| /src/external/gpl3/gdb/dist/gdb/testsuite/gdb.base/ |
| interrupt-daemon.c | 35 create a session. Fork so the child can create a new 36 session. */ 44 /* In child. Switch to a new session. */ 45 pid_t session = setsid (); local 46 if (session == -1) 51 it's not a session leader. We're not opening any file here,
|
| /src/external/gpl3/gdb.old/dist/gdb/testsuite/gdb.base/ |
| interrupt-daemon.c | 35 create a session. Fork so the child can create a new 36 session. */ 44 /* In child. Switch to a new session. */ 45 pid_t session = setsid (); local 46 if (session == -1) 51 it's not a session leader. We're not opening any file here,
|
| /src/external/ibm-public/postfix/dist/src/smtp/ |
| smtp_sasl_proto.c | 32 /* Session context. 87 void smtp_sasl_helo_auth(SMTP_SESSION *session, const char *words) 99 if (session->sasl_mechanism_list) { 100 if (strcasecmp(session->sasl_mechanism_list, mech_list) != 0 102 && strlen(session->sasl_mechanism_list) < var_line_limit) { 103 junk = concatenate(session->sasl_mechanism_list, " ", mech_list, 105 myfree(session->sasl_mechanism_list); 106 session->sasl_mechanism_list = junk; 111 session->sasl_mechanism_list = mystrdup(mech_list); 115 session->namaddrport, words) 124 SMTP_SESSION *session = state->session; local [all...] |
| smtp_reuse.c | 7 /* SMTP session cache glue 26 /* the generic session cache infrastructure. 32 /* smtp_save_session() stores the current session under the 37 /* smtp_reuse_nexthop() looks up a cached session by its 39 /* the session is still alive. The restored session information 43 /* smtp_reuse_addr() looks up a cached session by its server 44 /* address, and verifies that the session is still alive. 45 /* The restored session information does not include the "best 51 /* SMTP client state, including the current session, the origina 116 SMTP_SESSION *session = state->session; local 175 SMTP_SESSION *session; local 222 SMTP_SESSION *session; local 249 SMTP_SESSION *session; local [all...] |
| smtp_rcpt.c | 93 /* that the SMTP client would give up after one SMTP session, 147 SMTP_SESSION *session = state->session; local 157 if (session->features & SMTP_FEATURE_DSN) 168 if ((session->features & SMTP_FEATURE_DSN) == 0 184 session->namaddrport, DSN_FROM_DSN_BUF(why));
|
| smtp_trouble.c | 59 /* a transcript of the session. No notification is generated for 82 /* The session is marked as "do not cache". 117 /* Retry plaintext delivery after TLS post-handshake session 121 /* The session is marked as "do not cache". 188 static void smtp_check_code(SMTP_SESSION *session, int code) 201 * Fix 20190621: don't cache an SMTP session after an SMTP protocol error. 208 session->error_mask |= MAIL_ERROR_PROTOCOL; 218 SMTP_SESSION *session = state->session; local 275 session ? session->namaddrport : "none", &why->dsn) 332 SMTP_SESSION *session = state->session; local 374 SMTP_SESSION *session = state->session; local 435 SMTP_SESSION *session = state->session; local [all...] |
| /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/ |
| ServerHello.pm | 50 $self->{session} = ""; 68 my $session = ""; 71 $session = substr($self->data, $ptr, $session_id_len); 124 $self->session($session); 134 print " Session ID Len:".$session_id_len."\n"; 158 $data .= $self->session; 204 sub session subroutine 208 $self->{session} = shift; 210 return $self->{session}; [all...] |
| ClientHello.pm | 46 $self->{session} = ""; 68 my $session = substr($self->data, $ptr, $session_id_len); 107 $self->session($session); 120 print " Session ID Len:".$session_id_len."\n"; 166 $data .= $self->session; 224 sub session subroutine 228 $self->{session} = shift; 230 return $self->{session};
|
| /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
| ServerHello.pm | 40 $self->{session} = ""; 58 my $session = ""; 61 $session = substr($self->data, $ptr, $session_id_len); 114 $self->session($session); 124 print " Session ID Len:".$session_id_len."\n"; 148 $data .= $self->session; 194 sub session subroutine 198 $self->{session} = shift; 200 return $self->{session}; [all...] |
| ClientHello.pm | 35 $self->{session} = ""; 55 my $session = substr($self->data, $ptr, $session_id_len); 86 $self->session($session); 97 print " Session ID Len:".$session_id_len."\n"; 140 $data .= $self->session; 192 sub session subroutine 196 $self->{session} = shift; 198 return $self->{session};
|
| /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
| ServerHello.pm | 40 $self->{session} = ""; 58 my $session = ""; 61 $session = substr($self->data, $ptr, $session_id_len); 114 $self->session($session); 124 print " Session ID Len:".$session_id_len."\n"; 148 $data .= $self->session; 194 sub session subroutine 198 $self->{session} = shift; 200 return $self->{session}; [all...] |
