Home
last modified time | relevance | path

Searched full:initiate (Results 1 – 25 of 450) sorted by relevance

12345678910>>...18

/freebsd/crypto/krb5/src/lib/gssapi/krb5/
H A Dverify_mic.c79 if ((ctx->initiate && direction != 0xff) || in kg_verify_mic_v1()
80 (!ctx->initiate && direction != 0)) { in kg_verify_mic_v1()
111 if (!!(flags & FLAG_SENDER_IS_ACCEPTOR) != ctx->initiate) { in verify_mic_v3()
116 usage = ctx->initiate ? KG_USAGE_ACCEPTOR_SIGN : KG_USAGE_INITIATOR_SIGN; in verify_mic_v3()
H A Dk5sealv3iov.c56 acceptor_flag = ctx->initiate ? 0 : FLAG_SENDER_IS_ACCEPTOR; in gss_krb5int_make_seal_token_v3_iov()
58 ? (ctx->initiate in gss_krb5int_make_seal_token_v3_iov()
61 : (ctx->initiate in gss_krb5int_make_seal_token_v3_iov()
310 acceptor_flag = ctx->initiate ? FLAG_SENDER_IS_ACCEPTOR : 0; in gss_krb5int_unseal_v3_iov()
312 ? (!ctx->initiate in gss_krb5int_unseal_v3_iov()
315 : (!ctx->initiate in gss_krb5int_unseal_v3_iov()
H A Dinq_context.c116 start = ctx->initiate ? now : ts_incr(now, -context->clockskew); in krb5_gss_inquire_context()
121 ctx->initiate ? ctx->here : ctx->there, in krb5_gss_inquire_context()
132 ctx->initiate ? ctx->there : ctx->here, in krb5_gss_inquire_context()
170 *locally_initiated = ctx->initiate; in krb5_gss_inquire_context()
H A Diakerb.c50 int initiate; member
777 iakerb_alloc_context(iakerb_ctx_id_t *pctx, int initiate) in iakerb_alloc_context() argument
791 ctx->initiate = initiate; in iakerb_alloc_context()
1168 code = iakerb_alloc_context(&ctx, kctx->initiate); in iakerb_gss_import_sec_context()
1187 int *initiate, int *opened) in iakerb_gss_inquire_context() argument
1202 if (initiate != NULL) in iakerb_gss_inquire_context()
1203 *initiate = ctx->initiate; in iakerb_gss_inquire_context()
1212 ctx_flags, initiate, opened); in iakerb_gss_inquire_context()
H A Dser_sctx.c220 * krb5_int32 for initiate. in kg_ctx_size()
297 initiator_name = ctx->initiate ? ctx->here : ctx->there; in kg_ctx_size()
339 (void) krb5_ser_pack_int32((krb5_int32) ctx->initiate, in kg_ctx_externalize()
445 initiator_name = ctx->initiate ? ctx->here : ctx->there; in kg_ctx_externalize()
522 ctx->initiate = (int) ibuf; in kg_ctx_internalize()
654 initiator_name = ctx->initiate ? ctx->here : ctx->there; in kg_ctx_internalize()
H A Dunwrap.c161 if ((ctx->initiate && direction != 0xff) || in unwrap_v1()
162 (!ctx->initiate && direction != 0)) { in unwrap_v1()
300 if (!!(flags & FLAG_SENDER_IS_ACCEPTOR) != ctx->initiate) { in unwrap_v3()
306 usage = ctx->initiate ? KG_USAGE_ACCEPTOR_SEAL : KG_USAGE_INITIATOR_SEAL; in unwrap_v3()
H A Dk5sealv3.c86 acceptor_flag = ctx->initiate ? 0 : FLAG_SENDER_IS_ACCEPTOR; in gss_krb5int_make_seal_token_v3()
88 ? (ctx->initiate in gss_krb5int_make_seal_token_v3()
91 : (ctx->initiate in gss_krb5int_make_seal_token_v3()
/freebsd/crypto/heimdal/doc/doxyout/hcrypto/man/man3/
H A Dhcrypto_evp.3480 Initiate a EVP_CIPHER_CTX context. Clean up with \fBEVP_CIPHER_CTX_cleanup()\fP.
484 \fIc\fP the cipher initiate.
633 Initiate the EVP_CIPHER_CTX context to encrypt or decrypt data. Clean up with \fBEVP_CIPHER_CTX_cle…
637 \fIctx\fP context to initiate
1127 Initiate a message digest context object. Deallocate with \fBEVP_MD_CTX_cleanup()\fP. Please use \f…
1131 \fIctx\fP variable to initiate.
/freebsd/share/man/man4/
H A Dng_btsocket.4214 Active sockets initiate connections to passive sockets.
225 call to initiate connections.
284 Active sockets initiate connections to passive sockets.
295 call to initiate connections.
/freebsd/usr.sbin/yppush/
H A Dyppush.8112 with many slaves, it is more efficient to initiate several map transfers
118 will initiate the specified number of transfers immediately and
123 will initiate only the number of specified jobs and then wait
/freebsd/contrib/wpa/wpa_supplicant/examples/
H A Ddpp-nfc.py112 summary("Initiate DPP authentication: " + cmd)
115 summary("Failed to initiate DPP Authentication", color=C_RED)
371 summary("Trying to initiate NFC connection handover")
484 summary("Failed to initiate Configurator", color=C_RED)
489 summary("Initiate DPP authentication")
494 summary("Failed to initiate DPP authentication", color=C_RED)
500 …summary("DPP carrier not seen in response - allow peer to initiate a new handover with different p…
718 summary("Try to initiate with alternative parameters")
892 print("Wait for handover to complete - press 'i' to initiate")
896 summary("Try to initiate another handover with own parameters")
[all …]
H A Dp2p-nfc.py190 summary("Trying to initiate NFC connection handover")
