Searched refs:ack (Results 51 - 75 of 93) sorted by relevance

1234

/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/internal/spdy/
H A DSpdy3.java245 boolean ack = client == ((id & 1) == 1);
246 handler.ping(ack, id, 0);
/external/android-clat/
H A Ddump.c179 printf("ack = %x\n",ntohl(tcp->ack_seq));
188 printf("urg = %x ack = %x psh = %x rst = %x syn = %x fin = %x\n",
189 tcp->urg, tcp->ack, tcp->psh, tcp->rst, tcp->syn, tcp->fin);
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dwpa_auth.h289 struct wpa_state_machine *sm, int ack);
H A Dieee802_11.c2607 const u8 *buf, size_t len, int ack)
2627 ack ? "ACKed" : "did not ACK");
2628 if (ack)
2632 ieee802_1x_tx_status(hapd, sta, buf, len, ack);
2637 const u8 *data, size_t len, int ack)
2659 ieee802_1x_eapol_tx_status(hapd, sta, data, len, ack);
2606 hostapd_tx_status(struct hostapd_data *hapd, const u8 *addr, const u8 *buf, size_t len, int ack) argument
2636 hostapd_eapol_tx_status(struct hostapd_data *hapd, const u8 *dst, const u8 *data, size_t len, int ack) argument
H A Dieee802_1x.c2194 const u8 *buf, size_t len, int ack)
2216 ack);
2221 const u8 *buf, int len, int ack)
2231 "type=%d length=%d - ack=%d",
2233 be_to_host16(xhdr->length), ack);
2244 sta->wpa_sm, ack);
2252 if (!ack && pos + sizeof(*key) <= buf + len) {
2193 ieee802_1x_tx_status(struct hostapd_data *hapd, struct sta_info *sta, const u8 *buf, size_t len, int ack) argument
2220 ieee802_1x_eapol_tx_status(struct hostapd_data *hapd, struct sta_info *sta, const u8 *buf, int len, int ack) argument
H A Ddrv_callbacks.c1137 data->tx_status.ack);
1143 data->tx_status.ack);
1151 data->eapol_tx_status.ack);
/external/wpa_supplicant_8/src/ap/
H A Dwpa_auth.h289 struct wpa_state_machine *sm, int ack);
H A Dieee802_11.c2607 const u8 *buf, size_t len, int ack)
2627 ack ? "ACKed" : "did not ACK");
2628 if (ack)
2632 ieee802_1x_tx_status(hapd, sta, buf, len, ack);
2637 const u8 *data, size_t len, int ack)
2659 ieee802_1x_eapol_tx_status(hapd, sta, data, len, ack);
2606 hostapd_tx_status(struct hostapd_data *hapd, const u8 *addr, const u8 *buf, size_t len, int ack) argument
2636 hostapd_eapol_tx_status(struct hostapd_data *hapd, const u8 *dst, const u8 *data, size_t len, int ack) argument
H A Dieee802_1x.c2194 const u8 *buf, size_t len, int ack)
2216 ack);
2221 const u8 *buf, int len, int ack)
2231 "type=%d length=%d - ack=%d",
2233 be_to_host16(xhdr->length), ack);
2244 sta->wpa_sm, ack);
2252 if (!ack && pos + sizeof(*key) <= buf + len) {
2193 ieee802_1x_tx_status(struct hostapd_data *hapd, struct sta_info *sta, const u8 *buf, size_t len, int ack) argument
2220 ieee802_1x_eapol_tx_status(struct hostapd_data *hapd, struct sta_info *sta, const u8 *buf, int len, int ack) argument
H A Ddrv_callbacks.c1137 data->tx_status.ack);
1143 data->tx_status.ack);
1151 data->eapol_tx_status.ack);
/external/wpa_supplicant_8/wpa_supplicant/
H A Dap.c722 const u8 *buf, size_t len, int ack)
726 hostapd_tx_status(wpa_s->ap_iface->bss[0], addr, buf, len, ack);
732 const u8 *data, size_t len, int ack)
738 hostapd_tx_status(wpa_s->ap_iface->bss[0], dst, data, len, ack);
721 ap_tx_status(void *ctx, const u8 *addr, const u8 *buf, size_t len, int ack) argument
731 ap_eapol_tx_status(void *ctx, const u8 *dst, const u8 *data, size_t len, int ack) argument
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dwpa_auth.h289 struct wpa_state_machine *sm, int ack);
H A Dieee802_11.c2607 const u8 *buf, size_t len, int ack)
2627 ack ? "ACKed" : "did not ACK");
2628 if (ack)
2632 ieee802_1x_tx_status(hapd, sta, buf, len, ack);
2637 const u8 *data, size_t len, int ack)
2659 ieee802_1x_eapol_tx_status(hapd, sta, data, len, ack);
