| /openbsd-src/usr.sbin/iscsid/ |
| H A D | iscsid.h | 73 TAILQ_HEAD(connection_head, connection); 165 * S = session wide, C = connection only 167 struct connection_config connection; member 234 struct connection *conn; 268 struct connection { argument 272 TAILQ_ENTRY(connection) entry; 284 u_int16_t cid; /* connection id */ 292 void (*callback)(struct connection *, void *, struct pdu *); 341 void initiator_login(struct connection *); 343 void initiator_logout(struct session *, struct connection *, u_int8_ 264 struct connection { global() struct 267 wevconnection global() argument 269 hisconnection global() argument 270 activeconnection global() argument 271 configconnection global() argument 279 cidconnection global() argument [all...] |
| H A D | connection.c | 1 /* $OpenBSD: connection.c,v 1.25 2025/01/28 20:41:44 claudio Exp $ */ 42 int c_do_connect(struct connection *, enum c_event); 43 int c_do_login(struct connection *, enum c_event); 44 int c_do_loggedin(struct connection *, enum c_event); 45 int c_do_req_logout(struct connection *, enum c_event); 46 int c_do_logout(struct connection *, enum c_event); 47 int c_do_loggedout(struct connection *, enum c_event); 48 int c_do_fail(struct connection *, enum c_event); 49 int c_do_cleanup(struct connection *, enum c_event); 57 struct connection * in conn_new() [all...] |
| H A D | initiator.c | 40 struct connection *c; 47 struct connection *c; 51 int conn_is_leading(struct connection *); 52 struct kvp *initiator_login_kvp(struct connection *, u_int8_t); 53 struct pdu *initiator_login_build(struct connection *, 58 void initiator_login_cb(struct connection *, void *, struct pdu *); 59 void initiator_discovery_cb(struct connection *, void *, struct pdu *); 60 void initiator_logout_cb(struct connection *, void *, struct pdu *); 193 initiator_login(struct connection *c) in initiator_logout() 247 initiator_logout(struct session *s, struct connection * in initiator_nop_in_imm() [all...] |
| H A D | session.c | 52 struct connection *c; in session_find() 72 struct connection *c; in session_new() 118 struct connection *c, *rc = NULL; in session_shutdown() 137 /* XXX must open new connection, gulp */ in session_config() 145 struct connection *c; in session_config() 152 /* wake up a idle connection or a not busy one */ in session_task_issue() 163 * The session FSM runs from a callback so that the connection FSM can finish. in session_logout_issue() 238 log_debug("new connection to %s", 239 log_sockaddr(&s->config.connection.TargetAddr)); 250 conn_new(s, &s->config.connection); in session_fsm_callback() [all...] |
| H A D | vscsi.c | 50 void vscsi_callback(struct connection *, void *, struct pdu *); 52 void vscsi_dataout(struct connection *, struct scsi_task *, u_int32_t, 121 struct connection *c; in vscsi_dispatch() 208 vscsi_callback(struct connection *c, void *arg, struct pdu *p) in vscsi_callback() 295 vscsi_dataout(struct connection *c, struct scsi_task *t, u_int32_t ttt, in vscsi_dataout()
|
| H A D | task.c | 42 void (*c)(struct connection *, void *, struct pdu *), in task_init() argument 96 task_pdu_cb(struct connection *c, struct pdu *p) in task_pdu_cb()
|
| H A D | pdu.c | 256 pdu_read(struct connection *c) in pdu_read() 289 pdu_write(struct connection *c) in pdu_write() 353 pdu_pending(struct connection *c) in pdu_parse() 362 pdu_parse(struct connection *c) in pdu_parse()
|
| /openbsd-src/sys/dev/pci/drm/amd/display/modules/hdcp/ |
| H A D | hdcp.c | 31 struct mod_hdcp_trace *trace = &hdcp->connection.trace; in push_error_status() 41 hdcp->connection.hdcp1_retry_count++; in push_error_status() 42 if (hdcp->connection.hdcp1_retry_count == MAX_NUM_OF_ATTEMPTS) in push_error_status() 43 hdcp->connection.link.adjust.hdcp1.disable = 1; in push_error_status() 45 hdcp->connection.hdcp2_retry_count++; in push_error_status() 46 if (hdcp->connection.hdcp2_retry_count == MAX_NUM_OF_ATTEMPTS) in push_error_status() 47 hdcp->connection.link.adjust.hdcp2.disable = 1; in push_error_status() 67 !hdcp->connection.link.adjust.hdcp1.disable && in is_cp_desired_hdcp1() 68 !hdcp->connection.is_hdcp1_revoked; in is_cp_desired_hdcp1() 87 !hdcp->connection.link.adjust.hdcp2.disable && in is_cp_desired_hdcp2() [all …]
