Home
last modified time | relevance | path

Searched refs:response (Results 1 – 25 of 171) sorted by relevance

1234567

/dragonfly/contrib/wpa_supplicant/src/common/
H A Dgas_server.c61 response, MAC2STR(response->dst), response->dialog_token, in gas_server_response_timeout()
62 response->freq, response->frag_id, in gas_server_response_timeout()
65 response->handler->status_cb(response->handler->ctx, in gas_server_response_timeout()
75 if (!response) in gas_server_free_response()
80 os_free(response); in gas_server_free_response()
99 response = os_zalloc(sizeof(*response)); in gas_server_send_resp()
100 if (!response) { in gas_server_send_resp()
247 remaining = wpabuf_len(response->resp) - response->offset; in gas_server_handle_rx_comeback_req()
282 gas->tx(gas->ctx, response->freq, response->dst, resp, in gas_server_handle_rx_comeback_req()
362 if (ack && response->offset < wpabuf_len(response->resp)) { in gas_server_handle_tx_status()
[all …]
/dragonfly/contrib/lvm2/dist/daemons/clvmd/
H A Drefresh_clvmd.c41 char *response; member
233 if (!*response) { in _cluster_request()
239 rarray = *response; in _cluster_request()
257 free(*response); in _cluster_request()
269 *response = rarray; in _cluster_request()
284 dm_free(response[i].response); in _cluster_free_request()
287 dm_free(response); in _cluster_free_request()
313 response[i].response[0] ? in refresh_clvmd()
314 response[i].response : in refresh_clvmd()
356 response[i].response[0] ? in debug_clvmd()
[all …]
/dragonfly/contrib/lvm2/dist/lib/locking/
H A Dcluster_locking.c46 char *response; member
245 if (!*response) { in _cluster_request()
269 free(*response); in _cluster_request()
296 dm_free(response[i].response); in _cluster_free_request()
363 response[i].response[0] ? in _lock_for_cluster()
364 response[i].response : in _lock_for_cluster()
468 if (!response) in decode_lock_type()
507 if (!response[i].response[0]) in _query_resource()
516 if (decode_lock_type(response[i].response) > *mode) in _query_resource()
517 *mode = decode_lock_type(response[i].response); in _query_resource()
[all …]
/dragonfly/contrib/cvs-1.12/lib/
H A Drpmatch.c34 try (const char *response, const char *pattern, const int match, in try() argument
53 return regexec (re, response, 0, NULL, 0) == 0 ? match : nomatch; in try()
59 rpmatch (const char *response) in rpmatch() argument
70 return ((result = try (response, _("^[yY]"), 1, 0, in rpmatch()
73 : try (response, _("^[nN]"), 0, -1, &noexpr, &nore)); in rpmatch()
76 return (*response == 'y' || *response == 'Y' ? 1 in rpmatch()
77 : *response == 'n' || *response == 'N' ? 0 : -1); in rpmatch()
H A Dyesno.c33 extern int rpmatch (char const *response);
38 char *response = NULL; in yesno() local
40 ssize_t response_len = getline (&response, &response_size, stdin); in yesno()
47 response[response_len - 1] = '\0'; in yesno()
48 yes = (0 < rpmatch (response)); in yesno()
51 free (response); in yesno()
/dragonfly/usr.bin/talk/
H A Dinvite.c63 CTL_RESPONSE response; in invite_remote() local
105 ctl_transact(my_machine_addr, msg, DELETE, &response); in invite_remote()
107 ctl_transact(his_machine_addr, msg, DELETE, &response); in invite_remote()
148 CTL_RESPONSE response; in announce_invite() local
151 ctl_transact(his_machine_addr, msg, ANNOUNCE, &response); in announce_invite()
152 remote_id = response.id_num; in announce_invite()
153 if (response.answer != SUCCESS) { in announce_invite()
154 if (response.answer < NANSWERS) in announce_invite()
155 message(answers[response.answer]); in announce_invite()
160 ctl_transact(my_machine_addr, msg, LEAVE_INVITE, &response); in announce_invite()
[all …]
H A Dlook_up.c48 CTL_RESPONSE response; in check_local() local
49 CTL_RESPONSE *rp = &response; in check_local()
/dragonfly/contrib/wpa_supplicant/src/crypto/
H A Dms_funcs.c146 u8 *response) in challenge_response() argument
156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response()
174 u8 *response) in generate_nt_response() argument
202 u8 *response) in generate_nt_response_pwhash() argument
231 const u8 *nt_response, u8 *response) in generate_authenticator_response_pwhash() argument
257 addr2[0] = response; in generate_authenticator_response_pwhash()
262 sha1_vector(3, addr1, len1, response) || in generate_authenticator_response_pwhash()
266 return sha1_vector(3, addr2, len2, response); in generate_authenticator_response_pwhash()
287 const u8 *nt_response, u8 *response) in generate_authenticator_response() argument
294 username, username_len, nt_response, response); in generate_authenticator_response()
