/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_CTX_sess_number.pod | 26 SSL_CTX_sess_number() returns the current number of sessions in the internal 33 SSL/TLS sessions in client mode. 42 SSL/TLS sessions in server mode. 47 SSL_CTX_sess_hits() returns the number of successfully reused sessions. 52 SSL_CTX_sess_cb_hits() returns the number of successfully retrieved sessions 55 SSL_CTX_sess_misses() returns the number of sessions proposed by clients 58 SSL_CTX_sess_timeouts() returns the number of sessions proposed by clients 60 but that were invalid due to timeout. These sessions are not included in 63 SSL_CTX_sess_cache_full() returns the number of sessions that were removed
|
H A D | SSL_CTX_set_session_cache_mode.pod | 23 The OpenSSL library can store/retrieve SSL/TLS sessions for later reuse. 24 The sessions can be held in memory for each B<ctx>, if more than one 25 SSL_CTX object is being maintained, the sessions are unique for each SSL_CTX 52 Client sessions are added to the session cache. As there is no reliable way 61 Server sessions are added to the session cache. When a client proposes a 73 Normally the session cache is checked for expired sessions every 84 automatically look up sessions in the internal cache, even if sessions are 93 sessions negotiated in an SSL/TLS handshake may be cached for possible reuse. 96 prevent sessions being stored in the internal cache (though the application can
|
H A D | SSL_CTX_flush_sessions.pod | 5 SSL_CTX_flush_sessions - remove expired sessions 16 B<ctx> to remove sessions expired at time B<tm>. 20 If enabled, the internal session cache will collect all sessions established 22 As sessions will not be reused ones they are expired, they should be 24 automatically whenever 255 new sessions were established (see 32 SSL_CTX_flush_sessions() will only check sessions stored in the internal
|
H A D | SSL_CTX_sess_set_cache_size.pod | 25 currently 1024*20, so that up to 20000 sessions can be held. This size 30 sessions are dropped from the end of the cache. 33 expired sessions. 35 If the size of the session cache is reduced and more sessions are already 38 expiration of sessions.
|
H A D | SSL_CTX_set_timeout.pod | 16 SSL_CTX_set_timeout() sets the timeout for newly created sessions for 28 Due to this realization, all sessions behave according to the timeout value 30 do not affect already established sessions. 35 Expired sessions are removed from the internal session cache, whenever
|
H A D | SSL_CTX_set_session_id_context.pod | 26 Sessions are generated within a certain context. When exporting/importing 27 sessions with B<i2d_SSL_SESSION>/B<d2i_SSL_SESSION> it would be possible, 31 the contexts and is stored in exported sessions. The B<sid_ctx> can be 50 certificates are used, stored sessions
|
/freebsd/contrib/netbsd-tests/ipf/expected/ |
H A D | f11 | 19 List of active sessions: 22 List of active state sessions: 55 List of active sessions: 58 List of active state sessions: 91 List of active sessions: 94 List of active state sessions: 127 List of active sessions: 130 List of active state sessions: 163 List of active sessions: 166 List of active state sessions: [all …]
|
H A D | n4 | 14 List of active sessions: 18 List of active state sessions: 45 List of active sessions: 49 List of active state sessions: 76 List of active sessions: 81 List of active state sessions: 108 List of active sessions: 112 List of active state sessions: 139 List of active sessions: 144 List of active state sessions: [all …]
|
H A D | n10 | 6 List of active sessions: 11 List of active state sessions: 30 List of active sessions: 35 List of active state sessions: 54 List of active sessions: 59 List of active state sessions:
|
H A D | n6 | 17 List of active sessions: 22 List of active state sessions: 52 List of active sessions: 57 List of active state sessions: 87 List of active sessions: 91 List of active state sessions: 121 List of active sessions: 126 List of active state sessions: 156 List of active sessions: 160 List of active state sessions:
|
H A D | n7 | 13 List of active sessions: 19 List of active state sessions: 45 List of active sessions: 51 List of active state sessions: 77 List of active sessions: 85 List of active state sessions:
|
H A D | n15 | 6 List of active sessions: 10 List of active state sessions: 29 List of active sessions: 34 List of active state sessions:
|
H A D | n15_6 | 6 List of active sessions: 10 List of active state sessions: 29 List of active sessions: 34 List of active state sessions:
|
H A D | n4_6 | 14 List of active sessions: 18 List of active state sessions: 45 List of active sessions: 49 List of active state sessions: 76 List of active sessions: 81 List of active state sessions: 108 List of active sessions: 112 List of active state sessions: 139 List of active sessions: 144 List of active state sessions: [all …]
|
H A D | n18 | 12 List of active sessions: 24 List of active state sessions: 49 List of active sessions: 61 List of active state sessions: 86 List of active sessions: 98 List of active state sessions:
