| /freebsd/crypto/krb5/src/plugins/preauth/spake/ |
| H A D | spake_kdc.c | 302 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in spake_edata() argument 312 (*respond)(arg, KRB5KDC_ERR_ETYPE_NOSUPP, NULL); in spake_edata() 318 send_challenge(context, gstate, group, cb, rock, &empty, respond, NULL, in spake_edata() 322 (*respond)(arg, 0, NULL); in spake_edata() 332 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in verify_support() argument 349 send_challenge(context, gstate, group, cb, rock, der_msg, NULL, respond, in verify_support() 354 (*respond)(arg, ret, NULL, NULL, NULL); in verify_support() 368 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in verify_response() argument 474 (*respond)(arg, ret, NULL, NULL, NULL); in verify_response() 487 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in verify_encdata() argument [all …]
|
| /freebsd/usr.sbin/rmt/ |
| H A D | rmt.c | 102 goto respond; in main() 110 goto respond; in main() 119 goto respond; in main() 136 goto respond; in main() 162 goto respond; in main() 182 goto respond; in main() 188 respond: in main()
|
| /freebsd/crypto/krb5/src/kdc/ |
| H A D | kdc_preauth_encts.c | 35 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in enc_ts_get() argument 41 (*respond)(arg, ENOENT, NULL); in enc_ts_get() 43 (*respond)(arg, 0, NULL); in enc_ts_get() 51 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in enc_ts_verify() argument 118 (*respond)(arg, retval, NULL, NULL, NULL); in enc_ts_verify()
|
| H A D | dispatch.c | 39 loop_respond_fn respond; member 51 loop_respond_fn oldrespond = state->respond; in finish_dispatch() 92 verto_ctx *vctx, loop_respond_fn respond, void *arg) in dispatch() argument 103 (*respond)(arg, retval, NULL); in dispatch() 106 state->respond = respond; in dispatch()
|
| H A D | kdc_preauth_ec.c | 40 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in ec_edata() argument 46 (*respond)(arg, ENOENT, NULL); in ec_edata() 48 (*respond)(arg, 0, NULL); in ec_edata() 56 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in ec_verify() argument 151 (*respond)(arg, ret, modreq, NULL, NULL); in ec_verify()
|
| H A D | kdc_preauth.c | 874 kdc_hint_respond_fn respond; member 892 kdc_hint_respond_fn oldrespond = state->respond; in hint_list_finish() 976 krb5_pa_data ***e_data_out, kdc_hint_respond_fn respond, in get_preauth_hint_list() argument 990 state->respond = respond; in get_preauth_hint_list() 1013 (*respond)(arg); in get_preauth_hint_list() 1066 kdc_preauth_respond_fn respond; member 1173 /* Release state and respond to the AS-REQ processing code with the result of 1178 kdc_preauth_respond_fn respond; in finish_check_padata() local 1201 * respond to the AS-REQ processing code. */ in finish_check_padata() 1202 respond = state->respond; in finish_check_padata() [all …]
|
| H A D | do_as_req.c | 154 loop_respond_fn respond; member 208 oldrespond = state->respond; in finish_process_as_req() 473 verto_ctx *vctx, loop_respond_fn respond, void *arg) in process_as_req() argument 484 (*respond)(arg, errcode, NULL); in process_as_req() 487 state->respond = respond; in process_as_req() 497 (*respond)(arg, errcode, NULL); in process_as_req() 506 (*respond)(arg, errcode, NULL); in process_as_req()
|
| /freebsd/crypto/krb5/src/plugins/preauth/otp/ |
| H A D | main.c | 44 krb5_kdcpreauth_verify_respond_fn respond; member 191 rs.respond(rs.arg, retval, NULL, NULL, NULL); in on_response() 224 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in otp_edata() argument 280 (*respond)(arg, retval, pa); in otp_edata() 288 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in otp_verify() argument 337 rs->respond = respond; in otp_verify() 362 (*respond)(arg, retval, NULL, NULL, NULL); in otp_verify()
|
| /freebsd/usr.bin/mail/ |
| H A D | cmdtab.c | 87 { "Reply", Respond, R|I|MSGLIST, 0, MMNDEL }, 88 { "Respond", Respond, R|I|MSGLIST, 0, MMNDEL }, 89 { "reply", respond, R|I|MSGLIST, 0, MMNDEL }, 90 { "respond", respond, R|I|MSGLIST, 0, MMNDEL },
|
| /freebsd/sys/contrib/alpine-hal/ |
| H A D | al_hal_serdes_25g_regs.h | 307 * 0x0 – PHY is not ready to respond to 310 * 0x1 - PHY is ready to respond to 321 * 0x0 – PHY is not ready to respond to 324 * 0x1 - PHY is ready to respond to lnX_rst_n_i 329 * 0x0 – PHY is not ready to respond to 332 * 0x1 - PHY is ready to respond to lnX_rst_n_i
|
| /freebsd/usr.sbin/arp/ |
| H A D | arp.4 | 53 If the target host does not respond after several requests, 72 in which case the system will respond to ARP requests for that host 82 Proxy ARP is a feature whereby the local host will respond to requests 132 address, which might not respond.
