/freebsd-10.0-release/sys/ofed/drivers/infiniband/core/ |
H A D | ucm.c | 436 if (copy_to_user((void __user *)(unsigned long)cmd.response, 508 if (copy_to_user((void __user *)(unsigned long)cmd.response, 562 if (copy_to_user((void __user *)(unsigned long)cmd.response, 594 if (copy_to_user((void __user *)(unsigned long)cmd.response, 631 if (copy_to_user((void __user *)(unsigned long)cmd.response,
|
/freebsd-10.0-release/sbin/camcontrol/ |
H A D | camcontrol.c | 2083 /* check for invalid (all zero) response */ 2085 warnx("Invalid identify response detected"); 6425 warnx("invalid number of response bytes %d", 6445 warn("can't malloc memory for SMP response"); 6511 warnx("%s: need both the request (-r) and response (-R) " 6594 struct smp_report_general_response *response = NULL; local 6630 response = malloc(sizeof(*response)); 6631 if (response == NULL) { 6633 sizeof(*response)); 6732 struct smp_phy_control_response *response = NULL; local 6998 struct smp_report_manuf_info_response response; local [all...] |
/freebsd-10.0-release/crypto/openssh/ |
H A D | sshconnect2.c | 1584 char *name, *inst, *lang, *prompt, *response; local 1608 * Begin to build info response packet based on prompts requested. 1611 * be sure and clean this up and send a correct error response. 1621 response = read_passphrase(prompt, echo ? RP_ECHO : 0); 1623 packet_put_cstring(response); 1624 memset(response, 0, strlen(response)); 1625 free(response);
|
H A D | authfd.c | 144 * Wait for response from the agent. First read the length of the 145 * response packet. 148 error("Error reading response length from authentication socket."); 155 fatal("Authentication response too long: %u", len); 157 /* Read the rest of the response in to the buffer. */ 164 error("Error reading response from authentication socket."); 295 /* Get the number of entries in the response and check it for sanity. */ 358 * response from the agent. Returns true (non-zero) if the agent gave the 360 * response desired, with 0 corresponding to protocol version 1.0 (no longer 369 u_char response[1 365 ssh_decrypt_challenge(AuthenticationConnection *auth, Key* key, BIGNUM *challenge, u_char session_id[16], u_int response_type, u_char response[16]) argument [all...] |
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_ra_serf/ |
H A D | update.c | 85 /* While we process the REPORT response, we will queue up GET and PROPFIND 175 * This structure is created as we parse the REPORT response and 272 /* Have we read our response headers yet? */ 275 /* This flag is set when our response is aborted before we reach the 302 * The master structure for a REPORT request and response. 327 /* Is the server sending everything in one response? */ 380 /* Are we done parsing the REPORT response? */ 389 /* The XML parser context for the REPORT response. */ 512 /* Skip the first connection if the REPORT response hasn't been completely 926 serf_bucket_t *response, 919 cancel_fetch(serf_request_t *request, serf_bucket_t *response, int status_code, void *baton) argument 1081 handle_fetch(serf_request_t *request, serf_bucket_t *response, void *handler_baton, apr_pool_t *pool) argument 1259 handle_stream(serf_request_t *request, serf_bucket_t *response, void *handler_baton, apr_pool_t *pool) argument [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/ts/ |
H A D | ts.h | 465 /* Declarations related to response generation, defined in ts/ts_resp_sign.c. */ 467 /* Optional flags for response generation. */ 469 /* Don't include the TSA name in response. */ 472 /* Set ordering to true in response. */ 496 * status info/failure info of the response). 525 /* These members are used only while creating the response. */ 527 TS_RESP *response; member in struct:TS_resp_ctx 534 /* Creates a response context that can be used for generating responses. */ 547 /* No additional certs are included in the response by default. */ 607 * Declarations related to response verificatio [all...] |
/freebsd-10.0-release/sys/dev/hyperv/vmbus/ |
H A D | hv_channel.c | 188 if (open_info->response.open_result.status == 0) { 194 new_channel, open_info->response.open_result.status); 488 * Received a torndown response
|
H A D | hv_vmbus_priv.h | 124 * Synchronize the request/response if 130 hv_vmbus_channel_msg_response response; member in struct:hv_vmbus_channel_msg_info
|
/freebsd-10.0-release/sys/dev/isp/ |
H A D | DriverManual.txt | 141 via mailbox commands, circular request and response queues in system 164 and saves the QLogic HBA from having to write a response queue entry). 168 interrupt notification that the response queue has an entry to 229 + First level interrupt handling (response retrieval) (isp_intr) 247 request/response queues and fibre channel scratch area, set up and tear 409 The external target mode handler then turns around forms up a response 410 to this 'response' that just arrived which is then placed on the Request 414 requested command, so the QLogic firmware will rewrite the response 415 to the initial 'response' again onto the Response Queue, whereupon the
|
/freebsd-10.0-release/sys/dev/iscsi_initiator/ |
H A D | iscsi.h | 146 u_char response; member in struct:scsi_rsp
|
/freebsd-10.0-release/sys/dev/ata/chipsets/ |
