/netbsd-6-1-5-RELEASE/external/bsd/libbind/dist/isc/ |
H A D | ctl_srvr.c | 69 #define address_expr ctl_sa_ntop((struct sockaddr *)&sess->sa, \ 120 LIST(struct ctl_sess) sess; member in struct:ctl_sctx 210 INIT_LIST(ctx->sess); 282 (*ctx->logger)(ctl_debug, "%s: ctx %p, sock %d, acID %p, sess %p", 283 me, ctx, ctx->sock, ctx->acID.opaque, ctx->sess); 292 for (this = HEAD(ctx->sess); this != NULL; this = next) { 304 ctl_response(struct ctl_sess *sess, u_int code, const char *text, argument 310 struct ctl_sctx *ctx = sess->ctx; 314 REQUIRE(sess->state == initializing || 315 sess 378 ctl_sendhelp(struct ctl_sess *sess, u_int code) argument 389 ctl_getcsctx(struct ctl_sess *sess) argument 394 ctl_setcsctx(struct ctl_sess *sess, void *csctx) argument 410 struct ctl_sess *sess = NULL; local 471 ctl_new_state(struct ctl_sess *sess, enum state new_state, const char *reason) argument 485 ctl_close(struct ctl_sess *sess) argument 523 ctl_start_read(struct ctl_sess *sess) argument 553 ctl_stop_read(struct ctl_sess *sess) argument 571 struct ctl_sess *sess = uap; local 633 struct ctl_sess *sess = uap; local 660 struct ctl_sess *sess = uap; local 681 ctl_docommand(struct ctl_sess *sess) argument 724 struct ctl_sess *sess = uap; local 762 ctl_morehelp(struct ctl_sctx *ctx, struct ctl_sess *sess, const struct ctl_verb *verb, const char *text, u_int respflags, const void *respctx, void *uctx) argument 782 ctl_signal_done(struct ctl_sctx *ctx, struct ctl_sess *sess) argument [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/libsaslc/dist/test/ |
H A D | t_session.c | 53 saslc_sess_t *sess; local 57 ATF_CHECK(sess = saslc_sess_init(ctx, "PLAIN", NULL)); 58 if (sess != NULL) 59 saslc_sess_end(sess); 60 ATF_CHECK_EQ(sess = saslc_sess_init(ctx, "", NULL), NULL); 61 ATF_CHECK(sess = saslc_sess_init(ctx, "NOTEXISTS,LOGIN", NULL)); 62 if (sess != NULL) 63 saslc_sess_end(sess); 64 ATF_CHECK(sess = saslc_sess_init(ctx, "LOGIN,NOTEXISTS", NULL)); 65 if (sess ! [all...] |
H A D | t_parser.c | 94 saslc_sess_t *sess; local 99 ATF_REQUIRE((sess = saslc_sess_init(ctx, "ANONYMOUS", NULL))); 100 ATF_REQUIRE(val = saslc_sess_getprop(sess, "TEST")); 102 ATF_REQUIRE(val = saslc_sess_getprop(sess, "TEST2")); 104 ATF_REQUIRE(val = saslc_sess_getprop(sess, "TEST3")); 106 ATF_REQUIRE(val = saslc_sess_getprop(sess, "ID")); 108 saslc_sess_end(sess);
|
H A D | example_client.c | 87 saslc_sess_t *sess; local 124 if ((sess = saslc_sess_init(ctx, mechanism, NULL)) == NULL) 141 if (saslc_sess_setprop(sess, option, var) < 0) 151 cont = saslc_sess_cont(sess, input, input_len, (void **)&output, 160 saslc_sess_end(sess); 170 errx(EXIT_FAILURE, "%s", saslc_sess_strerror(sess));
|
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/gcc.c-torture/execute/ |
H A D | 20021111-1.c | 6 int aim_callhandler(int sess, int conn, unsigned short family, unsigned short type); 8 int aim_callhandler(int sess, int conn, unsigned short family, unsigned short type) argument 24 return aim_callhandler(sess, conn, family, (unsigned short) 0xffff);
|
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/testsuite/gcc.c-torture/execute/ |
H A D | 20021111-1.c | 6 int aim_callhandler(int sess, int conn, unsigned short family, unsigned short type); 8 int aim_callhandler(int sess, int conn, unsigned short family, unsigned short type) argument 24 return aim_callhandler(sess, conn, family, (unsigned short) 0xffff);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/libsaslc/dist/src/ |
H A D | mech_plain.c | 62 * @param sess sasl session 73 saslc__mech_plain_cont(saslc_sess_t *sess, const void *in __unused, argument 80 authzid = saslc_sess_getprop(sess, SASLC_PLAIN_AUTHZID); 82 saslc__error_set(ERR(sess), ERROR_MECH, 87 if ((authcid = saslc_sess_getprop(sess, SASLC_PLAIN_AUTHCID)) 89 saslc__error_set(ERR(sess), ERROR_MECH, 94 saslc__error_set(ERR(sess), ERROR_MECH, 99 if ((passwd = saslc_sess_getprop(sess, SASLC_PLAIN_PASSWD)) 101 saslc__error_set(ERR(sess), ERROR_MECH, 106 saslc__error_set(ERR(sess), ERROR_MEC [all...] |
