| /src/lib/libc/net/ |
| H A D | nscachedcli.c | 58 safe_write(struct cached_connection_ *connection, const void *data, in safe_write() argument 74 nevents = _kevent(connection->write_queue, NULL, 0, &eventlist, in safe_write() 77 s_result = _sendto(connection->sockfd, data + result, in safe_write() 102 safe_read(struct cached_connection_ *connection, void *data, size_t data_size) in safe_read() argument 117 nevents = _kevent(connection->read_queue, NULL, 0, &eventlist, in safe_read() 120 s_result = _read(connection->sockfd, data + result, in safe_read() 142 send_credentials(struct cached_connection_ *connection, int type) in send_credentials() argument 168 EV_SET(&eventlist, connection->sockfd, EVFILT_WRITE, EV_ADD, in send_credentials() 170 (void)_kevent(connection->write_queue, &eventlist, 1, NULL, 0, NULL); in send_credentials() 172 nevents = _kevent(connection->write_queue, NULL, 0, &eventlist, 1, in send_credentials() [all …]
|
| H A D | nscache.c | 57 cached_connection connection; in __nss_common_cache_read() local 108 connection = __open_cached_connection(¶ms); in __nss_common_cache_read() 109 if (connection == NULL) { in __nss_common_cache_read() 113 res = __cached_read(connection, cache_info->entry_name, in __nss_common_cache_read() 116 __close_cached_connection(connection); in __nss_common_cache_read() 161 cached_connection connection; in __nss_common_cache_write() local 180 connection = __open_cached_connection(¶ms); in __nss_common_cache_write() 181 if (connection == NULL) { in __nss_common_cache_write() 210 __close_cached_connection(connection); in __nss_common_cache_write() 216 res = __cached_write(connection, cache_info->entry_name, in __nss_common_cache_write() [all …]
|
| /src/usr.sbin/nscd/ |
| H A D | nscdcli.c | 53 safe_write(struct nscd_connection_ *connection, const void *data, in safe_write() argument 69 nevents = kevent(connection->write_queue, NULL, 0, &eventlist, in safe_write() 72 s_result = write(connection->sockfd, in safe_write() 91 safe_read(struct nscd_connection_ *connection, void *data, size_t data_size) in safe_read() argument 106 nevents = kevent(connection->read_queue, NULL, 0, &eventlist, 1, in safe_read() 109 s_result = read(connection->sockfd, in safe_read() 128 send_credentials(struct nscd_connection_ *connection, int type) in send_credentials() argument 155 EV_SET(&eventlist, connection->sockfd, EVFILT_WRITE, EV_ADD, in send_credentials() 157 kevent(connection->write_queue, &eventlist, 1, NULL, 0, NULL); in send_credentials() 159 nevents = kevent(connection->write_queue, NULL, 0, &eventlist, 1, NULL); in send_credentials() [all …]
|
| /src/crypto/openssl/doc/designs/quic-design/ |
| H A D | connection-id-cache.md | 4 The connection ID cache is responsible for managing connection IDs, both local 10 For remote connection IDs, we need to be able to: 12 * add new IDs per connection; 13 * pick a non-retired ID associated from those available for a connection and 14 * select a connection ID by sequence number and retire that and all older IDs. 18 and must maintain a count of the number of connection IDs present. 25 When picking a non-retired connection ID for MVP, the youngest available will 31 For local connection IDs, we need to be able to: 33 * generate a new connection ID and associate it with a connection; 34 * query if a connection ID is present; [all …]
|
| H A D | quic-connID-retire.md | 4 * Two connection IDs -- one local, one remote 19 MVP does not issue multiple connection CIDs, instead it uses a zero length CID. 27 * ensuring only one retire connection ID frame is in flight 33 to the CID code should be undertaken when/if connection migration is 39 When a remote asks to retire a connection ID (RETIRE_CONNECTION_ID) we have to: 48 When a remote creates a new connection ID: 50 * May respond with a new connection ID frame (it's a good idea) 54 When we want to retire one (or more) connection IDs we have to: 58 * Delete the connection(s) once they are retired by our peer (either
|
