/freebsd/cddl/usr.sbin/dwatch/libexec/ |
H A D | tcp | 19 tcp:::connect-established, \ 20 tcp:::connect-refused, \ 21 tcp:::connect-request, \ 27 tcp-connect) 29 tcp:::connect-established, \ 30 tcp:::connect-refused, \ 31 tcp:::connect-request )} ;; 33 : ${PROBE:=tcp:::accept-established, tcp:::connect-established} ;; 38 tcp:::connect-established, \ 39 tcp:::connect-refused, \ [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | BIO_s_connect.3 | 70 BIO_do_connect \- connect BIO 99 \&\fBBIO_s_connect()\fR returns the connect BIO method. This is a wrapper 102 Using connect BIOs, TCP/IP connections can be made and data 106 Read and write operations on a connect BIO will perform I/O 111 Connect BIOs support \fBBIO_puts()\fR and \fBBIO_gets()\fR. 113 If the close flag is set on a connect BIO then any active 117 Calling \fBBIO_reset()\fR on a connect BIO will close any active 118 connection and reset the BIO into a state where it can connect 122 a single call: that is it creates a new connect BIO with hostname \fBname\fR. 139 \&\fBBIO_get_conn_hostname()\fR returns the hostname of the connect BIO or [all …]
|
H A D | OSSL_HTTP_transfer.3 | 79 \& int connect, int detail); 146 The HTTP client functions connect via the given proxy unless the \fIserver\fR 160 \&\fIbio_update_fn\fR is a BIO connect/disconnect callback function with prototype 163 \& BIO *(*OSSL_HTTP_bio_cb_t)(BIO *bio, void *arg, int connect, int detail) 170 callback function is invoked with the \fIconnect\fR argument being 1 and 172 On disconnect \fIconnect\fR is 0 and \fIdetail\fR is 1 if no error occurred, else 0. 173 For instance, on connect the callback may push an SSL BIO to implement HTTPS; 182 \& BIO *http_tls_cb(BIO *bio, void *arg, int connect, int detail) 184 \& if (connect && detail) { /* connecting with TLS */ 189 \& } else if (!connect) { /* disconnecting */ [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | BIO_s_connect.pod | 11 BIO_do_connect - connect BIO 40 BIO_s_connect() returns the connect BIO method. This is a wrapper 43 Using connect BIOs, TCP/IP connections can be made and data 47 Read and write operations on a connect BIO will perform I/O 52 Connect BIOs support BIO_puts() and BIO_gets(). 54 If the close flag is set on a connect BIO then any active 58 Calling BIO_reset() on a connect BIO will close any active 59 connection and reset the BIO into a state where it can connect 63 a single call: that is it creates a new connect BIO with hostname B<name>. 80 BIO_get_conn_hostname() returns the hostname of the connect BIO or [all …]
|
H A D | OSSL_HTTP_transfer.pod | 20 int connect, int detail); 87 The HTTP client functions connect via the given proxy unless the I<server> 101 I<bio_update_fn> is a BIO connect/disconnect callback function with prototype 103 BIO *(*OSSL_HTTP_bio_cb_t)(BIO *bio, void *arg, int connect, int detail) 109 callback function is invoked with the I<connect> argument being 1 and 111 On disconnect I<connect> is 0 and I<detail> is 1 if no error occurred, else 0. 112 For instance, on connect the callback may push an SSL BIO to implement HTTPS; 120 BIO *http_tls_cb(BIO *bio, void *arg, int connect, int detail) 122 if (connect && detail) { /* connecting with TLS */ 127 } else if (!connect) { /* disconnecting */ [all …]
|
/freebsd/crypto/openssh/regress/ |
H A D | README.regress | 67 connect.sh: simple connect 68 proxy-connect.sh: proxy connect 69 connect-privsep.sh: proxy connect with privsep 70 connect-uri.sh: uri connect 83 login-timeout.sh: connect after login grace timeout 84 agent.sh: simple connect via agent 103 ssh-com-client.sh: connect with ssh.com client 106 ssh-com.sh: connect to ssh.com server 107 reconfigure.sh: simple connect after reconfigure
|
