Searched refs:asconf (Results 1 - 3 of 3) sorted by relevance

/freebsd-10-stable/sys/netinet/
H A Dsctp_timer.c1035 * For cookie and asconf we actually need to find and mark for resend, then
1169 struct sctp_tmit_chunk *asconf, *chk; local
1181 asconf = TAILQ_FIRST(&stcb->asoc.asconf_send_queue);
1182 if (asconf == NULL) {
1186 if (sctp_threshold_management(inp, stcb, asconf->whoTo,
1191 if (asconf->snd_count > stcb->asoc.max_send_times) {
1207 sctp_backoff_on_timeout(stcb, asconf->whoTo, 1, 0, 0);
1208 alt = sctp_find_alternate_net(stcb, asconf->whoTo, 0);
1209 if (asconf->whoTo != alt) {
1210 sctp_free_remote_addr(asconf
[all...]
H A Dsctp_input.c487 /* if the peer doesn't support asconf, flush the asconf queue */
752 SCTPDBG(SCTP_DEBUG_INPUT2, "sctp_handle_nat_missing_state: Peer does not support AUTH, cannot send an asconf\n");
2264 * after we go to the OPEN state to do the correct asconf
2965 * We don't need to do the asconf thing, nor hb or
3376 struct sctp_tmit_chunk *asconf; local
3378 TAILQ_FOREACH(asconf, &stcb->asoc.control_send_queue,
3380 if (asconf->rec.chunk_id.id == SCTP_ASCONF) {
3384 if (asconf) {
3385 if (asconf
[all...]
H A Dsctp_output.c7816 int asconf, cookie, no_out_cnt; local
7843 ctl_cnt = no_out_cnt = asconf = cookie = 0;
8008 * Nothing on control or asconf and flight is full,
8072 /* Now first lets go through the asconf queue */
8167 asconf = 1;
8188 * do NOT clear the asconf flag as
8202 no_fragmentflg, 0, asconf,
8453 if (asconf) {
8456 * do NOT clear the asconf
8480 no_fragmentflg, 0, asconf,
[all...]

Completed in 91 milliseconds