/freebsd/crypto/heimdal/lib/hx509/ |
H A D | revoke.c | 714 for (j = 0; j < ocsp->ocsp.tbsResponseData.responses.len; j++) { in hx509_revoke_verify() 717 ret = der_heim_integer_cmp(&ocsp->ocsp.tbsResponseData.responses.val[j].certID.serialNumber, in hx509_revoke_verify() 725 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.hashAlgorithm, in hx509_revoke_verify() 727 &ocsp->ocsp.tbsResponseData.responses.val[i].certID.issuerNameHash); in hx509_revoke_verify() 736 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.hashAlgorithm, in hx509_revoke_verify() 738 &ocsp->ocsp.tbsResponseData.responses.val[j].certID.issuerKeyHash); in hx509_revoke_verify() 742 switch (ocsp->ocsp.tbsResponseData.responses.val[j].certStatus.element) { in hx509_revoke_verify() 755 if (ocsp->ocsp.tbsResponseData.responses.val[j].thisUpdate > in hx509_revoke_verify() 760 if (ocsp->ocsp.tbsResponseData.responses.val[j].nextUpdate) { in hx509_revoke_verify() 761 if (*ocsp->ocsp.tbsResponseData.responses.val[j].nextUpdate < now) in hx509_revoke_verify() [all …]
|
/freebsd/contrib/wpa/src/common/ |
H A D | gas_server.c | 51 struct dl_list responses; /* struct gas_server_response::list */ member 239 dl_list_add(&gas->responses, &response->list); in gas_server_rx_initial_req() 352 dl_list_for_each(response, &gas->responses, struct gas_server_response, in gas_server_rx_comeback_req() 470 dl_list_for_each(response, &gas->responses, struct gas_server_response, in gas_server_tx_status() 488 dl_list_for_each(tmp, &gas->responses, struct gas_server_response, in gas_server_set_resp() 515 dl_list_for_each(tmp, &gas->responses, struct gas_server_response, in gas_server_set_comeback_delay() 539 dl_list_for_each(tmp, &gas->responses, struct gas_server_response, in gas_server_response_sent() 564 dl_list_init(&gas->responses); in gas_server_init() 583 dl_list_for_each_safe(response, tmp_r, &gas->responses, in gas_server_deinit()
|
/freebsd/crypto/openssh/ |
H A D | auth-bsdauth.c | 96 bsdauth_respond(void *ctx, u_int numresponses, char **responses) in bsdauth_respond() argument 110 authok = auth_userresponse(authctxt->as, responses[0], 0); in bsdauth_respond() 112 debug3("bsdauth_respond: <%s> = <%d>", responses[0], authok); in bsdauth_respond()
|
H A D | auth.h | 131 int (*respond)(void *ctx, u_int numresp, char **responses);
|
/freebsd/contrib/ntp/libntp/ |
H A D | work_thread.c | 229 sizeof(blocking_children[0]->responses[0]); in ensure_workresp_empty_slot() 238 c->responses = erealloc(c->responses, new_alloc * each); in ensure_workresp_empty_slot() 240 c->responses[sidx] = NULL; in ensure_workresp_empty_slot() 245 INSIST(NULL == c->responses[c->head_response % c->responses_alloc]); in ensure_workresp_empty_slot() 369 c->responses[qhead % c->responses_alloc] = resp; in send_blocking_resp_internal() 460 removed = c->responses[slot]; in receive_blocking_resp_internal() 461 c->responses[slot] = NULL; in receive_blocking_resp_internal() 936 * responses? If so, and if there are, what to do with them? in cleanup_after_child()
|
/freebsd/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_prn.c | 187 for (i = 0; i < sk_OCSP_SINGLERESP_num(rd->responses); i++) { in OCSP_RESPONSE_print() 188 if (!sk_OCSP_SINGLERESP_value(rd->responses, i)) in OCSP_RESPONSE_print() 190 single = sk_OCSP_SINGLERESP_value(rd->responses, i); in OCSP_RESPONSE_print()
|
H A D | ocsp_cl.c | 162 return sk_OCSP_SINGLERESP_num(bs->tbsResponseData.responses); in OCSP_resp_count() 170 return sk_OCSP_SINGLERESP_value(bs->tbsResponseData.responses, idx); in OCSP_resp_get0() 234 sresp = bs->tbsResponseData.responses; in OCSP_resp_find()
|
H A D | ocsp_srv.c | 96 if (rsp->tbsResponseData.responses == NULL in OCSP_basic_add1_status() 97 && (rsp->tbsResponseData.responses in OCSP_basic_add1_status() 148 if (!(sk_OCSP_SINGLERESP_push(rsp->tbsResponseData.responses, single))) in OCSP_basic_add1_status()
|
H A D | ocsp_local.h | 161 STACK_OF(OCSP_SINGLERESP) *responses;