| H A D | demuxer.md | 14 - client must discard any packets that do not match existing connection ID 25 on the client is well-formed but does not belong to a known connection 32 - on the server side packets can create a new connection potentially 36 connection; limit the number of such packets with the same destination 39 but with unknown connection IDs: 41 new connection 46 - discard any other packet with unknown connection IDs
|
| /src/crypto/openssl/doc/man3/ |
| H A D | SSL_get_version.pod | 6 SSL_version - get the protocol information of a connection 26 ClientHello when initiating the connection. Note that, for TLS, this value 30 SSL_get_version() returns the name of the protocol used for the connection. 31 SSL_version() returns the numeric protocol version used for the connection. 35 SSL_is_dtls() returns 1 if the connection is using DTLS or 0 if not. 37 SSL_is_tls() returns 1 if the connection is using SSL/TLS or 0 if not. 39 SSL_is_quic() returns 1 if the connection is using QUIC or 0 if not. 50 The connection uses the SSLv3 protocol. 54 The connection uses the TLSv1.0 protocol. 58 The connection uses the TLSv1.1 protocol. [all …]
|
| H A D | BIO_s_accept.pod | 49 on the underlying connection. If no connection is established 51 waits for an incoming connection. 56 connection on that chain is shutdown and the socket closed when 60 connection and reset the BIO into a state where it awaits another 61 incoming connection. 98 connection is received. This is useful if, for example, a 99 buffering or SSL BIO is required for each connection. The 124 connection, or request a retry in non blocking mode. 129 incoming connection before processing I/O calls. When an accept 133 When a connection is established a new socket BIO is created for [all …]
|
| H A D | SSL_set1_initial_peer_addr.pod | 5 SSL_set1_initial_peer_addr - set the initial peer address for a QUIC connection 16 for the purposes of establishing a QUIC connection in client mode. This function 17 can be used only on a QUIC connection SSL object, and can be used only before a 18 connection attempt is first made. I<addr> must point to a B<BIO_ADDR> 21 Where a QUIC connection object is provided with a write BIO which supports the 30 connection events, such as connection migration (where supported). 32 connection establishment, and does not confer any guarantee about the 34 connection lifecycle.
|
| H A D | BIO_s_connect.pod | 41 round the platform's TCP/IP socket connection routines. 48 on the underlying connection. If no connection is established 50 a connection is established first. 55 connection is shutdown and the socket closed when the BIO 59 connection and reset the BIO into a state where it can connect 95 should be made before the connection is established because 100 For non-SSL BIOs the connection is done typically at TCP level. 103 The function returns 1 if the connection was established successfully. 104 A zero or negative value is returned if the connection could not be established. 107 If a connection has already been established this call has no effect. [all …]
|
| H A D | SSL_key_update.pod | 10 - initiate and obtain information about updating connection keys 25 SSL_key_update() schedules an update of the keys for the current TLS connection. 27 the sending keys for this connection will be updated and the peer will be 29 B<SSL_KEY_UPDATE_REQUESTED> then the sending keys for this connection will be 38 SSL_read_ex() or SSL_write_ex() takes place on the connection. Alternatively 48 connection will result in an error. 51 handshake over an existing SSL/TLS connection. The next time an IO operation 52 such as SSL_read_ex() or SSL_write_ex() takes place on the connection a check 55 attempt to resume any session associated with the connection in the new 57 a "no_renegotiation" alert. An OpenSSL will immediately fail the connection in [all …]
|
