Searched refs:sent (Results 1 - 25 of 149) sorted by last modified time

123456

/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/Security/
H A DSSLRecordInternal.c210 out->sent = 0;
293 { buf.data = rec->data + rec->sent;
294 buf.length = rec->length - rec->sent;
296 rec->sent += written;
297 if (rec->sent >= rec->length)
299 check(rec->sent == rec->length);
H A DsslHandshake.h123 SSL_HdskStateServerHello, /* must get server hello; client hello sent */
172 #define SSLLogHdskMsg(msg, sent)
175 void SSLLogHdskMsg(SSLHandshakeType msg, char sent);
H A Dtls_record_internal.h49 size_t sent; member in struct:WaitingRecord
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/lib/
H A DSSLRecordInternal.c210 out->sent = 0;
293 { buf.data = rec->data + rec->sent;
294 buf.length = rec->length - rec->sent;
296 rec->sent += written;
297 if (rec->sent >= rec->length)
299 check(rec->sent == rec->length);
H A DsslHandshake.h123 SSL_HdskStateServerHello, /* must get server hello; client hello sent */
172 #define SSLLogHdskMsg(msg, sent)
175 void SSLLogHdskMsg(SSLHandshakeType msg, char sent);
H A Dtls_record_internal.h49 size_t sent; member in struct:WaitingRecord
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/regressions/
H A Dssl-47-falsestart.c229 size_t sent, received; local
235 ortn = SSLWrite(ctx, r, l, &sent);
238 r+=sent;
239 l-=sent;
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/
H A DSSLRecordInternal.c210 out->sent = 0;
293 { buf.data = rec->data + rec->sent;
294 buf.length = rec->length - rec->sent;
296 rec->sent += written;
297 if (rec->sent >= rec->length)
299 check(rec->sent == rec->length);
H A DsslHandshake.h123 SSL_HdskStateServerHello, /* must get server hello; client hello sent */
172 #define SSLLogHdskMsg(msg, sent)
175 void SSLLogHdskMsg(SSLHandshakeType msg, char sent);
H A Dtls_record_internal.h49 size_t sent; member in struct:WaitingRecord
/macosx-10.10.1/Security-57031.1.35/Security/sec/SOSCircle/Regressions/
H A DSOSTestDevice.c179 SOSEnginePeerMessageSentBlock sent = NULL; local
181 ok(msgData = SOSEngineCreateMessageToSyncToPeer(td->ds->engine, peerID, &sent, &error),
183 if (sent)
184 sent(true);
/macosx-10.10.1/Security-57031.1.35/Security/sec/SOSCircle/SecureObjectSync/
H A DSOSEngine.c560 secerror("%@ peer sent bad object: %@, rolling back changes", SOSPeerGetID(peer), error ? *error : NULL);
681 CFErrorRef *error, SOSEnginePeerMessageSentBlock *sent) {
862 *sent = Block_copy(^(bool success) {
680 SOSEngineCreateMessage_locked(SOSEngineRef engine, SOSPeerRef peer, CFErrorRef *error, SOSEnginePeerMessageSentBlock *sent) argument
H A DSOSPeerCoder.c59 void SOSPeerCoderConsume(SOSEnginePeerMessageSentBlock *sent, bool ok){ argument
60 if (*sent)
61 (*sent)(ok);
125 bool SOSPeerCoderSendMessageIfNeeded(SOSPeerRef peer, CFDataRef *message_to_send, CFStringRef circle_id, CFStringRef peer_id, SOSEnginePeerMessageSentBlock *sent, CFErrorRef *error){ argument
134 CFDataRef message = SOSEngineCreateMessageToSyncToPeer(SOSPeerGetEngine(peer), peer_id, sent, error);
151 *sent = Block_copy(^(bool wasSent){
H A DSOSPeerCoder.h13 bool SOSPeerCoderSendMessageIfNeeded(SOSPeerRef peer, CFDataRef *message_to_send, CFStringRef circle_id, CFStringRef peer_id, SOSEnginePeerMessageSentBlock *sent, CFErrorRef *error);
19 bool SOSPeerSendMessageIfNeeded(SOSPeerRef peer, CFDataRef *message, CFDataRef *message_to_send, SOSCoderRef *coder, CFStringRef circle_id, CFStringRef peer_id, SOSEnginePeerMessageSentBlock *sent, CFErrorRef *error);
21 void SOSPeerCoderConsume(SOSEnginePeerMessageSentBlock *sent, bool ok);
H A DSOSTransportCoder.c163 SOSEnginePeerMessageSentBlock sent = NULL; local
170 CFDataRef message = SOSEngineCreateMessageToSyncToPeer(SOSTransportMessageGetEngine(transport), peer_id, &sent, error);
187 sent = Block_copy(^(bool wasSent){
204 if (sent)
205 sent(ok);
211 Block_release(sent);
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/Tool/
