/netbsd-src/external/ibm-public/postfix/dist/src/global/ |
H A D | abounce.c | 213 ABOUNCE_FN callback; /* application callback */ member 221 #define ABOUNCE_EVENT_ENABLE(fd, callback, context, timeout) do { \ argument 222 event_enable_read((fd), (callback), (context)); \ 223 event_request_timer((callback), (context), (timeout)); \ 265 ap->callback(status, ap->context); in abounce_done() 328 const char *verp, ABOUNCE_FN callback, in abounce_connect() argument 350 ap->callback = callback; in abounce_connect() 398 ABOUNCE_FN callback, in abounce_flush_verp() argument 403 sender, dsn_envid, dsn_ret, verp, callback, context); in abounce_flush_verp() 412 ABOUNCE_FN callback, void *context) in adefer_flush_verp() argument [all …]
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | BIO_set_callback.pod | 8 - BIO callback functions 18 void BIO_set_callback_ex(BIO *b, BIO_callback_fn_ex callback); 41 callback. The callback is called during most high-level BIO operations. It can 46 callback. New code should not use these functions, but they are retained for 47 backwards compatibility. Any callback set via BIO_set_callback_ex() will get 51 used to set and retrieve an argument for use in the callback. 53 BIO_debug_callback_ex() is a standard debugging callback which prints 54 out information relating to each BIO operation. If the callback 57 deprecated version of the same callback for use with the old callback 60 BIO_callback_fn_ex is the type of the callback function and BIO_callback_fn [all …]
|
H A D | SSL_set_async_callback.pod | 20 int SSL_CTX_set_async_callback(SSL_CTX *ctx, SSL_async_callback_fn callback); 22 int SSL_set_async_callback(SSL *s, SSL_async_callback_fn callback); 28 SSL_CTX_set_async_callback() sets an asynchronous callback function. All B<SSL> 29 objects generated based on this B<SSL_CTX> will get this callback. If an engine 30 supports the callback mechanism, it will be automatically called if 34 SSL_CTX_set_async_callback_arg() sets the callback argument. 36 SSL_set_async_callback() allows an application to set a callback in an 38 operation, the callback will be called to notify the application to resume the 42 above callback is called. 48 dispatched. If the engine does not support this additional callback method, [all …]
|
H A D | SSL_CTX_set_ct_validation_callback.pod | 20 int SSL_set_ct_validation_callback(SSL *s, ssl_ct_validation_cb callback, 23 ssl_ct_validation_cb callback, 35 This is accomplished by setting a built-in CT validation callback. 36 The behaviour of the callback is determined by the B<validation_mode> argument, 45 However, in that case if the verification status before the built-in callback 47 callback. 65 register a custom callback that may implement a different policy than either of 67 This callback can examine the peer's SCTs and determine whether they are 70 and the callback returns a non-positive result. 72 An arbitrary callback data argument, B<arg>, can be passed in when setting [all …]
|
H A D | SSL_CTX_set_psk_client_callback.pod | 11 - set PSK client callback 45 The callback function is given a pointer to the SSL connection in B<ssl>. 47 The first time the callback is called for a connection the B<md> parameter is 48 NULL. In some circumstances the callback will be called a second time. In that 51 given in B<md>. The PSK returned by the callback is allowed to be different 54 On successful completion the callback must store a pointer to an identifier for 59 Additionally the callback should store a pointer to an SSL_SESSION object in 96 It is also possible for the callback to succeed but not supply a PSK. In this 98 this the callback should return successfully and ensure that B<*sess> is 102 provide a different callback function. This function will be called when the [all …]
|
