Home
last modified time | relevance | path

Searched full:ack (Results 1 – 25 of 1208) sorted by relevance

12345678910>>...49

/freebsd/crypto/openssl/doc/designs/quic-design/
H A Dquic-ackm.md1 QUIC ACK Manager
4 ![(Overview block diagram.)](images/ackm.png "QUIC ACK Manager Block Diagram")
6 The QUIC ACK manager is responsible for, on the TX side:
8 - Handling received ACK frames
17 - Generating ACK frames for later transmission in response to packets we
22 In order to allow it to perform these tasks, the ACK manager must:
27 - be notified of all received ACK frames
31 The ACK manager consumes:
37 The ACK manager provides the following outputs:
44 - It indicates what ACK frames should be generated.
[all …]
H A Dtx-packetiser.md6 Record Layer and ACK frames from the ACK Handling And Loss Detector
20 /* ACK delay exponent used when encoding. */
148 ### TXPIM, FIFD, ACK Handling and Loss Detector
150 ACK handling and loss detection is provided by the ACKM and FIFD. The FIFD uses
157 the ACK Manager.
265 | 0x02 | ack 0x02 | ✓ | ✓ | | ✓ | ✓ | ✓ | …
266 | 0x03 | ack 0x03 | ✓ | ✓ | | ✓ | ✓ | ✓ | …
314 | N | Not ack-eliciting. |
320 marking for the packet to qualify for it. For example, a packet with an ACK
352 ACK - (non-ACK-eliciting)
[all …]
/freebsd/crypto/openssl/ssl/quic/
H A Dquic_ackm.c22 * sent for which we later expect to receive an ACK. It is essentially a simple
171 * **Background.** The RX side of the ACK manager must track packets we have
172 * received for which we have to generate ACK frames. Broadly, this means we
178 * 1. We receive a packet but have not sent an ACK yet, so the transmitter
181 * 2. We receive a packet and send an ACK which is lost. We do not
182 * immediately know that the ACK was lost and the transmitter does not know
185 * 3. We receive a packet and send an ACK which is received by the
186 * transmitter. The transmitter does not immediately respond with an ACK,
187 * or responds with an ACK which is lost. The transmitter knows that we
189 * because the ACK we sent could have been lost.
[all …]
H A Dquic_wire.c19 int ossl_quic_frame_ack_contains_pn(const OSSL_QUIC_FRAME_ACK *ack, QUIC_PN pn) in OSSL_SAFE_MATH_UNSIGNED()
23 for (i = 0; i < ack->num_ack_ranges; ++i) in OSSL_SAFE_MATH_UNSIGNED()
24 if (pn >= ack->ack_ranges[i].start in OSSL_SAFE_MATH_UNSIGNED()
25 && pn <= ack->ack_ranges[i].end) in OSSL_SAFE_MATH_UNSIGNED()
57 const OSSL_QUIC_FRAME_ACK *ack) in ossl_quic_wire_encode_frame_ack() argument
59 uint64_t frame_type = ack->ecn_present ? OSSL_QUIC_FRAME_TYPE_ACK_WITH_ECN in ossl_quic_wire_encode_frame_ack()
63 uint64_t i, num_ack_ranges = ack->num_ack_ranges; in ossl_quic_wire_encode_frame_ack()
69 delay = ossl_time_divide(ossl_time_divide(ack->delay_time, OSSL_TIME_US), in ossl_quic_wire_encode_frame_ack()
73 largest_ackd = ack->ack_ranges[0].end; in ossl_quic_wire_encode_frame_ack()
74 first_ack_range = ack->ack_ranges[0].end - ack->ack_ranges[0].start; in ossl_quic_wire_encode_frame_ack()
[all …]
H A Dquic_trace.c83 OSSL_QUIC_FRAME_ACK ack; in frame_ack() local
96 ack.ack_ranges = ack_ranges; in frame_ack()
97 ack.num_ack_ranges = (size_t)total_ranges; in frame_ack()
99 /* Ack delay exponent is 0, so we can get the raw delay time below */ in frame_ack()
100 if (!ossl_quic_wire_decode_frame_ack(pkt, 0, &ack, NULL)) in frame_ack()
104 (unsigned long long)ack.ack_ranges[0].end); in frame_ack()
105 BIO_printf(bio, " Ack delay (raw) %llu\n", in frame_ack()
106 (unsigned long long)ossl_time2ticks(ack.delay_time)); in frame_ack()
