2 writes to _physicalStateObj
System.Data (2)
fx\src\data\System\Data\SqlClient\TdsParser.cs (2)
266
_physicalStateObj
= new TdsParserStateObject(this);
633
_physicalStateObj
= CreateSession(); // Create and open default MARS stateObj and connection.
274 references to _physicalStateObj
System.Data (274)
fx\src\data\System\Data\SqlClient\SqlConnection.cs (3)
1163
if ((parser != null) && (parser.
_physicalStateObj
!= null)) {
1164
parser.
_physicalStateObj
.DecrementPendingCallbacks(release: false);
1287
TdsParserStateObject stateObj = tdsConn.Parser.
_physicalStateObj
;
fx\src\data\System\Data\SqlClient\SqlInternalConnectionTds.cs (29)
578
return (!Parser.MARSOn && Parser.
_physicalStateObj
.BcpLock);
671
Threading.Tasks.Task executeTask = _parser.TdsExecuteSQLBatch("use " + database, ConnectionOptions.ConnectTimeout, null, _parser.
_physicalStateObj
, sync: true);
673
_parser.Run(RunBehavior.UntilDone, null, null, null, _parser.
_physicalStateObj
);
721
else if (!parser.MARSOn && parser.
_physicalStateObj
._pendingData) {
722
parser.DrainData(parser.
_physicalStateObj
);
724
Debug.Assert(!parser.
_physicalStateObj
._pendingData, "Should not have a busy physicalStateObject at this point!");
801
isAlive = _parser.
_physicalStateObj
.IsConnectionAlive(throwOnException);
873
Debug.Assert(!_parser.
_physicalStateObj
._pendingData, "Upon ResetConnection SqlInternalConnectionTds has pending data.");
888
Threading.Tasks.Task executeTask = _parser.TdsExecuteSQLBatch("sp_reset_connection", 30, null, _parser.
_physicalStateObj
, sync: true);
890
_parser.Run(RunBehavior.UntilDone, null, null, null, _parser.
_physicalStateObj
);
947
if (!Parser.MARSOn && Parser.
_physicalStateObj
.BcpLock) {
1032
Threading.Tasks.Task executeTask = _parser.TdsExecuteSQLBatch(sqlBatch.ToString(), ConnectionOptions.ConnectTimeout, null, _parser.
_physicalStateObj
, sync: true);
1034
_parser.Run(RunBehavior.UntilDone, null, null, null, _parser.
_physicalStateObj
);
1081
TdsParserStateObject stateObj = _parser.
_physicalStateObj
;
1193
_parser.PropagateDistributedTransaction(cookie, ConnectionOptions.ConnectTimeout, _parser.
_physicalStateObj
);
1201
_parser.Run(RunBehavior.UntilDone, null, null, null, _parser.
_physicalStateObj
);
1236
Debug.Assert(SniContext.Snix_Login == Parser.
_physicalStateObj
.SniContext, String.Format((IFormatProvider)null, "SniContext should be Snix_Login; actual Value: {0}", Parser.
_physicalStateObj
.SniContext));
1237
_parser.
_physicalStateObj
.SniContext = SniContext.Snix_EnableMars;
1249
_parser.
_physicalStateObj
.SniContext = SniContext.Snix_AutoEnlist;
1253
_parser.
_physicalStateObj
.SniContext=SniContext.Snix_Login;
1542
Debug.Assert(SniContext.Undefined== Parser.
_physicalStateObj
.SniContext, String.Format((IFormatProvider)null, "SniContext should be Undefined; actual Value: {0}", Parser.
_physicalStateObj
.SniContext));
1781
Debug.Assert(SniContext.Undefined== Parser.
_physicalStateObj
.SniContext, String.Format((IFormatProvider)null, "SniContext should be Undefined; actual Value: {0}", Parser.
_physicalStateObj
.SniContext));
1830
Debug.Assert(SniContext.Undefined == Parser.
_physicalStateObj
.SniContext, String.Format((IFormatProvider)null, "SniContext should be Undefined; actual Value: {0}", Parser.
_physicalStateObj
.SniContext));
1962
_parser.
_physicalStateObj
.SniContext = SniContext.Snix_Connect;
1980
_parser.
