/freebsd-13-stable/sys/dev/iscsi_initiator/ |
H A D | iscsi_subr.c | 196 _scsi_done(isc_session_t *sp, u_int response, u_int status, union ccb *ccb, pduq_t *pq) argument 202 if(status || response) { 203 sdebug(3, "response=%x status=%x ccb=%p pq=%p", response, status, ccb, pq); 208 switch(response) { 242 if((response >= 0x80) && (response <= 0xFF)) { 355 _scsi_done(sp, cmd->response, cmd->status, opq->ccb, pq);
|
/freebsd-13-stable/usr.sbin/bhyve/ |
H A D | pci_virtio_scsi.c | 157 /* command-specific response values */ 167 uint8_t response; member in struct:pci_vtscsi_ctrl_tmf 183 uint8_t response; member in struct:pci_vtscsi_ctrl_an 186 /* command-specific response values */ 225 uint8_t response; member in struct:pci_vtscsi_req_cmd_wr 313 /* Leave room for the request and the response. */ 444 tmf->response = io->taskio.task_status; 536 cmd_wr->response = VIRTIO_SCSI_S_FAILURE; 542 cmd_wr->response = VIRTIO_SCSI_S_OK;
|
/freebsd-13-stable/contrib/llvm-project/lldb/source/Plugins/Process/gdb-remote/ |
H A D | GDBRemoteCommunication.cpp | 210 StringExtractorGDBRemote &response, Timeout<std::micro> timeout, 213 auto result = ReadPacket(response, timeout, sync_on_timeout); 214 while (result == PacketResult::Success && response.IsNormalResponse() && 215 response.PeekChar() == 'O') { 216 response.GetChar(); 218 if (response.GetHexByteString(output)) 220 result = ReadPacket(response, timeout, sync_on_timeout); 226 GDBRemoteCommunication::ReadPacket(StringExtractorGDBRemote &response, argument 230 return PopPacketFromQueue(response, timeout); 232 return WaitForPacketNoLock(response, timeou 209 ReadPacketWithOutputSupport( StringExtractorGDBRemote &response, Timeout<std::micro> timeout, bool sync_on_timeout, llvm::function_ref<void(llvm::StringRef)> output_callback) argument 240 PopPacketFromQueue(StringExtractorGDBRemote &response, Timeout<std::micro> timeout) argument [all...] |
/freebsd-13-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server_ttls.c | 620 u8 *response, size_t response_len) 624 if (challenge == NULL || response == NULL || 628 "attributes (challenge len %lu response len %lu)", 655 challenge, response + 2 + 24); 660 response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) { 677 if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) { 678 wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response"); 684 response + 2 + 24, 24); 696 u8 *response, size_t response_len) 702 if (challenge == NULL || response 617 eap_ttls_process_phase2_mschap(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument 692 eap_ttls_process_phase2_mschapv2(struct eap_sm *sm, struct eap_ttls_data *data, u8 *challenge, size_t challenge_len, u8 *response, size_t response_len) argument [all...] |
H A D | eap.h | 165 const u8 *challenge, const u8 *response);
|
/freebsd-13-stable/contrib/serf/auth/ |
H A D | auth_spnego.c | 76 * key with the TGS again. If it checks out, we can return the response 110 Pipeline mode disabled, requests are sent only after the response off the 117 the Negotiate header of the response with the session initiated by the 124 be. When we receive a 40x response from the server switch to STATELESS 129 The rest of the state machine starts with the arrival of the response to the 130 second request, and then goes on with each response: 133 | INIT | C --> S: GET request in response to 40x of the server 185 /* On the initial 401 response of the server, request a session key from 245 - when a response from a server is received that contains an authn header 246 (either from a 40x or 2xx response) 421 serf__handle_spnego_auth(int code, serf_request_t *request, serf_bucket_t *response, const char *auth_hdr, const char *auth_attr, void *baton, apr_pool_t *pool) argument 587 serf__validate_response_spnego_auth(const serf__authn_scheme_t *scheme, peer_t peer, int code, serf_connection_t *conn, serf_request_t *request, serf_bucket_t *response, apr_pool_t *pool) argument [all...] |
/freebsd-13-stable/contrib/serf/ |
H A D | serf_bucket_types.h | 84 #define SERF_BUCKET_IS_RESPONSE(b) SERF_BUCKET_CHECK((b), response) 116 * Wait for the HTTP headers to be processed for a @a response. 122 serf_bucket_t *response); 125 * Get the headers bucket for @a response. 128 serf_bucket_t *response); 131 * Advise the response @a bucket that this was from a HEAD request and 132 * that it should not expect to see a response body.