[all …]
H A Dms_funcs.h15 u8 *response);
20 u8 *response);
25 const u8 *nt_response, u8 *response);
30 const u8 *nt_response, u8 *response);
32 size_t password_len, u8 *response);
35 u8 *response);
/dragonfly/libexec/talkd/
H A Dtalkd.c58 CTL_RESPONSE response; variable
104 process_request(mp, &response); in main()
107 cc = sendto(sockt, (char *)&response, in main()
108 sizeof (response), 0, (struct sockaddr *)&mp->ctl_addr, in main()
110 if (cc != sizeof (response)) in main()
/dragonfly/contrib/openpam/lib/libpam/
H A Dopenpam_ttyconv.c84 prompt_tty(int ifd, int ofd, const char *message, char *response, int echo) in prompt_tty() argument
175 response[pos] = '\0'; in prompt_tty()
180 response[pos++] = ch; in prompt_tty()
216 prompt_notty(const char *message, char *response) in prompt_notty() argument
272 response[pos] = '\0'; in prompt_notty()
276 response[pos++] = ch; in prompt_notty()
289 prompt(const char *message, char *response, int echo) in prompt() argument
303 return (prompt_notty(message, response)); in prompt()
306 ret = prompt_tty(ifd, ofd, message, response, echo); in prompt()
/dragonfly/crypto/libressl/apps/openssl/
H A Dts.c777 TS_RESP *response = NULL; in reply_command() local
793 response = read_PKCS7(in_bio); in reply_command()
801 if (response != NULL) in reply_command()
806 if (response == NULL) in reply_command()
845 TS_RESP_free(response); in reply_command()
900 TS_RESP *response = NULL; in create_response() local
970 TS_RESP_free(response); in create_response()
971 response = NULL; in create_response()
976 return response; in create_response()
1072 TS_RESP *response = NULL; in verify_command() local
[all …]
/dragonfly/crypto/openssh/
H A Dauth2-chall.c298 char **response = NULL; in input_userauth_info_response() local
316 response = xcalloc(nresp, sizeof(char *)); in input_userauth_info_response()
318 if ((r = sshpkt_get_cstring(ssh, &response[i], NULL)) != 0) in input_userauth_info_response()
325 res = kbdintctxt->device->respond(kbdintctxt->ctxt, nresp, response); in input_userauth_info_response()
328 explicit_bzero(response[i], strlen(response[i])); in input_userauth_info_response()
329 free(response[i]); in input_userauth_info_response()
331 free(response); in input_userauth_info_response()
/dragonfly/usr.sbin/nscd/
H A Dmp_rs_query.c68 finalize_comm_element(&qstate->response); in on_mp_read_session_destroy()
170 init_comm_element(&qstate->response, CET_MP_READ_SESSION_RESPONSE); in on_mp_read_session_request_process()
172 &qstate->response); in on_mp_read_session_request_process()
332 &qstate->response); in on_mp_read_session_response_write1()
417 init_comm_element(&qstate->response, CET_MP_READ_SESSION_READ_RESPONSE); in on_mp_read_session_read_request_process()
419 &qstate->response); in on_mp_read_session_read_request_process()
455 &qstate->response); in on_mp_read_session_read_response_write1()
495 &qstate->response); in on_mp_read_session_read_response_write2()
506 finalize_comm_element(&qstate->response); in on_mp_read_session_read_response_write2()
H A Dmp_ws_query.c70 finalize_comm_element(&qstate->response); in on_mp_write_session_destroy()
169 init_comm_element(&qstate->response, CET_MP_WRITE_SESSION_RESPONSE); in on_mp_write_session_request_process()
171 &qstate->response); in on_mp_write_session_request_process()
264 &qstate->response); in on_mp_write_session_response_write1()
417 init_comm_element(&qstate->response, in on_mp_write_session_write_request_process()
420 &qstate->response); in on_mp_write_session_write_request_process()
447 &qstate->response); in on_mp_write_session_write_response_write1()
459 finalize_comm_element(&qstate->response); in on_mp_write_session_write_response_write1()
H A Dquery.c289 finalize_comm_element(&qstate->response); in on_query_destroy()
401 init_comm_element(&qstate->response, CET_WRITE_RESPONSE); in on_write_request_process()
474 init_comm_element(&qstate->response, CET_WRITE_RESPONSE); in on_negative_write_request_process()
562 finalize_comm_element(&qstate->response); in on_write_response_write1()
667 init_comm_element(&qstate->response, CET_READ_RESPONSE); in on_read_request_process()
668 read_response = get_cache_read_response(&qstate->response); in on_read_request_process()
830 read_response = get_cache_read_response(&qstate->response); in on_read_response_write1()
866 read_response = get_cache_read_response(&qstate->response); in on_read_response_write2()
877 finalize_comm_element(&qstate->response); in on_read_response_write2()