| H A D | SSL_shutdown.pod | 5 SSL_shutdown, SSL_shutdown_ex - shut down a TLS/SSL or QUIC connection 24 SSL_shutdown() shuts down an active connection represented by an SSL object. I<ssl> B<MUST NOT> be … 46 connection; i.e., if L<SSL_get_error(3)> has returned B<SSL_ERROR_SYSCALL> or 67 These steps can occur in either order depending on whether the connection 77 Calling SSL_shutdown() only closes the write direction of the connection; the 80 until the peer decides to close the connection in turn. The peer might 84 SSL_shutdown() does not affect an underlying network connection such as a TCP 85 connection, which remains open. 144 (such that it returns 0) and then close the underlying connection without 153 connection. [all …]
|
| H A D | SSL_set_default_stream_mode.pod | 8 connection 22 A QUIC connection SSL object may have a default stream attached to it. A default 24 made on a QUIC connection SSL object are redirected. Default stream handling 26 connection. 29 connection once L<SSL_read(3)> or L<SSL_write(3)> is called. 35 L<SSL_write(3)>) after establishing a connection, OpenSSL will wait for the 46 When a QUIC connection SSL object has no default stream currently associated 48 functions which require a stream on the QUIC connection SSL object (for example, 56 handling. It can only be called on a QUIC connection SSL object prior to any 58 after calling L<SSL_new(3)>, prior to initiating a connection. The argument [all …]
|
| H A D | SSL_get_conn_close_info.pod | 28 - get information about why a QUIC connection was closed 76 QUIC connection was closed. 95 number which caused the connection to be closed. It may also be set to 0 if no 96 frame type was specified as causing the connection to be closed. If 102 the reason for connection closure. The length of the reason string in bytes is 113 If I<flags> has B<SSL_CONN_CLOSE_FLAG_LOCAL> set, connection closure was locally 120 If unset, connection closure was remotely triggered. 124 If I<flags> has B<SSL_CONN_CLOSE_FLAG_TRANSPORT> set, connection closure was 125 triggered for QUIC protocol reasons. Otherwise, connection closure was triggered 139 Some conditions which can cause QUIC connection termination are not signalled on [all …]
|
| H A D | SSL_set_shutdown.pod | 5 SSL_set_shutdown, SSL_get_shutdown - manipulate shutdown state of an SSL connection 23 The shutdown state of an ssl connection is a bit-mask of: 33 A close_notify shutdown alert was sent to the peer, the connection is being 45 The shutdown state of the connection is used to determine the state of 51 alert but to not wait for the peer's answer, when the underlying connection 67 on the actual connection state. 70 is called on a QUIC connection SSL object, it returns a value with 73 has been received from the peer or the QUIC connection is fully terminated
|
| /src/lib/libiscsiutil/ |
| H A D | libiscsiutil.h | 42 struct connection { struct 62 struct connection *pdu_connection; argument 72 void (*fail)(const struct connection *, const char *); 138 struct pdu *pdu_new(struct connection *ic); 148 void text_send_request(struct connection *conn, 150 struct keys * text_read_response(struct connection *conn); 151 struct keys * text_read_request(struct connection *conn, 156 void connection_init(struct connection *conn,
|
| /src/sys/contrib/device-tree/src/arm64/freescale/ |
| H A D | fsl-ls2088a-rdb.dts | 28 phy-connection-type = "10gbase-r"; 33 phy-connection-type = "10gbase-r"; 38 phy-connection-type = "10gbase-r"; 43 phy-connection-type = "10gbase-r"; 48 phy-connection-type = "10gbase-r"; 53 phy-connection-type = "10gbase-r"; 58 phy-connection-type = "10gbase-r"; 63 phy-connection-type = "10gbase-r";
|
| H A D | fsl-ls1088a-rdb.dts | 22 phy-connection-type = "10gbase-r"; 28 phy-connection-type = "qsgmii"; 35 phy-connection-type = "qsgmii"; 42 phy-connection-type = "qsgmii"; 49 phy-connection-type = "qsgmii"; 56 phy-connection-type = "qsgmii"; 63 phy-connection-type = "qsgmii"; 70 phy-connection-type = "qsgmii"; 77 phy-connection-type = "qsgmii";
|
| H A D | fsl-lx2160a-tqmlx2160a-mblx2160a_x_11_x.dtso | 13 phy-connection-type = "sgmii"; 19 phy-connection-type = "sgmii"; 25 phy-connection-type = "sgmii"; 31 phy-connection-type = "sgmii";
|
| /src/contrib/llvm-project/compiler-rt/lib/tsan/rtl/ |
