HomeSort by: relevance | last modified time | path
    Searched defs:sess (Results 1 - 25 of 99) sorted by relevancy

1 2 3 4

  /src/crypto/external/bsd/libsaslc/dist/test/
t_session.c 49 saslc_sess_t *sess; local
53 ATF_CHECK(sess = saslc_sess_init(ctx, "PLAIN", NULL));
54 if (sess != NULL)
55 saslc_sess_end(sess);
56 ATF_CHECK_EQ(sess = saslc_sess_init(ctx, "", NULL), NULL);
57 ATF_CHECK(sess = saslc_sess_init(ctx, "NOTEXISTS,LOGIN", NULL));
58 if (sess != NULL)
59 saslc_sess_end(sess);
60 ATF_CHECK(sess = saslc_sess_init(ctx, "LOGIN,NOTEXISTS", NULL));
61 if (sess != NULL
    [all...]
t_parser.c 90 saslc_sess_t *sess; local
95 ATF_REQUIRE((sess = saslc_sess_init(ctx, "ANONYMOUS", NULL)));
96 ATF_REQUIRE(val = saslc_sess_getprop(sess, "TEST"));
98 ATF_REQUIRE(val = saslc_sess_getprop(sess, "TEST2"));
100 ATF_REQUIRE(val = saslc_sess_getprop(sess, "TEST3"));
102 ATF_REQUIRE(val = saslc_sess_getprop(sess, "ID"));
104 saslc_sess_end(sess);
example_client.c 83 saslc_sess_t *sess; local
120 if ((sess = saslc_sess_init(ctx, mechanism, NULL)) == NULL)
137 if (saslc_sess_setprop(sess, option, var) < 0)
147 cont = saslc_sess_cont(sess, input, input_len, (void **)&output,
156 saslc_sess_end(sess);
166 errx(EXIT_FAILURE, "%s", saslc_sess_strerror(sess));
  /src/usr.bin/who/
utmpentry.h 55 uint16_t sess; member in struct:utmpentry
  /src/sys/miscfs/procfs/
procfs_status.c 94 struct session *sess; local
113 sess = p->p_pgrp->pg_session;
114 sid = sess->s_sid;
147 if ((p->p_lflag & PL_CONTROLT) && (tp = sess->s_ttyp))
156 if (sess->s_ttyvp) {
  /src/crypto/external/apache2/openssl/dist/test/
clienthellotest.c 65 SSL_SESSION *sess = NULL; local
208 SSL_SESSION_free(sess);
dtlstest.c 193 SSL_SESSION *sess = NULL; local
224 || !TEST_ptr(sess = SSL_get1_session(clientssl)))
254 if (sess != NULL) {
255 if (!TEST_true(SSL_set_session(clientssl, sess)))
284 if (sess != NULL && !TEST_true(SSL_session_reused(clientssl)))
295 SSL_SESSION_free(sess);
tls13ccstest.c 253 SSL_SESSION *sess = NULL; local
308 sess = SSL_get1_session(cssl);
309 if (!TEST_ptr(sess))
347 if (!TEST_true(SSL_set_session(cssl, sess))
480 SSL_SESSION_free(sess);
  /src/crypto/external/bsd/libsaslc/dist/src/
buffer.c 55 saslc_sess_t *sess; /* session pointer (for error messages) */ member in struct:saslc__buffer_context_t
79 saslc_sess_t *sess; /* session pointer (for error messages) */ member in struct:saslc__buffer32_context_t
109 * @param sess saslc session
114 saslc__buffer_create(saslc_sess_t *sess, size_t maxbuf)
122 saslc__error_set_errno(ERR(sess), ERROR_NOMEM);
129 ctx->sess = sess;
178 saslc__error_set(ERR(ctx->sess), ERROR_MECH, "buffer coding error");
209 * @param sess saslc session
214 saslc__buffer32_create(saslc_sess_t *sess, size_t maxbuf
    [all...]
xsess.c 230 saslc_sess_t *sess; local
234 if ((sess = calloc(1, sizeof(*sess))) == NULL) {
240 if ((sess->mech = saslc__sess_choose_mech(ctx, mechs, sec_opts))
245 m = saslc__mech_list_get(ctx->mechanisms, sess->mech->name);
253 if (sess->mech->create(sess) == -1)
257 if ((sess->prop = saslc__dict_create()) == NULL) {
262 sess->context = ctx;
265 saslc__msg_dbg("mechanism: %s\n", saslc_sess_getmech(sess));
    [all...]
