/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | SSLRecordInternal.c | 210 out->sent = 0; 293 { buf.data = rec->data + rec->sent; 294 buf.length = rec->length - rec->sent; 296 rec->sent += written; 297 if (rec->sent >= rec->length) 299 check(rec->sent == rec->length);
|
H A D | sslHandshake.h | 123 SSL_HdskStateServerHello, /* must get server hello; client hello sent */ 172 #define SSLLogHdskMsg(msg, sent) 175 void SSLLogHdskMsg(SSLHandshakeType msg, char sent);
|
H A D | tls_record_internal.h | 49 size_t sent; member in struct:WaitingRecord
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | SSLRecordInternal.c | 210 out->sent = 0; 293 { buf.data = rec->data + rec->sent; 294 buf.length = rec->length - rec->sent; 296 rec->sent += written; 297 if (rec->sent >= rec->length) 299 check(rec->sent == rec->length);
|
H A D | sslHandshake.h | 123 SSL_HdskStateServerHello, /* must get server hello; client hello sent */ 172 #define SSLLogHdskMsg(msg, sent) 175 void SSLLogHdskMsg(SSLHandshakeType msg, char sent);
|
H A D | tls_record_internal.h | 49 size_t sent; member in struct:WaitingRecord
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/regressions/ |
H A D | ssl-47-falsestart.c | 229 size_t sent, received; local 235 ortn = SSLWrite(ctx, r, l, &sent); 238 r+=sent; 239 l-=sent;
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | SSLRecordInternal.c | 210 out->sent = 0; 293 { buf.data = rec->data + rec->sent; 294 buf.length = rec->length - rec->sent; 296 rec->sent += written; 297 if (rec->sent >= rec->length) 299 check(rec->sent == rec->length);
|
H A D | sslHandshake.h | 123 SSL_HdskStateServerHello, /* must get server hello; client hello sent */ 172 #define SSLLogHdskMsg(msg, sent) 175 void SSLLogHdskMsg(SSLHandshakeType msg, char sent);
|
H A D | tls_record_internal.h | 49 size_t sent; member in struct:WaitingRecord
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/SOSCircle/Regressions/ |
H A D | SOSTestDevice.c | 179 SOSEnginePeerMessageSentBlock sent = NULL; local 181 ok(msgData = SOSEngineCreateMessageToSyncToPeer(td->ds->engine, peerID, &sent, &error), 183 if (sent) 184 sent(true);
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/SOSCircle/SecureObjectSync/ |
H A D | SOSEngine.c | 560 secerror("%@ peer sent bad object: %@, rolling back changes", SOSPeerGetID(peer), error ? *error : NULL); 681 CFErrorRef *error, SOSEnginePeerMessageSentBlock *sent) { 862 *sent = Block_copy(^(bool success) { 680 SOSEngineCreateMessage_locked(SOSEngineRef engine, SOSPeerRef peer, CFErrorRef *error, SOSEnginePeerMessageSentBlock *sent) argument
|
H A D | SOSPeerCoder.c | 59 void SOSPeerCoderConsume(SOSEnginePeerMessageSentBlock *sent, bool ok){ argument 60 if (*sent) 61 (*sent)(ok); 125 bool SOSPeerCoderSendMessageIfNeeded(SOSPeerRef peer, CFDataRef *message_to_send, CFStringRef circle_id, CFStringRef peer_id, SOSEnginePeerMessageSentBlock *sent, CFErrorRef *error){ argument 134 CFDataRef message = SOSEngineCreateMessageToSyncToPeer(SOSPeerGetEngine(peer), peer_id, sent, error); 151 *sent = Block_copy(^(bool wasSent){
|
H A D | SOSPeerCoder.h | 13 bool SOSPeerCoderSendMessageIfNeeded(SOSPeerRef peer, CFDataRef *message_to_send, CFStringRef circle_id, CFStringRef peer_id, SOSEnginePeerMessageSentBlock *sent, CFErrorRef *error); 19 bool SOSPeerSendMessageIfNeeded(SOSPeerRef peer, CFDataRef *message, CFDataRef *message_to_send, SOSCoderRef *coder, CFStringRef circle_id, CFStringRef peer_id, SOSEnginePeerMessageSentBlock *sent, CFErrorRef *error); 21 void SOSPeerCoderConsume(SOSEnginePeerMessageSentBlock *sent, bool ok);
|
H A D | SOSTransportCoder.c | 163 SOSEnginePeerMessageSentBlock sent = NULL; local 170 CFDataRef message = SOSEngineCreateMessageToSyncToPeer(SOSTransportMessageGetEngine(transport), peer_id, &sent, error); 187 sent = Block_copy(^(bool wasSent){ 204 if (sent) 205 sent(ok); 211 Block_release(sent);
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/Tool/ |
