Searched refs:sess (Results 1 - 25 of 67) sorted by relevance

123

/netbsd-6-1-5-RELEASE/external/bsd/libbind/dist/isc/
H A Dctl_srvr.c69 #define address_expr ctl_sa_ntop((struct sockaddr *)&sess->sa, \
120 LIST(struct ctl_sess) sess; member in struct:ctl_sctx
210 INIT_LIST(ctx->sess);
282 (*ctx->logger)(ctl_debug, "%s: ctx %p, sock %d, acID %p, sess %p",
283 me, ctx, ctx->sock, ctx->acID.opaque, ctx->sess);
292 for (this = HEAD(ctx->sess); this != NULL; this = next) {
304 ctl_response(struct ctl_sess *sess, u_int code, const char *text, argument
310 struct ctl_sctx *ctx = sess->ctx;
314 REQUIRE(sess->state == initializing ||
315 sess
378 ctl_sendhelp(struct ctl_sess *sess, u_int code) argument
389 ctl_getcsctx(struct ctl_sess *sess) argument
394 ctl_setcsctx(struct ctl_sess *sess, void *csctx) argument
410 struct ctl_sess *sess = NULL; local
471 ctl_new_state(struct ctl_sess *sess, enum state new_state, const char *reason) argument
485 ctl_close(struct ctl_sess *sess) argument
523 ctl_start_read(struct ctl_sess *sess) argument
553 ctl_stop_read(struct ctl_sess *sess) argument
571 struct ctl_sess *sess = uap; local
633 struct ctl_sess *sess = uap; local
660 struct ctl_sess *sess = uap; local
681 ctl_docommand(struct ctl_sess *sess) argument
724 struct ctl_sess *sess = uap; local
762 ctl_morehelp(struct ctl_sctx *ctx, struct ctl_sess *sess, const struct ctl_verb *verb, const char *text, u_int respflags, const void *respctx, void *uctx) argument
782 ctl_signal_done(struct ctl_sctx *ctx, struct ctl_sess *sess) argument
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/libsaslc/dist/test/
H A Dt_session.c53 saslc_sess_t *sess; local
57 ATF_CHECK(sess = saslc_sess_init(ctx, "PLAIN", NULL));
58 if (sess != NULL)
59 saslc_sess_end(sess);
60 ATF_CHECK_EQ(sess = saslc_sess_init(ctx, "", NULL), NULL);
61 ATF_CHECK(sess = saslc_sess_init(ctx, "NOTEXISTS,LOGIN", NULL));
62 if (sess != NULL)
63 saslc_sess_end(sess);
64 ATF_CHECK(sess = saslc_sess_init(ctx, "LOGIN,NOTEXISTS", NULL));
65 if (sess !
[all...]
H A Dt_parser.c94 saslc_sess_t *sess; local
99 ATF_REQUIRE((sess = saslc_sess_init(ctx, "ANONYMOUS", NULL)));
100 ATF_REQUIRE(val = saslc_sess_getprop(sess, "TEST"));
102 ATF_REQUIRE(val = saslc_sess_getprop(sess, "TEST2"));
104 ATF_REQUIRE(val = saslc_sess_getprop(sess, "TEST3"));
106 ATF_REQUIRE(val = saslc_sess_getprop(sess, "ID"));
108 saslc_sess_end(sess);
H A Dexample_client.c87 saslc_sess_t *sess; local
124 if ((sess = saslc_sess_init(ctx, mechanism, NULL)) == NULL)
141 if (saslc_sess_setprop(sess, option, var) < 0)
151 cont = saslc_sess_cont(sess, input, input_len, (void **)&output,
160 saslc_sess_end(sess);
170 errx(EXIT_FAILURE, "%s", saslc_sess_strerror(sess));
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/gcc.c-torture/execute/
H A D20021111-1.c6 int aim_callhandler(int sess, int conn, unsigned short family, unsigned short type);
8 int aim_callhandler(int sess, int conn, unsigned short family, unsigned short type) argument
24 return aim_callhandler(sess, conn, family, (unsigned short) 0xffff);
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/testsuite/gcc.c-torture/execute/
H A D20021111-1.c6 int aim_callhandler(int sess, int conn, unsigned short family, unsigned short type);
8 int aim_callhandler(int sess, int conn, unsigned short family, unsigned short type) argument
24 return aim_callhandler(sess, conn, family, (unsigned short) 0xffff);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/libsaslc/dist/src/
H A Dmech_plain.c62 * @param sess sasl session
73 saslc__mech_plain_cont(saslc_sess_t *sess, const void *in __unused, argument
80 authzid = saslc_sess_getprop(sess, SASLC_PLAIN_AUTHZID);
82 saslc__error_set(ERR(sess), ERROR_MECH,
87 if ((authcid = saslc_sess_getprop(sess, SASLC_PLAIN_AUTHCID))
89 saslc__error_set(ERR(sess), ERROR_MECH,
94 saslc__error_set(ERR(sess), ERROR_MECH,
99 if ((passwd = saslc_sess_getprop(sess, SASLC_PLAIN_PASSWD))
101 saslc__error_set(ERR(sess), ERROR_MECH,
106 saslc__error_set(ERR(sess), ERROR_MEC
[all...]
