Home
last modified time | relevance | path

Searched refs:accepted (Results 1 – 25 of 197) sorted by relevance

12345678

/src/tests/sys/netinet/
H A Dtcp_user_cookie.c57 int sock, accepted, port, cookie; in main() local
91 accepted = accept(sock, NULL, 0); in main()
93 if (accepted < 0) in main()
96 ret = setsockopt(accepted, SOL_SOCKET, SO_USER_COOKIE, in main()
101 ret = read(accepted, &recvbuf, buflen); in main()
106 close(accepted); in main()
/src/contrib/wpa/src/ap/
H A Dieee802_11_auth.c35 int accepted; /* HOSTAPD_ACL_* */ member
95 return entry->accepted; in hostapd_acl_cache_get()
542 cache->accepted = HOSTAPD_ACL_ACCEPT_TIMEOUT; in hostapd_acl_recv_radius()
544 cache->accepted = HOSTAPD_ACL_ACCEPT; in hostapd_acl_recv_radius()
582 cache->accepted = HOSTAPD_ACL_REJECT; in hostapd_acl_recv_radius()
596 cache->accepted = HOSTAPD_ACL_REJECT; in hostapd_acl_recv_radius()
598 cache->accepted = HOSTAPD_ACL_REJECT; in hostapd_acl_recv_radius()
604 bool success = cache->accepted == HOSTAPD_ACL_ACCEPT || in hostapd_acl_recv_radius()
605 cache->accepted == HOSTAPD_ACL_ACCEPT_TIMEOUT; in hostapd_acl_recv_radius()
615 (ieee802_11_set_radius_info(hapd, sta, cache->accepted, in hostapd_acl_recv_radius()
[all …]
/src/crypto/openssl/doc/man3/
H A DSSL_CTX_set_tlsext_servername_callback.pod41 accepted. Typically a server will call SSL_set_SSL_CTX() in the callback to set
46 In this case the servername requested by the client is not accepted and the
53 If this value is returned then the servername is not accepted by the server.
62 This return value indicates that the servername is not accepted by the server.
83 session from the original handshake had a servername accepted by the server then
91 If the session from the original handshake had a servername accepted by the
110 If a servername was accepted by the server in the original handshake then it
159 handshake, the server accepted it, and then the client successfully resumed but
H A DSSL_set_incoming_stream_policy.pod40 This is the default setting. Incoming streams are accepted according to the
55 accepted.
H A DBIO_s_accept.pod44 Using accept BIOs, TCP/IP connections can be accepted and data
103 BIO_get_accept_ip_family() returns the IP family accepted by the BIO I<b>,
106 BIO_set_accept_ip_family() sets the IP family I<family> accepted by BIO I<b>.
153 If no further connections will be accepted the B<accept> can
167 accepted a connection and retry the call.
H A DSSL_get_default_timeout.pod21 after which it will not be accepted for session reuse. If the timeout
H A DBIO_connect.pod44 on the accepted socket. The flags are described in L</FLAGS> below.
102 BIO_accept_ex() returns the accepted socket on success or
H A DSSL_read_early_data.pod121 connection has been completed you can determine whether the server accepted or
123 SSL_EARLY_DATA_ACCEPTED if the data was accepted, SSL_EARLY_DATA_REJECTED if it
218 The recv_max_early_data value also has an impact on early data that is accepted.
219 The amount of data that is accepted will always be the lower of the
231 is accepted or not, for example to mitigate replay risks (see L</REPLAY PROTECTION>
353 accepted by the server, SSL_EARLY_DATA_REJECTED if early data was rejected by
/src/lib/libc/rpc/
H A Drpc_prot.c54 static void accepted(enum accept_stat, struct rpc_err *);
224 accepted(enum accept_stat acpt_stat, struct rpc_err *error) in accepted() function
302 accepted(msg->acpted_rply.ar_stat, error); in _seterr_reply()
/src/sys/rpc/
H A Drpc_prot.c60 static enum clnt_stat accepted(enum accept_stat, struct rpc_err *);
243 accepted(enum accept_stat acpt_stat, struct rpc_err *error) in accepted() function
316 stat = accepted(msg->acpted_rply.ar_stat, error); in _seterr_reply()
/src/contrib/llvm-project/clang/include/clang/Basic/
H A DDiagnostic.td134 // accepted language extensions should use Extension or ExtWarn below instead.
139 // Extensions are warnings about accepted language extensions.
142 // ExtWarns are warnings about accepted language extensions.
/src/bin/sh/tests/parameters/
H A Dpwd1.01 # Check that bogus PWD values are not accepted from the environment.
H A Dpwd2.01 # Check that PWD is exported and accepted from the environment.
/src/crypto/krb5/src/lib/rpc/
H A Drpc_prot.c179 accepted(enum accept_stat acpt_stat, struct rpc_err *error) in accepted() function
249 accepted(msg->acpted_rply.ar_stat, error); in gssrpc__seterr_reply()
/src/crypto/krb5/src/lib/krb5/os/
H A Dlocalauth.c391 krb5_boolean accepted = FALSE; in krb5_kuserok() local
401 accepted = TRUE; in krb5_kuserok()
405 return accepted; in krb5_kuserok()
/src/crypto/openssl/test/recipes/30-test_evp_data/
H A Devpencod.txt167 # Multiline output with line break in the middle of a b64 block is accepted
172 # Long lines are accepted
/src/usr.sbin/ppp/
H A DREADME.changes94 o Protocol-compressed packets are accepted even if they were denied
113 o The words ``host'' and ``port'' are no longer accepted by the ``set filter''
135 o MSCHAPv2 is now accepted by default. If you don't wish to negotiate
137 o MPPE is enabled and accepted by default (although deflate and predictor1
/src/sys/contrib/device-tree/Bindings/leds/backlight/
H A Dled-backlight.txt13 in the range accepted by the underlying LED devices.
/src/crypto/openssl/doc/man7/
H A Dossl-guide-quic-server-block.pod20 Once the current client disconnects, the next client connection is accepted.
130 /* Setup ALPN negotiation callback to decide which ALPN is accepted. */
137 * are accepted.
205 L<SSL_accept_connection(3)> will return an accepted connection within a fresh
H A Dossl-guide-tls-server-block.pod20 Once the current client disconnects, the next client connection is accepted.
243 /* Client went away before we accepted the connection */
247 On success the accepted client connection has been wrapped in a fresh BIO and
253 fprintf(stderr, "New client connection accepted\n");
/src/crypto/openssl/doc/man1/
H A Dopenssl-format-options.pod35 Refer to the individual man page to see which options are accepted.
56 Both uppercase and lowercase are accepted.
/src/contrib/ee/
H A DChanges21 specified options are no longer accepted (that is, they are treated as file
/src/contrib/sendmail/cf/feature/
H A Dcheck_other.m440 dnl accept anything that will be accepted by the MTA
/src/sys/contrib/device-tree/Bindings/net/
H A Dmarvell-neta-bm.txt17 - pool<0 : 3>,pkt-size: maximum size of a packet accepted by a given buffer
/src/contrib/wpa/hostapd/
H A DREADME153 Unauthorized state and only IEEE 802.1X frames are accepted at this
157 station are accepted.
320 # Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The
324 # Set of accepted cipher suites (encryption algorithms) for pairwise keys
348 # accepted (e.g., 'eth0' or 'eth0 wlan0wds0'. This list should include all

12345678