/freebsd/crypto/openssl/doc/designs/quic-design/ |
H A D | quic-ackm.md | 1 QUIC ACK Manager 4  6 The QUIC ACK manager is responsible for, on the TX side: 8 - Handling received ACK frames 17 - Generating ACK frames for later transmission in response to packets we 22 In order to allow it to perform these tasks, the ACK manager must: 27 - be notified of all received ACK frames 31 The ACK manager consumes: 37 The ACK manager provides the following outputs: 44 - It indicates what ACK frames should be generated. [all …]
|
H A D | tx-packetiser.md | 6 Record Layer and ACK frames from the ACK Handling And Loss Detector 20 /* ACK delay exponent used when encoding. */ 148 ### TXPIM, FIFD, ACK Handling and Loss Detector 150 ACK handling and loss detection is provided by the ACKM and FIFD. The FIFD uses 157 the ACK Manager. 265 | 0x02 | ack 0x02 | ✓ | ✓ | | ✓ | ✓ | ✓ | … 266 | 0x03 | ack 0x03 | ✓ | ✓ | | ✓ | ✓ | ✓ | … 314 | N | Not ack-eliciting. | 320 marking for the packet to qualify for it. For example, a packet with an ACK 352 ACK - (non-ACK-eliciting) [all …]
|
/freebsd/crypto/openssl/ssl/quic/ |
H A D | quic_ackm.c | 22 * sent for which we later expect to receive an ACK. It is essentially a simple 171 * **Background.** The RX side of the ACK manager must track packets we have 172 * received for which we have to generate ACK frames. Broadly, this means we 178 * 1. We receive a packet but have not sent an ACK yet, so the transmitter 181 * 2. We receive a packet and send an ACK which is lost. We do not 182 * immediately know that the ACK was lost and the transmitter does not know 185 * 3. We receive a packet and send an ACK which is received by the 186 * transmitter. The transmitter does not immediately respond with an ACK, 187 * or responds with an ACK which is lost. The transmitter knows that we 189 * because the ACK we sent could have been lost. [all …]
|
H A D | quic_wire.c | 19 int ossl_quic_frame_ack_contains_pn(const OSSL_QUIC_FRAME_ACK *ack, QUIC_PN pn) in OSSL_SAFE_MATH_UNSIGNED() 23 for (i = 0; i < ack->num_ack_ranges; ++i) in OSSL_SAFE_MATH_UNSIGNED() 24 if (pn >= ack->ack_ranges[i].start in OSSL_SAFE_MATH_UNSIGNED() 25 && pn <= ack->ack_ranges[i].end) in OSSL_SAFE_MATH_UNSIGNED() 57 const OSSL_QUIC_FRAME_ACK *ack) in ossl_quic_wire_encode_frame_ack() argument 59 uint64_t frame_type = ack->ecn_present ? OSSL_QUIC_FRAME_TYPE_ACK_WITH_ECN in ossl_quic_wire_encode_frame_ack() 63 uint64_t i, num_ack_ranges = ack->num_ack_ranges; in ossl_quic_wire_encode_frame_ack() 69 delay = ossl_time_divide(ossl_time_divide(ack->delay_time, OSSL_TIME_US), in ossl_quic_wire_encode_frame_ack() 73 largest_ackd = ack->ack_ranges[0].end; in ossl_quic_wire_encode_frame_ack() 74 first_ack_range = ack->ack_ranges[0].end - ack->ack_ranges[0].start; in ossl_quic_wire_encode_frame_ack() [all …]
|
H A D | quic_trace.c | 83 OSSL_QUIC_FRAME_ACK ack; in frame_ack() local 96 ack.ack_ranges = ack_ranges; in frame_ack() 97 ack.num_ack_ranges = (size_t)total_ranges; in frame_ack() 99 /* Ack delay exponent is 0, so we can get the raw delay time below */ in frame_ack() 100 if (!ossl_quic_wire_decode_frame_ack(pkt, 0, &ack, NULL)) in frame_ack() 104 (unsigned long long)ack.ack_ranges[0].end); in frame_ack() 105 BIO_printf(bio, " Ack delay (raw) %llu\n", in frame_ack() 106 (unsigned long long)ossl_time2ticks(ack.delay_time)); in frame_ack() 107 BIO_printf(bio, " Ack range count: %llu\n", in frame_ack() 109 BIO_printf(bio, " First ack range: %llu\n", in frame_ack() [all …]
