/freebsd-11.0-release/crypto/openssh/regress/ |
H A D | putty-ciphers.sh | 13 cp ${OBJ}/.putty/sessions/localhost_proxy \ 14 ${OBJ}/.putty/sessions/cipher_$c 15 echo "Cipher=$c" >> ${OBJ}/.putty/sessions/cipher_$c
|
H A D | putty-kex.sh | 13 cp ${OBJ}/.putty/sessions/localhost_proxy \ 14 ${OBJ}/.putty/sessions/kex_$k 15 echo "KEX=$k" >> ${OBJ}/.putty/sessions/kex_$k
|
H A D | putty-transfer.sh | 16 cp ${OBJ}/.putty/sessions/localhost_proxy \ 17 ${OBJ}/.putty/sessions/compression_$c 18 echo "Compression=$c" >> ${OBJ}/.putty/sessions/kex_$k
|
H A D | test-exec.sh | 519 mkdir -p ${OBJ}/.putty/sessions 520 rm -f ${OBJ}/.putty/sessions/localhost_proxy 521 echo "Hostname=127.0.0.1" >> ${OBJ}/.putty/sessions/localhost_proxy 522 echo "PortNumber=$PORT" >> ${OBJ}/.putty/sessions/localhost_proxy 523 echo "ProxyMethod=5" >> ${OBJ}/.putty/sessions/localhost_proxy 524 echo "ProxyTelnetCommand=sh ${SRC}/sshd-log-wrapper.sh ${TEST_SSHD_LOGFILE} ${SSHD} -i -f $OBJ/sshd_proxy" >> ${OBJ}/.putty/sessions/localhost_proxy
|
/freebsd-11.0-release/tools/tools/net80211/wesside/wesside/ |
H A D | aircrack-ptw-lib.h | 34 // How many sessions do we use to check if a guessed key is correct 73 // How many sessions for checking a guessed key have been collected 75 // The actual recovered sessions 76 PTW_session sessions[PTW_CONTROLSESSIONS]; member in struct:__anon13711
|
H A D | aircrack-ptw-lib.c | 227 memcpy(keybuf, state->sessions[i].iv, IVBYTES); 230 if ((rc4update(&rc4state) ^ state->sessions[i].keystream[j]) != 0) { 453 memcpy(state->sessions[state->sessions_collected].iv, iv, IVBYTES); 454 memcpy(state->sessions[state->sessions_collected].keystream, keystream, KSBYTES);
|
/freebsd-11.0-release/kerberos5/libexec/kcm/ |
H A D | Makefile | 17 sessions.c \
|
/freebsd-11.0-release/sys/crypto/aesni/ |
H A D | aesni.c | 60 TAILQ_HEAD(aesni_sessions_head, aesni_session) sessions; 143 TAILQ_INIT(&sc->sessions); 183 TAILQ_FOREACH(ses, &sc->sessions, next) { 187 "Cannot detach, sessions still active.\n"); 192 while ((ses = TAILQ_FIRST(&sc->sessions)) != NULL) { 193 TAILQ_REMOVE(&sc->sessions, ses, next); 261 * Free sessions goes first, so if first session is used, we need to 264 ses = TAILQ_FIRST(&sc->sessions); 273 TAILQ_REMOVE(&sc->sessions, ses, next); 276 TAILQ_INSERT_TAIL(&sc->sessions, se [all...] |
/freebsd-11.0-release/usr.sbin/bluetooth/bthidd/ |
H A D | session.c | 98 LIST_INSERT_HEAD(&srv->sessions, s, next); 115 LIST_FOREACH(s, &srv->sessions, next) 134 LIST_FOREACH(s, &srv->sessions, next)
|
H A D | bthidd.h | 51 LIST_HEAD(, bthid_session) sessions; member in struct:bthid_server
|
H A D | server.c | 71 LIST_INIT(&srv->sessions); 163 while (!LIST_EMPTY(&srv->sessions)) 164 session_close(LIST_FIRST(&srv->sessions));
|
/freebsd-11.0-release/sys/cam/ctl/ |
H A D | ctl_frontend_iscsi.h | 119 TAILQ_HEAD(, cfiscsi_session) sessions; member in struct:cfiscsi_softc
|
H A D | ctl_frontend_iscsi.c | 1285 TAILQ_INSERT_TAIL(&softc->sessions, cs, cs_next); 1316 TAILQ_REMOVE(&softc->sessions, cs, cs_next); 1336 TAILQ_INIT(&softc->sessions); 1413 TAILQ_FOREACH(cs, &softc->sessions, cs_next) { 1418 TAILQ_FOREACH(cs, &softc->sessions, cs_next) { 1481 TAILQ_FOREACH(cs, &cfiscsi_softc.sessions, cs_next) { 1555 TAILQ_FOREACH(cs2, &softc->sessions, cs_next) { 1641 TAILQ_FOREACH(cs, &softc->sessions, cs_next) { 1708 TAILQ_FOREACH(cs, &softc->sessions, cs_next) { 1757 TAILQ_FOREACH(cs, &softc->sessions, cs_nex [all...] |
/freebsd-11.0-release/crypto/heimdal/kcm/ |
H A D | Makefile.am | 24 sessions.c \
|
/freebsd-11.0-release/sbin/init/ |
H A D | init.c | 172 static session_t *sessions; variable 1283 sessions = sp; 1343 * Walk the list of ttys and create sessions for each active line. 1355 for (sp = sessions; sp; sp = snext) { 1359 sessions = 0; 1503 if (! sessions) 1516 sessions = sp->se_next; 1595 for (sp = sessions; sp; sp = sp->se_next) { 1627 * mark all sessions for death, (!SE_PRESENT) 1631 for (sp = sessions; s [all...] |
/freebsd-11.0-release/crypto/openssh/ |
