Home
last modified time | relevance | path

Searched refs:responses (Results 1 – 25 of 94) sorted by relevance

1234

/freebsd/crypto/heimdal/lib/hx509/
H A Drevoke.c714 for (j = 0; j < ocsp->ocsp.tbsResponseData.responses.len; j++) { in hx509_revoke_verify()
717 ret = der_heim_integer_cmp(&ocsp->ocsp.tbsResponseData.responses.val[j].certID.serialNumber, in hx509_revoke_verify()
725 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.hashAlgorithm, in hx509_revoke_verify()
727 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.issuerNameHash); in hx509_revoke_verify()
736 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.hashAlgorithm, in hx509_revoke_verify()
738 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.issuerKeyHash); in hx509_revoke_verify()
742 switch (ocsp->ocsp.tbsResponseData.responses.val[j].certStatus.element) { in hx509_revoke_verify()
755 if (ocsp->ocsp.tbsResponseData.responses.val[j].thisUpdate > in hx509_revoke_verify()
760 if (ocsp->ocsp.tbsResponseData.responses.val[j].nextUpdate) { in hx509_revoke_verify()
761 if (*ocsp->ocsp.tbsResponseData.responses.val[j].nextUpdate < now) in hx509_revoke_verify()
[all …]
/freebsd/contrib/wpa/src/common/
H A Dgas_server.c51 struct dl_list responses; /* struct gas_server_response::list */ member
239 dl_list_add(&gas->responses, &response->list); in gas_server_rx_initial_req()
352 dl_list_for_each(response, &gas->responses, struct gas_server_response, in gas_server_rx_comeback_req()
470 dl_list_for_each(response, &gas->responses, struct gas_server_response, in gas_server_tx_status()
488 dl_list_for_each(tmp, &gas->responses, struct gas_server_response, in gas_server_set_resp()
515 dl_list_for_each(tmp, &gas->responses, struct gas_server_response, in gas_server_set_comeback_delay()
539 dl_list_for_each(tmp, &gas->responses, struct gas_server_response, in gas_server_response_sent()
564 dl_list_init(&gas->responses); in gas_server_init()
583 dl_list_for_each_safe(response, tmp_r, &gas->responses, in gas_server_deinit()
/freebsd/crypto/openssh/
H A Dauth-bsdauth.c96 bsdauth_respond(void *ctx, u_int numresponses, char **responses) in bsdauth_respond() argument
110 authok = auth_userresponse(authctxt->as, responses[0], 0); in bsdauth_respond()
112 debug3("bsdauth_respond: <%s> = <%d>", responses[0], authok); in bsdauth_respond()
H A Dauth.h131 int (*respond)(void *ctx, u_int numresp, char **responses);
/freebsd/contrib/ntp/libntp/
H A Dwork_thread.c229 sizeof(blocking_children[0]->responses[0]); in ensure_workresp_empty_slot()
238 c->responses = erealloc(c->responses, new_alloc * each); in ensure_workresp_empty_slot()
240 c->responses[sidx] = NULL; in ensure_workresp_empty_slot()
245 INSIST(NULL == c->responses[c->head_response % c->responses_alloc]); in ensure_workresp_empty_slot()
369 c->responses[qhead % c->responses_alloc] = resp; in send_blocking_resp_internal()
460 removed = c->responses[slot]; in receive_blocking_resp_internal()
461 c->responses[slot] = NULL; in receive_blocking_resp_internal()
936 * responses? If so, and if there are, what to do with them? in cleanup_after_child()
/freebsd/crypto/openssl/crypto/ocsp/
H A Docsp_prn.c187 for (i = 0; i < sk_OCSP_SINGLERESP_num(rd->responses); i++) { in OCSP_RESPONSE_print()
188 if (!sk_OCSP_SINGLERESP_value(rd->responses, i)) in OCSP_RESPONSE_print()
190 single = sk_OCSP_SINGLERESP_value(rd->responses, i); in OCSP_RESPONSE_print()
H A Docsp_cl.c162 return sk_OCSP_SINGLERESP_num(bs->tbsResponseData.responses); in OCSP_resp_count()
170 return sk_OCSP_SINGLERESP_value(bs->tbsResponseData.responses, idx); in OCSP_resp_get0()
234 sresp = bs->tbsResponseData.responses; in OCSP_resp_find()
H A Docsp_srv.c96 if (rsp->tbsResponseData.responses == NULL in OCSP_basic_add1_status()
97 && (rsp->tbsResponseData.responses in OCSP_basic_add1_status()
