Home
last modified time | relevance | path

Searched refs:session (Results 1 – 25 of 125) sorted by relevance

12345

/dflybsd-src/nrelease/gui/root/.fluxbox/
H A Dinit1 session.screen0.tabs.maxOver: false
2 session.screen0.tabs.intitlebar: true
3 session.screen0.toolbar.alpha: 175
4 session.screen0.toolbar.onTop: False
5 session.screen0.toolbar.maxOver: false
6 session.screen0.toolbar.placement: TopCenter
7 session.screen0.toolbar.tools: workspacename, prevworkspace, nextworkspace, iconbar, systemtray, pr…
8 session.screen0.toolbar.height: 0
9 session.screen0.toolbar.visible: true
10 session.screen0.toolbar.onhead: 0
[all …]
/dflybsd-src/crypto/libressl/ssl/
H A Dssl_asn1.c50 CBB cbb, session, cipher_suite, session_id, master_key, time, timeout; in SSL_SESSION_encode() local
59 if (!CBB_add_asn1(&cbb, &session, CBS_ASN1_SEQUENCE)) in SSL_SESSION_encode()
63 if (!CBB_add_asn1_uint64(&session, SSL_SESSION_ASN1_VERSION)) in SSL_SESSION_encode()
69 if (!CBB_add_asn1_uint64(&session, s->ssl_version)) in SSL_SESSION_encode()
77 if (!CBB_add_asn1(&session, &cipher_suite, CBS_ASN1_OCTETSTRING)) in SSL_SESSION_encode()
83 if (!CBB_add_asn1(&session, &session_id, CBS_ASN1_OCTETSTRING)) in SSL_SESSION_encode()
90 if (!CBB_add_asn1(&session, &master_key, CBS_ASN1_OCTETSTRING)) in SSL_SESSION_encode()
99 if (!CBB_add_asn1(&session, &time, SSLASN1_TIME_TAG)) in SSL_SESSION_encode()
109 if (!CBB_add_asn1(&session, &timeout, SSLASN1_TIMEOUT_TAG)) in SSL_SESSION_encode()
119 if (!CBB_add_asn1(&session, &peer_cert, SSLASN1_PEER_CERT_TAG)) in SSL_SESSION_encode()
[all …]
H A Dtls12_lib.c30 if (s->session->master_key_length == 0) in tls12_finished_verify_data()
40 if (!tls1_PRF(s, s->session->master_key, s->session->master_key_length, in tls12_finished_verify_data()
101 s->session->master_key_length = 0; in tls12_derive_master_secret()
106 CTASSERT(sizeof(s->session->master_key) == SSL_MAX_MASTER_KEY_LENGTH); in tls12_derive_master_secret()
112 s->session->master_key, sizeof(s->session->master_key))) in tls12_derive_master_secret()
115 s->session->master_key_length = SSL_MAX_MASTER_KEY_LENGTH; in tls12_derive_master_secret()
H A Dssl_sess.c155 return (ssl->session); in SSL_get_session()
170 sess = ssl->session; in SSL_get1_session()
318 ssl_get_new_session(SSL *s, int session) in ssl_get_new_session() argument
335 if (s->session != NULL) { in ssl_get_new_session()
336 SSL_SESSION_free(s->session); in ssl_get_new_session()
337 s->session = NULL; in ssl_get_new_session()
340 if (session) { in ssl_get_new_session()
420 s->session = ss; in ssl_get_new_session()
618 SSL_SESSION_free(s->session); in ssl_get_prev_session()
619 s->session = sess; in ssl_get_prev_session()
[all …]
H A Dt1_enc.c292 s->session->master_key, s->session->master_key_length, in tls1_generate_key_block()
360 if (s->session->cipher && in tls1_setup_key_block()
361 (s->session->cipher->algorithm_mac & SSL_AEAD)) { in tls1_setup_key_block()
362 if (!ssl_cipher_get_evp_aead(s->session, &aead)) { in tls1_setup_key_block()
368 if (!ssl_cipher_get_evp(s->session, &cipher, &mac_hash, in tls1_setup_key_block()
398 if (s->session->cipher != NULL) { in tls1_setup_key_block()
399 if (s->session->cipher->algorithm_enc == SSL_eNULL) in tls1_setup_key_block()
403 if (s->session->cipher->algorithm_enc == SSL_RC4) in tls1_setup_key_block()
480 rv = tls1_PRF(s, s->session->master_key, s->session->master_key_length, in tls1_export_keying_material()
H A Dssl_clnt.c479 s->session->cipher = s->s3->hs.cipher; in ssl3_connect()
654 SSL_SESSION *sess = s->session; in ssl3_send_client_hello()
694 s->session->session_id_length > 0) { in ssl3_send_client_hello()
695 sl = s->session->session_id_length; in ssl3_send_client_hello()
696 if (sl > sizeof(s->session->session_id)) { in ssl3_send_client_hello()
701 s->session->session_id, sl)) in ssl3_send_client_hello()
933 int master_key_length = sizeof(s->session->master_key); in ssl3_get_server_hello()
936 s->session->master_key, &master_key_length, NULL, in ssl3_get_server_hello()
