Home
last modified time | relevance | path

Searched full:respond (Results 1 – 25 of 526) sorted by relevance

12345678910>>...22

/freebsd/crypto/krb5/src/plugins/preauth/spake/
H A Dspake_kdc.c302 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in spake_edata() argument
312 (*respond)(arg, KRB5KDC_ERR_ETYPE_NOSUPP, NULL); in spake_edata()
318 send_challenge(context, gstate, group, cb, rock, &empty, respond, NULL, in spake_edata()
322 (*respond)(arg, 0, NULL); in spake_edata()
332 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in verify_support() argument
349 send_challenge(context, gstate, group, cb, rock, der_msg, NULL, respond, in verify_support()
354 (*respond)(arg, ret, NULL, NULL, NULL); in verify_support()
368 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in verify_response() argument
474 (*respond)(arg, ret, NULL, NULL, NULL); in verify_response()
487 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in verify_encdata() argument
[all …]
/freebsd/usr.sbin/rmt/
H A Drmt.c102 goto respond; in main()
110 goto respond; in main()
119 goto respond; in main()
136 goto respond; in main()
162 goto respond; in main()
182 goto respond; in main()
188 respond: in main()
/freebsd/crypto/krb5/src/kdc/
H A Dkdc_preauth_encts.c35 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in enc_ts_get() argument
41 (*respond)(arg, ENOENT, NULL); in enc_ts_get()
43 (*respond)(arg, 0, NULL); in enc_ts_get()
51 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in enc_ts_verify() argument
118 (*respond)(arg, retval, NULL, NULL, NULL); in enc_ts_verify()
H A Ddispatch.c39 loop_respond_fn respond; member
51 loop_respond_fn oldrespond = state->respond; in finish_dispatch()
92 verto_ctx *vctx, loop_respond_fn respond, void *arg) in dispatch() argument
103 (*respond)(arg, retval, NULL); in dispatch()
106 state->respond = respond; in dispatch()
H A Dkdc_preauth_ec.c40 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in ec_edata() argument
46 (*respond)(arg, ENOENT, NULL); in ec_edata()
48 (*respond)(arg, 0, NULL); in ec_edata()
56 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in ec_verify() argument
151 (*respond)(arg, ret, modreq, NULL, NULL); in ec_verify()
H A Dkdc_preauth.c874 kdc_hint_respond_fn respond; member
892 kdc_hint_respond_fn oldrespond = state->respond; in hint_list_finish()
976 krb5_pa_data ***e_data_out, kdc_hint_respond_fn respond, in get_preauth_hint_list() argument
990 state->respond = respond; in get_preauth_hint_list()
1013 (*respond)(arg); in get_preauth_hint_list()
1066 kdc_preauth_respond_fn respond; member
1173 /* Release state and respond to the AS-REQ processing code with the result of
1178 kdc_preauth_respond_fn respond; in finish_check_padata() local
1201 * respond to the AS-REQ processing code. */ in finish_check_padata()
1202 respond = state->respond; in finish_check_padata()
[all …]
H A Ddo_as_req.c154 loop_respond_fn respond; member
208 oldrespond = state->respond; in finish_process_as_req()
473 verto_ctx *vctx, loop_respond_fn respond, void *arg) in process_as_req() argument
484 (*respond)(arg, errcode, NULL); in process_as_req()
487 state->respond = respond; in process_as_req()
497 (*respond)(arg, errcode, NULL); in process_as_req()
506 (*respond)(arg, errcode, NULL); in process_as_req()
/freebsd/crypto/krb5/src/plugins/preauth/otp/
H A Dmain.c44 krb5_kdcpreauth_verify_respond_fn respond; member
191 rs.respond(rs.arg, retval, NULL, NULL, NULL); in on_response()
224 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in otp_edata() argument
280 (*respond)(arg, retval, pa); in otp_edata()
288 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in otp_verify() argument
337 rs->respond = respond; in otp_verify()
362 (*respond)(arg, retval, NULL, NULL, NULL); in otp_verify()
/freebsd/usr.bin/mail/
H A Dcmdtab.c87 { "Reply", Respond, R|I|MSGLIST, 0, MMNDEL },
88 { "Respond", Respond, R|I|MSGLIST, 0, MMNDEL },
89 { "reply", respond, R|I|MSGLIST, 0, MMNDEL },
90 { "respond", respond, R|I|MSGLIST, 0, MMNDEL },
/freebsd/sys/contrib/alpine-hal/
H A Dal_hal_serdes_25g_regs.h307 * 0x0 – PHY is not ready to respond to
310 * 0x1 - PHY is ready to respond to
321 * 0x0 – PHY is not ready to respond to
324 * 0x1 - PHY is ready to respond to lnX_rst_n_i
329 * 0x0 – PHY is not ready to respond to
332 * 0x1 - PHY is ready to respond to lnX_rst_n_i
