/freebsd-10.0-release/usr.sbin/ctld/ |
H A D | login.c | 51 login_set_nsg(struct pdu *response, int nsg) argument 59 bhslr = (struct iscsi_bhs_login_response *)response->pdu_bhs; 76 login_set_csg(struct pdu *response, int csg) argument 84 bhslr = (struct iscsi_bhs_login_response *)response->pdu_bhs; 103 * without sending response ("A target receiving any PDU 156 struct pdu *response; local 164 response = pdu_new_response(request); 165 bhslr2 = (struct iscsi_bhs_login_response *)response->pdu_bhs; 167 login_set_csg(response, BHSLR_STAGE_SECURITY_NEGOTIATION); 175 return (response); 181 struct pdu *response; local 358 login_compute_md5(const char id, const char *secret, const void *challenge, size_t challenge_len, void *response, size_t response_len) argument 408 struct pdu *response; local 496 struct pdu *response; local 787 struct pdu *response; local 834 struct pdu *request, *response; local [all...] |
/freebsd-10.0-release/contrib/serf/auth/ |
H A D | auth.h | 46 serf_bucket_t *response, 69 serf_bucket_t *response, 85 serf_bucket_t *response, 99 serf_bucket_t *response, 115 serf_bucket_t *response,
|
/freebsd-10.0-release/sys/dev/iscsi/ |
H A D | iscsi.c | 142 static void iscsi_pdu_update_statsn(const struct icl_pdu *response); 143 static void iscsi_pdu_handle_nop_in(struct icl_pdu *response); 144 static void iscsi_pdu_handle_scsi_response(struct icl_pdu *response); 145 static void iscsi_pdu_handle_data_in(struct icl_pdu *response); 146 static void iscsi_pdu_handle_logout_response(struct icl_pdu *response); 147 static void iscsi_pdu_handle_r2t(struct icl_pdu *response); 148 static void iscsi_pdu_handle_async_message(struct icl_pdu *response); 149 static void iscsi_pdu_handle_reject(struct icl_pdu *response); 582 iscsi_pdu_update_statsn(const struct icl_pdu *response) argument 588 is = PDU_SESSION(response); 656 iscsi_receive_callback(struct icl_pdu *response) argument 727 iscsi_pdu_handle_nop_in(struct icl_pdu *response) argument 796 iscsi_pdu_handle_scsi_response(struct icl_pdu *response) argument 909 iscsi_pdu_handle_data_in(struct icl_pdu *response) argument 1010 iscsi_pdu_handle_logout_response(struct icl_pdu *response) argument 1018 iscsi_pdu_handle_r2t(struct icl_pdu *response) argument 1138 iscsi_pdu_handle_async_message(struct icl_pdu *response) argument 1170 iscsi_pdu_handle_reject(struct icl_pdu *response) argument [all...] |
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | kcm.c | 176 krb5_storage *response; local 187 response = krb5_storage_from_data(&response_data); 188 if (response == NULL) { 193 ret = krb5_ret_int32(response, &status); 195 krb5_storage_free(response); 201 krb5_storage_free(response); 208 *response_p = response; 213 krb5_storage_free(response); 256 krb5_storage *request, *response; local 271 ret = krb5_kcm_call(context, request, &response, 490 krb5_storage *request, *response; local 536 krb5_storage *request, *response; local 621 krb5_storage *request, *response; local 784 krb5_storage *request, *response; local 856 krb5_storage *request, *response; local 963 krb5_storage *request, *response; local 1069 krb5_storage *request, *response; local [all...] |
/freebsd-10.0-release/contrib/opie/libopie/ |
H A D | verify.c | 15 response parsing bug. 68 int opieverify FUNCTION((opie, response), struct opie *opie AND char *response) argument 75 if (!opie || !response) 95 if (c = strchr(response, ':')) { 99 for (r = rtrans; r->name && strcmp(r->name, response); r++); 109 if (opieetob(&key, response) == 1) { 114 if (i && opieatob8(&key, response)) {
|
H A D | generator.c | 18 challenge for extended response support and don't send 19 an init-hex response if extended response support isn't 23 bug in how init response was computed (i.e., dead wrong). 136 int opiegenerator FUNCTION((challenge, secret, response), char *challenge AND char *secret AND char *response) argument 191 strcpy(response, "init-hex:"); 192 strcat(response, opiebtoh(buf, &key)); 200 strcat(response, buf); 201 strcat(response, opiebto [all...] |
/freebsd-10.0-release/sys/ofed/include/rdma/ |