|
| H A D | hdcp1_transition.c | 34 struct mod_hdcp_connection *conn = &hdcp->connection; in mod_hdcp_hdcp1_transition() 35 struct mod_hdcp_link_adjustment *adjust = &hdcp->connection.link.adjust; in mod_hdcp_hdcp1_transition() 157 struct mod_hdcp_connection *conn = &hdcp->connection; in mod_hdcp_hdcp1_dp_transition() 158 struct mod_hdcp_link_adjustment *adjust = &hdcp->connection.link.adjust; in mod_hdcp_hdcp1_dp_transition() 212 !hdcp->connection.is_hdcp1_revoked) { in mod_hdcp_hdcp1_dp_transition() 296 !hdcp->connection.is_hdcp1_revoked) { in mod_hdcp_hdcp1_dp_transition()
|
| H A D | hdcp_psp.c | 127 struct mod_hdcp_link *link = &hdcp->connection.link; in add_display_to_topology_v2() 174 struct mod_hdcp_link *link = &hdcp->connection.link; in add_display_to_topology_v3() 349 hdcp->connection.is_repeater = 1; in mod_hdcp_hdcp1_validate_rx() 352 hdcp->connection.is_repeater = 0; in mod_hdcp_hdcp1_validate_rx() 355 hdcp->connection.is_hdcp1_revoked = 1; in mod_hdcp_hdcp1_validate_rx() 422 hdcp->connection.is_hdcp1_revoked = 1; in mod_hdcp_hdcp1_validate_ksvlist_vp() 521 if (hdcp->connection.link.adjust.hdcp2.force_type == MOD_HDCP_FORCE_TYPE_0) in mod_hdcp_hdcp2_create_session() 524 else if (hdcp->connection.link.adjust.hdcp2.force_type == MOD_HDCP_FORCE_TYPE_1) in mod_hdcp_hdcp2_create_session() 527 else if (hdcp->connection.link.adjust.hdcp2.force_type == MOD_HDCP_FORCE_TYPE_MAX) in mod_hdcp_hdcp2_create_session() 653 hdcp->connection.is_km_stored = in mod_hdcp_hdcp2_validate_ake_cert() [all …]
|
| H A D | hdcp.h | 202 struct mod_hdcp_connection connection; member 393 return (hdcp->connection.link.mode == MOD_HDCP_MODE_DP); in is_dp_hdcp() 398 return (hdcp->connection.link.mode == MOD_HDCP_MODE_DP && in is_dp_mst_hdcp() 399 hdcp->connection.link.dp.mst_enabled); in is_dp_mst_hdcp() 404 return (hdcp->connection.link.mode == MOD_HDCP_MODE_DEFAULT); in is_hdmi_dvi_sl_hdcp() 580 hdcp->connection.hdcp1_retry_count = 0; in reset_retry_counts() 581 hdcp->connection.hdcp2_retry_count = 0; in reset_retry_counts()
|
| H A D | hdcp2_transition.c | 34 struct mod_hdcp_connection *conn = &hdcp->connection; in mod_hdcp_hdcp2_transition() 35 struct mod_hdcp_link_adjustment *adjust = &hdcp->connection.link.adjust; in mod_hdcp_hdcp2_transition() 375 struct mod_hdcp_connection *conn = &hdcp->connection; in mod_hdcp_hdcp2_dp_transition() 376 struct mod_hdcp_link_adjustment *adjust = &hdcp->connection.link.adjust; in mod_hdcp_hdcp2_dp_transition() 570 if (hdcp->connection.hdcp2_retry_count >= 1) in mod_hdcp_hdcp2_dp_transition()
|
| /openbsd-src/gnu/llvm/compiler-rt/lib/tsan/rtl/ |
| H A D | tsan_interceptors_mac.cpp | 293 xpc_connection_t connection, xpc_handler_t handler) { in TSAN_INTERCEPTOR() argument 294 SCOPED_TSAN_INTERCEPTOR(xpc_connection_set_event_handler, connection, in TSAN_INTERCEPTOR() 296 Release(thr, pc, (uptr)connection); in TSAN_INTERCEPTOR() 300 Acquire(thr, pc, (uptr)connection); in TSAN_INTERCEPTOR() 304 REAL(xpc_connection_set_event_handler)(connection, new_handler); in TSAN_INTERCEPTOR() 307 TSAN_INTERCEPTOR(void, xpc_connection_send_barrier, xpc_connection_t connection, in TSAN_INTERCEPTOR() argument 309 SCOPED_TSAN_INTERCEPTOR(xpc_connection_send_barrier, connection, barrier); in TSAN_INTERCEPTOR() 310 Release(thr, pc, (uptr)connection); in TSAN_INTERCEPTOR() 314 Acquire(thr, pc, (uptr)connection); in TSAN_INTERCEPTOR() 318 REAL(xpc_connection_send_barrier)(connection, new_barrier); in TSAN_INTERCEPTOR() [all …]
|
| /openbsd-src/sbin/isakmpd/ |