107 BIO_printf(bio, " Ack range count: %llu\n", in frame_ack()
109 BIO_printf(bio, " First ack range: %llu\n", in frame_ack()
[all …]
H A Dqlog_event_helpers.c210 OSSL_QUIC_FRAME_ACK ack; in log_frame_actual() local
243 ack.ack_ranges = ack_ranges; in log_frame_actual()
244 ack.num_ack_ranges = OSSL_NELEM(ack_ranges); in log_frame_actual()
245 if (!ossl_quic_wire_decode_frame_ack(pkt, 3, &ack, &total_ranges)) in log_frame_actual()
248 QLOG_STR("frame_type", "ack"); in log_frame_actual()
249 QLOG_U64("ack_delay", ossl_time2ms(ack.delay_time)); in log_frame_actual()
250 if (ack.ecn_present) { in log_frame_actual()
251 QLOG_U64("ect1", ack.ect0); in log_frame_actual()
252 QLOG_U64("ect0", ack.ect1); in log_frame_actual()
253 QLOG_U64("ce", ack.ecnce); in log_frame_actual()
[all …]
/freebsd/contrib/netbsd-tests/ipf/input/
H A Dni57 # 21,32818 SYN+ACK
13 # 32818,21 ACK
19 # ACK+PUSH "[220-coombs.anu.edu.au NcFTPd Server (free educational license) ready.\r\n"
29 # 32818,21 ACK
35 # 21,32818 ACK+PUSH
54 # 32818,21 ACK
60 # 32818,21 ACK+PUSH "USER anonymous\r\n"
67 # 21,32818 ACK
73 # 21,32818 ACK+PUSH "331 Guest login ok, send your complete e-mail address as password.\r\n"
83 # 32818,21 ACK
[all …]
H A Df111 in on e0 tcp 1.1.1.1,1 2.1.2.2,23 S seq=1 ack=0
2 in on e0 tcp 1.1.1.1,1 2.1.2.2,24 SA seq=1 ack=1
3 in on e1 tcp 2.1.2.2,23 1.1.1.1,2 SA seq=101 ack=2
4 in on e1 tcp 2.1.2.2,23 1.1.1.1,1 SA seq=101 ack=2
5 in on e0 tcp 1.1.1.1,1 2.1.2.2,23 A seq=2 ack=102
6 in on e0 tcp 1.1.1.1,1 2.1.2.2,25 A seq=2 ack=102
7 in on e1 tcp 2.1.2.2,23 1.1.1.1,1 A seq=102 ack=2
8 in on e1 tcp 2.1.2.2,25 1.1.1.1,1 A seq=102 ack=2
9 in on e0 tcp 1.1.1.1,1 2.1.2.2,23 FA seq=2 ack=102
10 in on e0 tcp 1.1.1.1,1 2.1.2.2,23 A seq=2 ack=102
[all …]
H A Dni2047 # 192.168.113.4.1023 > 192.168.113.3.1008 ACK
54 # 192.168.113.3.1009 > 10.1.1.4.shell PUSH+ACK
60 # 192.168.113.4.shell > 192.168.113.3.1009 ACK
66 # 192.168.113.3.1009 > 10.1.1.4.shell PUSH+ACK
75 # 192.168.113.4.shell > 192.168.113.3.1009 ACK
81 # 192.168.113.4.shell > 192.168.113.3.1009 PUSH+ACK
87 # 192.168.113.3.1009 > 10.1.1.4.shell ACK
93 # 192.168.113.4.shell > 192.168.113.3.1009 PUSH+ACK
99 # 192.168.113.4.1023 > 192.168.113.3.1008 PUSH+ACK
106 # 192.168.113.4.shell > 192.168.113.3.1009 FIN+ACK
[all …]
/freebsd/contrib/tcpdump/
H A Dprint-decnet.c275 #define SGQ_ACK 0100000 /* ack */
276 #define SGQ_NAK 0110000 /* negative ack */
277 #define SGQ_OACK 0120000 /* other channel ack */
278 #define SGQ_ONAK 0130000 /* other channel negative ack */
281 #define SGQ_DELAY 010000 /* ack delay flag */
817 u_int ack; in print_nsp() local
822 ack = GET_LE_U_2(shp->sh_seq[0]); in print_nsp()
823 if (ack & SGQ_ACK) { /* acknum field */ in print_nsp()
824 if ((ack & SGQ_NAK) == SGQ_NAK) in print_nsp()
825 ND_PRINT("nak %u ", ack & SGQ_MASK); in print_nsp()
[all …]
H A DREADME.md82 send-ack.awk
86 we just note if the packet is a "send" or an "ack".
92 "Send" means data going from sender to receiver, "ack"
93 means an ack going from the receiver to the sender. A
100 for acks). The number in parens following an ack is
102 ack. A number in parens following a send is the
110 3.20 0.20 ack . 1024 (0.20)
112 3.40 0.20 ack . 1536 (0.20)
114 3.82 0.02 * ack . 1536 (0.62) [2]
141 5 - time of first ack
[all …]
H A Datime.awk1 $6 ~ /^ack/ && $5 !~ /[SFR]/ {
2 # given a tcpdump ftp trace, output one line for each ack
4 # <ack time> <seq no>
5 # where <ack time> is the time packet was acked (in seconds with
7 # number of the ack divided by 1024 (i.e., Kbytes acked).
