Searched refs:response (Results 101 - 125 of 196) sorted by relevance

12345678

/freebsd-13-stable/sys/dev/iscsi_initiator/
H A Discsi_subr.c196 _scsi_done(isc_session_t *sp, u_int response, u_int status, union ccb *ccb, pduq_t *pq) argument
202 if(status || response) {
203 sdebug(3, "response=%x status=%x ccb=%p pq=%p", response, status, ccb, pq);
208 switch(response) {
242 if((response >= 0x80) && (response <= 0xFF)) {
355 _scsi_done(sp, cmd->response, cmd->status, opq->ccb, pq);
/freebsd-13-stable/usr.sbin/bhyve/
H A Dpci_virtio_scsi.c157 /* command-specific response values */
167 uint8_t response; member in struct:pci_vtscsi_ctrl_tmf
183 uint8_t response; member in struct:pci_vtscsi_ctrl_an
186 /* command-specific response values */
225 uint8_t response; member in struct:pci_vtscsi_req_cmd_wr
313 /* Leave room for the request and the response. */
444 tmf->response = io->taskio.task_status;
536 cmd_wr->response = VIRTIO_SCSI_S_FAILURE;
542 cmd_wr->response = VIRTIO_SCSI_S_OK;
/freebsd-13-stable/contrib/llvm-project/lldb/source/Plugins/Process/gdb-remote/
H A DGDBRemoteCommunication.cpp210 StringExtractorGDBRemote &response, Timeout<std::micro> timeout,
213 auto result = ReadPacket(response, timeout, sync_on_timeout);
214 while (result == PacketResult::Success && response.IsNormalResponse() &&
215 response.PeekChar() == 'O') {
216 response.GetChar();
218 if (response.GetHexByteString(output))
220 result = ReadPacket(response, timeout, sync_on_timeout);
226 GDBRemoteCommunication::ReadPacket(StringExtractorGDBRemote &response, argument
230 return PopPacketFromQueue(response, timeout);
232 return WaitForPacketNoLock(response, timeou
209 ReadPacketWithOutputSupport( StringExtractorGDBRemote &response, Timeout<std::micro> timeout, bool sync_on_timeout, llvm::function_ref<void(llvm::StringRef)> output_callback) argument
240 PopPacketFromQueue(StringExtractorGDBRemote &response, Timeout<std::micro> timeout) argument
[all...]
/freebsd-13-stable/contrib/wpa/src/eap_server/
H A Deap_server_ttls.c620 u8 *response, size_t response_len)
624 if (challenge == NULL || response == NULL ||
628 "attributes (challenge len %lu response len %lu)",
655 challenge, response + 2 + 24);
660 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) {
677 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) {
678 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response");
684 response + 2 + 24, 24);
696 u8 *response, size_t response_len)
702 if (challenge == NULL || response
617 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
692 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument
[all...]
H A Deap.h165 const u8 *challenge, const u8 *response);
/freebsd-13-stable/contrib/serf/auth/
H A Dauth_spnego.c76 * key with the TGS again. If it checks out, we can return the response
110 Pipeline mode disabled, requests are sent only after the response off the
117 the Negotiate header of the response with the session initiated by the
124 be. When we receive a 40x response from the server switch to STATELESS
129 The rest of the state machine starts with the arrival of the response to the
130 second request, and then goes on with each response:
133 | INIT | C --> S: GET request in response to 40x of the server
185 /* On the initial 401 response of the server, request a session key from
245 - when a response from a server is received that contains an authn header
246 (either from a 40x or 2xx response)
421 serf__handle_spnego_auth(int code, serf_request_t *request, serf_bucket_t *response, const char *auth_hdr, const char *auth_attr, void *baton, apr_pool_t *pool) argument
587 serf__validate_response_spnego_auth(const serf__authn_scheme_t *scheme, peer_t peer, int code, serf_connection_t *conn, serf_request_t *request, serf_bucket_t *response, apr_pool_t *pool) argument
[all...]
/freebsd-13-stable/contrib/serf/
H A Dserf_bucket_types.h84 #define SERF_BUCKET_IS_RESPONSE(b) SERF_BUCKET_CHECK((b), response)
116 * Wait for the HTTP headers to be processed for a @a response.
122 serf_bucket_t *response);
125 * Get the headers bucket for @a response.
