Searched refs:responses (Results 1 - 24 of 24) sorted by relevance

/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssh/dist/
H A Dauth-bsdauth.c90 bsdauth_respond(void *ctx, u_int numresponses, char **responses) argument
104 authok = auth_userresponse(authctxt->as, responses[0], 0);
106 debug3("bsdauth_respond: <%s> = <%d>", responses[0], authok);
H A Dauth-skey.c79 skey_respond(void *ctx, u_int numresponses, char **responses) argument
86 skey_passcheck(authctxt->pw->pw_name, responses[0]) != -1)
H A Dauth.h110 int (*respond)(void *ctx, u_int numresp, char **responses);
H A Dmonitor_wrap.c980 mm_bsdauth_respond(void *ctx, u_int numresponses, char **responses) argument
990 buffer_put_cstring(&m, responses[0]);
1041 mm_skey_respond(void *ctx, u_int numresponses, char **responses) argument
1051 buffer_put_cstring(&m, responses[0]);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hx509/
H A Drevoke.c716 for (j = 0; j < ocsp->ocsp.tbsResponseData.responses.len; j++) {
719 ret = der_heim_integer_cmp(&ocsp->ocsp.tbsResponseData.responses.val[j].certID.serialNumber,
727 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.hashAlgorithm,
729 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.issuerNameHash);
738 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.hashAlgorithm,
740 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.issuerKeyHash);
744 switch (ocsp->ocsp.tbsResponseData.responses.val[j].certStatus.element) {
757 if (ocsp->ocsp.tbsResponseData.responses.val[j].thisUpdate >
762 if (ocsp->ocsp.tbsResponseData.responses.val[j].nextUpdate) {
763 if (*ocsp->ocsp.tbsResponseData.responses
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/radius/
H A Dradius_client.h93 * responses - radiusAccClientResponses
95 u32 responses; member in struct:hostapd_radius_server
H A Dradius_client.c755 rconf->responses++;
1445 serv->responses,
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/resolver/ns4/
H A Dnamed.conf32 // minimal-responses yes;
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/resolver/ns6/
H A Dnamed.conf32 // minimal-responses yes;
/netbsd-6-1-5-RELEASE/external/gpl2/xcvs/dist/src/
H A Dclient.h90 /* Get the responses and then close the connection. */
139 * This structure is used to catalog the responses the client is
160 * responses, and error indicates we should exit with nonzero
168 the client, as set by the Valid-responses request. */
172 * error. This should be set only for responses which were in the
174 * responses.
190 /* Table of responses ending in an entry with a NULL name. */
192 extern struct response responses[];
H A Dclient.c1215 Update-existing and Created responses?" That is an excellent question,
1218 between those responses and a "U foo.c" line (note that Merged, from
1540 /* The Mode, Mod-time, and Checksum responses should not carry
1664 Valid-responses and not get this response. However, if
3028 struct response responses[] =
3186 /* Get some server responses and process them.
3203 for (rs = responses; rs->name; ++rs)
3286 /* Get the responses and then close the connection. */
3696 /* Loop, getting responses from the server. */
3999 send_to_server ("Valid-responses",
3027 struct response responses[] = variable in typeref:struct:response
[all...]
H A Dserver.c143 /* Set while we are reprocessing a log so that we can avoid sending responses
547 for (rs = responses; rs->name != NULL; ++rs)
638 for (rs = responses; rs->name != NULL; ++rs)
653 for (rs = responses; rs->name != NULL; ++rs)
2687 * the primary open if we can no longer read its responses.
4922 documentation in cvsclient.texi (other responses do it
5876 REQ_LINE("Valid-responses", serve_valid_responses,
7158 * On a verification request, the server's responses are the same
H A Dsanity.sh31155 echo "Valid-requests Root Valid-responses valid-requests Directory Entry Modified Unchanged Argument Argumentx ci co update"
31182 echo "Valid-requests Root Valid-responses valid-requests Directory Entry Modified Unchanged Argument Argumentx ci co update"
31206 echo "Valid-requests Root Valid-responses valid-requests Directory Entry Modified Unchanged Argument Argumentx ci co update"
31229 echo "Valid-requests Root Valid-responses valid-requests Directory Entry Modified Unchanged Argument Argumentx ci co update"
31242 Valid-responses [-a-zA-Z ]*
31256 Valid-responses [-a-zA-Z ]*
31282 echo "Valid-requests Root Valid-responses valid-requests Directory Entry Modified Unchanged Argument Argumentx ci co update"
31313 echo "Valid-requests Root Valid-responses valid-requests Directory Entry Modified Unchanged Argument Argumentx ci co update"
31333 echo "Valid-requests Root Valid-responses valid-requests Directory Entry Modified Unchanged Argument Argumentx ci co update"
31353 echo "Valid-requests Root Valid-responses vali
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ocsp/
H A Docsp_cl.c222 return sk_OCSP_SINGLERESP_num(bs->tbsResponseData->responses);
230 return sk_OCSP_SINGLERESP_value(bs->tbsResponseData->responses, idx);
243 sresp = bs->tbsResponseData->responses;
297 /* Maybe check for multiple responses and give an error? */
308 * Also to avoid accepting very old responses without a nextUpdate field an optional maxage
H A Docsp_prn.c231 for (i = 0; i < sk_OCSP_SINGLERESP_num(rd->responses); i++)
233 if (! sk_OCSP_SINGLERESP_value(rd->responses, i)) continue;
234 single = sk_OCSP_SINGLERESP_value(rd->responses, i);
H A Docsp_srv.c68 /* Utility functions related to sending OCSP responses and extracting
134 if(!rsp->tbsResponseData->responses &&
135 !(rsp->tbsResponseData->responses = sk_OCSP_SINGLERESP_new_null()))
188 if (!(sk_OCSP_SINGLERESP_push(rsp->tbsResponseData->responses, single)))
H A Docsp_asn.c154 ASN1_SEQUENCE_OF(OCSP_RESPDATA, responses, OCSP_SINGLERESP),
H A Docsp_vfy.c222 sresp = bs->tbsResponseData->responses;
H A Docsp.h269 * responses SEQUENCE OF SingleResponse,
277 STACK_OF(OCSP_SINGLERESP) *responses; member in struct:ocsp_response_data_st
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/demos/asn1/
H A Docsp.c122 responses SEQUENCE OF SingleResponse,
230 STACK_OF(SingleResponse) *responses;
356 ASN1_SEQUENCE_OF(ResponseData, responses, SingleResponse),
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/system/dnssec/ns7/
H A Dnamed.conf35 minimal-responses yes;
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/sntp/
H A Dsntp-opts.def67 responses received from servers. The default is
/netbsd-6-1-5-RELEASE/external/bsd/ntp/dist/ntpq/
H A Dntpq-opts.def351 Specify a timeout period for responses to server queries.
/netbsd-6-1-5-RELEASE/dist/ipf/
H A DHISTORY1281 ICMP responses to ICMP packets in the keep state table.

Completed in 242 milliseconds