/freebsd/crypto/openssl/include/internal/
H A Dquic_ackm.h41 * Configures the RX-side maximum ACK delay. This is the maximum amount of time
42 * the peer is allowed to delay sending an ACK frame after receiving an
43 * ACK-eliciting packet. The peer communicates this value via a transport
49 * Configures the TX-side maximum ACK delay. This is the maximum amount of time
50 * we are allowed to delay sending an ACK frame after receiving an ACK-eliciting
69 * If the packet being described by this structure contains an ACK frame,
70 * this must be set to the largest PN ACK'd by that frame.
90 * numbered packet is not considered in flight is if it contains only ACK
96 * 1 if the packet has one or more ACK-eliciting frames.
152 /* 1 if the packet has one or more ACK-eliciting frames. */
[all …]
/freebsd/crypto/openssl/test/
H A Dquic_ackm_test.c105 /* Initialise ACK manager. */ in helper_init()
141 * TX ACK (Packet Threshold) Test Cases
149 const char *expect_ack; /* 1=ack, 2=lost, 4=discarded */
344 OSSL_QUIC_FRAME_ACK ack = {0}; in test_tx_ack_case_actual() local
400 ack.ack_ranges = (OSSL_QUIC_ACK_RANGE *)c->ack_ranges; in test_tx_ack_case_actual()
401 ack.num_ack_ranges = c->num_ack_ranges; in test_tx_ack_case_actual()
402 if (!TEST_int_eq(ossl_ackm_on_rx_ack_frame(h.ackm, &ack, space, fake_time), 1)) in test_tx_ack_case_actual()
475 * TX ACK (Time Threshold) Test
481 TX_ACK_TIME_OP_ACK, /* Synthesise incoming ACK of single PN range */
482 TX_ACK_TIME_OP_EXPECT /* Ack/loss assertion */
[all …]
H A Dquic_wire_test.c75 /* 3. ACK */
157 0x40, 0x7d, /* ACK Delay */
158 1, /* ACK Range Count */
159 10, /* First ACK Range */
1293 /* ACK Frame with Excessive First ACK Range Field */
1295 0x02, /* ACK Without ECN */
1297 0x01, /* ACK Delay */
1298 0x00, /* ACK Range Count */
1299 0x09, /* First ACK Range */
1302 /* ACK Frame with Valid ACK Range Field */
[all …]
/freebsd/share/man/man4/
H A Dsyncache.455 and a SYN,ACK segment is
60 enough state to perform a SYN,ACK retransmission, and takes up less
62 An incoming segment which contains an ACK for the SYN,ACK
83 sends a cryptographic value in the SYN,ACK reply to
84 the client machine, which is then returned in the client's ACK.
100 As the returning ACK establishes the connection, it may be possible for
101 an attacker to ACK flood a machine in an attempt to create a connection.
158 Maximum number of times a SYN,ACK is retransmitted before being discarded.
201 SYN,ACK retransmissions due to a timeout expiring.
205 SYNs dropped because SYN,ACK could not be sent.
[all …]
/freebsd/sys/dev/pcf/
H A Dpcf.c93 pcf_set_S1(sc, PIN|ESO|ENI|STO|ACK); in pcf_stop_locked()
128 pcf_set_S1(sc, ESO|STA|STO|ACK); in pcf_repeated_start()
138 /* check for ack */ in pcf_repeated_start()
142 printf("pcf: no ack on repeated_start!\n"); in pcf_repeated_start()
179 pcf_set_S1(sc, PIN|ESO|STA|ACK); in pcf_start()
187 /* check for ACK */ in pcf_start()
191 printf("pcf: no ack on start!\n"); in pcf_start()
253 /* ack interrupt line */ in pcf_intr()
256 /* no ack, don't send anymore */ in pcf_intr()
293 /* ack interrupt line */ in pcf_intr()
[all …]
/freebsd/sys/riscv/sifive/
H A Dfu740_pci_dw.c114 uint32_t ack; in fupci_phy_read() local
121 ack = FUDW_MGMT_READ(sc, FUDW_MGMT_PHY_CR_PARA_REG(phy, ACK)); in fupci_phy_read()
122 if (ack != 0) in fupci_phy_read()
128 device_printf(sc->dev, "Timeout waiting for read ACK\n"); in fupci_phy_read()
137 ack = FUDW_MGMT_READ(sc, FUDW_MGMT_PHY_CR_PARA_REG(phy, ACK)); in fupci_phy_read()
138 if (ack == 0) in fupci_phy_read()
