HomeSort by: relevance | last modified time | path
    Searched defs:sent (Results 1 - 25 of 46) sorted by relevancy

1 2

  /src/tests/rump/kernspace/
sendsig.c 49 bool sent = false; local
56 while (!sent) {
62 sent = true;
  /src/external/ibm-public/postfix/dist/src/global/
sent.c 1 /* $NetBSD: sent.c,v 1.3 2020/03/18 19:05:16 christos Exp $ */
5 /* sent 3
7 /* log that a message was or could be sent
9 /* #include <sent.h>
11 /* int sent(flags, queue_id, stats, recipient, relay, dsn)
19 /* sent() logs that a message was successfully delivered,
94 #include <sent.h>
100 /* sent - log that a message was or could be sent */
102 int sent(int flags, const char *id, MSG_STATS *stats function
    [all...]
  /src/sys/nfs/
nfsrtt.h 63 int sent; /* # rpcs in progress */ member in struct:rttl
  /src/external/bsd/libfido2/dist/src/
io.c 125 size_t n, sent; local
127 if ((sent = tx_preamble(d, cmd, buf, count, ms)) == 0) {
132 for (uint8_t seq = 0; sent < count; sent += n) {
137 if ((n = tx_frame(d, seq++, buf + sent, count - sent,
  /src/sys/lib/libsa/
netif.h 61 int sent; member in struct:netif_stats
  /src/sys/rump/net/lib/libwg/
wg_user.c 330 ssize_t sent; local
338 sent = sendto(s, iov[i].iov_base, iov[i].iov_len, 0, sa,
340 if (sent == -1 || (size_t)sent != iov[i].iov_len) {
  /src/external/bsd/ipf/dist/ipsend/
ip.c 166 int i, sent = 0, ts, hlen, olen; local
212 if ((sent + (mtu - hlen)) >= iplen)
215 ts = iplen - sent;
220 ip->ip_off |= htons(sent >> 3);
226 bcopy(s + sent, ipbuf + sizeof(*eh) + hlen, ts - hlen);
230 sent += (ts - hlen);
  /src/external/mit/libuv/dist/test/
test-udp-reuseport.c 87 static unsigned int sent; variable
160 if (++sent == MAX_UDP_DATAGRAMS)
267 * and the amount of received datagrams matches the one of sent datagrams.
270 ASSERT_EQ(sent, MAX_UDP_DATAGRAMS);
273 ASSERT_EQ(thread_loop1_recv + thread_loop2_recv, sent);
test-poll.c 62 size_t read, sent; member in struct:connection_context_s
156 context->sent = 0;
189 ASSERT_EQ(context->sent, TRANSFER_BYTES);
191 ASSERT_OK(context->sent);
298 if (context->sent < TRANSFER_BYTES &&
309 int send_bytes = MIN(TRANSFER_BYTES - context->sent, sizeof buffer);
323 context->sent += r;
333 int send_bytes = MIN(TRANSFER_BYTES - context->sent, sizeof buffer);
348 context->sent += r;
350 while (context->sent < TRANSFER_BYTES)
    [all...]
  /src/tests/net/icmp/
t_ping.c 283 int sent, succ, i; local
302 succ = sent = 0;
306 sent++;
312 sent++;
318 sent++;
322 printf("got %d/%d\n", succ, sent);
  /src/usr.bin/rump_dhcpclient/
dhcpcd.h 65 struct dhcp_message *sent; member in struct:if_state
  /src/external/bsd/tmux/dist/
file.c 472 size_t msglen, sent, left; local
478 sent = left;
479 if (sent > MAX_IMSGSIZE - IMSG_HEADER_SIZE - sizeof *msg)
480 sent = MAX_IMSGSIZE - IMSG_HEADER_SIZE - sizeof *msg;
482 msglen = (sizeof *msg) + sent;
485 memcpy(msg + 1, EVBUFFER_DATA(cf->buffer), sent);
488 evbuffer_drain(cf->buffer, sent);
491 log_debug("file %d sent %zu, left %zu", cf->stream, sent, left);
  /src/external/mpl/bind/dist/bin/named/
fuzz.c 110 ssize_t sent; local
142 sent = sendto(sockfd, buf, length, 0,
144 RUNTIME_CHECK(sent == length);
360 ssize_t sent; local
412 sent = sendto(sockfd, respacket, sizeof(respacket), 0,
414 RUNTIME_CHECK(sent == sizeof(respacket));
423 sent = recvfrom(listenfd, rbuf, 65536, 0,
425 RUNTIME_CHECK(sent > 0);
477 sent = sendto(listenfd, buf, length, 0,
479 RUNTIME_CHECK(sent == length)
650 ssize_t sent; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/ssl/statem/
statem_dtls.c 156 * Each fragment that was already sent must at least have
271 * got sent. but why would this happen?
297 * reconstruct message header is if it is being sent in
543 * even though we have sent a HelloVerifyRequest. It is possible