H A D | session.c | 153 static Session *sessions = NULL; variable 311 error("no more sessions"); 608 * it to the user, otherwise multiple sessions may accumulate 870 * it to the user, otherwise multiple sessions may accumulate 1926 memset(&sessions[id], 0, sizeof(*sessions)); 1927 sessions[id].self = id; 1928 sessions[id].used = 0; 1929 sessions[id].chanid = -1; 1930 sessions[i [all...] |
/freebsd-11.0-release/sys/netgraph/ |
H A D | ng_pptpgre.c | 163 LIST_ENTRY(ng_pptpgre_sess) sessions; 297 LIST_INSERT_HEAD(&priv->sesshash[0], &priv->uppersess, sessions); 354 LIST_INSERT_HEAD(&priv->sesshash[hash], hpriv, sessions); 390 LIST_REMOVE(hpriv, sessions); 393 sessions); 495 LIST_REMOVE(hpriv, sessions); 518 LIST_REMOVE(&priv->uppersess, sessions); 932 LIST_FOREACH(hpriv, &privp->sesshash[hash], sessions) {
|
H A D | ng_pppoe.c | 245 LIST_ENTRY(sess_con) sessions; 430 LIST_FOREACH(sp, &privp->listeners, sessions) { 468 LIST_FOREACH(sp, &privp->listeners, sessions) { 491 LIST_FOREACH(sp, &privp->listeners, sessions) { 524 LIST_FOREACH(tsp, &privp->sesshash[hash].head, sessions) { 530 LIST_INSERT_HEAD(&privp->sesshash[hash].head, sp, sessions); 549 LIST_INSERT_HEAD(&privp->sesshash[hash].head, sp, sessions); 561 LIST_REMOVE(sp, sessions); 574 LIST_FOREACH(sp, &privp->sesshash[hash].head, sessions) { 792 * on sessions tha [all...] |
H A D | ng_l2tp.c | 96 /* Default data sequence number configuration for new sessions */ 109 struct ng_l2tp_session_stats stats; /* per sessions statistics */ 113 LIST_ENTRY(ng_l2tp_hook_private) sessions; 436 LIST_INSERT_HEAD(&priv->sesshash[hash], hpriv, sessions); 688 LIST_REMOVE(hpriv, sessions); 712 LIST_FOREACH(hpriv, &privp->sesshash[hash], sessions) {
|
/freebsd-11.0-release/crypto/openssl/ssl/ |
H A D | ssl_sess.c | 375 * sessions to our server. How you might store that many sessions is perhaps 395 * creation of sessions with identical IDs since we currently don't have 561 * - Both for new and resumed sessions, s->tlsext_ticket_expected is set to 1 614 ret = lh_SSL_SESSION_retrieve(s->session_ctx->sessions, &data); 754 s = lh_SSL_SESSION_insert(ctx->sessions, c); 759 * ctx->sessions), or we're in trouble. 773 lh_SSL_SESSION_retrieve(ctx->sessions, c) == NULL) { 829 if ((r = lh_SSL_SESSION_retrieve(ctx->sessions, c)) == c) { 831 r = lh_SSL_SESSION_delete(ctx->sessions, [all...] |
H A D | ssl_lib.c | 512 p = lh_SSL_SESSION_retrieve(ssl->ctx->sessions, &r); 1184 return ctx->sessions; 1238 return (lh_SSL_SESSION_num_items(ctx->sessions)); 1953 ret->sessions = lh_SSL_SESSION_new(); 1954 if (ret->sessions == NULL) 2125 * after the sessions were flushed. 2131 if (a->sessions != NULL) 2136 if (a->sessions != NULL) 2137 lh_SSL_SESSION_free(a->sessions);
|
/freebsd-11.0-release/contrib/wpa/src/radius/ |
H A D | radius_server.c | 29 * RADIUS_MAX_SESSION - Maximum number of active sessions 107 struct radius_session *sessions; member in struct:radius_client 143 * num_sess - Number of active sessions 451 struct radius_session *sess = client->sessions; 489 session = client->sessions; 493 client->sessions = sess->next; 545 sess->next = client->sessions; 546 client->sessions = sess; 1499 struct radius_session *sessions) 1503 session = sessions; 1498 radius_server_free_sessions(struct radius_server_data *data, struct radius_session *sessions) argument [all...] |
/freebsd-11.0-release/contrib/pf/ftp-proxy/ |
H A D | ftp-proxy.c | 96 LIST_HEAD(, session) sessions = LIST_HEAD_INITIALIZER(sessions); 334 for (s = LIST_FIRST(&sessions); s != LIST_END(&sessions); s = next) { 563 LIST_INSERT_HEAD(&sessions, s, entry); 655 errx(1, "max sessions %s", errstr); 701 /* Raise max. open files limit to satisfy max. sessions. */
|
/freebsd-11.0-release/sys/dev/sec/ |
H A D | sec.c | 185 SEC_LOCK(sc, sessions); 187 SEC_UNLOCK(sc, sessions); 1242 SEC_LOCK(sc, sessions); 1256 SEC_UNLOCK(sc, sessions); 1269 SEC_LOCK(sc, sessions); 1276 SEC_UNLOCK(sc, sessions);
|
/freebsd-11.0-release/sys/dev/cesa/ |
H A D | cesa.c | 239 CESA_GENERIC_ALLOC_LOCKED(sc, cs, sessions); 258 CESA_GENERIC_FREE_LOCKED(sc, cs, sessions); 824 CESA_LOCK_ASSERT(sc, sessions); 1625 CESA_LOCK(sc, sessions); 1668 CESA_UNLOCK(sc, sessions);
|