/freebsd-10.0-release/libexec/pppoed/ |
H A D | pppoed.c | 149 perror("Cannot get netgraph response"); 501 unsigned char response[1024]; local 652 switch (sz = NgRecvData(ds, response, sizeof response, rhook)) { 665 sprintf(ptr, "%02x", (u_char)response[f]); 674 Spawn(prog, acname, provider, exec, ngc, cs, ds, response, sz, optd);
|
/freebsd-10.0-release/sys/ofed/drivers/infiniband/core/ |
H A D | ucma.c | 337 if (copy_to_user((void __user *)(unsigned long)cmd.response, 382 if (copy_to_user((void __user *)(unsigned long)cmd.response, 490 if (copy_to_user((void __user *)(unsigned long)cmd.response, 670 if (copy_to_user((void __user *)(unsigned long)cmd.response, 829 if (copy_to_user((void __user *)(unsigned long)cmd.response, 1011 if (copy_to_user((void __user *)(unsigned long)cmd.response, 1078 if (copy_to_user((void __user *)(unsigned long)cmd.response, 1146 goto response; 1164 response: 1165 if (copy_to_user((void __user *)(unsigned long)cmd.response, [all...] |
H A D | mad.c | 531 * Canceling all sends results in dropping received response 705 * a request or the ending LID routed part of a response is empty. 735 printk(KERN_ERR PFX "No memory for local response MAD\n"); 1124 /* Reference for work request to QP + response */ 1733 /* is request/response. */ 1783 * It's possible to receive the response before we've 1842 /* Defined behavior is to complete response before request */ 1864 struct ib_mad_private *recv, *response = NULL; local 1896 response = kmem_cache_alloc(ib_mad_cache, GFP_KERNEL); 1897 if (!response) { [all...] |
/freebsd-10.0-release/sys/dev/virtio/scsi/ |
H A D | virtio_scsi.c | 979 /* At least one segment must be left for the response. */ 1038 cmd_resp->response = -1; 1095 uint8_t response; local 1098 response = tmf_resp->response; 1101 vtscsi_dprintf(sc, VTSCSI_TRACE, "req=%p to_req=%p response=%d\n", 1102 req, to_req, response); 1114 if (response == VIRTIO_SCSI_S_FUNCTION_COMPLETE) 1160 tmf_resp->response = -1; 1223 switch (cmd_resp->response) { [all...] |
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_ra_serf/ |
H A D | ra_serf.h | 221 * response headers, it has sent all of them. Specifically, we'll 231 /* Opaque URL "stubs". If the OPTIONS response returns these, then 250 update-report response. If svn_tristate_false, request a skelta 391 /* Callback for response handlers */ 394 serf_bucket_t *response, 413 /* Callback for when a response has an error. */ 416 serf_bucket_t *response, 442 /* Has the request/response been completed? */ 454 based on the response header. HANDLER_POOL must be non-NULL for these 496 portion of the response bod [all...] |
H A D | options.c | 83 { INITIAL, D_, "options-response", OPTIONS, 336 the expat-based response handler -- it just notices OPTIONS response 341 serf_bucket_t *response, 350 serf_bucket_t *hdrs = serf_bucket_response_get_headers(response); 383 /* Execute the 'real' response handler to XML-parse the response body. */ 384 return opt_ctx->inner_handler(request, response, opt_ctx->inner_baton, pool); 496 /* If our caller cares about server redirections, and our response 498 it's most likely just a complaint about the response bod 338 options_response_handler(serf_request_t *request, serf_bucket_t *response, void *baton, apr_pool_t *pool) argument [all...] |
H A D | locks.c | 94 { MULTISTATUS, D_, "response", RESPONSE, 249 serf_bucket_t *response, 264 request, response, ctx->handler, pool)); 272 headers = serf_bucket_response_get_headers(response); 290 return ctx->inner_handler(request, response, ctx->inner_baton, pool); 245 handle_lock(serf_request_t *request, serf_bucket_t *response, void *handler_baton, apr_pool_t *pool) argument
|
/freebsd-10.0-release/sys/netgraph/ |
H A D | ng_ksocket.c | 801 /* Send it back in a response */ 828 /* Get response with room for option value */ 834 /* Get socket option, and put value in the response */ 1045 struct ng_mesg *response; local 1061 NG_MKMESSAGE(response, NGM_KSOCKET_COOKIE, 1063 if (response != NULL) { 1064 response->header.flags |= NGF_RESP; 1065 response->header.token = priv->response_token; 1066 *(int32_t *)response->data = error; 1068 * send an async "response" messag [all...] |
/freebsd-10.0-release/sys/dev/isci/scil/ |
H A D | scic_sds_smp_request.c | 112 * This macro returns the address of the smp response buffer in the smp request 493 //SMP response comes as UF, so no need to set response IU address. 504 * waiting for a response frame. It will copy the response data, release 511 * index that should contain the response. 513 * @return This method returns an indication of whether the response 516 * successful processing of the TC response. 579 if (this_smp_response->response.discover.protocols.u.bits.attached_sata_device 580 && !this_smp_response->response [all...] |