144 device_printf(sc->dev, "Timeout waiting for read un-ACK\n"); in fupci_phy_read()
155 uint32_t ack; in fupci_phy_write() local
163 ack = FUDW_MGMT_READ(sc, FUDW_MGMT_PHY_CR_PARA_REG(phy, ACK)); in fupci_phy_write()
164 if (ack != 0) in fupci_phy_write()
[all …]
/freebsd/contrib/libpcap/
H A Dieee80211.h129 "cts", "ack", \
130 "cf-end", "cf-end-ack" \
134 "data", "data-cf-ack", \
135 "data-cf-poll", "data-cf-ack-poll", \
136 "null", "cf-ack", \
137 "cf-poll", "cf-ack-poll", \
138 "qos-data", "qos-data-cf-ack", \
139 "qos-data-cf-poll", "qos-data-cf-ack-poll", \
141 "qos-cf-poll", "qos-cf-ack-poll" \
/freebsd/sys/netinet/
H A Dsctp_header.h169 /* Initiate (INIT)/Initiate Ack (INIT ACK) */
191 uint32_t my_vtag; /* my tag in INIT-ACK (for quick ref) */
210 * at the end is tacked on the INIT chunk and the INIT-ACK chunk
231 /* ... used for both INIT and INIT ACK */
236 /* Selective Ack (SACK) */
238 uint16_t start; /* Gap Ack block start */
239 uint16_t end; /* Gap Ack block end */
243 uint32_t cum_tsn_ack; /* cumulative TSN Ack */
245 uint16_t num_gap_ack_blks; /* number of Gap Ack blocks */
257 uint32_t cum_tsn_ack; /* cumulative TSN Ack */
[all …]
H A Dtcp_input.c155 "Delay ACK to try and piggyback it onto a data packet");
210 "Follow RFC793 criteria for validating SEG.ACK");
254 * receiving a duplicate ACK with a SACK block, and also
402 * If a SYN or SYN/ACK was lost and retransmitted, we have to in cc_conn_init()
407 tp->snd_cwnd = maxseg; /* SYN(-ACK) lost */ in cc_conn_init()
435 * Allow ECN reaction on ACK to CWR, if in cc_cong_signal()
503 * Indicate whether this ack should be delayed. We can delay the ack if
505 * - There is no delayed ack timer in progress.
506 * - Our last ack wasn't a 0-sized window. We never want to delay
507 * the ack that opens up a 0-sized window.
[all …]
/freebsd/libexec/tftpd/
H A Dtftp-transfer.c107 /* Only check for ACK for last block in window. */ in tftp_send()
115 "Timeout #%d send ACK %d " in tftp_send()
120 "Timeout #%d on ACK %d", in tftp_send()
143 if (rp->th_opcode == ACK) { in tftp_send()
154 /* Did not recognize ACK. */ in tftp_send()
157 "ACK %d out of window", in tftp_send()
189 * Partial ACK. Rewind state to first in tftp_send()
195 "Partial ACK"); in tftp_send()
265 "Cannot send ACK packet #%d, " in tftp_receive()
270 "Cannot send ACK packet #%d, trying again", in tftp_receive()
[all …]
/freebsd/usr.bin/m4/TEST/
H A Dack.m41 # $OpenBSD: ack.m4,v 1.3 2003/06/03 02:56:11 millert Exp $
2 # $NetBSD: ack.m4,v 1.4 1995/09/28 05:37:54 tls Exp $
35 define(ack, `ifelse($1,0,incr($2),$2,0,`ack(DECR($1),1)', macro
36 `ack(DECR($1), ack($1,DECR($2)))')')
/freebsd/contrib/one-true-awk/testdir/
H A Dfunstack.in149 @String{ack-nhfb = "Nelson H. F. Beebe, Center for Scientific Computing, Department of Mathematics,…
151 @String{ack-nj = "Norbert Juffa, 2445 Mission College Blvd. Santa Clara, CA 95054 USA email: \path=…
355 acknowledgement = ack-nhfb,
400 acknowledgement = ack-nhfb,
422 acknowledgement = ack-nhfb,
440 acknowledgement = ack-nhfb,
459 acknowledgement = ack-nhfb,
477 acknowledgement = ack-nhfb,
498 acknowledgement = ack-nhfb,
516 acknowledgement = ack-nhfb,
[all …]
/freebsd/crypto/openssl/test/recipes/75-test_quicapi_data/
H A Dssltraceref.txt139 Received Frame: Ack (without ECN)
141 Ack delay (raw) 0
142 Ack range count: 0
143 First ack range: 1
181 Received Frame: Ack (without ECN)
183 Ack delay (raw) 0
184 Ack range count: 0
185 First ack range: 2
367 Sent Frame: Ack (without ECN)
369 Ack delay (raw) 0
[all …]

12345678910>>...49