H A Dxsess.c234 saslc_sess_t *sess; local
238 if ((sess = calloc(1, sizeof(*sess))) == NULL) {
244 if ((sess->mech = saslc__sess_choose_mech(ctx, mechs, sec_opts))
249 m = saslc__mech_list_get(ctx->mechanisms, sess->mech->name);
257 if (sess->mech->create(sess) == -1)
261 if ((sess->prop = saslc__dict_create()) == NULL) {
266 sess->context = ctx;
269 saslc__msg_dbg("mechanism: %s\n", saslc_sess_getmech(sess));
283 saslc_sess_end(saslc_sess_t *sess) argument
301 saslc_sess_setprop(saslc_sess_t *sess, const char *key, const char *value) argument
340 saslc_sess_getprop(saslc_sess_t *sess, const char *key) argument
375 saslc__sess_get_flags(saslc_sess_t *sess) argument
409 saslc_sess_cont(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument
489 saslc__sess_copyout(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument
528 saslc__sess_xxcode(saslc_sess_t *sess, saslc__mech_xxcode_t xxcode, const void *in, size_t inlen, void **out, size_t *outlen) argument
605 saslc_sess_encode(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument
626 saslc_sess_decode(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument
640 saslc_sess_strerror(saslc_sess_t *sess) argument
652 saslc_sess_getmech(saslc_sess_t *sess) argument
[all...]
H A Dmech_crammd5.c60 * @param sess sasl session
70 saslc__mech_crammd5_cont(saslc_sess_t *sess, const void *in, size_t inlen, argument
83 if ((authcid = saslc_sess_getprop(sess, SASLC_CRAMMD5_AUTHCID))
85 saslc__error_set(ERR(sess), ERROR_MECH,
89 if ((passwd = saslc_sess_getprop(sess, SASLC_CRAMMD5_PASSWD))
91 saslc__error_set(ERR(sess), ERROR_MECH,
98 saslc__error_set_errno(ERR(sess), ERROR_NOMEM);
102 saslc__error_set_errno(ERR(sess), ERROR_NOMEM);
H A Dmech_gssapi.c91 * @param sess sasl session
95 saslc__mech_gssapi_create(saslc_sess_t *sess) argument
99 c = sess->mech_sess = calloc(1, sizeof(*c));
103 sess->mech_sess = c;
115 * @param sess sasl session
119 saslc__mech_gssapi_destroy(saslc_sess_t *sess) argument
124 ms = sess->mech_sess;
136 sess->mech_sess = NULL;
186 * @param sess the session
193 saslc__mech_gssapi_set_err(saslc_sess_t *sess, in argument
210 prep_output(saslc_sess_t *sess, gss_buffer_t outbuf, void **out, size_t *outlen) argument
249 prep_packet(saslc_sess_t *sess, gss_buffer_t outbuf, void **out, size_t *outlen) argument
300 saslc__mech_gssapi_encode(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument
353 saslc__mech_gssapi_decode(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument
405 get_service(saslc_sess_t *sess, gss_name_t *service) argument
453 init_sec_context(saslc_sess_t *sess, gss_buffer_t inbuf, gss_buffer_t outbuf) argument
504 unwrap_input_token(saslc_sess_t *sess, gss_buffer_t inbuf) argument
568 wrap_output_token(saslc_sess_t *sess, gss_buffer_t outbuf) argument
637 choose_qop(saslc_sess_t *sess, uint32_t qop_flags) argument
676 wrap_size_limit(saslc_sess_t *sess, OM_uint32 maxbuf) argument
715 set_maxbufs(saslc_sess_t *sess) argument
761 saslc__mech_gssapi_cont(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument
[all...]