_physicalStateObj
.SniContext = SniContext.Snix_Login;
fx\src\data\System\Data\SqlClient\TdsParser.cs (234)
417
_physicalStateObj
.AddError(ProcessSNIError(
_physicalStateObj
));
418
_physicalStateObj
.Dispose();
419
ThrowExceptionAndWarning(
_physicalStateObj
);
470
_physicalStateObj
.CreatePhysicalSNIHandle(serverInfo.ExtendedServerName, ignoreSniOpenTimeout, timerExpire,
473
if (TdsEnums.SNI_SUCCESS !=
_physicalStateObj
.Status) {
474
_physicalStateObj
.AddError(ProcessSNIError(
_physicalStateObj
));
480
_physicalStateObj
.Dispose();
482
ThrowExceptionAndWarning(
_physicalStateObj
);
498
_physicalStateObj
.SniContext = SniContext.Snix_PreLoginBeforeSuccessfullWrite; // SQL BU DT 376766
499
_physicalStateObj
.TimeoutTime = timerExpire;
506
UInt32 result = SNINativeMethodWrapper.SniGetConnectionId(
_physicalStateObj
.Handle, ref _connHandler._clientConnectionId);
516
_physicalStateObj
.SniContext = SniContext.Snix_PreLogin;
524
_physicalStateObj
.Dispose(); // Close previous connection
527
_physicalStateObj
.SniContext=SniContext.Snix_Connect;
528
_physicalStateObj
.CreatePhysicalSNIHandle(serverInfo.ExtendedServerName, ignoreSniOpenTimeout, timerExpire, out instanceName, _sniSpnBuffer, true, true, fParallel, transparentNetworkResolutionState, totalTimeout);
530
if (TdsEnums.SNI_SUCCESS !=
_physicalStateObj
.Status) {
531
_physicalStateObj
.AddError(ProcessSNIError(
_physicalStateObj
));
533
ThrowExceptionAndWarning(
_physicalStateObj
);
536
UInt32 retCode = SNINativeMethodWrapper.SniGetConnectionId(
_physicalStateObj
.Handle, ref _connHandler._clientConnectionId);
581
error = SNINativeMethodWrapper.SNIRemoveProvider(
_physicalStateObj
.Handle, SNINativeMethodWrapper.ProviderEnum.SSL_PROV);
583
_physicalStateObj
.AddError(ProcessSNIError(
_physicalStateObj
));
584
ThrowExceptionAndWarning(
_physicalStateObj
);
589
_physicalStateObj
.ClearAllWritePackets();
596
_pMarsPhysicalConObj =
_physicalStateObj
;
605
_physicalStateObj
.AddError(ProcessSNIError(
_physicalStateObj
));
606
ThrowExceptionAndWarning(
_physicalStateObj
);
629
_physicalStateObj
.AddError(ProcessSNIError(
_physicalStateObj
));
630
ThrowExceptionAndWarning(
_physicalStateObj
);
659
session =
_physicalStateObj
;
677
Debug.Assert(session ==
_physicalStateObj
, "MARS is off, but session to close is not the _physicalStateObj");
678
_physicalStateObj
.SniContext = SniContext.Snix_Close;
682
_physicalStateObj
.Dispose();
686
_physicalStateObj
.Owner = null;
694
var stateObj =
_physicalStateObj
;
727
_physicalStateObj
._outputMessageType = TdsEnums.MT_PRELOGIN;
743
_physicalStateObj
.WriteByte((byte)option);
746
_physicalStateObj
.WriteByte((byte)((offset & 0xff00) >> 8)); // send upper order byte
747
_physicalStateObj
.WriteByte((byte)(offset & 0x00ff)); // send lower order byte
858
_physicalStateObj
.WriteByte((byte)((optionDataSize & 0xff00) >> 8));
859
_physicalStateObj
.WriteByte((byte)(optionDataSize & 0x00ff));
863
_physicalStateObj
.WriteByte((byte)PreLoginOptions.LASTOPT);
866
_physicalStateObj
.WriteByteArray(payload, payloadLength, 0);
869
_physicalStateObj
.WritePacket(TdsEnums.HARDFLUSH);
880
Debug.Assert(
_physicalStateObj
._syncOverAsync, "Should not attempt pends in a synchronous call");
881
bool result =
_physicalStateObj
.TryReadNetworkPacket();
884
if (
_physicalStateObj
._inBytesRead == 0) {
886
_physicalStateObj
.AddError(new SqlError(0, (byte)0x00, TdsEnums.FATAL_ERROR_CLASS, _server, SQLMessage.PreloginError(), "", 0));
887
_physicalStateObj
.Dispose();
888
ThrowExceptionAndWarning(
_physicalStateObj
);
891
if (!
