/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/hfsplus_journal/ |
H A D | wrapper.c | 68 if (HFSPLUS_SB(sb).session >= 0) { 69 te.cdte_track = HFSPLUS_SB(sb).session; 76 printk(KERN_ERR "hfs: invalid session number or type of track\n");
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/ |
H A D | ssl_lib.c | 149 SSL_SESSION_free(s->session); 150 s->session=NULL; 194 * so, revert back if we are not doing session-id reuse. */ 195 if (!s->in_handshake && (s->session == NULL) && (s->method != s->ctx->method)) 364 * we can "construct" a session to give us the desired check - ie. to 365 * find if there's a session in the hash table that would conflict with 366 * any new session built out of this id/id_len and the ssl_version in 376 /* NB: SSLv2 always uses a fixed 16-byte session ID, so even if a 458 if (s->session != NULL) 461 SSL_SESSION_free(s->session); [all...] |
H A D | kssl.h | 88 ** to trace usage of the Kerberos session key 121 ** (1) Kerberos session key to SSL, and 157 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session);
|
H A D | s3_pkt.c | 245 sess=s->session; 594 sess=s->session; 962 (s->session != NULL) && (s->session->cipher != NULL)) 1056 SSL_CTX_remove_session(s->ctx,s->session); 1180 * at this point (session renegotiation not yet started), 1227 s->session->cipher=s->s3->tmp.new_cipher; 1264 if ((level == 2) && (s->session != NULL)) 1265 SSL_CTX_remove_session(s->ctx,s->session);
|
H A D | kssl.c | 1113 kssl_ctx->enctype = krb5credsp->session.keytype; 1164 if (kssl_ctx_setkey(kssl_ctx, &krb5credsp->session)) 1280 ** Return Kerberos session key and client principle 1493 !krb5ticket->enc_part2->session) 1506 else if (kssl_ctx_setkey(kssl_ctx, krb5ticket->enc_part2->session)) 1661 /* Copy the Kerberos session key from a (krb5_keyblock *) to a kssl_ctx 1662 ** struct. Clear kssl_ctx->key if Kerberos session key is NULL. 1665 kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session) argument 1679 if (session) 1683 length = session [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/ |
H A D | sslgen.h | 40 connections (and thus session ID caching etc) */ 49 /* init the SSL session ID cache */ 59 /* extract a session ID */ 63 /* add a new session ID */ 67 /* Kill a single session ID entry in the cache */ 68 int Curl_ssl_kill_session(struct curl_ssl_session *session); 69 /* delete a session from the cache */
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/ |
H A D | kssl.h | 88 ** to trace usage of the Kerberos session key 121 ** (1) Kerberos session key to SSL, and 157 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/plugins/rp-pppoe/ |
H A D | common.c | 234 * packet -- PPPoE session packet 403 /* Do nothing if no session established yet */ 404 if (!conn->session) return; 416 packet.session = conn->session; 420 conn->session = 0;
|
H A D | plugin.c | 78 "Attach to existing session (sessid:macaddr)" }, 100 fatal("Could not allocate memory for PPPoE session"); 140 conn->session = htons(ses); 152 /* Set PPPoE session-number for further consumption */ 153 ppp_session_number = ntohs(conn->session); 155 /* Make the session socket */ 162 sp.sa_addr.pppoe.sid = conn->session;
|
H A D | debug.c | 123 (int) ntohs(packet->session),
|
H A D | pppoe.h | 216 unsigned int session:16; /* PPPoE session */ member in struct:PPPoEPacketStruct 222 #define PPPOE_OVERHEAD 6 /* type, code, session, length */ 254 int sessionSocket; /* Raw socket for session frames */ 257 UINT16_t session; /* Session ID */ member in struct:PPPoEConnectionStruct
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | kssl.h | 94 ** to trace usage of the Kerberos session key 127 ** (1) Kerberos session key to SSL, and 163 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | kssl.h | 94 ** to trace usage of the Kerberos session key 127 ** (1) Kerberos session key to SSL, and 163 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session);
|
H A D | ssl_lib.c | 162 SSL_SESSION_free(s->session); 163 s->session=NULL; 207 * so, revert back if we are not doing session-id reuse. */ 208 if (!s->in_handshake && (s->session == NULL) && (s->method != s->ctx->method)) 386 * we can "construct" a session to give us the desired check - ie. to 387 * find if there's a session in the hash table that would conflict with 388 * any new session built out of this id/id_len and the ssl_version in 398 /* NB: SSLv2 always uses a fixed 16-byte session ID, so even if a 483 if (s->session != NULL) 486 SSL_SESSION_free(s->session); [all...] |
H A D | s3_pkt.c | 247 sess=s->session; 595 sess=s->session; 963 (s->session != NULL) && (s->session->cipher != NULL)) 1057 SSL_CTX_remove_session(s->ctx,s->session); 1181 * at this point (session renegotiation not yet started), 1228 s->session->cipher=s->s3->tmp.new_cipher; 1265 if ((level == 2) && (s->session != NULL)) 1266 SSL_CTX_remove_session(s->ctx,s->session);