2606 hostapd_tx_status(struct hostapd_data *hapd, const u8 *addr, const u8 *buf, size_t len, int ack) argument
2636 hostapd_eapol_tx_status(struct hostapd_data *hapd, const u8 *dst, const u8 *data, size_t len, int ack) argument
H A Dieee802_1x.c2194 const u8 *buf, size_t len, int ack)
2216 ack);
2221 const u8 *buf, int len, int ack)
2231 "type=%d length=%d - ack=%d",
2233 be_to_host16(xhdr->length), ack);
2244 sta->wpa_sm, ack);
2252 if (!ack && pos + sizeof(*key) <= buf + len) {
2193 ieee802_1x_tx_status(struct hostapd_data *hapd, struct sta_info *sta, const u8 *buf, size_t len, int ack) argument
2220 ieee802_1x_eapol_tx_status(struct hostapd_data *hapd, struct sta_info *sta, const u8 *buf, int len, int ack) argument
H A Ddrv_callbacks.c1137 data->tx_status.ack);
1143 data->tx_status.ack);
1151 data->eapol_tx_status.ack);
/external/antlr/antlr-3.4/runtime/Python/antlr3/
H A Ddebug.py890 self.ack()
899 def ack(self): member in class:DebugEventSocketProxy
906 self.ack();
/external/lldb/source/Plugins/Process/Linux/
H A DProcessMonitor.cpp1970 Operation *ack = NULL; local
1977 if ((status = read(m_client_fd, &ack, sizeof(ack))) < 0)
1987 assert(status == sizeof(ack));
1988 assert(ack == op && "Invalid monitor thread response!");
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_nl80211_event.c578 size_t len, struct nlattr *ack)
593 " cookie=0%llx%s (ack=%d)",
596 " (match)" : " (unknown)", ack != NULL);
610 event.tx_status.ack = ack != NULL;
750 struct nlattr *freq, struct nlattr *ack,
815 nla_len(frame), ack);
576 mlme_event_mgmt_tx_status(struct wpa_driver_nl80211_data *drv, struct nlattr *cookie, const u8 *frame, size_t len, struct nlattr *ack) argument
747 mlme_event(struct i802_bss *bss, enum nl80211_commands cmd, struct nlattr *frame, struct nlattr *addr, struct nlattr *timed_out, struct nlattr *freq, struct nlattr *ack, struct nlattr *cookie, struct nlattr *sig, struct nlattr *wmm) argument
H A Ddriver_nl80211_monitor.c41 event.tx_status.ack = ok;
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_nl80211_event.c578 size_t len, struct nlattr *ack)
593 " cookie=0%llx%s (ack=%d)",
596 " (match)" : " (unknown)", ack != NULL);
610 event.tx_status.ack = ack != NULL;
750 struct nlattr *freq, struct nlattr *ack,
815 nla_len(frame), ack);
576 mlme_event_mgmt_tx_status(struct wpa_driver_nl80211_data *drv, struct nlattr *cookie, const u8 *frame, size_t len, struct nlattr *ack) argument
747 mlme_event(struct i802_bss *bss, enum nl80211_commands cmd, struct nlattr *frame, struct nlattr *addr, struct nlattr *timed_out, struct nlattr *freq, struct nlattr *ack, struct nlattr *cookie, struct nlattr *sig, struct nlattr *wmm) argument
H A Ddriver_nl80211_monitor.c41 event.tx_status.ack = ok;
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_nl80211_event.c578 size_t len, struct nlattr *ack)
593 " cookie=0%llx%s (ack=%d)",
596 " (match)" : " (unknown)", ack != NULL);
610 event.tx_status.ack = ack != NULL;
750 struct nlattr *freq, struct nlattr *ack,
815 nla_len(frame), ack);
576 mlme_event_mgmt_tx_status(struct wpa_driver_nl80211_data *drv, struct nlattr *cookie, const u8 *frame, size_t len, struct nlattr *ack) argument
747 mlme_event(struct i802_bss *bss, enum nl80211_commands cmd, struct nlattr *frame, struct nlattr *addr, struct nlattr *timed_out, struct nlattr *freq, struct nlattr *ack, struct nlattr *cookie, struct nlattr *sig, struct nlattr *wmm) argument
H A Ddriver_nl80211_monitor.c41 event.tx_status.ack = ok;
/external/netperf/
H A Dnetlib.c3611 put_control(fd, len, pri, ack)
3612 int fd, len, pri, ack;
3630 if (err_ack->dl_primitive != ack) {
3632 ack,err_ack->dl_primitive);
/external/libpcap/
H A Dscanner.l384 tcp-ack { yylval.i = 0x10; return NUM; }

Completed in 477 milliseconds

1234