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | tls_openssl_ocsp.c | 151 STACK_OF(SingleResponse) *responses; 205 ASN1_SEQUENCE_OF(ResponseData, responses, SingleResponse), 693 num_resp = sk_SingleResponse_num(rd->responses); in check_ocsp_resp() 700 cmp_sresp = sk_SingleResponse_value(rd->responses, 0); in check_ocsp_resp() 705 sresp = sk_SingleResponse_value(rd->responses, j); in check_ocsp_resp()
|
/freebsd/contrib/sendmail/libmilter/docs/ |
H A D | figure2.fig | 64 4 0 4 50 0 0 12 0.0000 4 135 780 1500 2100 responses\001
|
/freebsd/contrib/wpa/src/tls/ |
H A D | tlsv1_client_ocsp.c | 350 const u8 *resp_data, *sign_value, *key_hash = NULL, *responses; in tls_process_basic_ocsp_response() local 556 responses = hdr.payload; in tls_process_basic_ocsp_response() 558 wpa_hexdump(MSG_MSGDUMP, "OCSP: responses", responses, responses_len); in tls_process_basic_ocsp_response() 629 responses, responses_len); in tls_process_basic_ocsp_response()
|
/freebsd/contrib/unbound/doc/ |
H A D | TODO | 4 will result in proper negative responses. 53 of responses over a time interval is collected, and each is validated. 73 [2] more logging about stuff like SERVFAIL and REFUSED responses
|
H A D | CREDITS | 21 Daisuke HIGASHI - patch for rrset-roundrobin and minimal-responses.
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | OCSP_request_add1_nonce.pod | 52 Some responders may include a nonce in all responses even if one is not 55 Some responders cache OCSP responses and do not sign each response for
|
H A D | TS_RESP_CTX_new.pod | 18 Creates a response context that can be used for generating responses.
|
/freebsd/libexec/bootpd/ |
H A D | Problems | 46 My bootp clients are given responses with a boot file name that is 54 acceptable responses from the bootp server.
|
/freebsd/tools/tools/vhba/ |
H A D | README | 8 code responses for code sharing purposes.
|
/freebsd/sys/contrib/device-tree/Bindings/mmc/ |
H A D | mtk-sd.txt | 47 If present,HS400 command responses are sampled on rising edges. 48 If not present,HS400 command responses are sampled on falling edges.
|
/freebsd/contrib/wpa/src/radius/ |
H A D | radius_client.h | 114 u32 responses; member
|
/freebsd/contrib/ntp/include/ |
H A D | ntp_worker.h | 106 responses; member
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-ocsp.pod.in | 83 to print out requests and responses, create requests and send queries 250 tolerates invalid signatures on OCSP responses it will normally only be 338 The certificate to sign OCSP responses with. 342 The private key to sign OCSP responses with: if not present the file 357 Pass options to the signature algorithm when signing OCSP responses. 386 Ignore malformed requests or responses: When acting as an OCSP client, retry if 491 responder certificate. All requests and responses are printed to a file.
|
H A D | openssl-cmp.pod.in | 583 and as default value for the expected sender of CMP responses. 608 Accept missing or invalid protection of negative responses from the server. 615 =item * negative certificate responses (IP/CP/KUP) 617 =item * negative revocation responses (RP) 940 Process the sequence of CMP responses provided in the given file(s), 947 only if more responses are needed to complete the transaction. 953 Save the sequence of actually used CMP responses to the given file(s). 958 Files are written as far as needed to save the responses 960 If the transaction contains more responses, the remaining ones are not saved. 1028 Extra certificates to be included in mock certification responses. [all …]
|
/freebsd/contrib/byacc/ |
H A D | README | 29 skeleton.c with the bug report. Do not expect rapid responses.
|
/freebsd/contrib/ntp/sntp/ |
H A D | sntp-opts.def | 120 responses received from servers. If the file does not exist, a 210 descrip = "The number of seconds to wait for responses"; 230 If we are not setting the time, wait for all pending responses.
|