|
H A D | qlog_event_helpers.c | 210 OSSL_QUIC_FRAME_ACK ack; in log_frame_actual() local 243 ack.ack_ranges = ack_ranges; in log_frame_actual() 244 ack.num_ack_ranges = OSSL_NELEM(ack_ranges); in log_frame_actual() 245 if (!ossl_quic_wire_decode_frame_ack(pkt, 3, &ack, &total_ranges)) in log_frame_actual() 248 QLOG_STR("frame_type", "ack"); in log_frame_actual() 249 QLOG_U64("ack_delay", ossl_time2ms(ack.delay_time)); in log_frame_actual() 250 if (ack.ecn_present) { in log_frame_actual() 251 QLOG_U64("ect1", ack.ect0); in log_frame_actual() 252 QLOG_U64("ect0", ack.ect1); in log_frame_actual() 253 QLOG_U64("ce", ack.ecnce); in log_frame_actual() [all …]
|
/freebsd/contrib/netbsd-tests/ipf/input/ |
H A D | ni5 | 7 # 21,32818 SYN+ACK 13 # 32818,21 ACK 19 # ACK+PUSH "[220-coombs.anu.edu.au NcFTPd Server (free educational license) ready.\r\n" 29 # 32818,21 ACK 35 # 21,32818 ACK+PUSH 54 # 32818,21 ACK 60 # 32818,21 ACK+PUSH "USER anonymous\r\n" 67 # 21,32818 ACK 73 # 21,32818 ACK+PUSH "331 Guest login ok, send your complete e-mail address as password.\r\n" 83 # 32818,21 ACK [all …]
|
H A D | f11 | 1 in on e0 tcp 1.1.1.1,1 2.1.2.2,23 S seq=1 ack=0 2 in on e0 tcp 1.1.1.1,1 2.1.2.2,24 SA seq=1 ack=1 3 in on e1 tcp 2.1.2.2,23 1.1.1.1,2 SA seq=101 ack=2 4 in on e1 tcp 2.1.2.2,23 1.1.1.1,1 SA seq=101 ack=2 5 in on e0 tcp 1.1.1.1,1 2.1.2.2,23 A seq=2 ack=102 6 in on e0 tcp 1.1.1.1,1 2.1.2.2,25 A seq=2 ack=102 7 in on e1 tcp 2.1.2.2,23 1.1.1.1,1 A seq=102 ack=2 8 in on e1 tcp 2.1.2.2,25 1.1.1.1,1 A seq=102 ack=2 9 in on e0 tcp 1.1.1.1,1 2.1.2.2,23 FA seq=2 ack=102 10 in on e0 tcp 1.1.1.1,1 2.1.2.2,23 A seq=2 ack=102 [all …]
|
H A D | ni20 | 47 # 192.168.113.4.1023 > 192.168.113.3.1008 ACK 54 # 192.168.113.3.1009 > 10.1.1.4.shell PUSH+ACK 60 # 192.168.113.4.shell > 192.168.113.3.1009 ACK 66 # 192.168.113.3.1009 > 10.1.1.4.shell PUSH+ACK 75 # 192.168.113.4.shell > 192.168.113.3.1009 ACK 81 # 192.168.113.4.shell > 192.168.113.3.1009 PUSH+ACK 87 # 192.168.113.3.1009 > 10.1.1.4.shell ACK 93 # 192.168.113.4.shell > 192.168.113.3.1009 PUSH+ACK 99 # 192.168.113.4.1023 > 192.168.113.3.1008 PUSH+ACK 106 # 192.168.113.4.shell > 192.168.113.3.1009 FIN+ACK [all …]
|
/freebsd/contrib/tcpdump/ |
H A D | print-decnet.c | 275 #define SGQ_ACK 0100000 /* ack */ 276 #define SGQ_NAK 0110000 /* negative ack */ 277 #define SGQ_OACK 0120000 /* other channel ack */ 278 #define SGQ_ONAK 0130000 /* other channel negative ack */ 281 #define SGQ_DELAY 010000 /* ack delay flag */ 817 u_int ack; in print_nsp() local 822 ack = GET_LE_U_2(shp->sh_seq[0]); in print_nsp() 823 if (ack & SGQ_ACK) { /* acknum field */ in print_nsp() 824 if ((ack & SGQ_NAK) == SGQ_NAK) in print_nsp() 825 ND_PRINT("nak %u ", ack & SGQ_MASK); in print_nsp() [all …]
|
H A D | README.md | 82 send-ack.awk 86 we just note if the packet is a "send" or an "ack". 92 "Send" means data going from sender to receiver, "ack" 93 means an ack going from the receiver to the sender. A 100 for acks). The number in parens following an ack is 102 ack. A number in parens following a send is the 110 3.20 0.20 ack . 1024 (0.20) 112 3.40 0.20 ack . 1536 (0.20) 114 3.82 0.02 * ack . 1536 (0.62) [2] 141 5 - time of first ack [all …]
|
H A D | atime.awk | 1 $6 ~ /^ack/ && $5 !~ /[SFR]/ { 2 # given a tcpdump ftp trace, output one line for each ack 4 # <ack time> <seq no> 5 # where <ack time> is the time packet was acked (in seconds with 7 # number of the ack divided by 1024 (i.e., Kbytes acked).