| ClientHello.pm | 35 $self->{session} = ""; 55 my $session = substr($self->data, $ptr, $session_id_len); 86 $self->session($session); 97 print " Session ID Len:".$session_id_len."\n"; 140 $data .= $self->session; 192 sub session subroutine 196 $self->{session} = shift; 198 return $self->{session};
|
| /src/external/bsd/openldap/dist/servers/slapd/back-wt/ |
| cache.c | 39 WT_SESSION *session = wc->idlcache_session; local 46 rc = session->open_cursor(session, WT_TABLE_IDLCACHE, NULL, 98 WT_SESSION *session = wc->idlcache_session; local 108 rc = session->open_cursor(session, WT_TABLE_IDLCACHE, NULL, 146 WT_SESSION *session = wc->idlcache_session; local 156 rc = session->open_cursor(session, WT_TABLE_IDLCACHE, NULL, 189 WT_SESSION *session = wc->idlcache_session local [all...] |
| dn2entry.c | 48 WT_SESSION *session = wc->session; local 60 rc = session->open_cursor(session,
|
| init.c | 67 WT_SESSION *session = NULL; local 105 rc = wi->wi_conn->open_session(wi->wi_conn, NULL, NULL, &session); 109 "cannot open session: \"%s\"\n", 119 rc = session->verify(session, WT_INDEX_REVDN, NULL); 129 rc = session->create(session, 142 rc = session->create(session, 156 rc = session->create(session, WT_INDEX_DN, "columns=(dn)") [all...] |
| dn2id.c | 71 WT_SESSION *session = wc->session; local 83 rc = session->open_cursor(session, WT_TABLE_DN2ID, NULL, 135 WT_SESSION *session = wc->session; local 145 rc = session->open_cursor(session, WT_TABLE_DN2ID, NULL, 196 WT_SESSION *session = wc->session; local 271 WT_SESSION *session = wc->session; local 316 WT_SESSION *session = wc->session; local [all...] |
| id2entry.c | 65 WT_SESSION *session = wc->session; local 70 rc = session->open_cursor(session, WT_TABLE_ID2ENTRY, NULL, 102 WT_SESSION *session = wc->session; local 107 rc = session->open_cursor(session, WT_TABLE_ID2ENTRY, NULL, 138 WT_SESSION *session = wc->session; local 170 WT_SESSION *session = wc->session; local [all...] |
| /src/external/ibm-public/postfix/dist/src/tls/ |
| tls_session.c | 7 /* TLS client and server session routines 18 /* VSTRING *tls_session_passivate(session) 19 /* SSL_SESSION *session; 106 * sufficient session termination signaling, then there's no need to 119 * SSL_shutdown() again. On failure we don't want to resume the session, 120 * so we will not perform SSL_shutdown() and the session will be removed 134 VSTRING *tls_session_passivate(SSL_SESSION *session) 146 estimate = i2d_SSL_SESSION(session, (unsigned char **) 0); 148 msg_warn("%s: i2d_SSL_SESSION failed: unable to cache session", myname); 158 actual_size = i2d_SSL_SESSION(session, &ptr) 173 SSL_SESSION *session; local [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/ |
| accept_sec_context.c | 181 struct ntlm_buf session; local 198 &session); 225 session.data, session.length); 234 if (session.length != 0) {
|
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| test_soft_pkcs11.c | 44 find_object(CK_SESSION_HANDLE session, 59 ret = (*func->C_FindObjectsInit)(session, search_data, num_search_data); 63 ret = (*func->C_FindObjects)(session, object, 1, &object_count); 71 ret = (*func->C_FindObjectsFinal)(session); 91 CK_SESSION_HANDLE session; local 125 NULL, NULL, &session); 134 ret = (*func->C_Login)(session, CKU_USER, 147 ret = find_object(session, "cert", CKO_PUBLIC_KEY, &public); 150 ret = find_object(session, "cert", CKO_PRIVATE_KEY, &private); 161 ret = (*func->C_SignInit)(session, &mechanism, private) [all...] |
| /src/external/bsd/openldap/dist/libraries/librewrite/ |
| session.c | 1 /* $NetBSD: session.c,v 1.8 2025/09/05 21:16:23 christos Exp $ */ 74 * Inits a session 82 struct rewrite_session *session, tmp; local 93 session = ( struct rewrite_session * )ldap_avl_find( info->li_cookies, 95 if ( session ) { 96 session->ls_count++; 100 return session; 103 session = calloc( sizeof( struct rewrite_session ), 1 ); 104 if ( session == NULL ) { 110 session->ls_cookie = ( void * )cookie 157 struct rewrite_session *session, tmp; local 207 struct rewrite_session *session; local 268 struct rewrite_session *session; local 315 struct rewrite_session *session = (struct rewrite_session *)v_session; local 334 struct rewrite_session *session = (struct rewrite_session *)v_session; local 352 struct rewrite_session *session, tmp = { 0 }; local [all...] |
| /src/external/gpl3/binutils/dist/binutils/ |
| arparse.y | 68 { prompt(); } session 71 session: label 72 session command_line
|
| /src/external/gpl3/binutils.old/dist/binutils/ |
| arparse.y | 68 { prompt(); } session 71 session: label 72 session command_line
|
| /src/lib/libtelnet/ |
| encrypt.h | 88 void (*session)(Session_Key *, int); member in struct:__anon553
|
| /src/crypto/external/bsd/heimdal/dist/lib/ipc/ |
| common.c | 49 pid_t session; member in struct:heim_icred 79 return cred->session; 84 _heim_ipc_create_cred(uid_t uid, gid_t gid, pid_t pid, pid_t session, heim_icred *cred) 92 (*cred)->session = session;
|