Searched refs:response (Results 76 - 100 of 160) sorted by relevance

1234567

/freebsd-10.0-release/sys/dev/hyperv/netvsc/
H A Dhv_rndis_filter.c54 static void hv_rf_receive_response(rndis_device *device, rndis_msg *response);
56 rndis_msg *response);
129 * for request/response packet types so we just use the set_request
203 * RNDIS filter receive response
206 hv_rf_receive_response(rndis_device *device, rndis_msg *response) argument
216 * All request/response message contains request_id as the
220 response->msg.init_complete.request_id) {
230 if (response->msg_len <= sizeof(rndis_msg)) {
231 memcpy(&request->response_msg, response,
232 response
252 hv_rf_receive_indicate_status(rndis_device *device, rndis_msg *response) argument
[all...]
/freebsd-10.0-release/sys/dev/drm2/i915/
H A Dintel_sdvo.c471 /* the following two are to read the response */
500 intel_sdvo_read_response(struct intel_sdvo *intel_sdvo, void *response, argument
537 /* Read the command response */
541 &((u8 *)response)[i]))
544 printf(" %02X", ((u8 *)response)[i]);
603 * This function is making an assumption about the layout of the response,
608 struct intel_sdvo_get_trained_inputs_response response; local
610 CTASSERT(sizeof(response) == 1);
612 &response, sizeof(response)))
1235 u8 response[2]; local
1354 uint16_t response; local
2319 uint16_t response, data_value[2]; local
2436 uint16_t response, data_value[2]; local
2449 uint16_t response; member in union:__anon8123
[all...]
/freebsd-10.0-release/contrib/ipfilter/l4check/
H A Dl4check.c53 char *response = NULL; variable
249 if (!strncmp(response, l4->l4_rbuf,
251 printf("%d: Good response\n",
260 printf("%d: Bad response\n",
685 } else if (!strcasecmp(t, "response")) {
701 "response timeout %d\n",
704 if (response) {
706 "%d: response already set\n",
711 response = strdup(strtok(NULL, ""));
712 rlen = strlen(response);
[all...]
/freebsd-10.0-release/sys/cam/scsi/
H A Dsmp_all.h127 * REPORT GENERAL request and response, current as of SPL Revision 7.
203 * REPORT MANUFACTURER INFORMATION request and response, current as of SPL
240 * DISCOVER request and response, current as of SPL Revision 7.
396 * PHY CONTROL request and response. Current as of SPL Revision 7.
486 void smp_report_general_sbuf(struct smp_report_general_response *response,
489 void smp_report_manuf_info_sbuf(struct smp_report_manuf_info_response *response,
495 int request_len, uint8_t *response, int response_len,
501 uint8_t *response, int response_len, int long_response,
507 int request_len, uint8_t *response, int response_len,
513 uint8_t *response, in
[all...]
/freebsd-10.0-release/contrib/llvm/tools/lldb/source/Plugins/Process/gdb-remote/
H A DThreadGDBRemote.cpp193 ThreadGDBRemote::PrivateSetRegisterValue (uint32_t reg, StringExtractor &response) argument
197 return gdb_reg_ctx->PrivateSetRegisterValue (reg, response);
/freebsd-10.0-release/contrib/sendmail/src/
H A Dsrvrsmtp.c404 str, addr, response); \
407 if (strncmp(response, "421 ", 4) == 0 \
408 || strncmp(response, "421-", 4) == 0) \
413 usrerr(response); \
419 usrerr(response); \
457 if (response != NULL) \
458 sm_free(response); /* XXX */ \
962 char *response; local
968 response = milter_connect(q, RealHostAddr, e, &state);
1008 if (response !
2151 char *response; local
2518 char *response; local
2767 char *response; local
2851 char *response; local
3280 char *response; local
3382 char *response; local
3506 char *response; local
[all...]