|
/freebsd/crypto/openssl/include/internal/ |
H A D | quic_ackm.h | 41 * Configures the RX-side maximum ACK delay. This is the maximum amount of time 42 * the peer is allowed to delay sending an ACK frame after receiving an 43 * ACK-eliciting packet. The peer communicates this value via a transport 49 * Configures the TX-side maximum ACK delay. This is the maximum amount of time 50 * we are allowed to delay sending an ACK frame after receiving an ACK-eliciting 69 * If the packet being described by this structure contains an ACK frame, 70 * this must be set to the largest PN ACK'd by that frame. 90 * numbered packet is not considered in flight is if it contains only ACK 96 * 1 if the packet has one or more ACK-eliciting frames. 152 /* 1 if the packet has one or more ACK-eliciting frames. */ [all …]
|
/freebsd/crypto/openssl/test/ |
H A D | quic_ackm_test.c | 105 /* Initialise ACK manager. */ in helper_init() 141 * TX ACK (Packet Threshold) Test Cases 149 const char *expect_ack; /* 1=ack, 2=lost, 4=discarded */ 344 OSSL_QUIC_FRAME_ACK ack = {0}; in test_tx_ack_case_actual() local 400 ack.ack_ranges = (OSSL_QUIC_ACK_RANGE *)c->ack_ranges; in test_tx_ack_case_actual() 401 ack.num_ack_ranges = c->num_ack_ranges; in test_tx_ack_case_actual() 402 if (!TEST_int_eq(ossl_ackm_on_rx_ack_frame(h.ackm, &ack, space, fake_time), 1)) in test_tx_ack_case_actual() 475 * TX ACK (Time Threshold) Test 481 TX_ACK_TIME_OP_ACK, /* Synthesise incoming ACK of single PN range */ 482 TX_ACK_TIME_OP_EXPECT /* Ack/loss assertion */ [all …]
|
H A D | quic_wire_test.c | 75 /* 3. ACK */ 157 0x40, 0x7d, /* ACK Delay */ 158 1, /* ACK Range Count */ 159 10, /* First ACK Range */ 1293 /* ACK Frame with Excessive First ACK Range Field */ 1295 0x02, /* ACK Without ECN */ 1297 0x01, /* ACK Delay */ 1298 0x00, /* ACK Range Count */ 1299 0x09, /* First ACK Range */ 1302 /* ACK Frame with Valid ACK Range Field */ [all …]
|
/freebsd/share/man/man4/ |
H A D | syncache.4 | 55 and a SYN,ACK segment is 60 enough state to perform a SYN,ACK retransmission, and takes up less 62 An incoming segment which contains an ACK for the SYN,ACK 83 sends a cryptographic value in the SYN,ACK reply to 84 the client machine, which is then returned in the client's ACK. 100 As the returning ACK establishes the connection, it may be possible for 101 an attacker to ACK flood a machine in an attempt to create a connection. 158 Maximum number of times a SYN,ACK is retransmitted before being discarded. 201 SYN,ACK retransmissions due to a timeout expiring. 205 SYNs dropped because SYN,ACK could not be sent. [all …]
|
/freebsd/sys/dev/pcf/ |
H A D | pcf.c | 93 pcf_set_S1(sc, PIN|ESO|ENI|STO|ACK); in pcf_stop_locked() 128 pcf_set_S1(sc, ESO|STA|STO|ACK); in pcf_repeated_start() 138 /* check for ack */ in pcf_repeated_start() 142 printf("pcf: no ack on repeated_start!\n"); in pcf_repeated_start() 179 pcf_set_S1(sc, PIN|ESO|STA|ACK); in pcf_start() 187 /* check for ACK */ in pcf_start() 191 printf("pcf: no ack on start!\n"); in pcf_start() 253 /* ack interrupt line */ in pcf_intr() 256 /* no ack, don't send anymore */ in pcf_intr() 293 /* ack interrupt line */ in pcf_intr() [all …]
|
/freebsd/sys/riscv/sifive/ |
H A D | fu740_pci_dw.c | 114 uint32_t ack; in fupci_phy_read() local 121 ack = FUDW_MGMT_READ(sc, FUDW_MGMT_PHY_CR_PARA_REG(phy, ACK)); in fupci_phy_read() 122 if (ack != 0) in fupci_phy_read() 128 device_printf(sc->dev, "Timeout waiting for read ACK\n"); in fupci_phy_read() 137 ack = FUDW_MGMT_READ(sc, FUDW_MGMT_PHY_CR_PARA_REG(phy, ACK)); in fupci_phy_read() 138 if (ack == 0) in fupci_phy_read() 144 device_printf(sc->dev, "Timeout waiting for read un-ACK\n"); in fupci_phy_read() 155 uint32_t ack; in fupci_phy_write() local 163 ack = FUDW_MGMT_READ(sc, FUDW_MGMT_PHY_CR_PARA_REG(phy, ACK)); in fupci_phy_write() 164 if (ack != 0) in fupci_phy_write() [all …]
