Searched refs:asconf (Results 1 - 3 of 3) sorted by relevance

/freebsd-10.1-release/sys/netinet/
H A Dsctp_timer.c1023 * For cookie and asconf we actually need to find and mark for resend, then
1157 struct sctp_tmit_chunk *asconf, *chk; local
1169 asconf = TAILQ_FIRST(&stcb->asoc.asconf_send_queue);
1170 if (asconf == NULL) {
1174 if (sctp_threshold_management(inp, stcb, asconf->whoTo,
1179 if (asconf->snd_count > stcb->asoc.max_send_times) {
1195 sctp_backoff_on_timeout(stcb, asconf->whoTo, 1, 0, 0);
1196 alt = sctp_find_alternate_net(stcb, asconf->whoTo, 0);
1197 if (asconf->whoTo != alt) {
1198 sctp_free_remote_addr(asconf
[all...]
H A Dsctp_input.c482 /* if the peer doesn't support asconf, flush the asconf queue */
748 SCTPDBG(SCTP_DEBUG_INPUT2, "sctp_handle_nat_missing_state: Peer does not support AUTH, cannot send an asconf\n");
2240 * after we go to the OPEN state to do the correct asconf
2942 * We don't need to do the asconf thing, nor hb or
3353 struct sctp_tmit_chunk *asconf; local
3355 TAILQ_FOREACH(asconf, &stcb->asoc.control_send_queue,
3357 if (asconf->rec.chunk_id.id == SCTP_ASCONF) {
3361 if (asconf) {
3362 if (asconf
[all...]
H A Dsctp_output.c7806 int asconf, cookie, no_out_cnt; local
7832 ctl_cnt = no_out_cnt = asconf = cookie = 0;
7997 * Nothing on control or asconf and flight is full,
8060 /* Now first lets go through the asconf queue */
8155 asconf = 1;
8176 * do NOT clear the asconf flag as
8184 no_fragmentflg, 0, asconf,
8440 if (asconf) {
8443 * do NOT clear the asconf
8458 no_fragmentflg, 0, asconf,
[all...]

Completed in 100 milliseconds