| H A D | tsan_interceptors_mac.cpp | 294 xpc_connection_t connection, xpc_handler_t handler) { in TSAN_INTERCEPTOR() argument 295 SCOPED_TSAN_INTERCEPTOR(xpc_connection_set_event_handler, connection, in TSAN_INTERCEPTOR() 297 Release(thr, pc, (uptr)connection); in TSAN_INTERCEPTOR() 301 Acquire(thr, pc, (uptr)connection); in TSAN_INTERCEPTOR() 305 REAL(xpc_connection_set_event_handler)(connection, new_handler); in TSAN_INTERCEPTOR() 308 TSAN_INTERCEPTOR(void, xpc_connection_send_barrier, xpc_connection_t connection, in TSAN_INTERCEPTOR() argument 310 SCOPED_TSAN_INTERCEPTOR(xpc_connection_send_barrier, connection, barrier); in TSAN_INTERCEPTOR() 311 Release(thr, pc, (uptr)connection); in TSAN_INTERCEPTOR() 315 Acquire(thr, pc, (uptr)connection); in TSAN_INTERCEPTOR() 319 REAL(xpc_connection_send_barrier)(connection, new_barrier); in TSAN_INTERCEPTOR() [all …]
|
| /src/crypto/openssl/doc/man7/ |
| H A D | ossl-guide-libssl-introduction.pod | 25 An B<SSL> object is used to represent a connection to a remote peer. Once a 26 connection with a remote peer has been established data can be exchanged with 31 to arrive at all. In this case the B<SSL> object used for the connection is also 38 SSL/TLS only supports one stream of data per connection and it is always 39 bi-directional. In this case the B<SSL> object used for the connection also 43 The QUIC protocol can support multiple streams per connection and they can be 45 underlying connection, or a stream, or both. Where multiple streams are in use 50 connection. A single B<SSL_CTX> object can be used to create many connections 68 This structure is used to indicate the kind of connection you want to make, e.g. 75 After establishing a connection with a peer the agreed cryptographic material [all …]
|
| /src/contrib/sendmail/contrib/ |
| H A D | socketmapClient.pl | 11 my $connection = shift @ARGV; 16 if ($connection =~ /tcp:(.+):([0-9]*)/) { 22 } elsif ($connection =~ /((unix)|(local)):(.+)/) { 28 die "unrecognized connection specification $connection";
|
| /src/lib/libfetch/ |
| H A D | ftp.errors | 7 125 OK Data connection already open; transfer starting 8 150 OK File status okay; about to open data connection 17 221 OK Service closing control connection 18 225 OK Data connection open; no transfer in progress 28 421 DOWN Service not available, closing control connection 29 425 NETWORK Can't open data connection
|
| /src/contrib/ntp/sntp/libevent/ |
| H A D | evrpc.c | 504 static int evrpc_schedule_request(struct evhttp_connection *connection, 540 struct evhttp_connection *connection; in evrpc_pool_free() local 556 while ((connection = TAILQ_FIRST(&pool->connections)) != NULL) { in evrpc_pool_free() 557 TAILQ_REMOVE(&pool->connections, connection, next); in evrpc_pool_free() 558 evhttp_connection_free(connection); in evrpc_pool_free() 581 struct evhttp_connection *connection) in evrpc_pool_add_connection() argument 583 EVUTIL_ASSERT(connection->http_server == NULL); in evrpc_pool_add_connection() 584 TAILQ_INSERT_TAIL(&pool->connections, connection, next); in evrpc_pool_add_connection() 590 evhttp_connection_set_base(connection, pool->base); in evrpc_pool_add_connection() 596 if (!evutil_timerisset(&connection->timeout)) in evrpc_pool_add_connection() [all …]
|
| /src/contrib/libevent/ |
| H A D | evrpc.c | 504 static int evrpc_schedule_request(struct evhttp_connection *connection, 540 struct evhttp_connection *connection; in evrpc_pool_free() local 556 while ((connection = TAILQ_FIRST(&pool->connections)) != NULL) { in evrpc_pool_free() 557 TAILQ_REMOVE(&pool->connections, connection, next); in evrpc_pool_free() 558 evhttp_connection_free(connection); in evrpc_pool_free() 581 struct evhttp_connection *connection) in evrpc_pool_add_connection() argument 583 EVUTIL_ASSERT(connection->http_server == NULL); in evrpc_pool_add_connection() 584 TAILQ_INSERT_TAIL(&pool->connections, connection, next); in evrpc_pool_add_connection() 590 evhttp_connection_set_base(connection, pool->base); in evrpc_pool_add_connection() 596 if (!evutil_timerisset(&connection->timeout)) in evrpc_pool_add_connection() [all …]
|