Searched refs:asconf (Results 1 - 3 of 3) sorted by relevance

/freebsd-10.0-release/sys/netinet/
H A Dsctp_timer.c1033 * For cookie and asconf we actually need to find and mark for resend, then
1179 struct sctp_tmit_chunk *asconf, *chk; local
1191 asconf = TAILQ_FIRST(&stcb->asoc.asconf_send_queue);
1192 if (asconf == NULL) {
1196 if (sctp_threshold_management(inp, stcb, asconf->whoTo,
1201 if (asconf->snd_count > stcb->asoc.max_send_times) {
1217 sctp_backoff_on_timeout(stcb, asconf->whoTo, 1, 0, 0);
1218 alt = sctp_find_alternate_net(stcb, asconf->whoTo, 0);
1219 if (asconf->whoTo != alt) {
1220 sctp_free_remote_addr(asconf
[all...]
H A Dsctp_input.c476 /* if the peer doesn't support asconf, flush the asconf queue */
755 SCTPDBG(SCTP_DEBUG_INPUT2, "sctp_handle_nat_missing_state: Peer does not support AUTH, cannot send an asconf\n");
2272 * after we go to the OPEN state to do the correct asconf
2971 * We don't need to do the asconf thing, nor hb or
3382 struct sctp_tmit_chunk *asconf; local
3384 TAILQ_FOREACH(asconf, &stcb->asoc.control_send_queue,
3386 if (asconf->rec.chunk_id.id == SCTP_ASCONF) {
3390 if (asconf) {
3391 if (asconf
[all...]
H A Dsctp_output.c4610 * assume peer supports asconf in order to be able to queue local
7646 int asconf, cookie, no_out_cnt; local
7673 ctl_cnt = no_out_cnt = asconf = cookie = 0;
7838 * Nothing on control or asconf and flight is full,
7901 /* Now first lets go through the asconf queue */
7996 asconf = 1;
8017 * do NOT clear the asconf flag as
8025 no_fragmentflg, 0, asconf,
8281 if (asconf) {
8284 * do NOT clear the asconf
[all...]

Completed in 120 milliseconds