/dragonfly/contrib/gcc-4.7/gcc/doc/ |
H A D | service.texi | 16 that brings no response, try @email{gcc@@gcc.gnu.org}. For help
|
/dragonfly/crypto/libressl/crypto/ocsp/ |
H A D | ocsp_local.h | 141 ASN1_OCTET_STRING *response; member
|
H A D | ocsp_srv.c | 133 &rsp->responseBytes->response)) in OCSP_response_create()
|
H A D | ocsp_prn.c | 227 i = ASN1_STRING_length(rb->response); in OCSP_RESPONSE_print()
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | tls_wolfssl.c | 1466 unsigned char **response) in ocsp_status_cb() argument 1475 *response = NULL; in ocsp_status_cb() 1479 *response = (unsigned char *) os_readfile(url, &len); in ocsp_status_cb() 1480 if (!*response) { in ocsp_status_cb() 1491 void ocsp_resp_free_cb(void *ocsp_stapling_response, unsigned char *response) in ocsp_resp_free_cb() argument 1493 os_free(response); in ocsp_resp_free_cb()
|
/dragonfly/games/hunt/hunt/ |
H A D | hunt.c | 183 driver->response, in main() 184 (driver->response == 1) ? "" : "s", in main()
|
/dragonfly/crypto/libressl/crypto/ts/ |
H A D | ts_local.h | 262 TS_RESP *response; member
|
/dragonfly/crypto/openssh/ |
H A D | sshconnect2.c | 1977 char *display_prompt = NULL, *response = NULL; in input_userauth_info_req() local 2019 response = read_passphrase(display_prompt, echo ? RP_ECHO : 0); in input_userauth_info_req() 2020 if ((r = sshpkt_put_cstring(ssh, response)) != 0) in input_userauth_info_req() 2022 freezero(response, strlen(response)); in input_userauth_info_req() 2025 display_prompt = response = prompt = NULL; in input_userauth_info_req() 2033 if (response) in input_userauth_info_req() 2034 freezero(response, strlen(response)); in input_userauth_info_req()
|
H A D | monitor.c | 952 char *response; in mm_answer_bsdauthrespond() local 960 if ((r = sshbuf_get_cstring(m, &response, NULL)) != 0) in mm_answer_bsdauthrespond() 963 auth_userresponse(authctxt->as, response, 0); in mm_answer_bsdauthrespond() 965 debug3_f("<%s> = <%d>", response, authok); in mm_answer_bsdauthrespond() 966 free(response); in mm_answer_bsdauthrespond()
|
/dragonfly/sys/dev/acpica/acpi_hp/ |
H A D | acpi_hp.c | 816 ACPI_BUFFER response = { ACPI_ALLOCATE_BUFFER, NULL }; in acpi_hp_notify() local 818 ACPI_WMI_GET_EVENT_DATA(sc->wmi_dev, notify, &response); in acpi_hp_notify() 819 obj = (ACPI_OBJECT*) response.Pointer; in acpi_hp_notify() 825 acpi_hp_free_buffer(&response); in acpi_hp_notify()
|
/dragonfly/usr.sbin/lpr/lpd/ |
H A D | printjob.c | 128 static char response(const struct printer *_pp); 1116 (resp = response(pp)) < 0 || resp == '\1') { in sendfile() 1156 if (write(pfd, "", 1) != 1 || response(pp)) { in sendfile() 1291 response(const struct printer *pp) in response() function 1793 && (resp = response(pp)) == 0) in openrem()
|
/dragonfly/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap.h | 165 const u8 *challenge, const u8 *response);
|
/dragonfly/sys/dev/disk/isp/ |
H A D | DriverManual.txt | 141 via mailbox commands, circular request and response queues in system 164 and saves the QLogic HBA from having to write a response queue entry). 168 interrupt notification that the response queue has an entry to 229 + First level interrupt handling (response retrieval) (isp_intr) 247 request/response queues and fibre channel scratch area, set up and tear 409 The external target mode handler then turns around forms up a response 410 to this 'response' that just arrived which is then placed on the Request 414 requested command, so the QLogic firmware will rewrite the response 415 to the initial 'response' again onto the Response Queue, whereupon the
|
/dragonfly/contrib/tcpdump/ |
H A D | print-smb.c | 1082 u_int name_trn_id, response, opcode, nm_flags, rcode; in nbt_udp137_print() local 1089 response = (GET_U_1(data + 2) >> 7); in nbt_udp137_print() 1106 if (response) { in nbt_udp137_print() 1109 ND_PRINT("; %s; %s", response ? "RESPONSE" : "REQUEST", in nbt_udp137_print()
|
/dragonfly/contrib/cvs-1.12/src/ |
H A D | server.c | 545 struct response *rs; in supported_response() 624 struct response *rs; in serve_valid_responses() 6840 struct pam_response *response; in cvs_pam_conv() local 6844 response = xnmalloc (num_msg, sizeof (struct pam_response)); in cvs_pam_conv() 6854 response[i].resp = xstrdup (pam_username); in cvs_pam_conv() 6859 response[i].resp = xstrdup (pam_password); in cvs_pam_conv() 6871 *resp = response; in cvs_pam_conv() 6877 if (response[i].resp) in cvs_pam_conv() 6879 free (response[i].resp); in cvs_pam_conv() 6880 response[i].resp = 0; in cvs_pam_conv() [all …]
|
/dragonfly/contrib/wpa_supplicant/wpa_supplicant/ |
H A D | README-P2P | 248 This command sends a provision discovery response from responder side. 317 two optional parameters service information, and response info. 337 Session response information - Optional (used only if auto accept is TRUE) 367 Session response information - Optional (used only if auto accept is TRUE) 384 peers (note: this can result in long response frames). The pending 484 response TLV(s). The first three parameters are copied from the 505 that there is quite strict limit on how quickly the response needs to 608 immediately and the response from the GO is indicated in a
|
/dragonfly/usr.sbin/bootparamd/bootparamd/ |
H A D | README | 41 The debugging tool callbootd is used to check the response you get
|
/dragonfly/usr.sbin/ppp/ |
H A D | radius.c | 109 u_char response[24]; member 825 memcpy(msresp2.response, keyv2->NTResponse, sizeof msresp2.response); in radius_Authenticate()
|
/dragonfly/share/i18n/csmapper/KOI/ |
H A D | GOST19768-74%UCS.src | 58 # notices will be checked, but do not expect an immediate response.
|
H A D | KOI8-R%UCS.src | 58 # notices will be checked, but do not expect an immediate response.
|
H A D | UCS%GOST19768-74.src | 58 # notices will be checked, but do not expect an immediate response.
|
H A D | UCS%KOI8-R.src | 59 # notices will be checked, but do not expect an immediate response.
|
/dragonfly/etc/ |
H A D | hosts.allow | 31 # occurs, access is denied, and any positive ident response within
|
/dragonfly/sys/dev/raid/mpr/ |
H A D | mpr_sas.c | 2981 uint8_t *request, *response; 3039 response = (uint8_t *)(uintptr_t)rsp_sg[0].ds_addr; 3041 response = ccb->smpio.smp_response; 3045 response = ccb->smpio.smp_response; 3103 response = (uint8_t *)(uintptr_t)rsp_sg[0].ds_addr; 3105 response = ccb->smpio.smp_response; 3108 response = ccb->smpio.smp_response; 3154 cm->cm_iovec[1].iov_base = response;
|
/dragonfly/share/i18n/csmapper/ISO-8859/ |
H A D | ISO-8859-6%UCS.src | 61 # notices will be checked, but do not expect an immediate response.
|