/macosx-10.9.5/ruby-104/ruby/lib/cgi/ |
H A D | session.rb | 103 # responsible for extracting the session id from the session_id 156 attr_reader :session_id, :new_session 173 session_id = SecureRandom.hex(16) 183 session_id = md5.hexdigest 185 session_id 198 # session_id:: the session id to use. If not provided, then 205 # and if none currently exists and the +session_id+ 248 session_id = option['session_id'] 249 unless session_id [all...] |
/macosx-10.9.5/Heimdal-323.92.1/kcm/ |
H A D | sessions.c | 43 kcm_session_add(pid_t session_id) argument 45 kcm_log(1, "monitor session: %d\n", session_id);
|
/macosx-10.9.5/BerkeleyDB-21/db/docs_src/ref/am_misc/ |
H A D | error2.cs | 8 int session_id; 36 session_id);
|
/macosx-10.9.5/BerkeleyDB-21/db/docs_src/ref/env/ |
H A D | error2.cs | 10 int session_id; 22 session_id);
|
/macosx-10.9.5/xnu-2422.115.4/tools/lldbmacros/core/ |
H A D | caching.py | 79 session_id = _GetDebuggerSessionID() 80 return session_id;
|
/macosx-10.9.5/smb-697.95.1/kernel/netsmb/ |
H A D | smb_packets_2.h | 65 uint64_t session_id; member in struct:smb2_header
|
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | kexdhc.c | 156 if (kex->session_id == NULL) { 158 kex->session_id = xmalloc(kex->session_id_len); 159 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexdhs.c | 144 if (kex->session_id == NULL) { 146 kex->session_id = xmalloc(kex->session_id_len); 147 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexecdhc.c | 152 if (kex->session_id == NULL) { 154 kex->session_id = xmalloc(kex->session_id_len); 155 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexecdhs.c | 138 if (kex->session_id == NULL) { 140 kex->session_id = xmalloc(kex->session_id_len); 141 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexgexc.c | 202 if (kex->session_id == NULL) { 204 kex->session_id = xmalloc(kex->session_id_len); 205 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexgexs.c | 187 if (kex->session_id == NULL) { 189 kex->session_id = xmalloc(kex->session_id_len); 190 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexgssc.c | 320 if (kex->session_id == NULL) { 322 kex->session_id = xmalloc(kex->session_id_len); 323 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | kexgsss.c | 250 if (kex->session_id == NULL) { 252 kex->session_id = xmalloc(kex->session_id_len); 253 memcpy(kex->session_id, hash, kex->session_id_len);
|
H A D | sshconnect1.c | 58 u_char session_id[16]; variable 122 if (!ssh_decrypt_challenge(auth, key, challenge, session_id, 1, response)) { 190 MD5_Update(&md, session_id, 16); 553 derive_ssh1_session_id(host_key->rsa->n, server_key->rsa->n, cookie, session_id); 583 if (BN_add_word(key, session_key[i] ^ session_id[i])
|
/macosx-10.9.5/ruby-104/ruby/test/cgi/ |
H A D | test_cgi_session.rb | 43 # 'HTTP_COOKIE' => "_session_id=#{session_id}", 44 'QUERY_STRING' => "_session_id=#{session.session_id}", 81 # 'HTTP_COOKIE' => "_session_id=#{session_id}", 82 'QUERY_STRING' => "_session_id=#{session.session_id}", 107 session = CGI::Session.new(cgi,"tmpdir"=>@session_dir,"session_id"=>"foo") 112 assert_equal("foo",session.session_id) 113 #session_id=session.session_id 120 # 'HTTP_COOKIE' => "_session_id=#{session_id}", 121 'QUERY_STRING' => "_session_id=#{session.session_id}", [all...] |
/macosx-10.9.5/ppp-727.90.1/Drivers/L2TP/L2TP-plugin/ |
H A D | l2tp.c | 236 static int l2tp_send(int ctrlsockfd, u_int8_t* buf, int len, u_int16_t session_id, struct sockaddr *to, char *text); 318 if (ntohs(control_hdr->session_id) != our_params->session_id) { 320 our_params->session_id, ntohs(control_hdr->session_id)); 323 if (peer_params->session_id == 0) { 330 SEND_PACKET(fd, control_buf, size, peer_params->session_id, 0, "ICCN"); 381 if ((peer_params->session_id) == 0) { 388 SEND_PACKET(fd, control_buf, size, peer_params->session_id, 0, "ICRP"); 395 if (ntohs(control_hdr->session_id) ! 1415 l2tp_send(int fd, u_int8_t* buf, int len, u_int16_t session_id, struct sockaddr *to, char *text) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/regressions/ |
H A D | ssl-42-ciphers.c | 195 uint32_t session_id; member in struct:__anon4961 528 ssl_test_handle_create(uint32_t session_id, bool resume, bool server, bool client_side_auth, bool dh_anonymous, bool dtls, argument 533 handle->session_id = session_id; 579 uint32_t session_id = (k+1) << 16 | (i+1); local 580 //fprintf(stderr, "session_id: %d\n", session_id); 581 server = ssl_test_handle_create(session_id, (l == 1), true /*server*/, 584 client = ssl_test_handle_create(session_id, (l == 1), false/*client*/, 588 require_noerr(SSLSetPeerID(server->st, &session_id, sizeo [all...] |
/macosx-10.9.5/Security-55471.14.18/tlsnke/tlsnketest/ |
H A D | st_test.c | 192 uint32_t session_id; member in struct:__anon5135 578 ssl_test_handle_create(uint32_t session_id, bool resume, bool server, bool client_side_auth, bool dh_anonymous, bool dtls, argument 583 handle->session_id = session_id; 692 uint32_t session_id = (c+1) << 16 | (i+1); local 693 //fprintf(stderr, "session_id: %d\n", session_id); 694 server = ssl_test_handle_create(session_id, (l == 1), true /*server*/, 697 client = ssl_test_handle_create(session_id, (l == 1), false/*client*/, 701 require_noerr(SSLSetPeerID(server->st, &session_id, sizeo [all...] |
/macosx-10.9.5/ppp-727.90.1/Drivers/L2TP/L2TP-extension/ |
H A D | l2tpk.h | 91 u_int16_t session_id; member in struct:l2tp_header
|
/macosx-10.9.5/ruby-104/ruby/lib/cgi/session/ |
H A D | pstore.rb | 48 id = session.session_id
|
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/ |
H A D | ike_session.h | 77 ike_session_id_t session_id; member in struct:ike_session 130 extern ike_session_t * ike_session_create_session (ike_session_id_t *session_id);
|
H A D | plog.c | 417 plogsetsessioninfo (const char *session_id, argument 424 if (!session_id) { 427 gSessId = strdup(session_id); 435 gSessType = strdup(session_id);
|
H A D | plog.h | 138 void plogsetsessioninfo (const char *session_id,
|
H A D | ike_session.c | 95 memcpy(&session->session_id, id, sizeof(*id)); 129 saddr2str((struct sockaddr *)&session->session_id.remote)); 167 ike_session_create_session (ike_session_id_t *session_id) argument 169 if (!session_id) 172 plog(ASL_LEVEL_DEBUG, "New IKE Session to %s.\n", saddr2str((struct sockaddr *)&session_id->remote)); 174 return new_ike_session(session_id); 260 saddr2str((struct sockaddr *)&p->session_id.remote)); 265 saddr2str((struct sockaddr *)&p->session_id.remote), 275 if (memcmp(&p->session_id, &id, sizeof(id)) == 0) { 280 } else if (is_isakmp_remote_port && memcmp(&p->session_id, [all...] |