/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/spdy/ |
H A D | Spdy3.java | 245 boolean ack = client == ((id & 1) == 1); 246 handler.ping(ack, id, 0);
|
/external/android-clat/ |
H A D | dump.c | 179 printf("ack = %x\n",ntohl(tcp->ack_seq)); 188 printf("urg = %x ack = %x psh = %x rst = %x syn = %x fin = %x\n", 189 tcp->urg, tcp->ack, tcp->psh, tcp->rst, tcp->syn, tcp->fin);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.h | 289 struct wpa_state_machine *sm, int ack);
|
H A D | ieee802_11.c | 2607 const u8 *buf, size_t len, int ack) 2627 ack ? "ACKed" : "did not ACK"); 2628 if (ack) 2632 ieee802_1x_tx_status(hapd, sta, buf, len, ack); 2637 const u8 *data, size_t len, int ack) 2659 ieee802_1x_eapol_tx_status(hapd, sta, data, len, ack); 2606 hostapd_tx_status(struct hostapd_data *hapd, const u8 *addr, const u8 *buf, size_t len, int ack) argument 2636 hostapd_eapol_tx_status(struct hostapd_data *hapd, const u8 *dst, const u8 *data, size_t len, int ack) argument
|
H A D | ieee802_1x.c | 2194 const u8 *buf, size_t len, int ack) 2216 ack); 2221 const u8 *buf, int len, int ack) 2231 "type=%d length=%d - ack=%d", 2233 be_to_host16(xhdr->length), ack); 2244 sta->wpa_sm, ack); 2252 if (!ack && pos + sizeof(*key) <= buf + len) { 2193 ieee802_1x_tx_status(struct hostapd_data *hapd, struct sta_info *sta, const u8 *buf, size_t len, int ack) argument 2220 ieee802_1x_eapol_tx_status(struct hostapd_data *hapd, struct sta_info *sta, const u8 *buf, int len, int ack) argument
|
H A D | drv_callbacks.c | 1137 data->tx_status.ack); 1143 data->tx_status.ack); 1151 data->eapol_tx_status.ack);
|
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth.h | 289 struct wpa_state_machine *sm, int ack);
|
H A D | ieee802_11.c | 2607 const u8 *buf, size_t len, int ack) 2627 ack ? "ACKed" : "did not ACK"); 2628 if (ack) 2632 ieee802_1x_tx_status(hapd, sta, buf, len, ack); 2637 const u8 *data, size_t len, int ack) 2659 ieee802_1x_eapol_tx_status(hapd, sta, data, len, ack); 2606 hostapd_tx_status(struct hostapd_data *hapd, const u8 *addr, const u8 *buf, size_t len, int ack) argument 2636 hostapd_eapol_tx_status(struct hostapd_data *hapd, const u8 *dst, const u8 *data, size_t len, int ack) argument
|
H A D | ieee802_1x.c | 2194 const u8 *buf, size_t len, int ack) 2216 ack); 2221 const u8 *buf, int len, int ack) 2231 "type=%d length=%d - ack=%d", 2233 be_to_host16(xhdr->length), ack); 2244 sta->wpa_sm, ack); 2252 if (!ack && pos + sizeof(*key) <= buf + len) { 2193 ieee802_1x_tx_status(struct hostapd_data *hapd, struct sta_info *sta, const u8 *buf, size_t len, int ack) argument 2220 ieee802_1x_eapol_tx_status(struct hostapd_data *hapd, struct sta_info *sta, const u8 *buf, int len, int ack) argument
|
H A D | drv_callbacks.c | 1137 data->tx_status.ack); 1143 data->tx_status.ack); 1151 data->eapol_tx_status.ack);
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | ap.c | 722 const u8 *buf, size_t len, int ack) 726 hostapd_tx_status(wpa_s->ap_iface->bss[0], addr, buf, len, ack); 732 const u8 *data, size_t len, int ack) 738 hostapd_tx_status(wpa_s->ap_iface->bss[0], dst, data, len, ack); 721 ap_tx_status(void *ctx, const u8 *addr, const u8 *buf, size_t len, int ack) argument 731 ap_eapol_tx_status(void *ctx, const u8 *dst, const u8 *data, size_t len, int ack) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | wpa_auth.h | 289 struct wpa_state_machine *sm, int ack);
|
H A D | ieee802_11.c | 2607 const u8 *buf, size_t len, int ack) 2627 ack ? "ACKed" : "did not ACK"); 2628 if (ack) 2632 ieee802_1x_tx_status(hapd, sta, buf, len, ack); 2637 const u8 *data, size_t len, int ack) 2659 ieee802_1x_eapol_tx_status(hapd, sta, data, len, ack); 2606 hostapd_tx_status(struct hostapd_data *hapd, const u8 *addr, const u8 *buf, size_t len, int ack) argument 2636 hostapd_eapol_tx_status(struct hostapd_data *hapd, const u8 *dst, const u8 *data, size_t len, int ack) argument