945 s->session->master_key_length = master_key_length; in ssl3_get_server_hello()
947 if ((s->session->cipher = pref_cipher) == NULL) in ssl3_get_server_hello()
[all …]
H A Dssl_srvr.c463 ((s->session->peer_cert != NULL) && in ssl3_accept()
560 if (!s->session->peer_cert) in ssl3_accept()
649 s->session->cipher = s->s3->hs.cipher; in ssl3_accept()
984 id = s->session->cipher->id; in ssl3_get_client_hello()
1067 int master_key_length = sizeof(s->session->master_key); in ssl3_get_client_hello()
1070 s->session->master_key, &master_key_length, ciphers, in ssl3_get_client_hello()
1079 s->session->master_key_length = master_key_length; in ssl3_get_client_hello()
1082 s->session->verify_result = X509_V_OK; in ssl3_get_client_hello()
1084 sk_SSL_CIPHER_free(s->session->ciphers); in ssl3_get_client_hello()
1085 s->session->ciphers = ciphers; in ssl3_get_client_hello()
[all …]
H A Dtls_lib.c47 s->session->peer_cert_type = cert_type; in tls_process_peer_certs()
49 X509_free(s->session->peer_cert); in tls_process_peer_certs()
50 s->session->peer_cert = peer_cert; in tls_process_peer_certs()
/dflybsd-src/crypto/openssh/
H A Dpkcs11.h716 typedef ck_rv_t (*ck_notify_t) (ck_session_handle_t session,
752 (ck_session_handle_t session, unsigned char *pin,
755 (ck_session_handle_t session, unsigned char *old_pin,
762 ck_session_handle_t *session));
763 _CK_DECLARE_FUNCTION (C_CloseSession, (ck_session_handle_t session));
766 (ck_session_handle_t session,
769 (ck_session_handle_t session,
773 (ck_session_handle_t session,
779 (ck_session_handle_t session, ck_user_type_t user_type,
781 _CK_DECLARE_FUNCTION (C_Logout, (ck_session_handle_t session));
[all …]
H A Dssh-pkcs11.c54 CK_SESSION_HANDLE session; member
119 if (p->slotinfo[i].session && in pkcs11_provider_finalize()
121 p->slotinfo[i].session)) != CKR_OK) in pkcs11_provider_finalize()
220 CK_SESSION_HANDLE session; in pkcs11_find() local
226 session = p->slotinfo[slotidx].session; in pkcs11_find()
227 if ((rv = f->C_FindObjectsInit(session, attr, nattr)) != CKR_OK) { in pkcs11_find()
231 if ((rv = f->C_FindObjects(session, obj, 1, &nfound)) != CKR_OK || in pkcs11_find()
237 if ((rv = f->C_FindObjectsFinal(session)) != CKR_OK) in pkcs11_find()
270 rv = provider->function_list->C_Login(si->session, type, (u_char *)pin, in pkcs11_login_slot()
334 rv = f->C_GetAttributeValue(si->session, obj, &attr, 1); in pkcs11_check_obj_bool_attrib()
[all …]
H A DPROTOCOL.agent6 1. session-bind@openssh.com extension
9 particular SSH session identifier as derived from the initial key
17 string session-bind@openssh.com
19 string session identifier
23 Where 'hostkey' is the encoded server host public key, 'session
25 exchange, 'signature' is the server's signature of the session
33 a duplicate session identifier, or any attempt to bind a connection
73 constraints against the session-bind@openssh.com bindings recorded for
/dflybsd-src/contrib/wpa_supplicant/src/crypto/
H A Dtls_gnutls.c46 gnutls_session_t session; member
68 static int tls_connection_verify_peer(gnutls_session_t session);
204 ret = gnutls_init(&conn->session, in tls_gnutls_init_session()
212 ret = gnutls_set_default_priority(conn->session); in tls_gnutls_init_session()
216 ret = gnutls_priority_set_direct(conn->session, "NORMAL:-VERS-SSL3.0", in tls_gnutls_init_session()
224 gnutls_transport_set_pull_function(conn->session, tls_pull_func); in tls_gnutls_init_session()
225 gnutls_transport_set_push_function(conn->session, tls_push_func); in tls_gnutls_init_session()
226 gnutls_transport_set_ptr(conn->session, (gnutls_transport_ptr_t) conn); in tls_gnutls_init_session()
227 gnutls_session_set_ptr(conn->session, conn); in tls_gnutls_init_session()
234 gnutls_deinit(conn->session); in tls_gnutls_init_session()
[all …]
/dflybsd-src/lib/libtcplay/
H A Dcrypto-dev.c97 struct session_op session; in syscrypt() local
117 memset(&session, 0, sizeof(session)); in syscrypt()
118 session.cipher = cipher_id; in syscrypt()
119 session.key = (caddr_t) key; in syscrypt()
120 session.keylen = klen; in syscrypt()
121 if (ioctl(fd, CIOCGSESSION, &session) == -1) { in syscrypt()
