Home
last modified time | relevance | path

Searched refs:sent (Results 176 - 200 of 219) sorted by relevance

123456789

/third_party/lwip/src/core/
H A Daltcp_tcp.c125 if (conn->sent) { in altcp_tcp_sent()
126 return conn->sent(conn->arg, conn, len); in altcp_tcp_sent()
H A Dtcp.c30 * TCP data is sent by enqueueing the data with a call to tcp_write() and
491 * For tcp_close(), a RST is sent if the application didn't receive all data
523 /* Deallocate the pcb since we already sent a RST for it */ in tcp_close_shutdown()
601 /* To ensure all data has been sent when tcp_close returns, we have in tcp_close_shutdown_fin()
603 Since we don't really have to ensure all data has been sent when tcp_close in tcp_close_shutdown_fin()
604 returns (unsent data is sent from tcp timer functions, also), we don't care in tcp_close_shutdown_fin()
718 * @param reset boolean to indicate whether a reset should be sent
1092 * Returns how much extra window would be advertised if we sent an
1160 * Otherwise wait for a packet to be sent in the normal course of
1229 * ERR_OK if connect request has been sent
2211 tcp_sent(struct tcp_pcb *pcb, tcp_sent_fn sent) global() argument
[all...]
/third_party/lwip/src/include/lwip/priv/
H A Dtcp_priv.h196 if((pcb)->sent != NULL) \
197 (ret) = (pcb)->sent((pcb)->callback_arg,(pcb),(space)); \
/third_party/backends/backend/
H A Dp5_device.c288 uint8_t sent[256]; in memtest() local
295 sent[i] = (uint8_t) i; in memtest()
298 write_data (fd, sent, 256); in memtest()
301 /* check if data read back is the same that the one sent */ in memtest()
304 if (back[i] != sent[i]) in memtest()
H A Drts8891.c1313 /* no bytes sent yet to frontend */ in sane_start()
1314 session->sent = 0; in sane_start()
1514 /* we do that here because we needed sent/to_send to be as if */ in compute_parameters()
1762 if (session->sent >= session->to_send) in sane_read()
1855 /* or we sent what we advised to frontend */ in sane_read()
1857 && session->sent < session->to_send) in sane_read()
1868 switch (((session->sent * 3) % dev->bytes_per_line) % 6) in sane_read()
1884 bit = 7 - (session->sent) % 8; in sane_read()
1900 session->sent++; in sane_read()
1905 switch ((session->sent in sane_read()
[all...]
/third_party/python/Lib/asyncio/
H A Dunix_events.py395 sent = os.sendfile(fd, fileno, offset, blocksize)
432 if sent == 0:
437 offset += sent
438 total_sent += sent
/third_party/libwebsockets/lib/core-net/
H A Doutput.c38 * If you're looking to dump data being sent down the tls tunnel, see in lws_issue_raw()
119 * nothing got sent, not fatal. Retry the whole thing later, in lws_issue_raw()
185 /* what we just sent went out cleanly */ in lws_issue_raw()
194 lwsl_wsi_debug(wsi, "new partial sent %d from %lu total", in lws_issue_raw()
226 wsi->http.access_log.sent += len; in lws_write()
319 /* pretend it was sent */ in lws_ssl_capable_write_no_ssl()
352 // lwsl_info("%s: sent len %d result %d", __func__, len, n); in lws_ssl_capable_write_no_ssl()
/third_party/libwebsockets/lib/roles/http/
H A Dprivate-lib-roles-http.h211 unsigned long sent; member
/third_party/typescript/tests/baselines/reference/
H A DasyncAwaitIsolatedModules_es5.js54 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
H A DneverAsDiscriminantType(strict=false).js80 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
H A DneverAsDiscriminantType(strict=true).js80 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
H A DreactReduxLikeDeferredInferenceAllowsAssignment.js177 var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
/third_party/python/Lib/test/
H A Dtest_os.py3422 sent = await self.sendfile_wrapper(self.sockno, self.fileno,
3424 if sent == 0:
3426 offset += sent
3427 total_sent += sent
3428 self.assertTrue(sent <= nbytes)
3445 sent = await self.sendfile_wrapper(self.sockno, self.fileno,
3447 if sent == 0:
3449 offset += sent
3450 total_sent += sent
3451 self.assertTrue(sent <
[all...]
H A Dtest_socket.py2994 # when the number that can be sent is limited.
3228 # Test receiving with recvmsg[_into]() when message is sent
4819 # the server sent data yet: non-blocking recv() doesn't block
6109 sent = meth(file)
6110 self.assertEqual(sent, self.FILESIZE)
6125 sent = sock.sendfile(file)
6126 self.assertEqual(sent, self.FILESIZE)
6147 sent = meth(file)
6148 self.assertEqual(sent, 0)
6163 sent
[all...]
H A Dtest_io.py4175 sent = []
4194 sent.append(msg)
4201 sent[-1] = sent[-1][:e.characters_written]
4205 sent.append(msg)
4219 sent, received = b''.join(sent), b''.join(received)
4220 self.assertEqual(sent, received)
/third_party/backends/backend/pixma/
H A Dpixma_bjnp.c1086 "bjnp_send_broadcast: Socket: %d: ERROR - sent only %x = %d bytes of packet, error = %s\n", in bjnp_send_broadcast()
