/dragonfly/lib/libc/net/ |
H A D | nscachedcli.c | 242 assert(connection != NULL); in __close_cached_connection() 244 _close(connection->sockfd); in __close_cached_connection() 245 _close(connection->read_queue); in __close_cached_connection() 247 free(connection); in __close_cached_connection() 314 assert(connection != NULL); in __cached_read() 387 if (connection == NULL) in __open_cached_mp_write_session() 389 connection->mp_flag = 1; in __open_cached_mp_write_session() 415 retval = connection; in __open_cached_mp_write_session() 495 if (connection == NULL) in __open_cached_mp_read_session() 497 connection->mp_flag = 1; in __open_cached_mp_read_session() [all …]
|
H A D | nscache.c | 57 cached_connection connection; in __nss_common_cache_read() local 109 if (connection == NULL) { in __nss_common_cache_read() 116 __close_cached_connection(connection); in __nss_common_cache_read() 161 cached_connection connection; in __nss_common_cache_write() local 180 connection = __open_cached_connection(¶ms); in __nss_common_cache_write() 181 if (connection == NULL) { in __nss_common_cache_write() 210 __close_cached_connection(connection); in __nss_common_cache_write() 218 __close_cached_connection(connection); in __nss_common_cache_write() 230 cached_connection connection; in __nss_common_cache_write_negative() local 246 if (connection == NULL) { in __nss_common_cache_write_negative() [all …]
|
/dragonfly/sys/netgraph/ |
H A D | ng_device.c | 347 connection = tmp; in ng_device_rcvdata() 350 if(connection == NULL) { in ng_device_rcvdata() 372 memcpy(connection->readq+connection->loc, buffer, m->m_len); in ng_device_rcvdata() 398 connection = tmp; in ng_device_disconnect() 401 if(connection == NULL) { in ng_device_disconnect() 466 connection = tmp; in ngdioctl() 469 if(connection == NULL) { in ngdioctl() 520 connection = tmp; in ngdread() 532 memcpy(connection->readq, connection->readq+amnt, in ngdread() 574 connection = tmp; in ngdwrite() [all …]
|
/dragonfly/usr.sbin/nscd/ |
H A D | nscdcli.c | 72 s_result = write(connection->sockfd, data + result, in safe_write() 108 s_result = read(connection->sockfd, data + result, in safe_read() 227 close_nscd_connection__(struct nscd_connection_ *connection) in close_nscd_connection__() argument 231 assert(connection != NULL); in close_nscd_connection__() 233 close(connection->sockfd); in close_nscd_connection__() 234 close(connection->read_queue); in close_nscd_connection__() 235 close(connection->write_queue); in close_nscd_connection__() 236 free(connection); in close_nscd_connection__() 241 nscd_transform__(struct nscd_connection_ *connection, in nscd_transform__() argument 270 result = safe_write(connection, entry_name, name_size); in nscd_transform__() [all …]
|
H A D | nscd.c | 671 nscd_connection connection; in main() local 693 connection = open_nscd_connection__(&connection_params); in main() 694 if (connection == INVALID_NSCD_CONNECTION) in main() 698 result = nscd_transform__(connection, in main() 714 result = nscd_transform__(connection, in main() 726 close_nscd_connection__(connection); in main()
|
/dragonfly/lib/libftpio/ |
H A D | ftp.errors | 9 125 Data connection already open; transfer starting 10 150 File status okay; about to open data connection 19 221 Service closing control connection 20 225 Data connection open; no transfer in progress 30 421 Service not available, closing control connection 31 425 Can't open data connection
|
/dragonfly/lib/libfetch/ |
H A D | ftp.errors | 8 125 OK Data connection already open; transfer starting 9 150 OK File status okay; about to open data connection 18 221 OK Service closing control connection 19 225 OK Data connection open; no transfer in progress 29 421 DOWN Service not available, closing control connection 30 425 NETWORK Can't open data connection
|
/dragonfly/crypto/openssh/ |
H A D | PROTOCOL.mux | 2 ControlMaster connection-sharing. 36 this mode, the mux client/server connection socket will stop speaking 37 the multiplexing protocol and start proxying SSH connection protocol 40 to access basically the full suite of connection protocol features. 41 Moreover, as no file descriptor passing is required, the connection 47 When a multiplexing connection is made to a ssh(1) operating as a 109 non-multiplexed ssh(1) connection. Two additional cases that the 219 A client may request that the control connection be placed in proxy 231 And go into proxy mode. All subsequent data over the connection will 239 The mux master will accept most connection messages and global requests,
|
H A D | PROTOCOL.agent | 8 This extension allows a ssh client to bind an agent connection to a 28 exchange. 'is_forwarding' is a flag indicating whether this connection 33 a duplicate session identifier, or any attempt to bind a connection 35 binding for the life of the connection for use later in testing per-key 71 the agent connection over which they were received.
