| /freebsd/crypto/heimdal/lib/hx509/ |
| H A D | revoke.c | 714 for (j = 0; j < ocsp->ocsp.tbsResponseData.responses.len; j++) { in hx509_revoke_verify() 717 ret = der_heim_integer_cmp(&ocsp->ocsp.tbsResponseData.responses.val[j].certID.serialNumber, in hx509_revoke_verify() 725 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.hashAlgorithm, in hx509_revoke_verify() 727 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.issuerNameHash); in hx509_revoke_verify() 736 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.hashAlgorithm, in hx509_revoke_verify() 738 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.issuerKeyHash); in hx509_revoke_verify() 742 switch (ocsp->ocsp.tbsResponseData.responses.val[j].certStatus.element) { in hx509_revoke_verify() 755 if (ocsp->ocsp.tbsResponseData.responses.val[j].thisUpdate > in hx509_revoke_verify() 760 if (ocsp->ocsp.tbsResponseData.responses.val[j].nextUpdate) { in hx509_revoke_verify() 761 if (*ocsp->ocsp.tbsResponseData.responses.val[j].nextUpdate < now) in hx509_revoke_verify() [all …]
|
| /freebsd/crypto/openssh/ |
| H A D | auth-bsdauth.c | 96 bsdauth_respond(void *ctx, u_int numresponses, char **responses) in bsdauth_respond() argument 110 authok = auth_userresponse(authctxt->as, responses[0], 0); in bsdauth_respond() 112 debug3("bsdauth_respond: <%s> = <%d>", responses[0], authok); in bsdauth_respond()
|
| /freebsd/contrib/wpa/src/common/ |
| H A D | gas_server.c | 51 struct dl_list responses; /* struct gas_server_response::list */ member 239 dl_list_add(&gas->responses, &response->list); in gas_server_rx_initial_req() 352 dl_list_for_each(response, &gas->responses, struct gas_server_response, in gas_server_rx_comeback_req() 470 dl_list_for_each(response, &gas->responses, struct gas_server_response, in gas_server_tx_status() 488 dl_list_for_each(tmp, &gas->responses, struct gas_server_response, in gas_server_set_resp() 515 dl_list_for_each(tmp, &gas->responses, struct gas_server_response, in gas_server_set_comeback_delay() 539 dl_list_for_each(tmp, &gas->responses, struct gas_server_response, in gas_server_response_sent() 564 dl_list_init(&gas->responses); in gas_server_init() 583 dl_list_for_each_safe(response, tmp_r, &gas->responses, in gas_server_deinit()
|
| /freebsd/contrib/ntp/libntp/ |
| H A D | work_thread.c | 229 sizeof(blocking_children[0]->responses[0]); in ensure_workresp_empty_slot() 238 c->responses = erealloc(c->responses, new_alloc * each); in ensure_workresp_empty_slot() 240 c->responses[sidx] = NULL; in ensure_workresp_empty_slot() 245 INSIST(NULL == c->responses[c->head_response % c->responses_alloc]); in ensure_workresp_empty_slot() 369 c->responses[qhead % c->responses_alloc] = resp; in send_blocking_resp_internal() 460 removed = c->responses[slot]; in receive_blocking_resp_internal() 461 c->responses[slot] = NULL; in receive_blocking_resp_internal() 936 * responses? If so, and if there are, what to do with them? in cleanup_after_child()
|
| /freebsd/crypto/openssl/crypto/ocsp/ |
| H A D | ocsp_prn.c | 190 for (i = 0; i < sk_OCSP_SINGLERESP_num(rd->responses); i++) { in OCSP_RESPONSE_print() 191 if (!sk_OCSP_SINGLERESP_value(rd->responses, i)) in OCSP_RESPONSE_print() 193 single = sk_OCSP_SINGLERESP_value(rd->responses, i); in OCSP_RESPONSE_print()
|
| H A D | ocsp_srv.c | 95 if (rsp->tbsResponseData.responses == NULL in OCSP_basic_add1_status() 96 && (rsp->tbsResponseData.responses in OCSP_basic_add1_status() 146 if (!(sk_OCSP_SINGLERESP_push(rsp->tbsResponseData.responses, single))) in OCSP_basic_add1_status()
|
| H A D | ocsp_cl.c | 162 return sk_OCSP_SINGLERESP_num(bs->tbsResponseData.responses); in OCSP_resp_count() 170 return sk_OCSP_SINGLERESP_value(bs->tbsResponseData.responses, idx); in OCSP_resp_get0() 234 sresp = bs->tbsResponseData.responses; in OCSP_resp_find()
