/freebsd-10.0-release/sys/dev/hyperv/netvsc/ |
H A D | hv_rndis_filter.c | 54 static void hv_rf_receive_response(rndis_device *device, rndis_msg *response); 56 rndis_msg *response); 129 * for request/response packet types so we just use the set_request 203 * RNDIS filter receive response 206 hv_rf_receive_response(rndis_device *device, rndis_msg *response) argument 216 * All request/response message contains request_id as the 220 response->msg.init_complete.request_id) { 230 if (response->msg_len <= sizeof(rndis_msg)) { 231 memcpy(&request->response_msg, response, 232 response 252 hv_rf_receive_indicate_status(rndis_device *device, rndis_msg *response) argument [all...] |
/freebsd-10.0-release/sys/dev/drm2/i915/ |
H A D | intel_sdvo.c | 471 /* the following two are to read the response */ 500 intel_sdvo_read_response(struct intel_sdvo *intel_sdvo, void *response, argument 537 /* Read the command response */ 541 &((u8 *)response)[i])) 544 printf(" %02X", ((u8 *)response)[i]); 603 * This function is making an assumption about the layout of the response, 608 struct intel_sdvo_get_trained_inputs_response response; local 610 CTASSERT(sizeof(response) == 1); 612 &response, sizeof(response))) 1235 u8 response[2]; local 1354 uint16_t response; local 2319 uint16_t response, data_value[2]; local 2436 uint16_t response, data_value[2]; local 2449 uint16_t response; member in union:__anon8123 [all...] |
/freebsd-10.0-release/contrib/ipfilter/l4check/ |
H A D | l4check.c | 53 char *response = NULL; variable 249 if (!strncmp(response, l4->l4_rbuf, 251 printf("%d: Good response\n", 260 printf("%d: Bad response\n", 685 } else if (!strcasecmp(t, "response")) { 701 "response timeout %d\n", 704 if (response) { 706 "%d: response already set\n", 711 response = strdup(strtok(NULL, "")); 712 rlen = strlen(response); [all...] |
/freebsd-10.0-release/sys/cam/scsi/ |
H A D | smp_all.h | 127 * REPORT GENERAL request and response, current as of SPL Revision 7. 203 * REPORT MANUFACTURER INFORMATION request and response, current as of SPL 240 * DISCOVER request and response, current as of SPL Revision 7. 396 * PHY CONTROL request and response. Current as of SPL Revision 7. 486 void smp_report_general_sbuf(struct smp_report_general_response *response, 489 void smp_report_manuf_info_sbuf(struct smp_report_manuf_info_response *response, 495 int request_len, uint8_t *response, int response_len, 501 uint8_t *response, int response_len, int long_response, 507 int request_len, uint8_t *response, int response_len, 513 uint8_t *response, in [all...] |
/freebsd-10.0-release/contrib/llvm/tools/lldb/source/Plugins/Process/gdb-remote/ |
H A D | ThreadGDBRemote.cpp | 193 ThreadGDBRemote::PrivateSetRegisterValue (uint32_t reg, StringExtractor &response) argument 197 return gdb_reg_ctx->PrivateSetRegisterValue (reg, response);
|
/freebsd-10.0-release/contrib/sendmail/src/ |
H A D | srvrsmtp.c | 404 str, addr, response); \ 407 if (strncmp(response, "421 ", 4) == 0 \ 408 || strncmp(response, "421-", 4) == 0) \ 413 usrerr(response); \ 419 usrerr(response); \ 457 if (response != NULL) \ 458 sm_free(response); /* XXX */ \ 962 char *response; local 968 response = milter_connect(q, RealHostAddr, e, &state); 1008 if (response ! 2151 char *response; local 2518 char *response; local 2767 char *response; local 2851 char *response; local 3280 char *response; local 3382 char *response; local 3506 char *response; local [all...] |
/freebsd-10.0-release/libexec/talkd/ |
H A D | table.c | 157 insert_table(CTL_MSG *request, CTL_RESPONSE *response) argument 165 response->id_num = htonl(request->id_num);
|
/freebsd-10.0-release/usr.bin/tip/libacu/ |
H A D | ventel.c | 117 /* call failed, parse response for user */ 184 gobble(char match, char response[]) argument 186 char *cp = response;
|
/freebsd-10.0-release/contrib/opie/ |
H A D | opieauto.c | 87 char *seed = NULL, *response = NULL; local 123 if (!(c = strchr(response = c + 1, '\n'))) { 125 fprintf(stderr, "%s: got bogus response: %s\n", myname, cmd); 144 fprintf(stderr, "got cmd=%c, algorithm=%d sequence=%d seed=+%s+ response=+%s+ on fd %d\n", cmd[0], algorithm, sequence, seed, response, fd); 181 if (!opieatob8(&(*c)->basekey, response))
|
/freebsd-10.0-release/contrib/unbound/iterator/ |
H A D | iterator.h | 2 * iterator/iterator.h - iterative resolver DNS query response module 185 * response is final. For externally initiated queries, this 199 * The response 201 struct dns_msg* response; member in struct:iter_qstate 205 * ANSWER section of a response before being sent upstream. 213 * AUTHORITY section of the response before being sent upstream. 298 * is DNSSEC lame. The response need not be marked dnssec-lame again. 346 * See if iterator state is a response state 348 * @return true if response state.
