Searched refs:asconf (Results 1 - 3 of 3) sorted by relevance
/freebsd-10.1-release/sys/netinet/ |
H A D | sctp_timer.c | 1023 * For cookie and asconf we actually need to find and mark for resend, then 1157 struct sctp_tmit_chunk *asconf, *chk; local 1169 asconf = TAILQ_FIRST(&stcb->asoc.asconf_send_queue); 1170 if (asconf == NULL) { 1174 if (sctp_threshold_management(inp, stcb, asconf->whoTo, 1179 if (asconf->snd_count > stcb->asoc.max_send_times) { 1195 sctp_backoff_on_timeout(stcb, asconf->whoTo, 1, 0, 0); 1196 alt = sctp_find_alternate_net(stcb, asconf->whoTo, 0); 1197 if (asconf->whoTo != alt) { 1198 sctp_free_remote_addr(asconf [all...] |
H A D | sctp_input.c | 482 /* if the peer doesn't support asconf, flush the asconf queue */ 748 SCTPDBG(SCTP_DEBUG_INPUT2, "sctp_handle_nat_missing_state: Peer does not support AUTH, cannot send an asconf\n"); 2240 * after we go to the OPEN state to do the correct asconf 2942 * We don't need to do the asconf thing, nor hb or 3353 struct sctp_tmit_chunk *asconf; local 3355 TAILQ_FOREACH(asconf, &stcb->asoc.control_send_queue, 3357 if (asconf->rec.chunk_id.id == SCTP_ASCONF) { 3361 if (asconf) { 3362 if (asconf [all...] |
H A D | sctp_output.c | 7806 int asconf, cookie, no_out_cnt; local 7832 ctl_cnt = no_out_cnt = asconf = cookie = 0; 7997 * Nothing on control or asconf and flight is full, 8060 /* Now first lets go through the asconf queue */ 8155 asconf = 1; 8176 * do NOT clear the asconf flag as 8184 no_fragmentflg, 0, asconf, 8440 if (asconf) { 8443 * do NOT clear the asconf 8458 no_fragmentflg, 0, asconf, [all...] |
Completed in 100 milliseconds