| /src/tests/rump/kernspace/ |
| sendsig.c | 49 bool sent = false; local 56 while (!sent) { 62 sent = true;
|
| /src/external/ibm-public/postfix/dist/src/global/ |
| sent.c | 1 /* $NetBSD: sent.c,v 1.3 2020/03/18 19:05:16 christos Exp $ */ 5 /* sent 3 7 /* log that a message was or could be sent 9 /* #include <sent.h> 11 /* int sent(flags, queue_id, stats, recipient, relay, dsn) 19 /* sent() logs that a message was successfully delivered, 94 #include <sent.h> 100 /* sent - log that a message was or could be sent */ 102 int sent(int flags, const char *id, MSG_STATS *stats function [all...] |
| /src/sys/nfs/ |
| nfsrtt.h | 63 int sent; /* # rpcs in progress */ member in struct:rttl
|
| /src/external/bsd/libfido2/dist/src/ |
| io.c | 125 size_t n, sent; local 127 if ((sent = tx_preamble(d, cmd, buf, count, ms)) == 0) { 132 for (uint8_t seq = 0; sent < count; sent += n) { 137 if ((n = tx_frame(d, seq++, buf + sent, count - sent,
|
| /src/sys/lib/libsa/ |
| netif.h | 61 int sent; member in struct:netif_stats
|
| /src/sys/rump/net/lib/libwg/ |
| wg_user.c | 330 ssize_t sent; local 338 sent = sendto(s, iov[i].iov_base, iov[i].iov_len, 0, sa, 340 if (sent == -1 || (size_t)sent != iov[i].iov_len) {
|
| /src/external/bsd/ipf/dist/ipsend/ |
| ip.c | 166 int i, sent = 0, ts, hlen, olen; local 212 if ((sent + (mtu - hlen)) >= iplen) 215 ts = iplen - sent; 220 ip->ip_off |= htons(sent >> 3); 226 bcopy(s + sent, ipbuf + sizeof(*eh) + hlen, ts - hlen); 230 sent += (ts - hlen);
|
| /src/external/mit/libuv/dist/test/ |
| test-udp-reuseport.c | 87 static unsigned int sent; variable 160 if (++sent == MAX_UDP_DATAGRAMS) 267 * and the amount of received datagrams matches the one of sent datagrams. 270 ASSERT_EQ(sent, MAX_UDP_DATAGRAMS); 273 ASSERT_EQ(thread_loop1_recv + thread_loop2_recv, sent);
|
| test-poll.c | 62 size_t read, sent; member in struct:connection_context_s 156 context->sent = 0; 189 ASSERT_EQ(context->sent, TRANSFER_BYTES); 191 ASSERT_OK(context->sent); 298 if (context->sent < TRANSFER_BYTES && 309 int send_bytes = MIN(TRANSFER_BYTES - context->sent, sizeof buffer); 323 context->sent += r; 333 int send_bytes = MIN(TRANSFER_BYTES - context->sent, sizeof buffer); 348 context->sent += r; 350 while (context->sent < TRANSFER_BYTES) [all...] |
| /src/tests/net/icmp/ |
| t_ping.c | 283 int sent, succ, i; local 302 succ = sent = 0; 306 sent++; 312 sent++; 318 sent++; 322 printf("got %d/%d\n", succ, sent);
|
| /src/usr.bin/rump_dhcpclient/ |
| dhcpcd.h | 65 struct dhcp_message *sent; member in struct:if_state
|
| /src/external/bsd/tmux/dist/ |
| file.c | 472 size_t msglen, sent, left; local 478 sent = left; 479 if (sent > MAX_IMSGSIZE - IMSG_HEADER_SIZE - sizeof *msg) 480 sent = MAX_IMSGSIZE - IMSG_HEADER_SIZE - sizeof *msg; 482 msglen = (sizeof *msg) + sent; 485 memcpy(msg + 1, EVBUFFER_DATA(cf->buffer), sent); 488 evbuffer_drain(cf->buffer, sent); 491 log_debug("file %d sent %zu, left %zu", cf->stream, sent, left);
|
| /src/external/mpl/bind/dist/bin/named/ |
| fuzz.c | 110 ssize_t sent; local 142 sent = sendto(sockfd, buf, length, 0, 144 RUNTIME_CHECK(sent == length); 360 ssize_t sent; local 412 sent = sendto(sockfd, respacket, sizeof(respacket), 0, 414 RUNTIME_CHECK(sent == sizeof(respacket)); 423 sent = recvfrom(listenfd, rbuf, 65536, 0, 425 RUNTIME_CHECK(sent > 0); 477 sent = sendto(listenfd, buf, length, 0, 479 RUNTIME_CHECK(sent == length) 650 ssize_t sent; local [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| statem_dtls.c | 156 * Each fragment that was already sent must at least have 271 * got sent. but why would this happen? 297 * reconstruct message header is if it is being sent in 543 * even though we have sent a HelloVerifyRequest. It is possible 906 * We received a ClientHello and sent back a HelloVerifyRequest. We 1106 pqueue *sent = s->d1->sent_messages; local 1112 iter = pqueue_iterator(sent); 1229 /* restore state in which the message was originally sent */
