/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/ |
H A D | auth-bsdauth.c | 90 bsdauth_respond(void *ctx, u_int numresponses, char **responses) argument 104 authok = auth_userresponse(authctxt->as, responses[0], 0); 106 debug3("bsdauth_respond: <%s> = <%d>", responses[0], authok);
|
H A D | auth-skey.c | 79 skey_respond(void *ctx, u_int numresponses, char **responses) argument 86 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
|
H A D | auth.h | 110 int (*respond)(void *ctx, u_int numresp, char **responses);
|
H A D | monitor_wrap.c | 980 mm_bsdauth_respond(void *ctx, u_int numresponses, char **responses) argument 990 buffer_put_cstring(&m, responses[0]); 1041 mm_skey_respond(void *ctx, u_int numresponses, char **responses) argument 1051 buffer_put_cstring(&m, responses[0]);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hx509/ |
H A D | revoke.c | 716 for (j = 0; j < ocsp->ocsp.tbsResponseData.responses.len; j++) { 719 ret = der_heim_integer_cmp(&ocsp->ocsp.tbsResponseData.responses.val[j].certID.serialNumber, 727 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.hashAlgorithm, 729 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.issuerNameHash); 738 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.hashAlgorithm, 740 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.issuerKeyHash); 744 switch (ocsp->ocsp.tbsResponseData.responses.val[j].certStatus.element) { 757 if (ocsp->ocsp.tbsResponseData.responses.val[j].thisUpdate > 762 if (ocsp->ocsp.tbsResponseData.responses.val[j].nextUpdate) { 763 if (*ocsp->ocsp.tbsResponseData.responses [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/radius/ |
H A D | radius_client.h | 93 * responses - radiusAccClientResponses 95 u32 responses; member in struct:hostapd_radius_server
|
H A D | radius_client.c | 755 rconf->responses++; 1445 serv->responses,
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/resolver/ns4/ |
H A D | named.conf | 32 // minimal-responses yes;
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/resolver/ns6/ |
H A D | named.conf | 32 // minimal-responses yes;
|
/netbsd-6-1-5-RELEASE/external/gpl2/xcvs/dist/src/ |
H A D | client.h | 90 /* Get the responses and then close the connection. */ 139 * This structure is used to catalog the responses the client is 160 * responses, and error indicates we should exit with nonzero 168 the client, as set by the Valid-responses request. */ 172 * error. This should be set only for responses which were in the 174 * responses. 190 /* Table of responses ending in an entry with a NULL name. */ 192 extern struct response responses[];
|
H A D | client.c | 1215 Update-existing and Created responses?" That is an excellent question, 1218 between those responses and a "U foo.c" line (note that Merged, from 1540 /* The Mode, Mod-time, and Checksum responses should not carry 1664 Valid-responses and not get this response. However, if 3028 struct response responses[] = 3186 /* Get some server responses and process them. 3203 for (rs = responses; rs->name; ++rs) 3286 /* Get the responses and then close the connection. */ 3696 /* Loop, getting responses from the server. */ 3999 send_to_server ("Valid-responses", 3027 struct response responses[] = variable in typeref:struct:response [all...] |
H A D | server.c | 143 /* Set while we are reprocessing a log so that we can avoid sending responses 547 for (rs = responses; rs->name != NULL; ++rs) 638 for (rs = responses; rs->name != NULL; ++rs) 653 for (rs = responses; rs->name != NULL; ++rs) 2687 * the primary open if we can no longer read its responses. 4922 documentation in cvsclient.texi (other responses do it 5876 REQ_LINE("Valid-responses", serve_valid_responses, 7158 * On a verification request, the server's responses are the same
|
H A D | sanity.sh | 31155 echo "Valid-requests Root Valid-responses valid-requests Directory Entry Modified Unchanged Argument Argumentx ci co update" 31182 echo "Valid-requests Root Valid-responses valid-requests Directory Entry Modified Unchanged Argument Argumentx ci co update" 31206 echo "Valid-requests Root Valid-responses valid-requests Directory Entry Modified Unchanged Argument Argumentx ci co update" 31229 echo "Valid-requests Root Valid-responses valid-requests Directory Entry Modified Unchanged Argument Argumentx ci co update" 31242 Valid-responses [-a-zA-Z ]* 31256 Valid-responses [-a-zA-Z ]* 31282 echo "Valid-requests Root Valid-responses valid-requests Directory Entry Modified Unchanged Argument Argumentx ci co update" 31313 echo "Valid-requests Root Valid-responses valid-requests Directory Entry Modified Unchanged Argument Argumentx ci co update" 31333 echo "Valid-requests Root Valid-responses valid-requests Directory Entry Modified Unchanged Argument Argumentx ci co update" 31353 echo "Valid-requests Root Valid-responses vali [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ocsp/ |
H A D | ocsp_cl.c | 222 return sk_OCSP_SINGLERESP_num(bs->tbsResponseData->responses); 230 return sk_OCSP_SINGLERESP_value(bs->tbsResponseData->responses, idx); 243 sresp = bs->tbsResponseData->responses; 297 /* Maybe check for multiple responses and give an error? */ 308 * Also to avoid accepting very old responses without a nextUpdate field an optional maxage
|
H A D | ocsp_prn.c | 231 for (i = 0; i < sk_OCSP_SINGLERESP_num(rd->responses); i++) 233 if (! sk_OCSP_SINGLERESP_value(rd->responses, i)) continue; 234 single = sk_OCSP_SINGLERESP_value(rd->responses, i);
|
H A D | ocsp_srv.c | 68 /* Utility functions related to sending OCSP responses and extracting 134 if(!rsp->tbsResponseData->responses && 135 !(rsp->tbsResponseData->responses = sk_OCSP_SINGLERESP_new_null())) 188 if (!(sk_OCSP_SINGLERESP_push(rsp->tbsResponseData->responses, single)))
|
H A D | ocsp_asn.c | 154 ASN1_SEQUENCE_OF(OCSP_RESPDATA, responses, OCSP_SINGLERESP),
|
H A D | ocsp_vfy.c | 222 sresp = bs->tbsResponseData->responses;
|
H A D | ocsp.h | 269 * responses SEQUENCE OF SingleResponse, 277 STACK_OF(OCSP_SINGLERESP) *responses; member in struct:ocsp_response_data_st
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/asn1/ |
H A D | ocsp.c | 122 responses SEQUENCE OF SingleResponse, 230 STACK_OF(SingleResponse) *responses; 356 ASN1_SEQUENCE_OF(ResponseData, responses, SingleResponse),
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/dnssec/ns7/ |
H A D | named.conf | 35 minimal-responses yes;
|
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/sntp/ |
H A D | sntp-opts.def | 67 responses received from servers. The default is
|
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/ntpq/ |
H A D | ntpq-opts.def | 351 Specify a timeout period for responses to server queries.
|
/netbsd-6-1-5-RELEASE/dist/ipf/ |
H A D | HISTORY | 1281 ICMP responses to ICMP packets in the keep state table.
|