/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9/ |
H A D | controlflow-recursive.js | 5 function ack(m,n){ function 7 if (n==0) { return ack(m-1,1); } 8 return ack(m-1, ack(m,n-1) ); 22 ack(3,i);
|
/external/webkit/PerformanceTests/SunSpider/tests/sunspider-0.9.1/ |
H A D | controlflow-recursive.js | 5 function ack(m,n){ function 7 if (n==0) { return ack(m-1,1); } 8 return ack(m-1, ack(m,n-1) ); 22 ack(3,i);
|
/external/tcpdump/ |
H A D | atime.awk | 1 $6 ~ /^ack/ && $5 !~ /[SFR]/ { 2 # given a tcpdump ftp trace, output one line for each ack 4 # <ack time> <seq no> 5 # where <ack time> is the time packet was acked (in seconds with 7 # number of the ack divided by 1024 (i.e., Kbytes acked).
|
H A D | stime.awk | 1 $6 !~ /^ack/ && $5 !~ /[SFR]/ {
|
H A D | print-decnet.c | 435 int ack; local 444 ack = EXTRACT_LE_16BITS(shp->sh_seq[0]); 445 if (ack & SGQ_ACK) { /* acknum field */ 446 if ((ack & SGQ_NAK) == SGQ_NAK) 447 (void)printf("nak %d ", ack & SGQ_MASK); 449 (void)printf("ack %d ", ack & SGQ_MASK); 454 ack = EXTRACT_LE_16BITS(shp->sh_seq[1]); 455 if (ack & SGQ_OACK) { /* ackoth field */ 456 if ((ack 481 int ack; local 529 int ack; local 593 int ack; local 618 int ack; local [all...] |
H A D | print-tcp.c | 86 tcp_seq ack; member in struct:tcp_seq_hash 200 u_int32_t seq, ack, thseq, thack; local 283 ack = EXTRACT_32BITS(&tp->th_ack); 401 th->ack = seq, th->seq = ack - 1; 403 th->seq = seq, th->ack = ack - 1; 406 seq -= th->ack, ack -= th->seq; 408 seq -= th->seq, ack [all...] |
/external/kernel-headers/original/linux/ |
H A D | if_arcnet.h | 97 uint8_t ack; member in union:arc_cap::__anon6908
|
H A D | omap_csmi.h | 26 void (*ack)(int mailbox); member in struct:__anon7059
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ieee802_1x.h | 34 const u8 *buf, size_t len, int ack); 36 const u8 *data, int len, int ack);
|
H A D | ieee802_11.h | 62 const u8 *buf, size_t len, int ack); 64 const u8 *data, size_t len, int ack);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ieee802_1x.h | 34 const u8 *buf, size_t len, int ack); 36 const u8 *data, int len, int ack);
|
H A D | ieee802_11.h | 62 const u8 *buf, size_t len, int ack); 64 const u8 *data, size_t len, int ack);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ap.h | 41 const u8 *buf, size_t len, int ack); 43 const u8 *data, size_t len, int ack);
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ieee802_1x.h | 34 const u8 *buf, size_t len, int ack); 36 const u8 *data, int len, int ack);
|
H A D | ieee802_11.h | 62 const u8 *buf, size_t len, int ack); 64 const u8 *data, size_t len, int ack);
|
/external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/debug/ |
H A D | socket.rb | 55 ack 77 def ack method in class:ANTLR3.Debug.EventSocketProxy 85 ack() 293 ack 296 def ack method in class:ANTLR3.Debug.RemoteEventSocketListener 297 @socket.puts( "ack" ) 323 ack
|
/external/iproute2/include/netinet/ |
H A D | tcp.h | 103 u_int16_t ack:1; member in struct:tcphdr 111 u_int16_t ack:1; member in struct:tcphdr
|
/external/grub/netboot/ |
H A D | fsys_tftp.c | 89 /* We resend our last ack. */ 187 block = tp.u.ack.block = 0; 205 block = ntohs (tp.u.ack.block = tr->u.data.block); 213 tp.u.ack.block = htons (block = prevblock);
|
H A D | tlan.c | 422 * If the correct ack was received, 0, otherwise 1 430 * byte is sent after the ack is 487 * byte is received, and no ack is 491 * over the serial link. It then sends and ack bit, or no 492 * ack and a stop bit. This function is used to retrieve 522 TLan_SetBit( TLAN_NET_SIO_EDATA, sio ); /* No ack = 1 (?) */ 982 * 0 if ack received ok 2553 u32 ack; 2570 ack = TLanIntVector[type]( dev, host_int ); 2572 if ( ack ) { [all...] |
/external/openssh/ |
H A D | sftp-client.c | 1354 struct outstanding_ack *ack = NULL; local 1433 ack = xmalloc(sizeof(*ack)); 1434 ack->id = ++id; 1435 ack->offset = offset; 1436 ack->len = len; 1437 TAILQ_INSERT_TAIL(&acks, ack, tq); 1441 buffer_put_int(&msg, ack->id); 1451 if (ack == NULL) 1471 for (ack [all...] |
/external/antlr/antlr-3.4/runtime/Java/src/main/java/org/antlr/runtime/debug/ |
H A D | DebugEventSocketProxy.java | 87 ack(); 106 protected void ack() { method in class:DebugEventSocketProxy 118 ack();
|
/external/antlr/antlr-3.4/runtime/Ruby/test/functional/debugging/ |
H A D | debug-mode.rb | 40 ack 44 ack 54 def ack method in class:ANTLRDebugger
|
/external/antlr/antlr-3.4/runtime/C/include/ |
H A D | antlr3debugeventlistener.h | 288 void (*ack) (pANTLR3_DEBUG_EVENT_LISTENER delboy); member in struct:ANTLR3_DEBUG_EVENT_LISTENER_struct
|
/external/chromium-trace/trace-viewer/third_party/pywebsocket/src/mod_pywebsocket/ |
H A D | _stream_hixie75.py | 154 'Received ack for server-initiated closing ' 163 'Sent ack for client-initiated closing handshake') 219 'Didn\'t receive valid ack for closing handshake')
|
/external/libppp/src/ |
H A D | fsm.h | 70 u_char ack[FSM_OPTLEN], *ackend; member in struct:fsm_decode
|