_physicalStateObj
.TryProcessHeader()) { throw SQL.SynchronousCallMayNotPend(); }
893
if (
_physicalStateObj
._inBytesPacket > TdsEnums.MAX_PACKET_SIZE ||
_physicalStateObj
._inBytesPacket <= 0) {
896
byte[] payload = new byte[
_physicalStateObj
._inBytesPacket];
898
Debug.Assert(
_physicalStateObj
._syncOverAsync, "Should not attempt pends in a synchronous call");
899
result =
_physicalStateObj
.TryReadByteArray(payload, 0, payload.Length);
948
_physicalStateObj
.AddError(new SqlError(TdsEnums.ENCRYPTION_NOT_SUPPORTED, (byte)0x00, TdsEnums.FATAL_ERROR_CLASS, _server, SQLMessage.EncryptionNotSupportedByServer(), "", 0));
949
_physicalStateObj
.Dispose();
950
ThrowExceptionAndWarning(
_physicalStateObj
);
969
_physicalStateObj
.AddError(new SqlError(TdsEnums.ENCRYPTION_NOT_SUPPORTED, (byte)0x00, TdsEnums.FATAL_ERROR_CLASS, _server, SQLMessage.EncryptionNotSupportedByClient(), "", 0));
970
_physicalStateObj
.Dispose();
971
ThrowExceptionAndWarning(
_physicalStateObj
);
1000
error = SNINativeMethodWrapper.SNIAddProvider(
_physicalStateObj
.Handle, SNINativeMethodWrapper.ProviderEnum.SSL_PROV, ref info);
1003
_physicalStateObj
.AddError(ProcessSNIError(
_physicalStateObj
));
1004
ThrowExceptionAndWarning(
_physicalStateObj
);
1011
error = SNINativeMethodWrapper.SNIWaitForSSLHandshakeToComplete(
_physicalStateObj
.Handle,
_physicalStateObj
.GetTimeoutRemaining());
1014
_physicalStateObj
.AddError(ProcessSNIError(
_physicalStateObj
));
1015
ThrowExceptionAndWarning(
_physicalStateObj
);
1021
_physicalStateObj
.ClearAllWritePackets();
1120
if (!connectionIsDoomed && null !=
_physicalStateObj
) {
1121
if (
_physicalStateObj
._pendingData) {
1122
DrainData(
_physicalStateObj
);
1125
if (
_physicalStateObj
.HasOpenResult) { // SQL BU DT 383773 - need to decrement openResultCount for all pending operations.
1126
_physicalStateObj
.DecrementOpenResultCount();
1164
if (!
_physicalStateObj
.HasOwner) {
1165
_physicalStateObj
.SniContext = SniContext.Snix_Close;
1169
_physicalStateObj
.Dispose();
1173
_physicalStateObj
.DecrementPendingCallbacks(false);
2427
if (
_physicalStateObj
.SetPacketSize(packetSize)) {
2430
_physicalStateObj
.ClearAllWritePackets();
2434
UInt32 result = SNINativeMethodWrapper.SNISetInfo(
_physicalStateObj
.Handle, SNINativeMethodWrapper.QTypes.SNI_QUERY_CONN_BUFSIZE, ref unsignedPacketSize);
3677
_physicalStateObj
.WriteByte(0);
3680
_physicalStateObj
.WriteByte(sizeof(UInt32)+sizeof(byte));
3681
WriteUnsignedInt(collation.info,
_physicalStateObj
);
3682
_physicalStateObj
.WriteByte(collation.sortId);
6891
_physicalStateObj
.WriteByte(TdsEnums.FEATUREEXT_SRECOVERY);
6895
WriteInt(0,
_physicalStateObj
);
6934
WriteInt(8 + initialLength + currentLength,
_physicalStateObj
); // length of data w/o total length (initil+current+2*sizeof(DWORD))
6935
WriteInt(initialLength,
_physicalStateObj
);
6936
WriteIdentifier(reconnectData._initialDatabase,
_physicalStateObj
);
6937
WriteCollation(reconnectData._initialCollation,
_physicalStateObj
);
6938
WriteIdentifier(reconnectData._initialLanguage,
_physicalStateObj
);
6941
_physicalStateObj
.WriteByte((byte)i);
6943
_physicalStateObj
.WriteByte((byte)reconnectData._initialState[i].Length);
6946
_physicalStateObj
.WriteByte(0xFF);
6947
