/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/smbd/ |
H A D | dmapi.c | 82 static dm_sessid_t *realloc_session_list(dm_sessid_t * sessions, int count) argument 86 nsessions = TALLOC_REALLOC_ARRAY(NULL, sessions, dm_sessid_t, count); 88 TALLOC_FREE(sessions); 105 dm_sessid_t *sessions = NULL; local 121 if ((sessions = realloc_session_list(sessions, nsessions)) == NULL) { 125 err = dm_getall_sessions(nsessions, sessions, &nsessions); 133 ("failed to retrieve DMAPI sessions: %s\n", 135 TALLOC_FREE(sessions); 140 err = dm_query_session(sessions[ [all...] |
H A D | session.c | 27 sessions are used to populate utmp and PAM session structures 73 /* don't register sessions for the guest user - its just too 131 sessionid.id_num = i; /* Only valid for utmp sessions */ 233 struct sessionid *sessions; member in struct:session_list 244 sesslist->sessions = SMB_REALLOC_ARRAY(sesslist->sessions, struct sessionid, i+1); 245 if (!sesslist->sessions) { 250 memcpy(&sesslist->sessions[i], current, sizeof(struct sessionid)); 267 sesslist.sessions = NULL; 271 SAFE_FREE(sesslist.sessions); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/src/router/busybox-1.x/networking/ |
H A D | telnetd.c | 77 static struct tsession *sessions; variable in typeref:struct:tsession 306 struct tsession *t = sessions; 310 sessions = ts->next; 325 /* scan all sessions and find new maxfd */ 326 ts = sessions; 396 sessions = make_new_session(0, 1); 404 sessions = make_new_session(); 424 ts = sessions; 444 /* First check for and accept new sessions. */ 455 new_ts->next = sessions; [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/src/router/utelnetd/ |
H A D | utelnetd.c | 131 static struct tsession *sessions; variable in typeref:struct:tsession 362 struct tsession *t = sessions; 366 sessions = ts->next; 454 sessions = 0; 515 ts = sessions; 540 /* First check for and accept new sessions. */ 558 new_ts->next = sessions; 559 sessions = new_ts; 570 ts = sessions; 571 while (ts) { /* For all sessions [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | ssl_sess.c | 142 * very close to 2^128 (or 2^256) SSL sessions to our server. How you might 143 * store that many sessions is perhaps a more interesting question ... */ 160 * we could not prevent the concurrent creation of sessions 297 ret=(SSL_SESSION *)lh_retrieve(s->ctx->sessions,&data); 433 s=(SSL_SESSION *)lh_insert(ctx->sessions,c); 437 * ctx->sessions), or we're in trouble. */ 499 if ((r = (SSL_SESSION *)lh_retrieve(ctx->sessions,c)) == c) 502 r=(SSL_SESSION *)lh_delete(ctx->sessions,c); 689 tp.cache=s->sessions;
|
H A D | ssl_lib.c | 411 p = (SSL_SESSION *)lh_retrieve(ssl->ctx->sessions, &r); 996 return ctx->sessions; 1037 return(ctx->sessions->num_items); 1412 ret->sessions=lh_new(LHASH_HASH_FN(SSL_SESSION_hash), 1414 if (ret->sessions == NULL) goto err; 1494 * after the sessions were flushed. 1500 if (a->sessions != NULL) 1505 if (a->sessions != NULL) 1506 lh_free(a->sessions);
|
H A D | ssl.h | 456 * in the external representation of sessions, see ssl_asn1.c). */ 631 struct lhash_st /* LHASH */ *sessions; /* a set of SSL_SESSIONs */ member in struct:ssl_ctx_st 932 /* the session_id_context is used to ensure sessions are only reused
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/forked-daapd-0.19/src/ |
H A D | raop.c | 251 static struct raop_session *sessions; variable in typeref:struct:raop_session 1716 if (rs == sessions) 1717 sessions = sessions->next; 1720 for (s = sessions; s && (s->next != rs); s = s->next) 1731 /* No more active sessions, free retransmit buffer */ 1732 if (!sessions) 1942 rs->next = sessions; 1943 sessions = rs; 2212 for (rs = sessions; r [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | ssl_sess.c | 375 * sessions to our server. How you might store that many sessions is perhaps 395 * creation of sessions with identical IDs since we currently don't have 561 * - Both for new and resumed sessions, s->tlsext_ticket_expected is set to 1 614 ret = lh_SSL_SESSION_retrieve(s->session_ctx->sessions, &data); 754 s = lh_SSL_SESSION_insert(ctx->sessions, c); 759 * ctx->sessions), or we're in trouble. 820 if ((r = lh_SSL_SESSION_retrieve(ctx->sessions, c)) == c) { 822 r = lh_SSL_SESSION_delete(ctx->sessions, c); 1108 tp.cache = s->sessions; [all...] |
