/illumos-gate/usr/src/lib/print/libhttp-core/common/ |
H A D | http-private.h | 77 gnutls_session session; /* GNU TLS session object */ member in struct:__anon4286
|
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb_nt_cancel.c | 40 * pending server request from this session. If a pending request is 64 struct smb_session *session; local 66 session = sr->session; 68 smb_slist_enter(&session->s_req_list); 69 req = smb_slist_head(&session->s_req_list); 79 req = smb_slist_next(&session->s_req_list, req); 81 smb_slist_exit(&session->s_req_list);
|
H A D | smb2_cancel.c | 54 struct smb_session *session = sr->session; local 57 smb_slist_enter(&session->s_req_list); 58 req = smb_slist_head(&session->s_req_list); 66 req = smb_slist_next(&session->s_req_list, req); 72 smb_slist_exit(&session->s_req_list); 79 struct smb_session *session = sr->session; local 82 smb_slist_enter(&session->s_req_list); 83 req = smb_slist_head(&session [all...] |
H A D | smb_negotiate.c | 31 * server using a reliable, session oriented transport protocol, such as 32 * NetBIOS or TCP/IP. Originally, each SMB session was restricted to a 33 * single underlying transport connection, i.e. a single NetBIOS session, 37 * allowing parallelism over each NetBIOS session. For example, raw data 42 * to specify how many they were prepared to support per session 107 * ULONG SessionKey; Unique token identifying this session 156 * ULONG SessionKey; Unique token identifying this session 278 * know this is the only thread currently using this session. 357 skc = &sr->session->s_cfg; 405 smb_session_t *session local [all...] |
H A D | smb_oplock.c | 124 * - LEVEL_II oplocks are not supported for the session 142 smb_session_t *session; local 152 session = SMB_OFILE_GET_SESSION(ofile); 187 (!smb_session_levelII_oplocks(session)) || 222 * - if the session doesn't support LEVEL II oplocks, and 'brk' is 311 if (sr && (sr->session == og->og_session) && 399 * using an smb_request on the owning session.
|
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaRand.c | 61 meta_session_t *session; local 67 rv = meta_handle2session(hSession, &session); 70 REFRELEASE(session); 95 meta_session_t *session; local 101 rv = meta_handle2session(hSession, &session); 104 REFRELEASE(session);
|
H A D | metaDigest.c | 44 meta_session_t *session; local 49 rv = meta_handle2session(hSession, &session); 53 rv = meta_operation_init_defer(CKF_DIGEST, session, pMechanism, NULL); 55 REFRELEASE(session); 70 meta_session_t *session; local 76 rv = meta_handle2session(hSession, &session); 80 rv = meta_do_operation(CKF_DIGEST, MODE_SINGLE, session, NULL, 83 REFRELEASE(session); 98 meta_session_t *session; local 104 rv = meta_handle2session(hSession, &session); 131 meta_session_t *session; local 164 meta_session_t *session; local [all...] |
H A D | metaSign.c | 45 meta_session_t *session; local 51 rv = meta_handle2session(hSession, &session); 57 REFRELEASE(session); 61 rv = meta_operation_init(CKF_SIGN, session, pMechanism, key); 64 REFRELEASE(session); 80 meta_session_t *session; local 82 rv = meta_handle2session(hSession, &session); 87 meta_operation_cleanup(session, CKF_SIGN, FALSE); 88 REFRELEASE(session); 92 rv = meta_do_operation(CKF_SIGN, MODE_SINGLE, session, NUL 110 meta_session_t *session; local 140 meta_session_t *session; local 169 meta_session_t *session; local 203 meta_session_t *session; local [all...] |
H A D | metaVerify.c | 45 meta_session_t *session; local 51 rv = meta_handle2session(hSession, &session); 57 REFRELEASE(session); 61 rv = meta_operation_init(CKF_VERIFY, session, pMechanism, key); 64 REFRELEASE(session); 79 meta_session_t *session; local 81 rv = meta_handle2session(hSession, &session); 87 meta_operation_cleanup(session, CKF_VERIFY, FALSE); 88 REFRELEASE(session); 92 rv = meta_do_operation(CKF_VERIFY, MODE_SINGLE, session, NUL 110 meta_session_t *session; local 140 meta_session_t *session; local 174 meta_session_t *session; local 208 meta_session_t *session; local [all...] |
