/freebsd-11-stable/crypto/openssl/ssl/ |
H A D | ssl_locl.h | 557 * Set if CERT_PKEY can be used with current SSL session: e.g. 614 * *disabled* algorithms based on the current session. 1075 int ssl_get_new_session(SSL *s, int session); 1076 int ssl_get_prev_session(SSL *s, unsigned char *session, int len,
|
H A D | ssl.h | 173 /* SSLeay version number for ASN.1 encoding of the session information */ 490 * Ticket_lifetime_hint [9] EXPLICIT INTEGER, -- server's lifetime hint for session ticket 491 * Ticket [10] EXPLICIT OCTET STRING, -- session ticket (clients only) 499 int ssl_version; /* what ssl version session info is being 510 * this is used to determine whether the session is being reused in the 525 * Used to indicate that session resumption is not allowed. Applications 526 * can also set this bit for a new session via not_resumable_session_cb 527 * to disable session caching and tickets. 540 * when app_verify_callback accepts a session where the peer's 541 * certificate is not ok, we must remember the error for session reus 1539 SSL_SESSION *session; member in struct:ssl_st [all...] |
/freebsd-11-stable/sys/dev/ubsec/ |
H A D | ubsec.c | 892 * Allocate a new 'session' and return an encoded session id. 'sidp' 893 * contains our registration id, and should contain an encoded session 989 * Deallocate a session. 995 int session, ret; local 1001 session = UBSEC_SESSION(sid); 1002 if (session < sc->sc_nsessions) { 1003 bzero(&sc->sc_sessions[session], 1004 sizeof(sc->sc_sessions[session]));
|
/freebsd-11-stable/sys/kern/ |
H A D | kern_prot.c | 199 * Get an arbitrary pid's session id. 339 struct session *newsess; 345 newsess = malloc(sizeof(struct session), M_SESSION, M_WAITOK | M_ZERO); 377 * pid must be in same session (EPERM) 380 * there must exist some pid in same session having pgid (EPERM) 381 * pid must not be session leader (EPERM) 1561 * session always be able to deliver SIGCONT to one another,
|
H A D | subr_prf.c | 206 * given session, possibly to the log as well. 224 struct session *sess = NULL;
|
H A D | init_main.c | 99 static struct session session0; 493 mtx_init(&session0.s_mtx, "session", NULL, MTX_DEF);
|
/freebsd-11-stable/lib/libkvm/ |
H A D | kvm_proc.c | 121 struct session sess; 284 _kvm_err(kd, kd->program, "can't read session at %p", 326 "can't read session at %p",
|
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | krb5tgs.c | 981 encryption should come from. What we have is a session 986 session key is DES3 and we want a ticket with a (say) 987 CAST session key. Should the DES3 etype be added to the 988 etype list, even if we don't want a session key with 1328 kdc_log(context, config, 0, "Failed to get session key: %s", msg); 1395 krb5_crypto session, 1444 ret = krb5_encrypt_EncryptedData(context, session, 1393 build_server_referral(krb5_context context, krb5_kdc_configuration *config, krb5_crypto session, krb5_const_realm referred_realm, const PrincipalName *true_principal_name, const PrincipalName *requested_principal, krb5_data *outdata) argument
|
/freebsd-11-stable/crypto/openssh/contrib/redhat/ |
H A D | openssh.spec | 511 - pull cvs patch to add session initialization to no-pty sessions 635 - Don't open a PAM session until we've forked and become the user (#25690).
|
/freebsd-11-stable/contrib/subversion/subversion/include/ |
H A D | svn_client.h | 524 * the commit session. NULL until the commit item is preprocessed. 1388 * update initializes a whole new repository session (network 7664 * @defgroup clnt_sessions Client session related functions 7716 * This function will open a temporary RA session to the repository if 7750 * Use a @a pool to open a temporary RA session to @a url, discover the 7751 * repository uuid, and free the session. Return the uuid in @a uuid, 7801 /** Open an RA session rooted at @a url, and return it in @a *session. 7804 * @a *session is allocated in @a result_pool. 7814 svn_client_open_ra_session2(svn_ra_session_t **session, [all...] |
/freebsd-11-stable/contrib/ipfilter/ipsend/ |
H A D | iptests.c | 53 #include <sys/session.h>
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_client/ |
H A D | deprecated.c | 3039 svn_client_open_ra_session(svn_ra_session_t **session, 3045 svn_client_open_ra_session2(session, url, 3061 /* destroy the RA session */ 3109 /* close ra session */ 3037 svn_client_open_ra_session(svn_ra_session_t **session, const char *url, svn_client_ctx_t *ctx, apr_pool_t *pool) argument
|
/freebsd-11-stable/lib/libprocstat/ |
H A D | libprocstat.c | 413 struct session sess; 436 warnx("can't read session struct at %p for pid %d",
|
/freebsd-11-stable/contrib/sqlite3/ |
H A D | configure | 1447 --enable-session enable the session extension [default=no] 13778 # --enable-session 13780 # Check whether --enable-session was given.
|
/freebsd-11-stable/contrib/ntp/ |
H A D | configure | 1830 --enable-bug1243-fix + use unmodified autokey session keys 32050 { $as_echo "$as_me:${as_lineno-$LINENO}: checking if we want new session key behavior" >&5 32051 $as_echo_n "checking if we want new session key behavior... " >&6; }
|