H A D | SSL_CTX_use_psk_identity_hint.pod | 42 A server application wishing to use TLSv1.3 PSKs should set a callback 46 The callback function is given a pointer to the SSL connection in B<ssl> and 47 an identity in B<identity> of length B<identity_len>. The callback function 53 It is also possible for the callback to succeed but not supply a PSK. In this 55 callback should return successfully and ensure that B<*sess> is 69 callback function which is called when the server receives the 70 ClientKeyExchange message from the client. The purpose of the callback function 72 during the connection setup phase. The callback is set using the functions 73 SSL_CTX_set_psk_server_callback() or SSL_set_psk_server_callback(). The callback 78 The callback for use in TLSv1.2 will also work in TLSv1.3 although it is [all …]
|
H A D | SSL_CTX_set_info_callback.pod | 9 - handle information callback for SSL connections 16 void (*callback) (const SSL *ssl, int type, int val)); 21 void (*callback) (const SSL *ssl, int type, int val)); 27 SSL_CTX_set_info_callback() sets the B<callback> function, that can be used to 31 When B<callback> is NULL, no callback function is used. 33 SSL_set_info_callback() sets the B<callback> function, that can be used to 35 When B<callback> is NULL, the callback setting currently valid for 39 callback function for B<ctx>. 42 callback function for B<ssl>. 47 information from the SSL/TLS engine. When set, an information callback function [all …]
|
H A D | SSL_CTX_set_cert_verify_callback.pod | 12 int (*callback)(X509_STORE_CTX *, void *), 17 SSL_CTX_set_cert_verify_callback() sets the verification callback function for 25 If the application does not explicitly specify a verification callback function, 27 If a verification callback I<callback> is specified via 28 SSL_CTX_set_cert_verify_callback(), the supplied callback function is called 29 instead with the arguments callback(X509_STORE_CTX *x509_store_ctx, void *arg). 30 The argument I<arg> is specified by the application when setting I<callback>. 31 By setting I<callback> to NULL, the default behaviour is restored. 33 I<callback> should return 1 to indicate verification success 42 In client mode I<callback> may also call the L<SSL_set_retry_verify(3)> [all …]
|
/netbsd-src/external/ibm-public/postfix/dist/src/util/ |
H A D | events.c | 242 EVENT_NOTIFY_RDWR_FN callback; member 516 EVENT_NOTIFY_TIME_FN callback; /* callback function */ member 569 fdp->callback = 0; in event_init() 628 fdp->callback = 0; in event_extend() 719 event_enable_write(fd, fdp->callback, fdp->context); in event_fork() 723 event_enable_read(fd, fdp->callback, fdp->context); in event_fork() 731 void event_enable_read(int fd, EVENT_NOTIFY_RDWR_FN callback, void *context) in event_enable_read() argument 778 if (fdp->callback != callback || fdp->context != context) { in event_enable_read() 779 fdp->callback = callback; in event_enable_read() 786 void event_enable_write(int fd, EVENT_NOTIFY_RDWR_FN callback, void *context) in event_enable_write() argument [all …]
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
H A D | BIO_set_callback.pod | 8 - BIO callback functions 20 void BIO_set_callback_ex(BIO *b, BIO_callback_fn_ex callback); 34 callback. The callback is called during most high-level BIO operations. It can 39 callback. New code should not use these functions, but they are retained for 40 backwards compatibility. Any callback set via BIO_set_callback_ex() will get 44 used to set and retrieve an argument for use in the callback. 46 BIO_debug_callback() is a standard debugging callback which prints 47 out information relating to each BIO operation. If the callback 51 BIO_callback_fn_ex() is the type of the callback function and BIO_callback_fn() 52 is the type of the old format callback function. The meaning of each argument [all …]
