| /dflybsd-src/nrelease/gui/root/.fluxbox/ |
| H A D | init | 1 session.screen0.tabs.maxOver: false 2 session.screen0.tabs.intitlebar: true 3 session.screen0.toolbar.alpha: 175 4 session.screen0.toolbar.onTop: False 5 session.screen0.toolbar.maxOver: false 6 session.screen0.toolbar.placement: TopCenter 7 session.screen0.toolbar.tools: workspacename, prevworkspace, nextworkspace, iconbar, systemtray, pr… 8 session.screen0.toolbar.height: 0 9 session.screen0.toolbar.visible: true 10 session.screen0.toolbar.onhead: 0 [all …]
|
| /dflybsd-src/crypto/libressl/ssl/ |
| H A D | ssl_asn1.c | 50 CBB cbb, session, cipher_suite, session_id, master_key, time, timeout; in SSL_SESSION_encode() local 59 if (!CBB_add_asn1(&cbb, &session, CBS_ASN1_SEQUENCE)) in SSL_SESSION_encode() 63 if (!CBB_add_asn1_uint64(&session, SSL_SESSION_ASN1_VERSION)) in SSL_SESSION_encode() 69 if (!CBB_add_asn1_uint64(&session, s->ssl_version)) in SSL_SESSION_encode() 77 if (!CBB_add_asn1(&session, &cipher_suite, CBS_ASN1_OCTETSTRING)) in SSL_SESSION_encode() 83 if (!CBB_add_asn1(&session, &session_id, CBS_ASN1_OCTETSTRING)) in SSL_SESSION_encode() 90 if (!CBB_add_asn1(&session, &master_key, CBS_ASN1_OCTETSTRING)) in SSL_SESSION_encode() 99 if (!CBB_add_asn1(&session, &time, SSLASN1_TIME_TAG)) in SSL_SESSION_encode() 109 if (!CBB_add_asn1(&session, &timeout, SSLASN1_TIMEOUT_TAG)) in SSL_SESSION_encode() 119 if (!CBB_add_asn1(&session, &peer_cert, SSLASN1_PEER_CERT_TAG)) in SSL_SESSION_encode() [all …]
|
| H A D | tls12_lib.c | 30 if (s->session->master_key_length == 0) in tls12_finished_verify_data() 40 if (!tls1_PRF(s, s->session->master_key, s->session->master_key_length, in tls12_finished_verify_data() 101 s->session->master_key_length = 0; in tls12_derive_master_secret() 106 CTASSERT(sizeof(s->session->master_key) == SSL_MAX_MASTER_KEY_LENGTH); in tls12_derive_master_secret() 112 s->session->master_key, sizeof(s->session->master_key))) in tls12_derive_master_secret() 115 s->session->master_key_length = SSL_MAX_MASTER_KEY_LENGTH; in tls12_derive_master_secret()
|
| H A D | ssl_sess.c | 155 return (ssl->session); in SSL_get_session() 170 sess = ssl->session; in SSL_get1_session() 318 ssl_get_new_session(SSL *s, int session) in ssl_get_new_session() argument 335 if (s->session != NULL) { in ssl_get_new_session() 336 SSL_SESSION_free(s->session); in ssl_get_new_session() 337 s->session = NULL; in ssl_get_new_session() 340 if (session) { in ssl_get_new_session() 420 s->session = ss; in ssl_get_new_session() 618 SSL_SESSION_free(s->session); in ssl_get_prev_session() 619 s->session = sess; in ssl_get_prev_session() [all …]
|
| H A D | t1_enc.c | 292 s->session->master_key, s->session->master_key_length, in tls1_generate_key_block() 360 if (s->session->cipher && in tls1_setup_key_block() 361 (s->session->cipher->algorithm_mac & SSL_AEAD)) { in tls1_setup_key_block() 362 if (!ssl_cipher_get_evp_aead(s->session, &aead)) { in tls1_setup_key_block() 368 if (!ssl_cipher_get_evp(s->session, &cipher, &mac_hash, in tls1_setup_key_block() 398 if (s->session->cipher != NULL) { in tls1_setup_key_block() 399 if (s->session->cipher->algorithm_enc == SSL_eNULL) in tls1_setup_key_block() 403 if (s->session->cipher->algorithm_enc == SSL_RC4) in tls1_setup_key_block() 480 rv = tls1_PRF(s, s->session->master_key, s->session->master_key_length, in tls1_export_keying_material()
