Searched refs:session (Results 51 - 75 of 126) sorted by relevance

123456

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/hfsplus_journal/
H A Dwrapper.c68 if (HFSPLUS_SB(sb).session >= 0) {
69 te.cdte_track = HFSPLUS_SB(sb).session;
76 printk(KERN_ERR "hfs: invalid session number or type of track\n");
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/
H A Dssl_lib.c149 SSL_SESSION_free(s->session);
150 s->session=NULL;
194 * so, revert back if we are not doing session-id reuse. */
195 if (!s->in_handshake && (s->session == NULL) && (s->method != s->ctx->method))
364 * we can "construct" a session to give us the desired check - ie. to
365 * find if there's a session in the hash table that would conflict with
366 * any new session built out of this id/id_len and the ssl_version in
376 /* NB: SSLv2 always uses a fixed 16-byte session ID, so even if a
458 if (s->session != NULL)
461 SSL_SESSION_free(s->session);
[all...]
H A Dkssl.h88 ** to trace usage of the Kerberos session key
121 ** (1) Kerberos session key to SSL, and
157 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session);
H A Ds3_pkt.c245 sess=s->session;
594 sess=s->session;
962 (s->session != NULL) && (s->session->cipher != NULL))
1056 SSL_CTX_remove_session(s->ctx,s->session);
1180 * at this point (session renegotiation not yet started),
1227 s->session->cipher=s->s3->tmp.new_cipher;
1264 if ((level == 2) && (s->session != NULL))
1265 SSL_CTX_remove_session(s->ctx,s->session);
H A Dkssl.c1113 kssl_ctx->enctype = krb5credsp->session.keytype;
1164 if (kssl_ctx_setkey(kssl_ctx, &krb5credsp->session))
1280 ** Return Kerberos session key and client principle
1493 !krb5ticket->enc_part2->session)
1506 else if (kssl_ctx_setkey(kssl_ctx, krb5ticket->enc_part2->session))
1661 /* Copy the Kerberos session key from a (krb5_keyblock *) to a kssl_ctx
1662 ** struct. Clear kssl_ctx->key if Kerberos session key is NULL.
1665 kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session) argument
1679 if (session)
1683 length = session
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/
H A Dsslgen.h40 connections (and thus session ID caching etc) */
49 /* init the SSL session ID cache */
59 /* extract a session ID */
63 /* add a new session ID */
67 /* Kill a single session ID entry in the cache */
68 int Curl_ssl_kill_session(struct curl_ssl_session *session);
69 /* delete a session from the cache */
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/
H A Dkssl.h88 ** to trace usage of the Kerberos session key
121 ** (1) Kerberos session key to SSL, and
157 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/plugins/rp-pppoe/
H A Dcommon.c234 * packet -- PPPoE session packet
403 /* Do nothing if no session established yet */
404 if (!conn->session) return;
416 packet.session = conn->session;
420 conn->session = 0;
H A Dplugin.c78 "Attach to existing session (sessid:macaddr)" },
100 fatal("Could not allocate memory for PPPoE session");
140 conn->session = htons(ses);
152 /* Set PPPoE session-number for further consumption */
153 ppp_session_number = ntohs(conn->session);
155 /* Make the session socket */
162 sp.sa_addr.pppoe.sid = conn->session;
H A Ddebug.c123 (int) ntohs(packet->session),
H A Dpppoe.h216 unsigned int session:16; /* PPPoE session */ member in struct:PPPoEPacketStruct
222 #define PPPOE_OVERHEAD 6 /* type, code, session, length */
254 int sessionSocket; /* Raw socket for session frames */
257 UINT16_t session; /* Session ID */ member in struct:PPPoEConnectionStruct
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dkssl.h94 ** to trace usage of the Kerberos session key
127 ** (1) Kerberos session key to SSL, and
163 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Dkssl.h94 ** to trace usage of the Kerberos session key
127 ** (1) Kerberos session key to SSL, and
163 krb5_error_code kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session);
H A Dssl_lib.c162 SSL_SESSION_free(s->session);
163 s->session=NULL;
207 * so, revert back if we are not doing session-id reuse. */
208 if (!s->in_handshake && (s->session == NULL) && (s->method != s->ctx->method))
386 * we can "construct" a session to give us the desired check - ie. to
387 * find if there's a session in the hash table that would conflict with
388 * any new session built out of this id/id_len and the ssl_version in
398 /* NB: SSLv2 always uses a fixed 16-byte session ID, so even if a
483 if (s->session != NULL)
486 SSL_SESSION_free(s->session);
[all...]
H A Ds3_pkt.c247 sess=s->session;
595 sess=s->session;
963 (s->session != NULL) && (s->session->cipher != NULL))
1057 SSL_CTX_remove_session(s->ctx,s->session);
1181 * at this point (session renegotiation not yet started),
