/freebsd-current/sys/dev/nvmf/ |
H A D | nvmf_tcp.c | 1001 uint32_t sent, todo; local 1006 m = nvmf_tcp_command_buffer_mbuf(cb, data_offset, todo, &sent, 1009 sent, sent == data_len); 1011 data_offset += sent; 1012 data_len -= sent;
|
/freebsd-current/sys/dev/ppbus/ |
H A D | ppb_1284.c | 395 byte_peripheral_write(device_t bus, char *buffer, int len, int *sent) argument 432 *sent = i;
|
/freebsd-current/contrib/ntp/include/ |
H A D | ntp.h | 197 long sent; /* number of outgoing packets */ member in struct:endpt_tag 366 l_fp nonce; /* Value of nonce we sent as the xmt stamp */ 403 u_long sent; /* packets sent */ member in struct:peer
|
/freebsd-current/sys/netgraph/bluetooth/hci/ |
H A D | ng_hci_evnt.c | 257 int min_pending, total_sent, sent, error, v; local 288 * Count the number of packets we have sent and then sync 292 for (sent = 0; limit > 0; limit --, total_sent ++, sent ++) { 339 sync_con_queue(unit, winner, sent);
|
/freebsd-current/sys/ofed/include/rdma/ |
H A D | rdmavt_qp.h | 76 * RVT_S_ACK_PENDING - an ACK is waiting to be sent after RDMA read/atomics 119 * Wait flags that would prevent any packet type from being sent. 231 u8 sent; member in struct:rvt_ack_entry 349 u32 s_sending_psn; /* lowest PSN that is being sent */ 350 u32 s_sending_hpsn; /* highest PSN that is being sent */ 362 u8 s_state; /* opcode of last packet sent */
|
/freebsd-current/sys/netinet/ |
H A D | sctp_structs.h | 293 /* last time in seconds I sent to it */ 450 int32_t sent; /* the send status */ member in struct:sctp_tmit_chunk 451 uint16_t snd_count; /* number of times I sent */ 512 * fit every chunk we pull to the send/sent 630 uint32_t chunks_on_queues; /* send queue and sent queue */ 658 uint8_t sent; /* has this been sent yet? */ member in struct:sctp_asconf_addr 687 uint32_t sent; member in struct:sctp_fs_spec_log 872 /* queue of chunks waiting to be sent into the local stack */ 1017 * Number on sent queu [all...] |
H A D | sctp_input.c | 134 * accept()'s by the time the COOKIE was sent. But there is 184 * have old data that has been sent but left at top of stream queue. 576 SCTPDBG(SCTP_DEBUG_INPUT1, "Huh? I can't find the address I sent it to, discard\n"); 815 * max_hb_burst have been sent. 1282 * The primary is where we sent the INIT, we can 1321 * processing will cause the cookie to be sent. 1462 * INIT was sent but got a COOKIE_ECHO with the 1597 * when we first sent our INIT-ACK and when we later 1598 * sent our INIT. The side with the seq numbers that 1648 if (chk->sent < SCTP_DATAGRAM_RESEN [all...] |
H A D | sctputil.c | 670 if (chk->sent == SCTP_DATAGRAM_RESEND) { 672 } else if (chk->sent < SCTP_DATAGRAM_RESEND) { 739 (chk->sent < SCTP_DATAGRAM_RESEND)) { 1295 * count (streamoutcnt) but first check if we sent to any of 1844 * Safeguard. If there on some on the sent queue 1847 * on the send queue on whatever net it is sent to. 3371 sctp_notify_send_failed(struct sctp_tcb *stcb, uint8_t sent, uint32_t error, argument 3429 if (sent) { 3436 /* not exactly what the user sent in, but should be close :) */ 3447 if (sent) { 5066 sctp_release_pr_sctp_chunk(struct sctp_tcb *stcb, struct sctp_tmit_chunk *tp1, uint8_t sent, int so_locked) argument [all...] |
H A D | tcp_input.c | 900 * segment is discarded and an appropriate RST is sent back. 1089 * ACK. If peer sent us 2 ACKs, then for the 1093 * don't want to sent RST for the second ACK, 1890 * is new data available to be sent 2066 * If not all the data that was sent in the TFO SYN 2137 * Client side of transaction: already sent SYN and data. 2749 u_int sent; local 2764 * is new data available to be sent 2775 sent = SEQ_SUB(tp->snd_max, oldsndmax); 2776 if (sent > maxse [all...] |
/freebsd-current/tests/sys/kern/ |
H A D | unix_passfd_test.c | 190 "sendmsg: %zd bytes sent; expected %zu; %s", len, sizeof(ch), 323 for (ssize_t sent = 0; 324 sent + sendspace + sizeof(struct sockaddr) < recvspace; 325 sent += sendspace + sizeof(struct sockaddr)) 537 "sendmsg: %zd bytes sent, errno %d", len, errno); 540 "sendmsg: %zd bytes sent, errno %d", len, errno); 660 "sendmsg: %zd bytes sent, expected < %lu", len, sendspace); 673 "sendmsg: %zd bytes sent, expected %lu", len, sendspace); 707 "sendmsg: %zd bytes sent; expected %zu", len, sizeof(ch));
|
/freebsd-current/contrib/ntp/sntp/ |
H A D | main.c | 670 int sent; local 682 sent = sendpkt(sock, dst, &x_pkt, pkt_len); 683 if (sent) { 684 /* Save the packet we sent... */
|
/freebsd-current/sbin/ipfw/ |