906 * We received a ClientHello and sent back a HelloVerifyRequest. We
1106 pqueue *sent = s->d1->sent_messages; local
1112 iter = pqueue_iterator(sent);
1229 /* restore state in which the message was originally sent */
  /src/crypto/external/bsd/openssl/dist/ssl/statem/
statem_dtls.c 158 * Each fragment that was already sent must at least have
263 * got sent. but why would this happen?
280 * reconstruct message header is if it is being sent in
524 * even though we have sent a HelloVerifyRequest. It is possible
888 * We received a ClientHello and sent back a HelloVerifyRequest. We
1088 pqueue *sent = s->d1->sent_messages; local
1094 iter = pqueue_iterator(sent);
1227 /* restore state in which the message was originally sent */
  /src/crypto/external/bsd/openssl.old/dist/ssl/statem/
statem_dtls.c 162 * Each fragment that was already sent must at least have
267 * got sent. but why would this happen?
284 * reconstruct message header is if it is being sent in
1010 pqueue *sent = s->d1->sent_messages; local
1016 iter = pqueue_iterator(sent);
1146 /* restore state in which the message was originally sent */
  /src/sbin/dump/
tape.c 87 * The following structure defines the instruction packets sent to workers.
104 int sent; /* 1 == we've sent this worker requests */ member in struct:worker
288 wp->sent = 1; /* we sent a request, read the response later */
296 if (wp->sent) {
302 wp->sent = 0;
313 if (workers[i].sent) {
320 workers[i].sent = 0;
369 if (workers[f].sent) {
    [all...]
  /src/sbin/routed/rtquery/
rtquery.c 123 struct timeval sent; /* when query sent */ variable in typeref:struct:timeval
501 if (sent.tv_sec + wtime <= now.tv_sec)
518 if (gettimeofday(&sent, 0) < 0) {
519 perror("gettimeofday(sent)");
  /src/external/bsd/nsd/dist/
xfrd-tcp.c 1140 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "sent tcp query with ID %d", zone->query_id));
1158 ssize_t sent; local
1165 sent = SSL_write(ssl, (const char*)&sendlen + tcp->total_bytes,
1167 switch(SSL_get_error(ssl,sent)) {
1174 if(sent == -1) {
1183 tcp->total_bytes += sent;
1184 if(sent > (ssize_t)sizeof(tcp->msglen))
1185 buffer_skip(tcp->packet, sent-sizeof(tcp->msglen));
1197 sent = SSL_write(ssl, buffer_current(tcp->packet), request_length);
1198 switch(SSL_get_error(ssl,sent)) {
1228 ssize_t sent; local
    [all...]
xfrd.h 237 uint8_t sent; /* written to tasklist (tri-state) */ member in struct:xfrd_xfr
454 finished, and all zone SOAs have been sent. */
  /src/external/bsd/unbound/dist/testcode/
delayer.c 87 /** number of queries sent to server (in total) */
365 ssize_t sent; local
368 /* this items needs to be sent out */
375 sent = sendto(p->s, (void*)sldns_buffer_begin(pkt),
378 if(sent == -1) {
380 } else if(sent != (ssize_t)sldns_buffer_limit(pkt)) {
  /src/lib/libradius/
radlib.c 364 struct servent *sent; local
368 (sent = getservbyname("radius", "udp")) != NULL ?
369 sent->s_port : htons(RADIUS_PORT);
372 (sent = getservbyname("radacct", "udp")) != NULL ?
373 sent->s_port : htons(RADACCT_PORT);
  /src/sys/dev/iscsi/
iscsi_text.c 62 AUTH_CHAP_RSP_SENT, /* CHAP: Response sent */
186 #define NS_SENT 0x01 /* key was sent to target */
1037 bool sent = (state->kflags[key] & NS_SENT) != 0; local
1065 if (!sent)
1071 if (!sent)
1077 if (!sent)
1083 if (!sent)
1089 if (!sent)
1104 if (!sent)
1110 if (!sent)
    [all...]
  /src/sys/dev/usb/
if_bwfm_usb.c 675 uint32_t rdlstate, rdlbytes, sent = 0, sendlen = 0; local
705 sendlen = MIN(size - sent, TRX_RDL_CHUNK);
706 memcpy(buf, ucode + sent, sendlen);
715 sent += sendlen;
721 if (rdlbytes != sent) {
  /src/external/bsd/dhcpcd/dist/src/
dhcp.h 213 struct bootp *sent; member in struct:dhcp_state

Completed in 52 milliseconds

1 2