/freebsd-10.3-release/crypto/openssh/ |
H A D | auth-bsdauth.c | 98 bsdauth_respond(void *ctx, u_int numresponses, char **responses) argument 112 authok = auth_userresponse(authctxt->as, responses[0], 0); 114 debug3("bsdauth_respond: <%s> = <%d>", responses[0], authok);
|
H A D | auth-skey.c | 75 skey_respond(void *ctx, u_int numresponses, char **responses) argument 82 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
|
H A D | auth.h | 111 int (*respond)(void *ctx, u_int numresp, char **responses);
|
H A D | monitor_wrap.c | 777 mm_bsdauth_respond(void *ctx, u_int numresponses, char **responses) argument 787 buffer_put_cstring(&m, responses[0]); 837 mm_skey_respond(void *ctx, u_int numresponses, char **responses) argument 847 buffer_put_cstring(&m, responses[0]);
|
/freebsd-10.3-release/crypto/heimdal/lib/hx509/ |
H A D | revoke.c | 714 for (j = 0; j < ocsp->ocsp.tbsResponseData.responses.len; j++) { 717 ret = der_heim_integer_cmp(&ocsp->ocsp.tbsResponseData.responses.val[j].certID.serialNumber, 725 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.hashAlgorithm, 727 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.issuerNameHash); 736 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.hashAlgorithm, 738 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.issuerKeyHash); 742 switch (ocsp->ocsp.tbsResponseData.responses.val[j].certStatus.element) { 755 if (ocsp->ocsp.tbsResponseData.responses.val[j].thisUpdate > 760 if (ocsp->ocsp.tbsResponseData.responses.val[j].nextUpdate) { 761 if (*ocsp->ocsp.tbsResponseData.responses [all...] |
/freebsd-10.3-release/contrib/wpa/src/radius/ |
H A D | radius_client.h | 87 * responses - radiusAccClientResponses 89 u32 responses; member in struct:hostapd_radius_server
|
H A D | radius_client.c | 749 rconf->responses++; 1439 serv->responses,
|
/freebsd-10.3-release/contrib/ntp/libntp/ |
H A D | work_thread.c | 228 sizeof(blocking_children[0]->responses[0]); 237 c->responses = erealloc(c->responses, new_alloc * each); 239 c->responses[sidx] = NULL; 244 INSIST(NULL == c->responses[c->head_response % c->responses_alloc]); 368 c->responses[qhead % c->responses_alloc] = resp; 453 removed = c->responses[slot]; 454 c->responses[slot] = NULL; 913 * responses? If so, and if there are, what to do with them?
|
/freebsd-10.3-release/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_cl.c | 228 return sk_OCSP_SINGLERESP_num(bs->tbsResponseData->responses); 237 return sk_OCSP_SINGLERESP_value(bs->tbsResponseData->responses, idx); 253 sresp = bs->tbsResponseData->responses; 311 /* Maybe check for multiple responses and give an error? */ 326 * accepting very old responses without a nextUpdate field an optional maxage
|
H A D | ocsp_prn.c | 240 for (i = 0; i < sk_OCSP_SINGLERESP_num(rd->responses); i++) { 241 if (!sk_OCSP_SINGLERESP_value(rd->responses, i)) 243 single = sk_OCSP_SINGLERESP_value(rd->responses, i);
|
H A D | ocsp_srv.c | 70 * Utility functions related to sending OCSP responses and extracting 148 if (!rsp->tbsResponseData->responses && 149 !(rsp->tbsResponseData->responses = sk_OCSP_SINGLERESP_new_null())) 197 if (!(sk_OCSP_SINGLERESP_push(rsp->tbsResponseData->responses, single)))
|
H A D | ocsp_asn.c | 155 ASN1_SEQUENCE_OF(OCSP_RESPDATA, responses, OCSP_SINGLERESP),
|
H A D | ocsp_vfy.c | 234 sresp = bs->tbsResponseData->responses;
|
H A D | ocsp.h | 260 * responses SEQUENCE OF SingleResponse, 267 STACK_OF(OCSP_SINGLERESP) *responses; member in struct:ocsp_response_data_st
|
/freebsd-10.3-release/contrib/ntp/include/ |
H A D | ntp_worker.h | 33 * The same header is used for both requests to and responses from 81 * blocking worker requests and responses. 106 responses; member in struct:blocking_child_tag
|
/freebsd-10.3-release/contrib/ntp/sntp/libevent/ |
H A D | http.c | 2833 const char **responses; member in struct:response_class 2862 return response_classes[klass].responses[subcode];
|