|
H A D | SSL_CTX_set_cert_verify_callback.pod | 12 int (*callback)(X509_STORE_CTX *, void *), 17 SSL_CTX_set_cert_verify_callback() sets the verification callback function for 25 verification callback function, the built-in verification function is used. 26 If a verification callback I<callback> is specified via 27 SSL_CTX_set_cert_verify_callback(), the supplied callback function is called 28 instead. By setting I<callback> to NULL, the default behaviour is restored. 30 When the verification must be performed, I<callback> will be called with 31 the arguments callback(X509_STORE_CTX *x509_store_ctx, void *arg). The 32 argument I<arg> is specified by the application when setting I<callback>. 34 I<callback> should return 1 to indicate verification success and 0 to [all …]
|
H A D | SSL_CTX_set_ct_validation_callback.pod | 20 int SSL_set_ct_validation_callback(SSL *s, ssl_ct_validation_cb callback, 23 ssl_ct_validation_cb callback, 35 This is accomplished by setting a built-in CT validation callback. 36 The behaviour of the callback is determined by the B<validation_mode> argument, 45 However, in that case if the verification status before the built-in callback 47 callback. 65 register a custom callback that may implement a different policy than either of 67 This callback can examine the peer's SCTs and determine whether they are 70 and the callback returns a non-positive result. 72 An arbitrary callback context argument, B<arg>, can be passed in when setting [all …]
|
H A D | SSL_CTX_set_psk_client_callback.pod | 11 - set PSK client callback 45 The callback function is given a pointer to the SSL connection in B<ssl>. 47 The first time the callback is called for a connection the B<md> parameter is 48 NULL. In some circumstances the callback will be called a second time. In that 51 given in B<md>. The PSK returned by the callback is allowed to be different 54 On successful completion the callback must store a pointer to an identifier for 59 Additionally the callback should store a pointer to an SSL_SESSION object in 96 It is also possible for the callback to succeed but not supply a PSK. In this 98 this the callback should return successfully and ensure that B<*sess> is 102 provide a different callback function. This function will be called when the [all …]
|
H A D | SSL_CTX_use_psk_identity_hint.pod | 42 A server application wishing to use TLSv1.3 PSKs should set a callback 46 The callback function is given a pointer to the SSL connection in B<ssl> and 47 an identity in B<identity> of length B<identity_len>. The callback function 53 It is also possible for the callback to succeed but not supply a PSK. In this 55 callback should return successfully and ensure that B<*sess> is 69 callback function which is called when the server receives the 70 ClientKeyExchange message from the client. The purpose of the callback function 72 during the connection setup phase. The callback is set using the functions 73 SSL_CTX_set_psk_server_callback() or SSL_set_psk_server_callback(). The callback 78 The callback for use in TLSv1.2 will also work in TLSv1.3 although it is [all …]
|
H A D | SSL_CTX_set_info_callback.pod | 9 - handle information callback for SSL connections 15 void SSL_CTX_set_info_callback(SSL_CTX *ctx, void (*callback)()); 18 void SSL_set_info_callback(SSL *ssl, void (*callback)()); 23 SSL_CTX_set_info_callback() sets the B<callback> function, that can be used to 27 When B<callback> is NULL, no callback function is used. 29 SSL_set_info_callback() sets the B<callback> function, that can be used to 31 When B<callback> is NULL, the callback setting currently valid for 35 callback function for B<ctx>. 38 callback function for B<ssl>. 43 information from the SSL/TLS engine. When set, an information callback function [all …]