1228 s->session->cipher=s->s3->tmp.new_cipher;
1265 if ((level == 2) && (s->session != NULL))
1266 SSL_CTX_remove_session(s->ctx,s->session);
H A Dkssl.c1140 kssl_ctx->enctype = krb5credsp->session.keytype;
1191 if (kssl_ctx_setkey(kssl_ctx, &krb5credsp->session))
1307 ** Return Kerberos session key and client principle
1520 !krb5ticket->enc_part2->session)
1533 else if (kssl_ctx_setkey(kssl_ctx, krb5ticket->enc_part2->session))
1688 /* Copy the Kerberos session key from a (krb5_keyblock *) to a kssl_ctx
1689 ** struct. Clear kssl_ctx->key if Kerberos session key is NULL.
1692 kssl_ctx_setkey(KSSL_CTX *kssl_ctx, krb5_keyblock *session) argument
1706 if (session)
1710 length = session
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/hfs/
H A Dsuper.c138 if (sbi->session >= 0)
139 seq_printf(seq, ",session=%u", sbi->session);
188 { opt_session, "session=%u" },
225 hsb->session = -1;
279 if (match_int(&args[0], &hsb->session)) {
280 printk(KERN_ERR "hfs: session requires an argument\n");
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/pppoecd/
H A Dpppoe.c105 #define ETH_P_PPPOE_SESS 0x8864 /* session stage */
120 unsigned int session:16; /* session id */ member in struct:pppoe_packet
129 #define CODE_SESS 0x00 /* PPPoE session */
176 int session = 0; /* identifier for our session */ variable
274 "session: 0x%04x length: 0x%04x ", (unsigned)p->ver,
275 (unsigned)p->type, (unsigned)p->code, (unsigned)p->session,
443 sp_info.sa_addr.pppoe.sid = sessId; /* PPPoE session ID */
824 packet->session
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/scsi/qla4xxx/
H A Dql4_os.c61 static void qla4xxx_recovery_timedout(struct iscsi_cls_session *session);
115 static void qla4xxx_recovery_timedout(struct iscsi_cls_session *session) argument
117 struct ddb_entry *ddb_entry = session->dd_data;
134 struct iscsi_cls_session *session; local
137 session = iscsi_dev_to_session(conn->dev.parent);
138 ddb_entry = session->dd_data;
143 iscsi_unblock_session(session);
149 struct iscsi_cls_session *session; local
152 session = iscsi_dev_to_session(conn->dev.parent);
153 ddb_entry = session
188 struct iscsi_cls_session *session; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/char/
H A Dtty_io.c1394 if (tty->session) {
1395 do_each_pid_task(tty->session, PIDTYPE_SID, p) {
1409 } while_each_pid_task(tty->session, PIDTYPE_SID, p);
1414 put_pid(tty->session);
1416 tty->session = NULL;
1502 static void session_clear_tty(struct pid *session) argument
1505 do_each_pid_task(session, PIDTYPE_SID, p) {
1507 } while_each_pid_task(session, PIDTYPE_SID, p);
1512 * @on_exit: true if exiting so need to "hang up" the session
1514 * This function is typically called only by the session leade
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/cdrom/
H A Dcdu31a.c1294 int session; local
1338 fails. Then we know what the last valid session on the disk is.
1339 No need to check session 0, since session 0 is the same as session
1346 session = 1;
1351 pr_debug(PFX "Trying session %d\n", session);
1352 parms[0] = session;
1360 /* An error reading the TOC, this must be past the last session
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/mips/kernel/
H A Dirixioctl.c160 printk("rtp->session=%d ", rtp->session);
162 error = put_user(rtp->session, (unsigned long __user *) arg);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/isofs/
H A Dinode.c6 * 1994 Eberhard Moenkeberg - multi session handling.
154 s32 session; member in struct:iso9660_options
327 {Opt_session, "session=%u"},
371 popt->session=-1;
425 popt->session = n + 1;
474 * look if the driver can tell the multi session redirection value
482 * each track is #0), and a track is not a session.
491 static unsigned int isofs_get_last_session(struct super_block *sb, s32 session) argument
500 if(session >= 0 && session <
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/uams/uams_krb4/
H A Duams_krb4.c183 memcpy( seskey, ad.session, sizeof( C_Block ) );
379 memcpy(seskey, ad.session, sizeof( C_Block ));
423 memcpy( ct.HandShakeKey, cr.session, sizeof( cr.session ));
608 * We don't have the session key, yet. Get one.
634 memcpy( seskey, cr.session, sizeof( C_Block ));
716 memcpy( ct.HandShakeKey, cr.session, sizeof( cr.session ));
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/uams_krb4/
H A Duams_krb4.c183 memcpy( seskey, ad.session, sizeof( C_Block ) );
379 memcpy(seskey, ad.session, sizeof( C_Block ));
423 memcpy( ct.HandShakeKey, cr.session, sizeof( cr.session ));
608 * We don't have the session key, yet. Get one.
634 memcpy( seskey, cr.session, sizeof( C_Block ));
716 memcpy( ct.HandShakeKey, cr.session, sizeof( cr.session ));

Completed in 366 milliseconds

123456