H A D | scep.c | 371 A binary X.509 CA certificate is sent back as a MIME object with a 374 When an RA exists, both CA and RA certificates must be sent back in 437 | "POSTPKIOperation" | PKIOPeration messages may be sent via HTTP |
|
/macosx-10.10.1/xnu-2782.1.97/bsd/nfs/ |
H A D | nfs_socket.c | 173 * Estimate rto for an nfs rpc sent via. an unreliable datagram. 212 * (The sent count and cwnd are scaled for integer arith.) 2921 * If sent successfully, R_MUSTRESEND and R_RESENDERR are cleared. 3130 NFS_SOCK_DBG("nfs_send: 0x%llx sent %d/%d error %d\n", 3170 * the request sent for congestion window purposes. 4441 int error, sent; local 4462 /* make sure to wait until this async I/O request gets sent */ 4496 sent = req->r_flags & R_SENT; 4498 if (error && req->r_callback.rcb_func && !sent) { 4903 * The request needs to be (re)sent [all...] |
/macosx-10.10.1/curl-83.1.2/curl/lib/ |
H A D | formdata.c | 1396 * and resets the 'sent' counter. 1404 form->sent = 0; 1483 * deliver the formdata to the transfer loop and then sent away to the peer. 1511 if((form->data->length - form->sent ) > wantedsize - gotsize) { 1513 memcpy(buffer + gotsize , form->data->line + form->sent, 1516 form->sent += wantedsize-gotsize; 1522 form->data->line + form->sent, 1523 (form->data->length - form->sent) ); 1524 gotsize += form->data->length - form->sent; 1526 form->sent [all...] |
/macosx-10.10.1/ntp-92/ntpd/ |
H A D | ntp_proto.c | 66 * below zero. Each time a packet is sent the counter is incremented by 121 u_long sys_kodsent; /* KoD sent */ 763 * mode packet sent to a multicast group address. The origin 765 * with what was sent. If there is no match, that's curious and 911 * peer. If the packet is authentic and the first he sent, 1111 * reply to a client packet previously sent. The loopback check 1171 * sent or from a broadcast server, do the extension fields. 1789 * This routine figures out when the next poll should be sent. 2836 * sent. Otherwise, it is not possible to compute a correct MAC 2876 peer->sent [all...] |
H A D | ntp_request.c | 197 u_long numresppkts; /* number of resp packets sent with data */ 375 * has been sent, send an error saying no data to be found. 1050 ip->sent = htonl((u_int32)(pp->sent)); 1242 io->sent = htonl((u_int32)packets_sent); 2859 ifs->sent = htonl(interface->sent);
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/Regressions/ |
H A D | SOSTransportTestTransports.c | 625 SOSEnginePeerMessageSentBlock sent = NULL; 634 ok = SOSPeerCoderSendMessageIfNeeded(peer, &message_to_send, circleName, peerID, &sent, error); 643 SOSPeerCoderConsume(&sent, ok); 649 Block_release(sent);
|
/macosx-10.10.1/OpenSSL098-52/src/ssl/ |
H A D | d1_both.c | 351 * message got sent. but why would this happen? */ 365 * is being sent in single fragment */ 1141 pqueue sent = s->d1->sent_messages; local 1147 iter = pqueue_iterator(sent); 1285 /* restore state in which the message was originally sent */
|
/macosx-10.10.1/cups-408/cups/backend/ |
H A D | dnssd.c | 69 sent; /* Did we list the device? */ member in struct:__anon6955 423 int sent; /* Number of sent */ local 426 best = NULL, count = 0, sent = 0; 430 if (device->sent) 431 sent ++; 436 if (!device->ref && !device->sent) 482 else if (!device->sent) 515 best->sent = 1; 518 sent [all...] |
/macosx-10.10.1/syslog-267/syslogd.tproj/ |
H A D | dbserver.c | 275 ssize_t sent; local 358 sent = send(direct_watch[i], &nlen, sizeof(nlen), 0); 359 if (sent < sizeof(nlen)) 374 sent = send(direct_watch[i], out + total_sent, outlen - total_sent, 0); 375 if (sent <= 0) 377 asldebug("send_to_direct_watchers: send returned %d (errno %d)\n", sent, errno); 399 total_sent += sent; 704 /* port must be sent in network byte order */
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/regressions/inc/Test/Builder/ |
H A D | Tester.pm | 303 output sent by the test to the output stream does not match that 309 output sent by the test to the error stream does not match that
|