Home
last modified time | relevance | path

Searched refs:connection (Results 1 – 25 of 604) sorted by relevance

12345678910>>...25

/src/lib/libc/net/
H A Dnscachedcli.c58 safe_write(struct cached_connection_ *connection, const void *data, in safe_write() argument
74 nevents = _kevent(connection->write_queue, NULL, 0, &eventlist, in safe_write()
77 s_result = _sendto(connection->sockfd, data + result, in safe_write()
102 safe_read(struct cached_connection_ *connection, void *data, size_t data_size) in safe_read() argument
117 nevents = _kevent(connection->read_queue, NULL, 0, &eventlist, in safe_read()
120 s_result = _read(connection->sockfd, data + result, in safe_read()
142 send_credentials(struct cached_connection_ *connection, int type) in send_credentials() argument
168 EV_SET(&eventlist, connection->sockfd, EVFILT_WRITE, EV_ADD, in send_credentials()
170 (void)_kevent(connection->write_queue, &eventlist, 1, NULL, 0, NULL); in send_credentials()
172 nevents = _kevent(connection->write_queue, NULL, 0, &eventlist, 1, in send_credentials()
[all …]
H A Dnscache.c57 cached_connection connection; in __nss_common_cache_read() local
108 connection = __open_cached_connection(&params); in __nss_common_cache_read()
109 if (connection == NULL) { in __nss_common_cache_read()
113 res = __cached_read(connection, cache_info->entry_name, in __nss_common_cache_read()
116 __close_cached_connection(connection); in __nss_common_cache_read()
161 cached_connection connection; in __nss_common_cache_write() local
180 connection = __open_cached_connection(&params); in __nss_common_cache_write()
181 if (connection == NULL) { in __nss_common_cache_write()
210 __close_cached_connection(connection); in __nss_common_cache_write()
216 res = __cached_write(connection, cache_info->entry_name, in __nss_common_cache_write()
[all …]
/src/usr.sbin/nscd/
H A Dnscdcli.c53 safe_write(struct nscd_connection_ *connection, const void *data, in safe_write() argument
69 nevents = kevent(connection->write_queue, NULL, 0, &eventlist, in safe_write()
72 s_result = write(connection->sockfd, in safe_write()
91 safe_read(struct nscd_connection_ *connection, void *data, size_t data_size) in safe_read() argument
106 nevents = kevent(connection->read_queue, NULL, 0, &eventlist, 1, in safe_read()
109 s_result = read(connection->sockfd, in safe_read()
128 send_credentials(struct nscd_connection_ *connection, int type) in send_credentials() argument
155 EV_SET(&eventlist, connection->sockfd, EVFILT_WRITE, EV_ADD, in send_credentials()
157 kevent(connection->write_queue, &eventlist, 1, NULL, 0, NULL); in send_credentials()
159 nevents = kevent(connection->write_queue, NULL, 0, &eventlist, 1, NULL); in send_credentials()
[all …]
/src/crypto/openssl/doc/designs/quic-design/
H A Dconnection-id-cache.md4 The connection ID cache is responsible for managing connection IDs, both local
10 For remote connection IDs, we need to be able to:
12 * add new IDs per connection;
13 * pick a non-retired ID associated from those available for a connection and
14 * select a connection ID by sequence number and retire that and all older IDs.
18 and must maintain a count of the number of connection IDs present.
25 When picking a non-retired connection ID for MVP, the youngest available will
31 For local connection IDs, we need to be able to:
33 * generate a new connection ID and associate it with a connection;
34 * query if a connection ID is present;
[all …]