H A D | ata-marvell.c | 326 /* response queue base high */ 330 /* response queue in ptr */ 333 /* response queue out ptr */ 512 struct ata_marvell_response *response; local 519 /* get response ptr's */ 527 response = (struct ata_marvell_response *) 531 request->status = response->dev_status; 534 /* ack response */
|
/freebsd-10.0-release/usr.sbin/lpr/lpd/ |
H A D | printjob.c | 146 static char response(const struct printer *_pp); 1151 (resp = response(pp)) < 0 || resp == '\1') { 1191 if (write(pfd, "", 1) != 1 || response(pp)) { 1435 response(const struct printer *pp) function 1938 && (resp = response(pp)) == 0)
|
/freebsd-10.0-release/crypto/heimdal/lib/hx509/ |
H A D | revoke.c | 303 ret = decode_OCSPBasicOCSPResponse(resp.responseBytes->response.data, 304 resp.responseBytes->response.length, 311 if (size != resp.responseBytes->response.length) { 347 "Failed to parse OCSP response"); 1207 "Failed to parse OCSP response"); 1270 "Certificate %s not in OCSP response "
|
/freebsd-10.0-release/usr.sbin/ppp/ |
H A D | radius.c | 113 u_char response[24]; member in struct:mschap2_response 303 log_Printf(LogRADIUS, "Radius(%s): Accounting response received\n", 459 "Malformed attribute in response"); 542 * peer has misformatted the response. 570 * peer has misformatted the response. 1004 memcpy(msresp2.response, keyv2->NTResponse, sizeof msresp2.response);
|
/freebsd-10.0-release/contrib/ntp/sntp/ |
H A D | main.c | 6 supports the full SNTP (RFC 2030) client- and server-side challenge-response 164 #define NTP_PASSIVE 2 /* NTP symmetric passive response */ 166 #define NTP_SERVER 4 /* NTP server response */ 434 int response = 0, failed, length, i, k; local 460 response = 1; 486 if (response && 501 "%s: unsynch NTP response on socket %d\n", 506 /* If it is a response, check that it corresponds to one of our requests and 509 if (response) { 519 "%s: bad response fro [all...] |
/freebsd-10.0-release/contrib/serf/ |
H A D | serf.h | 64 /* This code is for when this is the last response on this connection: 81 /* This code is for when a response received from a http server is not in 112 /* This macro groups errors potentially raised when reading a http response. */ 180 * the associated response handlers and their buckets. 200 * the associated response handlers and their buckets. This function will 283 * ### response bucket stack. 287 * Accept an incoming response for @a request, and its @a socket. A bucket 288 * for the response should be constructed and returned. This is the control 290 * enable processing of the incoming response. 296 * that need to live for the duration of the response [all...] |
/freebsd-10.0-release/sys/dev/isci/scil/ |
H A D | intel_sas.h | 661 * @brief This structure depicts the discover response where the 693 * @brief This structure defines the SMP phy discover response format. 910 * @brief This structure simply unionizes the existing response 911 * structures into a common response type. 917 SMP_RESPONSE_BODY_T response; member in struct:_SMP_RESPONSE
|
/freebsd-10.0-release/sys/dev/sound/pci/hda/ |
H A D | hdac.c | 830 /* Enable Overrun and response received reporting */ 902 resp = rirb->response; 910 "response from address %d: %08x\n", cad, resp); 912 sc->codecs[cad].response = resp; 960 sc->codecs[cad].response = HDA_INVALID; 990 return (sc->codecs[cad].response);
|
/freebsd-10.0-release/contrib/ofed/libibcm/src/ |
H A D | cm.c | 98 cmd->response = (uintptr_t)resp;\ 857 cmd->response = (uintptr_t) resp;
|
/freebsd-10.0-release/sys/cam/ |
H A D | README.quirks | 140 response. INQUIRY is one of the most basic commands but some 143 response for devices that can't handle INQUIRY. 147 response (check condition) without sending the command to the
|
/freebsd-10.0-release/sys/dev/mpt/ |
H A D | mpt_cam.c | 2228 uint8_t response; local 2255 response = mpt->tmf_req->ResponseCode; 2272 if (response != MPI_SCSITASKMGMT_RSP_TM_SUCCEEDED && 2273 response != MPI_SCSITASKMGMT_RSP_TM_COMPLETE) { 2275 "Resetting controller.\n", response); 2725 * We are going to reuse the ELS request to send this response back. 2742 * it's correct place in the response. 2821 * If the function of a link service response, we recycle the 2822 * response to be a refresh for a new link service request. 2891 mpt_lprt(mpt, MPT_PRT_ALWAYS, "ELS_REPLY: response unneede 4069 uint8_t response; local [all...] |
/freebsd-10.0-release/sys/dev/aic7xxx/ |
H A D | aic7xxx.c | 1250 * that the busfree was in response to one of 1741 * is lower. Only lower the response period 2803 * If this message illicited a response, 2811 printf("Asserting ATN for response\n"); 2967 * If this message illicited a response, transition 2974 printf(" preparing response.\n"); 3087 int response; local 3091 response = FALSE; 3121 response = ahc_handle_msg_reject(ahc, devinfo); 3206 response 3516 int response = 0; local [all...] |
/freebsd-10.0-release/contrib/llvm/tools/lldb/source/Interpreter/ |
H A D | CommandInterpreter.cpp | 2160 bool response = default_answer; local 2171 &response, // baton 2182 return response;
|
/freebsd-10.0-release/crypto/openssl/crypto/ocsp/ |
H A D | ocsp.h | 178 * response OCTET STRING } 183 ASN1_OCTET_STRING *response; member in struct:ocsp_resp_bytes_st
|
/freebsd-10.0-release/sys/dev/qlxgb/ |
H A D | qla_hw.h | 424 uint8_t response; member in struct:_qla_fw_cds_hdr
|