Home
last modified time | relevance | path

Searched refs:respond (Results 1 – 25 of 96) sorted by relevance

1234

/src/crypto/krb5/src/plugins/preauth/spake/
H A Dspake_kdc.c302 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in spake_edata() argument
312 (*respond)(arg, KRB5KDC_ERR_ETYPE_NOSUPP, NULL); in spake_edata()
318 send_challenge(context, gstate, group, cb, rock, &empty, respond, NULL, in spake_edata()
322 (*respond)(arg, 0, NULL); in spake_edata()
332 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in verify_support() argument
349 send_challenge(context, gstate, group, cb, rock, der_msg, NULL, respond, in verify_support()
354 (*respond)(arg, ret, NULL, NULL, NULL); in verify_support()
368 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in verify_response() argument
474 (*respond)(arg, ret, NULL, NULL, NULL); in verify_response()
487 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in verify_encdata() argument
[all …]
/src/usr.sbin/rmt/
H A Drmt.c102 goto respond; in main()
110 goto respond; in main()
119 goto respond; in main()
136 goto respond; in main()
162 goto respond; in main()
182 goto respond; in main()
188 respond: in main()
/src/crypto/krb5/src/kdc/
H A Dkdc_preauth_encts.c35 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in enc_ts_get() argument
41 (*respond)(arg, ENOENT, NULL); in enc_ts_get()
43 (*respond)(arg, 0, NULL); in enc_ts_get()
51 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in enc_ts_verify() argument
118 (*respond)(arg, retval, NULL, NULL, NULL); in enc_ts_verify()
H A Ddispatch.c39 loop_respond_fn respond; member
51 loop_respond_fn oldrespond = state->respond; in finish_dispatch()
92 verto_ctx *vctx, loop_respond_fn respond, void *arg) in dispatch() argument
103 (*respond)(arg, retval, NULL); in dispatch()
106 state->respond = respond; in dispatch()
H A Dkdc_preauth_ec.c40 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in ec_edata() argument
46 (*respond)(arg, ENOENT, NULL); in ec_edata()
48 (*respond)(arg, 0, NULL); in ec_edata()
56 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in ec_verify() argument
151 (*respond)(arg, ret, modreq, NULL, NULL); in ec_verify()
H A Dkdc_preauth.c874 kdc_hint_respond_fn respond; member
892 kdc_hint_respond_fn oldrespond = state->respond; in hint_list_finish()
976 krb5_pa_data ***e_data_out, kdc_hint_respond_fn respond, in get_preauth_hint_list() argument
990 state->respond = respond; in get_preauth_hint_list()
1013 (*respond)(arg); in get_preauth_hint_list()
1066 kdc_preauth_respond_fn respond; member
1178 kdc_preauth_respond_fn respond; in finish_check_padata() local
1202 respond = state->respond; in finish_check_padata()
1206 (*respond)(arg, filter_preauth_error(code)); in finish_check_padata()
1341 kdc_preauth_respond_fn respond, void *arg) in check_padata() argument
[all …]
H A Ddo_as_req.c154 loop_respond_fn respond; member
208 oldrespond = state->respond; in finish_process_as_req()
473 verto_ctx *vctx, loop_respond_fn respond, void *arg) in process_as_req() argument
484 (*respond)(arg, errcode, NULL); in process_as_req()
487 state->respond = respond; in process_as_req()
497 (*respond)(arg, errcode, NULL); in process_as_req()
506 (*respond)(arg, errcode, NULL); in process_as_req()
/src/crypto/krb5/src/plugins/preauth/otp/
H A Dmain.c44 krb5_kdcpreauth_verify_respond_fn respond; member
191 rs.respond(rs.arg, retval, NULL, NULL, NULL); in on_response()
224 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in otp_edata() argument
280 (*respond)(arg, retval, pa); in otp_edata()
288 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in otp_verify() argument
337 rs->respond = respond; in otp_verify()