|
/netbsd-src/external/gpl3/gcc.old/dist/libsanitizer/sanitizer_common/ |
H A D | sanitizer_termination.cc | 21 bool AddDieCallback(DieCallbackType callback) { in AddDieCallback() argument 24 InternalDieCallbacks[i] = callback; in AddDieCallback() 31 bool RemoveDieCallback(DieCallbackType callback) { in RemoveDieCallback() argument 33 if (InternalDieCallbacks[i] == callback) { in RemoveDieCallback() 45 void SetUserDieCallback(DieCallbackType callback) { in SetUserDieCallback() argument 46 UserDieCallback = callback; in SetUserDieCallback() 62 void SetCheckFailedCallback(CheckFailedCallbackType callback) { in SetCheckFailedCallback() argument 63 CheckFailedCallback = callback; in SetCheckFailedCallback() 90 void __sanitizer_set_death_callback(void (*callback)(void)) { in __sanitizer_set_death_callback() 91 SetUserDieCallback(callback); in __sanitizer_set_death_callback()
|
/netbsd-src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
H A D | sanitizer_termination.cc | 23 bool AddDieCallback(DieCallbackType callback) { in AddDieCallback() argument 26 InternalDieCallbacks[i] = callback; in AddDieCallback() 33 bool RemoveDieCallback(DieCallbackType callback) { in RemoveDieCallback() argument 35 if (InternalDieCallbacks[i] == callback) { in RemoveDieCallback() 47 void SetUserDieCallback(DieCallbackType callback) { in SetUserDieCallback() argument 48 UserDieCallback = callback; in SetUserDieCallback() 64 void SetCheckFailedCallback(CheckFailedCallbackType callback) { in SetCheckFailedCallback() argument 65 CheckFailedCallback = callback; in SetCheckFailedCallback() 92 void __sanitizer_set_death_callback(void (*callback)(void)) { in __sanitizer_set_death_callback() 93 SetUserDieCallback(callback); in __sanitizer_set_death_callback()
|
/netbsd-src/external/gpl3/binutils/dist/include/sim/ |
H A D | ChangeLog-2021 | 3 * sim/callback.h (struct host_callback_struct): Add ATTRIBUTE_PRINTF 8 * sim/callback.h (struct host_callback_struct): Add arg5, arg6, and 13 * sim/callback.h (struct host_callback_struct): Add kill. 17 * sim/callback.h (struct host_callback_struct): Add getpid. 21 * sim/callback.h (struct host_callback_struct): Change lseek return and 26 * callback.h: Include stdint.h. 32 * callback.h (p1, p2): Change PTR to void*. 37 * callback.h (error): Replace __attribute__ with ATTRIBUTE_NORETURN. 41 * callback.h: Delete va_start define check. 45 * callback.h: Moved from ../gdb/callback.h.
|
/netbsd-src/external/gpl3/binutils.old/dist/include/sim/ |
H A D | ChangeLog-2021 | 3 * sim/callback.h (struct host_callback_struct): Add ATTRIBUTE_PRINTF 8 * sim/callback.h (struct host_callback_struct): Add arg5, arg6, and 13 * sim/callback.h (struct host_callback_struct): Add kill. 17 * sim/callback.h (struct host_callback_struct): Add getpid. 21 * sim/callback.h (struct host_callback_struct): Change lseek return and 26 * callback.h: Include stdint.h. 32 * callback.h (p1, p2): Change PTR to void*. 37 * callback.h (error): Replace __attribute__ with ATTRIBUTE_NORETURN. 41 * callback.h: Delete va_start define check. 45 * callback.h: Moved from ../gdb/callback.h.
|
/netbsd-src/external/gpl3/gdb/dist/include/sim/ |
H A D | ChangeLog-2021 | 3 * sim/callback.h (struct host_callback_struct): Add ATTRIBUTE_PRINTF 8 * sim/callback.h (struct host_callback_struct): Add arg5, arg6, and 13 * sim/callback.h (struct host_callback_struct): Add kill. 17 * sim/callback.h (struct host_callback_struct): Add getpid. 21 * sim/callback.h (struct host_callback_struct): Change lseek return and 26 * callback.h: Include stdint.h. 32 * callback.h (p1, p2): Change PTR to void*. 37 * callback.h (error): Replace __attribute__ with ATTRIBUTE_NORETURN. 41 * callback.h: Delete va_start define check. 45 * callback.h: Moved from ../gdb/callback.h.