|
/freebsd/contrib/libpcap/ |
H A D | ieee80211.h | 129 "cts", "ack", \ 130 "cf-end", "cf-end-ack" \ 134 "data", "data-cf-ack", \ 135 "data-cf-poll", "data-cf-ack-poll", \ 136 "null", "cf-ack", \ 137 "cf-poll", "cf-ack-poll", \ 138 "qos-data", "qos-data-cf-ack", \ 139 "qos-data-cf-poll", "qos-data-cf-ack-poll", \ 141 "qos-cf-poll", "qos-cf-ack-poll" \
|
/freebsd/sys/netinet/ |
H A D | sctp_header.h | 169 /* Initiate (INIT)/Initiate Ack (INIT ACK) */ 191 uint32_t my_vtag; /* my tag in INIT-ACK (for quick ref) */ 210 * at the end is tacked on the INIT chunk and the INIT-ACK chunk 231 /* ... used for both INIT and INIT ACK */ 236 /* Selective Ack (SACK) */ 238 uint16_t start; /* Gap Ack block start */ 239 uint16_t end; /* Gap Ack block end */ 243 uint32_t cum_tsn_ack; /* cumulative TSN Ack */ 245 uint16_t num_gap_ack_blks; /* number of Gap Ack blocks */ 257 uint32_t cum_tsn_ack; /* cumulative TSN Ack */ [all …]
|
H A D | tcp_input.c | 155 "Delay ACK to try and piggyback it onto a data packet"); 210 "Follow RFC793 criteria for validating SEG.ACK"); 254 * receiving a duplicate ACK with a SACK block, and also 402 * If a SYN or SYN/ACK was lost and retransmitted, we have to in cc_conn_init() 407 tp->snd_cwnd = maxseg; /* SYN(-ACK) lost */ in cc_conn_init() 435 * Allow ECN reaction on ACK to CWR, if in cc_cong_signal() 503 * Indicate whether this ack should be delayed. We can delay the ack if 505 * - There is no delayed ack timer in progress. 506 * - Our last ack wasn't a 0-sized window. We never want to delay 507 * the ack that opens up a 0-sized window. [all …]
|
/freebsd/libexec/tftpd/ |
H A D | tftp-transfer.c | 107 /* Only check for ACK for last block in window. */ in tftp_send() 115 "Timeout #%d send ACK %d " in tftp_send() 120 "Timeout #%d on ACK %d", in tftp_send() 143 if (rp->th_opcode == ACK) { in tftp_send() 154 /* Did not recognize ACK. */ in tftp_send() 157 "ACK %d out of window", in tftp_send() 189 * Partial ACK. Rewind state to first in tftp_send() 195 "Partial ACK"); in tftp_send() 265 "Cannot send ACK packet #%d, " in tftp_receive() 270 "Cannot send ACK packet #%d, trying again", in tftp_receive() [all …]
|
/freebsd/usr.bin/m4/TEST/ |
H A D | ack.m4 | 1 # $OpenBSD: ack.m4,v 1.3 2003/06/03 02:56:11 millert Exp $ 2 # $NetBSD: ack.m4,v 1.4 1995/09/28 05:37:54 tls Exp $ 35 define(ack, `ifelse($1,0,incr($2),$2,0,`ack(DECR($1),1)', macro 36 `ack(DECR($1), ack($1,DECR($2)))')')
|
/freebsd/contrib/one-true-awk/testdir/ |
H A D | funstack.in | 149 @String{ack-nhfb = "Nelson H. F. Beebe, Center for Scientific Computing, Department of Mathematics,… 151 @String{ack-nj = "Norbert Juffa, 2445 Mission College Blvd. Santa Clara, CA 95054 USA email: \path=… 355 acknowledgement = ack-nhfb, 400 acknowledgement = ack-nhfb, 422 acknowledgement = ack-nhfb, 440 acknowledgement = ack-nhfb, 459 acknowledgement = ack-nhfb, 477 acknowledgement = ack-nhfb, 498 acknowledgement = ack-nhfb, 516 acknowledgement = ack-nhfb, [all …]
|
/freebsd/crypto/openssl/test/recipes/75-test_quicapi_data/ |
H A D | ssltraceref.txt | 139 Received Frame: Ack (without ECN) 141 Ack delay (raw) 0 142 Ack range count: 0 143 First ack range: 1 181 Received Frame: Ack (without ECN) 183 Ack delay (raw) 0 184 Ack range count: 0 185 First ack range: 2 367 Sent Frame: Ack (without ECN) 369 Ack delay (raw) 0 [all …]
|