H A D | xsess.c | 234 saslc_sess_t *sess; local 238 if ((sess = calloc(1, sizeof(*sess))) == NULL) { 244 if ((sess->mech = saslc__sess_choose_mech(ctx, mechs, sec_opts)) 249 m = saslc__mech_list_get(ctx->mechanisms, sess->mech->name); 257 if (sess->mech->create(sess) == -1) 261 if ((sess->prop = saslc__dict_create()) == NULL) { 266 sess->context = ctx; 269 saslc__msg_dbg("mechanism: %s\n", saslc_sess_getmech(sess)); 283 saslc_sess_end(saslc_sess_t *sess) argument 301 saslc_sess_setprop(saslc_sess_t *sess, const char *key, const char *value) argument 340 saslc_sess_getprop(saslc_sess_t *sess, const char *key) argument 375 saslc__sess_get_flags(saslc_sess_t *sess) argument 409 saslc_sess_cont(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument 489 saslc__sess_copyout(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument 528 saslc__sess_xxcode(saslc_sess_t *sess, saslc__mech_xxcode_t xxcode, const void *in, size_t inlen, void **out, size_t *outlen) argument 605 saslc_sess_encode(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument 626 saslc_sess_decode(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument 640 saslc_sess_strerror(saslc_sess_t *sess) argument 652 saslc_sess_getmech(saslc_sess_t *sess) argument [all...] |
H A D | mech_crammd5.c | 60 * @param sess sasl session 70 saslc__mech_crammd5_cont(saslc_sess_t *sess, const void *in, size_t inlen, argument 83 if ((authcid = saslc_sess_getprop(sess, SASLC_CRAMMD5_AUTHCID)) 85 saslc__error_set(ERR(sess), ERROR_MECH, 89 if ((passwd = saslc_sess_getprop(sess, SASLC_CRAMMD5_PASSWD)) 91 saslc__error_set(ERR(sess), ERROR_MECH, 98 saslc__error_set_errno(ERR(sess), ERROR_NOMEM); 102 saslc__error_set_errno(ERR(sess), ERROR_NOMEM);
|
H A D | mech_gssapi.c | 91 * @param sess sasl session 95 saslc__mech_gssapi_create(saslc_sess_t *sess) argument 99 c = sess->mech_sess = calloc(1, sizeof(*c)); 103 sess->mech_sess = c; 115 * @param sess sasl session 119 saslc__mech_gssapi_destroy(saslc_sess_t *sess) argument 124 ms = sess->mech_sess; 136 sess->mech_sess = NULL; 186 * @param sess the session 193 saslc__mech_gssapi_set_err(saslc_sess_t *sess, in argument 210 prep_output(saslc_sess_t *sess, gss_buffer_t outbuf, void **out, size_t *outlen) argument 249 prep_packet(saslc_sess_t *sess, gss_buffer_t outbuf, void **out, size_t *outlen) argument 300 saslc__mech_gssapi_encode(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument 353 saslc__mech_gssapi_decode(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument 405 get_service(saslc_sess_t *sess, gss_name_t *service) argument 453 init_sec_context(saslc_sess_t *sess, gss_buffer_t inbuf, gss_buffer_t outbuf) argument 504 unwrap_input_token(saslc_sess_t *sess, gss_buffer_t inbuf) argument 568 wrap_output_token(saslc_sess_t *sess, gss_buffer_t outbuf) argument 637 choose_qop(saslc_sess_t *sess, uint32_t qop_flags) argument 676 wrap_size_limit(saslc_sess_t *sess, OM_uint32 maxbuf) argument 715 set_maxbufs(saslc_sess_t *sess) argument 761 saslc__mech_gssapi_cont(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument [all...] |
H A D | mech_login.c | 57 * @param sess sasl session 68 saslc__mech_login_cont(saslc_sess_t *sess, const void *in __unused, argument 71 saslc__mech_sess_t *ms = sess->mech_sess; 75 if (saslc__mech_strdup(sess, (char **)out, outlen, 82 return saslc__mech_strdup(sess, (char **)out, outlen,
|
H A D | mech_anonymous.c | 56 * @param sess sasl session 68 saslc__mech_anonymous_cont(saslc_sess_t *sess, const void *in, size_t inlen, argument 72 return saslc__mech_strdup(sess, (char **)out, outlen,
|
