| /freebsd/crypto/krb5/src/lib/gssapi/krb5/ |
| H A D | verify_mic.c | 79 if ((ctx->initiate && direction != 0xff) || in kg_verify_mic_v1() 80 (!ctx->initiate && direction != 0)) { in kg_verify_mic_v1() 111 if (!!(flags & FLAG_SENDER_IS_ACCEPTOR) != ctx->initiate) { in verify_mic_v3() 116 usage = ctx->initiate ? KG_USAGE_ACCEPTOR_SIGN : KG_USAGE_INITIATOR_SIGN; in verify_mic_v3()
|
| H A D | k5sealv3iov.c | 56 acceptor_flag = ctx->initiate ? 0 : FLAG_SENDER_IS_ACCEPTOR; in gss_krb5int_make_seal_token_v3_iov() 58 ? (ctx->initiate in gss_krb5int_make_seal_token_v3_iov() 61 : (ctx->initiate in gss_krb5int_make_seal_token_v3_iov() 310 acceptor_flag = ctx->initiate ? FLAG_SENDER_IS_ACCEPTOR : 0; in gss_krb5int_unseal_v3_iov() 312 ? (!ctx->initiate in gss_krb5int_unseal_v3_iov() 315 : (!ctx->initiate in gss_krb5int_unseal_v3_iov()
|
| H A D | inq_context.c | 116 start = ctx->initiate ? now : ts_incr(now, -context->clockskew); in krb5_gss_inquire_context() 121 ctx->initiate ? ctx->here : ctx->there, in krb5_gss_inquire_context() 132 ctx->initiate ? ctx->there : ctx->here, in krb5_gss_inquire_context() 170 *locally_initiated = ctx->initiate; in krb5_gss_inquire_context()
|
| H A D | iakerb.c | 50 int initiate; member 777 iakerb_alloc_context(iakerb_ctx_id_t *pctx, int initiate) in iakerb_alloc_context() argument 791 ctx->initiate = initiate; in iakerb_alloc_context() 1168 code = iakerb_alloc_context(&ctx, kctx->initiate); in iakerb_gss_import_sec_context() 1187 int *initiate, int *opened) in iakerb_gss_inquire_context() argument 1202 if (initiate != NULL) in iakerb_gss_inquire_context() 1203 *initiate = ctx->initiate; in iakerb_gss_inquire_context() 1212 ctx_flags, initiate, opened); in iakerb_gss_inquire_context()
|
| H A D | ser_sctx.c | 220 * krb5_int32 for initiate. in kg_ctx_size() 297 initiator_name = ctx->initiate ? ctx->here : ctx->there; in kg_ctx_size() 339 (void) krb5_ser_pack_int32((krb5_int32) ctx->initiate, in kg_ctx_externalize() 445 initiator_name = ctx->initiate ? ctx->here : ctx->there; in kg_ctx_externalize() 522 ctx->initiate = (int) ibuf; in kg_ctx_internalize() 654 initiator_name = ctx->initiate ? ctx->here : ctx->there; in kg_ctx_internalize()
|
| H A D | unwrap.c | 161 if ((ctx->initiate && direction != 0xff) || in unwrap_v1() 162 (!ctx->initiate && direction != 0)) { in unwrap_v1() 300 if (!!(flags & FLAG_SENDER_IS_ACCEPTOR) != ctx->initiate) { in unwrap_v3() 306 usage = ctx->initiate ? KG_USAGE_ACCEPTOR_SEAL : KG_USAGE_INITIATOR_SEAL; in unwrap_v3()
|
| H A D | k5sealv3.c | 86 acceptor_flag = ctx->initiate ? 0 : FLAG_SENDER_IS_ACCEPTOR; in gss_krb5int_make_seal_token_v3() 88 ? (ctx->initiate in gss_krb5int_make_seal_token_v3() 91 : (ctx->initiate in gss_krb5int_make_seal_token_v3()
|
| /freebsd/crypto/heimdal/doc/doxyout/hcrypto/man/man3/ |
| H A D | hcrypto_evp.3 | 480 Initiate a EVP_CIPHER_CTX context. Clean up with \fBEVP_CIPHER_CTX_cleanup()\fP. 484 \fIc\fP the cipher initiate. 633 Initiate the EVP_CIPHER_CTX context to encrypt or decrypt data. Clean up with \fBEVP_CIPHER_CTX_cle… 637 \fIctx\fP context to initiate 1127 Initiate a message digest context object. Deallocate with \fBEVP_MD_CTX_cleanup()\fP. Please use \f… 1131 \fIctx\fP variable to initiate.
|
| /freebsd/share/man/man4/ |
| H A D | ng_btsocket.4 | 214 Active sockets initiate connections to passive sockets. 225 call to initiate connections. 284 Active sockets initiate connections to passive sockets. 295 call to initiate connections.
