Home
last modified time | relevance | path

Searched refs:callback (Results 1 – 25 of 1182) sorted by relevance

12345678910>>...48

/netbsd-src/external/ibm-public/postfix/dist/src/global/
H A Dabounce.c213 ABOUNCE_FN callback; /* application callback */ member
221 #define ABOUNCE_EVENT_ENABLE(fd, callback, context, timeout) do { \ argument
222 event_enable_read((fd), (callback), (context)); \
223 event_request_timer((callback), (context), (timeout)); \
265 ap->callback(status, ap->context); in abounce_done()
328 const char *verp, ABOUNCE_FN callback, in abounce_connect() argument
350 ap->callback = callback; in abounce_connect()
398 ABOUNCE_FN callback, in abounce_flush_verp() argument
403 sender, dsn_envid, dsn_ret, verp, callback, context); in abounce_flush_verp()
412 ABOUNCE_FN callback, void *context) in adefer_flush_verp() argument
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/
H A DBIO_set_callback.pod8 - BIO callback functions
18 void BIO_set_callback_ex(BIO *b, BIO_callback_fn_ex callback);
41 callback. The callback is called during most high-level BIO operations. It can
46 callback. New code should not use these functions, but they are retained for
47 backwards compatibility. Any callback set via BIO_set_callback_ex() will get
51 used to set and retrieve an argument for use in the callback.
53 BIO_debug_callback_ex() is a standard debugging callback which prints
54 out information relating to each BIO operation. If the callback
57 deprecated version of the same callback for use with the old callback
60 BIO_callback_fn_ex is the type of the callback function and BIO_callback_fn
[all …]
H A DSSL_set_async_callback.pod20 int SSL_CTX_set_async_callback(SSL_CTX *ctx, SSL_async_callback_fn callback);
22 int SSL_set_async_callback(SSL *s, SSL_async_callback_fn callback);
28 SSL_CTX_set_async_callback() sets an asynchronous callback function. All B<SSL>
29 objects generated based on this B<SSL_CTX> will get this callback. If an engine
30 supports the callback mechanism, it will be automatically called if
34 SSL_CTX_set_async_callback_arg() sets the callback argument.
36 SSL_set_async_callback() allows an application to set a callback in an
38 operation, the callback will be called to notify the application to resume the
42 above callback is called.
48 dispatched. If the engine does not support this additional callback method,
[all …]
H A DSSL_CTX_set_ct_validation_callback.pod20 int SSL_set_ct_validation_callback(SSL *s, ssl_ct_validation_cb callback,
23 ssl_ct_validation_cb callback,
35 This is accomplished by setting a built-in CT validation callback.
36 The behaviour of the callback is determined by the B<validation_mode> argument,
45 However, in that case if the verification status before the built-in callback
47 callback.
65 register a custom callback that may implement a different policy than either of
67 This callback can examine the peer's SCTs and determine whether they are
70 and the callback returns a non-positive result.
72 An arbitrary callback data argument, B<arg>, can be passed in when setting
[all …]
H A DSSL_CTX_set_psk_client_callback.pod11 - set PSK client callback
45 The callback function is given a pointer to the SSL connection in B<ssl>.
47 The first time the callback is called for a connection the B<md> parameter is
48 NULL. In some circumstances the callback will be called a second time. In that
51 given in B<md>. The PSK returned by the callback is allowed to be different
54 On successful completion the callback must store a pointer to an identifier for
59 Additionally the callback should store a pointer to an SSL_SESSION object in
96 It is also possible for the callback to succeed but not supply a PSK. In this
98 this the callback should return successfully and ensure that B<*sess> is
102 provide a different callback function. This function will be called when the
[all …]
H A DSSL_CTX_use_psk_identity_hint.pod42 A server application wishing to use TLSv1.3 PSKs should set a callback
46 The callback function is given a pointer to the SSL connection in B<ssl> and
47 an identity in B<identity> of length B<identity_len>. The callback function
53 It is also possible for the callback to succeed but not supply a PSK. In this
55 callback should return successfully and ensure that B<*sess> is
69 callback function which is called when the server receives the
70 ClientKeyExchange message from the client. The purpose of the callback function
72 during the connection setup phase. The callback is set using the functions
73 SSL_CTX_set_psk_server_callback() or SSL_set_psk_server_callback(). The callback
78 The callback for use in TLSv1.2 will also work in TLSv1.3 although it is
[all …]
H A DSSL_CTX_set_info_callback.pod9 - handle information callback for SSL connections
16 void (*callback) (const SSL *ssl, int type, int val));
21 void (*callback) (const SSL *ssl, int type, int val));
27 SSL_CTX_set_info_callback() sets the B<callback> function, that can be used to
31 When B<callback> is NULL, no callback function is used.
33 SSL_set_info_callback() sets the B<callback> function, that can be used to
35 When B<callback> is NULL, the callback setting currently valid for
39 callback function for B<ctx>.
