Lines Matching refs:wake

689 // and then if the machine fails to wake, 3 goodbye packets).
1020 // When we wake up from sleep, we call ActivateUnicastRegistration. It is possible that just before we went to sleep,
5332 // signal whatever blocking primitive the main thread is using, so that it will wake up and execute one
5382 // 2. On wake from sleep
6093 // We will use this to prevent spurious name conflicts that may occur when we wake up
6226 // If the service type is wake only service and the auth flags match and requires a goodbye
6637 // wake up notification, we might adjust the TimeRcvd based on the time slept
6695 // track of passage of time while asleep, so on wake we refresh our NAT mappings.
6696 // We typically wake up with no interfaces active, so there's no need to rush to try to find our external address.
6804 // we'll be put back to sleep forcibly without the chance to schedule the next maintenance wake.
6805 // Right now we wait 16 sec after wake for all the interfaces to come up, then we wait up to 10 seconds
6822 // Even when we have no wake-on-LAN-capable interfaces, or we failed to find a sleep proxy, or we have other
6823 // failure scenarios, we still want to wake up in at most 120 minutes, to see if the network environment has changed.
6824 // E.g. we might wake up and find no wireless network because the base station got rebooted just at that moment,
7122 rr->WakeUp.HMAC = zeroEthAddr; // Clear HMAC so that mDNS_Deregister_internal doesn't waste packets trying to wake this host
7206 rr->WakeUp.HMAC = zeroEthAddr; // Clear HMAC so that mDNS_Deregister_internal doesn't waste packets trying to wake this host
10172 rr->WakeUp.HMAC = zeroEthAddr; // Clear HMAC so that mDNS_Deregister_internal doesn't waste packets trying to wake this host
12945 // it here also handles the wake up case as the network link comes UP after waking causing
12946 // us to reconnect to the network. If we do this as part of the wake up code, it is possible
13753 // If the sender hardware address is *not* the original owner, then this is a conflict, and we need to wake the sleeping machine to handle it.
13896 mDNSBool wake = mDNSfalse;
13901 #define XX wake ? "Received" : "Ignoring", end-p
13917 // Plan to wake if
13922 wake = ((t->tcp.flags & TH_RST) || (t->tcp.flags & TH_FIN)) ;
13923 if (!wake)
13951 wake = ((int)(pack - seq) > 0) && ((int)(pseq - ack) >= 0) && data;
13960 LogSPS("mDNSCoreReceiveRawTransportPacket: End %p, hlen %d, Datalen %d, pack %u, seq %u, pseq %u, ack %u, wake %d",
13961 end, tcphlen, end - ((mDNSu8 *)t + tcphlen), pack, seq, pseq, ack, wake);
13964 kaWake = wake;
13968 // Plan to wake if
13970 // (b) packet is SYN, SYN+FIN, or plain data packet (no SYN or FIN). We won't wake for FIN alone.
13971 wake = (!(t->tcp.flags & TH_RST) && (t->tcp.flags & (TH_FIN|TH_SYN)) != TH_FIN);
13973 // For now, to reduce spurious wakeups, we wake only for TCP SYN,
13974 // except for ssh connections, where we'll wake for plain data packets too
13975 if (!mDNSSameIPPort(port, SSHPort) && !(t->tcp.flags & 2)) wake = mDNSfalse;
13993 wake = mDNStrue;
13999 if (datalen == 1 && end >= &t->bytes[9] && t->bytes[8] == 0xFF) wake = mDNSfalse;
14011 if (ike->ExchangeType == 5 || ike->ExchangeType == 34) wake = mDNSfalse;
14022 if (mDNSSameIPPort(port, ARD)) wake = (datalen >= 110 && end >= &t->bytes[10] && t->bytes[8] == 0x13 && t->bytes[9] == 0x88);
14041 if (wake)
14058 if (!r2 && mDNSSameIPPort(port, IPSECPort)) r2 = rr; // So that we wake for BTMM IPSEC packets, even without a matching SRV record
14059 if (!r2 && kaWake) r2 = rr; // So that we wake for keepalive packets, even without a matching SRV record
14191 LogSPS("mDNSCoreBeSleepProxyServer turning off from state %d; will wake clients", m->SPSState);