|
| /freebsd/crypto/krb5/src/plugins/preauth/test/ |
| H A D | kdctest.c | 75 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in test_edata() argument 107 (*respond)(arg, 0, pa); in test_edata() 115 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in test_verify() argument 185 (*respond)(arg, ret, NULL, list, NULL); in test_verify()
|
| /freebsd/crypto/krb5/src/plugins/preauth/securid_sam2/ |
| H A D | securid_sam2_main.c | 174 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in kdc_include_padata() argument 253 (*respond)(arg, retval, pa_data); in kdc_include_padata() 261 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in kdc_verify_preauth() argument 346 (*respond)(arg, retval, NULL, NULL, NULL); in kdc_verify_preauth()
|
| /freebsd/crypto/openssl/doc/designs/quic-design/ |
| H A D | quic-connID-retire.md | 45 * Should respond with a NEW_CONNECTION_ID frame if we are low on CIDs 50 * May respond with a new connection ID frame (it's a good idea)
|
| /freebsd/crypto/heimdal/kdc/ |
| H A D | kdc.8 | 97 don't respond to 524 requests 99 respond to Kerberos 4 requests 101 respond to Kerberos 4 requests from foreign realms.
|
| /freebsd/contrib/unbound/dnstap/ |
| H A D | dnstap.proto | 86 NXDOMAIN = 1; // Respond with NXDOMAIN 87 NODATA = 2; // Respond with empty answer section 89 DROP = 4; // Do not respond. 91 LOCAL_DATA = 6; // Respond with local data from policy
|
| /freebsd/crypto/openssh/ |
| H A D | PROTOCOL | 507 rename(oldpath, newpath) and will respond with a SSH_FXP_STATUS message. 564 link(oldpath, newpath) and will respond with a SSH_FXP_STATUS message. 577 respond with a SSH_FXP_STATUS message. 607 The server will respond with a SSH_FXP_EXTENDED_REPLY reply: 619 Even if the client requests a larger size, servers will usually respond 677 write-to-handle starting from write-to-offset, and then respond with a 685 fail the request and respond with a SSH_FX_INVALID_PARAMETER message.
|
| /freebsd/share/man/man4/ |
| H A D | ng_deflate.4 | 108 The receiver should respond by sending a PPP CCP Reset-Request to the peer. 112 The node will respond by flushing its compression state so the sides
|
| H A D | ng_pred1.4 | 95 The receiver should respond by sending a PPP CCP Reset-Request to the peer. 99 The node will respond by flushing its compression state so the sides
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_handle_events.pod | 24 events, or to respond to the availability of new data to be read from an 25 underlying BIO, or to respond to the opportunity to write pending data to an
|
| /freebsd/libexec/rbootd/ |
| H A D | rbootd.8 | 65 Respond to boot requests from any machine. 150 and respond to the same boot packets.
|
| /freebsd/crypto/krb5/src/include/krb5/ |
| H A D | kdcpreauth_plugin.h | 313 * use preauthentication" error. The implementation must invoke the respond 327 krb5_kdcpreauth_edata_respond_fn respond, 349 * field as appropriate. The implementation must invoke the respond function 361 krb5_kdcpreauth_verify_respond_fn respond,
|
| /freebsd/contrib/lib9p/ |
| H A D | threadpool.h | 96 * the other request (the "flushee") to go through the respond 97 * path. The respond routine gets to decide whether to send a
|
| /freebsd/libexec/rc/rc.d/ |
| H A D | netwait | 15 # waits for any single IP in the list to respond to the ping. If your 120 echo -n "Waiting for ${ip} to respond to ICMP ping"
|
| /freebsd/sys/netgraph/bluetooth/l2cap/ |
| H A D | ng_l2cap_evnt.c | 649 u_int16_t dcid, respond, result; in ng_l2cap_process_cfg_req() local 662 respond = NG_L2CAP_OPT_CFLAG(le16toh(cp->flags)); in ng_l2cap_process_cfg_req() 712 respond = 1; in ng_l2cap_process_cfg_req() 735 * Now check and see if we have to respond. If everything was OK then in ng_l2cap_process_cfg_req() 736 * respond contain "C flag" and (if set) we will respond with empty in ng_l2cap_process_cfg_req() 739 * Other case is that we did not like peer's options and will respond in ng_l2cap_process_cfg_req() 742 * When "respond == 0" than we have received all options and we will in ng_l2cap_process_cfg_req() 746 if (respond) { in ng_l2cap_process_cfg_req() 982 * to be disconnected and send L2CA_DisconnectInd message. Then respond in ng_l2cap_process_discon_req()
|