/freebsd/usr.sbin/arp/
H A Darp.453 If the target host does not respond after several requests,
72 in which case the system will respond to ARP requests for that host
82 Proxy ARP is a feature whereby the local host will respond to requests
132 address, which might not respond.
/freebsd/crypto/krb5/src/plugins/preauth/test/
H A Dkdctest.c75 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in test_edata() argument
107 (*respond)(arg, 0, pa); in test_edata()
115 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in test_verify() argument
185 (*respond)(arg, ret, NULL, list, NULL); in test_verify()
/freebsd/crypto/krb5/src/plugins/preauth/securid_sam2/
H A Dsecurid_sam2_main.c174 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in kdc_include_padata() argument
253 (*respond)(arg, retval, pa_data); in kdc_include_padata()
261 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in kdc_verify_preauth() argument
346 (*respond)(arg, retval, NULL, NULL, NULL); in kdc_verify_preauth()
/freebsd/crypto/openssl/doc/designs/quic-design/
H A Dquic-connID-retire.md45 * Should respond with a NEW_CONNECTION_ID frame if we are low on CIDs
50 * May respond with a new connection ID frame (it's a good idea)
/freebsd/crypto/heimdal/kdc/
H A Dkdc.897 don't respond to 524 requests
99 respond to Kerberos 4 requests
101 respond to Kerberos 4 requests from foreign realms.
/freebsd/contrib/unbound/dnstap/
H A Ddnstap.proto86 NXDOMAIN = 1; // Respond with NXDOMAIN
87 NODATA = 2; // Respond with empty answer section
89 DROP = 4; // Do not respond.
91 LOCAL_DATA = 6; // Respond with local data from policy
/freebsd/crypto/openssh/
H A DPROTOCOL507 rename(oldpath, newpath) and will respond with a SSH_FXP_STATUS message.
564 link(oldpath, newpath) and will respond with a SSH_FXP_STATUS message.
577 respond with a SSH_FXP_STATUS message.
607 The server will respond with a SSH_FXP_EXTENDED_REPLY reply:
619 Even if the client requests a larger size, servers will usually respond
677 write-to-handle starting from write-to-offset, and then respond with a
685 fail the request and respond with a SSH_FX_INVALID_PARAMETER message.
/freebsd/share/man/man4/
H A Dng_deflate.4108 The receiver should respond by sending a PPP CCP Reset-Request to the peer.
112 The node will respond by flushing its compression state so the sides
H A Dng_pred1.495 The receiver should respond by sending a PPP CCP Reset-Request to the peer.
99 The node will respond by flushing its compression state so the sides
/freebsd/crypto/openssl/doc/man3/
H A DSSL_handle_events.pod24 events, or to respond to the availability of new data to be read from an
25 underlying BIO, or to respond to the opportunity to write pending data to an
/freebsd/libexec/rbootd/
H A Drbootd.865 Respond to boot requests from any machine.
150 and respond to the same boot packets.
/freebsd/crypto/krb5/src/include/krb5/
H A Dkdcpreauth_plugin.h313 * use preauthentication" error. The implementation must invoke the respond
327 krb5_kdcpreauth_edata_respond_fn respond,
349 * field as appropriate. The implementation must invoke the respond function
361 krb5_kdcpreauth_verify_respond_fn respond,
/freebsd/contrib/lib9p/
H A Dthreadpool.h96 * the other request (the "flushee") to go through the respond
97 * path. The respond routine gets to decide whether to send a
/freebsd/libexec/rc/rc.d/
H A Dnetwait15 # waits for any single IP in the list to respond to the ping. If your
120 echo -n "Waiting for ${ip} to respond to ICMP ping"
/freebsd/sys/netgraph/bluetooth/l2cap/
H A Dng_l2cap_evnt.c649 u_int16_t dcid, respond, result; in ng_l2cap_process_cfg_req() local
662 respond = NG_L2CAP_OPT_CFLAG(le16toh(cp->flags)); in ng_l2cap_process_cfg_req()
712 respond = 1; in ng_l2cap_process_cfg_req()
735 * Now check and see if we have to respond. If everything was OK then in ng_l2cap_process_cfg_req()
736 * respond contain "C flag" and (if set) we will respond with empty in ng_l2cap_process_cfg_req()
739 * Other case is that we did not like peer's options and will respond in ng_l2cap_process_cfg_req()
742 * When "respond == 0" than we have received all options and we will in ng_l2cap_process_cfg_req()
746 if (respond) { in ng_l2cap_process_cfg_req()
982 * to be disconnected and send L2CA_DisconnectInd message. Then respond in ng_l2cap_process_discon_req()

12345678910>>...22