Searched refs:session_id (Results 1 - 25 of 73) sorted by relevance

123

/macosx-10.10/ruby-106/ruby/lib/cgi/
H A Dsession.rb103 # responsible for extracting the session id from the session_id
156 attr_reader :session_id, :new_session
173 session_id = SecureRandom.hex(16)
183 session_id = md5.hexdigest
185 session_id
198 # session_id:: the session id to use. If not provided, then
205 # and if none currently exists and the +session_id+
248 session_id = option['session_id']
249 unless session_id
[all...]
/macosx-10.10/Heimdal-398.1.2/kcm/
H A Dsessions.c43 kcm_session_add(pid_t session_id) argument
45 kcm_log(1, "monitor session: %d\n", session_id);
/macosx-10.10/BerkeleyDB-21/db/docs_src/ref/am_misc/
H A Derror2.cs8 int session_id;
36 session_id);
/macosx-10.10/BerkeleyDB-21/db/docs_src/ref/env/
H A Derror2.cs10 int session_id;
22 session_id);
/macosx-10.10/xnu-2782.1.97/tools/lldbmacros/core/
H A Dcaching.py79 session_id = _GetDebuggerSessionID()
80 return session_id;
/macosx-10.10/smb-759.0/kernel/netsmb/
H A Dsmb_packets_2.h65 uint64_t session_id; member in struct:smb2_header
/macosx-10.10/OpenSSH-189/openssh/
H A Dkexdhc.c156 if (kex->session_id == NULL) {
158 kex->session_id = xmalloc(kex->session_id_len);
159 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexdhs.c144 if (kex->session_id == NULL) {
146 kex->session_id = xmalloc(kex->session_id_len);
147 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexecdhc.c152 if (kex->session_id == NULL) {
154 kex->session_id = xmalloc(kex->session_id_len);
155 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexecdhs.c138 if (kex->session_id == NULL) {
140 kex->session_id = xmalloc(kex->session_id_len);
141 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexgexc.c202 if (kex->session_id == NULL) {
204 kex->session_id = xmalloc(kex->session_id_len);
205 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexgexs.c187 if (kex->session_id == NULL) {
189 kex->session_id = xmalloc(kex->session_id_len);
190 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexgssc.c320 if (kex->session_id == NULL) {
322 kex->session_id = xmalloc(kex->session_id_len);
323 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexgsss.c250 if (kex->session_id == NULL) {
252 kex->session_id = xmalloc(kex->session_id_len);
253 memcpy(kex->session_id, hash, kex->session_id_len);
/macosx-10.10/ruby-106/ruby/test/cgi/
H A Dtest_cgi_session.rb43 # 'HTTP_COOKIE' => "_session_id=#{session_id}",
44 'QUERY_STRING' => "_session_id=#{session.session_id}",
81 # 'HTTP_COOKIE' => "_session_id=#{session_id}",
82 'QUERY_STRING' => "_session_id=#{session.session_id}",
107 session = CGI::Session.new(cgi,"tmpdir"=>@session_dir,"session_id"=>"foo")
112 assert_equal("foo",session.session_id)
113 #session_id=session.session_id
120 # 'HTTP_COOKIE' => "_session_id=#{session_id}",
121 'QUERY_STRING' => "_session_id=#{session.session_id}",
[all...]
/macosx-10.10/ppp-786.1.1/Drivers/L2TP/L2TP-plugin/
H A Dl2tp.c236 static int l2tp_send(int ctrlsockfd, u_int8_t* buf, int len, u_int16_t session_id, struct sockaddr *to, char *text);
318 if (ntohs(control_hdr->session_id) != our_params->session_id) {
320 our_params->session_id, ntohs(control_hdr->session_id));
323 if (peer_params->session_id == 0) {
330 SEND_PACKET(fd, control_buf, size, peer_params->session_id, 0, "ICCN");
381 if ((peer_params->session_id) == 0) {
388 SEND_PACKET(fd, control_buf, size, peer_params->session_id, 0, "ICRP");
395 if (ntohs(control_hdr->session_id) !
1415 l2tp_send(int fd, u_int8_t* buf, int len, u_int16_t session_id, struct sockaddr *to, char *text) argument
[all...]
/macosx-10.10/OpenSSL098-52/src/ssl/
H A Dssl_asn1.c73 ASN1_OCTET_STRING session_id; member in struct:ssl_session_asn1_st
160 a.session_id.length=in->session_id_length;
161 a.session_id.type=V_ASN1_OCTET_STRING;
162 a.session_id.data=in->session_id;
229 M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING);
264 M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING);
364 if (os.length > (int)sizeof(ret->session_id)) /* can't happen */
365 os.length = sizeof(ret->session_id);
368 OPENSSL_assert(os.length <= (int)sizeof(ret->session_id));
[all...]
H A Dssl_sess.c139 return s->session_id;
163 /* else - woops a session_id match */
247 if(!cb(s, ss->session_id, &tmp))
267 memset(ss->session_id + tmp, 0, ss->session_id_length - tmp);
271 if(SSL_has_matching_session_id(s, ss->session_id,
311 int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len, argument
325 r = tls1_process_ticket(s, session_id, len, limit, &ret);
345 memcpy(data.session_id,session_id,len);
361 && (ret=s->ctx->get_session_cb(s,session_id,le
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/regressions/
H A Dssl-42-ciphers.c189 uint32_t session_id; member in struct:__anon5010
566 ssl_test_handle_create(uint32_t session_id, bool resume, bool server, bool client_side_auth, bool dh_anonymous, bool dtls, argument
571 handle->session_id = session_id;
617 uint32_t session_id = (k+1) << 16 | (i+1); local
618 //fprintf(stderr, "session_id: %d\n", session_id);
619 server = ssl_test_handle_create(session_id, (l == 1), true /*server*/,
622 client = ssl_test_handle_create(session_id, (l == 1), false/*client*/,
626 require_noerr(SSLSetPeerID(server->st, &session_id, sizeo
[all...]
/macosx-10.10/Security-57031.1.35/Security/tlsnke/tlsnketest/
H A Dst_test.c208 uint32_t session_id; member in struct:__anon5190
594 ssl_test_handle_create(uint32_t session_id, bool resume, bool server, bool client_side_auth, bool dh_anonymous, bool dtls, argument
599 handle->session_id = session_id;
708 uint32_t session_id = (c+1) << 16 | (i+1); local
709 //fprintf(stderr, "session_id: %d\n", session_id);
710 server = ssl_test_handle_create(session_id, (l == 1), true /*server*/,
713 client = ssl_test_handle_create(session_id, (l == 1), false/*client*/,
717 require_noerr(SSLSetPeerID(server->st, &session_id, sizeo
[all...]
/macosx-10.10/ppp-786.1.1/Drivers/L2TP/L2TP-extension/
H A Dl2tpk.h91 u_int16_t session_id; member in struct:l2tp_header
/macosx-10.10/ruby-106/ruby/lib/cgi/session/
H A Dpstore.rb48 id = session.session_id
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/
H A Dike_session.h76 ike_session_id_t session_id; member in struct:ike_session
128 extern ike_session_t * ike_session_create_session (ike_session_id_t *session_id);
H A Dplog.c417 plogsetsessioninfo (const char *session_id, argument
424 if (!session_id) {
427 gSessId = strdup(session_id);
435 gSessType = strdup(session_id);
H A Dplog.h138 void plogsetsessioninfo (const char *session_id,

Completed in 159 milliseconds

123