Lines Matching defs:wake

681 // and then if the machine fails to wake, 3 goodbye packets).
1012 // When we wake up from sleep, we call ActivateUnicastRegistration. It is possible that just before we went to sleep,
5263 // signal whatever blocking primitive the main thread is using, so that it will wake up and execute one
5313 // 2. On wake from sleep
6010 // We will use this to prevent spurious name conflicts that may occur when we wake up
6490 // If the machine wakes and then immediately tries to sleep again (e.g. a maintenance wake)
6534 // wake up notification, we might adjust the TimeRcvd based on the time slept
6592 // track of passage of time while asleep, so on wake we refresh our NAT mappings.
6593 // We typically wake up with no interfaces active, so there's no need to rush to try to find our external address.
6701 // we'll be put back to sleep forcibly without the chance to schedule the next maintenance wake.
6702 // Right now we wait 16 sec after wake for all the interfaces to come up, then we wait up to 10 seconds
6719 // Even when we have no wake-on-LAN-capable interfaces, or we failed to find a sleep proxy, or we have other
6720 // failure scenarios, we still want to wake up in at most 120 minutes, to see if the network environment has changed.
6721 // E.g. we might wake up and find no wireless network because the base station got rebooted just at that moment,
7019 rr->WakeUp.HMAC = zeroEthAddr; // Clear HMAC so that mDNS_Deregister_internal doesn't waste packets trying to wake this host
7103 rr->WakeUp.HMAC = zeroEthAddr; // Clear HMAC so that mDNS_Deregister_internal doesn't waste packets trying to wake this host
10146 rr->WakeUp.HMAC = zeroEthAddr; // Clear HMAC so that mDNS_Deregister_internal doesn't waste packets trying to wake this host
12904 // it here also handles the wake up case as the network link comes UP after waking causing
12905 // us to reconnect to the network. If we do this as part of the wake up code, it is possible
13703 // If the sender hardware address is *not* the original owner, then this is a conflict, and we need to wake the sleeping machine to handle it.
13846 mDNSBool wake = mDNSfalse;
13851 #define XX wake ? "Received" : "Ignoring", end-p
13867 // Plan to wake if
13872 wake = ((t->tcp.flags & TH_RST) || (t->tcp.flags & TH_FIN)) ;
13873 if (!wake)
13901 wake = ((int)(pack - seq) > 0) && ((int)(pseq - ack) >= 0) && data;
13910 LogSPS("mDNSCoreReceiveRawTransportPacket: End %p, hlen %d, Datalen %d, pack %u, seq %u, pseq %u, ack %u, wake %d",
13911 end, tcphlen, end - ((mDNSu8 *)t + tcphlen), pack, seq, pseq, ack, wake);
13914 kaWake = wake;
13918 // Plan to wake if
13920 // (b) packet is SYN, SYN+FIN, or plain data packet (no SYN or FIN). We won't wake for FIN alone.
13921 wake = (!(t->tcp.flags & TH_RST) && (t->tcp.flags & (TH_FIN|TH_SYN)) != TH_FIN);
13923 // For now, to reduce spurious wakeups, we wake only for TCP SYN,
13924 // except for ssh connections, where we'll wake for plain data packets too
13925 if (!mDNSSameIPPort(port, SSHPort) && !(t->tcp.flags & 2)) wake = mDNSfalse;
13943 wake = mDNStrue;
13949 if (datalen == 1 && end >= &t->bytes[9] && t->bytes[8] == 0xFF) wake = mDNSfalse;
13961 if (ike->ExchangeType == 5 || ike->ExchangeType == 34) wake = mDNSfalse;
13972 if (mDNSSameIPPort(port, ARD)) wake = (datalen >= 110 && end >= &t->bytes[10] && t->bytes[8] == 0x13 && t->bytes[9] == 0x88);
13991 if (wake)
14008 if (!r2 && mDNSSameIPPort(port, IPSECPort)) r2 = rr; // So that we wake for BTMM IPSEC packets, even without a matching SRV record
14009 if (!r2 && kaWake) r2 = rr; // So that we wake for keepalive packets, even without a matching SRV record
14139 LogSPS("mDNSCoreBeSleepProxyServer turning off from state %d; will wake clients", m->SPSState);