H A Dmech_login.c57 * @param sess sasl session
68 saslc__mech_login_cont(saslc_sess_t *sess, const void *in __unused, argument
71 saslc__mech_sess_t *ms = sess->mech_sess;
75 if (saslc__mech_strdup(sess, (char **)out, outlen,
82 return saslc__mech_strdup(sess, (char **)out, outlen,
H A Dmech_anonymous.c56 * @param sess sasl session
68 saslc__mech_anonymous_cont(saslc_sess_t *sess, const void *in, size_t inlen, argument
72 return saslc__mech_strdup(sess, (char **)out, outlen,
H A Dmech_external.c53 * @param sess sasl session
64 saslc__mech_external_cont(saslc_sess_t *sess, const void *in, size_t inlen, argument
68 return saslc__mech_strdup(sess, (char **)out, outlen,
H A Dmech.c170 * @param sess sasl session
179 saslc__mech_strdup(saslc_sess_t *sess, char **out, size_t *outlen, argument
185 if ((value = saslc_sess_getprop(sess, name)) == NULL) {
186 saslc__error_set(ERR(sess), ERROR_MECH, error_msg);
193 saslc__error_set_errno(ERR(sess), ERROR_NOMEM);
208 saslc__mech_generic_create(saslc_sess_t *sess) argument
213 saslc__error_set(ERR(sess), ERROR_NOMEM, NULL);
216 sess->mech_sess = ms;
226 saslc__mech_generic_destroy(saslc_sess_t *sess) argument
229 free(sess
[all...]
H A Dmech_digestmd5.c207 saslc_sess_t *sess; /* session: for error setting */ member in struct:coder_context_t
722 saslc__mech_digestmd5_digesturi(saslc_sess_t *sess, const char *serv_host) argument
730 serv_type = saslc_sess_getprop(sess, SASLC_DIGESTMD5_SERVICE);
732 saslc__error_set(ERR(sess), ERROR_MECH,
736 serv_list = saslc_sess_getprop(sess, SASLC_DIGESTMD5_SERVNAME);
769 saslc__error_set_errno(ERR(sess), ERROR_NOMEM);
853 * @param sess the session context
859 choose_realm(saslc_sess_t *sess, const char *hostname, list_t *realms) argument
874 user_realms = saslc_sess_getprop(sess, SASLC_DIGESTMD5_REALM);
887 saslc__error_set(ERR(sess), ERROR_MEC
1005 cipher_context_create(saslc_sess_t *sess, cipher_t cipher, int do_enc, uint8_t *key) argument
1380 saslc__mech_digestmd5_encode(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument
1424 saslc__mech_digestmd5_decode(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument
1463 choose_qop(saslc_sess_t *sess, uint32_t qop_flags) argument
1507 choose_cipher(saslc_sess_t *sess, unsigned int cipher_flags) argument
1591 saslc__mech_digestmd5_parse_challenge(saslc_sess_t *sess, const char *challenge) argument
1870 saslc__mech_digestmd5_create(saslc_sess_t *sess) argument
1914 saslc__mech_digestmd5_destroy(saslc_sess_t *sess) argument
1949 saslc__mech_digestmd5_response_data(saslc_sess_t *sess) argument
2104 init_coder_context(saslc_sess_t *sess) argument
2175 saslc__mech_digestmd5_reply(saslc_sess_t *sess, char *response) argument
2262 saslc__mech_digestmd5_cont(saslc_sess_t *sess, const void *in, size_t inlen, void **out, size_t *outlen) argument
[all...]
H A Dbuffer.c58 saslc_sess_t *sess; /* session pointer (for error messages) */ member in struct:saslc__buffer_context_t
82 saslc_sess_t *sess; /* session pointer (for error messages) */ member in struct:saslc__buffer32_context_t
112 * @param sess saslc session
117 saslc__buffer_create(saslc_sess_t *sess, size_t maxbuf) argument
125 saslc__error_set_errno(ERR(sess), ERROR_NOMEM);
132 ctx->sess = sess;
181 saslc__error_set(ERR(ctx->sess), ERROR_MECH, "buffer coding error");
212 * @param sess saslc session
217 saslc__buffer32_create(saslc_sess_t *sess, size_ argument
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/iscsi/dist/src/lib/
H A Dtarget.c123 get_iqn(target_session_t *sess, uint32_t t, char *buf, size_t size) argument
127 targv = sess->target->lunv;
133 iscsi_target_getvar(sess->target, "iqn"),
139 reject_t(target_session_t * sess, uint8_t *header, uint8_t reason) argument
147 reject.StatSN = ++(sess->StatSN);
148 reject.ExpCmdSN = sess->ExpCmdSN;
149 reject.MaxCmdSN = sess->MaxCmdSN;
157 if (iscsi_sock_send_header_and_data(sess->sock, rsp_header,
168 scsi_command_t(target_session_t *sess, uint8_t *header) argument
190 sess
526 task_command_t(target_session_t * sess, uint8_t *header) argument
599 nop_out_t(target_session_t * sess, uint8_t *header) argument
675 text_command_t(target_session_t * sess, uint8_t *header) argument
858 find_target_iqn(target_session_t *sess) argument
895 login_command_t(target_session_t * sess, uint8_t *header) argument
1201 logout_command_t(target_session_t * sess, uint8_t *header) argument
1290 verify_cmd_t(target_session_t * sess, uint8_t *header) argument
1340 execute_t(target_session_t *sess, uint8_t *header) argument
1426 target_session_t *sess = (target_session_t *) arg; local
1551 read_data_pdu(target_session_t * sess, iscsi_write_data_t * data, iscsi_scsi_cmd_args_t * args) argument
1602 target_transfer_data(target_session_t * sess, iscsi_scsi_cmd_args_t * args, struct iovec * sg, int sg_len) argument
2014 target_session_t *sess; local
2092 target_session_t *sess; local
[all...]