|
H A D | kssl.c | 1140 kssl_ctx->enctype = krb5credsp->session.keytype; 1191 if (kssl_ctx_setkey(kssl_ctx, &krb5credsp->session)) 1307 ** Return Kerberos session key and client principle 1520 !krb5ticket->enc_part2->session) 1533 else if (kssl_ctx_setkey(kssl_ctx, krb5ticket->enc_part2->session)) 1688 /* Copy the Kerberos session key from a (krb5_keyblock *) to a kssl_ctx 1689 ** struct. Clear kssl_ctx->key if Kerberos session key is NULL. 1692 kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session) argument 1706 if (session) 1710 length = session [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/hfs/ |
H A D | super.c | 138 if (sbi->session >= 0) 139 seq_printf(seq, ",session=%u", sbi->session); 188 { opt_session, "session=%u" }, 225 hsb->session = -1; 279 if (match_int(&args[0], &hsb->session)) { 280 printk(KERN_ERR "hfs: session requires an argument\n");
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/pppoecd/ |
H A D | pppoe.c | 105 #define ETH_P_PPPOE_SESS 0x8864 /* session stage */ 120 unsigned int session:16; /* session id */ member in struct:pppoe_packet 129 #define CODE_SESS 0x00 /* PPPoE session */ 176 int session = 0; /* identifier for our session */ variable 274 "session: 0x%04x length: 0x%04x ", (unsigned)p->ver, 275 (unsigned)p->type, (unsigned)p->code, (unsigned)p->session, 443 sp_info.sa_addr.pppoe.sid = sessId; /* PPPoE session ID */ 824 packet->session [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/scsi/qla4xxx/ |
H A D | ql4_os.c | 61 static void qla4xxx_recovery_timedout(struct iscsi_cls_session *session); 115 static void qla4xxx_recovery_timedout(struct iscsi_cls_session *session) argument 117 struct ddb_entry *ddb_entry = session->dd_data; 134 struct iscsi_cls_session *session; local 137 session = iscsi_dev_to_session(conn->dev.parent); 138 ddb_entry = session->dd_data; 143 iscsi_unblock_session(session); 149 struct iscsi_cls_session *session; local 152 session = iscsi_dev_to_session(conn->dev.parent); 153 ddb_entry = session 188 struct iscsi_cls_session *session; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/char/ |
H A D | tty_io.c | 1394 if (tty->session) { 1395 do_each_pid_task(tty->session, PIDTYPE_SID, p) { 1409 } while_each_pid_task(tty->session, PIDTYPE_SID, p); 1414 put_pid(tty->session); 1416 tty->session = NULL; 1502 static void session_clear_tty(struct pid *session) argument 1505 do_each_pid_task(session, PIDTYPE_SID, p) { 1507 } while_each_pid_task(session, PIDTYPE_SID, p); 1512 * @on_exit: true if exiting so need to "hang up" the session 1514 * This function is typically called only by the session leade [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/cdrom/ |
H A D | cdu31a.c | 1294 int session; local 1338 fails. Then we know what the last valid session on the disk is. 1339 No need to check session 0, since session 0 is the same as session 1346 session = 1; 1351 pr_debug(PFX "Trying session %d\n", session); 1352 parms[0] = session; 1360 /* An error reading the TOC, this must be past the last session [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/mips/kernel/ |
H A D | irixioctl.c | 160 printk("rtp->session=%d ", rtp->session); 162 error = put_user(rtp->session, (unsigned long __user *) arg);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/isofs/ |
H A D | inode.c | 6 * 1994 Eberhard Moenkeberg - multi session handling. 154 s32 session; member in struct:iso9660_options 327 {Opt_session, "session=%u"}, 371 popt->session=-1; 425 popt->session = n + 1; 474 * look if the driver can tell the multi session redirection value 482 * each track is #0), and a track is not a session. 491 static unsigned int isofs_get_last_session(struct super_block *sb, s32 session) argument 500 if(session >= 0 && session < [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/uams/uams_krb4/ |
H A D | uams_krb4.c | 183 memcpy( seskey, ad.session, sizeof( C_Block ) ); 379 memcpy(seskey, ad.session, sizeof( C_Block )); 423 memcpy( ct.HandShakeKey, cr.session, sizeof( cr.session )); 608 * We don't have the session key, yet. Get one. 634 memcpy( seskey, cr.session, sizeof( C_Block )); 716 memcpy( ct.HandShakeKey, cr.session, sizeof( cr.session ));
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/uams_krb4/ |
H A D | uams_krb4.c | 183 memcpy( seskey, ad.session, sizeof( C_Block ) ); 379 memcpy(seskey, ad.session, sizeof( C_Block )); 423 memcpy( ct.HandShakeKey, cr.session, sizeof( cr.session )); 608 * We don't have the session key, yet. Get one. 634 memcpy( seskey, cr.session, sizeof( C_Block )); 716 memcpy( ct.HandShakeKey, cr.session, sizeof( cr.session ));
|