H A D | mech_external.c | 53 * @param sess sasl session 64 saslc__mech_external_cont(saslc_sess_t *sess, const void *in, size_t inlen, argument 68 return saslc__mech_strdup(sess, (char **)out, outlen,
|
H A D | mech.c | 170 * @param sess sasl session 179 saslc__mech_strdup(saslc_sess_t *sess, char **out, size_t *outlen, argument 185 if ((value = saslc_sess_getprop(sess, name)) == NULL) { 186 saslc__error_set(ERR(sess), ERROR_MECH, error_msg); 193 saslc__error_set_errno(ERR(sess), ERROR_NOMEM); 208 saslc__mech_generic_create(saslc_sess_t *sess) argument 213 saslc__error_set(ERR(sess), ERROR_NOMEM, NULL); 216 sess->mech_sess = ms; 226 saslc__mech_generic_destroy(saslc_sess_t *sess) argument 229 free(sess [all...] |
H A D | mech_digestmd5.c | 207 saslc_sess_t *sess; /* session: for error setting */ member in struct:coder_context_t 722 saslc__mech_digestmd5_digesturi(saslc_sess_t *sess, const char *serv_host) argument 730 serv_type = saslc_sess_getprop(sess, SASLC_DIGESTMD5_SERVICE); 732 saslc__error_set(ERR(sess), ERROR_MECH, 736 serv_list = saslc_sess_getprop(sess, SASLC_DIGESTMD5_SERVNAME); 769 saslc__error_set_errno(ERR(sess), ERROR_NOMEM); 853 * @param sess the session context 859 choose_realm(saslc_sess_t *sess, const char *hostname, list_t *realms) argument 874 user_realms = saslc_sess_getprop(sess, SASLC_DIGESTMD5_REALM); 887 saslc__error_set(ERR(sess), ERROR_MEC 1005 cipher_context_create(saslc_sess_t *sess, cipher_t cipher, int do_enc, uint8_t *key) argument 1380 saslc__mech_digestmd5_encode(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument 1424 saslc__mech_digestmd5_decode(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument 1463 choose_qop(saslc_sess_t *sess, uint32_t qop_flags) argument 1507 choose_cipher(saslc_sess_t *sess, unsigned int cipher_flags) argument 1591 saslc__mech_digestmd5_parse_challenge(saslc_sess_t *sess, const char *challenge) argument 1870 saslc__mech_digestmd5_create(saslc_sess_t *sess) argument 1914 saslc__mech_digestmd5_destroy(saslc_sess_t *sess) argument 1949 saslc__mech_digestmd5_response_data(saslc_sess_t *sess) argument 2104 init_coder_context(saslc_sess_t *sess) argument 2175 saslc__mech_digestmd5_reply(saslc_sess_t *sess, char *response) argument 2262 saslc__mech_digestmd5_cont(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument [all...] |
H A D | buffer.c | 58 saslc_sess_t *sess; /* session pointer (for error messages) */ member in struct:saslc__buffer_context_t 82 saslc_sess_t *sess; /* session pointer (for error messages) */ member in struct:saslc__buffer32_context_t 112 * @param sess saslc session 117 saslc__buffer_create(saslc_sess_t *sess, size_t maxbuf) argument 125 saslc__error_set_errno(ERR(sess), ERROR_NOMEM); 132 ctx->sess = sess; 181 saslc__error_set(ERR(ctx->sess), ERROR_MECH, "buffer coding error"); 212 * @param sess saslc session 217 saslc__buffer32_create(saslc_sess_t *sess, size_ argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/iscsi/dist/src/lib/ |
H A D | target.c | 123 get_iqn(target_session_t *sess, uint32_t t, char *buf, size_t size) argument 127 targv = sess->target->lunv; 133 iscsi_target_getvar(sess->target, "iqn"), 139 reject_t(target_session_t * sess, uint8_t *header, uint8_t reason) argument 147 reject.StatSN = ++(sess->StatSN); 148 reject.ExpCmdSN = sess->ExpCmdSN; 149 reject.MaxCmdSN = sess->MaxCmdSN; 157 if (iscsi_sock_send_header_and_data(sess->sock, rsp_header, 168 scsi_command_t(target_session_t *sess, uint8_t *header) argument 190 sess 526 task_command_t(target_session_t * sess, uint8_t *header) argument 599 nop_out_t(target_session_t * sess, uint8_t *header) argument 675 text_command_t(target_session_t * sess, uint8_t *header) argument 858 find_target_iqn(target_session_t *sess) argument 895 login_command_t(target_session_t * sess, uint8_t *header) argument 1201 logout_command_t(target_session_t * sess, uint8_t *header) argument 1290 verify_cmd_t(target_session_t * sess, uint8_t *header) argument 1340 execute_t(target_session_t *sess, uint8_t *header) argument 1426 target_session_t *sess = (target_session_t *) arg; local 1551 read_data_pdu(target_session_t * sess, iscsi_write_data_t * data, iscsi_scsi_cmd_args_t * args) argument 1602 target_transfer_data(target_session_t * sess, iscsi_scsi_cmd_args_t * args, struct iovec * sg, int sg_len) argument 2014 target_session_t *sess; local 2092 target_session_t *sess; local [all...] |