H A D | ib_user_verbs.h | 123 * length of the command block and response buffer if any in 32-bit 135 __u64 response; member in struct:ib_uverbs_get_context 145 __u64 response; member in struct:ib_uverbs_query_device 194 __u64 response; member in struct:ib_uverbs_query_port 225 __u64 response; member in struct:ib_uverbs_alloc_pd 238 __u64 response; member in struct:ib_uverbs_open_xrcd 253 __u64 response; member in struct:ib_uverbs_reg_mr 273 __u64 response; member in struct:ib_uverbs_create_comp_channel 281 __u64 response; member in struct:ib_uverbs_create_cq 296 __u64 response; member in struct:ib_uverbs_resize_cq 309 __u64 response; member in struct:ib_uverbs_poll_cq 347 __u64 response; member in struct:ib_uverbs_destroy_cq 416 __u64 response; member in struct:ib_uverbs_create_qp 435 __u64 response; member in struct:ib_uverbs_open_qp 476 __u64 response; member in struct:ib_uverbs_query_qp 550 __u64 response; member in struct:ib_uverbs_destroy_qp 613 __u64 response; member in struct:ib_uverbs_post_send 632 __u64 response; member in struct:ib_uverbs_post_recv 645 __u64 response; member in struct:ib_uverbs_post_srq_recv 658 __u64 response; member in struct:ib_uverbs_create_ah 729 __u64 response; member in struct:ib_uverbs_create_srq 739 __u64 response; member in struct:ib_uverbs_create_xsrq 768 __u64 response; member in struct:ib_uverbs_query_srq 782 __u64 response; member in struct:ib_uverbs_destroy_srq 792 __u64 response; member in struct:ib_uverbs_open_xrc_domain 803 __u64 response; member in struct:ib_uverbs_close_xrc_domain 810 __u64 response; member in struct:ib_uverbs_create_xrc_rcv_qp 861 __u64 response; member in struct:ib_uverbs_query_xrc_rcv_qp [all...] |
/freebsd-10.0-release/contrib/sendmail/src/ |
H A D | milter.c | 137 if (response == NULL || \ 138 strlen(response) + 1 != (size_t) rlen || \ 140 (response[0] != '4' && response[0] != '5') || \ 141 !isascii(response[1]) || !isdigit(response[1]) || \ 142 !isascii(response[2]) || !isdigit(response[2])) \ 144 if (response != NULL) \ 145 sm_free(response); /* XX 1975 char *response; local 2210 char *response = NULL; local 2378 char *response; local 2676 char *response = NULL; local 2766 char *response = NULL; local 3889 char *response; local 4025 char *response; local 4075 char *response; local 4176 char *response; local 4298 char *response = NULL; local [all...] |
/freebsd-10.0-release/crypto/openssh/ |
H A D | sshconnect1.c | 68 u_char response[16]; local 95 /* Wait for server's response. */ 116 if (!ssh_decrypt_challenge(auth, key, challenge, session_id, 1, response)) { 123 memset(response, 0, sizeof(response)); 126 debug("Sending response to RSA challenge."); 131 packet_put_char(response[i]); 135 /* Wait for response from the server. */ 147 packet_disconnect("Protocol error waiting RSA auth response: %d", 157 * Computes the proper response t 163 u_char buf[32], response[16]; local 391 char *challenge, *response; local [all...] |
H A D | auth2-chall.c | 188 * try challenge-response, set authctxt->postponed if we have to 189 * wait for the response. 289 char **response = NULL; local 306 response = xcalloc(nresp, sizeof(char *)); 308 response[i] = packet_get_string(NULL); 312 res = kbdintctxt->device->respond(kbdintctxt->ctxt, nresp, response); 315 memset(response[i], 'r', strlen(response[i])); 316 free(response[i]); 318 free(response); [all...] |
/freebsd-10.0-release/sys/dev/virtio/scsi/ |
H A D | virtio_scsi.h | 58 uint8_t response; /* Response values */ member in struct:virtio_scsi_cmd_resp 71 uint8_t response; member in struct:virtio_scsi_ctrl_tmf_resp 83 uint8_t response; member in struct:virtio_scsi_ctrl_an_resp
|
/freebsd-10.0-release/sys/teken/ |
H A D | teken_subr_compat.h | 122 const char response[] = "\x1B/Z"; 124 teken_funcs_respond(t, response, sizeof response - 1);
|
/freebsd-10.0-release/contrib/serf/ |
H A D | ssltunnel.c | 55 /* Create a barrier so the response doesn't eat us! */ 64 serf_bucket_t *response, 72 if (! response) { 79 status = serf_bucket_response_status(response, &sl); 89 status = serf_bucket_response_wait_for_headers(response); 94 /* RFC 2817: Any successful (2xx) response to a CONNECT request indicates 63 handle_response(serf_request_t *request, serf_bucket_t *response, void *handler_baton, apr_pool_t *pool) argument
|
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | ms_funcs.c | 142 * @response: 24-octet Response (OUT) 145 u8 *response) 148 des_encrypt(challenge, password_hash, response); 149 des_encrypt(challenge, password_hash + 7, response + 8); 153 des_encrypt(challenge, zpwd, response + 16); 165 * @response: 24-octet Response (OUT) 171 u8 *response) 181 challenge_response(challenge, password_hash, response); 193 * @response: 24-octet Response (OUT) 200 u8 *response) 144 challenge_response(const u8 *challenge, const u8 *password_hash, u8 *response) argument 168 generate_nt_response(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password, size_t password_len, u8 *response) argument 196 generate_nt_response_pwhash(const u8 *auth_challenge, const u8 *peer_challenge, const u8 *username, size_t username_len, const u8 *password_hash, u8 *response) argument 225 generate_authenticator_response_pwhash( const u8 *password_hash, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 284 generate_authenticator_response(const u8 *password, size_t password_len, const u8 *peer_challenge, const u8 *auth_challenge, const u8 *username, size_t username_len, const u8 *nt_response, u8 *response) argument 307 nt_challenge_response(const u8 *challenge, const u8 *password, size_t password_len, u8 *response) argument [all...] |
