/dragonfly/contrib/wpa_supplicant/src/common/ |
H A D | gas_server.c | 61 response, MAC2STR(response->dst), response->dialog_token, in gas_server_response_timeout() 62 response->freq, response->frag_id, in gas_server_response_timeout() 65 response->handler->status_cb(response->handler->ctx, in gas_server_response_timeout() 75 if (!response) in gas_server_free_response() 80 os_free(response); in gas_server_free_response() 99 response = os_zalloc(sizeof(*response)); in gas_server_send_resp() 100 if (!response) { in gas_server_send_resp() 247 remaining = wpabuf_len(response->resp) - response->offset; in gas_server_handle_rx_comeback_req() 282 gas->tx(gas->ctx, response->freq, response->dst, resp, in gas_server_handle_rx_comeback_req() 362 if (ack && response->offset < wpabuf_len(response->resp)) { in gas_server_handle_tx_status() [all …]
|
/dragonfly/contrib/lvm2/dist/daemons/clvmd/ |
H A D | refresh_clvmd.c | 41 char *response; member 233 if (!*response) { in _cluster_request() 239 rarray = *response; in _cluster_request() 257 free(*response); in _cluster_request() 269 *response = rarray; in _cluster_request() 284 dm_free(response[i].response); in _cluster_free_request() 287 dm_free(response); in _cluster_free_request() 313 response[i].response[0] ? in refresh_clvmd() 314 response[i].response : in refresh_clvmd() 356 response[i].response[0] ? in debug_clvmd() [all …]
|
/dragonfly/contrib/lvm2/dist/lib/locking/ |
H A D | cluster_locking.c | 46 char *response; member 245 if (!*response) { in _cluster_request() 269 free(*response); in _cluster_request() 296 dm_free(response[i].response); in _cluster_free_request() 363 response[i].response[0] ? in _lock_for_cluster() 364 response[i].response : in _lock_for_cluster() 468 if (!response) in decode_lock_type() 507 if (!response[i].response[0]) in _query_resource() 516 if (decode_lock_type(response[i].response) > *mode) in _query_resource() 517 *mode = decode_lock_type(response[i].response); in _query_resource() [all …]
|
/dragonfly/contrib/cvs-1.12/lib/ |
H A D | rpmatch.c | 34 try (const char *response, const char *pattern, const int match, in try() argument 53 return regexec (re, response, 0, NULL, 0) == 0 ? match : nomatch; in try() 59 rpmatch (const char *response) in rpmatch() argument 70 return ((result = try (response, _("^[yY]"), 1, 0, in rpmatch() 73 : try (response, _("^[nN]"), 0, -1, &noexpr, &nore)); in rpmatch() 76 return (*response == 'y' || *response == 'Y' ? 1 in rpmatch() 77 : *response == 'n' || *response == 'N' ? 0 : -1); in rpmatch()
|
H A D | yesno.c | 33 extern int rpmatch (char const *response); 38 char *response = NULL; in yesno() local 40 ssize_t response_len = getline (&response, &response_size, stdin); in yesno() 47 response[response_len - 1] = '\0'; in yesno() 48 yes = (0 < rpmatch (response)); in yesno() 51 free (response); in yesno()
|
/dragonfly/usr.bin/talk/ |
H A D | invite.c | 63 CTL_RESPONSE response; in invite_remote() local 105 ctl_transact(my_machine_addr, msg, DELETE, &response); in invite_remote() 107 ctl_transact(his_machine_addr, msg, DELETE, &response); in invite_remote() 148 CTL_RESPONSE response; in announce_invite() local 151 ctl_transact(his_machine_addr, msg, ANNOUNCE, &response); in announce_invite() 152 remote_id = response.id_num; in announce_invite() 153 if (response.answer != SUCCESS) { in announce_invite() 154 if (response.answer < NANSWERS) in announce_invite() 155 message(answers[response.answer]); in announce_invite() 160 ctl_transact(my_machine_addr, msg, LEAVE_INVITE, &response); in announce_invite() [all …]
|
H A D | look_up.c | 48 CTL_RESPONSE response; in check_local() local 49 CTL_RESPONSE *rp = &response; in check_local()
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | ms_funcs.c | 146 u8 *response) in challenge_response() argument 156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response() 174 u8 *response) in generate_nt_response() argument 202 u8 *response) in generate_nt_response_pwhash() argument 231 const u8 *nt_response, u8 *response) in generate_authenticator_response_pwhash() argument 257 addr2[0] = response; in generate_authenticator_response_pwhash() 262 sha1_vector(3, addr1, len1, response) || in generate_authenticator_response_pwhash() 266 return sha1_vector(3, addr2, len2, response); in generate_authenticator_response_pwhash() 287 const u8 *nt_response, u8 *response) in generate_authenticator_response() argument 294 username, username_len, nt_response, response); in generate_authenticator_response() [all …]
|