/freebsd-10.0-release/libexec/talkd/
H A Dtable.c157 insert_table(CTL_MSG *request, CTL_RESPONSE *response) argument
165 response->id_num = htonl(request->id_num);
/freebsd-10.0-release/usr.bin/tip/libacu/
H A Dventel.c117 /* call failed, parse response for user */
184 gobble(char match, char response[]) argument
186 char *cp = response;
/freebsd-10.0-release/contrib/opie/
H A Dopieauto.c87 char *seed = NULL, *response = NULL; local
123 if (!(c = strchr(response = c + 1, '\n'))) {
125 fprintf(stderr, "%s: got bogus response: %s\n", myname, cmd);
144 fprintf(stderr, "got cmd=%c, algorithm=%d sequence=%d seed=+%s+ response=+%s+ on fd %d\n", cmd[0], algorithm, sequence, seed, response, fd);
181 if (!opieatob8(&(*c)->basekey, response))
/freebsd-10.0-release/contrib/unbound/iterator/
H A Diterator.h2 * iterator/iterator.h - iterative resolver DNS query response module
185 * response is final. For externally initiated queries, this
199 * The response
201 struct dns_msg* response; member in struct:iter_qstate
205 * ANSWER section of a response before being sent upstream.
213 * AUTHORITY section of the response before being sent upstream.
298 * is DNSSEC lame. The response need not be marked dnssec-lame again.
346 * See if iterator state is a response state
348 * @return true if response state.
/freebsd-10.0-release/usr.sbin/iscsid/
H A Discsid.h98 void pdu_send(struct pdu *response);
/freebsd-10.0-release/contrib/serf/auth/
H A Dauth_spnego.c70 * key with the TGS again. If it checks out, we can return the response
104 Pipeline mode disabled, requests are sent only after the response off the
111 the Negotiate header of the response with the session initiated by the
118 be. When we receive a 40x response from the server switch to STATELESS
123 The rest of the state machine starts with the arrival of the response to the
124 second request, and then goes on with each response:
127 | INIT | C --> S: GET request in response to 40x of the server
179 /* On the initial 401 response of the server, request a session key from
233 - when a response from a server is received that contains an authn header
234 (either from a 40x or 2xx response)
391 serf__handle_spnego_auth(int code, serf_request_t *request, serf_bucket_t *response, const char *auth_hdr, const char *auth_attr, void *baton, apr_pool_t *pool) argument
495 serf__validate_response_spnego_auth(peer_t peer, int code, serf_connection_t *conn, serf_request_t *request, serf_bucket_t *response, apr_pool_t *pool) argument
[all...]
H A Dauth_basic.c36 serf_bucket_t *response,
34 serf__handle_basic_auth(int code, serf_request_t *request, serf_bucket_t *response, const char *auth_hdr, const char *auth_attr, void *baton, apr_pool_t *pool) argument
/freebsd-10.0-release/contrib/serf/
H A Dserf_private.h73 /* Holds all the information corresponding to a request/response pair. */
102 needs access to the uri of the request in the response handler.
289 response yet.
307 serf_bucket_t *response,
350 * This function will be called when a response is received, so that the
351 * scheme handler can validate the Authentication related response headers
359 serf_bucket_t *response,
371 facilitate case insensitive matching of the response headers. */
389 /* Function to validate the authentication header of a response */
394 * Handles a 401 or 407 response, trie
[all...]
H A Dserf_bucket_types.h79 #define SERF_BUCKET_IS_RESPONSE(b) SERF_BUCKET_CHECK((b), response)
111 * Wait for the HTTP headers to be processed for a @a response.
117 serf_bucket_t *response);
120 * Get the headers bucket for @a response.
123 serf_bucket_t *response);
126 * Advise the response @a bucket that this was from a HEAD request and
127 * that it should not expect to see a response body.
/freebsd-10.0-release/contrib/wpa/src/eap_server/
H A Deap_server_ttls.c587 u8 *response, size_t response_len)
591 if (challenge == NULL || response == NULL ||
595 "attributes (challenge len %lu response len %lu)",
620 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) {
634 if (os_memcmp(nt_response, response + 2 + 24, 24) == 0) {
635 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response");
640 response + 2 + 24, 24);
652 u8 *response, size_t response_len)
658 if (challenge == NULL || response == NULL ||
662 "attributes (challenge len %lu response le
584 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
648 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
[all...]
/freebsd-10.0-release/crypto/openssl/crypto/ts/
H A Dts_rsp_verify.c75 static int TS_check_status_info(TS_RESP *response);
89 * Local mapping between response codes and descriptions.
131 * - Search for the signing certificate in 'certs' and in the response.