H A D | ssl_lib.c | 512 p = lh_SSL_SESSION_retrieve(ssl->ctx->sessions, &r); 1184 return ctx->sessions; 1238 return (lh_SSL_SESSION_num_items(ctx->sessions)); 1953 ret->sessions = lh_SSL_SESSION_new(); 1954 if (ret->sessions == NULL) 2127 * after the sessions were flushed. 2133 if (a->sessions != NULL) 2138 if (a->sessions != NULL) 2139 lh_SSL_SESSION_free(a->sessions);
|
H A D | ssl.h | 535 * not retained in the external representation of sessions, see 931 LHASH_OF(SSL_SESSION) *sessions; member in struct:ssl_ctx_st 1533 * the session_id_context is used to ensure sessions are only reused in 1639 SSL_CTX *initial_ctx; /* initial ctx, used to store sessions */
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ceph/ |
H A D | mds_client.c | 255 * sessions 303 if (mds >= mdsc->max_sessions || mdsc->sessions[mds] == NULL) 305 session = mdsc->sessions[mds]; 316 return mdsc->sessions[mds]; 323 mdsc->sessions[s->s_mds] != s) 380 if (mdsc->sessions) { 381 memcpy(sa, mdsc->sessions, 383 kfree(mdsc->sessions); 385 mdsc->sessions = sa; 388 mdsc->sessions[md [all...] |
H A D | mds_client.h | 241 struct ceph_mds_session **sessions; /* NULL for mds if no session */ member in struct:ceph_mds_client
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | ssl_sess.c | 375 * sessions to our server. How you might store that many sessions is perhaps 395 * creation of sessions with identical IDs since we currently don't have 561 * - Both for new and resumed sessions, s->tlsext_ticket_expected is set to 1 614 ret = lh_SSL_SESSION_retrieve(s->session_ctx->sessions, &data); 754 s = lh_SSL_SESSION_insert(ctx->sessions, c); 759 * ctx->sessions), or we're in trouble. 820 if ((r = lh_SSL_SESSION_retrieve(ctx->sessions, c)) == c) { 822 r = lh_SSL_SESSION_delete(ctx->sessions, c); 1108 tp.cache = s->sessions; [all...] |
H A D | ssl_lib.c | 512 p = lh_SSL_SESSION_retrieve(ssl->ctx->sessions, &r); 1184 return ctx->sessions; 1238 return (lh_SSL_SESSION_num_items(ctx->sessions)); 1953 ret->sessions = lh_SSL_SESSION_new(); 1954 if (ret->sessions == NULL) 2127 * after the sessions were flushed. 2133 if (a->sessions != NULL) 2138 if (a->sessions != NULL) 2139 lh_SSL_SESSION_free(a->sessions);
|
H A D | ssl.h | 535 * not retained in the external representation of sessions, see 931 LHASH_OF(SSL_SESSION) *sessions; member in struct:ssl_ctx_st 1533 * the session_id_context is used to ensure sessions are only reused in 1639 SSL_CTX *initial_ctx; /* initial ctx, used to store sessions */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/transmission-2.73/daemon/ |
H A D | remote.c | 1608 int64_t up, down, secs, sessions; local 1623 && tr_bencDictFindInt( d, "sessionCount", &sessions ) 1629 printf( " Started %lu times\n", (unsigned long)sessions );
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | ssl.h | 456 * in the external representation of sessions, see ssl_asn1.c). */ 631 struct lhash_st /* LHASH */ *sessions; /* a set of SSL_SESSIONs */ member in struct:ssl_ctx_st 932 /* the session_id_context is used to ensure sessions are only reused
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/Documentation/cdrom/ |
H A D | cdrom-standard.tex | 561 CDC_MULTI_SESSION& can read sessions $>\rm1$\cr
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/doc/ |
H A D | ip-cref.tex | 2793 about translated sessions. This means that it handles any number 2794 of sessions flawlessly. But it also means that it is {\em static\/}.
|