|
| H A D | ssl_clnt.c | 479 s->session->cipher = s->s3->hs.cipher; in ssl3_connect() 654 SSL_SESSION *sess = s->session; in ssl3_send_client_hello() 694 s->session->session_id_length > 0) { in ssl3_send_client_hello() 695 sl = s->session->session_id_length; in ssl3_send_client_hello() 696 if (sl > sizeof(s->session->session_id)) { in ssl3_send_client_hello() 701 s->session->session_id, sl)) in ssl3_send_client_hello() 933 int master_key_length = sizeof(s->session->master_key); in ssl3_get_server_hello() 936 s->session->master_key, &master_key_length, NULL, in ssl3_get_server_hello() 945 s->session->master_key_length = master_key_length; in ssl3_get_server_hello() 947 if ((s->session->cipher = pref_cipher) == NULL) in ssl3_get_server_hello() [all …]
|
| H A D | ssl_srvr.c | 463 ((s->session->peer_cert != NULL) && in ssl3_accept() 560 if (!s->session->peer_cert) in ssl3_accept() 649 s->session->cipher = s->s3->hs.cipher; in ssl3_accept() 984 id = s->session->cipher->id; in ssl3_get_client_hello() 1067 int master_key_length = sizeof(s->session->master_key); in ssl3_get_client_hello() 1070 s->session->master_key, &master_key_length, ciphers, in ssl3_get_client_hello() 1079 s->session->master_key_length = master_key_length; in ssl3_get_client_hello() 1082 s->session->verify_result = X509_V_OK; in ssl3_get_client_hello() 1084 sk_SSL_CIPHER_free(s->session->ciphers); in ssl3_get_client_hello() 1085 s->session->ciphers = ciphers; in ssl3_get_client_hello() [all …]
|
| H A D | tls_lib.c | 47 s->session->peer_cert_type = cert_type; in tls_process_peer_certs() 49 X509_free(s->session->peer_cert); in tls_process_peer_certs() 50 s->session->peer_cert = peer_cert; in tls_process_peer_certs()
|
| /dflybsd-src/crypto/openssh/ |
| H A D | pkcs11.h | 716 typedef ck_rv_t (*ck_notify_t) (ck_session_handle_t session, 752 (ck_session_handle_t session, unsigned char *pin, 755 (ck_session_handle_t session, unsigned char *old_pin, 762 ck_session_handle_t *session)); 763 _CK_DECLARE_FUNCTION (C_CloseSession, (ck_session_handle_t session)); 766 (ck_session_handle_t session, 769 (ck_session_handle_t session, 773 (ck_session_handle_t session, 779 (ck_session_handle_t session, ck_user_type_t user_type, 781 _CK_DECLARE_FUNCTION (C_Logout, (ck_session_handle_t session)); [all …]
|
| H A D | ssh-pkcs11.c | 54 CK_SESSION_HANDLE session; member 119 if (p->slotinfo[i].session && in pkcs11_provider_finalize() 121 p->slotinfo[i].session)) != CKR_OK) in pkcs11_provider_finalize() 220 CK_SESSION_HANDLE session; in pkcs11_find() local 226 session = p->slotinfo[slotidx].session; in pkcs11_find() 227 if ((rv = f->C_FindObjectsInit(session, attr, nattr)) != CKR_OK) { in pkcs11_find() 231 if ((rv = f->C_FindObjects(session, obj, 1, &nfound)) != CKR_OK || in pkcs11_find() 237 if ((rv = f->C_FindObjectsFinal(session)) != CKR_OK) in pkcs11_find() 270 rv = provider->function_list->C_Login(si->session, type, (u_char *)pin, in pkcs11_login_slot() 334 rv = f->C_GetAttributeValue(si->session, obj, &attr, 1); in pkcs11_check_obj_bool_attrib() [all …]