H A D | tables.c | 1198 struct servent *sent; local 1335 if ((sent = getservbyname(arg, NULL)) == NULL) 1338 port = sent->s_port; 1377 if ((sent = getservbyname(arg, NULL)) == NULL) 1380 port = sent->s_port;
|
/freebsd-current/sys/kern/ |
H A D | kern_sendfile.c | 351 * pru_send hadn't been executed - nothing had been sent 672 struct uio *trl_uio, off_t offset, size_t nbytes, off_t *sent, int flags, 817 * been interrupted by a signal. If we've sent anything 818 * then return bytes sent, otherwise return the error. 1233 if (sent != NULL) { 1234 (*sent) = sbytes; 1348 * specified, write the total number of bytes sent into *sbytes. 671 vn_sendfile(struct file *fp, int sockfd, struct uio *hdr_uio, struct uio *trl_uio, off_t offset, size_t nbytes, off_t *sent, int flags, struct thread *td) argument
|
H A D | kern_sig.c | 1778 bool sent; member in struct:killpg1_ctx 1794 arg->sent = true; 1838 arg.sent = false; 1876 MPASS(arg.ret != 0 || arg.found || !arg.sent); 1877 if (arg.ret == 0 && !arg.sent) 2198 * o When a stop signal is sent to a sleeping process that takes the
|
/freebsd-current/tools/regression/security/open_to_operation/ |
H A D | open_to_operation.c | 677 off_t sent; local 694 if (sendfile(fd, sv[0], 0, 1, NULL, &sent, 0) == 0) {
|
/freebsd-current/crypto/openssl/test/recipes/ |
H A D | 70-test_sslrecords.t | 578 $record->{sent} = 1; # pretend it's sent already
|
/freebsd-current/crypto/openssl/ssl/statem/ |
H A D | statem_dtls.c | 158 * Each fragment that was already sent must at least have 263 * got sent. but why would this happen? 280 * reconstruct message header is if it is being sent in 524 * even though we have sent a HelloVerifyRequest. It is possible 888 * We received a ClientHello and sent back a HelloVerifyRequest. We 1088 pqueue *sent = s->d1->sent_messages; local 1094 iter = pqueue_iterator(sent); 1227 /* restore state in which the message was originally sent */
|
/freebsd-current/contrib/ntp/ntpd/ |
H A D | ntp_request.c | 197 u_long numresppkts; /* number of resp packets sent with data */ 377 * has been sent, send an error saying no data to be found. 1045 ip->sent = htonl((u_int32)(pp->sent)); 1217 io->sent = htonl((u_int32)packets_sent); 2742 ifs->sent = htonl(ep->sent);
|
H A D | ntp_peer.c | 1100 peer->sent = 0;
|
H A D | ntp_refclock.c | 367 peer->sent++;
|
/freebsd-current/contrib/bsnmp/snmp_mibII/ |
H A D | mibII.c | 1210 ssize_t sent; local 1235 if ((sent = write(route, msg, msg->rtm_msglen)) == -1) { 1240 if (sent != msg->rtm_msglen) {
|
/freebsd-current/usr.sbin/bhyve/ |
H A D | pci_e82545.c | 1468 int lim, tdwb, sent; local 1482 for (lim = size / 4; sc->esc_tx_enabled && lim > 0; lim -= sent) { 1483 sent = e82545_transmit(sc, head, tail, size, &rhead, &tdwb); 1484 if (sent == 0)
|
/freebsd-current/sys/dev/cxgbe/tom/ |
H A D | t4_cpl_io.c | 93 ("%s: flowc for tid %u sent already", __func__, toep->tid)); 260 ("%s: flowc_wr not sent for tid %d.", __func__, tid)); 464 ("%s: flowc_wr not sent for tid %u.", __func__, tid)); 653 ("%s: flowc_wr not sent for tid %u.", __func__, toep->tid)); 728 /* This mbuf sent us _over_ the nsegs limit, back out */ 1017 * Suspend tx because the PDU can't be sent out. 1131 ("%s: flowc_wr not sent for tid %u.", __func__, toep->tid)); 1299 ("%s: flowc for tid %u [%s] not sent already", 1307 * Peer has sent us a FIN. 1822 * Very unusual case: we'd sent 2178 u_int sent; local [all...] |
/freebsd-current/sys/netgraph/bluetooth/socket/ |
H A D | ng_btsocket_rfcomm.c | 2386 * ...The frames (UIH) sent by the initiating station have the C/R bit set 2387 * to 1 and those sent by the responding station have the C/R bit set to 0..." 2903 * In the PN request sent prior to a DLC establishment, this field must contain 2909 * 1.0B.) If a PN request is sent on an already open DLC, then this field must 3229 int sent, length, error; local 3251 for (error = 0, sent = 0; sent < limit; sent ++) { 3273 pcb->tx_cred -= sent; 3275 if (error == 0 && sent > [all...] |
/freebsd-current/contrib/ntp/ntpdc/ |
H A D | ntpdc_ops.c | 848 fprintf(fp, "packets sent: %lu\n", 849 (u_long)ntohl(pp->sent)); 1151 fprintf(fp, "packets sent: %lu\n", 1152 (u_long)ntohl(io->sent)); 1153 fprintf(fp, "packets not sent: %lu\n", 2619 fprintf(fp, "responses sent: %lu\n", 2621 fprintf(fp, "fragments sent: %lu\n", 2623 fprintf(fp, "async messages sent: %lu\n", 2625 fprintf(fp, "error msgs sent: %lu\n", 3064 #define IF_LIST_LABELS "#", 'A', "Address/Mask/Broadcast", 'T', 'E', "IF name", "Flg", "TL", "#M", "recv", "sent", "dro [all...] |