| /src/crypto/krb5/src/plugins/preauth/spake/ |
| H A D | spake_kdc.c | 302 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in spake_edata() argument 312 (*respond)(arg, KRB5KDC_ERR_ETYPE_NOSUPP, NULL); in spake_edata() 318 send_challenge(context, gstate, group, cb, rock, &empty, respond, NULL, in spake_edata() 322 (*respond)(arg, 0, NULL); in spake_edata() 332 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in verify_support() argument 349 send_challenge(context, gstate, group, cb, rock, der_msg, NULL, respond, in verify_support() 354 (*respond)(arg, ret, NULL, NULL, NULL); in verify_support() 368 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in verify_response() argument 474 (*respond)(arg, ret, NULL, NULL, NULL); in verify_response() 487 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in verify_encdata() argument [all …]
|
| /src/usr.sbin/rmt/ |
| H A D | rmt.c | 102 goto respond; in main() 110 goto respond; in main() 119 goto respond; in main() 136 goto respond; in main() 162 goto respond; in main() 182 goto respond; in main() 188 respond: in main()
|
| /src/crypto/krb5/src/kdc/ |
| H A D | kdc_preauth_encts.c | 35 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in enc_ts_get() argument 41 (*respond)(arg, ENOENT, NULL); in enc_ts_get() 43 (*respond)(arg, 0, NULL); in enc_ts_get() 51 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in enc_ts_verify() argument 118 (*respond)(arg, retval, NULL, NULL, NULL); in enc_ts_verify()
|
| H A D | dispatch.c | 39 loop_respond_fn respond; member 51 loop_respond_fn oldrespond = state->respond; in finish_dispatch() 92 verto_ctx *vctx, loop_respond_fn respond, void *arg) in dispatch() argument 103 (*respond)(arg, retval, NULL); in dispatch() 106 state->respond = respond; in dispatch()
|
| H A D | kdc_preauth_ec.c | 40 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in ec_edata() argument 46 (*respond)(arg, ENOENT, NULL); in ec_edata() 48 (*respond)(arg, 0, NULL); in ec_edata() 56 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in ec_verify() argument 151 (*respond)(arg, ret, modreq, NULL, NULL); in ec_verify()
|
| H A D | kdc_preauth.c | 874 kdc_hint_respond_fn respond; member 892 kdc_hint_respond_fn oldrespond = state->respond; in hint_list_finish() 976 krb5_pa_data ***e_data_out, kdc_hint_respond_fn respond, in get_preauth_hint_list() argument 990 state->respond = respond; in get_preauth_hint_list() 1013 (*respond)(arg); in get_preauth_hint_list() 1066 kdc_preauth_respond_fn respond; member 1178 kdc_preauth_respond_fn respond; in finish_check_padata() local 1202 respond = state->respond; in finish_check_padata() 1206 (*respond)(arg, filter_preauth_error(code)); in finish_check_padata() 1341 kdc_preauth_respond_fn respond, void *arg) in check_padata() argument [all …]
|
| H A D | do_as_req.c | 154 loop_respond_fn respond; member 208 oldrespond = state->respond; in finish_process_as_req() 473 verto_ctx *vctx, loop_respond_fn respond, void *arg) in process_as_req() argument 484 (*respond)(arg, errcode, NULL); in process_as_req() 487 state->respond = respond; in process_as_req() 497 (*respond)(arg, errcode, NULL); in process_as_req() 506 (*respond)(arg, errcode, NULL); in process_as_req()
|
| /src/crypto/krb5/src/plugins/preauth/otp/ |
| H A D | main.c | 44 krb5_kdcpreauth_verify_respond_fn respond; member 191 rs.respond(rs.arg, retval, NULL, NULL, NULL); in on_response() 224 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in otp_edata() argument 280 (*respond)(arg, retval, pa); in otp_edata() 288 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in otp_verify() argument 337 rs->respond = respond; in otp_verify() 362 (*respond)(arg, retval, NULL, NULL, NULL); in otp_verify()
|
| /src/crypto/krb5/src/plugins/preauth/test/ |