|
| H A D | PROTOCOL.agent | 6 1. session-bind@openssh.com extension 9 particular SSH session identifier as derived from the initial key 17 string session-bind@openssh.com 19 string session identifier 23 Where 'hostkey' is the encoded server host public key, 'session 25 exchange, 'signature' is the server's signature of the session 33 a duplicate session identifier, or any attempt to bind a connection 73 constraints against the session-bind@openssh.com bindings recorded for
|
| /dflybsd-src/contrib/wpa_supplicant/src/crypto/ |
| H A D | tls_gnutls.c | 46 gnutls_session_t session; member 68 static int tls_connection_verify_peer(gnutls_session_t session); 204 ret = gnutls_init(&conn->session, in tls_gnutls_init_session() 212 ret = gnutls_set_default_priority(conn->session); in tls_gnutls_init_session() 216 ret = gnutls_priority_set_direct(conn->session, "NORMAL:-VERS-SSL3.0", in tls_gnutls_init_session() 224 gnutls_transport_set_pull_function(conn->session, tls_pull_func); in tls_gnutls_init_session() 225 gnutls_transport_set_push_function(conn->session, tls_push_func); in tls_gnutls_init_session() 226 gnutls_transport_set_ptr(conn->session, (gnutls_transport_ptr_t) conn); in tls_gnutls_init_session() 227 gnutls_session_set_ptr(conn->session, conn); in tls_gnutls_init_session() 234 gnutls_deinit(conn->session); in tls_gnutls_init_session() [all …]
|
| /dflybsd-src/lib/libtcplay/ |
| H A D | crypto-dev.c | 97 struct session_op session; in syscrypt() local 117 memset(&session, 0, sizeof(session)); in syscrypt() 118 session.cipher = cipher_id; in syscrypt() 119 session.key = (caddr_t) key; in syscrypt() 120 session.keylen = klen; in syscrypt() 121 if (ioctl(fd, CIOCGSESSION, &session) == -1) { in syscrypt() 126 cryp.ses = session.ses; in syscrypt() 138 if (ioctl(fd, CIOCFSESSION, &session.ses) == -1) { in syscrypt()
|
| /dflybsd-src/test/testcases/crypto/aesxts/ |
| H A D | aes_xts.c | 44 struct session_op session; in syscrypt() local 56 memset(&session, 0, sizeof(session)); in syscrypt() 57 session.cipher = CRYPTO_AES_XTS; in syscrypt() 58 session.key = (caddr_t) key; in syscrypt() 59 session.keylen = klen; in syscrypt() 60 if (ioctl(fd, CIOCGSESSION, &session) == -1) { in syscrypt() 65 cryp.ses = session.ses; in syscrypt() 77 if (ioctl(fd, CIOCFSESSION, &session.ses) == -1) { in syscrypt()
|
| /dflybsd-src/usr.sbin/ftp-proxy/ |
| H A D | ftp-proxy.c | 71 struct session { struct 88 LIST_ENTRY(session) entry; argument 91 LIST_HEAD(, session) sessions = LIST_HEAD_INITIALIZER(sessions); 93 void buffer_data(struct session *, struct cbuf *, char *, size_t); 94 int client_parse(struct session *); 95 int client_parse_anon(struct session *); 96 int client_parse_cmd(struct session *); 97 void client_read(struct session *); 98 void client_write(struct session *); 100 void end_session(struct session *); [all …]
