/freebsd-9.3-release/crypto/openssh/ |
H A D | auth-bsdauth.c | 91 bsdauth_respond(void *ctx, u_int numresponses, char **responses) argument 105 authok = auth_userresponse(authctxt->as, responses[0], 0); 107 debug3("bsdauth_respond: <%s> = <%d>", responses[0], authok);
|
H A D | auth-skey.c | 75 skey_respond(void *ctx, u_int numresponses, char **responses) argument 82 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
|
H A D | auth.h | 105 int (*respond)(void *ctx, u_int numresp, char **responses);
|
H A D | monitor_wrap.c | 981 mm_bsdauth_respond(void *ctx, u_int numresponses, char **responses) argument 991 buffer_put_cstring(&m, responses[0]); 1041 mm_skey_respond(void *ctx, u_int numresponses, char **responses) argument 1051 buffer_put_cstring(&m, responses[0]);
|
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | revoke.c | 707 for (j = 0; j < ocsp->ocsp.tbsResponseData.responses.len; j++) { 710 ret = der_heim_integer_cmp(&ocsp->ocsp.tbsResponseData.responses.val[j].certID.serialNumber, 718 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.hashAlgorithm, 720 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.issuerNameHash); 729 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.hashAlgorithm, 731 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.issuerKeyHash); 735 switch (ocsp->ocsp.tbsResponseData.responses.val[j].certStatus.element) { 748 if (ocsp->ocsp.tbsResponseData.responses.val[j].thisUpdate > 753 if (ocsp->ocsp.tbsResponseData.responses.val[j].nextUpdate) { 754 if (*ocsp->ocsp.tbsResponseData.responses [all...] |
/freebsd-9.3-release/contrib/wpa/src/radius/ |
H A D | radius_client.h | 93 * responses - radiusAccClientResponses 95 u32 responses; member in struct:hostapd_radius_server
|
H A D | radius_client.c | 755 rconf->responses++; 1445 serv->responses,
|
/freebsd-9.3-release/contrib/ntp/libntp/ |
H A D | work_thread.c | 228 sizeof(blocking_children[0]->responses[0]); 237 c->responses = erealloc(c->responses, new_alloc * each); 239 c->responses[sidx] = NULL; 244 INSIST(NULL == c->responses[c->head_response % c->responses_alloc]); 368 c->responses[qhead % c->responses_alloc] = resp; 453 removed = c->responses[slot]; 454 c->responses[slot] = NULL; 913 * responses? If so, and if there are, what to do with them?
|
/freebsd-9.3-release/contrib/cvs/src/ |
H A D | client.h | 102 /* Get the responses and then close the connection. */ 148 * This structure is used to catalog the responses the client is 169 * responses, and error indicates we should exit with nonzero 176 the client, as set by the Valid-responses request. */ 180 * error. This should be set only for responses which were in the 182 * responses. 198 /* Table of responses ending in an entry with a NULL name. */ 200 extern struct response responses[];
|
H A D | client.c | 1597 Update-existing and Created responses?" That is an excellent question, 1600 between those responses and a "U foo.c" line (note that Merged, from 1929 /* The Mode, Mod-time, and Checksum responses should not carry 2053 Valid-responses and not get this response. However, if 3309 struct response responses[] = 3449 * Get some server responses and process them. Returns nonzero for 3461 for (rs = responses; rs->name != NULL; ++rs) 3518 /* Get the responses and then close the connection. */ 3962 /* Loop, getting responses from the server. */ 4488 send_to_server ("Valid-responses", 3291 struct response responses[] = variable in typeref:struct:response [all...] |
H A D | server.c | 683 for (rs = responses; rs->name != NULL; ++rs) 703 for (rs = responses; rs->name != NULL; ++rs) 718 for (rs = responses; rs->name != NULL; ++rs) 4128 documentation in cvsclient.texi (other responses do it 4864 REQ_LINE("Valid-responses", serve_valid_responses, 5118 for responses). We could try something like syslog() or our own 5867 * On a verification request, the server's responses are the same
|
/freebsd-9.3-release/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_prn.c | 241 for (i = 0; i < sk_OCSP_SINGLERESP_num(rd->responses); i++) { 242 if (!sk_OCSP_SINGLERESP_value(rd->responses, i)) 244 single = sk_OCSP_SINGLERESP_value(rd->responses, i);
|
H A D | ocsp_srv.c | 70 * Utility functions related to sending OCSP responses and extracting 148 if (!rsp->tbsResponseData->responses && 149 !(rsp->tbsResponseData->responses = sk_OCSP_SINGLERESP_new_null())) 197 if (!(sk_OCSP_SINGLERESP_push(rsp->tbsResponseData->responses, single)))
|
H A D | ocsp_cl.c | 230 return sk_OCSP_SINGLERESP_num(bs->tbsResponseData->responses); 239 return sk_OCSP_SINGLERESP_value(bs->tbsResponseData->responses, idx); 255 sresp = bs->tbsResponseData->responses; 313 /* Maybe check for multiple responses and give an error? */ 328 * accepting very old responses without a nextUpdate field an optional maxage
|
H A D | ocsp_asn.c | 155 ASN1_SEQUENCE_OF(OCSP_RESPDATA, responses, OCSP_SINGLERESP),
|
H A D | ocsp_vfy.c | 234 sresp = bs->tbsResponseData->responses;
|
H A D | ocsp.h | 259 * responses SEQUENCE OF SingleResponse, 266 STACK_OF(OCSP_SINGLERESP) *responses; member in struct:ocsp_response_data_st
|
/freebsd-9.3-release/contrib/ntp/include/ |
H A D | ntp_worker.h | 33 * The same header is used for both requests to and responses from 81 * blocking worker requests and responses. 106 responses; member in struct:blocking_child_tag
|
/freebsd-9.3-release/crypto/openssl/demos/asn1/ |
H A D | ocsp.c | 121 responses SEQUENCE OF SingleResponse, 229 STACK_OF(SingleResponse) *responses; 352 ASN1_SEQUENCE_OF(ResponseData, responses, SingleResponse),
|
/freebsd-9.3-release/contrib/bind9/lib/dns/ |
H A D | rrl.c | 20 * Rate limit DNS responses. 387 * Collisions result in legitimate rate limiting responses for one 388 * query name also limiting responses for other names to the 413 * referral and NODATA responses, count them as the same. 483 balance = e->responses + age * rate; 606 "rrl %08x %6s responses=%-3d %s", 607 hash_key(&e->key), age_str, e->responses, action); 672 e->responses = rate; 675 e->responses += rate*age; 676 if (e->responses > rat [all...] |
/freebsd-9.3-release/contrib/bind9/lib/dns/include/dns/ |
H A D | rrl.h | 22 * Rate limit DNS responses. 39 * dropped or slipped responses. 59 sizeof(" responses to ") + \ 116 signed int responses :DNS_RRL_RESPONSE_BITS; member in struct:dns_rrl_entry
|
/freebsd-9.3-release/contrib/ipfilter/ |
H A D | HISTORY | 1045 ICMP responses to ICMP packets in the keep state table.
|
/freebsd-9.3-release/contrib/ntp/sntp/libevent/ |
H A D | http.c | 2833 const char **responses; member in struct:response_class 2862 return response_classes[klass].responses[subcode];
|