WriteInt(reconnectData._initialState[i].Length,
_physicalStateObj
);
6949
_physicalStateObj
.WriteByteArray(reconnectData._initialState[i], reconnectData._initialState[i].Length, 0);
6952
WriteInt(currentLength,
_physicalStateObj
);
6953
WriteIdentifier(reconnectData._database != reconnectData._initialDatabase ? reconnectData._database : null,
_physicalStateObj
);
6954
WriteCollation(SqlCollation.AreSame(reconnectData._initialCollation, reconnectData._collation) ? null : reconnectData._collation,
_physicalStateObj
);
6955
WriteIdentifier(reconnectData._language != reconnectData._initialLanguage ? reconnectData._language : null,
_physicalStateObj
);
6958
_physicalStateObj
.WriteByte((byte)i);
6960
_physicalStateObj
.WriteByte((byte)reconnectData._delta[i]._dataLength);
6963
_physicalStateObj
.WriteByte(0xFF);
6964
WriteInt(reconnectData._delta[i]._dataLength,
_physicalStateObj
);
6966
_physicalStateObj
.WriteByteArray(reconnectData._delta[i]._data, reconnectData._delta[i]._dataLength, 0);
7001
_physicalStateObj
.WriteByte(TdsEnums.FEATUREEXT_FEDAUTH);
7024
WriteInt(dataLen,
_physicalStateObj
);
7025
_physicalStateObj
.WriteByte(options);
7047
_physicalStateObj
.WriteByte(workflow);
7050
WriteInt(fedAuthFeatureData.accessToken.Length,
_physicalStateObj
);
7051
_physicalStateObj
.WriteByteArray(fedAuthFeatureData.accessToken, fedAuthFeatureData.accessToken.Length, 0);
7066
_physicalStateObj
.WriteByte(TdsEnums.FEATUREEXT_TCE);
7067
WriteInt (1,
_physicalStateObj
);
7068
_physicalStateObj
.WriteByte(TdsEnums.MAX_SUPPORTED_TCE_VERSION);
7079
_physicalStateObj
.WriteByte(TdsEnums.FEATUREEXT_GLOBALTRANSACTIONS);
7080
WriteInt(0,
_physicalStateObj
); // we don't send any data
7092
_physicalStateObj
.WriteByte(TdsEnums.FEATUREEXT_AZURESQLSUPPORT);
7095
WriteInt(s_FeatureExtDataAzureSQLSupportFeatureRequest.Length,
_physicalStateObj
);
7097
_physicalStateObj
.WriteByteArray(s_FeatureExtDataAzureSQLSupportFeatureRequest, s_FeatureExtDataAzureSQLSupportFeatureRequest.Length, 0);
7108
_physicalStateObj
.SetTimeoutSeconds(rec.timeout);
7165
_physicalStateObj
._outputMessageType = TdsEnums.MT_LOGIN7;
7205
Debug.Assert(SniContext.Snix_Login==
_physicalStateObj
.SniContext, String.Format((IFormatProvider)null, "Unexpected SniContext. Expecting Snix_Login, actual value is '{0}'",
_physicalStateObj
.SniContext));
7206
_physicalStateObj
.SniContext = SniContext.Snix_LoginSspi;
7211
_physicalStateObj
.SniContext=SniContext.Snix_Login;
7244
WriteInt(length,
_physicalStateObj
);
7246
WriteInt((TdsEnums.DENALI_MAJOR << 24) | (TdsEnums.DENALI_INCREMENT << 16) | TdsEnums.DENALI_MINOR,
_physicalStateObj
);
7249
WriteUnsignedInt(recoverySessionData._tdsVersion,
_physicalStateObj
);
7251
WriteInt(rec.packetSize,
_physicalStateObj
);
7252
WriteInt(TdsEnums.CLIENT_PROG_VER,
_physicalStateObj
);
7253
WriteInt(TdsParserStaticMethods.GetCurrentProcessIdForTdsLoginOnly(),
_physicalStateObj
); //MDAC 84718
7254
WriteInt(0,
_physicalStateObj
); // connectionID is unused
7317
WriteInt(log7Flags,
_physicalStateObj
);
7322
WriteInt(0,
_physicalStateObj
); // ClientTimeZone is not used
7323
WriteInt(0,
_physicalStateObj
); // LCID is unused by server
7331
WriteShort(offset,
_physicalStateObj
); // host name offset
7332
WriteShort(rec.hostName.Length,