H A D | ms_funcs.h | 15 u8 *response); 20 u8 *response); 25 const u8 *nt_response, u8 *response); 30 const u8 *nt_response, u8 *response); 32 size_t password_len, u8 *response); 35 u8 *response);
|
/dragonfly/libexec/talkd/ |
H A D | talkd.c | 58 CTL_RESPONSE response; variable 104 process_request(mp, &response); in main() 107 cc = sendto(sockt, (char *)&response, in main() 108 sizeof (response), 0, (struct sockaddr *)&mp->ctl_addr, in main() 110 if (cc != sizeof (response)) in main()
|
/dragonfly/contrib/openpam/lib/libpam/ |
H A D | openpam_ttyconv.c | 84 prompt_tty(int ifd, int ofd, const char *message, char *response, int echo) in prompt_tty() argument 175 response[pos] = '\0'; in prompt_tty() 180 response[pos++] = ch; in prompt_tty() 216 prompt_notty(const char *message, char *response) in prompt_notty() argument 272 response[pos] = '\0'; in prompt_notty() 276 response[pos++] = ch; in prompt_notty() 289 prompt(const char *message, char *response, int echo) in prompt() argument 303 return (prompt_notty(message, response)); in prompt() 306 ret = prompt_tty(ifd, ofd, message, response, echo); in prompt()
|
/dragonfly/crypto/libressl/apps/openssl/ |
H A D | ts.c | 777 TS_RESP *response = NULL; in reply_command() local 793 response = read_PKCS7(in_bio); in reply_command() 801 if (response != NULL) in reply_command() 806 if (response == NULL) in reply_command() 845 TS_RESP_free(response); in reply_command() 900 TS_RESP *response = NULL; in create_response() local 970 TS_RESP_free(response); in create_response() 971 response = NULL; in create_response() 976 return response; in create_response() 1072 TS_RESP *response = NULL; in verify_command() local [all …]
|
/dragonfly/crypto/openssh/ |
H A D | auth2-chall.c | 298 char **response = NULL; in input_userauth_info_response() local 316 response = xcalloc(nresp, sizeof(char *)); in input_userauth_info_response() 318 if ((r = sshpkt_get_cstring(ssh, &response[i], NULL)) != 0) in input_userauth_info_response() 325 res = kbdintctxt->device->respond(kbdintctxt->ctxt, nresp, response); in input_userauth_info_response() 328 explicit_bzero(response[i], strlen(response[i])); in input_userauth_info_response() 329 free(response[i]); in input_userauth_info_response() 331 free(response); in input_userauth_info_response()
|
/dragonfly/usr.sbin/nscd/ |
H A D | mp_rs_query.c | 68 finalize_comm_element(&qstate->response); in on_mp_read_session_destroy() 170 init_comm_element(&qstate->response, CET_MP_READ_SESSION_RESPONSE); in on_mp_read_session_request_process() 172 &qstate->response); in on_mp_read_session_request_process() 332 &qstate->response); in on_mp_read_session_response_write1() 417 init_comm_element(&qstate->response, CET_MP_READ_SESSION_READ_RESPONSE); in on_mp_read_session_read_request_process() 419 &qstate->response); in on_mp_read_session_read_request_process() 455 &qstate->response); in on_mp_read_session_read_response_write1() 495 &qstate->response); in on_mp_read_session_read_response_write2() 506 finalize_comm_element(&qstate->response); in on_mp_read_session_read_response_write2()
|
H A D | mp_ws_query.c | 70 finalize_comm_element(&qstate->response); in on_mp_write_session_destroy() 169 init_comm_element(&qstate->response, CET_MP_WRITE_SESSION_RESPONSE); in on_mp_write_session_request_process() 171 &qstate->response); in on_mp_write_session_request_process() 264 &qstate->response); in on_mp_write_session_response_write1() 417 init_comm_element(&qstate->response, in on_mp_write_session_write_request_process() 420 &qstate->response); in on_mp_write_session_write_request_process() 447 &qstate->response); in on_mp_write_session_write_response_write1() 459 finalize_comm_element(&qstate->response); in on_mp_write_session_write_response_write1()
|
H A D | query.c | 289 finalize_comm_element(&qstate->response); in on_query_destroy() 401 init_comm_element(&qstate->response, CET_WRITE_RESPONSE); in on_write_request_process() 474 init_comm_element(&qstate->response, CET_WRITE_RESPONSE); in on_negative_write_request_process() 562 finalize_comm_element(&qstate->response); in on_write_response_write1() 667 init_comm_element(&qstate->response, CET_READ_RESPONSE); in on_read_request_process() 668 read_response = get_cache_read_response(&qstate->response); in on_read_request_process() 830 read_response = get_cache_read_response(&qstate->response); in on_read_response_write1() 866 read_response = get_cache_read_response(&qstate->response); in on_read_response_write2() 877 finalize_comm_element(&qstate->response); in on_read_response_write2() 1076 finalize_comm_element(&qstate->response); in on_transform_response_write1() [all …]