486 …print("Wait for handover to complete - press 'i' to initiate ('w' for WPS only, 'p' for P2P only)")
550 help='initiate handover on touch')
558 help='do not use stdout input to initiate handover')
/freebsd/crypto/krb5/src/lib/gssapi/spnego/
H A Dnegoex_ctx.c146 assert(!ctx->initiate && ctx->negoex_step == 1); in process_initiator_nego()
218 type = ctx->initiate ? ACCEPTOR_META_DATA : INITIATOR_META_DATA; in exchange_meta_data()
250 assert(ctx->initiate && ctx->negoex_step == 2); in check_optimistic_result()
361 assert(!ctx->initiate && !K5_TAILQ_EMPTY(&ctx->negoex_mechs)); in mech_accept()
424 return (ctx->initiate ^ !make_checksum) ? in verify_keyusage()
557 if (ctx->initiate) in make_output_token()
564 type = ctx->initiate ? INITIATOR_META_DATA : ACCEPTOR_META_DATA; in make_output_token()
576 type = ctx->initiate ? AP_REQUEST : CHALLENGE; in make_output_token()
/freebsd/crypto/openssl/doc/man3/
H A DSSL_accept.pod5 SSL_accept - wait for a TLS/SSL client to initiate a TLS/SSL handshake
15 SSL_accept() waits for a TLS/SSL client to initiate the TLS/SSL handshake.
H A DASYNC_WAIT_CTX_new.pod114 initiate cryptographic operations. The engine would initiate those operations
173 code would initiate cryptographic operations, and the engine code would dispatch
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/replacement/
H A Dscrub_cancel.ksh86 # Initiate a scrub.
89 # Initiate a resilver to cancel the scrub.
/freebsd/contrib/wpa/src/ap/
H A Diapp.c507 /* TODO: For levels 2 and 3: send RADIUS Initiate-Request, receive in iapp_init()
508 * RADIUS Initiate-Accept or Initiate-Reject. IAPP port should actually in iapp_init()
509 * be openned only after receiving Initiate-Accept. If Initiate-Reject in iapp_init()
/freebsd/secure/lib/libcrypto/man/man3/
H A DSSL_accept.364 SSL_accept \- wait for a TLS/SSL client to initiate a TLS/SSL handshake
74 \&\fBSSL_accept()\fR waits for a TLS/SSL client to initiate the TLS/SSL handshake.
H A DASYNC_WAIT_CTX_new.3172 initiate cryptographic operations. The engine would initiate those operations
223 code would initiate cryptographic operations, and the engine code would dispatch
/freebsd/contrib/sendmail/libsm/
H A Dassert.c149 ** SM_ABORT_AT -- Initiate abnormal program termination.
151 ** This is the low level function that is called to initiate abnormal
/freebsd/contrib/llvm-project/clang/include/clang/Tooling/Refactoring/Rename/
H A DRenamingAction.h50 static Expected<RenameOccurrences> initiate(RefactoringRuleContext &Context,
71 static Expected<QualifiedRenameRule> initiate(RefactoringRuleContext &Context,
/freebsd/lib/libgssapi/
H A Dgss_acquire_cred.3143 Credentials may be used either to initiate or accept security
146 Credentials will only be used to initiate security contexts.
/freebsd/contrib/wpa/src/eap_server/
H A Deap_server.c690 "EAP: building EAP-Initiate-Re-auth-Start: Identifier %d", in SM_STATE()
820 wpa_printf(MSG_INFO, "EAP-Initiate: Invalid frame"); in SM_STATE()
826 wpa_hexdump(MSG_DEBUG, "EAP: EAP-Initiate/Re-Auth", pos, len); in SM_STATE()
828 wpa_printf(MSG_INFO, "EAP: Too short EAP-Initiate/Re-auth"); in SM_STATE()
850 "EAP: No keyName-NAI in EAP-Initiate/Re-auth Packet"); in SM_STATE()
854 wpa_hexdump_ascii(MSG_DEBUG, "EAP: EAP-Initiate/Re-auth - keyName-NAI", in SM_STATE()
858 "EAP: Too long keyName-NAI in EAP-Initiate/Re-auth"); in SM_STATE()
866 * In passthrough case, EAP-Initiate/Re-auth replaces in SM_STATE()
868 * and forward EAP-Initiate/Re-auth to the backend in SM_STATE()
976 wpa_hexdump(MSG_DEBUG, "EAP: EAP-Initiate/Re-Auth TVs/TLVs", in SM_STATE()
[all …]
/freebsd/crypto/openssl/include/internal/
H A Dquic_record_rx.h370 * new packet received with a KP of X could either be an attempt to initiate yet
396 * initiate an excessive number of key updates.
447 * trying to initiate an excessive number of Key Updates. The timeout for the
472 * Note that when a peer initiates a Key Update, we MUST also initiate a Key
503 * and use it to initiate a key update on the TX side.
/freebsd/contrib/tcpdump/
H A Dprint-decnet.c269 #define MFS_CI 020 /* connect initiate */
271 #define MFS_DI 060 /* disconnect initiate */
273 #define MFS_RCI 0140 /* retransmitted connect initiate */
407 struct cimsg /* connect initiate message */
438 struct dimsg /* disconnect initiate message */
1004 ND_PRINT("conn-initiate "); in print_nsp()
1006 ND_PRINT("retrans-conn-initiate "); in print_nsp()
1090 ND_PRINT("disconn-initiate %u>%u ", src, dst); in print_nsp()

12345678910>>...18