Home
last modified time | relevance | path

Searched full:established (Results 1 – 25 of 633) sorted by relevance

12345678910>>...26

/freebsd/cddl/usr.sbin/dwatch/libexec/
H A Dtcp17 tcp:::accept-established, \
19 tcp:::connect-established, \
26 : ${PROBE:=tcp:::accept-established, tcp:::accept-refused} ;;
29 tcp:::connect-established, \
32 tcp-established)
33 : ${PROBE:=tcp:::accept-established, tcp:::connect-established} ;;
36 tcp:::accept-established, \
38 tcp:::connect-established, \
47 tcp:::accept-established, \
49 tcp:::connect-established, \
[all …]
/freebsd/tests/sys/netpfil/pf/
H A Dtcp.sh87 # Connection should be established now
89 -o match:"ESTABLISHED:ESTABLISHED" \
96 # Connection should remain established
98 -o match:"ESTABLISHED:ESTABLISHED" \
/freebsd/crypto/krb5/src/lib/rpc/
H A Dauth_gss.c144 bool_t established; /* context established */ member
263 if (!gd || !gd->established) in authgss_get_private_data()
294 if (gd->established) in authgss_marshal()
327 gd->established = FALSE; in authgss_marshal()
355 if (gd->established == FALSE) { in authgss_validate()
356 /* would like to do this only on NULL rpc - gc->established is good enough. in authgss_validate()
386 gd->established = FALSE; in authgss_validate()
406 if (gd->established || gd->inprogress) in authgss_refresh()
499 gd->established = FALSE; in authgss_refresh()
504 gd->established = TRUE; in authgss_refresh()
[all …]
H A Dauth_gssapi.c62 bool_t established; member
193 AUTH_PRIVATE(auth)->established = FALSE; in auth_gssapi_create()
425 * Done! Context is established, we have client_handle and isn. in auth_gssapi_create()
427 AUTH_PRIVATE(auth)->established = TRUE; in auth_gssapi_create()
561 * context is established, the sealed sequence number is serialized as
562 * the verifier. If the context is not established, an empty verifier
577 if (AUTH_PRIVATE(auth)->established == TRUE) { in auth_gssapi_marshall()
599 PRINTF(("gssapi_marshall: not established, sending null verf\n")); in auth_gssapi_marshall()
627 if (AUTH_PRIVATE(auth)->established == FALSE) { in auth_gssapi_validate()
628 PRINTF(("gssapi_validate: not established, noop\n")); in auth_gssapi_validate()
[all …]
H A Dsvc_auth_gssapi.c80 bool_t established; member
284 if (client_data->established == FALSE) { in gssrpc__svcauth_gssapi()
285 PRINTF(("svcauth_gssapi: context is not established\n")); in gssrpc__svcauth_gssapi()
295 * If the context is not established, then only GSSAPI_INIT in gssrpc__svcauth_gssapi()
480 PRINTF(("svcauth_gssapi: context established, isn %d\n", in gssrpc__svcauth_gssapi()
500 * If appropriate, set established to TRUE *after* sending in gssrpc__svcauth_gssapi()
506 client_data->established = TRUE; in gssrpc__svcauth_gssapi()
510 PRINTF(("svcauth_gssapi: context is established\n")); in gssrpc__svcauth_gssapi()
710 client_data->established = 0; in create_client()
1089 if (! SVCAUTH_PRIVATE(auth)->established) { in svc_auth_gssapi_wrap()
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DBIO_f_ssl.3100 the SSLs read and write BIOs. If an SSL connection is not established
159 The function returns 1 if the connection was established successfully.
160 A zero or negative value is returned if the connection could not be established.
163 If a connection has already been established this call has no effect.
206 \&\fBBIO_do_handshake()\fR returns 1 if the connection was established successfully.
207 A zero or negative value is returned if the connection could not be established.
299 \& * By doing this when a new connection is established
334 \& BIO_puts(sbio, "\er\enConnection Established\er\enRequest headers:\er\en");
H A DBIO_s_connect.3107 on the underlying connection. If no connection is established
109 a connection is established first.
154 should be made before the connection is established because
162 The function returns 1 if the connection was established successfully.
163 A zero or negative value is returned if the connection could not be established.
166 If a connection has already been established this call has no effect.
237 established and <=0 if the connection failed.
H A DBIO_s_accept.3108 on the underlying connection. If no connection is established
191 When a connection is established a new socket BIO is created for
211 established connection and \fBaccept\fR will now be a single BIO
273 \& fprintf(stderr, "Connection 1 established\en");
286 \& fprintf(stderr, "Connection 2 established\en");
294 \& BIO_puts(cbio, "Connection 1: Second connection established\en");
296 \& /* Close the two established connections */
H A DSSL_get_session.388 TLSv1.2. In TLSv1.3 the same is true, but sessions are established after the
91 connection is established (or never). Calling these functions on the client side
92 in TLSv1.3 before the session has been established will still return an
106 The new session callback is only invoked when a session is actually established,
H A DSSL_get_current_cipher.383 the description of the actually used cipher of a connection established with
96 on the connection established with the \fBssl\fR object, but is not yet in use.