|
/freebsd-10.0-release/usr.sbin/iscsid/ |
H A D | iscsid.h | 98 void pdu_send(struct pdu *response);
|
/freebsd-10.0-release/contrib/serf/auth/ |
H A D | auth_spnego.c | 70 * key with the TGS again. If it checks out, we can return the response 104 Pipeline mode disabled, requests are sent only after the response off the 111 the Negotiate header of the response with the session initiated by the 118 be. When we receive a 40x response from the server switch to STATELESS 123 The rest of the state machine starts with the arrival of the response to the 124 second request, and then goes on with each response: 127 | INIT | C --> S: GET request in response to 40x of the server 179 /* On the initial 401 response of the server, request a session key from 233 - when a response from a server is received that contains an authn header 234 (either from a 40x or 2xx response) 391 serf__handle_spnego_auth(int code, serf_request_t *request, serf_bucket_t *response, const char *auth_hdr, const char *auth_attr, void *baton, apr_pool_t *pool) argument 495 serf__validate_response_spnego_auth(peer_t peer, int code, serf_connection_t *conn, serf_request_t *request, serf_bucket_t *response, apr_pool_t *pool) argument [all...] |
H A D | auth_basic.c | 36 serf_bucket_t *response, 34 serf__handle_basic_auth(int code, serf_request_t *request, serf_bucket_t *response, const char *auth_hdr, const char *auth_attr, void *baton, apr_pool_t *pool) argument
|
/freebsd-10.0-release/contrib/serf/ |
H A D | serf_private.h | 73 /* Holds all the information corresponding to a request/response pair. */ 102 needs access to the uri of the request in the response handler. 289 response yet. 307 serf_bucket_t *response, 350 * This function will be called when a response is received, so that the 351 * scheme handler can validate the Authentication related response headers 359 serf_bucket_t *response, 371 facilitate case insensitive matching of the response headers. */ 389 /* Function to validate the authentication header of a response */ 394 * Handles a 401 or 407 response, trie [all...] |
H A D | serf_bucket_types.h | 79 #define SERF_BUCKET_IS_RESPONSE(b) SERF_BUCKET_CHECK((b), response) 111 * Wait for the HTTP headers to be processed for a @a response. 117 serf_bucket_t *response); 120 * Get the headers bucket for @a response. 123 serf_bucket_t *response); 126 * Advise the response @a bucket that this was from a HEAD request and 127 * that it should not expect to see a response body.