  /src/crypto/external/bsd/openssl/dist/test/
clienthellotest.c 73 SSL_SESSION *sess = NULL; local
158 sess = PEM_read_bio_SSL_SESSION(sessbio, NULL, NULL, NULL);
159 if (!TEST_ptr(sess)) {
167 if (!TEST_true(SSL_SESSION_set_time(sess, (long)time(NULL)))
168 || !TEST_true(SSL_set_session(con, sess)))
249 SSL_SESSION_free(sess);
dtlstest.c 198 SSL_SESSION *sess = NULL; local
229 || !TEST_ptr(sess = SSL_get1_session(clientssl)))
259 if (sess != NULL) {
260 if (!TEST_true(SSL_set_session(clientssl, sess)))
289 if (sess != NULL && !TEST_true(SSL_session_reused(clientssl)))
299 SSL_SESSION_free(sess);
tls13ccstest.c 251 SSL_SESSION *sess = NULL; local
306 sess = SSL_get1_session(cssl);
307 if (!TEST_ptr(sess))
345 if (!TEST_true(SSL_set_session(cssl, sess))
482 SSL_SESSION_free(sess);
  /src/crypto/external/bsd/openssl.old/dist/test/
clienthellotest.c 73 SSL_SESSION *sess = NULL; local
153 sess = PEM_read_bio_SSL_SESSION(sessbio, NULL, NULL, NULL);
154 if (!TEST_ptr(sess)) {
162 if (!TEST_true(SSL_SESSION_set_time(sess, (long)time(NULL)))
163 || !TEST_true(SSL_set_session(con, sess)))
244 SSL_SESSION_free(sess);
  /src/crypto/external/cpl/trousers/dist/src/tspi/
tsp_seal.c 44 struct authsess *sess = (struct authsess *)lpAppData; local
58 memcpy(mgf1Buffer, sess->sharedSecret.digest, sharedSecretLen);
  /src/external/ibm-public/postfix/dist/src/xsasl/
xsasl_saslc_client.c 97 saslc_sess_t *sess; /* session context */ member in struct:__anon23269
113 setprop(saslc_sess_t *sess, int overwrite, const char *key, const char *value)
117 saslc_sess_getprop(sess, key) == NULL)
118 saslc_sess_setprop(sess, key, value);
144 client->sess = saslc_sess_init(client->saslc, mechanism_list,
146 if (client->sess == NULL) {
150 mech = saslc_sess_getmech(client->sess);
156 setprop(client->sess, 0, SASLC_PROP_AUTHCID, username);
157 setprop(client->sess, 1, SASLC_PROP_PASSWD, password);
158 setprop(client->sess, 1, SASLC_PROP_SERVICE, client->service)
    [all...]
  /src/sbin/iscsid/
iscsid_lists.c 50 verify_session(session_t * sess)
55 for (curr = sess->connections.tqh_first; curr != NULL && !nosess; curr = next) {
60 if (!nosess && sess->num_connections)
63 TAILQ_REMOVE(&list[SESSION_LIST].list, &sess->entry, link);
66 while ((curr = TAILQ_FIRST(&sess->connections)) != NULL) {
67 TAILQ_REMOVE(&sess->connections, curr, link);
70 free(sess);
513 session_t *sess; local
542 sess = (session_t *)(void *)curr;
543 conn = (connection_t *)(void *)TAILQ_FIRST(&sess->connections)
580 session_t *sess; local
634 session_t *sess; local
894 session_t *sess; local
942 session_t *sess; local
    [all...]
iscsid_driverif.c 166 * sess The associated session. NULL for a send_targets request.
181 make_connection(session_t * sess, iscsid_login_req_t * req,
196 DEB(9, ("Make Connection sess=%p, req=%p, res=%p, stid=%p",
197 sess, req, res, stid));
217 if (!sess->num_connections ||
219 sess->target.sid.id)) == NULL)) {
232 if (!sess->num_connections) {
239 TAILQ_FIRST(&sess->connections);
263 if (sess->num_connections)
264 p = find_connection_name(sess, req->sym_name)
513 session_t *sess; local
624 session_t *sess; local
662 session_t *sess; local
691 session_t *sess; local
726 session_t *sess; local
    [all...]