106 no session has been established.
/freebsd/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/ip/
H A Dtst.localtcpstate.ksh.out9 tcp:::state-change to established - yes
16 tcp:::connect-established - yes
17 tcp:::accept-established - yes
H A Dtst.localtcpstate.ksh139 tcp:::connect-established
146 tcp:::accept-established
164 printf("tcp:::state-change to established - %s\n",
178 printf("tcp:::connect-established - %s\n",
180 printf("tcp:::accept-established - %s\n",
H A Dtst.remotetcpstate.ksh.out8 tcp:::state-change to established - yes
14 tcp:::connect-established - yes
/freebsd/crypto/openssl/doc/man3/
H A DBIO_s_connect.pod48 on the underlying connection. If no connection is established
50 a connection is established first.
95 should be made before the connection is established because
103 The function returns 1 if the connection was established successfully.
104 A zero or negative value is returned if the connection could not be established.
107 If a connection has already been established this call has no effect.
180 established and <=0 if the connection failed.
H A DBIO_f_ssl.pod43 the SSLs read and write BIOs. If an SSL connection is not established
102 The function returns 1 if the connection was established successfully.
103 A zero or negative value is returned if the connection could not be established.
106 If a connection has already been established this call has no effect.
151 BIO_do_handshake() returns 1 if the connection was established successfully.
152 A zero or negative value is returned if the connection could not be established.
242 * By doing this when a new connection is established
275 BIO_puts(sbio, "\r\nConnection Established\r\nRequest headers:\r\n");
H A DBIO_s_accept.pod49 on the underlying connection. If no connection is established
133 When a connection is established a new socket BIO is created for
151 established connection and B<accept> will now be a single BIO
214 fprintf(stderr, "Connection 1 established\n");
227 fprintf(stderr, "Connection 2 established\n");
235 BIO_puts(cbio, "Connection 1: Second connection established\n");
237 /* Close the two established connections */
H A DSSL_get_session.pod30 TLSv1.2. In TLSv1.3 the same is true, but sessions are established after the
33 connection is established (or never). Calling these functions on the client side
34 in TLSv1.3 before the session has been established will still return an
48 The new session callback is only invoked when a session is actually established,
H A DSSL_get_current_cipher.pod24 the description of the actually used cipher of a connection established with
37 on the connection established with the B<ssl> object, but is not yet in use.
48 no session has been established.
/freebsd/sys/netinet/
H A Dtcp_fsm.h48 /* states < TCPS_ESTABLISHED are those where connections not established */
49 #define TCPS_ESTABLISHED 4 /* established */
76 TH_ACK, /* 4, ESTABLISHED */
89 "ESTABLISHED", "CLOSE_WAIT", "FIN_WAIT_1", "CLOSING",
/freebsd/share/man/man4/
H A Ddtrace_tcp.434 .Fn tcp:::accept-established "pktinfo_t *" "csinfo_t *" "ipinfo_t *" \
38 .Fn tcp:::connect-established "pktinfo_t *" "csinfo_t *" "ipinfo_t *" \
80 .Fn tcp:::accept-established
82 At this point the new connection is in the ESTABLISHED state, and the probe
92 .Fn tcp:::connect-established ,
100 .Fn tcp:::connect-established
104 SYN-SENT to ESTABLISHED.
H A Dctl.4159 All above modes require established connection between HA cluster nodes.
161 state; if configured but not established -- Transitioning state.
172 configured but not established;
174 established.
/freebsd/share/dtrace/
H A Dtcptrack35 tcp:kernel::accept-established
55 tcp:kernel::connect-established
57 printf("Connection established to %s:%d from %s:%d\n",
/freebsd/lib/libgssapi/
H A Dgss_inquire_context.354 although the context need not be fully established.
63 If the context was established using anonymous authentication,
202 are available only if the context is fully established
222 Non-zero if the context is fully established;
/freebsd/sys/ofed/drivers/infiniband/core/
H A Dib_iwcm.c101 * ACTIVE IDS: 4: CONNECT_REPLY, ESTABLISHED, DISCONNECT, CLOSE
102 * PASSIVE IDS: 3: ESTABLISHED, DISCONNECT, CLOSE
277 * - If we are ESTABLISHED, move to CLOSING and modify the QP state
527 * CM_ID <-- ESTABLISHED
529 * Accepts an inbound connection request and generates an ESTABLISHED
531 * until the ESTABLISHED event is received from the provider.
718 * Passive Side: CM_ID <-- ESTABLISHED
720 * The provider generated an ESTABLISHED event which means that
725 * remote peer closed, the ESTABLISHED event would be received followed
753 * Active Side: CM_ID <-- ESTABLISHED
[all …]
/freebsd/crypto/krb5/src/lib/gssapi/krb5/
H A Dinq_context.c104 if (ctx->established) { in krb5_gss_inquire_context()
173 *opened = ctx->established; in krb5_gss_inquire_context()
176 if (ctx->established) in krb5_gss_inquire_context()
238 if (ctx->terminated || !ctx->established) { in gss_krb5int_inq_sspi_session_key()
257 if (ctx->terminated || !ctx->established) { in gss_krb5int_inq_odbc_session_key()

12345678910>>...26