/macosx-10.10/ruby-106/ruby/lib/cgi/ |
H A D | session.rb | 103 # responsible for extracting the session id from the session_id 156 attr_reader :session_id, :new_session 173 session_id = SecureRandom.hex(16) 183 session_id = md5.hexdigest 185 session_id 198 # session_id:: the session id to use. If not provided, then 205 # and if none currently exists and the +session_id+ 248 session_id = option['session_id'] 249 unless session_id [all...] |
/macosx-10.10/Heimdal-398.1.2/kcm/ |
H A D | sessions.c | 43 kcm_session_add(pid_t session_id) argument 45 kcm_log(1, "monitor session: %d\n", session_id);
|
/macosx-10.10/BerkeleyDB-21/db/docs_src/ref/am_misc/ |
H A D | error2.cs | 8 int session_id; 36 session_id);
|
/macosx-10.10/BerkeleyDB-21/db/docs_src/ref/env/ |
H A D | error2.cs | 10 int session_id; 22 session_id);
|
/macosx-10.10/xnu-2782.1.97/tools/lldbmacros/core/ |
H A D | caching.py | 79 session_id = _GetDebuggerSessionID() 80 return session_id;
|
/macosx-10.10/smb-759.0/kernel/netsmb/ |
H A D | smb_packets_2.h | 65 uint64_t session_id; member in struct:smb2_header
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | kexdhc.c | 156 if (kex->session_id == NULL) { 158 kex->session_id = xmalloc(kex->session_id_len); 159 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexdhs.c | 144 if (kex->session_id == NULL) { 146 kex->session_id = xmalloc(kex->session_id_len); 147 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexecdhc.c | 152 if (kex->session_id == NULL) { 154 kex->session_id = xmalloc(kex->session_id_len); 155 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexecdhs.c | 138 if (kex->session_id == NULL) { 140 kex->session_id = xmalloc(kex->session_id_len); 141 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexgexc.c | 202 if (kex->session_id == NULL) { 204 kex->session_id = xmalloc(kex->session_id_len); 205 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexgexs.c | 187 if (kex->session_id == NULL) { 189 kex->session_id = xmalloc(kex->session_id_len); 190 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexgssc.c | 320 if (kex->session_id == NULL) { 322 kex->session_id = xmalloc(kex->session_id_len); 323 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexgsss.c | 250 if (kex->session_id == NULL) { 252 kex->session_id = xmalloc(kex->session_id_len); 253 memcpy(kex->session_id, hash, kex->session_id_len);
|
/macosx-10.10/ruby-106/ruby/test/cgi/ |
H A D | test_cgi_session.rb | 43 # 'HTTP_COOKIE' => "_session_id=#{session_id}", 44 'QUERY_STRING' => "_session_id=#{session.session_id}", 81 # 'HTTP_COOKIE' => "_session_id=#{session_id}", 82 'QUERY_STRING' => "_session_id=#{session.session_id}", 107 session = CGI::Session.new(cgi,"tmpdir"=>@session_dir,"session_id"=>"foo") 112 assert_equal("foo",session.session_id) 113 #session_id=session.session_id 120 # 'HTTP_COOKIE' => "_session_id=#{session_id}", 121 'QUERY_STRING' => "_session_id=#{session.session_id}", [all...] |
/macosx-10.10/ppp-786.1.1/Drivers/L2TP/L2TP-plugin/ |
H A D | l2tp.c | 236 static int l2tp_send(int ctrlsockfd, u_int8_t* buf, int len, u_int16_t session_id, struct sockaddr *to, char *text); 318 if (ntohs(control_hdr->session_id) != our_params->session_id) { 320 our_params->session_id, ntohs(control_hdr->session_id)); 323 if (peer_params->session_id == 0) { 330 SEND_PACKET(fd, control_buf, size, peer_params->session_id, 0, "ICCN"); 381 if ((peer_params->session_id) == 0) { 388 SEND_PACKET(fd, control_buf, size, peer_params->session_id, 0, "ICRP"); 395 if (ntohs(control_hdr->session_id) ! 1415 l2tp_send(int fd, u_int8_t* buf, int len, u_int16_t session_id, struct sockaddr *to, char *text) argument [all...] |
