| /src/crypto/external/bsd/libsaslc/dist/test/ |
| t_session.c | 49 saslc_sess_t *sess; local 53 ATF_CHECK(sess = saslc_sess_init(ctx, "PLAIN", NULL)); 54 if (sess != NULL) 55 saslc_sess_end(sess); 56 ATF_CHECK_EQ(sess = saslc_sess_init(ctx, "", NULL), NULL); 57 ATF_CHECK(sess = saslc_sess_init(ctx, "NOTEXISTS,LOGIN", NULL)); 58 if (sess != NULL) 59 saslc_sess_end(sess); 60 ATF_CHECK(sess = saslc_sess_init(ctx, "LOGIN,NOTEXISTS", NULL)); 61 if (sess != NULL [all...] |
| t_parser.c | 90 saslc_sess_t *sess; local 95 ATF_REQUIRE((sess = saslc_sess_init(ctx, "ANONYMOUS", NULL))); 96 ATF_REQUIRE(val = saslc_sess_getprop(sess, "TEST")); 98 ATF_REQUIRE(val = saslc_sess_getprop(sess, "TEST2")); 100 ATF_REQUIRE(val = saslc_sess_getprop(sess, "TEST3")); 102 ATF_REQUIRE(val = saslc_sess_getprop(sess, "ID")); 104 saslc_sess_end(sess);
|
| example_client.c | 83 saslc_sess_t *sess; local 120 if ((sess = saslc_sess_init(ctx, mechanism, NULL)) == NULL) 137 if (saslc_sess_setprop(sess, option, var) < 0) 147 cont = saslc_sess_cont(sess, input, input_len, (void **)&output, 156 saslc_sess_end(sess); 166 errx(EXIT_FAILURE, "%s", saslc_sess_strerror(sess));
|
| /src/usr.bin/who/ |
| utmpentry.h | 55 uint16_t sess; member in struct:utmpentry
|
| /src/sys/miscfs/procfs/ |
| procfs_status.c | 94 struct session *sess; local 113 sess = p->p_pgrp->pg_session; 114 sid = sess->s_sid; 147 if ((p->p_lflag & PL_CONTROLT) && (tp = sess->s_ttyp)) 156 if (sess->s_ttyvp) {
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| clienthellotest.c | 65 SSL_SESSION *sess = NULL; local 208 SSL_SESSION_free(sess);
|
| dtlstest.c | 193 SSL_SESSION *sess = NULL; local 224 || !TEST_ptr(sess = SSL_get1_session(clientssl))) 254 if (sess != NULL) { 255 if (!TEST_true(SSL_set_session(clientssl, sess))) 284 if (sess != NULL && !TEST_true(SSL_session_reused(clientssl))) 295 SSL_SESSION_free(sess);
|
| tls13ccstest.c | 253 SSL_SESSION *sess = NULL; local 308 sess = SSL_get1_session(cssl); 309 if (!TEST_ptr(sess)) 347 if (!TEST_true(SSL_set_session(cssl, sess)) 480 SSL_SESSION_free(sess);
|
| /src/crypto/external/bsd/libsaslc/dist/src/ |
| buffer.c | 55 saslc_sess_t *sess; /* session pointer (for error messages) */ member in struct:saslc__buffer_context_t 79 saslc_sess_t *sess; /* session pointer (for error messages) */ member in struct:saslc__buffer32_context_t 109 * @param sess saslc session 114 saslc__buffer_create(saslc_sess_t *sess, size_t maxbuf) 122 saslc__error_set_errno(ERR(sess), ERROR_NOMEM); 129 ctx->sess = sess; 178 saslc__error_set(ERR(ctx->sess), ERROR_MECH, "buffer coding error"); 209 * @param sess saslc session 214 saslc__buffer32_create(saslc_sess_t *sess, size_t maxbuf [all...] |
