Searched refs:responses (Results 1 - 15 of 15) sorted by relevance
/freebsd-10.0-release/crypto/openssh/ |
H A D | auth-bsdauth.c | 91 bsdauth_respond(void *ctx, u_int numresponses, char **responses) argument 105 authok = auth_userresponse(authctxt->as, responses[0], 0); 107 debug3("bsdauth_respond: <%s> = <%d>", responses[0], authok);
|
H A D | auth-skey.c | 75 skey_respond(void *ctx, u_int numresponses, char **responses) argument 82 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
|
H A D | auth.h | 106 int (*respond)(void *ctx, u_int numresp, char **responses);
|
H A D | monitor_wrap.c | 984 mm_bsdauth_respond(void *ctx, u_int numresponses, char **responses) argument 994 buffer_put_cstring(&m, responses[0]); 1044 mm_skey_respond(void *ctx, u_int numresponses, char **responses) argument 1054 buffer_put_cstring(&m, responses[0]);
|
/freebsd-10.0-release/crypto/heimdal/lib/hx509/ |
H A D | revoke.c | 714 for (j = 0; j < ocsp->ocsp.tbsResponseData.responses.len; j++) { 717 ret = der_heim_integer_cmp(&ocsp->ocsp.tbsResponseData.responses.val[j].certID.serialNumber, 725 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.hashAlgorithm, 727 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.issuerNameHash); 736 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.hashAlgorithm, 738 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.issuerKeyHash); 742 switch (ocsp->ocsp.tbsResponseData.responses.val[j].certStatus.element) { 755 if (ocsp->ocsp.tbsResponseData.responses.val[j].thisUpdate > 760 if (ocsp->ocsp.tbsResponseData.responses.val[j].nextUpdate) { 761 if (*ocsp->ocsp.tbsResponseData.responses [all...] |
/freebsd-10.0-release/contrib/wpa/src/radius/ |
H A D | radius_client.h | 87 * responses - radiusAccClientResponses 89 u32 responses; member in struct:hostapd_radius_server
|
H A D | radius_client.c | 749 rconf->responses++; 1439 serv->responses,
|
/freebsd-10.0-release/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_cl.c | 222 return sk_OCSP_SINGLERESP_num(bs->tbsResponseData->responses); 230 return sk_OCSP_SINGLERESP_value(bs->tbsResponseData->responses, idx); 243 sresp = bs->tbsResponseData->responses; 297 /* Maybe check for multiple responses and give an error? */ 308 * Also to avoid accepting very old responses without a nextUpdate field an optional maxage
|
H A D | ocsp_prn.c | 231 for (i = 0; i < sk_OCSP_SINGLERESP_num(rd->responses); i++) 233 if (! sk_OCSP_SINGLERESP_value(rd->responses, i)) continue; 234 single = sk_OCSP_SINGLERESP_value(rd->responses, i);
|
H A D | ocsp_srv.c | 68 /* Utility functions related to sending OCSP responses and extracting 134 if(!rsp->tbsResponseData->responses && 135 !(rsp->tbsResponseData->responses = sk_OCSP_SINGLERESP_new_null())) 188 if (!(sk_OCSP_SINGLERESP_push(rsp->tbsResponseData->responses, single)))
|
H A D | ocsp_asn.c | 154 ASN1_SEQUENCE_OF(OCSP_RESPDATA, responses, OCSP_SINGLERESP),
|
H A D | ocsp_vfy.c | 222 sresp = bs->tbsResponseData->responses;
|
H A D | ocsp.h | 269 * responses SEQUENCE OF SingleResponse, 277 STACK_OF(OCSP_SINGLERESP) *responses; member in struct:ocsp_response_data_st
|
/freebsd-10.0-release/contrib/ntp/ntpq/ |
H A D | ntpq-opts.def | 336 Specify a timeout period for responses to server queries.
|
/freebsd-10.0-release/contrib/ipfilter/ |
H A D | HISTORY | 568 ICMP responses to ICMP packets in the keep state table.
|
Completed in 261 milliseconds