H A Dscep.c371 A binary X.509 CA certificate is sent back as a MIME object with a
374 When an RA exists, both CA and RA certificates must be sent back in
437 | "POSTPKIOperation" | PKIOPeration messages may be sent via HTTP |
/macosx-10.10.1/xnu-2782.1.97/bsd/nfs/
H A Dnfs_socket.c173 * Estimate rto for an nfs rpc sent via. an unreliable datagram.
212 * (The sent count and cwnd are scaled for integer arith.)
2921 * If sent successfully, R_MUSTRESEND and R_RESENDERR are cleared.
3130 NFS_SOCK_DBG("nfs_send: 0x%llx sent %d/%d error %d\n",
3170 * the request sent for congestion window purposes.
4441 int error, sent; local
4462 /* make sure to wait until this async I/O request gets sent */
4496 sent = req->r_flags & R_SENT;
4498 if (error && req->r_callback.rcb_func && !sent) {
4903 * The request needs to be (re)sent
[all...]
/macosx-10.10.1/curl-83.1.2/curl/lib/
H A Dformdata.c1396 * and resets the 'sent' counter.
1404 form->sent = 0;
1483 * deliver the formdata to the transfer loop and then sent away to the peer.
1511 if((form->data->length - form->sent ) > wantedsize - gotsize) {
1513 memcpy(buffer + gotsize , form->data->line + form->sent,
1516 form->sent += wantedsize-gotsize;
1522 form->data->line + form->sent,
1523 (form->data->length - form->sent) );
1524 gotsize += form->data->length - form->sent;
1526 form->sent
[all...]
/macosx-10.10.1/ntp-92/ntpd/
H A Dntp_proto.c66 * below zero. Each time a packet is sent the counter is incremented by
121 u_long sys_kodsent; /* KoD sent */
763 * mode packet sent to a multicast group address. The origin
765 * with what was sent. If there is no match, that's curious and
911 * peer. If the packet is authentic and the first he sent,
1111 * reply to a client packet previously sent. The loopback check
1171 * sent or from a broadcast server, do the extension fields.
1789 * This routine figures out when the next poll should be sent.
2836 * sent. Otherwise, it is not possible to compute a correct MAC
2876 peer->sent
[all...]
H A Dntp_request.c197 u_long numresppkts; /* number of resp packets sent with data */
375 * has been sent, send an error saying no data to be found.
1050 ip->sent = htonl((u_int32)(pp->sent));
1242 io->sent = htonl((u_int32)packets_sent);
2859 ifs->sent = htonl(interface->sent);
/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/Regressions/
H A DSOSTransportTestTransports.c625 SOSEnginePeerMessageSentBlock sent = NULL;
634 ok = SOSPeerCoderSendMessageIfNeeded(peer, &message_to_send, circleName, peerID, &sent, error);
643 SOSPeerCoderConsume(&sent, ok);
649 Block_release(sent);
/macosx-10.10.1/OpenSSL098-52/src/ssl/
H A Dd1_both.c351 * message got sent. but why would this happen? */
365 * is being sent in single fragment */
1141 pqueue sent = s->d1->sent_messages; local
1147 iter = pqueue_iterator(sent);
1285 /* restore state in which the message was originally sent */
/macosx-10.10.1/cups-408/cups/backend/
H A Ddnssd.c69 sent; /* Did we list the device? */ member in struct:__anon6955
423 int sent; /* Number of sent */ local
426 best = NULL, count = 0, sent = 0;
430 if (device->sent)
431 sent ++;
436 if (!device->ref && !device->sent)
482 else if (!device->sent)
515 best->sent = 1;
518 sent
[all...]
/macosx-10.10.1/syslog-267/syslogd.tproj/
H A Ddbserver.c275 ssize_t sent; local
358 sent = send(direct_watch[i], &nlen, sizeof(nlen), 0);
359 if (sent < sizeof(nlen))
374 sent = send(direct_watch[i], out + total_sent, outlen - total_sent, 0);
375 if (sent <= 0)
377 asldebug("send_to_direct_watchers: send returned %d (errno %d)\n", sent, errno);
399 total_sent += sent;
704 /* port must be sent in network byte order */
/macosx-10.10.1/Security-57031.1.35/SecurityTests/regressions/inc/Test/Builder/
H A DTester.pm303 output sent by the test to the output stream does not match that
309 output sent by the test to the error stream does not match that

Completed in 201 milliseconds

123456