|
H A D | README.tun | 91 Forwarded ssh connection : | dmzgw | 98 --- real connection Bridge -> | +----------+ 99 ... "virtual connection" [ X ]--------| somehost | 111 the connection has been successfully established:
|
H A D | PROTOCOL | 109 2.1. connection: Channel write close extension "eow@openssh.com" 111 The SSH connection protocol (rfc4254) provides the SSH_MSG_CHANNEL_EOF 148 2.2. connection: disallow additional sessions extension 157 (i.e. it has been started with connection multiplexing disabled), it 166 connection. 176 2.3. connection: Tunnel forward extension "tun@openssh.com" 237 2.4. connection: Unix domain socket forwarding 340 2.6. connection: SIGINFO support for "signal" channel request 357 string "ssh-connection" 523 the connection immediately. [all …]
|
/dragonfly/contrib/smbfs/ |
H A D | HISTORY | 68 - Now connection will be restored properly under -stable. 70 connection after some time of idleing. smbfs will restore connection on 125 - More bug fixes in the connection handling mechanism. 130 'login' - create permanent connection to remote host
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/dbus/ |
H A D | dbus_new_helpers.c | 374 static DBusHandlerResult message_handler(DBusConnection *connection, in message_handler() argument 419 dbus_connection_send(connection, reply, NULL); in message_handler() 423 wpa_dbus_flush_all_changed_properties(connection); in message_handler() 452 static void free_dbus_object_desc_cb(DBusConnection *connection, void *obj_dsc) in free_dbus_object_desc_cb() argument 481 obj_desc->connection = iface->con; in wpa_dbus_ctrl_iface_init() 546 obj_desc->connection = con; in wpa_dbus_register_object_per_iface()
|
H A D | dbus_new_helpers.h | 28 DBusConnection *connection; member
|
/dragonfly/usr.sbin/ppp/ |
H A D | ppp.8.m4 | 195 the status of connection and close the connection. 218 connection. 222 connection. 391 IPv4 connection. 672 a peer connection. 1122 a connection is made. 1141 connection but not the 2777 connection. 3409 allow a particular connection (and only that connection) to go through 3448 IRC connection. [all …]
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | README-WPS | 196 suggest possible WPS connection to the user. 234 can be either over a wired or wireless connection). 322 authenticate the connection instead of the PIN. In addition, an NFC tag 369 WPS carrier record for a Handover Request Message for connection 371 the second argument selects which type of connection handover is 375 build the contents of a Handover Select Message for connection handover 378 the second argument selects which type of connection handover is 386 reporting completed NFC connection handover. The first parameter 388 connection handover and the carrier records are the selected carrier
|
H A D | README-HS20 | 45 selection automatically whenever trying to find a network for connection 254 # limit would prevent any connection. Values are in kilobits per second. 264 # BSS Load or if the limit would prevent any connection, this constraint 267 # req_conn_capab: Required connection capability 273 # network connection. This policy is not used in home networks. 493 The connection status can be shown with the status command: 588 link-layer protected Hotspot 2.0 online signup connection with 606 Hotspot 2.0 connection with external network selection 612 Hotspot 2.0 connection (e.g., with SET, ADD_NETWORK, SET_NETWORK, and
|
/dragonfly/share/examples/ppp/ |
H A D | ppp.conf.span-isp | 29 # The connection is implemented so that any ISP connection can go down 40 # to accept a multilink ppp connection over UDP, assigning a routable IP 141 # ensure that these UDP packets use the correct ISP connection.
|
/dragonfly/usr.sbin/installer/libdfui/ |
H A D | Makefile | 2 SRCS= conn_npipe.c conn_tcp.c connection.c decode.c \
|
/dragonfly/initrd/etc/ |
H A D | motd | 12 * Wired connection and DHCP:
|
/dragonfly/contrib/tnftp/ |
H A D | NEWS | 8 hostile server could cause ftp to open a data connection elsewhere. 15 Set SO_KEEPALIVE on control connection to attempt to avoid timeouts.
|
/dragonfly/test/stress/stress2/misc/ |
H A D | libMicro.sh | 70 ps | grep bin/connection | grep -v grep | awk '{print $1}' | xargs kill # hack
|
/dragonfly/games/hunt/ |
H A D | README.protocol | 94 The statistics port accepts a TCP connection, and keeps 105 connection. 115 Initial connection 224 The client and server must immediately close the connection.
|
/dragonfly/lib/libdmsg/ |
H A D | TODO | 6 link (a tcp connection in this case) can modify it and then use it as
|
/dragonfly/sys/netgraph7/ |
H A D | ng_device.c | 375 struct ngd_connection * connection = NULL; 394 NG_SEND_MSG_HOOK(error, sc->node, msg, connection->active_hook, 0);
|