|
H A D | ieee802_1x.c | 2194 const u8 *buf, size_t len, int ack) 2216 ack); 2221 const u8 *buf, int len, int ack) 2231 "type=%d length=%d - ack=%d", 2233 be_to_host16(xhdr->length), ack); 2244 sta->wpa_sm, ack); 2252 if (!ack && pos + sizeof(*key) <= buf + len) { 2193 ieee802_1x_tx_status(struct hostapd_data *hapd, struct sta_info *sta, const u8 *buf, size_t len, int ack) argument 2220 ieee802_1x_eapol_tx_status(struct hostapd_data *hapd, struct sta_info *sta, const u8 *buf, int len, int ack) argument
|
H A D | drv_callbacks.c | 1137 data->tx_status.ack); 1143 data->tx_status.ack); 1151 data->eapol_tx_status.ack);
|
/external/antlr/antlr-3.4/runtime/Python/antlr3/ |
H A D | debug.py | 890 self.ack() 899 def ack(self): member in class:DebugEventSocketProxy 906 self.ack();
|
/external/lldb/source/Plugins/Process/Linux/ |
H A D | ProcessMonitor.cpp | 1970 Operation *ack = NULL; local 1977 if ((status = read(m_client_fd, &ack, sizeof(ack))) < 0) 1987 assert(status == sizeof(ack)); 1988 assert(ack == op && "Invalid monitor thread response!");
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_nl80211_event.c | 578 size_t len, struct nlattr *ack) 593 " cookie=0%llx%s (ack=%d)", 596 " (match)" : " (unknown)", ack != NULL); 610 event.tx_status.ack = ack != NULL; 750 struct nlattr *freq, struct nlattr *ack, 815 nla_len(frame), ack); 576 mlme_event_mgmt_tx_status(struct wpa_driver_nl80211_data *drv, struct nlattr *cookie, const u8 *frame, size_t len, struct nlattr *ack) argument 747 mlme_event(struct i802_bss *bss, enum nl80211_commands cmd, struct nlattr *frame, struct nlattr *addr, struct nlattr *timed_out, struct nlattr *freq, struct nlattr *ack, struct nlattr *cookie, struct nlattr *sig, struct nlattr *wmm) argument
|
H A D | driver_nl80211_monitor.c | 41 event.tx_status.ack = ok;
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_nl80211_event.c | 578 size_t len, struct nlattr *ack) 593 " cookie=0%llx%s (ack=%d)", 596 " (match)" : " (unknown)", ack != NULL); 610 event.tx_status.ack = ack != NULL; 750 struct nlattr *freq, struct nlattr *ack, 815 nla_len(frame), ack); 576 mlme_event_mgmt_tx_status(struct wpa_driver_nl80211_data *drv, struct nlattr *cookie, const u8 *frame, size_t len, struct nlattr *ack) argument 747 mlme_event(struct i802_bss *bss, enum nl80211_commands cmd, struct nlattr *frame, struct nlattr *addr, struct nlattr *timed_out, struct nlattr *freq, struct nlattr *ack, struct nlattr *cookie, struct nlattr *sig, struct nlattr *wmm) argument
|
H A D | driver_nl80211_monitor.c | 41 event.tx_status.ack = ok;
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_nl80211_event.c | 578 size_t len, struct nlattr *ack) 593 " cookie=0%llx%s (ack=%d)", 596 " (match)" : " (unknown)", ack != NULL); 610 event.tx_status.ack = ack != NULL; 750 struct nlattr *freq, struct nlattr *ack, 815 nla_len(frame), ack); 576 mlme_event_mgmt_tx_status(struct wpa_driver_nl80211_data *drv, struct nlattr *cookie, const u8 *frame, size_t len, struct nlattr *ack) argument 747 mlme_event(struct i802_bss *bss, enum nl80211_commands cmd, struct nlattr *frame, struct nlattr *addr, struct nlattr *timed_out, struct nlattr *freq, struct nlattr *ack, struct nlattr *cookie, struct nlattr *sig, struct nlattr *wmm) argument
|
H A D | driver_nl80211_monitor.c | 41 event.tx_status.ack = ok;
|
/external/netperf/ |
H A D | netlib.c | 3611 put_control(fd, len, pri, ack) 3612 int fd, len, pri, ack; 3630 if (err_ack->dl_primitive != ack) { 3632 ack,err_ack->dl_primitive);
|
/external/libpcap/ |
H A D | scanner.l | 384 tcp-ack { yylval.i = 0x10; return NUM; }
|