42 callback function for B<ssl>.
47 information from the SSL/TLS engine. When set, an information callback function
[all …]
H A DSSL_CTX_set_cert_verify_callback.pod12 int (*callback)(X509_STORE_CTX *, void *),
17 SSL_CTX_set_cert_verify_callback() sets the verification callback function for
25 If the application does not explicitly specify a verification callback function,
27 If a verification callback I<callback> is specified via
28 SSL_CTX_set_cert_verify_callback(), the supplied callback function is called
29 instead with the arguments callback(X509_STORE_CTX *x509_store_ctx, void *arg).
30 The argument I<arg> is specified by the application when setting I<callback>.
31 By setting I<callback> to NULL, the default behaviour is restored.
33 I<callback> should return 1 to indicate verification success
42 In client mode I<callback> may also call the L<SSL_set_retry_verify(3)>
[all …]
/netbsd-src/external/ibm-public/postfix/dist/src/util/
H A Devents.c242 EVENT_NOTIFY_RDWR_FN callback; member
516 EVENT_NOTIFY_TIME_FN callback; /* callback function */ member
569 fdp->callback = 0; in event_init()
628 fdp->callback = 0; in event_extend()
719 event_enable_write(fd, fdp->callback, fdp->context); in event_fork()
723 event_enable_read(fd, fdp->callback, fdp->context); in event_fork()
731 void event_enable_read(int fd, EVENT_NOTIFY_RDWR_FN callback, void *context) in event_enable_read() argument
778 if (fdp->callback != callback || fdp->context != context) { in event_enable_read()
779 fdp->callback = callback; in event_enable_read()
786 void event_enable_write(int fd, EVENT_NOTIFY_RDWR_FN callback, void *context) in event_enable_write() argument
[all …]
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/
H A DBIO_set_callback.pod8 - BIO callback functions
20 void BIO_set_callback_ex(BIO *b, BIO_callback_fn_ex callback);
34 callback. The callback is called during most high-level BIO operations. It can
39 callback. New code should not use these functions, but they are retained for
40 backwards compatibility. Any callback set via BIO_set_callback_ex() will get
44 used to set and retrieve an argument for use in the callback.
46 BIO_debug_callback() is a standard debugging callback which prints
47 out information relating to each BIO operation. If the callback
51 BIO_callback_fn_ex() is the type of the callback function and BIO_callback_fn()
52 is the type of the old format callback function. The meaning of each argument
[all …]
H A DSSL_CTX_set_cert_verify_callback.pod12 int (*callback)(X509_STORE_CTX *, void *),
17 SSL_CTX_set_cert_verify_callback() sets the verification callback function for
25 verification callback function, the built-in verification function is used.
26 If a verification callback I<callback> is specified via
27 SSL_CTX_set_cert_verify_callback(), the supplied callback function is called
28 instead. By setting I<callback> to NULL, the default behaviour is restored.
30 When the verification must be performed, I<callback> will be called with
31 the arguments callback(X509_STORE_CTX *x509_store_ctx, void *arg). The
32 argument I<arg> is specified by the application when setting I<callback>.
34 I<callback> should return 1 to indicate verification success and 0 to
[all …]
H A DSSL_CTX_set_ct_validation_callback.pod20 int SSL_set_ct_validation_callback(SSL *s, ssl_ct_validation_cb callback,
23 ssl_ct_validation_cb callback,
35 This is accomplished by setting a built-in CT validation callback.
36 The behaviour of the callback is determined by the B<validation_mode> argument,
45 However, in that case if the verification status before the built-in callback
47 callback.
65 register a custom callback that may implement a different policy than either of
67 This callback can examine the peer's SCTs and determine whether they are
70 and the callback returns a non-positive result.
72 An arbitrary callback context argument, B<arg>, can be passed in when setting
[all …]