H A D | metaSessionManager.c | 35 * searching each session object list for matching objects. 59 * by the session manager. 105 * successful, a write-lock on the session will be held to indicate 110 meta_handle2session(CK_SESSION_HANDLE hSession, meta_session_t **session) argument 126 /* Make sure this session is not in the process of being deleted */ 136 *session = tmp_session; 145 meta_session_alloc(meta_session_t **session) argument 149 /* Allocate memory for the session. */ 167 *session = new_session; 175 * Create and add a session t 178 meta_session_activate(meta_session_t *session) argument 196 meta_session_deactivate(meta_session_t *session, boolean_t have_sessionlist_lock) argument 304 meta_session_dealloc(meta_session_t *session) argument [all...] |
H A D | metaCrypt.c | 45 meta_session_t *session; local 51 rv = meta_handle2session(hSession, &session); 57 REFRELEASE(session); 61 rv = meta_operation_init_defer(CKF_ENCRYPT, session, pMechanism, key); 64 REFRELEASE(session); 80 meta_session_t *session; local 82 rv = meta_handle2session(hSession, &session); 87 meta_operation_cleanup(session, CKF_ENCRYPT, FALSE); 88 REFRELEASE(session); 92 rv = meta_do_operation(CKF_ENCRYPT, MODE_SINGLE, session, NUL 111 meta_session_t *session; local 141 meta_session_t *session; local 171 meta_session_t *session; local 206 meta_session_t *session; local 237 meta_session_t *session; local 267 meta_session_t *session; local [all...] |
H A D | metaSlotToken.c | 382 meta_session_t *session; local 385 rv = meta_handle2session(hSession, &session); 389 if (IS_READ_ONLY_SESSION(session->session_flags)) { 390 REFRELEASE(session); 395 session->session_flags); 397 REFRELEASE(session); 406 REFRELEASE(session);
|
H A D | metaAttrManager.c | 45 get_master_attributes_by_object(slot_session_t *session, argument 58 rv = FUNCLIST(session->fw_st_id)->C_GetAttributeValue( 59 session->hSession, slot_object->hObject, &attr, 1); 85 rv = FUNCLIST(session->fw_st_id)->C_GetAttributeValue( 86 session->hSession, slot_object->hObject, &attr, 1);
|
H A D | metaKeys.c | 43 meta_session_t *session; local 49 rv = meta_handle2session(hSession, &session); 54 rv = meta_object_alloc(session, &key); 58 rv = meta_generate_keys(session, pMechanism, pTemplate, ulCount, key, 70 (void) meta_object_dealloc(session, key, B_TRUE); 73 REFRELEASE(session); 90 meta_session_t *session; local 96 rv = meta_handle2session(hSession, &session); 101 rv = meta_object_alloc(session, &key1); 105 rv = meta_object_alloc(session, 145 meta_session_t *session; local 191 meta_session_t *session; local 251 meta_session_t *session; local [all...] |
H A D | metaSession.c | 109 meta_session_t *session; local 112 rv = meta_handle2session(hSession, &session); 116 /* save info about session flags before they are destroyed */ 117 flags = session->session_flags; 119 rv = meta_session_deactivate(session, B_FALSE); 122 meta_session_dealloc(session); 144 meta_session_t *session; local 154 while ((session = meta_sessionlist_head) != NULL) { 155 rv = meta_handle2session((CK_SESSION_HANDLE)session, &session); 183 meta_session_t *session; local 217 meta_getopstatelen(meta_session_t *session, CK_ULONG *out_length) argument 243 meta_session_t *session; local 419 meta_session_t *session; local 512 meta_session_t *session; local 586 meta_session_t *session; local [all...] |
H A D | metaSlotManager.c | 151 slot_session_t *session, *next_session; local 154 * The slotobjects associated with the session should have 159 session = slots[slot].session_pool.idle_list_head; 160 while (session) { 161 next_session = session->next; 162 (void) FUNCLIST(session->fw_st_id)->C_CloseSession( 163 session->hSession); 165 &session->object_list_lock); 166 free(session); 167 session 440 meta_get_slot_session(CK_ULONG slotnum, slot_session_t **session, CK_FLAGS flags) argument 529 meta_release_slot_session(slot_session_t *session) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | encrypt.h | 87 void (*session)(Session_Key *); member in struct:__anon144
