/third_party/lwip/src/core/ |
H A D | altcp_tcp.c | 125 if (conn->sent) { in altcp_tcp_sent() 126 return conn->sent(conn->arg, conn, len); in altcp_tcp_sent()
|
H A D | tcp.c | 30 * TCP data is sent by enqueueing the data with a call to tcp_write() and 491 * For tcp_close(), a RST is sent if the application didn't receive all data 523 /* Deallocate the pcb since we already sent a RST for it */ in tcp_close_shutdown() 601 /* To ensure all data has been sent when tcp_close returns, we have in tcp_close_shutdown_fin() 603 Since we don't really have to ensure all data has been sent when tcp_close in tcp_close_shutdown_fin() 604 returns (unsent data is sent from tcp timer functions, also), we don't care in tcp_close_shutdown_fin() 718 * @param reset boolean to indicate whether a reset should be sent 1092 * Returns how much extra window would be advertised if we sent an 1160 * Otherwise wait for a packet to be sent in the normal course of 1229 * ERR_OK if connect request has been sent 2211 tcp_sent(struct tcp_pcb *pcb, tcp_sent_fn sent) global() argument [all...] |
/third_party/lwip/src/include/lwip/priv/ |
H A D | tcp_priv.h | 196 if((pcb)->sent != NULL) \ 197 (ret) = (pcb)->sent((pcb)->callback_arg,(pcb),(space)); \
|
/third_party/backends/backend/ |
H A D | p5_device.c | 288 uint8_t sent[256]; in memtest() local 295 sent[i] = (uint8_t) i; in memtest() 298 write_data (fd, sent, 256); in memtest() 301 /* check if data read back is the same that the one sent */ in memtest() 304 if (back[i] != sent[i]) in memtest()
|
H A D | rts8891.c | 1313 /* no bytes sent yet to frontend */ in sane_start() 1314 session->sent = 0; in sane_start() 1514 /* we do that here because we needed sent/to_send to be as if */ in compute_parameters() 1762 if (session->sent >= session->to_send) in sane_read() 1855 /* or we sent what we advised to frontend */ in sane_read() 1857 && session->sent < session->to_send) in sane_read() 1868 switch (((session->sent * 3) % dev->bytes_per_line) % 6) in sane_read() 1884 bit = 7 - (session->sent) % 8; in sane_read() 1900 session->sent++; in sane_read() 1905 switch ((session->sent in sane_read() [all...] |
/third_party/python/Lib/asyncio/ |
H A D | unix_events.py | 395 sent = os.sendfile(fd, fileno, offset, blocksize) 432 if sent == 0: 437 offset += sent 438 total_sent += sent
|
/third_party/libwebsockets/lib/core-net/ |
H A D | output.c | 38 * If you're looking to dump data being sent down the tls tunnel, see in lws_issue_raw() 119 * nothing got sent, not fatal. Retry the whole thing later, in lws_issue_raw() 185 /* what we just sent went out cleanly */ in lws_issue_raw() 194 lwsl_wsi_debug(wsi, "new partial sent %d from %lu total", in lws_issue_raw() 226 wsi->http.access_log.sent += len; in lws_write() 319 /* pretend it was sent */ in lws_ssl_capable_write_no_ssl() 352 // lwsl_info("%s: sent len %d result %d", __func__, len, n); in lws_ssl_capable_write_no_ssl()
|
/third_party/libwebsockets/lib/roles/http/ |
H A D | private-lib-roles-http.h | 211 unsigned long sent; member
|
/third_party/typescript/tests/baselines/reference/ |
H A D | asyncAwaitIsolatedModules_es5.js | 54 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
|
H A D | neverAsDiscriminantType(strict=false).js | 80 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
|
H A D | neverAsDiscriminantType(strict=true).js | 80 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
|
H A D | reactReduxLikeDeferredInferenceAllowsAssignment.js | 177 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
|
/third_party/python/Lib/test/ |
H A D | test_os.py | 3422 sent = await self.sendfile_wrapper(self.sockno, self.fileno, 3424 if sent == 0: 3426 offset += sent 3427 total_sent += sent 3428 self.assertTrue(sent <= nbytes) 3445 sent = await self.sendfile_wrapper(self.sockno, self.fileno, 3447 if sent == 0: 3449 offset += sent 3450 total_sent += sent 3451 self.assertTrue(sent < [all...] |
H A D | test_socket.py | 2994 # when the number that can be sent is limited. 3228 # Test receiving with recvmsg[_into]() when message is sent 4819 # the server sent data yet: non-blocking recv() doesn't block 6109 sent = meth(file) 6110 self.assertEqual(sent, self.FILESIZE) 6125 sent = sock.sendfile(file) 6126 self.assertEqual(sent, self.FILESIZE) 6147 sent = meth(file) 6148 self.assertEqual(sent, 0) 6163 sent [all...] |
H A D | test_io.py | 4175 sent = [] 4194 sent.append(msg) 4201 sent[-1] = sent[-1][:e.characters_written] 4205 sent.append(msg) 4219 sent, received = b''.join(sent), b''.join(received) 4220 self.assertEqual(sent, received)
|
/third_party/backends/backend/pixma/ |