362 (*respond)(arg, retval, NULL, NULL, NULL); in otp_verify()
/src/crypto/krb5/src/plugins/preauth/test/
H A Dkdctest.c75 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in test_edata() argument
107 (*respond)(arg, 0, pa); in test_edata()
115 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in test_verify() argument
185 (*respond)(arg, ret, NULL, list, NULL); in test_verify()
/src/crypto/krb5/src/plugins/preauth/securid_sam2/
H A Dsecurid_sam2_main.c174 krb5_kdcpreauth_edata_respond_fn respond, void *arg) in kdc_include_padata() argument
253 (*respond)(arg, retval, pa_data); in kdc_include_padata()
261 krb5_kdcpreauth_verify_respond_fn respond, void *arg) in kdc_verify_preauth() argument
346 (*respond)(arg, retval, NULL, NULL, NULL); in kdc_verify_preauth()
/src/usr.bin/mail/
H A Dcmdtab.c89 { "reply", respond, R|I|MSGLIST, 0, MMNDEL },
90 { "respond", respond, R|I|MSGLIST, 0, MMNDEL },
/src/crypto/krb5/src/include/krb5/
H A Dkdcpreauth_plugin.h327 krb5_kdcpreauth_edata_respond_fn respond,
361 krb5_kdcpreauth_verify_respond_fn respond,
/src/sys/contrib/device-tree/Bindings/iio/pressure/
H A Dms5611.txt7 - reg: the I2C address or SPI chip select the device will respond to
H A Dzpa2326.txt7 - reg: the I2C address or SPI chip select the device will respond to
/src/crypto/krb5/src/include/
H A Dnet-server.h86 int is_tcp, verto_ctx *vctx, loop_respond_fn respond, void *arg);
/src/crypto/openssl/doc/designs/quic-design/
H A Dquic-connID-retire.md45 * Should respond with a NEW_CONNECTION_ID frame if we are low on CIDs
50 * May respond with a new connection ID frame (it's a good idea)
/src/sys/contrib/device-tree/Bindings/rtc/
H A Disil,isl12026.txt4 registers respond at bus address 0x6f, and the EEPROM array responds
/src/crypto/krb5/src/plugins/preauth/pkinit/
H A Dpkinit_srv.c147 krb5_kdcpreauth_edata_respond_fn respond, in pkinit_server_get_edata() argument
168 (*respond)(arg, retval, NULL); in pkinit_server_get_edata()
424 krb5_kdcpreauth_verify_respond_fn respond, in pkinit_server_verify_padata() argument
445 (*respond)(arg, EINVAL, NULL, NULL, NULL); in pkinit_server_verify_padata()
451 (*respond)(arg, EINVAL, NULL, NULL, NULL); in pkinit_server_verify_padata()
457 (*respond)(arg, EINVAL, NULL, NULL, NULL); in pkinit_server_verify_padata()
623 (*respond)(arg, retval, modreq, e_data, NULL); in pkinit_server_verify_padata()
/src/crypto/openssl/doc/man3/
H A DSSL_handle_events.pod24 events, or to respond to the availability of new data to be read from an
25 underlying BIO, or to respond to the opportunity to write pending data to an
H A DSSL_key_update.pod56 handshake. Note that some servers will respond to reneogitation attempts with
68 appropriate, the request is sent. The client may or may not respond with a new
/src/sys/contrib/device-tree/Bindings/input/touchscreen/
H A Dtsc2005.txt15 - ti,esd-recovery-timeout-ms : integer, if the touchscreen does not respond after
/src/release/packages/ucl/
H A Dapm-all.ucl23 respond to system power state changes on x86 hardware. APM has been largely
/src/crypto/krb5/src/kadmin/server/
H A Dschpw.c403 verto_ctx *vctx, loop_respond_fn respond, void *arg) in dispatch() argument
436 (*respond)(arg, ret, ret == 0 ? response : NULL); in dispatch()
/src/crypto/openssh/
H A Dauth.h131 int (*respond)(void *ctx, u_int numresp, char **responses); member
/src/sys/netgraph/bluetooth/l2cap/
H A Dng_l2cap_evnt.c649 u_int16_t dcid, respond, result; in ng_l2cap_process_cfg_req() local
662 respond = NG_L2CAP_OPT_CFLAG(le16toh(cp->flags)); in ng_l2cap_process_cfg_req()
712 respond = 1; in ng_l2cap_process_cfg_req()
746 if (respond) { in ng_l2cap_process_cfg_req()

1234