| H A D | connection.c | 57 struct connection { struct 58 TAILQ_ENTRY(connection) link; 77 TAILQ_HEAD(connection_head, connection) connections; argument 147 struct connection *conn = vconn; in connection_checker() 169 static struct connection * 172 struct connection *conn; in connection_lookup() 273 struct connection *conn = 0; in connection_setup() 374 struct connection *conn; in connection_teardown() 406 struct connection *conn; in connection_report() 431 struct connection *conn, *next; in connection_reinit()
|
| /openbsd-src/regress/usr.sbin/syslogd/ |
| H A D | args-server-tcp-reconnect.pl | 29 qr/syslogd\[\d+\]: (connect .*|.*connection error): $errors/ => 1, 47 qr/syslogd\[\d+\]: (connect .*|.*connection error): $errors/ => 1, 53 qr/syslogd\[\d+\]: (connect .*|.*connection error): $errors/ => 1,
|
| /openbsd-src/usr.bin/ssh/ |
| H A D | PROTOCOL.mux | 2 ControlMaster connection-sharing. 36 this mode, the mux client/server connection socket will stop speaking 37 the multiplexing protocol and start proxying SSH connection protocol 40 to access basically the full suite of connection protocol features. 41 Moreover, as no file descriptor passing is required, the connection 47 When a multiplexing connection is made to a ssh(1) operating as a 109 non-multiplexed ssh(1) connection. Two additional cases that the 217 A client may request that the control connection be placed in proxy 229 And go into proxy mode. All subsequent data over the connection will 237 The mux master will accept most connection messages and global requests,
|
| H A D | PROTOCOL.agent | 8 This extension allows a ssh client to bind an agent connection to a 28 exchange. 'is_forwarding' is a flag indicating whether this connection 33 a duplicate session identifier, or any attempt to bind a connection 35 binding for the life of the connection for use later in testing per-key 74 the agent connection over which they were received.
|
| H A D | PROTOCOL | 155 a) During initial KEX, terminate the connection if out-of-sequence 157 received. This includes terminating the connection if the first 160 valid at any time during the connection such as SSH2_MSG_DEBUG, 164 duration of the connection (i.e. not just the first 188 2.1. connection: Channel write close extension "eow@openssh.com" 190 The SSH connection protocol (rfc4254) provides the SSH_MSG_CHANNEL_EOF 227 2.2. connection: disallow additional sessions extension 236 (i.e. it has been started with connection multiplexing disabled), it 245 connection. 255 2.3. connection: Tunnel forward extension "tun@openssh.com" [all …]
|
| /openbsd-src/gnu/llvm/llvm/utils/bugpoint/ |
| H A D | RemoteRunSafely.sh | 92 connection=$RUSER'@'$RHOST 96 $RCLIENT $connection $RPORT \
|
| /openbsd-src/regress/sys/net/pf_divert/ |
| H A D | README | 10 connected datagram sockets. Over the TCP connection messages are 19 address of the remote machine. For TCP the bidirectional connection, 27 it also listens and accepts. For TCP the bidirectional connection, 50 the connection in TIME_WAIT is dropped to remove the state.
|
| /openbsd-src/gnu/llvm/lldb/source/Core/ |
| H A D | Communication.cpp | 141 void Communication::SetConnection(std::unique_ptr<Connection> connection) { in SetConnection() argument 143 m_connection_sp = std::move(connection); in SetConnection()
|
| /openbsd-src/gnu/llvm/lldb/tools/lldb-server/ |
| H A D | LLGSOptions.td | 14 def grp_connect : OptionGroup<"connection">, HelpText<"CONNECTION">; 29 …HelpText<"Connect to the client instead of passively waiting for a connection. In this case [host]…
|
| /openbsd-src/gnu/usr.bin/perl/dist/Net-Ping/t/ |
| H A D | 200_ping_tcp.t | 28 # connection to remote networks, but you still want the tests 81 skip "Cannot ping google.com: no TCP connection or firewall", 6;
|
| /openbsd-src/usr.sbin/iscsictl/ |
| H A D | iscsictl.c | 180 bcopy(&res->addr, &sc.connection.TargetAddr, res->addr.ss_len); in main() 364 log_sockaddr(&sc->connection.TargetAddr)); in show_config() 368 log_sockaddr(&sc->connection.LocalAddr)); in show_config()
|
| /openbsd-src/gnu/usr.bin/perl/cpan/HTTP-Tiny/corpus/ |
| H A D | get-20.txt | 4 connection: X-Foo
|