|
| /freebsd/usr.sbin/yppush/ |
| H A D | yppush.8 | 112 with many slaves, it is more efficient to initiate several map transfers 118 will initiate the specified number of transfers immediately and 123 will initiate only the number of specified jobs and then wait
|
| /freebsd/contrib/wpa/wpa_supplicant/examples/ |
| H A D | dpp-nfc.py | 112 summary("Initiate DPP authentication: " + cmd) 115 summary("Failed to initiate DPP Authentication", color=C_RED) 371 summary("Trying to initiate NFC connection handover") 484 summary("Failed to initiate Configurator", color=C_RED) 489 summary("Initiate DPP authentication") 494 summary("Failed to initiate DPP authentication", color=C_RED) 500 …summary("DPP carrier not seen in response - allow peer to initiate a new handover with different p… 718 summary("Try to initiate with alternative parameters") 892 print("Wait for handover to complete - press 'i' to initiate") 896 summary("Try to initiate another handover with own parameters") [all …]
|
| H A D | p2p-nfc.py | 190 summary("Trying to initiate NFC connection handover") 486 …print("Wait for handover to complete - press 'i' to initiate ('w' for WPS only, 'p' for P2P only)") 550 help='initiate handover on touch') 558 help='do not use stdout input to initiate handover')
|
| /freebsd/crypto/krb5/src/lib/gssapi/spnego/ |
| H A D | negoex_ctx.c | 146 assert(!ctx->initiate && ctx->negoex_step == 1); in process_initiator_nego() 218 type = ctx->initiate ? ACCEPTOR_META_DATA : INITIATOR_META_DATA; in exchange_meta_data() 250 assert(ctx->initiate && ctx->negoex_step == 2); in check_optimistic_result() 361 assert(!ctx->initiate && !K5_TAILQ_EMPTY(&ctx->negoex_mechs)); in mech_accept() 424 return (ctx->initiate ^ !make_checksum) ? in verify_keyusage() 557 if (ctx->initiate) in make_output_token() 564 type = ctx->initiate ? INITIATOR_META_DATA : ACCEPTOR_META_DATA; in make_output_token() 576 type = ctx->initiate ? AP_REQUEST : CHALLENGE; in make_output_token()
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_accept.pod | 5 SSL_accept - wait for a TLS/SSL client to initiate a TLS/SSL handshake 15 SSL_accept() waits for a TLS/SSL client to initiate the TLS/SSL handshake.
|
| H A D | ASYNC_WAIT_CTX_new.pod | 114 initiate cryptographic operations. The engine would initiate those operations 173 code would initiate cryptographic operations, and the engine code would dispatch
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/replacement/ |
| H A D | scrub_cancel.ksh | 86 # Initiate a scrub. 89 # Initiate a resilver to cancel the scrub.
|
| /freebsd/contrib/wpa/src/ap/ |
| H A D | iapp.c | 507 /* TODO: For levels 2 and 3: send RADIUS Initiate-Request, receive in iapp_init() 508 * RADIUS Initiate-Accept or Initiate-Reject. IAPP port should actually in iapp_init() 509 * be openned only after receiving Initiate-Accept. If Initiate-Reject in iapp_init()
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | SSL_accept.3 | 64 SSL_accept \- wait for a TLS/SSL client to initiate a TLS/SSL handshake 74 \&\fBSSL_accept()\fR waits for a TLS/SSL client to initiate the TLS/SSL handshake.
|
| H A D | ASYNC_WAIT_CTX_new.3 | 172 initiate cryptographic operations. The engine would initiate those operations 223 code would initiate cryptographic operations, and the engine code would dispatch
|
| /freebsd/contrib/sendmail/libsm/ |
| H A D | assert.c | 149 ** SM_ABORT_AT -- Initiate abnormal program termination. 151 ** This is the low level function that is called to initiate abnormal
|
| /freebsd/contrib/llvm-project/clang/include/clang/Tooling/Refactoring/Rename/ |
| H A D | RenamingAction.h | 50 static Expected<RenameOccurrences> initiate(RefactoringRuleContext &Context, 71 static Expected<QualifiedRenameRule> initiate(RefactoringRuleContext &Context,
|
| /freebsd/lib/libgssapi/ |
| H A D | gss_acquire_cred.3 | 143 Credentials may be used either to initiate or accept security 146 Credentials will only be used to initiate security contexts.
|
| /freebsd/contrib/wpa/src/eap_server/ |
| H A D | eap_server.c | 690 "EAP: building EAP-Initiate-Re-auth-Start: Identifier %d", in SM_STATE() 820 wpa_printf(MSG_INFO, "EAP-Initiate: Invalid frame"); in SM_STATE() 826 wpa_hexdump(MSG_DEBUG, "EAP: EAP-Initiate/Re-Auth", pos, len); in SM_STATE() 828 wpa_printf(MSG_INFO, "EAP: Too short EAP-Initiate/Re-auth"); in SM_STATE() 850 "EAP: No keyName-NAI in EAP-Initiate/Re-auth Packet"); in SM_STATE() 854 wpa_hexdump_ascii(MSG_DEBUG, "EAP: EAP-Initiate/Re-auth - keyName-NAI", in SM_STATE() 858 "EAP: Too long keyName-NAI in EAP-Initiate/Re-auth"); in SM_STATE() 866 * In passthrough case, EAP-Initiate/Re-auth replaces in SM_STATE() 868 * and forward EAP-Initiate/Re-auth to the backend in SM_STATE() 976 wpa_hexdump(MSG_DEBUG, "EAP: EAP-Initiate/Re-Auth TVs/TLVs", in SM_STATE() [all …]
|
| /freebsd/crypto/openssl/include/internal/ |
| H A D | quic_record_rx.h | 370 * new packet received with a KP of X could either be an attempt to initiate yet 396 * initiate an excessive number of key updates. 447 * trying to initiate an excessive number of Key Updates. The timeout for the 472 * Note that when a peer initiates a Key Update, we MUST also initiate a Key 503 * and use it to initiate a key update on the TX side.
|
| /freebsd/contrib/tcpdump/ |
| H A D | print-decnet.c | 269 #define MFS_CI 020 /* connect initiate */ 271 #define MFS_DI 060 /* disconnect initiate */ 273 #define MFS_RCI 0140 /* retransmitted connect initiate */ 407 struct cimsg /* connect initiate message */ 438 struct dimsg /* disconnect initiate message */ 1004 ND_PRINT("conn-initiate "); in print_nsp() 1006 ND_PRINT("retrans-conn-initiate "); in print_nsp() 1090 ND_PRINT("disconn-initiate %u>%u ", src, dst); in print_nsp()
|