|
| H A D | ocsp_local.h | 161 STACK_OF(OCSP_SINGLERESP) *responses;
|
| /freebsd/contrib/wpa/src/crypto/ |
| H A D | tls_openssl_ocsp.c | 151 STACK_OF(SingleResponse) *responses; 205 ASN1_SEQUENCE_OF(ResponseData, responses, SingleResponse), 693 num_resp = sk_SingleResponse_num(rd->responses); in check_ocsp_resp() 700 cmp_sresp = sk_SingleResponse_value(rd->responses, 0); in check_ocsp_resp() 705 sresp = sk_SingleResponse_value(rd->responses, j); in check_ocsp_resp()
|
| /freebsd/contrib/sendmail/libmilter/docs/ |
| H A D | figure2.fig | 64 4 0 4 50 0 0 12 0.0000 4 135 780 1500 2100 responses\001
|
| /freebsd/sys/contrib/dev/iwlwifi/mld/ |
| H A D | ftm-initiator.h | 19 int responses[IWL_TOF_MAX_APS]; member
|
| H A D | ftm-initiator.c | 271 memset(mld->ftm_initiator.responses, 0, in iwl_mld_ftm_reset() 272 sizeof(mld->ftm_initiator.responses)); in iwl_mld_ftm_reset() 394 result.ftm.burst_index = mld->ftm_initiator.responses[peer_idx]; in iwl_mld_handle_ftm_resp_notif() 395 mld->ftm_initiator.responses[peer_idx]++; in iwl_mld_handle_ftm_resp_notif()
|
| /freebsd/contrib/wpa/src/tls/ |
| H A D | tlsv1_client_ocsp.c | 350 const u8 *resp_data, *sign_value, *key_hash = NULL, *responses; in tls_process_basic_ocsp_response() local 556 responses = hdr.payload; in tls_process_basic_ocsp_response() 558 wpa_hexdump(MSG_MSGDUMP, "OCSP: responses", responses, responses_len); in tls_process_basic_ocsp_response() 629 responses, responses_len); in tls_process_basic_ocsp_response()
|
| /freebsd/contrib/unbound/doc/ |
| H A D | TODO | 4 will result in proper negative responses. 53 of responses over a time interval is collected, and each is validated. 73 [2] more logging about stuff like SERVFAIL and REFUSED responses
|
| H A D | CREDITS | 21 Daisuke HIGASHI - patch for rrset-roundrobin and minimal-responses.
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | OCSP_request_add1_nonce.pod | 52 Some responders may include a nonce in all responses even if one is not 55 Some responders cache OCSP responses and do not sign each response for
|
| H A D | TS_RESP_CTX_new.pod | 18 Creates a response context that can be used for generating responses.
|
| /freebsd/libexec/bootpd/ |
| H A D | Problems | 46 My bootp clients are given responses with a boot file name that is 54 acceptable responses from the bootp server.
|
| /freebsd/tools/tools/vhba/ |
| H A D | README | 8 code responses for code sharing purposes.
|
| /freebsd/sys/contrib/device-tree/Bindings/mmc/ |
| H A D | mtk-sd.txt | 47 If present,HS400 command responses are sampled on rising edges. 48 If not present,HS400 command responses are sampled on falling edges.
|
| /freebsd/contrib/wpa/src/radius/ |
| H A D | radius_client.h | 114 u32 responses; member
|
| /freebsd/contrib/ntp/include/ |
| H A D | ntp_worker.h | 106 responses; member
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-ocsp.pod.in | 83 to print out requests and responses, create requests and send queries 260 tolerates invalid signatures on OCSP responses it will normally only be 348 The certificate to sign OCSP responses with. 353 The private key to sign OCSP responses with: if not present the file 368 Pass options to the signature algorithm when signing OCSP responses. 397 Ignore malformed requests or responses: When acting as an OCSP client, retry if 502 responder certificate. All requests and responses are printed to a file.
|
| /freebsd/contrib/byacc/ |
| H A D | README | 29 skeleton.c with the bug report. Do not expect rapid responses.
|
| /freebsd/contrib/ntp/sntp/ |
| H A D | sntp-opts.def | 120 responses received from servers. If the file does not exist, a 210 descrip = "The number of seconds to wait for responses"; 230 If we are not setting the time, wait for all pending responses.
|