|
/illumos-gate/usr/src/lib/libndmp/common/ |
H A D | libndmp.c | 124 ndmp_terminate_session(int session) argument 133 ndmp_door_put_uint32(enc_ctx, session);
|
/illumos-gate/usr/src/cmd/ndmpd/ndmp/ |
H A D | ndmpd_scsi.c | 103 ndmpd_session_t *session = ndmp_get_client_data(connection); local 105 if (session->ns_scsi.sd_is_open == -1) { 112 (void) ndmp_open_list_del(session->ns_scsi.sd_adapter_name, 113 session->ns_scsi.sd_sid, 114 session->ns_scsi.sd_lun); 115 (void) close(session->ns_scsi.sd_devid); 117 session->ns_scsi.sd_is_open = -1; 118 session->ns_scsi.sd_devid = -1; 119 session->ns_scsi.sd_sid = 0; 120 session 153 ndmpd_session_t *session = ndmp_get_client_data(connection); local 225 ndmpd_session_t *session = ndmp_get_client_data(connection); local 293 ndmpd_session_t *session = ndmp_get_client_data(connection); local 414 ndmpd_session_t *session = ndmp_get_client_data(connection); local 506 ndmpd_session_t *session = ndmp_get_client_data(connection); local [all...] |
/illumos-gate/usr/src/cmd/hal/addons/network-devices/ |
H A D | snmp.c | 69 struct snmp_session session, *ss; local 81 /* initialize the SNMP session */ 82 snmp_sess_init(&session); 83 session.peername = network; 84 session.community = (uchar_t *)community; 85 session.community_len = strlen((const char *)session.community); 86 session.version = SNMP_VERSION_1; 88 if ((ss = snmp_open(&session)) == NULL)
|
/illumos-gate/usr/src/uts/common/gssapi/mechs/krb5/crypto/enc_provider/ |
H A D | arcfour_provider.c | 22 setup_arcfour_crypto(CK_SESSION_HANDLE session, argument 57 if ((rv = C_CreateObject(session, template, 84 CK_SESSION_HANDLE session = 0; local 115 session = krb_ctx_hSession(context); 120 session = context->arcfour_ctx.dSession; 130 ret = setup_arcfour_crypto(session, key, &algos, kptr); 138 rv = C_DecryptInit(session, &mechanism, *kptr); 150 rv = C_DecryptUpdate(session, 156 rv = C_Decrypt(session, 176 (void)C_DestroyObject(session, hKe 201 CK_SESSION_HANDLE session; local [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSession.h | 60 * mechanism, if the session slot has a CRYPTO_LIMITED_HASH_SUPPORT flag set. 73 typedef struct session { struct 75 pthread_mutex_t session_mutex; /* session's mutex lock */ 76 pthread_mutex_t ses_free_mutex; /* mutex used during closing session */ 78 uint32_t ses_refcnt; /* session reference count */ 79 uint32_t ses_close_sync; /* session closing flags */ 80 crypto_session_id_t k_session; /* kernel session ID */ 81 boolean_t ses_RO; /* RO or RW session flag */ 89 /* Pointers to form the global session list */ 90 struct session *nex [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softSession.h | 54 /* Holds the saved session state */ 73 typedef struct session { struct 75 pthread_mutex_t session_mutex; /* session's mutex lock */ 77 uint32_t ses_refcnt; /* session reference count */ 78 uint32_t ses_close_sync; /* session closing flags */ 79 CK_STATE state; /* session state */ 86 /* Pointers to form the global session list */ 87 struct session *next; /* points to next session on the list */ 88 struct session *pre [all...] |
/illumos-gate/usr/src/lib/libcommputil/common/ |
H A D | sdp_parse_helper.c | 204 sdp_free_session(sdp_session_t *session) argument 206 if (session == NULL) 208 if (session->s_origin != NULL) 209 sdp_free_origin(session->s_origin); 210 if (session->s_name != NULL) 211 free(session->s_name); 212 if (session->s_info != NULL) 213 free(session->s_info); 214 if (session->s_uri != NULL) 215 free(session [all...] |
/illumos-gate/usr/src/cmd/utmp_update/ |
H A D | utmp_update.c | 229 *exitstatus, *xtime, *session, *pad, *syslen, *host; local 244 session = argv[10]; 278 (void) sscanf(session, "%d", &temp);
|