H A Dquic-connID-retire.md4 * Two connection IDs -- one local, one remote
19 MVP does not issue multiple connection CIDs, instead it uses a zero length CID.
27 * ensuring only one retire connection ID frame is in flight
33 to the CID code should be undertaken when/if connection migration is
39 When a remote asks to retire a connection ID (RETIRE_CONNECTION_ID) we have to:
48 When a remote creates a new connection ID:
50 * May respond with a new connection ID frame (it's a good idea)
54 When we want to retire one (or more) connection IDs we have to:
58 * Delete the connection(s) once they are retired by our peer (either
H A Ddemuxer.md14 - client must discard any packets that do not match existing connection ID
25 on the client is well-formed but does not belong to a known connection
32 - on the server side packets can create a new connection potentially
36 connection; limit the number of such packets with the same destination
39 but with unknown connection IDs:
41 new connection
46 - discard any other packet with unknown connection IDs
/src/crypto/openssl/doc/man3/
H A DSSL_get_version.pod6 SSL_version - get the protocol information of a connection
26 ClientHello when initiating the connection. Note that, for TLS, this value
30 SSL_get_version() returns the name of the protocol used for the connection.
31 SSL_version() returns the numeric protocol version used for the connection.
35 SSL_is_dtls() returns 1 if the connection is using DTLS or 0 if not.
37 SSL_is_tls() returns 1 if the connection is using SSL/TLS or 0 if not.
39 SSL_is_quic() returns 1 if the connection is using QUIC or 0 if not.
50 The connection uses the SSLv3 protocol.
54 The connection uses the TLSv1.0 protocol.
58 The connection uses the TLSv1.1 protocol.
[all …]
H A DBIO_s_accept.pod49 on the underlying connection. If no connection is established
51 waits for an incoming connection.
56 connection on that chain is shutdown and the socket closed when
60 connection and reset the BIO into a state where it awaits another
61 incoming connection.
98 connection is received. This is useful if, for example, a
99 buffering or SSL BIO is required for each connection. The
124 connection, or request a retry in non blocking mode.
129 incoming connection before processing I/O calls. When an accept
133 When a connection is established a new socket BIO is created for
[all …]
H A DSSL_set1_initial_peer_addr.pod5 SSL_set1_initial_peer_addr - set the initial peer address for a QUIC connection
16 for the purposes of establishing a QUIC connection in client mode. This function
17 can be used only on a QUIC connection SSL object, and can be used only before a
18 connection attempt is first made. I<addr> must point to a B<BIO_ADDR>
21 Where a QUIC connection object is provided with a write BIO which supports the
30 connection events, such as connection migration (where supported).
32 connection establishment, and does not confer any guarantee about the
34 connection lifecycle.
H A DBIO_s_connect.pod41 round the platform's TCP/IP socket connection routines.
48 on the underlying connection. If no connection is established
50 a connection is established first.
55 connection is shutdown and the socket closed when the BIO
59 connection and reset the BIO into a state where it can connect
95 should be made before the connection is established because
100 For non-SSL BIOs the connection is done typically at TCP level.
103 The function returns 1 if the connection was established successfully.
104 A zero or negative value is returned if the connection could not be established.
107 If a connection has already been established this call has no effect.
[all …]
H A DSSL_key_update.pod10 - initiate and obtain information about updating connection keys
25 SSL_key_update() schedules an update of the keys for the current TLS connection.
27 the sending keys for this connection will be updated and the peer will be
29 B<SSL_KEY_UPDATE_REQUESTED> then the sending keys for this connection will be
38 SSL_read_ex() or SSL_write_ex() takes place on the connection. Alternatively
48 connection will result in an error.
51 handshake over an existing SSL/TLS connection. The next time an IO operation
52 such as SSL_read_ex() or SSL_write_ex() takes place on the connection a check
55 attempt to resume any session associated with the connection in the new
57 a "no_renegotiation" alert. An OpenSSL will immediately fail the connection in
[all …]
H A DSSL_shutdown.pod5 SSL_shutdown, SSL_shutdown_ex - shut down a TLS/SSL or QUIC connection
24 SSL_shutdown() shuts down an active connection represented by an SSL object. I<ssl> B<MUST NOT> be …
46 connection; i.e., if L<SSL_get_error(3)> has returned B<SSL_ERROR_SYSCALL> or
67 These steps can occur in either order depending on whether the connection
77 Calling SSL_shutdown() only closes the write direction of the connection; the
80 until the peer decides to close the connection in turn. The peer might
84 SSL_shutdown() does not affect an underlying network connection such as a TCP
85 connection, which remains open.
144 (such that it returns 0) and then close the underlying connection without
153 connection.