_physicalStateObj
);
7338
WriteShort(offset,
_physicalStateObj
); // userName offset
7339
WriteShort(userName.Length,
_physicalStateObj
);
7343
WriteShort(offset,
_physicalStateObj
); // password offset
7344
WriteShort(encryptedPasswordLengthInBytes / 2,
_physicalStateObj
);
7349
WriteShort(0,
_physicalStateObj
); // userName offset
7350
WriteShort(0,
_physicalStateObj
);
7351
WriteShort(0,
_physicalStateObj
); // password offset
7352
WriteShort(0,
_physicalStateObj
);
7355
WriteShort(offset,
_physicalStateObj
); // app name offset
7356
WriteShort(rec.applicationName.Length,
_physicalStateObj
);
7359
WriteShort(offset,
_physicalStateObj
); // server name offset
7360
WriteShort(rec.serverName.Length,
_physicalStateObj
);
7363
WriteShort(offset,
_physicalStateObj
);
7365
WriteShort(4,
_physicalStateObj
); // length of ibFeatgureExtLong (which is a DWORD)
7369
WriteShort(0,
_physicalStateObj
); // unused (was remote password ?)
7372
WriteShort(offset,
_physicalStateObj
); // client interface name offset
7373
WriteShort(clientInterfaceName.Length,
_physicalStateObj
);
7376
WriteShort(offset,
_physicalStateObj
); // language name offset
7377
WriteShort(rec.language.Length,
_physicalStateObj
);
7380
WriteShort(offset,
_physicalStateObj
); // database name offset
7381
WriteShort(rec.database.Length,
_physicalStateObj
);
7389
_physicalStateObj
.WriteByteArray(s_nicAddress, s_nicAddress.Length, 0);
7391
WriteShort(offset,
_physicalStateObj
); // ibSSPI offset
7393
WriteShort((int)outSSPILength,
_physicalStateObj
);
7397
WriteShort(0,
_physicalStateObj
);
7400
WriteShort(offset,
_physicalStateObj
); // DB filename offset
7401
WriteShort(rec.attachDBFilename.Length,
_physicalStateObj
);
7404
WriteShort(offset,
_physicalStateObj
); // reset password offset
7405
WriteShort(encryptedChangePasswordLengthInBytes / 2,
_physicalStateObj
);
7407
WriteInt(0,
_physicalStateObj
); // reserved for chSSPI
7410
WriteString(rec.hostName,
_physicalStateObj
);
7415
WriteString(userName,
_physicalStateObj
);
7418
_physicalStateObj
._tracePasswordOffset =
_physicalStateObj
._outBytesUsed;
7419
_physicalStateObj
._tracePasswordLength = encryptedPasswordLengthInBytes;
7422
_physicalStateObj
.WriteSecureString(rec.credential.Password);
7425
_physicalStateObj
.WriteByteArray(encryptedPassword, encryptedPasswordLengthInBytes, 0);
7429
WriteString(rec.applicationName,
_physicalStateObj
);
7430
WriteString(rec.serverName,
_physicalStateObj
);
7434
WriteInt(feOffset,
_physicalStateObj
);
7437
WriteString(clientInterfaceName,
_physicalStateObj
);
7438
WriteString(rec.language,
_physicalStateObj
);
7439
WriteString(rec.database,
_physicalStateObj
);
7443
_physicalStateObj
.WriteByteArray(outSSPIBuff, (int)outSSPILength, 0);
7445
WriteString(rec.attachDBFilename,
_physicalStateObj
);
7448
_physicalStateObj
._traceChangePasswordOffset =
_physicalStateObj
._outBytesUsed;
7449
_physicalStateObj
._traceChangePasswordLength = encryptedChangePasswordLengthInBytes;
7451
_physicalStateObj
.WriteSecureString(rec.newSecurePassword);
7454
_physicalStateObj
.WriteByteArray(encryptedChangePassword, encryptedChangePasswordLengthInBytes, 0);
7476
_physicalStateObj
.WriteByte(0xFF); // terminator
7483
_physicalStateObj
._outputPacketNumber = 1; // end of message - reset to 1 - per ramas