128 serf_bucket_t *response);
131 * Advise the response @a bucket that this was from a HEAD request and
132 * that it should not expect to see a response body.
/freebsd-13-stable/contrib/googletest/googlemock/scripts/
H A Dupload.py201 response = self.opener.open(req)
202 response_body = response.read()
230 response = self.opener.open(req)
232 response = e
233 if (response.code != 302 or
234 response.info()["location"] != continue_location):
235 raise urllib2.HTTPError(req.get_full_url(), response.code, response.msg,
236 response.headers, response
[all...]
/freebsd-13-stable/contrib/googletest/googletest/scripts/
H A Dupload.py201 response = self.opener.open(req)
202 response_body = response.read()
230 response = self.opener.open(req)
232 response = e
233 if (response.code != 302 or
234 response.info()["location"] != continue_location):
235 raise urllib2.HTTPError(req.get_full_url(), response.code, response.msg,
236 response.headers, response
[all...]
/freebsd-13-stable/contrib/llvm-project/lldb/include/lldb/Utility/
H A DStringExtractorGDBRemote.h24 void *baton, const StringExtractorGDBRemote &response);
/freebsd-13-stable/contrib/wpa/wpa_supplicant/examples/
H A Dwps-nfc.py145 # override to avoid parser error in request/response.pretty() in nfcpy
149 response = nfc.ndef.Message("\xd1\x02\x01Hs\x12")
158 response = self.process_request(request)
159 summary("send handover response {}".format(response.type))
160 return response
245 summary("Receiving handover response")
248 summary("No response received")
/freebsd-13-stable/crypto/heimdal/kdc/
H A Ddigest.c667 r.u.response.success = TRUE;
672 r.u.response.success = FALSE;
792 r.u.response.success = TRUE;
797 r.u.response.success = FALSE;
915 r.u.response.success = TRUE;
920 r.u.response.success = FALSE;
924 if (r.u.response.success) {
954 r.u.response.rsp = calloc(1, sizeof(*r.u.response.rsp));
955 if (r.u.response
[all...]
/freebsd-13-stable/crypto/openssl/crypto/ocsp/
H A Docsp_local.h78 * response OCTET STRING }
82 ASN1_OCTET_STRING *response; member in struct:ocsp_resp_bytes_st
/freebsd-13-stable/contrib/tcpdump/
H A Dprint-lwres.c64 #define LWRES_LWPACKETFLAG_RESPONSE 0x0001U /* if set, pkt is a response */
298 int response; local
314 response = EXTRACT_16BITS(&np->pktflags) & LWRES_LWPACKETFLAG_RESPONSE;
319 ND_PRINT((ndo, " %s%s", s, response ? "" : "?"));
341 if (!response) {
/freebsd-13-stable/lib/libtacplus/
H A Dtaclib_private.h82 * An optional string of bytes from a server response. The data resides
83 * in the response packet itself, and must not be freed.
193 struct tac_msg response; member in struct:tac_handle
195 int srvr_pos; /* Scan position in response body */
/freebsd-13-stable/sys/dev/acpi_support/
H A Dacpi_asus_wmi.c557 ACPI_BUFFER response = { ACPI_ALLOCATE_BUFFER, NULL }; local
559 ACPI_WMI_GET_EVENT_DATA(sc->wmi_dev, notify, &response);
560 obj = (ACPI_OBJECT*) response.Pointer;
591 acpi_asus_wmi_free_buffer(&response);
/freebsd-13-stable/sys/dev/sound/pci/hda/
H A Dhdac_private.h131 * Hold a response from a verb sent to a codec received via the rirb.
134 uint32_t response; member in struct:hdac_rirb
224 uint32_t response; member in struct:hdac_softc::__anon14322
/freebsd-13-stable/libexec/pppoed/
H A Dpppoed.c151 perror("Cannot get netgraph response");
503 unsigned char response[1024]; local
654 switch (sz = NgRecvData(ds, response, sizeof response, rhook)) {
667 sprintf(ptr, "%02x", (u_char)response[f]);
676 Spawn(prog, acname, provider, exec, ngc, cs, ds, response, sz, optd);
/freebsd-13-stable/crypto/openssh/
H A Dscp.c384 int response(void);
537 (void) response();
614 return (response());
982 if (response() < 0)
1118 if (response() < 0)
1162 (void) response();
1195 if (response() < 0) {
1214 (void) response();
1521 (void) response();
1557 response(voi function
[all...]