|
/dragonfly/crypto/libressl/crypto/ts/ |
H A D | ts_rsp_sign.c | 360 if (!TS_RESP_set_status_info(ctx->response, si)) in TS_RESP_CTX_set_status_info() 427 TS_RESP *response; in TS_RESP_create_response() local 433 if (!(ctx->response = TS_RESP_new())) { in TS_RESP_create_response() 477 if (ctx->response != NULL) { in TS_RESP_create_response() 481 TS_RESP_free(ctx->response); in TS_RESP_create_response() 482 ctx->response = NULL; in TS_RESP_create_response() 486 response = ctx->response; in TS_RESP_create_response() 489 return response; in TS_RESP_create_response() 497 ctx->response = NULL; in TS_RESP_CTX_init() 507 TS_RESP_free(ctx->response); in TS_RESP_CTX_cleanup() [all …]
|
H A D | ts_rsp_verify.c | 83 static int TS_check_status_info(TS_RESP *response); 469 TS_RESP_verify_response(TS_VERIFY_CTX *ctx, TS_RESP *response) in TS_RESP_verify_response() argument 471 PKCS7 *token = TS_RESP_get_token(response); in TS_RESP_verify_response() 472 TS_TST_INFO *tst_info = TS_RESP_get_tst_info(response); in TS_RESP_verify_response() 476 if (!TS_check_status_info(response)) in TS_RESP_verify_response() 588 TS_check_status_info(TS_RESP *response) in TS_check_status_info() argument 590 TS_STATUS_INFO *info = TS_RESP_get_status_info(response); in TS_check_status_info()
|
/dragonfly/usr.sbin/ppp/ |
H A D | chap_ms.c | 116 ChallengeResponse(u_char *challenge, u_char *pwHash, u_char *response) in ChallengeResponse() argument 123 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); in ChallengeResponse() 124 DesEncrypt(challenge, ZPasswordHash + 7, response + 8); in ChallengeResponse() 125 DesEncrypt(challenge, ZPasswordHash + 14, response + 16); in ChallengeResponse() 384 u_char response[24]; in mschap_NT() local 386 ChallengeResponse(challenge, passwordHash, response); in mschap_NT() 387 memcpy(passwordHash, response, 24); in mschap_NT()
|
/dragonfly/lib/libc/locale/ |
H A D | rpmatch.c | 35 rpmatch(const char *response) in rpmatch() argument 46 if (regexec(&yes, response, 0, NULL, 0) == 0) in rpmatch() 48 else if (regexec(&no, response, 0, NULL, 0) == 0) in rpmatch()
|
/dragonfly/sys/dev/virtual/virtio/scsi/ |
H A D | virtio_scsi.h | 58 uint8_t response; /* Response values */ member 71 uint8_t response; member 83 uint8_t response; member
|
/dragonfly/sys/dev/drm/i915/ |
H A D | intel_sdvo.c | 586 &((u8 *)response)[i])) in intel_sdvo_read_response() 658 &response, sizeof(response))) in intel_sdvo_get_trained_inputs() 1794 uint16_t response; in intel_sdvo_detect() local 1804 &response, 2)) in intel_sdvo_detect() 1808 response & 0xff, response >> 8, in intel_sdvo_detect() 1811 if (response == 0) in intel_sdvo_detect() 1848 if (response & SDVO_TV_MASK) in intel_sdvo_detect() 1850 if (response & SDVO_LVDS_MASK) in intel_sdvo_detect() 2804 &response, 2)) in intel_sdvo_create_enhance_property_tv() 2838 &response, 2)) in intel_sdvo_create_enhance_property_tv() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/eap_common/ |
H A D | chap.c | 16 size_t challenge_len, u8 *response) in chap_md5() argument 27 return md5_vector(3, addr, len, response); in chap_md5()
|
/dragonfly/sys/dev/disk/iscsi/initiator/ |
H A D | iscsi_subr.c | 186 _scsi_done(struct isc_softc *isp, u_int response, u_int status, union ccb *ccb, pduq_t *pq) in _scsi_done() argument 192 if(status || response) { in _scsi_done() 193 debug(3, "response=%x status=%x ccb=%p pq=%p", response, status, ccb, pq); in _scsi_done() 198 switch(response) { in _scsi_done() 232 if((response >= 0x80) && (response <= 0xFF)) { in _scsi_done() 336 _scsi_done(sp->isc, cmd->response, cmd->status, opq->ccb, pq); in iscsi_done()
|
/dragonfly/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap_server_ttls.c | 620 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschap() argument 624 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschap() 655 challenge, response + 2 + 24); in eap_ttls_process_phase2_mschap() 660 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) { in eap_ttls_process_phase2_mschap() 684 response + 2 + 24, 24); in eap_ttls_process_phase2_mschap() 696 u8 *response, size_t response_len) in eap_ttls_process_phase2_mschapv2() argument 702 if (challenge == NULL || response == NULL || in eap_ttls_process_phase2_mschapv2() 752 response[0] != chal[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]) { in eap_ttls_process_phase2_mschapv2() 761 peer_challenge = response + 2; in eap_ttls_process_phase2_mschapv2() 783 rx_resp = response + 2 + EAP_TTLS_MSCHAPV2_CHALLENGE_LEN + 8; in eap_ttls_process_phase2_mschapv2() [all …]
|