| /freebsd/cddl/usr.sbin/dwatch/libexec/ |
| H A D | tcp | 17 tcp:::accept-established, \ 19 tcp:::connect-established, \ 26 : ${PROBE:=tcp:::accept-established, tcp:::accept-refused} ;; 29 tcp:::connect-established, \ 32 tcp-established) 33 : ${PROBE:=tcp:::accept-established, tcp:::connect-established} ;; 36 tcp:::accept-established, \ 38 tcp:::connect-established, \ 47 tcp:::accept-established, \ 49 tcp:::connect-established, \ [all …]
|
| /freebsd/tests/sys/netpfil/pf/ |
| H A D | tcp.sh | 87 # Connection should be established now 89 -o match:"ESTABLISHED:ESTABLISHED" \ 96 # Connection should remain established 98 -o match:"ESTABLISHED:ESTABLISHED" \
|
| /freebsd/crypto/krb5/src/lib/rpc/ |
| H A D | auth_gss.c | 144 bool_t established; /* context established */ member 263 if (!gd || !gd->established) in authgss_get_private_data() 294 if (gd->established) in authgss_marshal() 327 gd->established = FALSE; in authgss_marshal() 355 if (gd->established == FALSE) { in authgss_validate() 356 /* would like to do this only on NULL rpc - gc->established is good enough. in authgss_validate() 386 gd->established = FALSE; in authgss_validate() 406 if (gd->established || gd->inprogress) in authgss_refresh() 499 gd->established = FALSE; in authgss_refresh() 504 gd->established = TRUE; in authgss_refresh() [all …]
|
| H A D | auth_gssapi.c | 62 bool_t established; member 193 AUTH_PRIVATE(auth)->established = FALSE; in auth_gssapi_create() 425 * Done! Context is established, we have client_handle and isn. in auth_gssapi_create() 427 AUTH_PRIVATE(auth)->established = TRUE; in auth_gssapi_create() 561 * context is established, the sealed sequence number is serialized as 562 * the verifier. If the context is not established, an empty verifier 577 if (AUTH_PRIVATE(auth)->established == TRUE) { in auth_gssapi_marshall() 599 PRINTF(("gssapi_marshall: not established, sending null verf\n")); in auth_gssapi_marshall() 627 if (AUTH_PRIVATE(auth)->established == FALSE) { in auth_gssapi_validate() 628 PRINTF(("gssapi_validate: not established, noop\n")); in auth_gssapi_validate() [all …]
|
| H A D | svc_auth_gssapi.c | 80 bool_t established; member 284 if (client_data->established == FALSE) { in gssrpc__svcauth_gssapi() 285 PRINTF(("svcauth_gssapi: context is not established\n")); in gssrpc__svcauth_gssapi() 295 * If the context is not established, then only GSSAPI_INIT in gssrpc__svcauth_gssapi() 480 PRINTF(("svcauth_gssapi: context established, isn %d\n", in gssrpc__svcauth_gssapi() 500 * If appropriate, set established to TRUE *after* sending in gssrpc__svcauth_gssapi() 506 client_data->established = TRUE; in gssrpc__svcauth_gssapi() 510 PRINTF(("svcauth_gssapi: context is established\n")); in gssrpc__svcauth_gssapi() 710 client_data->established = 0; in create_client() 1089 if (! SVCAUTH_PRIVATE(auth)->established) { in svc_auth_gssapi_wrap() [all …]
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | BIO_f_ssl.3 | 100 the SSLs read and write BIOs. If an SSL connection is not established 159 The function returns 1 if the connection was established successfully. 160 A zero or negative value is returned if the connection could not be established. 163 If a connection has already been established this call has no effect. 206 \&\fBBIO_do_handshake()\fR returns 1 if the connection was established successfully. 207 A zero or negative value is returned if the connection could not be established. 299 \& * By doing this when a new connection is established 334 \& BIO_puts(sbio, "\er\enConnection Established\er\enRequest headers:\er\en");
|
| H A D | BIO_s_connect.3 | 107 on the underlying connection. If no connection is established 109 a connection is established first. 154 should be made before the connection is established because 162 The function returns 1 if the connection was established successfully. 163 A zero or negative value is returned if the connection could not be established. 166 If a connection has already been established this call has no effect. 237 established and <=0 if the connection failed.
|
| H A D | BIO_s_accept.3 | 108 on the underlying connection. If no connection is established 191 When a connection is established a new socket BIO is created for 211 established connection and \fBaccept\fR will now be a single BIO 273 \& fprintf(stderr, "Connection 1 established\en"); 286 \& fprintf(stderr, "Connection 2 established\en"); 294 \& BIO_puts(cbio, "Connection 1: Second connection established\en"); 296 \& /* Close the two established connections */
|
| H A D | SSL_get_session.3 | 88 TLSv1.2. In TLSv1.3 the same is true, but sessions are established after the 91 connection is established (or never). Calling these functions on the client side 92 in TLSv1.3 before the session has been established will still return an 106 The new session callback is only invoked when a session is actually established,
|
| H A D | SSL_get_current_cipher.3 | 83 the description of the actually used cipher of a connection established with 96 on the connection established with the \fBssl\fR object, but is not yet in use. 106 no session has been established.