H A DSSL_CTX_set_psk_client_callback.pod11 - set PSK client callback
45 The callback function is given a pointer to the SSL connection in B<ssl>.
47 The first time the callback is called for a connection the B<md> parameter is
48 NULL. In some circumstances the callback will be called a second time. In that
51 given in B<md>. The PSK returned by the callback is allowed to be different
54 On successful completion the callback must store a pointer to an identifier for
59 Additionally the callback should store a pointer to an SSL_SESSION object in
96 It is also possible for the callback to succeed but not supply a PSK. In this
98 this the callback should return successfully and ensure that B<*sess> is
102 provide a different callback function. This function will be called when the
[all …]
H A DSSL_CTX_use_psk_identity_hint.pod42 A server application wishing to use TLSv1.3 PSKs should set a callback
46 The callback function is given a pointer to the SSL connection in B<ssl> and
47 an identity in B<identity> of length B<identity_len>. The callback function
53 It is also possible for the callback to succeed but not supply a PSK. In this
55 callback should return successfully and ensure that B<*sess> is
69 callback function which is called when the server receives the
70 ClientKeyExchange message from the client. The purpose of the callback function
72 during the connection setup phase. The callback is set using the functions
73 SSL_CTX_set_psk_server_callback() or SSL_set_psk_server_callback(). The callback
78 The callback for use in TLSv1.2 will also work in TLSv1.3 although it is
[all …]
H A DSSL_CTX_set_info_callback.pod9 - handle information callback for SSL connections
15 void SSL_CTX_set_info_callback(SSL_CTX *ctx, void (*callback)());
18 void SSL_set_info_callback(SSL *ssl, void (*callback)());
23 SSL_CTX_set_info_callback() sets the B<callback> function, that can be used to
27 When B<callback> is NULL, no callback function is used.
29 SSL_set_info_callback() sets the B<callback> function, that can be used to
31 When B<callback> is NULL, the callback setting currently valid for
35 callback function for B<ctx>.
38 callback function for B<ssl>.
43 information from the SSL/TLS engine. When set, an information callback function
[all …]
/netbsd-src/external/gpl3/gcc.old/dist/libsanitizer/sanitizer_common/
H A Dsanitizer_termination.cc21 bool AddDieCallback(DieCallbackType callback) { in AddDieCallback() argument
24 InternalDieCallbacks[i] = callback; in AddDieCallback()
31 bool RemoveDieCallback(DieCallbackType callback) { in RemoveDieCallback() argument
33 if (InternalDieCallbacks[i] == callback) { in RemoveDieCallback()
45 void SetUserDieCallback(DieCallbackType callback) { in SetUserDieCallback() argument
46 UserDieCallback = callback; in SetUserDieCallback()
62 void SetCheckFailedCallback(CheckFailedCallbackType callback) { in SetCheckFailedCallback() argument
63 CheckFailedCallback = callback; in SetCheckFailedCallback()
90 void __sanitizer_set_death_callback(void (*callback)(void)) { in __sanitizer_set_death_callback()
91 SetUserDieCallback(callback); in __sanitizer_set_death_callback()
/netbsd-src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/
H A Dsanitizer_termination.cc23 bool AddDieCallback(DieCallbackType callback) { in AddDieCallback() argument
26 InternalDieCallbacks[i] = callback; in AddDieCallback()
33 bool RemoveDieCallback(DieCallbackType callback) { in RemoveDieCallback() argument
35 if (InternalDieCallbacks[i] == callback) { in RemoveDieCallback()
47 void SetUserDieCallback(DieCallbackType callback) { in SetUserDieCallback() argument
48 UserDieCallback = callback; in SetUserDieCallback()
64 void SetCheckFailedCallback(CheckFailedCallbackType callback) { in SetCheckFailedCallback() argument
65 CheckFailedCallback = callback; in SetCheckFailedCallback()
92 void __sanitizer_set_death_callback(void (*callback)(void)) { in __sanitizer_set_death_callback()
93 SetUserDieCallback(callback); in __sanitizer_set_death_callback()
/netbsd-src/external/gpl3/binutils/dist/include/sim/
H A DChangeLog-20213 * sim/callback.h (struct host_callback_struct): Add ATTRIBUTE_PRINTF
8 * sim/callback.h (struct host_callback_struct): Add arg5, arg6, and
13 * sim/callback.h (struct host_callback_struct): Add kill.
17 * sim/callback.h (struct host_callback_struct): Add getpid.
21 * sim/callback.h (struct host_callback_struct): Change lseek return and
26 * callback.h: Include stdint.h.
32 * callback.h (p1, p2): Change PTR to void*.
37 * callback.h (error): Replace __attribute__ with ATTRIBUTE_NORETURN.
41 * callback.h: Delete va_start define check.
45 * callback.h: Moved from ../gdb/callback.h.
/netbsd-src/external/gpl3/binutils.old/dist/include/sim/
H A DChangeLog-20213 * sim/callback.h (struct host_callback_struct): Add ATTRIBUTE_PRINTF
8 * sim/callback.h (struct host_callback_struct): Add arg5, arg6, and
13 * sim/callback.h (struct host_callback_struct): Add kill.
17 * sim/callback.h (struct host_callback_struct): Add getpid.
21 * sim/callback.h (struct host_callback_struct): Change lseek return and
26 * callback.h: Include stdint.h.
32 * callback.h (p1, p2): Change PTR to void*.
37 * callback.h (error): Replace __attribute__ with ATTRIBUTE_NORETURN.
41 * callback.h: Delete va_start define check.
45 * callback.h: Moved from ../gdb/callback.h.