H A D | initiator.c | 164 dump_session(initiator_session_t * sess) 169 for (ip = sess->params ; ip ; ip = ip->next) { 195 session_init_i(initiator_session_t ** sess, uint64_t isid) argument 207 if ((*sess = iscsi_queue_remove(&g_session_q)) == NULL) { 211 s = *sess; 329 session_destroy_i(initiator_session_t * sess) argument 332 uint64_t isid = sess->isid; 334 if (sess == NULL) { 338 if (g_target[(int)sess->isid].has_session == 0) { 340 "g_target[%" PRIu64 "].has_session==0??\n", sess 465 params_out(initiator_session_t * sess, char *text, int *len, int textsize, int sess_type, int security) argument 507 full_feature_negotiation_phase_i(initiator_session_t * sess, char *text, int text_len) argument 689 initiator_session_t *sess = g_target[target].sess; local 709 initiator_session_t *sess; local 858 full_feature_phase(initiator_session_t * sess) argument 894 initiator_session_t *sess = NULL; local 1006 initiator_session_t *sess; local 1092 initiator_session_t *sess; local 1167 initiator_session_t *sess; local 1232 initiator_session_t *sess; local 1388 initiator_session_t *sess = g_target[me->id].sess; local 1630 initiator_session_t *sess = (initiator_session_t *) arg; local 1786 initiator_session_t *sess; local 1824 initiator_session_t *sess; local 1857 logout_phase_i(initiator_session_t * sess) argument 1943 login_phase_i(initiator_session_t * sess, char *text, int text_len) argument 2062 text_response_i(initiator_session_t * sess, initiator_cmd_t * cmd, uint8_t *header) argument 2190 login_response_i(initiator_session_t * sess, initiator_cmd_t * cmd, uint8_t *header) argument 2376 initiator_session_t *sess; local 2409 logout_response_i(initiator_session_t * sess, initiator_cmd_t * cmd, uint8_t *header) argument 2483 initiator_session_t *sess; local 2536 initiator_session_t *sess; local 2805 reject_i(initiator_session_t * sess, uint8_t *header) argument 2866 async_msg_i(initiator_session_t * sess, uint8_t *header) argument 2925 nop_in_i(initiator_session_t * sess, initiator_cmd_t * cmd, uint8_t *header) argument 3061 scsi_r2t_i(initiator_session_t * sess, initiator_cmd_t * cmd, uint8_t *header) argument 3227 scsi_response_i(initiator_session_t * sess, initiator_cmd_t * cmd, uint8_t *header) argument 3393 scsi_read_data_i(initiator_session_t * sess, initiator_cmd_t * cmd, uint8_t *header) argument 3606 initiator_session_t *sess; local 3709 initiator_session_t *sess = NULL; local [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/ |
H A D | tsp_auth.c | 612 authsess_do_dsap(struct authsess *sess) argument 616 if ((result = TCS_API(sess->tspContext)->DSAP(sess->tspContext, sess->entity_type, 617 sess->obj_parent, &sess->nonceOddxSAP, 618 sess->entityValueSize, sess->entityValue, 619 &sess->pAuth->AuthHandle, 620 &sess 648 authsess_do_osap(struct authsess *sess) argument 698 struct authsess *sess = (struct authsess *)lpAppData; local 738 struct authsess *sess = (struct authsess *)lpAppData; local 781 struct authsess *sess; local 1036 authsess_xsap_hmac(struct authsess *sess, TPM_DIGEST *digest) argument 1075 authsess_xsap_verify(struct authsess *sess, TPM_DIGEST *digest) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/radius/ |