/macosx-10.10/OpenSSL098-52/src/ssl/ |
H A D | ssl_asn1.c | 73 ASN1_OCTET_STRING session_id; member in struct:ssl_session_asn1_st 160 a.session_id.length=in->session_id_length; 161 a.session_id.type=V_ASN1_OCTET_STRING; 162 a.session_id.data=in->session_id; 229 M_ASN1_I2D_len(&(a.session_id), i2d_ASN1_OCTET_STRING); 264 M_ASN1_I2D_put(&(a.session_id), i2d_ASN1_OCTET_STRING); 364 if (os.length > (int)sizeof(ret->session_id)) /* can't happen */ 365 os.length = sizeof(ret->session_id); 368 OPENSSL_assert(os.length <= (int)sizeof(ret->session_id)); [all...] |
H A D | ssl_sess.c | 139 return s->session_id; 163 /* else - woops a session_id match */ 247 if(!cb(s, ss->session_id, &tmp)) 267 memset(ss->session_id + tmp, 0, ss->session_id_length - tmp); 271 if(SSL_has_matching_session_id(s, ss->session_id, 311 int ssl_get_prev_session(SSL *s, unsigned char *session_id, int len, argument 325 r = tls1_process_ticket(s, session_id, len, limit, &ret); 345 memcpy(data.session_id,session_id,len); 361 && (ret=s->ctx->get_session_cb(s,session_id,le [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/regressions/ |
H A D | ssl-42-ciphers.c | 189 uint32_t session_id; member in struct:__anon5010 566 ssl_test_handle_create(uint32_t session_id, bool resume, bool server, bool client_side_auth, bool dh_anonymous, bool dtls, argument 571 handle->session_id = session_id; 617 uint32_t session_id = (k+1) << 16 | (i+1); local 618 //fprintf(stderr, "session_id: %d\n", session_id); 619 server = ssl_test_handle_create(session_id, (l == 1), true /*server*/, 622 client = ssl_test_handle_create(session_id, (l == 1), false/*client*/, 626 require_noerr(SSLSetPeerID(server->st, &session_id, sizeo [all...] |
/macosx-10.10/Security-57031.1.35/Security/tlsnke/tlsnketest/ |
H A D | st_test.c | 208 uint32_t session_id; member in struct:__anon5190 594 ssl_test_handle_create(uint32_t session_id, bool resume, bool server, bool client_side_auth, bool dh_anonymous, bool dtls, argument 599 handle->session_id = session_id; 708 uint32_t session_id = (c+1) << 16 | (i+1); local 709 //fprintf(stderr, "session_id: %d\n", session_id); 710 server = ssl_test_handle_create(session_id, (l == 1), true /*server*/, 713 client = ssl_test_handle_create(session_id, (l == 1), false/*client*/, 717 require_noerr(SSLSetPeerID(server->st, &session_id, sizeo [all...] |
/macosx-10.10/ppp-786.1.1/Drivers/L2TP/L2TP-extension/ |
H A D | l2tpk.h | 91 u_int16_t session_id; member in struct:l2tp_header
|
/macosx-10.10/ruby-106/ruby/lib/cgi/session/ |
H A D | pstore.rb | 48 id = session.session_id
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | ike_session.h | 76 ike_session_id_t session_id; member in struct:ike_session 128 extern ike_session_t * ike_session_create_session (ike_session_id_t *session_id);
|
H A D | plog.c | 417 plogsetsessioninfo (const char *session_id, argument 424 if (!session_id) { 427 gSessId = strdup(session_id); 435 gSessType = strdup(session_id);
|
H A D | plog.h | 138 void plogsetsessioninfo (const char *session_id,
|