| xsess.c | 230 saslc_sess_t *sess; local 234 if ((sess = calloc(1, sizeof(*sess))) == NULL) { 240 if ((sess->mech = saslc__sess_choose_mech(ctx, mechs, sec_opts)) 245 m = saslc__mech_list_get(ctx->mechanisms, sess->mech->name); 253 if (sess->mech->create(sess) == -1) 257 if ((sess->prop = saslc__dict_create()) == NULL) { 262 sess->context = ctx; 265 saslc__msg_dbg("mechanism: %s\n", saslc_sess_getmech(sess)); [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| clienthellotest.c | 73 SSL_SESSION *sess = NULL; local 158 sess = PEM_read_bio_SSL_SESSION(sessbio, NULL, NULL, NULL); 159 if (!TEST_ptr(sess)) { 167 if (!TEST_true(SSL_SESSION_set_time(sess, (long)time(NULL))) 168 || !TEST_true(SSL_set_session(con, sess))) 249 SSL_SESSION_free(sess);
|
| dtlstest.c | 198 SSL_SESSION *sess = NULL; local 229 || !TEST_ptr(sess = SSL_get1_session(clientssl))) 259 if (sess != NULL) { 260 if (!TEST_true(SSL_set_session(clientssl, sess))) 289 if (sess != NULL && !TEST_true(SSL_session_reused(clientssl))) 299 SSL_SESSION_free(sess);
|
| tls13ccstest.c | 251 SSL_SESSION *sess = NULL; local 306 sess = SSL_get1_session(cssl); 307 if (!TEST_ptr(sess)) 345 if (!TEST_true(SSL_set_session(cssl, sess)) 482 SSL_SESSION_free(sess);
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| clienthellotest.c | 73 SSL_SESSION *sess = NULL; local 153 sess = PEM_read_bio_SSL_SESSION(sessbio, NULL, NULL, NULL); 154 if (!TEST_ptr(sess)) { 162 if (!TEST_true(SSL_SESSION_set_time(sess, (long)time(NULL))) 163 || !TEST_true(SSL_set_session(con, sess))) 244 SSL_SESSION_free(sess);
|
| /src/crypto/external/cpl/trousers/dist/src/tspi/ |
| tsp_seal.c | 44 struct authsess *sess = (struct authsess *)lpAppData; local 58 memcpy(mgf1Buffer, sess->sharedSecret.digest, sharedSecretLen);
|
| /src/external/ibm-public/postfix/dist/src/xsasl/ |
| xsasl_saslc_client.c | 97 saslc_sess_t *sess; /* session context */ member in struct:__anon23269 113 setprop(saslc_sess_t *sess, int overwrite, const char *key, const char *value) 117 saslc_sess_getprop(sess, key) == NULL) 118 saslc_sess_setprop(sess, key, value); 144 client->sess = saslc_sess_init(client->saslc, mechanism_list, 146 if (client->sess == NULL) { 150 mech = saslc_sess_getmech(client->sess); 156 setprop(client->sess, 0, SASLC_PROP_AUTHCID, username); 157 setprop(client->sess, 1, SASLC_PROP_PASSWD, password); 158 setprop(client->sess, 1, SASLC_PROP_SERVICE, client->service) [all...] |
| /src/sbin/iscsid/ |
| iscsid_lists.c | 50 verify_session(session_t * sess) 55 for (curr = sess->connections.tqh_first; curr != NULL && !nosess; curr = next) { 60 if (!nosess && sess->num_connections) 63 TAILQ_REMOVE(&list[SESSION_LIST].list, &sess->entry, link); 66 while ((curr = TAILQ_FIRST(&sess->connections)) != NULL) { 67 TAILQ_REMOVE(&sess->connections, curr, link); 70 free(sess); 513 session_t *sess; local 542 sess = (session_t *)(void *)curr; 543 conn = (connection_t *)(void *)TAILQ_FIRST(&sess->connections) 580 session_t *sess; local 634 session_t *sess; local 894 session_t *sess; local 942 session_t *sess; local [all...] |
| iscsid_driverif.c | 166 * sess The associated session. NULL for a send_targets request. 181 make_connection(session_t * sess, iscsid_login_req_t * req, 196 DEB(9, ("Make Connection sess=%p, req=%p, res=%p, stid=%p", 197 sess, req, res, stid)); 217 if (!sess->num_connections || 219 sess->target.sid.id)) == NULL)) { 232 if (!sess->num_connections) { 239 TAILQ_FIRST(&sess->connections); 263 if (sess->num_connections) 264 p = find_connection_name(sess, req->sym_name) 513 session_t *sess; local 624 session_t *sess; local 662 session_t *sess; local 691 session_t *sess; local 726 session_t *sess; local [all...] |