/freebsd-13-stable/sys/ofed/drivers/infiniband/core/
H A Dib_uverbs_cmd.c343 (unsigned long) cmd.response + sizeof resp,
393 if (copy_to_user((void __user *) (unsigned long) cmd.response,
487 if (copy_to_user((void __user *) (unsigned long) cmd.response,
538 if (copy_to_user((void __user *) (unsigned long) cmd.response,
564 (unsigned long) cmd.response + sizeof resp,
593 if (copy_to_user((void __user *) (unsigned long) cmd.response,
772 (unsigned long) cmd.response + sizeof resp,
840 if (copy_to_user((void __user *) (unsigned long) cmd.response,
982 (unsigned long) cmd.response + sizeof resp,
1036 if (copy_to_user((void __user *) (unsigned long) cmd.response,
[all...]
/freebsd-13-stable/sys/dev/virtio/scsi/
H A Dvirtio_scsi.c1065 /* At least one segment must be left for the response. */
1124 cmd_resp->response = -1;
1181 uint8_t response; local
1184 response = tmf_resp->response;
1187 vtscsi_dprintf(sc, VTSCSI_TRACE, "req=%p to_req=%p response=%d\n",
1188 req, to_req, response);
1200 if (response == VIRTIO_SCSI_S_FUNCTION_COMPLETE)
1246 tmf_resp->response = -1;
1309 switch (cmd_resp->response) {
[all...]
/freebsd-13-stable/sys/netgraph/
H A Dng_ksocket.c787 /* Send it back in a response */
814 /* Get response with room for option value */
820 /* Get socket option, and put value in the response */
1030 struct ng_mesg *response; local
1045 NG_MKMESSAGE(response, NGM_KSOCKET_COOKIE,
1047 if (response != NULL) {
1048 response->header.flags |= NGF_RESP;
1049 response->header.token = priv->response_token;
1050 *(int32_t *)response->data = error;
1052 * send an async "response" messag
[all...]
/freebsd-13-stable/sys/dev/isci/scil/
H A Dscic_sds_smp_request.c114 * This macro returns the address of the smp response buffer in the smp request
495 //SMP response comes as UF, so no need to set response IU address.
506 * waiting for a response frame. It will copy the response data, release
513 * index that should contain the response.
515 * @return This method returns an indication of whether the response
518 * successful processing of the TC response.
581 if (this_smp_response->response.discover.protocols.u.bits.attached_sata_device
582 && !this_smp_response->response
[all...]
/freebsd-13-stable/contrib/subversion/subversion/libsvn_ra_serf/
H A Dmultistatus.c78 <D:response>
91 </D:response>
98 <D:response>
146 /* <response> */
147 { MS_MULTISTATUS, D_, "response", MS_RESPONSE,
189 /* </response> */
640 serf_bucket_t *response,
648 the multistatus response. */
653 change the response handler). */
660 hdrs = serf_bucket_response_get_headers(response);
638 svn_ra_serf__handle_multistatus_only(serf_request_t *request, serf_bucket_t *response, void *baton, apr_pool_t *scratch_pool) argument
688 svn_ra_serf__handle_server_error(svn_ra_serf__server_error_t *server_error, svn_ra_serf__handler_t *handler, serf_request_t *request, serf_bucket_t *response, apr_status_t *serf_status, apr_pool_t *scratch_pool) argument
[all...]
/freebsd-13-stable/contrib/wpa/src/crypto/
H A Dtls_openssl_ocsp.c56 * response OCTET STRING }
60 ASN1_OCTET_STRING *response; member in struct:__anon6396
75 ASN1_SIMPLE(ResponseBytes, response, ASN1_OCTET_STRING)
358 "OpenSSL: Invalid OCSP response thisUpdate");
365 wpa_printf(MSG_DEBUG, "OpenSSL: OCSP response not yet valid");
370 return 1; /* OK - no limit on response age */
374 "OpenSSL: Invalid OCSP response nextUpdate");
380 wpa_printf(MSG_DEBUG, "OpenSSL: OCSP response expired");
386 "OpenSSL: OCSP response nextUpdate before thisUpdate");
515 "OpenSSL: Searching OCSP response fo
[all...]

Completed in 392 milliseconds

12345678