H A D | radius_server.c | 350 struct radius_session *sess = client->sessions; local 352 while (sess) { 353 if (sess->sess_id == sess_id) { 356 sess = sess->next; 359 return sess; 364 struct radius_session *sess) 366 eloop_cancel_timeout(radius_server_session_timeout, data, sess); 367 eloop_cancel_timeout(radius_server_session_remove_timeout, data, sess); 368 eap_server_sm_deinit(sess 363 radius_server_session_free(struct radius_server_data *data, struct radius_session *sess) argument 377 radius_server_session_remove(struct radius_server_data *data, struct radius_session *sess) argument 407 struct radius_session *sess = timeout_ctx; local 416 struct radius_session *sess = timeout_ctx; local 427 struct radius_session *sess; local 459 struct radius_session *sess; local 527 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument 673 struct radius_session *sess; local 1448 struct radius_session *sess = ctx; local 1458 struct radius_session *sess = ctx; local 1483 struct radius_session *s, *sess = NULL; local [all...] |
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/xsasl/ |
H A D | xsasl_saslc_client.c | 97 saslc_sess_t *sess; /* session context */ member in struct:__anon2544 113 setprop(saslc_sess_t *sess, int overwrite, const char *key, const char *value) argument 117 saslc_sess_getprop(sess, key) == NULL) 118 saslc_sess_setprop(sess, key, value); 144 client->sess = saslc_sess_init(client->saslc, mechanism_list, 146 if (client->sess == NULL) { 150 mech = saslc_sess_getmech(client->sess); 156 setprop(client->sess, 0, SASLC_PROP_AUTHCID, username); 157 setprop(client->sess, 1, SASLC_PROP_PASSWD, password); 158 setprop(client->sess, [all...] |
/netbsd-6-1-5-RELEASE/sbin/iscsid/ |
H A D | iscsid_lists.c | 50 verify_session(session_t * sess) 55 for (curr = sess->connections.tqh_first; curr != NULL && !nosess; curr = next) { 60 if (!nosess && sess->num_connections) 63 TAILQ_REMOVE(&list[SESSION_LIST].list, &sess->entry, link); 66 while ((curr = TAILQ_FIRST(&sess->connections)) != NULL) { 67 TAILQ_REMOVE(&sess->connections, curr, link); 70 free(sess); 513 session_t *sess; local 542 sess = (session_t *)(void *)curr; 543 conn = (connection_t *)(void *)TAILQ_FIRST(&sess 574 session_t *sess; local 628 session_t *sess; local 878 session_t *sess; local 926 session_t *sess; local [all...] |
H A D | iscsid_driverif.c | 165 * sess The associated session. NULL for a send_targets request. 180 make_connection(session_t * sess, iscsid_login_req_t * req, argument 195 DEB(9, ("Make Connection sess=%p, req=%p, res=%p, stid=%p\n", 196 sess, req, res, stid)); 217 if (!sess->num_connections || 219 sess->target.sid.id)) == NULL)) { 232 if (!sess->num_connections) { 239 TAILQ_FIRST(&sess->connections); 263 if (sess->num_connections) 264 p = find_connection_name(sess, re 509 session_t *sess; local 614 session_t *sess; local 653 session_t *sess; local 682 session_t *sess; local 717 session_t *sess; local [all...] |
/netbsd-6-1-5-RELEASE/usr.bin/who/ |
H A D | utmpentry.h | 55 uint16_t sess; member in struct:utmpentry
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/engine/ |
H A D | eng_cryptodev.c | 246 struct session_op sess; local 253 memset(&sess, 0, sizeof(sess)); 254 sess.key = (void *)"123456789abcdefghijklmno"; 259 sess.cipher = ciphers[i].id; 260 sess.keylen = ciphers[i].keylen; 261 sess.mac = 0; 262 if (ioctl(fd, CIOCGSESSION, &sess) != -1 && 263 ioctl(fd, CIOCFSESSION, &sess.ses) != -1) 286 struct session_op sess; local 371 struct session_op *sess = &state->d_sess; local 424 struct session_op *sess = &state->d_sess; local 466 struct session_op *sess = &state->d_sess; local 680 struct session_op *sess = &state->d_sess; local 714 struct session_op *sess = &state->d_sess; local 760 struct session_op *sess = &state->d_sess; local 796 struct session_op *sess = &state->d_sess; local 828 struct session_op *sess; local [all...] |