/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/papd/ |
H A D | Makefile | 97 am_papd_OBJECTS = main.$(OBJEXT) printcap.$(OBJEXT) session.$(OBJEXT) \ 325 papd_SOURCES = main.c printcap.c session.c file.c comment.c lp.c ppd.c \ 340 session.h \ 501 include ./$(DEPDIR)/session.Po
|
H A D | main.c | 71 #include "session.h" 495 if ( session( atp, &sat ) < 0 ) { 496 LOG(log_error, logtype_papd, "bad session" );
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/udf/ |
H A D | super.c | 32 * 10/16/98 attempting some multi-session support 175 unsigned int session; member in struct:udf_options 242 * session= Set the CDROM session (default= last session) 294 {Opt_session, "session=%u"}, 315 uopt->session = 0xFFFFFFFF; 382 uopt->session = option; 1555 if ( uopt.session == 0xFFFFFFFF ) 1558 UDF_SB_SESSION(sb) = uopt.session; [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | clikrb5.c | 290 KRB5_KEY_TYPE((&pcreds->session)) = enctype; 369 /* obtain ticket & session key */ 509 DEBUG(10, ("Got KRB5 session key of length %d\n", KRB5_KEY_LENGTH(skey))); 517 DEBUG(10, ("KRB5 error getting session key %d\n", err));
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/ |
H A D | krb4.c | 188 memmove(&d->key, &cred.session, sizeof(des_cblock));
|
H A D | url.c | 688 /* Set the default size of the SSL session ID cache */ 710 set->ssl.sessionid = TRUE; /* session ID caching enabled by default */ 1302 * Set this option to TRUE to start a new "cookie session". It will 1304 * cookies that are marked as being session cookies, as they belong to a 1305 * previous session. 1307 * In the original Netscape cookie spec, "session cookies" are cookies 1331 /* clear session cookies */ 2105 if(data->share->sslsession == data->state.session) { 2106 data->state.session = NULL; 2143 data->state.session [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/hfsplus_journal/ |
H A D | hfsplus_fs.h | 190 int part, session; member in struct:hfsplus_sb_info
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/include/linux/ |
H A D | tty.h | 201 struct pid *session; member in struct:tty_struct
|
H A D | isdn.h | 415 #define ISDN_ASYNC_SESSION_LOCKOUT 0x0100 /* Lock cua opens on session */ 473 long session; /* Session of opening process */ member in struct:modem_info
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | ssl_locl.h | 717 int ssl_get_new_session(SSL *s, int session); 718 int ssl_get_prev_session(SSL *s, unsigned char *session,int len);
|
H A D | ssl.h | 199 /* SSLeay version number for ASN.1 encoding of the session information */ 426 int ssl_version; /* what ssl version session info is 437 /* this is used to determine whether the session is being reused in 458 /* when app_verify_callback accepts a session where the peer's certificate 459 * is not ok, we must remember the error for session reuse: */ 477 /* These are used to make removal of session-ids more 509 /* As server, disallow session resumption on renegotiation */ 594 * them. It is used to override the generation of SSL/TLS session IDs in a 600 * The length value passed in is set at the maximum size the session ID can be. 602 * can alter this length to be less if desired, but under SSLv2 session ID 938 SSL_SESSION *session; member in struct:ssl_st [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/bluetooth/rfcomm/ |
H A D | sock.c | 111 rfcomm_session_getaddr(d->session, &bt_sk(sk)->src, NULL); 771 l2cap_sk = rfcomm_pi(sk)->dlc->session->sock->sk; 856 BT_DBG("session %p channel %d", s, channel);
|
H A D | tty.c | 780 if (!dev || !dev->dlc || !dev->dlc->session) 902 rfcomm_send_rpn(dev->dlc->session, 1, dev->dlc->dlci, baud,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/udev/ |
H A D | udevd.c | 387 /* return the number of process es in our session, count only until limit */ 388 static int running_processes_in_session(pid_t session, int limit) argument 434 /* count only processes in our session */ 435 if (sess != session) 545 /* check running processes in our session and possibly throttle */ 548 dbg("at least %d processes running in session", running); 1096 /* become session leader */ 1098 dbg("our session is %d", sid);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/fips/des/ |
H A D | fips_set_key.c | 355 schedule->session=NULL;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/des/ |
H A D | set_key.c | 349 schedule->session=NULL;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/des/ |
H A D | set_key.c | 347 schedule->session=NULL;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/ |
H A D | ssl.h | 187 /* SSLeay version number for ASN.1 encoding of the session information */ 408 int ssl_version; /* what ssl version session info is 419 /* this is used to determine whether the session is being reused in 440 /* when app_verify_callback accepts a session where the peer's certificate 441 * is not ok, we must remember the error for session reuse: */ 459 /* These are used to make removal of session-ids more 486 /* As server, disallow session resumption on renegotiation */ 567 * them. It is used to override the generation of SSL/TLS session IDs in a 573 * The length value passed in is set at the maximum size the session ID can be. 575 * can alter this length to be less if desired, but under SSLv2 session ID 893 SSL_SESSION *session; member in struct:ssl_st [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/ |
H A D | ssl.h | 187 /* SSLeay version number for ASN.1 encoding of the session information */ 408 int ssl_version; /* what ssl version session info is 419 /* this is used to determine whether the session is being reused in 440 /* when app_verify_callback accepts a session where the peer's certificate 441 * is not ok, we must remember the error for session reuse: */ 459 /* These are used to make removal of session-ids more 486 /* As server, disallow session resumption on renegotiation */ 567 * them. It is used to override the generation of SSL/TLS session IDs in a 573 * The length value passed in is set at the maximum size the session ID can be. 575 * can alter this length to be less if desired, but under SSLv2 session ID 893 SSL_SESSION *session; member in struct:ssl_st [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | ssl.h | 199 /* SSLeay version number for ASN.1 encoding of the session information */ 426 int ssl_version; /* what ssl version session info is 437 /* this is used to determine whether the session is being reused in 458 /* when app_verify_callback accepts a session where the peer's certificate 459 * is not ok, we must remember the error for session reuse: */ 477 /* These are used to make removal of session-ids more 509 /* As server, disallow session resumption on renegotiation */ 594 * them. It is used to override the generation of SSL/TLS session IDs in a 600 * The length value passed in is set at the maximum size the session ID can be. 602 * can alter this length to be less if desired, but under SSLv2 session ID 938 SSL_SESSION *session; member in struct:ssl_st [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/papd/ |
H A D | main.c | 71 #include "session.h" 495 if ( session( atp, &sat ) < 0 ) { 496 LOG(log_error, logtype_papd, "bad session" );
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iproute2/doc/ |
H A D | ip-tunnels.tex | 460 session D ipproto ipip filter S \
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/Documentation/cdrom/ |
H A D | cdrom-standard.tex | 459 device $cdi\to dev$, the start of the last session of the current disc 824 \item[CDROMMULTISESSION] Requests the last session on a \cdrom.
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/db-4.7.25.NC/perl/DB_File/ |
H A D | DB_File.pm | 2002 session, this can be massaged into a system that will work with long
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/ |
H A D | configure | 29021 PAM_SESSION=common-session [all...] |