  /src/sys/dev/iscsi/
iscsi_utils.c 193 * sess The session containing this CCB
203 session_t *sess = conn->c_session; local
205 mutex_enter(&sess->s_lock);
207 ccb = TAILQ_FIRST(&sess->s_ccb_pool);
212 TAILQ_REMOVE(&sess->s_ccb_pool, ccb, ccb_chain);
219 cv_wait(&sess->s_ccb_cv, &sess->s_lock);
221 mutex_exit(&sess->s_lock);
259 session_t *sess = ccb->ccb_session; local
299 mutex_enter(&sess->s_lock)
    [all...]
iscsi_main.c 357 map_session(session_t *sess, device_t dev)
359 struct scsipi_adapter *adapt = &sess->s_sc_adapter;
360 struct scsipi_channel *chan = &sess->s_sc_channel;
364 mutex_enter(&sess->s_lock);
365 sess->s_send_window = max(2, window_size(sess, CCBS_FOR_SCSIPI));
366 mutex_exit(&sess->s_lock);
375 adapt->adapt_openings = sess->s_send_window;
393 chan->chan_id = sess->s_id;
396 sess->s_child_dev = config_found(dev, chan, scsiprint, CFARGS_NONE)
474 session_t *sess; local
    [all...]
iscsi_rcv.c 1064 session_t *sess = conn->c_session; local
1176 mutex_enter(&sess->s_lock);
1178 if (sn_a_lt_b(sess->s_ExpCmdSN, ExpCmdSN))
1179 sess->s_ExpCmdSN = ExpCmdSN;
1180 if (sn_a_lt_b(sess->s_MaxCmdSN, MaxCmdSN))
1181 sess->s_MaxCmdSN = MaxCmdSN;
1183 mutex_exit(&sess->s_lock);
iscsi_send.c 97 assign_connection(session_t *sess, bool waitok)
101 mutex_enter(&sess->s_lock);
103 if (sess->s_terminating ||
104 (conn = sess->s_mru_connection) == NULL) {
105 mutex_exit(&sess->s_lock);
112 next = TAILQ_FIRST(&sess->s_conn_list);
119 cv_wait(&sess->s_sess_cv, &sess->s_lock);
120 next = TAILQ_FIRST(&sess->s_conn_list);
122 mutex_exit(&sess->s_lock)
147 session_t *sess = oldconn->c_session; local
329 session_t *sess; local
729 session_t *sess = conn->c_session; local
1026 session_t *sess; local
1445 session_t *sess = ccb->ccb_session; local
    [all...]
  /src/sys/fs/cd9660/
cd9660_vfsops.c 399 int sess = 0; local
423 sess = label.d_partitions[DISKPART(dev)].p_cdsession;
426 error = VOP_IOCTL(devvp, CDIOREADMSADDR, &sess, 0, FSCRED);
428 sess = 0; /* never mind */
431 printf("isofs: session offset (part %"PRId32") %d\n", DISKPART(dev), sess);
435 if ((error = bread(devvp, (iso_blknum+sess) * btodb(iso_bsize),
488 isomp->volume_space_size += sess;
  /src/crypto/external/apache2/openssl/dist/test/quic-openssl-docker/hq-interop/
quic-hq-interop.c 358 * @param sess A pointer to the SSL_SESSION object to be cached.
364 static int cache_new_session(struct ssl_st *ssl, SSL_SESSION *sess)
371 if (!PEM_write_bio_SSL_SESSION(session_bio, sess))
400 SSL_SESSION *sess = NULL; local
427 if (PEM_read_bio_SSL_SESSION(session_bio, &sess, NULL, NULL)) {
429 if (!SSL_set_session(ssl, sess))
  /src/crypto/external/bsd/openssl/dist/ssl/record/
rec_layer_d1.c 801 SSL_SESSION *sess; local
830 sess = s->session;
832 if ((sess == NULL)

Completed in 49 milliseconds

1 2 3 4