|
H A D | n11 | 20 List of active sessions: 25 List of active state sessions: 58 List of active sessions: 66 List of active state sessions: 99 List of active sessions: 111 List of active state sessions:
|
/freebsd/usr.bin/iscsictl/ |
H A D | iscsictl.8 | 100 List sessions. 102 When adding, add all sessions defined in the configuration file. 103 When removing, remove all currently established sessions. 111 After discovery is done, sessions will be added for each discovered target, 115 This is ignored for discovery sessions, but gets passed down to normal 116 sessions they add. 140 seconds until all configured sessions are successfully established. 183 Perform discovery on 192.168.1.1, and add disabled sessions for each 189 Disconnect all iSCSI sessions:
|
/freebsd/share/man/man9/ |
H A D | crypto_session.9 | 55 cryptographic sessions. 56 Sessions hold state shared across multiple requests. 57 Active sessions are associated with a single cryptographic driver. 65 New sessions are created by 96 the framework will distribute sessions across these drivers in a round-robin 190 Sessions with this flag set permit requests with either a single buffer 193 Sessions without this flag only permit requests with a single buffer that 198 Sessions with this flag set permit requests with AAD passed in either in 200 Sessions without this flag only permit requests with AAD passed in as 206 Sessions with this flag set permit requests with IPsec ESN passed in special
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | SSL_CTX_sess_number.3 | 161 \&\fBSSL_CTX_sess_number()\fR returns the current number of sessions in the internal 168 \&\s-1SSL/TLS\s0 sessions in client mode. 177 \&\s-1SSL/TLS\s0 sessions in server mode. 182 \&\fBSSL_CTX_sess_hits()\fR returns the number of successfully reused sessions. 187 \&\fBSSL_CTX_sess_cb_hits()\fR returns the number of successfully retrieved sessions 190 \&\fBSSL_CTX_sess_misses()\fR returns the number of sessions proposed by clients 193 \&\fBSSL_CTX_sess_timeouts()\fR returns the number of sessions proposed by clients 195 but that were invalid due to timeout. These sessions are not included in 198 \&\fBSSL_CTX_sess_cache_full()\fR returns the number of sessions that were removed
|
H A D | SSL_CTX_set_session_cache_mode.3 | 157 The OpenSSL library can store/retrieve \s-1SSL/TLS\s0 sessions for later reuse. 158 The sessions can be held in memory for each \fBctx\fR, if more than one 159 \&\s-1SSL_CTX\s0 object is being maintained, the sessions are unique for each \s-1SSL_CTX\s0 182 Client sessions are added to the session cache. As there is no reliable way 190 Server sessions are added to the session cache. When a client proposes a 200 Normally the session cache is checked for expired sessions every 210 automatically look up sessions in the internal cache, even if sessions are 218 sessions negotiated in an \s-1SSL/TLS\s0 handshake may be cached for possible reuse. 221 prevent sessions being stored in the internal cache (though the application can
|
H A D | SSL_CTX_flush_sessions.3 | 140 SSL_CTX_flush_sessions \- remove expired sessions 151 \&\fBctx\fR to remove sessions expired at time \fBtm\fR. 154 If enabled, the internal session cache will collect all sessions established 156 As sessions will not be reused ones they are expired, they should be 158 automatically whenever 255 new sessions were established (see 166 \&\fBSSL_CTX_flush_sessions()\fR will only check sessions stored in the internal
|
H A D | SSL_CTX_sess_set_cache_size.3 | 159 currently 1024*20, so that up to 20000 sessions can be held. This size 164 sessions are dropped from the end of the cache. 167 expired sessions. 169 If the size of the session cache is reduced and more sessions are already 172 expiration of sessions.
|
/freebsd/usr.sbin/nscd/ |
H A D | cachelib.h | 50 /* multipart sessions can be used for reading and writing */ 104 size_t max_sessions; /* maximum number of active sessions */ 184 /* All opened write sessions */ 188 /* All opened read sessions */ 193 * completed_write_session is the committed write sessions. All read 194 * sessions use data from it. If the completed_write_session is out of 195 * date, but still in use by some of the read sessions, the newly 199 * the read sessions.
|
/freebsd/tools/tools/net80211/wesside/wesside/ |
H A D | aircrack-ptw-lib.h | 32 // How many sessions do we use to check if a guessed key is correct 71 // How many sessions for checking a guessed key have been collected 73 // The actual recovered sessions 74 PTW_session sessions[PTW_CONTROLSESSIONS]; member
|
/freebsd/usr.sbin/ac/ |
H A D | ac.8 | 61 .\" as the name of the device that local X sessions (ut_host of ":0.0") 64 .\" then these X sessions are ignored unless COMPAT_SUNOS was defined at 90 accounts with login sessions recorded in 141 .\" login sessions. Normally such entries are ignored except in the case
|