/freebsd-9.3-release/sys/netinet/ |
H A D | sctputil.c | 613 if (chk->sent == SCTP_DATAGRAM_RESEND) { 615 } else if (chk->sent < SCTP_DATAGRAM_RESEND) { 683 (chk->sent < SCTP_DATAGRAM_RESEND)) { 1047 * count (streamoutcnt) but first check if we sent to any of 1576 * safeguard. If there on some on the sent queue 1579 * on the send queue on whatever net it is sent to. 2811 sctp_notify_send_failed(struct sctp_tcb *stcb, uint8_t sent, uint32_t error, argument 2844 if (sent) { 2853 /* not exactly what the user sent in, but should be close :) */ 2865 if (sent) { 4707 sctp_release_pr_sctp_chunk(struct sctp_tcb *stcb, struct sctp_tmit_chunk *tp1, uint8_t sent, int so_locked SCTP_UNUSED ) argument [all...] |
H A D | tcp_input.c | 880 * segment is discarded and an appropriate RST is sent back. 2007 * Client side of transaction: already sent SYN and data. 2533 u_int sent; local 2558 * is new data available to be sent. 2567 sent = tp->snd_max - oldsndmax; 2568 if (sent > tp->t_maxseg) { 2571 (sent == tp->t_maxseg + 1 && 2573 ("%s: sent too much", 2576 } else if (sent > 0) 2605 * i.e., it ACKs something we sent [all...] |
H A D | sctp_usrreq.c | 121 * since we sent to big of chunk 124 if (chk->sent < SCTP_DATAGRAM_RESEND) { 128 if (chk->sent != SCTP_DATAGRAM_RESEND) { 131 chk->sent = SCTP_DATAGRAM_RESEND; 344 * 'to' holds the dest of the packet that failed to be sent. 823 * should be sent with no data. currently, 824 * we will allow user data to be sent first
|
H A D | sctp_pcb.c | 880 * we have sent an asconf-add to be 961 * sent an asconf-add to be considered 5010 /* sent queue SHOULD be empty */ 5012 if (chk->sent != SCTP_DATAGRAM_NR_ACKED) { 6615 /* peer does not support auth but sent a chunks list? */
|
/freebsd-9.3-release/contrib/ntp/ntpd/ |
H A D | ntp_request.c | 197 u_long numresppkts; /* number of resp packets sent with data */ 377 * has been sent, send an error saying no data to be found. 1043 ip->sent = htonl((u_int32)(pp->sent)); 1213 io->sent = htonl((u_int32)packets_sent); 2705 ifs->sent = htonl(ep->sent);
|
H A D | ntp_peer.c | 1007 peer->sent = 0;
|
H A D | ntp_refclock.c | 294 peer->sent++;
|
H A D | ntp_io.c | 166 u_long packets_sent; /* total number of packets sent */ 167 u_long packets_notsent; /* total number of packets which couldn't be sent */ 538 printf("sent = %ld\n", itf->sent); 1006 "Deleting interface #%d %s, %s#%d, interface stats: received=%ld, sent=%ld, dropped=%ld, active_time=%ld secs", 1012 ep->sent, 3168 src->sent++;
|
H A D | ntp_proto.c | 91 u_char xmt_leap; /* leap indicator sent in client requests, set up by set_sys_leap() */ 110 * below zero. Each time a packet is sent the counter is incremented by 166 u_long sys_kodsent; /* KoD sent */ 1118 * mode packet sent to a multicast group address (for 1121 * reply with what was sent. If there is no match, that's 1319 * peer. If the packet is authentic and the first he sent, 1629 * that we have previously sent out. Watch interleave mode. 1798 * reply to a client packet previously sent. The loopback check 1992 * sent or from a broadcast server, do the extension fields. 2659 * This routine figures out when the next poll should be sent [all...] |
/freebsd-9.3-release/contrib/bsnmp/snmp_mibII/ |
H A D | mibII.c | 1143 ssize_t sent; local 1168 if ((sent = write(route, msg, msg->rtm_msglen)) == -1) { 1173 if (sent != msg->rtm_msglen) {
|
/freebsd-9.3-release/sys/dev/netmap/ |
H A D | netmap.c | 912 u_int sent = 0; local 930 sent++; 945 /* if (sent) XXX txsync ? */ 947 return sent;
|