|
| /dflybsd-src/test/testcases/crypto/aesctr/ |
| H A D | aesctr.c | 137 struct session_op session; in syscrypt() local 149 memset(&session, 0, sizeof(session)); in syscrypt() 150 session.cipher = CRYPTO_AES_CTR; in syscrypt() 151 session.key = (caddr_t) key; in syscrypt() 152 session.keylen = klen; in syscrypt() 153 if (ioctl(fd, CIOCGSESSION, &session) == -1) { in syscrypt() 158 cryp.ses = session.ses; in syscrypt() 170 if (ioctl(fd, CIOCFSESSION, &session.ses) == -1) { in syscrypt()
|
| /dflybsd-src/etc/pam.d/ |
| H A D | xdm | 17 # session 18 #session required pam_ssh.so want_agent 19 # xdm has a software bug in it where session callbacks can occur 21 # out the session line works around the problem. 22 #session required pam_lastlog.so no_fail
|
| H A D | other | 18 # session 19 #session optional pam_ssh.so want_agent 20 session required pam_permit.so
|
| H A D | system | 17 # session 18 #session optional pam_ssh.so want_agent 19 session required pam_lastlog.so no_fail
|
| H A D | telnetd | 18 # session 19 #session optional pam_ssh.so want_agent 20 session required pam_lastlog.so no_fail
|
| H A D | sshd | 18 # session 19 #session optional pam_ssh.so want_agent 20 session required pam_permit.so
|
| /dflybsd-src/test/testcases/crypto/aes/ |
| H A D | aestest.c | 50 struct session_op session; in syscrypt() local 70 memset(&session, 0, sizeof(session)); in syscrypt() 71 session.cipher = CRYPTO_AES_CBC; in syscrypt() 72 session.key = (caddr_t) key; in syscrypt() 73 session.keylen = klen; in syscrypt() 74 if (ioctl(fd, CIOCGSESSION, &session) == -1) { in syscrypt() 79 cryp.ses = session.ses; in syscrypt() 91 if (ioctl(fd, CIOCFSESSION, &session.ses) == -1) { in syscrypt()
|
| /dflybsd-src/test/testcases/crypto/twofish/ |
| H A D | twofish_test.c | 49 struct session_op session; in syscrypt() local 69 memset(&session, 0, sizeof(session)); in syscrypt() 70 session.cipher = CRYPTO_TWOFISH_CBC; in syscrypt() 71 session.key = (caddr_t) key; in syscrypt() 72 session.keylen = klen; in syscrypt() 73 if (ioctl(fd, CIOCGSESSION, &session) == -1) { in syscrypt() 78 cryp.ses = session.ses; in syscrypt() 90 if (ioctl(fd, CIOCFSESSION, &session.ses) == -1) { in syscrypt()
|
| /dflybsd-src/test/testcases/crypto/serpent/ |
| H A D | serpent_test.c | 49 struct session_op session; in syscrypt() local 69 memset(&session, 0, sizeof(session)); in syscrypt() 70 session.cipher = CRYPTO_SERPENT_CBC; in syscrypt() 71 session.key = (caddr_t) key; in syscrypt() 72 session.keylen = klen; in syscrypt() 73 if (ioctl(fd, CIOCGSESSION, &session) == -1) { in syscrypt() 78 cryp.ses = session.ses; in syscrypt() 90 if (ioctl(fd, CIOCFSESSION, &session.ses) == -1) { in syscrypt()
|
| /dflybsd-src/sys/sys/ |
| H A D | proc.h | 76 struct session; 84 LIST_HEAD(sesslist, session); 94 struct session { struct 95 LIST_ENTRY(session) s_list; /* Hash chain. */ 111 struct session *pg_session; /* Pointer to session. */ argument 551 void sess_hold(struct session *sp); 552 void sess_rele(struct session *sp); 555 void sessinsertinit(struct session *sess);
|