H A Dinitiator.c164 dump_session(initiator_session_t * sess)
169 for (ip = sess->params ; ip ; ip = ip->next) {
195 session_init_i(initiator_session_t ** sess, uint64_t isid) argument
207 if ((*sess = iscsi_queue_remove(&g_session_q)) == NULL) {
211 s = *sess;
329 session_destroy_i(initiator_session_t * sess) argument
332 uint64_t isid = sess->isid;
334 if (sess == NULL) {
338 if (g_target[(int)sess->isid].has_session == 0) {
340 "g_target[%" PRIu64 "].has_session==0??\n", sess
465 params_out(initiator_session_t * sess, char *text, int *len, int textsize, int sess_type, int security) argument
507 full_feature_negotiation_phase_i(initiator_session_t * sess, char *text, int text_len) argument
689 initiator_session_t *sess = g_target[target].sess; local
709 initiator_session_t *sess; local
858 full_feature_phase(initiator_session_t * sess) argument
894 initiator_session_t *sess = NULL; local
1006 initiator_session_t *sess; local
1092 initiator_session_t *sess; local
1167 initiator_session_t *sess; local
1232 initiator_session_t *sess; local
1388 initiator_session_t *sess = g_target[me->id].sess; local
1630 initiator_session_t *sess = (initiator_session_t *) arg; local
1786 initiator_session_t *sess; local
1824 initiator_session_t *sess; local
1857 logout_phase_i(initiator_session_t * sess) argument
1943 login_phase_i(initiator_session_t * sess, char *text, int text_len) argument
2062 text_response_i(initiator_session_t * sess, initiator_cmd_t * cmd, uint8_t *header) argument
2190 login_response_i(initiator_session_t * sess, initiator_cmd_t * cmd, uint8_t *header) argument
2376 initiator_session_t *sess; local
2409 logout_response_i(initiator_session_t * sess, initiator_cmd_t * cmd, uint8_t *header) argument
2483 initiator_session_t *sess; local
2536 initiator_session_t *sess; local
2805 reject_i(initiator_session_t * sess, uint8_t *header) argument
2866 async_msg_i(initiator_session_t * sess, uint8_t *header) argument
2925 nop_in_i(initiator_session_t * sess, initiator_cmd_t * cmd, uint8_t *header) argument
3061 scsi_r2t_i(initiator_session_t * sess, initiator_cmd_t * cmd, uint8_t *header) argument
3227 scsi_response_i(initiator_session_t * sess, initiator_cmd_t * cmd, uint8_t *header) argument
3393 scsi_read_data_i(initiator_session_t * sess, initiator_cmd_t * cmd, uint8_t *header) argument
3606 initiator_session_t *sess; local
3709 initiator_session_t *sess = NULL; local
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/
H A Dtsp_auth.c612 authsess_do_dsap(struct authsess *sess) argument
616 if ((result = TCS_API(sess->tspContext)->DSAP(sess->tspContext, sess->entity_type,
617 sess->obj_parent, &sess->nonceOddxSAP,
618 sess->entityValueSize, sess->entityValue,
619 &sess->pAuth->AuthHandle,
620 &sess
648 authsess_do_osap(struct authsess *sess) argument
698 struct authsess *sess = (struct authsess *)lpAppData; local
738 struct authsess *sess = (struct authsess *)lpAppData; local
781 struct authsess *sess; local
1036 authsess_xsap_hmac(struct authsess *sess, TPM_DIGEST *digest) argument
1075 authsess_xsap_verify(struct authsess *sess, TPM_DIGEST *digest) argument
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/radius/
H A Dradius_server.c350 struct radius_session *sess = client->sessions; local
352 while (sess) {
353 if (sess->sess_id == sess_id) {
356 sess = sess->next;
359 return sess;
364 struct radius_session *sess)
366 eloop_cancel_timeout(radius_server_session_timeout, data, sess);
367 eloop_cancel_timeout(radius_server_session_remove_timeout, data, sess);
368 eap_server_sm_deinit(sess
363 radius_server_session_free(struct radius_server_data *data, struct radius_session *sess) argument
377 radius_server_session_remove(struct radius_server_data *data, struct radius_session *sess) argument
407 struct radius_session *sess = timeout_ctx; local
416 struct radius_session *sess = timeout_ctx; local
427 struct radius_session *sess; local
459 struct radius_session *sess; local
527 radius_server_encapsulate_eap(struct radius_server_data *data, struct radius_client *client, struct radius_session *sess, struct radius_msg *request) argument
673 struct radius_session *sess; local
1448 struct radius_session *sess = ctx; local
1458 struct radius_session *sess = ctx; local
1483 struct radius_session *s, *sess = NULL; local
[all...]