H A D | connect.sh | 1 # $OpenBSD: connect.sh,v 1.8 2020/01/25 02:57:53 dtucker Exp $ 4 tid="simple connect" 8 trace "direct connect" 11 fail "ssh direct connect failed" 14 trace "proxy connect" 17 fail "ssh proxycommand connect failed"
|
H A D | reconfigure.sh | 4 tid="simple connect after reconfigure" 20 trace "connect before restart" 23 fail "ssh connect with failed before reconfigure" 39 trace "connect after restart" 42 fail "ssh connect with failed after reconfigure" 61 trace "connect after restart with active clients" 64 fail "ssh connect with failed after reconfigure"
|
H A D | cert-userkey.sh | 92 fail "ssh cert connect succeeded unexpectedly" 101 fail "ssh cert connect succeeded unexpectedly" 110 fail "ssh cert connect succeeded unexpectedly" 119 fail "ssh cert connect failed" 128 fail "ssh cert connect succeeded unexpectedly" 138 fail "ssh cert connect succeeded unexpectedly" 149 fail "ssh cert connect failed" 172 fail "ssh cert connect succeeded unexpectedly" 184 fail "ssh cert connect failed" 207 # Simple connect [all …]
|
H A D | principals-command.sh | 88 fail "ssh cert connect succeeded unexpectedly" 97 fail "ssh cert connect succeeded unexpectedly" 106 fail "ssh cert connect failed" 115 fail "ssh cert connect succeeded unexpectedly" 125 fail "ssh cert connect succeeded unexpectedly" 136 fail "ssh cert connect failed" 155 fail "ssh cert connect succeeded unexpectedly" 167 fail "ssh cert connect failed"
|
H A D | cert-hostkey.sh | 124 fail "ssh cert connect $_ident failed" 128 fail "ssh cert connect $_ident succeeded unexpectedly" 133 # Basic connect and revocation tests. 135 verbose "$tid: host ${ktype} cert connect" 143 attempt_connect "$ktype basic connect" "yes" 182 fail "ssh cert connect succeeded unexpectedly" 202 fail "ssh cert connect succeeded unexpectedly" 236 fail "ssh cert connect $ident failed unexpectedly" 240 fail "ssh cert connect $ident succeeded unexpectedly" 282 fail "ssh cert connect failed" [all …]
|
H A D | sshfp-connect.sh | 1 # $OpenBSD: sshfp-connect.sh,v 1.5 2025/03/11 11:46:44 dtucker Exp $ 25 tid="sshfp connect" 53 trace "sshfp connect $n good fingerprint" 60 fail "ssh sshfp connect failed" 66 trace "sshfp connect $n bad fingerprint" 69 fail "sshfp-connect succeeded with bad SSHFP record"
|
H A D | penalty.sh | 19 verbose "test connect" 20 ${SSH} -F $OBJ/ssh_config somehost true || fatal "basic connect failed" 26 ${SSH} -F $OBJ/ssh_config somehost true && fatal "noauth connect succeeded" 36 ${SSH} -F $OBJ/ssh_config somehost true && fatal "noauth connect succeeded" 45 ${SSH} -F $OBJ/ssh_config somehost true || fatal "basic connect failed"
|
/freebsd/etc/mail/ |
H A D | access.sample | 9 #Connect:sendmail.org RELAY 11 #Connect:128.32 RELAY 12 #Connect:128.32.2 SKIP 13 #Connect:IPv6:1:2:3:4:5:6:7 RELAY 14 #Connect:suspicious.example.com QUARANTINE:Mail from suspicious host 15 #Connect:[127.0.0.3] OK 16 #Connect:[IPv6:1:2:3:4:5:6:7:8] OK
|
/freebsd/lib/libsys/ |
H A D | connect.2 | 32 .Nm connect 39 .Fn connect "int s" "const struct sockaddr *name" "socklen_t namelen" 69 .Fn connect 71 .Fn connect 76 .Rv -std connect 79 .Fn connect 105 The attempt to connect was forcefully rejected. 134 An attempt is made to connect to a broadcast address (obtained through the 180 .Fn connect
|
/freebsd/usr.bin/chat/ |
H A D | chat.8 | 222 connect to the remote. 234 .D1 ABORT BUSY ABORT 'NO CARRIER' '' ATZ OK ATDT5551212 CONNECT 243 .Dv CONNECT . 245 .Dv CONNECT 282 .Pa /etc/ppp/connect-errors . 302 CONNECT '' 329 modem's connect string and return the value to the chat user. 344 .D1 REPORT CONNECT ABORT BUSY '' ATDT5551212 CONNECT '' ogin: account 349 .Dv CONNECT . 351 .Dv CONNECT [all …]
|
/freebsd/usr.sbin/ac/ |