|
/netbsd-src/external/gpl3/gcc/dist/libsanitizer/sanitizer_common/ |
H A D | sanitizer_termination.cpp | 22 bool AddDieCallback(DieCallbackType callback) { in AddDieCallback() argument 25 InternalDieCallbacks[i] = callback; in AddDieCallback() 32 bool RemoveDieCallback(DieCallbackType callback) { in RemoveDieCallback() argument 34 if (InternalDieCallbacks[i] == callback) { in RemoveDieCallback() 46 void SetUserDieCallback(DieCallbackType callback) { in SetUserDieCallback() argument 47 UserDieCallback = callback; in SetUserDieCallback() 63 void SetCheckUnwindCallback(void (*callback)()) { in SetCheckUnwindCallback() argument 64 CheckUnwindCallback = callback; in SetCheckUnwindCallback() 96 void __sanitizer_set_death_callback(void (*callback)(void)) { in __sanitizer_set_death_callback() 97 SetUserDieCallback(callback); in __sanitizer_set_death_callback()
|
/netbsd-src/external/mpl/dhcp/dist/dhcpctl/ |
H A D | callback.c | 55 dhcpctl_callback_object_t *callback; in dhcpctl_set_callback() local 58 callback = dmalloc (sizeof *callback, MDL); in dhcpctl_set_callback() 59 if (!callback) in dhcpctl_set_callback() 66 (omapi_object_t *)callback, MDL); in dhcpctl_set_callback() 67 omapi_object_reference ((omapi_object_t **)&callback -> outer, in dhcpctl_set_callback() 71 omapi_object_reference (&callback -> object, h, MDL); in dhcpctl_set_callback() 72 callback -> data = data; in dhcpctl_set_callback() 73 callback -> callback = func; in dhcpctl_set_callback() 133 if (p -> callback) in dhcpctl_callback_signal_handler() 134 (*(p -> callback)) (p -> object, waitstatus, p -> data); in dhcpctl_callback_signal_handler()
|
/netbsd-src/external/mit/isl/dist/ |
H A D | isl_scan.c | 20 struct isl_scan_callback callback; member 55 static int add_solution(struct isl_tab *tab, struct isl_scan_callback *callback) in add_solution() argument 65 return callback->add(callback, sample); in add_solution() 69 struct isl_scan_callback *callback) in scan_0D() argument 81 return callback->add(callback, sample); in scan_0D() 103 struct isl_scan_callback *callback) in isl_basic_set_scan() argument 122 return scan_0D(bset, callback); in isl_basic_set_scan() 181 if (level == dim - 1 && callback->add == increment_counter) { in isl_basic_set_scan() 182 if (increment_range(callback, in isl_basic_set_scan() 201 if (add_solution(tab, callback) < 0) in isl_basic_set_scan() [all …]
|
/netbsd-src/sys/external/bsd/drm2/dist/drm/i915/display/ |
H A D | intel_lvds.c | 513 .callback = intel_no_lvds_dmi_callback, 521 .callback = intel_no_lvds_dmi_callback, 529 .callback = intel_no_lvds_dmi_callback, 537 .callback = intel_no_lvds_dmi_callback, 545 .callback = intel_no_lvds_dmi_callback, 553 .callback = intel_no_lvds_dmi_callback, 561 .callback = intel_no_lvds_dmi_callback, 569 .callback = intel_no_lvds_dmi_callback, 577 .callback = intel_no_lvds_dmi_callback, 585 .callback = intel_no_lvds_dmi_callback, [all …]
|
/netbsd-src/crypto/external/bsd/openssl/dist/test/ssl-tests/ |
H A D | 03-custom_verify.cnf.in | 17 # restrictive callback. 25 # Same test as above but with a custom callback that always fails. 40 # Same test as above but with a custom callback that always succeeds. 54 # Same test as above but with a custom callback that requests retry once. 80 # Same test as above but with a custom callback that always fails. 81 # The callback return has no impact on handshake success in this mode. 97 # Same test as above but with a custom callback that always succeeds. 98 # The callback return has no impact on handshake success in this mode. 115 # permissive callback. 129 # Same test as above but with a custom callback that always succeeds. [all …]
|