H A D | pixma_bjnp.c | 1086 "bjnp_send_broadcast: Socket: %d: ERROR - sent only %x = %d bytes of packet, error = %s\n", in bjnp_send_broadcast() 1335 /* correct nr of bytes sent for length of command */ in bjnp_write() 2522 ssize_t sent; in sanei_bjnp_write_bulk() local 2529 sent = bjnp_write (dn, buffer, *size); in sanei_bjnp_write_bulk() 2530 if (sent < 0) in sanei_bjnp_write_bulk() 2532 if (sent != (int) *size) in sanei_bjnp_write_bulk() 2536 (unsigned long) sent, (unsigned long) *size)); in sanei_bjnp_write_bulk()
|
/third_party/libcoap/examples/ |
H A D | coap-client.c | 102 unsigned char msgtype = COAP_MESSAGE_CON; /* usually, requests are sent confirmable */ 297 /* Let the underlying libcoap decide how this data should be sent */ in coap_new_request() 346 const coap_pdu_t *sent, in nack_handler() 349 if (sent) { in nack_handler() 350 coap_bin_const_t token = coap_pdu_get_token(sent); in nack_handler() 381 const coap_pdu_t *sent, in message_handler() 403 if (!sent && (rcv_type == COAP_MESSAGE_CON || in message_handler() 405 /* Cause a CoAP RST to be sent */ in message_handler() 1543 /* resolve local address where data should be sent from */ in get_session() 1808 /* resolve destination address where data should be sent */ in main() 345 nack_handler(coap_session_t *session COAP_UNUSED, const coap_pdu_t *sent, const coap_nack_reason_t reason, const coap_mid_t mid COAP_UNUSED) nack_handler() argument 380 message_handler(coap_session_t *session COAP_UNUSED, const coap_pdu_t *sent, const coap_pdu_t *received, const coap_mid_t id COAP_UNUSED) message_handler() argument [all...] |
/third_party/python/Lib/ |
H A D | shutil.py | 144 sent = os.sendfile(outfd, infd, offset, blocksize) 166 if sent == 0: 168 offset += sent
|
/third_party/node/lib/ |
H A D | dgram.js | 723 function afterSend(err, sent) { 730 this.callback(err, sent);
|
/third_party/node/deps/ngtcp2/ngtcp2/lib/ |
H A D | ngtcp2_qlog.c | 678 static void qlog_pkt_write_start(ngtcp2_qlog *qlog, int sent) { in qlog_pkt_write_start() argument 692 if (sent) { in qlog_pkt_write_start() 909 qlog_pkt_write_start(qlog, /* sent = */ 0); in ngtcp2_qlog_pkt_received_start() 918 qlog_pkt_write_start(qlog, /* sent = */ 1); in ngtcp2_qlog_pkt_sent_start()
|
/third_party/lwip/src/apps/altcp_tls/ |
H A D | altcp_tls_mbedtls.c | 39 * - 'sent' is always called with len==0 to the upper layer. This is because keeping 225 /* remote host sent FIN, remember this (SSL state is destroyed in altcp_mbedtls_lower_recv() 519 /* call upper sent with len==0 if the application already sent data */ in altcp_mbedtls_lower_sent() 520 if ((state->flags & ALTCP_MBEDTLS_FLAGS_APPLDATA_SENT) && conn->sent) { in altcp_mbedtls_lower_sent() 521 return conn->sent(conn->arg, conn, 0); in altcp_mbedtls_lower_sent() 1157 /* @todo/@fixme: assumption: either everything sent or error */ in altcp_mbedtls_write()
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | statem_dtls.c | 158 * Each fragment that was already sent must at least have in dtls1_do_write() 263 * got sent. but why would this happen? in dtls1_do_write() 280 * reconstruct message header is if it is being sent in in dtls1_do_write() 524 * even though we have sent a HelloVerifyRequest. It is possible in dtls1_retrieve_buffered_fragment() 888 * We received a ClientHello and sent back a HelloVerifyRequest. We in dtls_get_reassembled_message() 1088 pqueue *sent = s->d1->sent_messages; in dtls1_retransmit_buffered_messages() local 1094 iter = pqueue_iterator(sent); in dtls1_retransmit_buffered_messages() 1227 /* restore state in which the message was originally sent */ in dtls1_retransmit_message()
|
/third_party/openssl/ssl/statem/ |
H A D | statem_dtls.c | 162 * Each fragment that was already sent must at least have in dtls1_do_write() 267 * got sent. but why would this happen? in dtls1_do_write() 284 * reconstruct message header is if it is being sent in in dtls1_do_write() 528 * even though we have sent a HelloVerifyRequest. It is possible in dtls1_retrieve_buffered_fragment() 892 * We received a ClientHello and sent back a HelloVerifyRequest. We in dtls_get_reassembled_message() 1092 pqueue *sent = s->d1->sent_messages; in dtls1_retransmit_buffered_messages() local 1098 iter = pqueue_iterator(sent); in dtls1_retransmit_buffered_messages() 1231 /* restore state in which the message was originally sent */ in dtls1_retransmit_message()
|
/third_party/curl/lib/vquic/ |
H A D | curl_quiche.c | 1150 ssize_t sent; in cf_quiche_data_event() local 1155 sent = cf_quiche_send(cf, data, body, 0, &result); in cf_quiche_data_event() 1157 stream->id, sent, result); in cf_quiche_data_event() 1509 /* This happens before we've sent off a request and the connection is in cf_quiche_conn_is_alive()
|
/third_party/toybox/generated/ |
H A D | globals.h | 193 unsigned long sent, recv, fugit, min, max; member
|