Searched refs:connection (Results 151 - 161 of 161) sorted by relevance
1234567
/netbsd-current/sys/arch/arm/broadcom/ |
H A D | bcm2835_vcaudio.c | 300 .connection = &sc->sc_connection,
|
/netbsd-current/external/gpl3/gdb/dist/gdb/ |
H A D | Makefile.in | 399 python/py-connection.c \ 474 unittests/parse-connection-spec-selftests.c \ 1187 target-connection.c \
|
/netbsd-current/sys/external/bsd/drm2/dist/drm/ |
H A D | drm_connector.c | 385 * direct assignment of connector->encoder = encoder. This connection 2243 out_resp->connection = connector->status;
|
/netbsd-current/external/apache2/mDNSResponder/dist/mDNSCore/ |
H A D | uDNS.c | 952 // Even if we DIDN'T make a successful UPnP mapping yet, we might still have a partially-open TCP connection we need to clean up 1032 // we're requesting that packets be sent to ExternalPort, but at the source address of our outgoing TCP connection. 1033 // Normally, after going through the NAT gateway, the source address of our outgoing TCP connection is the same as ExternalAddress, 1034 // so this is fine, except when the TCP connection ends up going over a VPN tunnel instead. 1035 // To work around this, if we find that the source address for our TCP connection is not a private address, we tell the Dot Mac 1262 // tcpCallback is called to handle events (e.g. connection opening and data reception) on TCP connections for 1293 // connection is established - send the message 1296 // Lease renewal over TCP, resulting from opening a TCP connection in sendLLQRefresh 1316 q->ntries = 0; // Reset ntries so that tcp/tls connection failures don't affect sendChallengeResponse failures 1348 if (q->ThisQInterval < (256 * mDNSPlatformOneSecond)) // Now we have a TCP connection ope [all...] |
H A D | mDNSEmbeddedAPI.h | 375 // tcp connection status 1240 LNTOp_t op; // operation performed using this connection 1278 tcpLNTInfo tcpInfo; // Legacy NAT traversal (UPnP) TCP connection 1996 // the number of TCP/TLS connection attempts for this LLQ state, or 1997 // the number of packets sent for this TCP/TLS connection 2282 tcpInfo_t *connection; // TCP Connection pointer member in struct:mDNS_DNSPushNotificationServer 2455 tcpLNTInfo tcpAddrInfo; // legacy NAT traversal TCP connection info for external address 2456 tcpLNTInfo tcpDeviceInfo; // legacy NAT traversal TCP connection info for device info 3172 // mDNSPlatformTCPConnect initiates a TCP connection with a peer, adding the socket descriptor to the 3173 // main event loop. The return value indicates whether the connection succeede [all...] |
/netbsd-current/external/apache2/mDNSResponder/dist/Clients/ |
H A D | dnssdutil.c | 207 { kCLIOptionType_String, 0, "connection", &gConnectionOpt, NULL, (intptr_t) kConnectionArg_Normal, "type", \ 209 "Specifies the type of main connection to use. See " kConnectionSection_Name " below.", NULL } 213 "The default behavior is to create a main connection with DNSServiceCreateConnection() and perform operations on\n" \ 214 "the main connection using the kDNSServiceFlagsShareConnection flag. This behavior can be explicitly invoked by\n" \ 215 "specifying the connection option without an argument, i.e.,\n" \ 217 " --connection\n" \ 219 "To instead use a delegate connection created with DNSServiceCreateDelegateConnection(), use\n" \ 221 " --connection=pid:<PID>\n" \ 225 " --connection=uuid:<UUID>\n" \ 229 "To not use a main connection a 3114 AsyncConnectionRef connection; member in struct:BrowseIPAddr [all...] |
/netbsd-current/external/gpl3/gdb.old/dist/gdb/ |
H A D | Makefile.in | 448 unittests/parse-connection-spec-selftests.c \ 1139 target-connection.c \
|
/netbsd-current/crypto/external/bsd/openssh/dist/ |
H A D | scp.c | 153 /* Non-standard port to use for the ssh connection or -1. */ 156 /* This is the program to execute for the secured connection. ("ssh" or -S) */ 1047 "destination connection"); 1064 "source connection"); 1153 "connection"); 1232 error("sftp connection failed"); 1670 SCREWUP("lost connection"); 1863 "dropped connection"); 2196 (void)write(STDERR_FILENO, "lost connection\n", 16);
|
/netbsd-current/external/bsd/libevent/dist/test/ |
H A D | regress_http.c | 736 /* Second answer (BAD REQUEST) on connection close */ 1121 /* We give ownership of the request to the connection */ 1131 /* try to make another request over the same connection */ 1146 /* We give ownership of the request to the connection */ 1161 /* We give ownership of the request to the connection */ 1229 /* We give ownership of the request to the connection */ 1239 /* try to make another request over the same connection */ 1253 /* We give ownership of the request to the connection */ 1268 /* We give ownership of the request to the connection */ 1319 * Tell libevent to free the connection whe [all...] |
/netbsd-current/external/bsd/nsd/dist/doc/ |
H A D | differences.tex | 236 If this were to happen, the client could attempt a TCP connection
|
/netbsd-current/external/bsd/ntp/dist/sntp/libevent/test/ |
H A D | regress_http.c | 641 /* Second answer (BAD REQUEST) on connection close */ 1003 /* We give ownership of the request to the connection */ 1013 /* try to make another request over the same connection */ 1028 /* We give ownership of the request to the connection */ 1043 /* We give ownership of the request to the connection */ 1112 /* We give ownership of the request to the connection */ 1122 /* try to make another request over the same connection */ 1136 /* We give ownership of the request to the connection */ 1151 /* We give ownership of the request to the connection */ 1197 /* We give ownership of the request to the connection */ [all...] |
Completed in 156 milliseconds
1234567