148 if (!(sk_OCSP_SINGLERESP_push(rsp->tbsResponseData.responses, single))) in OCSP_basic_add1_status()
H A Docsp_local.h161 STACK_OF(OCSP_SINGLERESP) *responses;
/freebsd/contrib/wpa/src/crypto/
H A Dtls_openssl_ocsp.c151 STACK_OF(SingleResponse) *responses;
205 ASN1_SEQUENCE_OF(ResponseData, responses, SingleResponse),
693 num_resp = sk_SingleResponse_num(rd->responses); in check_ocsp_resp()
700 cmp_sresp = sk_SingleResponse_value(rd->responses, 0); in check_ocsp_resp()
705 sresp = sk_SingleResponse_value(rd->responses, j); in check_ocsp_resp()
/freebsd/contrib/sendmail/libmilter/docs/
H A Dfigure2.fig64 4 0 4 50 0 0 12 0.0000 4 135 780 1500 2100 responses\001
/freebsd/contrib/wpa/src/tls/
H A Dtlsv1_client_ocsp.c350 const u8 *resp_data, *sign_value, *key_hash = NULL, *responses; in tls_process_basic_ocsp_response() local
556 responses = hdr.payload; in tls_process_basic_ocsp_response()
558 wpa_hexdump(MSG_MSGDUMP, "OCSP: responses", responses, responses_len); in tls_process_basic_ocsp_response()
629 responses, responses_len); in tls_process_basic_ocsp_response()
/freebsd/contrib/unbound/doc/
H A DTODO4 will result in proper negative responses.
53 of responses over a time interval is collected, and each is validated.
73 [2] more logging about stuff like SERVFAIL and REFUSED responses
H A DCREDITS21 Daisuke HIGASHI - patch for rrset-roundrobin and minimal-responses.
/freebsd/crypto/openssl/doc/man3/
H A DOCSP_request_add1_nonce.pod52 Some responders may include a nonce in all responses even if one is not
55 Some responders cache OCSP responses and do not sign each response for
H A DTS_RESP_CTX_new.pod18 Creates a response context that can be used for generating responses.
/freebsd/libexec/bootpd/
H A DProblems46 My bootp clients are given responses with a boot file name that is
54 acceptable responses from the bootp server.
/freebsd/tools/tools/vhba/
H A DREADME8 code responses for code sharing purposes.
/freebsd/sys/contrib/device-tree/Bindings/mmc/
H A Dmtk-sd.txt47 If present,HS400 command responses are sampled on rising edges.
48 If not present,HS400 command responses are sampled on falling edges.
/freebsd/contrib/wpa/src/radius/
H A Dradius_client.h114 u32 responses; member
/freebsd/contrib/ntp/include/
H A Dntp_worker.h106 responses; member
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-ocsp.pod.in83 to print out requests and responses, create requests and send queries
250 tolerates invalid signatures on OCSP responses it will normally only be
338 The certificate to sign OCSP responses with.
342 The private key to sign OCSP responses with: if not present the file
357 Pass options to the signature algorithm when signing OCSP responses.
386 Ignore malformed requests or responses: When acting as an OCSP client, retry if
491 responder certificate. All requests and responses are printed to a file.
H A Dopenssl-cmp.pod.in583 and as default value for the expected sender of CMP responses.
608 Accept missing or invalid protection of negative responses from the server.
615 =item * negative certificate responses (IP/CP/KUP)
617 =item * negative revocation responses (RP)
940 Process the sequence of CMP responses provided in the given file(s),
947 only if more responses are needed to complete the transaction.
953 Save the sequence of actually used CMP responses to the given file(s).
958 Files are written as far as needed to save the responses
960 If the transaction contains more responses, the remaining ones are not saved.
1028 Extra certificates to be included in mock certification responses.
[all …]
/freebsd/contrib/byacc/
H A DREADME29 skeleton.c with the bug report. Do not expect rapid responses.
/freebsd/contrib/ntp/sntp/
H A Dsntp-opts.def120 responses received from servers. If the file does not exist, a
210 descrip = "The number of seconds to wait for responses";
230 If we are not setting the time, wait for all pending responses.

1234