Searched refs:session_id (Results 1 - 25 of 52) sorted by relevance

123

/macosx-10.9.5/ruby-104/ruby/lib/cgi/
H A Dsession.rb103 # responsible for extracting the session id from the session_id
156 attr_reader :session_id, :new_session
173 session_id = SecureRandom.hex(16)
183 session_id = md5.hexdigest
185 session_id
198 # session_id:: the session id to use. If not provided, then
205 # and if none currently exists and the +session_id+
248 session_id = option['session_id']
249 unless session_id
[all...]
/macosx-10.9.5/Heimdal-323.92.1/kcm/
H A Dsessions.c43 kcm_session_add(pid_t session_id) argument
45 kcm_log(1, "monitor session: %d\n", session_id);
/macosx-10.9.5/BerkeleyDB-21/db/docs_src/ref/am_misc/
H A Derror2.cs8 int session_id;
36 session_id);
/macosx-10.9.5/BerkeleyDB-21/db/docs_src/ref/env/
H A Derror2.cs10 int session_id;
22 session_id);
/macosx-10.9.5/xnu-2422.115.4/tools/lldbmacros/core/
H A Dcaching.py79 session_id = _GetDebuggerSessionID()
80 return session_id;
/macosx-10.9.5/smb-697.95.1/kernel/netsmb/
H A Dsmb_packets_2.h65 uint64_t session_id; member in struct:smb2_header
/macosx-10.9.5/OpenSSH-186/openssh/
H A Dkexdhc.c156 if (kex->session_id == NULL) {
158 kex->session_id = xmalloc(kex->session_id_len);
159 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexdhs.c144 if (kex->session_id == NULL) {
146 kex->session_id = xmalloc(kex->session_id_len);
147 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexecdhc.c152 if (kex->session_id == NULL) {
154 kex->session_id = xmalloc(kex->session_id_len);
155 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexecdhs.c138 if (kex->session_id == NULL) {
140 kex->session_id = xmalloc(kex->session_id_len);
141 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexgexc.c202 if (kex->session_id == NULL) {
204 kex->session_id = xmalloc(kex->session_id_len);
205 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexgexs.c187 if (kex->session_id == NULL) {
189 kex->session_id = xmalloc(kex->session_id_len);
190 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexgssc.c320 if (kex->session_id == NULL) {
322 kex->session_id = xmalloc(kex->session_id_len);
323 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dkexgsss.c250 if (kex->session_id == NULL) {
252 kex->session_id = xmalloc(kex->session_id_len);
253 memcpy(kex->session_id, hash, kex->session_id_len);
H A Dsshconnect1.c58 u_char session_id[16]; variable
122 if (!ssh_decrypt_challenge(auth, key, challenge, session_id, 1, response)) {
190 MD5_Update(&md, session_id, 16);
553 derive_ssh1_session_id(host_key->rsa->n, server_key->rsa->n, cookie, session_id);
583 if (BN_add_word(key, session_key[i] ^ session_id[i])
/macosx-10.9.5/ruby-104/ruby/test/cgi/
H A Dtest_cgi_session.rb43 # 'HTTP_COOKIE' => "_session_id=#{session_id}",
44 'QUERY_STRING' => "_session_id=#{session.session_id}",
81 # 'HTTP_COOKIE' => "_session_id=#{session_id}",
82 'QUERY_STRING' => "_session_id=#{session.session_id}",
107 session = CGI::Session.new(cgi,"tmpdir"=>@session_dir,"session_id"=>"foo")
112 assert_equal("foo",session.session_id)
113 #session_id=session.session_id
120 # 'HTTP_COOKIE' => "_session_id=#{session_id}",
121 'QUERY_STRING' => "_session_id=#{session.session_id}",
[all...]
/macosx-10.9.5/ppp-727.90.1/Drivers/L2TP/L2TP-plugin/
H A Dl2tp.c236 static int l2tp_send(int ctrlsockfd, u_int8_t* buf, int len, u_int16_t session_id, struct sockaddr *to, char *text);
318 if (ntohs(control_hdr->session_id) != our_params->session_id) {
320 our_params->session_id, ntohs(control_hdr->session_id));
323 if (peer_params->session_id == 0) {
330 SEND_PACKET(fd, control_buf, size, peer_params->session_id, 0, "ICCN");
381 if ((peer_params->session_id) == 0) {
388 SEND_PACKET(fd, control_buf, size, peer_params->session_id, 0, "ICRP");
395 if (ntohs(control_hdr->session_id) !
1415 l2tp_send(int fd, u_int8_t* buf, int len, u_int16_t session_id, struct sockaddr *to, char *text) argument
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/regressions/
H A Dssl-42-ciphers.c195 uint32_t session_id; member in struct:__anon4961
528 ssl_test_handle_create(uint32_t session_id, bool resume, bool server, bool client_side_auth, bool dh_anonymous, bool dtls, argument
533 handle->session_id = session_id;
579 uint32_t session_id = (k+1) << 16 | (i+1); local
580 //fprintf(stderr, "session_id: %d\n", session_id);
581 server = ssl_test_handle_create(session_id, (l == 1), true /*server*/,
584 client = ssl_test_handle_create(session_id, (l == 1), false/*client*/,
588 require_noerr(SSLSetPeerID(server->st, &session_id, sizeo
[all...]
/macosx-10.9.5/Security-55471.14.18/tlsnke/tlsnketest/
H A Dst_test.c192 uint32_t session_id; member in struct:__anon5135
578 ssl_test_handle_create(uint32_t session_id, bool resume, bool server, bool client_side_auth, bool dh_anonymous, bool dtls, argument
583 handle->session_id = session_id;
692 uint32_t session_id = (c+1) << 16 | (i+1); local
693 //fprintf(stderr, "session_id: %d\n", session_id);
694 server = ssl_test_handle_create(session_id, (l == 1), true /*server*/,
697 client = ssl_test_handle_create(session_id, (l == 1), false/*client*/,
701 require_noerr(SSLSetPeerID(server->st, &session_id, sizeo
[all...]
/macosx-10.9.5/ppp-727.90.1/Drivers/L2TP/L2TP-extension/
H A Dl2tpk.h91 u_int16_t session_id; member in struct:l2tp_header
/macosx-10.9.5/ruby-104/ruby/lib/cgi/session/
H A Dpstore.rb48 id = session.session_id
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/
H A Dike_session.h77 ike_session_id_t session_id; member in struct:ike_session
130 extern ike_session_t * ike_session_create_session (ike_session_id_t *session_id);
H A Dplog.c417 plogsetsessioninfo (const char *session_id, argument
424 if (!session_id) {
427 gSessId = strdup(session_id);
435 gSessType = strdup(session_id);
H A Dplog.h138 void plogsetsessioninfo (const char *session_id,
H A Dike_session.c95 memcpy(&session->session_id, id, sizeof(*id));
129 saddr2str((struct sockaddr *)&session->session_id.remote));
167 ike_session_create_session (ike_session_id_t *session_id) argument
169 if (!session_id)
172 plog(ASL_LEVEL_DEBUG, "New IKE Session to %s.\n", saddr2str((struct sockaddr *)&session_id->remote));
174 return new_ike_session(session_id);
260 saddr2str((struct sockaddr *)&p->session_id.remote));
265 saddr2str((struct sockaddr *)&p->session_id.remote),
275 if (memcmp(&p->session_id, &id, sizeof(id)) == 0) {
280 } else if (is_isakmp_remote_port && memcmp(&p->session_id,
[all...]

Completed in 429 milliseconds

123