Searched refs:session (Results 101 - 125 of 126) sorted by relevance

123456

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/papd/
H A DMakefile97 am_papd_OBJECTS = main.$(OBJEXT) printcap.$(OBJEXT) session.$(OBJEXT) \
325 papd_SOURCES = main.c printcap.c session.c file.c comment.c lp.c ppd.c \
340 session.h \
501 include ./$(DEPDIR)/session.Po
H A Dmain.c71 #include "session.h"
495 if ( session( atp, &sat ) < 0 ) {
496 LOG(log_error, logtype_papd, "bad session" );
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/udf/
H A Dsuper.c32 * 10/16/98 attempting some multi-session support
175 unsigned int session; member in struct:udf_options
242 * session= Set the CDROM session (default= last session)
294 {Opt_session, "session=%u"},
315 uopt->session = 0xFFFFFFFF;
382 uopt->session = option;
1555 if ( uopt.session == 0xFFFFFFFF )
1558 UDF_SB_SESSION(sb) = uopt.session;
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/
H A Dclikrb5.c290 KRB5_KEY_TYPE((&pcreds->session)) = enctype;
369 /* obtain ticket & session key */
509 DEBUG(10, ("Got KRB5 session key of length %d\n", KRB5_KEY_LENGTH(skey)));
517 DEBUG(10, ("KRB5 error getting session key %d\n", err));
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/
H A Dkrb4.c188 memmove(&d->key, &cred.session, sizeof(des_cblock));
H A Durl.c688 /* Set the default size of the SSL session ID cache */
710 set->ssl.sessionid = TRUE; /* session ID caching enabled by default */
1302 * Set this option to TRUE to start a new "cookie session". It will
1304 * cookies that are marked as being session cookies, as they belong to a
1305 * previous session.
1307 * In the original Netscape cookie spec, "session cookies" are cookies
1331 /* clear session cookies */
2105 if(data->share->sslsession == data->state.session) {
2106 data->state.session = NULL;
2143 data->state.session
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/hfsplus_journal/
H A Dhfsplus_fs.h190 int part, session; member in struct:hfsplus_sb_info
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/include/linux/
H A Dtty.h201 struct pid *session; member in struct:tty_struct
H A Disdn.h415 #define ISDN_ASYNC_SESSION_LOCKOUT 0x0100 /* Lock cua opens on session */
473 long session; /* Session of opening process */ member in struct:modem_info
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Dssl_locl.h717 int ssl_get_new_session(SSL *s, int session);
718 int ssl_get_prev_session(SSL *s, unsigned char *session,int len);
H A Dssl.h199 /* SSLeay version number for ASN.1 encoding of the session information */
426 int ssl_version; /* what ssl version session info is
437 /* this is used to determine whether the session is being reused in
458 /* when app_verify_callback accepts a session where the peer's certificate
459 * is not ok, we must remember the error for session reuse: */
477 /* These are used to make removal of session-ids more
509 /* As server, disallow session resumption on renegotiation */
594 * them. It is used to override the generation of SSL/TLS session IDs in a
600 * The length value passed in is set at the maximum size the session ID can be.
602 * can alter this length to be less if desired, but under SSLv2 session ID
938 SSL_SESSION *session; member in struct:ssl_st
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/bluetooth/rfcomm/
H A Dsock.c111 rfcomm_session_getaddr(d->session, &bt_sk(sk)->src, NULL);
771 l2cap_sk = rfcomm_pi(sk)->dlc->session->sock->sk;
856 BT_DBG("session %p channel %d", s, channel);
H A Dtty.c780 if (!dev || !dev->dlc || !dev->dlc->session)
902 rfcomm_send_rpn(dev->dlc->session, 1, dev->dlc->dlci, baud,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/udev/
H A Dudevd.c387 /* return the number of process es in our session, count only until limit */
388 static int running_processes_in_session(pid_t session, int limit) argument
434 /* count only processes in our session */
435 if (sess != session)
545 /* check running processes in our session and possibly throttle */
548 dbg("at least %d processes running in session", running);
1096 /* become session leader */
1098 dbg("our session is %d", sid);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/fips/des/
H A Dfips_set_key.c355 schedule->session=NULL;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/des/
H A Dset_key.c349 schedule->session=NULL;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/des/
H A Dset_key.c347 schedule->session=NULL;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/
H A Dssl.h187 /* SSLeay version number for ASN.1 encoding of the session information */
408 int ssl_version; /* what ssl version session info is
419 /* this is used to determine whether the session is being reused in
440 /* when app_verify_callback accepts a session where the peer's certificate
441 * is not ok, we must remember the error for session reuse: */
459 /* These are used to make removal of session-ids more
486 /* As server, disallow session resumption on renegotiation */
567 * them. It is used to override the generation of SSL/TLS session IDs in a
573 * The length value passed in is set at the maximum size the session ID can be.
575 * can alter this length to be less if desired, but under SSLv2 session ID
893 SSL_SESSION *session; member in struct:ssl_st
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/
H A Dssl.h187 /* SSLeay version number for ASN.1 encoding of the session information */
408 int ssl_version; /* what ssl version session info is
419 /* this is used to determine whether the session is being reused in
440 /* when app_verify_callback accepts a session where the peer's certificate
441 * is not ok, we must remember the error for session reuse: */
459 /* These are used to make removal of session-ids more
486 /* As server, disallow session resumption on renegotiation */
567 * them. It is used to override the generation of SSL/TLS session IDs in a
573 * The length value passed in is set at the maximum size the session ID can be.
575 * can alter this length to be less if desired, but under SSLv2 session ID
893 SSL_SESSION *session; member in struct:ssl_st
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dssl.h199 /* SSLeay version number for ASN.1 encoding of the session information */
426 int ssl_version; /* what ssl version session info is
437 /* this is used to determine whether the session is being reused in
458 /* when app_verify_callback accepts a session where the peer's certificate
459 * is not ok, we must remember the error for session reuse: */
477 /* These are used to make removal of session-ids more
509 /* As server, disallow session resumption on renegotiation */
594 * them. It is used to override the generation of SSL/TLS session IDs in a
600 * The length value passed in is set at the maximum size the session ID can be.
602 * can alter this length to be less if desired, but under SSLv2 session ID
938 SSL_SESSION *session; member in struct:ssl_st
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/papd/
H A Dmain.c71 #include "session.h"
495 if ( session( atp, &sat ) < 0 ) {
496 LOG(log_error, logtype_papd, "bad session" );
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iproute2/doc/
H A Dip-tunnels.tex460 session D ipproto ipip filter S \
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/Documentation/cdrom/
H A Dcdrom-standard.tex459 device $cdi\to dev$, the start of the last session of the current disc
824 \item[CDROMMULTISESSION] Requests the last session on a \cdrom.
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/db-4.7.25.NC/perl/DB_File/
H A DDB_File.pm2002 session, this can be massaged into a system that will work with long
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/
H A Dconfigure29021 PAM_SESSION=common-session
[all...]

Completed in 538 milliseconds

123456