/freebsd-10.0-release/crypto/openssh/openbsd-compat/ |
H A D | getrrsetbyname.c | 193 struct dns_response *response = NULL; local 252 response = parse_dns_response(answer, length); 253 if (response == NULL) { 258 if (response->header.qdcount != 1) { 269 rrset->rri_rdclass = response->query->class; 270 rrset->rri_rdtype = response->query->type; 271 rrset->rri_ttl = response->answer->ttl; 272 rrset->rri_nrdatas = response->header.ancount; 276 if (response->header.ad == 1) 281 rrset->rri_name = strdup(response [all...] |
/freebsd-10.0-release/crypto/heimdal/kcm/ |
H A D | protocol.c | 58 krb5_storage *response) 77 krb5_storage *response) 97 ret = krb5_store_stringz(response, ccache->name); 120 krb5_storage *response) 132 ret = krb5_store_stringz(response, name); 151 krb5_storage *response) 217 krb5_storage *response) 250 krb5_storage *response) 308 krb5_storage *response) 374 ret = krb5_store_creds(response, cred 54 kcm_op_noop(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 73 kcm_op_get_name(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 116 kcm_op_gen_new(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 147 kcm_op_initialize(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 213 kcm_op_destroy(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 246 kcm_op_store(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 304 kcm_op_retrieve(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 395 kcm_op_get_principal(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 438 kcm_op_get_cred_uuid_list(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 484 kcm_op_get_cred_by_uuid(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 541 kcm_op_remove_cred(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 599 kcm_op_set_flags(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 646 kcm_op_chown(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 700 kcm_op_chmod(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 754 kcm_op_get_initial_ticket(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 846 kcm_op_get_ticket(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 929 kcm_op_move_cache(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 1013 kcm_op_get_cache_uuid_list(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 1025 kcm_op_get_cache_by_uuid(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 1063 kcm_op_get_default_cache(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 1116 kcm_op_set_default_cache(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 1155 kcm_op_get_kdc_offset(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 1186 kcm_op_set_kdc_offset(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 1269 kcm_op_add_ntlm_cred(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 1332 kcm_op_have_ntlm_cred(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 1376 kcm_op_del_ntlm_cred(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 1432 kcm_op_do_ntlm(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument 1669 kcm_op_get_ntlm_user_list(krb5_context context, kcm_client *client, kcm_operation opcode, krb5_storage *request, krb5_storage *response) argument [all...] |
/freebsd-10.0-release/usr.bin/talk/ |
H A D | look_up.c | 55 CTL_RESPONSE response; local 56 CTL_RESPONSE *rp = &response;
|
/freebsd-10.0-release/contrib/llvm/tools/lldb/source/Plugins/Process/gdb-remote/ |
H A D | GDBRemoteCommunicationClient.h | 53 StringExtractorGDBRemote &response, 59 StringExtractorGDBRemote &response, 66 StringExtractorGDBRemote &response); 103 /// Zero if the response was "OK", a positive value if the 104 /// the response was "Exx" where xx are two hex digits, or 106 /// response was received. 123 /// Zero if the response was "OK", a positive value if the 124 /// the response was "Exx" where xx are two hex digits, or 126 /// response was received. 139 /// @param[out] response [all...] |
/freebsd-10.0-release/contrib/ofed/libibverbs/include/infiniband/ |