[all …]
H A DSSL_set_default_stream_mode.pod8 connection
22 A QUIC connection SSL object may have a default stream attached to it. A default
24 made on a QUIC connection SSL object are redirected. Default stream handling
26 connection.
29 connection once L<SSL_read(3)> or L<SSL_write(3)> is called.
35 L<SSL_write(3)>) after establishing a connection, OpenSSL will wait for the
46 When a QUIC connection SSL object has no default stream currently associated
48 functions which require a stream on the QUIC connection SSL object (for example,
56 handling. It can only be called on a QUIC connection SSL object prior to any
58 after calling L<SSL_new(3)>, prior to initiating a connection. The argument
[all …]
H A DSSL_get_conn_close_info.pod28 - get information about why a QUIC connection was closed
76 QUIC connection was closed.
95 number which caused the connection to be closed. It may also be set to 0 if no
96 frame type was specified as causing the connection to be closed. If
102 the reason for connection closure. The length of the reason string in bytes is
113 If I<flags> has B<SSL_CONN_CLOSE_FLAG_LOCAL> set, connection closure was locally
120 If unset, connection closure was remotely triggered.
124 If I<flags> has B<SSL_CONN_CLOSE_FLAG_TRANSPORT> set, connection closure was
125 triggered for QUIC protocol reasons. Otherwise, connection closure was triggered
139 Some conditions which can cause QUIC connection termination are not signalled on
[all …]
H A DSSL_set_shutdown.pod5 SSL_set_shutdown, SSL_get_shutdown - manipulate shutdown state of an SSL connection
23 The shutdown state of an ssl connection is a bit-mask of:
33 A close_notify shutdown alert was sent to the peer, the connection is being
45 The shutdown state of the connection is used to determine the state of
51 alert but to not wait for the peer's answer, when the underlying connection
67 on the actual connection state.
70 is called on a QUIC connection SSL object, it returns a value with
73 has been received from the peer or the QUIC connection is fully terminated
/src/lib/libiscsiutil/
H A Dlibiscsiutil.h42 struct connection { struct
62 struct connection *pdu_connection; argument
72 void (*fail)(const struct connection *, const char *);
138 struct pdu *pdu_new(struct connection *ic);
148 void text_send_request(struct connection *conn,
150 struct keys * text_read_response(struct connection *conn);
151 struct keys * text_read_request(struct connection *conn,
156 void connection_init(struct connection *conn,
/src/sys/contrib/device-tree/src/arm64/freescale/
H A Dfsl-ls2088a-rdb.dts28 phy-connection-type = "10gbase-r";
33 phy-connection-type = "10gbase-r";
38 phy-connection-type = "10gbase-r";
43 phy-connection-type = "10gbase-r";
48 phy-connection-type = "10gbase-r";
53 phy-connection-type = "10gbase-r";
58 phy-connection-type = "10gbase-r";
63 phy-connection-type = "10gbase-r";
H A Dfsl-ls1088a-rdb.dts22 phy-connection-type = "10gbase-r";
28 phy-connection-type = "qsgmii";
35 phy-connection-type = "qsgmii";
42 phy-connection-type = "qsgmii";
49 phy-connection-type = "qsgmii";
56 phy-connection-type = "qsgmii";
63 phy-connection-type = "qsgmii";
70 phy-connection-type = "qsgmii";
77 phy-connection-type = "qsgmii";
H A Dfsl-lx2160a-tqmlx2160a-mblx2160a_x_11_x.dtso13 phy-connection-type = "sgmii";
19 phy-connection-type = "sgmii";
25 phy-connection-type = "sgmii";
31 phy-connection-type = "sgmii";
/src/contrib/llvm-project/compiler-rt/lib/tsan/rtl/
H A Dtsan_interceptors_mac.cpp294 xpc_connection_t connection, xpc_handler_t handler) { in TSAN_INTERCEPTOR() argument
295 SCOPED_TSAN_INTERCEPTOR(xpc_connection_set_event_handler, connection, in TSAN_INTERCEPTOR()
297 Release(thr, pc, (uptr)connection); in TSAN_INTERCEPTOR()