/netbsd-src/external/gpl3/gdb/dist/include/sim/
H A DChangeLog-20213 * sim/callback.h (struct host_callback_struct): Add ATTRIBUTE_PRINTF
8 * sim/callback.h (struct host_callback_struct): Add arg5, arg6, and
13 * sim/callback.h (struct host_callback_struct): Add kill.
17 * sim/callback.h (struct host_callback_struct): Add getpid.
21 * sim/callback.h (struct host_callback_struct): Change lseek return and
26 * callback.h: Include stdint.h.
32 * callback.h (p1, p2): Change PTR to void*.
37 * callback.h (error): Replace __attribute__ with ATTRIBUTE_NORETURN.
41 * callback.h: Delete va_start define check.
45 * callback.h: Moved from ../gdb/callback.h.
/netbsd-src/external/gpl3/gcc/dist/libsanitizer/sanitizer_common/
H A Dsanitizer_termination.cpp22 bool AddDieCallback(DieCallbackType callback) { in AddDieCallback() argument
25 InternalDieCallbacks[i] = callback; in AddDieCallback()
32 bool RemoveDieCallback(DieCallbackType callback) { in RemoveDieCallback() argument
34 if (InternalDieCallbacks[i] == callback) { in RemoveDieCallback()
46 void SetUserDieCallback(DieCallbackType callback) { in SetUserDieCallback() argument
47 UserDieCallback = callback; in SetUserDieCallback()
63 void SetCheckUnwindCallback(void (*callback)()) { in SetCheckUnwindCallback() argument
64 CheckUnwindCallback = callback; in SetCheckUnwindCallback()
96 void __sanitizer_set_death_callback(void (*callback)(void)) { in __sanitizer_set_death_callback()
97 SetUserDieCallback(callback); in __sanitizer_set_death_callback()
/netbsd-src/external/mpl/dhcp/dist/dhcpctl/
H A Dcallback.c55 dhcpctl_callback_object_t *callback; in dhcpctl_set_callback() local
58 callback = dmalloc (sizeof *callback, MDL); in dhcpctl_set_callback()
59 if (!callback) in dhcpctl_set_callback()
66 (omapi_object_t *)callback, MDL); in dhcpctl_set_callback()
67 omapi_object_reference ((omapi_object_t **)&callback -> outer, in dhcpctl_set_callback()
71 omapi_object_reference (&callback -> object, h, MDL); in dhcpctl_set_callback()
72 callback -> data = data; in dhcpctl_set_callback()
73 callback -> callback = func; in dhcpctl_set_callback()
133 if (p -> callback) in dhcpctl_callback_signal_handler()
134 (*(p -> callback)) (p -> object, waitstatus, p -> data); in dhcpctl_callback_signal_handler()
/netbsd-src/external/mit/isl/dist/
H A Disl_scan.c20 struct isl_scan_callback callback; member
55 static int add_solution(struct isl_tab *tab, struct isl_scan_callback *callback) in add_solution() argument
65 return callback->add(callback, sample); in add_solution()
69 struct isl_scan_callback *callback) in scan_0D() argument
81 return callback->add(callback, sample); in scan_0D()
103 struct isl_scan_callback *callback) in isl_basic_set_scan() argument
122 return scan_0D(bset, callback); in isl_basic_set_scan()
181 if (level == dim - 1 && callback->add == increment_counter) { in isl_basic_set_scan()
182 if (increment_range(callback, in isl_basic_set_scan()
201 if (add_solution(tab, callback) < 0) in isl_basic_set_scan()
[all …]
/netbsd-src/sys/external/bsd/drm2/dist/drm/i915/display/
H A Dintel_lvds.c513 .callback = intel_no_lvds_dmi_callback,
521 .callback = intel_no_lvds_dmi_callback,
529 .callback = intel_no_lvds_dmi_callback,
537 .callback = intel_no_lvds_dmi_callback,
545 .callback = intel_no_lvds_dmi_callback,
553 .callback = intel_no_lvds_dmi_callback,
561 .callback = intel_no_lvds_dmi_callback,
569 .callback = intel_no_lvds_dmi_callback,
577 .callback = intel_no_lvds_dmi_callback,
585 .callback = intel_no_lvds_dmi_callback,
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/test/ssl-tests/
H A D03-custom_verify.cnf.in17 # restrictive callback.
25 # Same test as above but with a custom callback that always fails.
40 # Same test as above but with a custom callback that always succeeds.
54 # Same test as above but with a custom callback that requests retry once.
80 # Same test as above but with a custom callback that always fails.
81 # The callback return has no impact on handshake success in this mode.
97 # Same test as above but with a custom callback that always succeeds.
98 # The callback return has no impact on handshake success in this mode.
115 # permissive callback.
129 # Same test as above but with a custom callback that always succeeds.
[all …]

12345678910>>...48