7484
_physicalStateObj
.ResetBuffer();
7490
_physicalStateObj
.WritePacket(TdsEnums.HARDFLUSH);
7491
_physicalStateObj
.ResetSecurePasswordsInfomation(); // Password information is needed only from Login process; done with writing login packet and should clear information
7492
_physicalStateObj
._pendingData = true;
7493
_physicalStateObj
._messageStatus = 0;
7507
_physicalStateObj
._outputMessageType = TdsEnums.MT_FEDAUTH;
7513
WriteUnsignedInt((uint)accessToken.Length + sizeof(uint),
_physicalStateObj
);
7516
WriteUnsignedInt((uint)accessToken.Length,
_physicalStateObj
);
7519
_physicalStateObj
.WriteByteArray(accessToken, accessToken.Length, 0);
7521
_physicalStateObj
.WritePacket(TdsEnums.HARDFLUSH);
7522
_physicalStateObj
._pendingData = true;
7523
_physicalStateObj
._messageStatus = 0;
7540
if(0 != SNINativeMethodWrapper.SNISecGenClientContext(
_physicalStateObj
.Handle, receivedBuff, receivedLength, sendBuff, ref sendLength, _sniSpnBuffer))
7548
SniContext outerContext=
_physicalStateObj
.SniContext;
7549
_physicalStateObj
.SniContext = SniContext.Snix_ProcessSspi;
7554
Debug.Assert(
_physicalStateObj
._syncOverAsync, "Should not attempt pends in a synchronous call");
7555
bool result =
_physicalStateObj
.TryReadByteArray(receivedBuff, 0, receivedLength);
7566
_physicalStateObj
.WriteByteArray(sendBuff, (int)sendLength, 0);
7569
_physicalStateObj
._outputMessageType = TdsEnums.MT_SSPI;
7572
_physicalStateObj
.WritePacket(TdsEnums.HARDFLUSH);
7573
_physicalStateObj
.SniContext=outerContext;
7580
_physicalStateObj
.AddError(new SqlError(0, (byte)0x00, (byte)TdsEnums.MIN_ERROR_CLASS, _server, error, procedure, 0));
7581
ThrowExceptionAndWarning(
_physicalStateObj
);
7631
_physicalStateObj
.AddError(new SqlError(0, (byte)0x00, (byte)TdsEnums.MIN_ERROR_CLASS, _server, Res.GetString(Res.SQL_ADALInitializeError, authentication.ToString("G"), result.ToString("X")), TdsEnums.INIT_ADAL_PACKAGE, 0));
7633
ThrowExceptionAndWarning(
_physicalStateObj
);
7977
if ((!_fMARS) && (
_physicalStateObj
.HasOpenResult))
8087
if ((!_fMARS) && (
_physicalStateObj
.HasOpenResult))
11422
null ==
_physicalStateObj
,
11444
_physicalStateObj
!= null ? "(null)" :
_physicalStateObj
.ErrorCount.ToString((IFormatProvider)null),
11445
_physicalStateObj
!= null ? "(null)" :
_physicalStateObj
.WarningCount.ToString((IFormatProvider)null),
11446
_physicalStateObj
!= null ? "(null)" :
_physicalStateObj
.PreAttentionErrorCount.ToString((IFormatProvider)null),
11447
_physicalStateObj
!= null ? "(null)" :
_physicalStateObj
.PreAttentionWarningCount.ToString((IFormatProvider)null),
fx\src\data\System\Data\SqlClient\TdsParserStateObject.cs (8)
289
Debug.Assert(null != _parser.
_physicalStateObj
, "no physical session?");
290
Debug.Assert(null != _parser.
_physicalStateObj
._inBuff, "no in buffer?");
291
Debug.Assert(null != _parser.
_physicalStateObj
._outBuff, "no out buffer?");
292
Debug.Assert(_parser.
_physicalStateObj
._outBuff.Length ==
293
_parser.
_physicalStateObj
._inBuff.Length, "Unexpected unequal buffers.");
296
SetPacketSize(_parser.
_physicalStateObj
._outBuff.Length);
309
_lastSuccessfulIOTimer = parser.
_physicalStateObj
._lastSuccessfulIOTimer;
1116
this == _parser.
_physicalStateObj
,