H A D | scif_sas_smp_remote_device.c | 163 * @brief This method decodes a smp response to this smp device and then 166 * @param[in] fw_device The framework device that a SMP response targets to. 167 * @param[in] fw_request The pointer to an smp request whose response 169 * @param[in] response_data The response data passed in. 196 //retry the IO without even decode the response. 211 //interpret REPORT GENERAL response. 232 //decode discover response 240 //decode discover response as a polling result for a remote device 250 //decode discover response 263 //decode the report phy sata response [all...] |
/freebsd-10.0-release/contrib/llvm/tools/lldb/source/Plugins/Process/gdb-remote/ |
H A D | GDBRemoteCommunication.h | 235 WaitForPacketWithTimeoutMicroSecondsNoLock (StringExtractorGDBRemote &response,
|
H A D | GDBRemoteRegisterContext.h | 256 PrivateSetRegisterValue (uint32_t reg, StringExtractor &response);
|
H A D | ProcessGDBRemote.h | 292 SetLastStopPacket (const StringExtractorGDBRemote &response);
|
/freebsd-10.0-release/sys/dev/acpi_support/ |
H A D | acpi_asus_wmi.c | 573 ACPI_BUFFER response = { ACPI_ALLOCATE_BUFFER, NULL }; local 575 ACPI_WMI_GET_EVENT_DATA(sc->wmi_dev, notify, &response); 576 obj = (ACPI_OBJECT*) response.Pointer; 607 acpi_asus_wmi_free_buffer(&response);
|
H A D | acpi_hp.c | 808 ACPI_BUFFER response = { ACPI_ALLOCATE_BUFFER, NULL }; local 810 ACPI_WMI_GET_EVENT_DATA(sc->wmi_dev, notify, &response); 811 obj = (ACPI_OBJECT*) response.Pointer; 817 acpi_hp_free_buffer(&response);
|
/freebsd-10.0-release/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_asn.c | 106 ASN1_SIMPLE(OCSP_RESPBYTES, response, ASN1_OCTET_STRING)
|
H A D | ocsp_cl.c | 75 * relevant information from the response. 185 /* Get response status */ 192 /* Extract basic response from OCSP_RESPONSE or NULL if 193 * no basic response present. 212 return ASN1_item_unpack(rb->response, ASN1_ITEM_rptr(OCSP_BASICRESP)); 216 * a basic response. 225 /* Extract an OCSP_SINGLERESP response with a given index */ 233 /* Look single response matching a given certificate ID */
|
H A D | ocsp_prn.c | 205 BIO_puts(bp," (unknown response type)\n"); 209 i = ASN1_STRING_length(rb->response);
|
H A D | ocsp_srv.c | 105 /* Create an OCSP response and encode an optional basic response */ 115 if (!ASN1_item_pack(bs, ASN1_ITEM_rptr(OCSP_BASICRESP), &rsp->responseBytes->response))
|
/freebsd-10.0-release/lib/libtacplus/ |
H A D | taclib.c | 439 * Verify that we are exactly at the end of the response message. 447 len = ntohl(h->response.length); 450 generr(h, "Invalid length field in response " 451 "from server: end expected at %u, response length %u", 462 if (h->srvr_pos + len > ntohl(h->response.length)) { 463 generr(h, "Invalid length field in %s response from server " 465 (u_long)ntohl(h->response.length)); 468 ss->data = len != 0 ? h->response.u.body + h->srvr_pos : NULL; 542 * Receive a response from the server and decrypt it. Returns 0 on 552 msg = &h->response; [all...] |
/freebsd-10.0-release/crypto/openssh/ |
H A D | monitor.c | 936 char *response; local 942 response = buffer_get_string(m, NULL); 944 auth_userresponse(authctxt->as, response, 0); 946 debug3("%s: <%s> = <%d>", __func__, response, authok); 947 free(response); 990 char *response; local 993 response = buffer_get_string(m, NULL); 998 skey_passcheck(authctxt->pw->pw_name, response) != -1); 1000 free(response); 1673 u_char *blob, *response; local [all...] |
/freebsd-10.0-release/contrib/tnftp/src/ |
H A D | fetch.c | 141 * Generate authorization response based on given authentication challenge. 143 * Sets response to a malloc(3)ed string; caller should free. 146 auth_url(const char *challenge, char **response, const char *guser, argument 156 *response = NULL; 222 *response = (char *)ftp_malloc(rlen); 223 (void)strlcpy(*response, scheme, rlen); 224 len = strlcat(*response, " ", rlen); 227 (unsigned char *)*response + len); 842 /* Read the response */ 854 /* Determine HTTP response cod [all...] |
/freebsd-10.0-release/contrib/tcpdump/ |
H A D | print-smb.c | 1093 int name_trn_id, response, opcode, nm_flags, rcode; local 1101 response = (data[2] >> 7); 1130 if (response) { 1137 if (response)
|
/freebsd-10.0-release/sys/dev/hyperv/vmbus/ |
H A D | hv_connection.c | 152 * response before returning from this routine 178 * Wait for the connection response 192 if (msg_info->response.version_response.version_supported) {
|
/freebsd-10.0-release/usr.sbin/ctld/ |
H A D | ctld.h | 256 void pdu_send(struct pdu *response);
|