126 cryp.ses = session.ses; in syscrypt()
138 if (ioctl(fd, CIOCFSESSION, &session.ses) == -1) { in syscrypt()
/dflybsd-src/test/testcases/crypto/aesxts/
H A Daes_xts.c44 struct session_op session; in syscrypt() local
56 memset(&session, 0, sizeof(session)); in syscrypt()
57 session.cipher = CRYPTO_AES_XTS; in syscrypt()
58 session.key = (caddr_t) key; in syscrypt()
59 session.keylen = klen; in syscrypt()
60 if (ioctl(fd, CIOCGSESSION, &session) == -1) { in syscrypt()
65 cryp.ses = session.ses; in syscrypt()
77 if (ioctl(fd, CIOCFSESSION, &session.ses) == -1) { in syscrypt()
/dflybsd-src/usr.sbin/ftp-proxy/
H A Dftp-proxy.c71 struct session { struct
88 LIST_ENTRY(session) entry; argument
91 LIST_HEAD(, session) sessions = LIST_HEAD_INITIALIZER(sessions);
93 void buffer_data(struct session *, struct cbuf *, char *, size_t);
94 int client_parse(struct session *);
95 int client_parse_anon(struct session *);
96 int client_parse_cmd(struct session *);
97 void client_read(struct session *);
98 void client_write(struct session *);
100 void end_session(struct session *);
[all …]
/dflybsd-src/test/testcases/crypto/aesctr/
H A Daesctr.c137 struct session_op session; in syscrypt() local
149 memset(&session, 0, sizeof(session)); in syscrypt()
150 session.cipher = CRYPTO_AES_CTR; in syscrypt()
151 session.key = (caddr_t) key; in syscrypt()
152 session.keylen = klen; in syscrypt()
153 if (ioctl(fd, CIOCGSESSION, &session) == -1) { in syscrypt()
158 cryp.ses = session.ses; in syscrypt()
170 if (ioctl(fd, CIOCFSESSION, &session.ses) == -1) { in syscrypt()
/dflybsd-src/etc/pam.d/
H A Dxdm17 # session
18 #session required pam_ssh.so want_agent
19 # xdm has a software bug in it where session callbacks can occur
21 # out the session line works around the problem.
22 #session required pam_lastlog.so no_fail
H A Dother18 # session
19 #session optional pam_ssh.so want_agent
20 session required pam_permit.so
H A Dsystem17 # session
18 #session optional pam_ssh.so want_agent
19 session required pam_lastlog.so no_fail
H A Dtelnetd18 # session
19 #session optional pam_ssh.so want_agent
20 session required pam_lastlog.so no_fail
H A Dsshd18 # session
19 #session optional pam_ssh.so want_agent
20 session required pam_permit.so
/dflybsd-src/test/testcases/crypto/aes/
H A Daestest.c50 struct session_op session; in syscrypt() local
70 memset(&session, 0, sizeof(session)); in syscrypt()
71 session.cipher = CRYPTO_AES_CBC; in syscrypt()
72 session.key = (caddr_t) key; in syscrypt()
73 session.keylen = klen; in syscrypt()
74 if (ioctl(fd, CIOCGSESSION, &session) == -1) { in syscrypt()
79 cryp.ses = session.ses; in syscrypt()
91 if (ioctl(fd, CIOCFSESSION, &session.ses) == -1) { in syscrypt()
/dflybsd-src/test/testcases/crypto/twofish/
H A Dtwofish_test.c49 struct session_op session; in syscrypt() local
69 memset(&session, 0, sizeof(session)); in syscrypt()
70 session.cipher = CRYPTO_TWOFISH_CBC; in syscrypt()
71 session.key = (caddr_t) key; in syscrypt()
72 session.keylen = klen; in syscrypt()
73 if (ioctl(fd, CIOCGSESSION, &session) == -1) { in syscrypt()
78 cryp.ses = session.ses; in syscrypt()
90 if (ioctl(fd, CIOCFSESSION, &session.ses) == -1) { in syscrypt()
/dflybsd-src/test/testcases/crypto/serpent/
H A Dserpent_test.c49 struct session_op session; in syscrypt() local
69 memset(&session, 0, sizeof(session)); in syscrypt()
70 session.cipher = CRYPTO_SERPENT_CBC; in syscrypt()
71 session.key = (caddr_t) key; in syscrypt()
72 session.keylen = klen; in syscrypt()
73 if (ioctl(fd, CIOCGSESSION, &session) == -1) { in syscrypt()
78 cryp.ses = session.ses; in syscrypt()
90 if (ioctl(fd, CIOCFSESSION, &session.ses) == -1) { in syscrypt()
/dflybsd-src/sys/sys/
H A Dproc.h76 struct session;
84 LIST_HEAD(sesslist, session);
94 struct session { struct
95 LIST_ENTRY(session) s_list; /* Hash chain. */
111 struct session *pg_session; /* Pointer to session. */ argument
551 void sess_hold(struct session *sp);
552 void sess_rele(struct session *sp);
555 void sessinsertinit(struct session *sess);

12345