 if (getMethod().equalsIgnoreCase(Request.ACK)) { in createAck()
|
D | SIPServerTransaction.java | 745 && transactionRequest.getMethod().equals(Request.ACK)) { in processRequest() 793 } else if (transactionRequest.getMethod().equals(Request.ACK)) { in processRequest() 829 && transactionRequest.getMethod().equals(Request.ACK) in processRequest() 1703 if (this.getMethod() == null || !this.getMethod().equals(Request.ACK)) { in scheduleAckRemoval()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | eap_testing.txt | 361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 384 - sends tunneled EAP-Success with MPPE keys and expects to receive TLS ACK 389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
|