|
/freebsd-10.0-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_ttls.c | 587 u8 *response, size_t response_len) 591 if (challenge == NULL || response == NULL || 595 "attributes (challenge len %lu response len %lu)", 620 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) { 634 if (os_memcmp(nt_response, response + 2 + 24, 24) == 0) { 635 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response"); 640 response + 2 + 24, 24); 652 u8 *response, size_t response_len) 658 if (challenge == NULL || response == NULL || 662 "attributes (challenge len %lu response le 584 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument 648 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/ts/ |
H A D | ts_rsp_verify.c | 75 static int TS_check_status_info(TS_RESP *response); 89 * Local mapping between response codes and descriptions. 131 * - Search for the signing certificate in 'certs' and in the response. 357 * Verifies whether 'response' contains a valid response with regards 362 int TS_RESP_verify_response(TS_VERIFY_CTX *ctx, TS_RESP *response) argument 364 PKCS7 *token = TS_RESP_get_token(response); 365 TS_TST_INFO *tst_info = TS_RESP_get_tst_info(response); 369 if (!TS_check_status_info(response)) goto err; 401 * - Checks the version number of the response 479 TS_check_status_info(TS_RESP *response) argument [all...] |
/freebsd-10.0-release/sys/dev/iscsi_initiator/ |
H A D | iscsi_subr.c | 197 _scsi_done(isc_session_t *sp, u_int response, u_int status, union ccb *ccb, pduq_t *pq) argument 203 if(status || response) { 204 sdebug(3, "response=%x status=%x ccb=%p pq=%p", response, status, ccb, pq); 209 switch(response) { 243 if((response >= 0x80) && (response <= 0xFF)) { 356 _scsi_done(sp, cmd->response, cmd->status, opq->ccb, pq);
|
/freebsd-10.0-release/crypto/openssh/ |
H A D | scp.c | 360 int response(void); 491 (void) response(); 568 return (response()); 681 if (response() < 0) 806 if (response() < 0) 848 (void) response(); 879 if (response() < 0) { 898 (void) response(); 1172 (void) response(); 1198 response(voi function [all...] |
/freebsd-10.0-release/contrib/tcpdump/ |
H A D | print-lwres.c | 67 #define LWRES_LWPACKETFLAG_RESPONSE 0x0001U /* if set, pkt is a response */ 303 int response; local 319 response = EXTRACT_16BITS(&np->pktflags) & LWRES_LWPACKETFLAG_RESPONSE; 324 printf(" %s%s", s, response ? "" : "?"); 346 if (!response) {
|
/freebsd-10.0-release/crypto/heimdal/kdc/ |
H A D | digest.c | 667 r.u.response.success = TRUE; 672 r.u.response.success = FALSE; 792 r.u.response.success = TRUE; 797 r.u.response.success = FALSE; 915 r.u.response.success = TRUE; 920 r.u.response.success = FALSE; 924 if (r.u.response.success) { 954 r.u.response.rsp = calloc(1, sizeof(*r.u.response.rsp)); 955 if (r.u.response [all...] |
/freebsd-10.0-release/lib/libtacplus/ |
H A D | taclib_private.h | 80 * An optional string of bytes from a server response. The data resides 81 * in the response packet itself, and must not be freed. 191 struct tac_msg response; member in struct:tac_handle 193 int srvr_pos; /* Scan position in response body */
|
/freebsd-10.0-release/sys/dev/hyperv/vmbus/ |
H A D | hv_channel_mgmt.c | 440 * This is invoked when we received a response 442 * response and signal the requesting thread. 468 memcpy(&msg_info->response.open_result, result, 482 * This is invoked when we received a response 484 * response and signal the requesting thread. 510 memcpy(&msg_info->response.gpadl_created, 526 * response and signal the requesting thread 555 memcpy(&msg_info->response.gpadl_torndown, 567 * @brief Version response handler. 569 * This is invoked when we received a response [all...] |
/freebsd-10.0-release/sys/ofed/drivers/infiniband/core/ |
H A D | uverbs_cmd.c | 298 (unsigned long) cmd.response + sizeof resp, 326 if (copy_to_user((void __user *) (unsigned long) cmd.response, 424 if (copy_to_user((void __user *) (unsigned long) cmd.response, 473 if (copy_to_user((void __user *) (unsigned long) cmd.response, 498 (unsigned long) cmd.response + sizeof resp, 527 if (copy_to_user((void __user *) (unsigned long) cmd.response, 608 (unsigned long) cmd.response + sizeof resp, 658 if (copy_to_user((void __user *) (unsigned long) cmd.response, 746 if (copy_to_user((void __user *) (unsigned long) cmd.response, 776 (unsigned long) cmd.response [all...] |
/freebsd-10.0-release/sys/dev/sound/pci/hda/ |
H A D | hdac_private.h | 129 * Hold a response from a verb sent to a codec received via the rirb. 132 uint32_t response; member in struct:hdac_rirb 222 uint32_t response; member in struct:hdac_softc::__anon9459
|