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/xsasl/
H A Dxsasl_saslc_client.c97 saslc_sess_t *sess; /* session context */ member in struct:__anon2544
113 setprop(saslc_sess_t *sess, int overwrite, const char *key, const char *value) argument
117 saslc_sess_getprop(sess, key) == NULL)
118 saslc_sess_setprop(sess, key, value);
144 client->sess = saslc_sess_init(client->saslc, mechanism_list,
146 if (client->sess == NULL) {
150 mech = saslc_sess_getmech(client->sess);
156 setprop(client->sess, 0, SASLC_PROP_AUTHCID, username);
157 setprop(client->sess, 1, SASLC_PROP_PASSWD, password);
158 setprop(client->sess,
[all...]
/netbsd-6-1-5-RELEASE/sbin/iscsid/
H A Discsid_lists.c50 verify_session(session_t * sess)
55 for (curr = sess->connections.tqh_first; curr != NULL && !nosess; curr = next) {
60 if (!nosess && sess->num_connections)
63 TAILQ_REMOVE(&list[SESSION_LIST].list, &sess->entry, link);
66 while ((curr = TAILQ_FIRST(&sess->connections)) != NULL) {
67 TAILQ_REMOVE(&sess->connections, curr, link);
70 free(sess);
513 session_t *sess; local
542 sess = (session_t *)(void *)curr;
543 conn = (connection_t *)(void *)TAILQ_FIRST(&sess
574 session_t *sess; local
628 session_t *sess; local
878 session_t *sess; local
926 session_t *sess; local
[all...]
H A Discsid_driverif.c165 * sess The associated session. NULL for a send_targets request.
180 make_connection(session_t * sess, iscsid_login_req_t * req, argument
195 DEB(9, ("Make Connection sess=%p, req=%p, res=%p, stid=%p\n",
196 sess, req, res, stid));
217 if (!sess->num_connections ||
219 sess->target.sid.id)) == NULL)) {
232 if (!sess->num_connections) {
239 TAILQ_FIRST(&sess->connections);
263 if (sess->num_connections)
264 p = find_connection_name(sess, re
509 session_t *sess; local
614 session_t *sess; local
653 session_t *sess; local
682 session_t *sess; local
717 session_t *sess; local
[all...]
/netbsd-6-1-5-RELEASE/usr.bin/who/
H A Dutmpentry.h55 uint16_t sess; member in struct:utmpentry
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/engine/
H A Deng_cryptodev.c246 struct session_op sess; local
253 memset(&sess, 0, sizeof(sess));
254 sess.key = (void *)"123456789abcdefghijklmno";
259 sess.cipher = ciphers[i].id;
260 sess.keylen = ciphers[i].keylen;
261 sess.mac = 0;
262 if (ioctl(fd, CIOCGSESSION, &sess) != -1 &&
263 ioctl(fd, CIOCFSESSION, &sess.ses) != -1)
286 struct session_op sess; local
371 struct session_op *sess = &state->d_sess; local
424 struct session_op *sess = &state->d_sess; local
466 struct session_op *sess = &state->d_sess; local
680 struct session_op *sess = &state->d_sess; local
714 struct session_op *sess = &state->d_sess; local
760 struct session_op *sess = &state->d_sess; local
796 struct session_op *sess = &state->d_sess; local
828 struct session_op *sess; local
[all...]

Completed in 134 milliseconds

123