1335 /* correct nr of bytes sent for length of command */ in bjnp_write()
2522 ssize_t sent; in sanei_bjnp_write_bulk() local
2529 sent = bjnp_write (dn, buffer, *size); in sanei_bjnp_write_bulk()
2530 if (sent < 0) in sanei_bjnp_write_bulk()
2532 if (sent != (int) *size) in sanei_bjnp_write_bulk()
2536 (unsigned long) sent, (unsigned long) *size)); in sanei_bjnp_write_bulk()
/third_party/libcoap/examples/
H A Dcoap-client.c102 unsigned char msgtype = COAP_MESSAGE_CON; /* usually, requests are sent confirmable */
297 /* Let the underlying libcoap decide how this data should be sent */ in coap_new_request()
346 const coap_pdu_t *sent, in nack_handler()
349 if (sent) { in nack_handler()
350 coap_bin_const_t token = coap_pdu_get_token(sent); in nack_handler()
381 const coap_pdu_t *sent, in message_handler()
403 if (!sent && (rcv_type == COAP_MESSAGE_CON || in message_handler()
405 /* Cause a CoAP RST to be sent */ in message_handler()
1543 /* resolve local address where data should be sent from */ in get_session()
1808 /* resolve destination address where data should be sent */ in main()
345 nack_handler(coap_session_t *session COAP_UNUSED, const coap_pdu_t *sent, const coap_nack_reason_t reason, const coap_mid_t mid COAP_UNUSED) nack_handler() argument
380 message_handler(coap_session_t *session COAP_UNUSED, const coap_pdu_t *sent, const coap_pdu_t *received, const coap_mid_t id COAP_UNUSED) message_handler() argument
[all...]
/third_party/python/Lib/
H A Dshutil.py144 sent = os.sendfile(outfd, infd, offset, blocksize)
166 if sent == 0:
168 offset += sent
/third_party/node/lib/
H A Ddgram.js723 function afterSend(err, sent) {
730 this.callback(err, sent);
/third_party/node/deps/ngtcp2/ngtcp2/lib/
H A Dngtcp2_qlog.c678 static void qlog_pkt_write_start(ngtcp2_qlog *qlog, int sent) { in qlog_pkt_write_start() argument
692 if (sent) { in qlog_pkt_write_start()
909 qlog_pkt_write_start(qlog, /* sent = */ 0); in ngtcp2_qlog_pkt_received_start()
918 qlog_pkt_write_start(qlog, /* sent = */ 1); in ngtcp2_qlog_pkt_sent_start()
/third_party/lwip/src/apps/altcp_tls/
H A Daltcp_tls_mbedtls.c39 * - 'sent' is always called with len==0 to the upper layer. This is because keeping
225 /* remote host sent FIN, remember this (SSL state is destroyed in altcp_mbedtls_lower_recv()
519 /* call upper sent with len==0 if the application already sent data */ in altcp_mbedtls_lower_sent()
520 if ((state->flags & ALTCP_MBEDTLS_FLAGS_APPLDATA_SENT) && conn->sent) { in altcp_mbedtls_lower_sent()
521 return conn->sent(conn->arg, conn, 0); in altcp_mbedtls_lower_sent()
1157 /* @todo/@fixme: assumption: either everything sent or error */ in altcp_mbedtls_write()
/third_party/node/deps/openssl/openssl/ssl/statem/
H A Dstatem_dtls.c158 * Each fragment that was already sent must at least have in dtls1_do_write()
263 * got sent. but why would this happen? in dtls1_do_write()
280 * reconstruct message header is if it is being sent in in dtls1_do_write()
524 * even though we have sent a HelloVerifyRequest. It is possible in dtls1_retrieve_buffered_fragment()
888 * We received a ClientHello and sent back a HelloVerifyRequest. We in dtls_get_reassembled_message()
1088 pqueue *sent = s->d1->sent_messages; in dtls1_retransmit_buffered_messages() local
1094 iter = pqueue_iterator(sent); in dtls1_retransmit_buffered_messages()
1227 /* restore state in which the message was originally sent */ in dtls1_retransmit_message()
/third_party/openssl/ssl/statem/
H A Dstatem_dtls.c162 * Each fragment that was already sent must at least have in dtls1_do_write()
267 * got sent. but why would this happen? in dtls1_do_write()
284 * reconstruct message header is if it is being sent in in dtls1_do_write()
528 * even though we have sent a HelloVerifyRequest. It is possible in dtls1_retrieve_buffered_fragment()
892 * We received a ClientHello and sent back a HelloVerifyRequest. We in dtls_get_reassembled_message()
1092 pqueue *sent = s->d1->sent_messages; in dtls1_retransmit_buffered_messages() local
1098 iter = pqueue_iterator(sent); in dtls1_retransmit_buffered_messages()
1231 /* restore state in which the message was originally sent */ in dtls1_retransmit_message()
/third_party/curl/lib/vquic/
H A Dcurl_quiche.c1150 ssize_t sent; in cf_quiche_data_event() local
1155 sent = cf_quiche_send(cf, data, body, 0, &result); in cf_quiche_data_event()
1157 stream->id, sent, result); in cf_quiche_data_event()
1509 /* This happens before we've sent off a request and the connection is in cf_quiche_conn_is_alive()
/third_party/toybox/generated/
H A Dglobals.h193 unsigned long sent, recv, fugit, min, max; member

Completed in 51 milliseconds

123456789