| H A D | kdctest.c | 75 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in test_edata() argument 107 (*respond)(arg, 0, pa); in test_edata() 115 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in test_verify() argument 185 (*respond)(arg, ret, NULL, list, NULL); in test_verify()
|
| /src/crypto/krb5/src/plugins/preauth/securid_sam2/ |
| H A D | securid_sam2_main.c | 174 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in kdc_include_padata() argument 253 (*respond)(arg, retval, pa_data); in kdc_include_padata() 261 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in kdc_verify_preauth() argument 346 (*respond)(arg, retval, NULL, NULL, NULL); in kdc_verify_preauth()
|
| /src/usr.bin/mail/ |
| H A D | cmdtab.c | 89 { "reply", respond, R|I|MSGLIST, 0, MMNDEL }, 90 { "respond", respond, R|I|MSGLIST, 0, MMNDEL },
|
| /src/crypto/krb5/src/include/krb5/ |
| H A D | kdcpreauth_plugin.h | 327 krb5_kdcpreauth_edata_respond_fn respond, 361 krb5_kdcpreauth_verify_respond_fn respond,
|
| /src/sys/contrib/device-tree/Bindings/iio/pressure/ |
| H A D | ms5611.txt | 7 - reg: the I2C address or SPI chip select the device will respond to
|
| H A D | zpa2326.txt | 7 - reg: the I2C address or SPI chip select the device will respond to
|
| /src/crypto/krb5/src/include/ |
| H A D | net-server.h | 86 int is_tcp, verto_ctx *vctx, loop_respond_fn respond, void *arg);
|
| /src/crypto/openssl/doc/designs/quic-design/ |
| H A D | quic-connID-retire.md | 45 * Should respond with a NEW_CONNECTION_ID frame if we are low on CIDs 50 * May respond with a new connection ID frame (it's a good idea)
|
| /src/sys/contrib/device-tree/Bindings/rtc/ |
| H A D | isil,isl12026.txt | 4 registers respond at bus address 0x6f, and the EEPROM array responds
|
| /src/crypto/krb5/src/plugins/preauth/pkinit/ |
| H A D | pkinit_srv.c | 147 krb5_kdcpreauth_edata_respond_fn respond, in pkinit_server_get_edata() argument 168 (*respond)(arg, retval, NULL); in pkinit_server_get_edata() 424 krb5_kdcpreauth_verify_respond_fn respond, in pkinit_server_verify_padata() argument 445 (*respond)(arg, EINVAL, NULL, NULL, NULL); in pkinit_server_verify_padata() 451 (*respond)(arg, EINVAL, NULL, NULL, NULL); in pkinit_server_verify_padata() 457 (*respond)(arg, EINVAL, NULL, NULL, NULL); in pkinit_server_verify_padata() 623 (*respond)(arg, retval, modreq, e_data, NULL); in pkinit_server_verify_padata()
|
| /src/crypto/openssl/doc/man3/ |
| H A D | SSL_handle_events.pod | 24 events, or to respond to the availability of new data to be read from an 25 underlying BIO, or to respond to the opportunity to write pending data to an
|
| H A D | SSL_key_update.pod | 56 handshake. Note that some servers will respond to reneogitation attempts with 68 appropriate, the request is sent. The client may or may not respond with a new
|
| /src/sys/contrib/device-tree/Bindings/input/touchscreen/ |
| H A D | tsc2005.txt | 15 - ti,esd-recovery-timeout-ms : integer, if the touchscreen does not respond after
|
| /src/release/packages/ucl/ |
| H A D | apm-all.ucl | 23 respond to system power state changes on x86 hardware. APM has been largely
|
| /src/crypto/krb5/src/kadmin/server/ |
| H A D | schpw.c | 403 verto_ctx *vctx, loop_respond_fn respond, void *arg) in dispatch() argument 436 (*respond)(arg, ret, ret == 0 ? response : NULL); in dispatch()
|
| /src/crypto/openssh/ |
| H A D | auth.h | 131 int (*respond)(void *ctx, u_int numresp, char **responses); member
|
| /src/sys/netgraph/bluetooth/l2cap/ |
| H A D | ng_l2cap_evnt.c | 649 u_int16_t dcid, respond, result; in ng_l2cap_process_cfg_req() local 662 respond = NG_L2CAP_OPT_CFLAG(le16toh(cp->flags)); in ng_l2cap_process_cfg_req() 712 respond = 1; in ng_l2cap_process_cfg_req() 746 if (respond) { in ng_l2cap_process_cfg_req()
|