H A D | ac.8 | 31 .Nd connect time accounting 51 examines these records and writes the accumulated connect time (in hours) 57 Display the connect times in 24 hour chunks. 79 Read connect time data from 89 displays the total connect time for all 103 No login or connect time accounting is performed if 109 connect time accounting file
|
/freebsd/lib/libc/gen/ |
H A D | getpeereid.3 | 54 .Xr connect 2 66 .Xr connect 2 ; 68 .Xr connect 2 74 .Xr connect 2 112 .Xr connect 2 124 .Xr connect 2 ,
|
/freebsd/tools/regression/sockets/unix_bindconnect/ |
H A D | unix_bindconnect.c | 40 * bind() and connect() on UNIX domain sockets. In particular, make sure 227 if (connect(sock1, (struct sockaddr *)&sun, sizeof(sun)) == 0) { in connect_test() 228 warnx("connect_test: connect(sun) #1 succeeded"); in connect_test() 233 warn("connect_test: connect(sun) #1"); in connect_test() 260 * Do a simple connect and make sure that works. in connect_test() 262 if (connect(sock2, (struct sockaddr *)&sun, sizeof(sun)) < 0) { in connect_test() 263 warn("connect(sun) #2"); in connect_test() 280 * connection refused (ECONNREFUSED) when attempting to connect to in connect_test() 283 if (connect(sock2, (struct sockaddr *)&sun, sizeof(sun)) == 0) { in connect_test() 284 warnx("connect(sun) #3 succeeded"); in connect_test() [all …]
|
/freebsd/crypto/openssh/ |
H A D | PROTOCOL.mux | 58 to connect to a master that speaks an unsupported protocol version. 127 string connect host 128 string connect port 169 string connect host 170 uint32 connect port 177 If connect port is (unsigned int) -2, then the connect host is treated 198 string connect host 199 uint32 connect port
|
/freebsd/usr.bin/clang/lldb-server/ |
H A D | lldb-server.1 | 60 connect to the server using \fIgdb\-remote\fP command. 65 Runs the platform server. LLDB can afterwards connect to the server using 66 \fIplatform select\fP, followed by \fIplatform connect\fP\&. 99 .B \-\-reverse\-connect 100 Connect to the client instead of passively waiting for a connection. In this 101 case, [host]:port denotes the remote address to connect to. 209 for the client to connect. 234 Use \fIgdb\-remote\fP command to connect to the server:
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | openssl-s_client.1 | 70 [\fB\-connect\fR \fIhost\fR:\fIport\fR] 282 .IP "\fB\-connect\fR \fIhost\fR:\fIport\fR" 4 283 .IX Item "-connect host:port" 284 This specifies the host and optional port to connect to. It is possible to 287 is made to connect to the local host on port 4433. 291 Host to connect to; use \fB\-connect\fR instead. 294 Connect to the specified port; use \fB\-connect\fR instead. 303 When used with the \fB\-connect\fR flag, the program uses the host and port 304 specified with this flag and issues an HTTP CONNECT command to connect 322 Connect over the specified Unix-domain socket. [all …]
|
/freebsd/lib/libcasper/services/cap_net/ |
H A D | cap_net.3 | 95 .Xr connect 2 , 138 CAPNET_CONNECT connect syscall is allowed 139 CAPNET_CONNECTDNS connect syscall is allowed to the values 182 to connect only on those specific structures. 225 casper service and uses it to resolve a host and connect to it. 277 err(1, "Unable to connect to host"); 282 .Xr connect 2 ,
|
/freebsd/share/examples/ipfilter/l4check/ |
H A D | l4check.conf | 9 connect timeout 1 10 connect frequency 20 23 # used for testing of connect timeoutes, read timeouts, success and things 24 # which don't connect.
|
/freebsd/tools/regression/sockets/listenclose/ |
H A D | listenclose.c | 48 * program will block and as such connect() will not return as accept() is 89 errx(-1, "socket(PF_INET, SOCK_STREAM, 0) for connect " in main() 94 errx(-1, "socket(PF_INET, SOCK_STREAM, 0) for connect socket" in main() 103 if (connect(connect_sock, (struct sockaddr *)&sin, sizeof(sin)) < 0) in main() 104 errx(-1, "connect() for connect socket: %s", strerror(errno)); in main()
|