| /src/sys/dev/iscsi/ |
| iscsi_utils.c | 193 * sess The session containing this CCB 203 session_t *sess = conn->c_session; local 205 mutex_enter(&sess->s_lock); 207 ccb = TAILQ_FIRST(&sess->s_ccb_pool); 212 TAILQ_REMOVE(&sess->s_ccb_pool, ccb, ccb_chain); 219 cv_wait(&sess->s_ccb_cv, &sess->s_lock); 221 mutex_exit(&sess->s_lock); 259 session_t *sess = ccb->ccb_session; local 299 mutex_enter(&sess->s_lock) [all...] |
| iscsi_main.c | 357 map_session(session_t *sess, device_t dev) 359 struct scsipi_adapter *adapt = &sess->s_sc_adapter; 360 struct scsipi_channel *chan = &sess->s_sc_channel; 364 mutex_enter(&sess->s_lock); 365 sess->s_send_window = max(2, window_size(sess, CCBS_FOR_SCSIPI)); 366 mutex_exit(&sess->s_lock); 375 adapt->adapt_openings = sess->s_send_window; 393 chan->chan_id = sess->s_id; 396 sess->s_child_dev = config_found(dev, chan, scsiprint, CFARGS_NONE) 474 session_t *sess; local [all...] |
| iscsi_rcv.c | 1064 session_t *sess = conn->c_session; local 1176 mutex_enter(&sess->s_lock); 1178 if (sn_a_lt_b(sess->s_ExpCmdSN, ExpCmdSN)) 1179 sess->s_ExpCmdSN = ExpCmdSN; 1180 if (sn_a_lt_b(sess->s_MaxCmdSN, MaxCmdSN)) 1181 sess->s_MaxCmdSN = MaxCmdSN; 1183 mutex_exit(&sess->s_lock);
|
| iscsi_send.c | 97 assign_connection(session_t *sess, bool waitok) 101 mutex_enter(&sess->s_lock); 103 if (sess->s_terminating || 104 (conn = sess->s_mru_connection) == NULL) { 105 mutex_exit(&sess->s_lock); 112 next = TAILQ_FIRST(&sess->s_conn_list); 119 cv_wait(&sess->s_sess_cv, &sess->s_lock); 120 next = TAILQ_FIRST(&sess->s_conn_list); 122 mutex_exit(&sess->s_lock) 147 session_t *sess = oldconn->c_session; local 329 session_t *sess; local 729 session_t *sess = conn->c_session; local 1026 session_t *sess; local 1445 session_t *sess = ccb->ccb_session; local [all...] |
| /src/sys/fs/cd9660/ |
| cd9660_vfsops.c | 399 int sess = 0; local 423 sess = label.d_partitions[DISKPART(dev)].p_cdsession; 426 error = VOP_IOCTL(devvp, CDIOREADMSADDR, &sess, 0, FSCRED); 428 sess = 0; /* never mind */ 431 printf("isofs: session offset (part %"PRId32") %d\n", DISKPART(dev), sess); 435 if ((error = bread(devvp, (iso_blknum+sess) * btodb(iso_bsize), 488 isomp->volume_space_size += sess;
|
| /src/crypto/external/apache2/openssl/dist/test/quic-openssl-docker/hq-interop/ |
| quic-hq-interop.c | 358 * @param sess A pointer to the SSL_SESSION object to be cached. 364 static int cache_new_session(struct ssl_st *ssl, SSL_SESSION *sess) 371 if (!PEM_write_bio_SSL_SESSION(session_bio, sess)) 400 SSL_SESSION *sess = NULL; local 427 if (PEM_read_bio_SSL_SESSION(session_bio, &sess, NULL, NULL)) { 429 if (!SSL_set_session(ssl, sess))
|
| /src/crypto/external/bsd/openssl/dist/ssl/record/ |
| rec_layer_d1.c | 801 SSL_SESSION *sess; local 830 sess = s->session; 832 if ((sess == NULL)
|