/freebsd/cddl/usr.sbin/dwatch/libexec/ |
H A D | tcp | 17 tcp:::accept-established, \ 19 tcp:::connect-established, \ 26 : ${PROBE:=tcp:::accept-established, tcp:::accept-refused} ;; 29 tcp:::connect-established, \ 32 tcp-established) 33 : ${PROBE:=tcp:::accept-established, tcp:::connect-established} ;; 36 tcp:::accept-established, \ 38 tcp:::connect-established, \ 47 tcp:::accept-established, \ 49 tcp:::connect-established, \ [all …]
|
H A D | Makefile | 67 LINKS+= ${LIBEXECDIR}/dwatch/tcp ${LIBEXECDIR}/dwatch/tcp-accept-established 70 LINKS+= ${LIBEXECDIR}/dwatch/tcp ${LIBEXECDIR}/dwatch/tcp-connect-established 73 LINKS+= ${LIBEXECDIR}/dwatch/tcp ${LIBEXECDIR}/dwatch/tcp-established
|
/freebsd/cddl/contrib/opensolaris/cmd/dtrace/test/tst/common/ip/ |
H A D | tst.localtcpstate.ksh.out | 9 tcp:::state-change to established - yes 16 tcp:::connect-established - yes 17 tcp:::accept-established - yes
|
H A D | tst.remotetcpstate.ksh.out | 8 tcp:::state-change to established - yes 14 tcp:::connect-established - yes
|
H A D | tst.localtcpstate.ksh | 139 tcp:::connect-established 146 tcp:::accept-established
|
H A D | tst.remotesctpstate.ksh.out | 9 sctp:::state-change to established - yes
|
H A D | tst.localsctpstate.ksh.out | 9 sctp:::state-change to established - yes
|
/freebsd/tools/regression/kgssapi/ |
H A D | gsstest.c | 120 int established; in main() local 160 established = 0; in main() 161 while (!established) { in main() 198 established = 1; in main()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | BIO_s_connect.pod | 43 on the underlying connection. If no connection is established 45 a connection is established first. 90 should be made before the connection is established because 98 The function returns 1 if the connection was established successfully. 99 A zero or negative value is returned if the connection could not be established. 102 If a connection has already been established this call has no effect. 162 established and <=0 if the connection failed.
|
H A D | SSL_get_current_cipher.pod | 24 the description of the actually used cipher of a connection established with 37 on the connection established with the B<ssl> object, but is not yet in use. 48 no session has been established.
|
H A D | BIO_s_accept.pod | 48 on the underlying connection. If no connection is established 125 When a connection is established a new socket BIO is created for 143 established connection and B<accept> will now be a single BIO 206 fprintf(stderr, "Connection 1 established\n"); 219 fprintf(stderr, "Connection 2 established\n"); 227 BIO_puts(cbio, "Connection 1: Second connection established\n"); 229 /* Close the two established connections */
|
H A D | SSL_get_session.pod | 30 TLSv1.2. In TLSv1.3 the same is true, but sessions are established after the 33 connection is established (or never). Calling these functions on the client side 34 in TLSv1.3 before the session has been established will still return an 48 The new session callback is only invoked when a session is actually established,
|
H A D | SSL_CTX_flush_sessions.pod | 20 If enabled, the internal session cache will collect all sessions established 24 automatically whenever 255 new sessions were established (see
|
H A D | BIO_f_ssl.pod | 43 the SSLs read and write BIOs. If an SSL connection is not established 102 The function returns 1 if the connection was established successfully. 103 A zero or negative value is returned if the connection could not be established. 106 If a connection has already been established this call has no effect. 147 BIO_do_handshake() returns 1 if the connection was established successfully. 148 A zero or negative value is returned if the connection could not be established. 238 * By doing this when a new connection is established
|
H A D | SSL_CTX_sess_number.pod | 32 SSL_CTX_sess_connect_good() returns the number of successfully established 41 SSL_CTX_sess_accept_good() returns the number of successfully established
|
H A D | SSL_get_peer_cert_chain.pod | 30 after a session has been successfully established. If peer verification was 54 No certificate was presented by the peer or no connection was established
|
/freebsd/share/dtrace/ |
H A D | tcptrack | 35 tcp:kernel::accept-established 55 tcp:kernel::connect-established
|
/freebsd/sbin/pfctl/tests/files/ |
H A D | pf1002.in | 4 set timeout sctp.established 13
|
H A D | pf1002.ok | 4 set timeout sctp.established 13
|
H A D | pf0056.in | 1 pass in proto tcp from any to any port www keep state (tcp.established 60)
|
H A D | pf0056.ok | 1 pass in proto tcp from any to any port = http flags S/SA keep state (tcp.established 60)
|
H A D | pf0055.in | 2 set timeout { tcp.first 423, tcp.opening 123, tcp.established 43758 }
|
/freebsd/share/examples/kld/khelp/ |
H A D | README | 4 the connection is in the established state. The code is verbosely documented in
|
/freebsd/share/examples/ipfilter/rules/ |
H A D | example.10 | 2 # pass ack packets (ie established connection)
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | eap_server_tls.c | 23 int established; member 192 data->established = 1; in eap_tls_buildReq() 203 if (data->established && data->ssl.state != WAIT_FRAG_ACK) { in eap_tls_buildReq()
|