1076 finalize_comm_element(&qstate->response); in on_transform_response_write1()
[all …]
/dragonfly/crypto/libressl/crypto/ts/
H A Dts_rsp_sign.c360 if (!TS_RESP_set_status_info(ctx->response, si)) in TS_RESP_CTX_set_status_info()
427 TS_RESP *response; in TS_RESP_create_response() local
433 if (!(ctx->response = TS_RESP_new())) { in TS_RESP_create_response()
477 if (ctx->response != NULL) { in TS_RESP_create_response()
481 TS_RESP_free(ctx->response); in TS_RESP_create_response()
482 ctx->response = NULL; in TS_RESP_create_response()
486 response = ctx->response; in TS_RESP_create_response()
489 return response; in TS_RESP_create_response()
497 ctx->response = NULL; in TS_RESP_CTX_init()
507 TS_RESP_free(ctx->response); in TS_RESP_CTX_cleanup()
[all …]
H A Dts_rsp_verify.c83 static int TS_check_status_info(TS_RESP *response);
469 TS_RESP_verify_response(TS_VERIFY_CTX *ctx, TS_RESP *response) in TS_RESP_verify_response() argument
471 PKCS7 *token = TS_RESP_get_token(response); in TS_RESP_verify_response()
472 TS_TST_INFO *tst_info = TS_RESP_get_tst_info(response); in TS_RESP_verify_response()
476 if (!TS_check_status_info(response)) in TS_RESP_verify_response()
588 TS_check_status_info(TS_RESP *response) in TS_check_status_info() argument
590 TS_STATUS_INFO *info = TS_RESP_get_status_info(response); in TS_check_status_info()
/dragonfly/usr.sbin/ppp/
H A Dchap_ms.c116 ChallengeResponse(u_char *challenge, u_char *pwHash, u_char *response) in ChallengeResponse() argument
123 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); in ChallengeResponse()
124 DesEncrypt(challenge, ZPasswordHash + 7, response + 8); in ChallengeResponse()
125 DesEncrypt(challenge, ZPasswordHash + 14, response + 16); in ChallengeResponse()
384 u_char response[24]; in mschap_NT() local
386 ChallengeResponse(challenge, passwordHash, response); in mschap_NT()
387 memcpy(passwordHash, response, 24); in mschap_NT()
/dragonfly/lib/libc/locale/
H A Drpmatch.c35 rpmatch(const char *response) in rpmatch() argument
46 if (regexec(&yes, response, 0, NULL, 0) == 0) in rpmatch()
48 else if (regexec(&no, response, 0, NULL, 0) == 0) in rpmatch()
/dragonfly/sys/dev/virtual/virtio/scsi/
H A Dvirtio_scsi.h58 uint8_t response; /* Response values */ member
71 uint8_t response; member
83 uint8_t response; member
/dragonfly/sys/dev/drm/i915/
H A Dintel_sdvo.c586 &((u8 *)response)[i])) in intel_sdvo_read_response()
658 &response, sizeof(response))) in intel_sdvo_get_trained_inputs()
1794 uint16_t response; in intel_sdvo_detect() local
1804 &response, 2)) in intel_sdvo_detect()
1808 response & 0xff, response >> 8, in intel_sdvo_detect()
1811 if (response == 0) in intel_sdvo_detect()
1848 if (response & SDVO_TV_MASK) in intel_sdvo_detect()
1850 if (response & SDVO_LVDS_MASK) in intel_sdvo_detect()
2804 &response, 2)) in intel_sdvo_create_enhance_property_tv()
2838 &response, 2)) in intel_sdvo_create_enhance_property_tv()
[all …]
/dragonfly/contrib/wpa_supplicant/src/eap_common/
H A Dchap.c16 size_t challenge_len, u8 *response) in chap_md5() argument
27 return md5_vector(3, addr, len, response); in chap_md5()
/dragonfly/sys/dev/disk/iscsi/initiator/
H A Discsi_subr.c186 _scsi_done(struct isc_softc *isp, u_int response, u_int status, union ccb *ccb, pduq_t *pq) in _scsi_done() argument
192 if(status || response) { in _scsi_done()
193 debug(3, "response=%x status=%x ccb=%p pq=%p", response, status, ccb, pq); in _scsi_done()
198 switch(response) { in _scsi_done()
232 if((response >= 0x80) && (response <= 0xFF)) { in _scsi_done()
336 _scsi_done(sp->isc, cmd->response, cmd->status, opq->ccb, pq); in iscsi_done()
/dragonfly/contrib/wpa_supplicant/src/eap_server/
H A Deap_server_ttls.c620 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschap() argument
624 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschap()
655 challenge, response + 2 + 24); in eap_ttls_process_phase2_mschap()
660 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) { in eap_ttls_process_phase2_mschap()
684 response + 2 + 24, 24); in eap_ttls_process_phase2_mschap()
696 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschapv2() argument
702 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschapv2()
752 response[0] != chal[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]) { in eap_ttls_process_phase2_mschapv2()
761 peer_challenge = response + 2; in eap_ttls_process_phase2_mschapv2()
783 rx_resp = response + 2 + EAP_TTLS_MSCHAPV2_CHALLENGE_LEN + 8; in eap_ttls_process_phase2_mschapv2()
[all …]

1234567