H A D | kern-abi.h | 123 * length of the command block and response buffer if any in 32-bit 132 __u64 response; member in struct:ibv_query_params 143 __u64 response; member in struct:ibv_get_context 156 __u64 response; member in struct:ibv_query_device 208 __u64 response; member in struct:ibv_query_port 242 __u64 response; member in struct:ibv_alloc_pd 261 __u64 response; member in struct:ibv_reg_mr 287 __u64 response; member in struct:ibv_create_comp_channel 298 __u64 response; member in struct:ibv_create_cq 334 __u64 response; member in struct:ibv_poll_cq 357 __u64 response; member in struct:ibv_resize_cq 373 __u64 response; member in struct:ibv_destroy_cq 445 __u64 response; member in struct:ibv_create_qp 493 __u64 response; member in struct:ibv_query_qp 570 __u64 response; member in struct:ibv_destroy_qp 583 __u64 response; member in struct:ibv_create_xrc_rcv_qp 640 __u64 response; member in struct:ibv_query_xrc_rcv_qp 698 __u64 response; member in struct:ibv_post_send 720 __u64 response; member in struct:ibv_post_recv 736 __u64 response; member in struct:ibv_post_srq_recv 752 __u64 response; member in struct:ibv_create_ah 796 __u64 response; member in struct:ibv_create_srq 809 __u64 response; member in struct:ibv_create_xrc_srq 842 __u64 response; member in struct:ibv_query_srq 859 __u64 response; member in struct:ibv_destroy_srq 872 __u64 response; member in struct:ibv_open_xrc_domain 886 __u64 response; member in struct:ibv_close_xrc_domain 976 __u64 response; member in struct:ibv_get_context_v2 985 __u64 response; member in struct:ibv_create_cq_v2 [all...] |
/freebsd-10.0-release/contrib/openpam/lib/libpam/ |
H A D | openpam_ttyconv.c | 80 * Accept a response from the user on a tty 83 prompt_tty(int ifd, int ofd, const char *message, char *response, int echo) argument 174 response[pos] = '\0'; 179 response[pos++] = ch; 212 * Accept a response from the user on a non-tty stdin. 215 prompt_notty(const char *message, char *response) argument 271 response[pos] = '\0'; 275 response[pos++] = ch; 288 prompt(const char *message, char *response, int echo) argument 302 return (prompt_notty(message, response)); [all...] |
/freebsd-10.0-release/usr.bin/csup/ |
H A D | auth.c | 96 char shrdsecret[MD5_CHARS_MAX], response[MD5_CHARS_MAX]; local 115 response[0] = clichallenge[0] = '.'; 116 response[1] = clichallenge[1] = 0; 130 auth_makeresponse(challenge, shrdsecret, response); 134 client == NULL ? "." : client, response, clichallenge); 262 auth_makeresponse(char *challenge, char *sharedsecret, char *response) argument 272 auth_readablesum(md5sum, response); 313 auth_checkresponse(char *response, char *challenge, char *secret) argument 318 return (strcmp(response, correctresponse) == 0);
|
/freebsd-10.0-release/sys/cam/ctl/ |
H A D | ctl_frontend_iscsi.c | 328 cfiscsi_pdu_prepare(struct icl_pdu *response) argument 334 cs = PDU_SESSION(response); 339 * We're only using fields common for all the response 342 bhssr = (struct iscsi_bhs_scsi_response *)response->ip_bhs; 382 cfiscsi_pdu_queue(struct icl_pdu *response) argument 386 cs = PDU_SESSION(response); 389 cfiscsi_pdu_prepare(response); 390 icl_pdu_queue(response); 455 struct icl_pdu *response; local 485 response 596 struct icl_pdu *response; local 895 struct icl_pdu *response; local 1594 struct icl_pdu *response; local 1644 struct icl_pdu *response; local 2305 struct icl_pdu *request, *response; local 2453 struct icl_pdu *request, *response; local 2577 struct icl_pdu *request, *response; local 2654 struct icl_pdu *request, *response; local [all...] |
/freebsd-10.0-release/crypto/heimdal/appl/test/ |
H A D | http_client.c | 145 char *response; member in struct:http_req 156 req->response = NULL; 168 free(req->response); 240 req->response = emalloc(p - in_buf + 1); 241 memcpy(req->response, in_buf, p - in_buf); 242 req->response[p - in_buf] = '\0'; 276 printf("response: %s\n", req->response); 345 if (strstr(req.response, " 200 ") != NULL) { 348 } else if (strstr(req.response, " 40 [all...] |
/freebsd-10.0-release/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | creds.c | 101 krb5_storage *request, *response; local 125 ret = krb5_kcm_call(context, request, &response, &response_data); 130 krb5_storage_free(response);
|
/freebsd-10.0-release/contrib/unbound/iterator/ |
H A D | iterator.c | 2 * iterator/iterator.c - iterative resolver DNS query response module 145 /* If transitioning to a "response" state, make sure that there is a 146 * response */ 148 if(iq->response == NULL) { 149 log_err("transitioning to response state sans " 150 "response."); 163 * The response is stored in the qstate->buf buffer. 231 verbose(VERB_QUERY, "return error response %s", 262 verbose(VERB_ALGO, "store error response in message cache"); 385 * Given a CNAME response (define [all...] |