357 * Verifies whether 'response' contains a valid response with regards
362 int TS_RESP_verify_response(TS_VERIFY_CTX *ctx, TS_RESP *response) argument
364 PKCS7 *token = TS_RESP_get_token(response);
365 TS_TST_INFO *tst_info = TS_RESP_get_tst_info(response);
369 if (!TS_check_status_info(response)) goto err;
401 * - Checks the version number of the response
479 TS_check_status_info(TS_RESP *response) argument
[all...]
/freebsd-10.0-release/sys/dev/iscsi_initiator/
H A Discsi_subr.c197 _scsi_done(isc_session_t *sp, u_int response, u_int status, union ccb *ccb, pduq_t *pq) argument
203 if(status || response) {
204 sdebug(3, "response=%x status=%x ccb=%p pq=%p", response, status, ccb, pq);
209 switch(response) {
243 if((response >= 0x80) && (response <= 0xFF)) {
356 _scsi_done(sp, cmd->response, cmd->status, opq->ccb, pq);
/freebsd-10.0-release/crypto/openssh/
H A Dscp.c360 int response(void);
491 (void) response();
568 return (response());
681 if (response() < 0)
806 if (response() < 0)
848 (void) response();
879 if (response() < 0) {
898 (void) response();
1172 (void) response();
1198 response(voi function
[all...]
/freebsd-10.0-release/contrib/tcpdump/
H A Dprint-lwres.c67 #define LWRES_LWPACKETFLAG_RESPONSE 0x0001U /* if set, pkt is a response */
303 int response; local
319 response = EXTRACT_16BITS(&np->pktflags) & LWRES_LWPACKETFLAG_RESPONSE;
324 printf(" %s%s", s, response ? "" : "?");
346 if (!response) {
/freebsd-10.0-release/crypto/heimdal/kdc/
H A Ddigest.c667 r.u.response.success = TRUE;
672 r.u.response.success = FALSE;
792 r.u.response.success = TRUE;
797 r.u.response.success = FALSE;
915 r.u.response.success = TRUE;
920 r.u.response.success = FALSE;
924 if (r.u.response.success) {
954 r.u.response.rsp = calloc(1, sizeof(*r.u.response.rsp));
955 if (r.u.response
[all...]
/freebsd-10.0-release/lib/libtacplus/
H A Dtaclib_private.h80 * An optional string of bytes from a server response. The data resides
81 * in the response packet itself, and must not be freed.
191 struct tac_msg response; member in struct:tac_handle
193 int srvr_pos; /* Scan position in response body */
/freebsd-10.0-release/sys/dev/hyperv/vmbus/
H A Dhv_channel_mgmt.c440 * This is invoked when we received a response
442 * response and signal the requesting thread.
468 memcpy(&msg_info->response.open_result, result,
482 * This is invoked when we received a response
484 * response and signal the requesting thread.
510 memcpy(&msg_info->response.gpadl_created,
526 * response and signal the requesting thread
555 memcpy(&msg_info->response.gpadl_torndown,
567 * @brief Version response handler.
569 * This is invoked when we received a response
[all...]
/freebsd-10.0-release/sys/ofed/drivers/infiniband/core/
H A Duverbs_cmd.c298 (unsigned long) cmd.response + sizeof resp,
326 if (copy_to_user((void __user *) (unsigned long) cmd.response,
424 if (copy_to_user((void __user *) (unsigned long) cmd.response,
473 if (copy_to_user((void __user *) (unsigned long) cmd.response,
498 (unsigned long) cmd.response + sizeof resp,
527 if (copy_to_user((void __user *) (unsigned long) cmd.response,
608 (unsigned long) cmd.response + sizeof resp,
658 if (copy_to_user((void __user *) (unsigned long) cmd.response,
746 if (copy_to_user((void __user *) (unsigned long) cmd.response,
776 (unsigned long) cmd.response
[all...]
/freebsd-10.0-release/sys/dev/sound/pci/hda/
H A Dhdac_private.h129 * Hold a response from a verb sent to a codec received via the rirb.
132 uint32_t response; member in struct:hdac_rirb
222 uint32_t response; member in struct:hdac_softc::__anon9459

Completed in 379 milliseconds

1234567