|
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| statem_dtls.c | 158 * Each fragment that was already sent must at least have 263 * got sent. but why would this happen? 280 * reconstruct message header is if it is being sent in 524 * even though we have sent a HelloVerifyRequest. It is possible 888 * We received a ClientHello and sent back a HelloVerifyRequest. We 1088 pqueue *sent = s->d1->sent_messages; local 1094 iter = pqueue_iterator(sent); 1227 /* restore state in which the message was originally sent */
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| statem_dtls.c | 162 * Each fragment that was already sent must at least have 267 * got sent. but why would this happen? 284 * reconstruct message header is if it is being sent in 1010 pqueue *sent = s->d1->sent_messages; local 1016 iter = pqueue_iterator(sent); 1146 /* restore state in which the message was originally sent */
|
| /src/sbin/dump/ |
| tape.c | 87 * The following structure defines the instruction packets sent to workers. 104 int sent; /* 1 == we've sent this worker requests */ member in struct:worker 288 wp->sent = 1; /* we sent a request, read the response later */ 296 if (wp->sent) { 302 wp->sent = 0; 313 if (workers[i].sent) { 320 workers[i].sent = 0; 369 if (workers[f].sent) { [all...] |
| /src/sbin/routed/rtquery/ |
| rtquery.c | 123 struct timeval sent; /* when query sent */ variable in typeref:struct:timeval 501 if (sent.tv_sec + wtime <= now.tv_sec) 518 if (gettimeofday(&sent, 0) < 0) { 519 perror("gettimeofday(sent)");
|
| /src/external/bsd/nsd/dist/ |
| xfrd-tcp.c | 1140 DEBUG(DEBUG_XFRD,1, (LOG_INFO, "sent tcp query with ID %d", zone->query_id)); 1158 ssize_t sent; local 1165 sent = SSL_write(ssl, (const char*)&sendlen + tcp->total_bytes, 1167 switch(SSL_get_error(ssl,sent)) { 1174 if(sent == -1) { 1183 tcp->total_bytes += sent; 1184 if(sent > (ssize_t)sizeof(tcp->msglen)) 1185 buffer_skip(tcp->packet, sent-sizeof(tcp->msglen)); 1197 sent = SSL_write(ssl, buffer_current(tcp->packet), request_length); 1198 switch(SSL_get_error(ssl,sent)) { 1228 ssize_t sent; local [all...] |
| xfrd.h | 237 uint8_t sent; /* written to tasklist (tri-state) */ member in struct:xfrd_xfr 454 finished, and all zone SOAs have been sent. */
|
| /src/external/bsd/unbound/dist/testcode/ |
| delayer.c | 87 /** number of queries sent to server (in total) */ 365 ssize_t sent; local 368 /* this items needs to be sent out */ 375 sent = sendto(p->s, (void*)sldns_buffer_begin(pkt), 378 if(sent == -1) { 380 } else if(sent != (ssize_t)sldns_buffer_limit(pkt)) {
|
| /src/lib/libradius/ |
| radlib.c | 364 struct servent *sent; local 368 (sent = getservbyname("radius", "udp")) != NULL ? 369 sent->s_port : htons(RADIUS_PORT); 372 (sent = getservbyname("radacct", "udp")) != NULL ? 373 sent->s_port : htons(RADACCT_PORT);
|
| /src/sys/dev/iscsi/ |
| iscsi_text.c | 62 AUTH_CHAP_RSP_SENT, /* CHAP: Response sent */ 186 #define NS_SENT 0x01 /* key was sent to target */ 1037 bool sent = (state->kflags[key] & NS_SENT) != 0; local 1065 if (!sent) 1071 if (!sent) 1077 if (!sent) 1083 if (!sent) 1089 if (!sent) 1104 if (!sent) 1110 if (!sent) [all...] |
| /src/sys/dev/usb/ |
| if_bwfm_usb.c | 675 uint32_t rdlstate, rdlbytes, sent = 0, sendlen = 0; local 705 sendlen = MIN(size - sent, TRX_RDL_CHUNK); 706 memcpy(buf, ucode + sent, sendlen); 715 sent += sendlen; 721 if (rdlbytes != sent) {
|
| /src/external/bsd/dhcpcd/dist/src/ |
| dhcp.h | 213 struct bootp *sent; member in struct:dhcp_state
|