/freebsd-9.3-release/contrib/binutils/opcodes/ |
H A D | ia64-gen.c | 2562 struct string_entry *sent; 2566 sent = insert_string (prefix); 2570 int cmpres = sent->num - (*ptr)->name->num; 2585 nent->name = sent; 2541 struct string_entry *sent; local
|
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | d1_both.c | 357 * got sent. but why would this happen? 373 * reconstruct message header is if it is being sent in 1169 pqueue sent = s->d1->sent_messages; local 1175 iter = pqueue_iterator(sent); 1311 /* restore state in which the message was originally sent */
|
/freebsd-9.3-release/sys/netgraph/bluetooth/socket/ |
H A D | ng_btsocket_rfcomm.c | 2411 * ...The frames (UIH) sent by the initiating station have the C/R bit set 2412 * to 1 and those sent by the responding station have the C/R bit set to 0..." 2928 * In the PN request sent prior to a DLC establishment, this field must contain 2934 * 1.0B.) If a PN request is sent on an already open DLC, then this field must 3254 int sent, length, error; local 3276 for (error = 0, sent = 0; sent < limit; sent ++) { 3298 pcb->tx_cred -= sent; 3300 if (error == 0 && sent > [all...] |
/freebsd-9.3-release/contrib/ntp/ntpdc/ |
H A D | ntpdc_ops.c | 839 fprintf(fp, "packets sent: %lu\n", 840 (u_long)ntohl(pp->sent)); 1142 fprintf(fp, "packets sent: %lu\n", 1143 (u_long)ntohl(io->sent)); 1144 fprintf(fp, "packets not sent: %lu\n", 2610 fprintf(fp, "responses sent: %lu\n", 2612 fprintf(fp, "fragments sent: %lu\n", 2614 fprintf(fp, "async messages sent: %lu\n", 2616 fprintf(fp, "error msgs sent: %lu\n", 3046 #define IF_LIST_LABELS "#", 'A', "Address/Mask/Broadcast", 'T', 'E', "IF name", "Flg", "TL", "#M", "recv", "sent", "dro [all...] |
/freebsd-9.3-release/contrib/ntp/ntpq/ |
H A D | ntpq-subs.c | 314 int sent; member in struct:ifstats_row_tag 2321 "Subsequent lines not sent.\n", 3313 " # address/broadcast drop flag ttl mc received sent failed peers uptime\n" 3324 prow->received, prow->sent, prow->send_errors, 3374 " # address/broadcast drop flag ttl mc received sent failed peers uptime\n" 3453 1 == sscanf(val, "%d", &row.sent)) 3962 VDC_INIT("io_sent", "packets sent: ", NTP_STR), 4034 VDC_INIT("sent", "packets sent: ", NTP_STR),
|
/freebsd-9.3-release/contrib/cvs/contrib/ |
H A D | cvs_acls.in | 196 Restricted commits can be sent to a default file:
|
/freebsd-9.3-release/contrib/one-true-awk/ |
H A D | FIXES | 26 was sent to the printers in August, 1987.
|
/freebsd-9.3-release/contrib/ncurses/include/ |
H A D | Caps.aix4 | 386 key_eic krmir str kM KEY_EIC 0514 -B-G-* sent by rmir or smir in insert mode 617 key_action kact str kJ - - ----K sent by action key
|
H A D | Caps.osf1r5 | 370 key_eic krmir str kM KEY_EIC 0514 -B-G-* sent by rmir or smir in insert mode 560 key_action kact str kJ KEY_ACTION 0541 ----K sent by action key 1142 #key_action kact str kJ - - ----K sent by action key
|
H A D | Caps.uwin | 354 key_eic krmir str kM KEY_EIC 0514 -B-G-* sent by rmir or smir in insert mode 958 #key_action kact str kJ - - ----K sent by action key
|
H A D | Caps | 386 key_eic krmir str kM KEY_EIC 0514 -B-G-* sent by rmir or smir in insert mode 1132 #key_action kact str kJ - - ----K sent by action key
|
H A D | Caps.hpux11 | 388 key_eic krmir str kM KEY_EIC 0514 -B-G-* sent by rmir or smir in insert mode 1146 #key_action kact str kJ - - ----K sent by action key
|
H A D | Caps.keys | 388 key_eic krmir str kM KEY_EIC 0514 -B-G-* sent by rmir or smir in insert mode 1222 #key_action kact str kJ - - ----K sent by action key
|