|
| /freebsd/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/ip/ |
| H A D | tst.localtcpstate.ksh.out | 9 tcp:::state-change to established - yes 16 tcp:::connect-established - yes 17 tcp:::accept-established - yes
|
| H A D | tst.localtcpstate.ksh | 139 tcp:::connect-established 146 tcp:::accept-established 164 printf("tcp:::state-change to established - %s\n", 178 printf("tcp:::connect-established - %s\n", 180 printf("tcp:::accept-established - %s\n",
|
| H A D | tst.remotetcpstate.ksh.out | 8 tcp:::state-change to established - yes 14 tcp:::connect-established - yes
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | BIO_s_connect.pod | 48 on the underlying connection. If no connection is established 50 a connection is established first. 95 should be made before the connection is established because 103 The function returns 1 if the connection was established successfully. 104 A zero or negative value is returned if the connection could not be established. 107 If a connection has already been established this call has no effect. 180 established and <=0 if the connection failed.
|
| H A D | BIO_f_ssl.pod | 43 the SSLs read and write BIOs. If an SSL connection is not established 102 The function returns 1 if the connection was established successfully. 103 A zero or negative value is returned if the connection could not be established. 106 If a connection has already been established this call has no effect. 151 BIO_do_handshake() returns 1 if the connection was established successfully. 152 A zero or negative value is returned if the connection could not be established. 242 * By doing this when a new connection is established 275 BIO_puts(sbio, "\r\nConnection Established\r\nRequest headers:\r\n");
|
| H A D | BIO_s_accept.pod | 49 on the underlying connection. If no connection is established 133 When a connection is established a new socket BIO is created for 151 established connection and B<accept> will now be a single BIO 214 fprintf(stderr, "Connection 1 established\n"); 227 fprintf(stderr, "Connection 2 established\n"); 235 BIO_puts(cbio, "Connection 1: Second connection established\n"); 237 /* Close the two established connections */
|
| H A D | SSL_get_session.pod | 30 TLSv1.2. In TLSv1.3 the same is true, but sessions are established after the 33 connection is established (or never). Calling these functions on the client side 34 in TLSv1.3 before the session has been established will still return an 48 The new session callback is only invoked when a session is actually established,
|
| H A D | SSL_get_current_cipher.pod | 24 the description of the actually used cipher of a connection established with 37 on the connection established with the B<ssl> object, but is not yet in use. 48 no session has been established.
|
| /freebsd/sys/netinet/ |
| H A D | tcp_fsm.h | 48 /* states < TCPS_ESTABLISHED are those where connections not established */ 49 #define TCPS_ESTABLISHED 4 /* established */ 76 TH_ACK, /* 4, ESTABLISHED */ 89 "ESTABLISHED", "CLOSE_WAIT", "FIN_WAIT_1", "CLOSING",
|
| /freebsd/share/man/man4/ |
| H A D | dtrace_tcp.4 | 34 .Fn tcp:::accept-established "pktinfo_t *" "csinfo_t *" "ipinfo_t *" \ 38 .Fn tcp:::connect-established "pktinfo_t *" "csinfo_t *" "ipinfo_t *" \ 80 .Fn tcp:::accept-established 82 At this point the new connection is in the ESTABLISHED state, and the probe 92 .Fn tcp:::connect-established , 100 .Fn tcp:::connect-established 104 SYN-SENT to ESTABLISHED.
|
| H A D | ctl.4 | 159 All above modes require established connection between HA cluster nodes. 161 state; if configured but not established -- Transitioning state. 172 configured but not established; 174 established.
|
| /freebsd/share/dtrace/ |
| H A D | tcptrack | 35 tcp:kernel::accept-established 55 tcp:kernel::connect-established 57 printf("Connection established to %s:%d from %s:%d\n",
|
| /freebsd/lib/libgssapi/ |
| H A D | gss_inquire_context.3 | 54 although the context need not be fully established. 63 If the context was established using anonymous authentication, 202 are available only if the context is fully established 222 Non-zero if the context is fully established;
|
| /freebsd/sys/ofed/drivers/infiniband/core/ |
| H A D | ib_iwcm.c | 101 * ACTIVE IDS: 4: CONNECT_REPLY, ESTABLISHED, DISCONNECT, CLOSE 102 * PASSIVE IDS: 3: ESTABLISHED, DISCONNECT, CLOSE 277 * - If we are ESTABLISHED, move to CLOSING and modify the QP state 527 * CM_ID <-- ESTABLISHED 529 * Accepts an inbound connection request and generates an ESTABLISHED 531 * until the ESTABLISHED event is received from the provider. 718 * Passive Side: CM_ID <-- ESTABLISHED 720 * The provider generated an ESTABLISHED event which means that 725 * remote peer closed, the ESTABLISHED event would be received followed 753 * Active Side: CM_ID <-- ESTABLISHED [all …]
|
| /freebsd/crypto/krb5/src/lib/gssapi/krb5/ |
| H A D | inq_context.c | 104 if (ctx->established) { in krb5_gss_inquire_context() 173 *opened = ctx->established; in krb5_gss_inquire_context() 176 if (ctx->established) in krb5_gss_inquire_context() 238 if (ctx->terminated || !ctx->established) { in gss_krb5int_inq_sspi_session_key() 257 if (ctx->terminated || !ctx->established) { in gss_krb5int_inq_odbc_session_key()
|