301 Acquire(thr, pc, (uptr)connection); in TSAN_INTERCEPTOR()
305 REAL(xpc_connection_set_event_handler)(connection, new_handler); in TSAN_INTERCEPTOR()
308 TSAN_INTERCEPTOR(void, xpc_connection_send_barrier, xpc_connection_t connection, in TSAN_INTERCEPTOR() argument
310 SCOPED_TSAN_INTERCEPTOR(xpc_connection_send_barrier, connection, barrier); in TSAN_INTERCEPTOR()
311 Release(thr, pc, (uptr)connection); in TSAN_INTERCEPTOR()
315 Acquire(thr, pc, (uptr)connection); in TSAN_INTERCEPTOR()
319 REAL(xpc_connection_send_barrier)(connection, new_barrier); in TSAN_INTERCEPTOR()
[all …]
/src/crypto/openssl/doc/man7/
H A Dossl-guide-libssl-introduction.pod25 An B<SSL> object is used to represent a connection to a remote peer. Once a
26 connection with a remote peer has been established data can be exchanged with
31 to arrive at all. In this case the B<SSL> object used for the connection is also
38 SSL/TLS only supports one stream of data per connection and it is always
39 bi-directional. In this case the B<SSL> object used for the connection also
43 The QUIC protocol can support multiple streams per connection and they can be
45 underlying connection, or a stream, or both. Where multiple streams are in use
50 connection. A single B<SSL_CTX> object can be used to create many connections
68 This structure is used to indicate the kind of connection you want to make, e.g.
75 After establishing a connection with a peer the agreed cryptographic material
[all …]
/src/contrib/sendmail/contrib/
H A DsocketmapClient.pl11 my $connection = shift @ARGV;
16 if ($connection =~ /tcp:(.+):([0-9]*)/) {
22 } elsif ($connection =~ /((unix)|(local)):(.+)/) {
28 die "unrecognized connection specification $connection";
/src/lib/libfetch/
H A Dftp.errors7 125 OK Data connection already open; transfer starting
8 150 OK File status okay; about to open data connection
17 221 OK Service closing control connection
18 225 OK Data connection open; no transfer in progress
28 421 DOWN Service not available, closing control connection
29 425 NETWORK Can't open data connection
/src/contrib/ntp/sntp/libevent/
H A Devrpc.c504 static int evrpc_schedule_request(struct evhttp_connection *connection,
540 struct evhttp_connection *connection; in evrpc_pool_free() local
556 while ((connection = TAILQ_FIRST(&pool->connections)) != NULL) { in evrpc_pool_free()
557 TAILQ_REMOVE(&pool->connections, connection, next); in evrpc_pool_free()
558 evhttp_connection_free(connection); in evrpc_pool_free()
581 struct evhttp_connection *connection) in evrpc_pool_add_connection() argument
583 EVUTIL_ASSERT(connection->http_server == NULL); in evrpc_pool_add_connection()
584 TAILQ_INSERT_TAIL(&pool->connections, connection, next); in evrpc_pool_add_connection()
590 evhttp_connection_set_base(connection, pool->base); in evrpc_pool_add_connection()
596 if (!evutil_timerisset(&connection->timeout)) in evrpc_pool_add_connection()
[all …]
/src/contrib/libevent/
H A Devrpc.c504 static int evrpc_schedule_request(struct evhttp_connection *connection,
540 struct evhttp_connection *connection; in evrpc_pool_free() local
556 while ((connection = TAILQ_FIRST(&pool->connections)) != NULL) { in evrpc_pool_free()
557 TAILQ_REMOVE(&pool->connections, connection, next); in evrpc_pool_free()
558 evhttp_connection_free(connection); in evrpc_pool_free()
581 struct evhttp_connection *connection) in evrpc_pool_add_connection() argument
583 EVUTIL_ASSERT(connection->http_server == NULL); in evrpc_pool_add_connection()
584 TAILQ_INSERT_TAIL(&pool->connections, connection, next); in evrpc_pool_add_connection()
590 evhttp_connection_set_base(connection, pool->base); in evrpc_pool_add_connection()
596 if (!evutil_timerisset(&connection->timeout)) in evrpc_pool_add_connection()
[all …]

12345678910>>...25