Searched refs:responses (Results 1 - 23 of 23) sorted by relevance

/freebsd-9.3-release/crypto/openssh/
H A Dauth-bsdauth.c91 bsdauth_respond(void *ctx, u_int numresponses, char **responses) argument
105 authok = auth_userresponse(authctxt->as, responses[0], 0);
107 debug3("bsdauth_respond: <%s> = <%d>", responses[0], authok);
H A Dauth-skey.c75 skey_respond(void *ctx, u_int numresponses, char **responses) argument
82 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
H A Dauth.h105 int (*respond)(void *ctx, u_int numresp, char **responses);
H A Dmonitor_wrap.c981 mm_bsdauth_respond(void *ctx, u_int numresponses, char **responses) argument
991 buffer_put_cstring(&m, responses[0]);
1041 mm_skey_respond(void *ctx, u_int numresponses, char **responses) argument
1051 buffer_put_cstring(&m, responses[0]);
/freebsd-9.3-release/crypto/heimdal/lib/hx509/
H A Drevoke.c707 for (j = 0; j < ocsp->ocsp.tbsResponseData.responses.len; j++) {
710 ret = der_heim_integer_cmp(&ocsp->ocsp.tbsResponseData.responses.val[j].certID.serialNumber,
718 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.hashAlgorithm,
720 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.issuerNameHash);
729 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.hashAlgorithm,
731 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.issuerKeyHash);
735 switch (ocsp->ocsp.tbsResponseData.responses.val[j].certStatus.element) {
748 if (ocsp->ocsp.tbsResponseData.responses.val[j].thisUpdate >
753 if (ocsp->ocsp.tbsResponseData.responses.val[j].nextUpdate) {
754 if (*ocsp->ocsp.tbsResponseData.responses
[all...]
/freebsd-9.3-release/contrib/wpa/src/radius/
H A Dradius_client.h93 * responses - radiusAccClientResponses
95 u32 responses; member in struct:hostapd_radius_server
H A Dradius_client.c755 rconf->responses++;
1445 serv->responses,
/freebsd-9.3-release/contrib/ntp/libntp/
H A Dwork_thread.c228 sizeof(blocking_children[0]->responses[0]);
237 c->responses = erealloc(c->responses, new_alloc * each);
239 c->responses[sidx] = NULL;
244 INSIST(NULL == c->responses[c->head_response % c->responses_alloc]);
368 c->responses[qhead % c->responses_alloc] = resp;
453 removed = c->responses[slot];
454 c->responses[slot] = NULL;
913 * responses? If so, and if there are, what to do with them?
/freebsd-9.3-release/contrib/cvs/src/
H A Dclient.h102 /* Get the responses and then close the connection. */
148 * This structure is used to catalog the responses the client is
169 * responses, and error indicates we should exit with nonzero
176 the client, as set by the Valid-responses request. */
180 * error. This should be set only for responses which were in the
182 * responses.
198 /* Table of responses ending in an entry with a NULL name. */
200 extern struct response responses[];
H A Dclient.c1597 Update-existing and Created responses?" That is an excellent question,
1600 between those responses and a "U foo.c" line (note that Merged, from
1929 /* The Mode, Mod-time, and Checksum responses should not carry
2053 Valid-responses and not get this response. However, if
3309 struct response responses[] =
3449 * Get some server responses and process them. Returns nonzero for
3461 for (rs = responses; rs->name != NULL; ++rs)
3518 /* Get the responses and then close the connection. */
3962 /* Loop, getting responses from the server. */
4488 send_to_server ("Valid-responses",
3291 struct response responses[] = variable in typeref:struct:response
[all...]
H A Dserver.c683 for (rs = responses; rs->name != NULL; ++rs)
703 for (rs = responses; rs->name != NULL; ++rs)
718 for (rs = responses; rs->name != NULL; ++rs)
4128 documentation in cvsclient.texi (other responses do it
4864 REQ_LINE("Valid-responses", serve_valid_responses,
5118 for responses). We could try something like syslog() or our own
5867 * On a verification request, the server's responses are the same
/freebsd-9.3-release/crypto/openssl/crypto/ocsp/
H A Docsp_prn.c241 for (i = 0; i < sk_OCSP_SINGLERESP_num(rd->responses); i++) {
242 if (!sk_OCSP_SINGLERESP_value(rd->responses, i))
244 single = sk_OCSP_SINGLERESP_value(rd->responses, i);
H A Docsp_srv.c70 * Utility functions related to sending OCSP responses and extracting
148 if (!rsp->tbsResponseData->responses &&
149 !(rsp->tbsResponseData->responses = sk_OCSP_SINGLERESP_new_null()))
197 if (!(sk_OCSP_SINGLERESP_push(rsp->tbsResponseData->responses, single)))
H A Docsp_cl.c230 return sk_OCSP_SINGLERESP_num(bs->tbsResponseData->responses);
239 return sk_OCSP_SINGLERESP_value(bs->tbsResponseData->responses, idx);
255 sresp = bs->tbsResponseData->responses;
313 /* Maybe check for multiple responses and give an error? */
328 * accepting very old responses without a nextUpdate field an optional maxage
H A Docsp_asn.c155 ASN1_SEQUENCE_OF(OCSP_RESPDATA, responses, OCSP_SINGLERESP),
H A Docsp_vfy.c234 sresp = bs->tbsResponseData->responses;
H A Docsp.h259 * responses SEQUENCE OF SingleResponse,
266 STACK_OF(OCSP_SINGLERESP) *responses; member in struct:ocsp_response_data_st
/freebsd-9.3-release/contrib/ntp/include/
H A Dntp_worker.h33 * The same header is used for both requests to and responses from
81 * blocking worker requests and responses.
106 responses; member in struct:blocking_child_tag
/freebsd-9.3-release/crypto/openssl/demos/asn1/
H A Docsp.c121 responses SEQUENCE OF SingleResponse,
229 STACK_OF(SingleResponse) *responses;
352 ASN1_SEQUENCE_OF(ResponseData, responses, SingleResponse),
/freebsd-9.3-release/contrib/bind9/lib/dns/
H A Drrl.c20 * Rate limit DNS responses.
387 * Collisions result in legitimate rate limiting responses for one
388 * query name also limiting responses for other names to the
413 * referral and NODATA responses, count them as the same.
483 balance = e->responses + age * rate;
606 "rrl %08x %6s responses=%-3d %s",
607 hash_key(&e->key), age_str, e->responses, action);
672 e->responses = rate;
675 e->responses += rate*age;
676 if (e->responses > rat
[all...]
/freebsd-9.3-release/contrib/bind9/lib/dns/include/dns/
H A Drrl.h22 * Rate limit DNS responses.
39 * dropped or slipped responses.
59 sizeof(" responses to ") + \
116 signed int responses :DNS_RRL_RESPONSE_BITS; member in struct:dns_rrl_entry
/freebsd-9.3-release/contrib/ipfilter/
H A DHISTORY1045 ICMP responses to ICMP packets in the keep state table.
/freebsd-9.3-release/contrib/ntp/sntp/libevent/
H A Dhttp.c2833 const char **responses; member in struct:response_class
2862 return response_classes[klass].responses[subcode];

Completed in 228 milliseconds