/freebsd-13-stable/crypto/openssh/ |
H A D | auth-bsdauth.c | 98 bsdauth_respond(void *ctx, u_int numresponses, char **responses) argument 112 authok = auth_userresponse(authctxt->as, responses[0], 0); 114 debug3("bsdauth_respond: <%s> = <%d>", responses[0], authok);
|
H A D | auth-skey.c | 74 skey_respond(void *ctx, u_int numresponses, char **responses) argument 81 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
|
H A D | auth.h | 126 int (*respond)(void *ctx, u_int numresp, char **responses);
|
H A D | monitor_wrap.c | 884 mm_bsdauth_respond(void *ctx, u_int numresponses, char **responses) argument 895 if ((r = sshbuf_put_cstring(m, responses[0])) != 0)
|
/freebsd-13-stable/crypto/heimdal/lib/hx509/ |
H A D | revoke.c | 714 for (j = 0; j < ocsp->ocsp.tbsResponseData.responses.len; j++) { 717 ret = der_heim_integer_cmp(&ocsp->ocsp.tbsResponseData.responses.val[j].certID.serialNumber, 725 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.hashAlgorithm, 727 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.issuerNameHash); 736 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.hashAlgorithm, 738 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.issuerKeyHash); 742 switch (ocsp->ocsp.tbsResponseData.responses.val[j].certStatus.element) { 755 if (ocsp->ocsp.tbsResponseData.responses.val[j].thisUpdate > 760 if (ocsp->ocsp.tbsResponseData.responses.val[j].nextUpdate) { 761 if (*ocsp->ocsp.tbsResponseData.responses [all...] |
/freebsd-13-stable/contrib/wpa/src/radius/ |
H A D | radius_client.h | 87 * responses - radiusAccClientResponses 89 u32 responses; member in struct:hostapd_radius_server
|
H A D | radius_client.c | 876 rconf->responses++; 1641 serv->responses,
|
/freebsd-13-stable/contrib/wpa/src/common/ |
H A D | gas_server.c | 46 struct dl_list responses; /* struct gas_server_response::list */ member in struct:gas_server 150 dl_list_add(&gas->responses, &response->list); 294 dl_list_for_each(response, &gas->responses, struct gas_server_response, 405 dl_list_for_each(response, &gas->responses, struct gas_server_response, 432 dl_list_init(&gas->responses); 451 dl_list_for_each_safe(response, tmp_r, &gas->responses,
|
/freebsd-13-stable/contrib/ntp/libntp/ |
H A D | work_thread.c | 239 sizeof(blocking_children[0]->responses[0]); 248 c->responses = erealloc(c->responses, new_alloc * each); 250 c->responses[sidx] = NULL; 255 INSIST(NULL == c->responses[c->head_response % c->responses_alloc]); 379 c->responses[qhead % c->responses_alloc] = resp; 466 removed = c->responses[slot]; 467 c->responses[slot] = NULL; 926 * responses? If so, and if there are, what to do with them?
|
/freebsd-13-stable/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_prn.c | 187 for (i = 0; i < sk_OCSP_SINGLERESP_num(rd->responses); i++) { 188 if (!sk_OCSP_SINGLERESP_value(rd->responses, i)) 190 single = sk_OCSP_SINGLERESP_value(rd->responses, i);
|
H A D | ocsp_srv.c | 20 * Utility functions related to sending OCSP responses and extracting 97 if (rsp->tbsResponseData.responses == NULL 98 && (rsp->tbsResponseData.responses 149 if (!(sk_OCSP_SINGLERESP_push(rsp->tbsResponseData.responses, single)))
|
H A D | ocsp_cl.c | 181 * Return number of OCSP_SINGLERESP responses present in a basic response. 188 return sk_OCSP_SINGLERESP_num(bs->tbsResponseData.responses); 197 return sk_OCSP_SINGLERESP_value(bs->tbsResponseData.responses, idx); 261 sresp = bs->tbsResponseData.responses; 319 /* Maybe check for multiple responses and give an error? */ 334 * accepting very old responses without a nextUpdate field an optional maxage
|
H A D | ocsp_local.h | 152 * responses SEQUENCE OF SingleResponse, 159 STACK_OF(OCSP_SINGLERESP) *responses; member in struct:ocsp_response_data_st
|
H A D | ocsp_asn.c | 107 ASN1_SEQUENCE_OF(OCSP_RESPDATA, responses, OCSP_SINGLERESP),
|
H A D | ocsp_vfy.c | 202 sresp = bs->tbsResponseData.responses;
|
/freebsd-13-stable/contrib/ntp/include/ |
H A D | ntp_worker.h | 33 * The same header is used for both requests to and responses from 81 * blocking worker requests and responses. 106 responses; member in struct:blocking_child_tag
|
/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | tls_openssl_ocsp.c | 144 * responses SEQUENCE OF SingleResponse, 151 STACK_OF(SingleResponse) *responses; 205 ASN1_SEQUENCE_OF(ResponseData, responses, SingleResponse), 698 num_resp = sk_SingleResponse_num(rd->responses); 705 cmp_sresp = sk_SingleResponse_value(rd->responses, 0); 710 sresp = sk_SingleResponse_value(rd->responses, j);
|
/freebsd-13-stable/contrib/wpa/src/tls/ |
H A D | tlsv1_client_ocsp.c | 359 const u8 *resp_data, *sign_value, *key_hash = NULL, *responses; local 483 * responses SEQUENCE OF SingleResponse, 578 /* responses SEQUENCE OF SingleResponse */ 583 "OCSP: Expected SEQUENCE (responses) - found class %d tag 0x%x", 587 responses = hdr.payload; 589 wpa_hexdump(MSG_MSGDUMP, "OCSP: responses", responses, responses_len); 660 responses, responses_len);
|
/freebsd-13-stable/contrib/libxo/xohtml/external/ |
H A D | jquery.js | 7370 function done( status, nativeStatusText, responses, headers ) { 7399 response = responses ? ajaxHandleResponses( s, jqXHR, responses ) : undefined, 7730 /* Handles responses to an ajax request: 7735 function ajaxHandleResponses( s, jqXHR, responses ) { 7747 if ( type in responses ) { 7748 jqXHR[ responseFields[type] ] = responses[ type ]; 7771 if ( dataTypes[ 0 ] in responses ) { 7775 for ( type in responses ) { 7795 return responses[ finalDataTyp [all...] |
/freebsd-13-stable/contrib/libevent/ |
H A D | http.c | 2961 const char **responses; member in struct:response_class 2990 return response_classes[klass].responses[subcode];
|
/freebsd-13-stable/contrib/ntp/sntp/libevent/ |
H A D | http.c | 2833 const char **responses; member in struct:response_class 2862 return response_classes[klass].responses[subcode];
|