|
/freebsd-13-stable/contrib/googletest/googlemock/scripts/ |
H A D | upload.py | 201 response = self.opener.open(req) 202 response_body = response.read() 230 response = self.opener.open(req) 232 response = e 233 if (response.code != 302 or 234 response.info()["location"] != continue_location): 235 raise urllib2.HTTPError(req.get_full_url(), response.code, response.msg, 236 response.headers, response [all...] |
/freebsd-13-stable/contrib/googletest/googletest/scripts/ |
H A D | upload.py | 201 response = self.opener.open(req) 202 response_body = response.read() 230 response = self.opener.open(req) 232 response = e 233 if (response.code != 302 or 234 response.info()["location"] != continue_location): 235 raise urllib2.HTTPError(req.get_full_url(), response.code, response.msg, 236 response.headers, response [all...] |
/freebsd-13-stable/contrib/llvm-project/lldb/include/lldb/Utility/ |
H A D | StringExtractorGDBRemote.h | 24 void *baton, const StringExtractorGDBRemote &response);
|
/freebsd-13-stable/contrib/wpa/wpa_supplicant/examples/ |
H A D | wps-nfc.py | 145 # override to avoid parser error in request/response.pretty() in nfcpy 149 response = nfc.ndef.Message("\xd1\x02\x01Hs\x12") 158 response = self.process_request(request) 159 summary("send handover response {}".format(response.type)) 160 return response 245 summary("Receiving handover response") 248 summary("No response received")
|
/freebsd-13-stable/crypto/heimdal/kdc/ |
H A D | digest.c | 667 r.u.response.success = TRUE; 672 r.u.response.success = FALSE; 792 r.u.response.success = TRUE; 797 r.u.response.success = FALSE; 915 r.u.response.success = TRUE; 920 r.u.response.success = FALSE; 924 if (r.u.response.success) { 954 r.u.response.rsp = calloc(1, sizeof(*r.u.response.rsp)); 955 if (r.u.response [all...] |
/freebsd-13-stable/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_local.h | 78 * response OCTET STRING } 82 ASN1_OCTET_STRING *response; member in struct:ocsp_resp_bytes_st
|
/freebsd-13-stable/contrib/tcpdump/ |
H A D | print-lwres.c | 64 #define LWRES_LWPACKETFLAG_RESPONSE 0x0001U /* if set, pkt is a response */ 298 int response; local 314 response = EXTRACT_16BITS(&np->pktflags) & LWRES_LWPACKETFLAG_RESPONSE; 319 ND_PRINT((ndo, " %s%s", s, response ? "" : "?")); 341 if (!response) {
|
/freebsd-13-stable/lib/libtacplus/ |
H A D | taclib_private.h | 82 * An optional string of bytes from a server response. The data resides 83 * in the response packet itself, and must not be freed. 193 struct tac_msg response; member in struct:tac_handle 195 int srvr_pos; /* Scan position in response body */
|
/freebsd-13-stable/sys/dev/acpi_support/ |
H A D | acpi_asus_wmi.c | 557 ACPI_BUFFER response = { ACPI_ALLOCATE_BUFFER, NULL }; local 559 ACPI_WMI_GET_EVENT_DATA(sc->wmi_dev, notify, &response); 560 obj = (ACPI_OBJECT*) response.Pointer; 591 acpi_asus_wmi_free_buffer(&response);
|
/freebsd-13-stable/sys/dev/sound/pci/hda/ |
H A D | hdac_private.h | 131 * Hold a response from a verb sent to a codec received via the rirb. 134 uint32_t response; member in struct:hdac_rirb 224 uint32_t response; member in struct:hdac_softc::__anon14322
|
/freebsd-13-stable/libexec/pppoed/ |
H A D | pppoed.c | 151 perror("Cannot get netgraph response"); 503 unsigned char response[1024]; local 654 switch (sz = NgRecvData(ds, response, sizeof response, rhook)) { 667 sprintf(ptr, "%02x", (u_char)response[f]); 676 Spawn(prog, acname, provider, exec, ngc, cs, ds, response, sz, optd);
|
/freebsd-13-stable/crypto/openssh/ |
H A D | scp.c | 384 int response(void); 537 (void) response(); 614 return (response()); 982 if (response() < 0) 1118 if (response() < 0) 1162 (void) response(); 1195 if (response() < 0) { 1214 (void) response(); 1521 (void) response(); 1557 response(voi function [all...] |
/freebsd-13-stable/sys/ofed/drivers/infiniband/core/ |
H A D | ib_uverbs_cmd.c | 343 (unsigned long) cmd.response + sizeof resp, 393 if (copy_to_user((void __user *) (unsigned long) cmd.response, 487 if (copy_to_user((void __user *) (unsigned long) cmd.response, 538 if (copy_to_user((void __user *) (unsigned long) cmd.response, 564 (unsigned long) cmd.response + sizeof resp, 593 if (copy_to_user((void __user *) (unsigned long) cmd.response, 772 (unsigned long) cmd.response + sizeof resp, 840 if (copy_to_user((void __user *) (unsigned long) cmd.response, 982 (unsigned long) cmd.response + sizeof resp, 1036 if (copy_to_user((void __user *) (unsigned long) cmd.response, [all...] |
/freebsd-13-stable/sys/dev/virtio/scsi/ |
H A D | virtio_scsi.c | 1065 /* At least one segment must be left for the response. */ 1124 cmd_resp->response = -1; 1181 uint8_t response; local 1184 response = tmf_resp->response; 1187 vtscsi_dprintf(sc, VTSCSI_TRACE, "req=%p to_req=%p response=%d\n", 1188 req, to_req, response); 1200 if (response == VIRTIO_SCSI_S_FUNCTION_COMPLETE) 1246 tmf_resp->response = -1; 1309 switch (cmd_resp->response) { [all...] |
/freebsd-13-stable/sys/netgraph/ |
H A D | ng_ksocket.c | 787 /* Send it back in a response */ 814 /* Get response with room for option value */ 820 /* Get socket option, and put value in the response */ 1030 struct ng_mesg *response; local 1045 NG_MKMESSAGE(response, NGM_KSOCKET_COOKIE, 1047 if (response != NULL) { 1048 response->header.flags |= NGF_RESP; 1049 response->header.token = priv->response_token; 1050 *(int32_t *)response->data = error; 1052 * send an async "response" messag [all...] |
/freebsd-13-stable/sys/dev/isci/scil/ |
H A D | scic_sds_smp_request.c | 114 * This macro returns the address of the smp response buffer in the smp request 495 //SMP response comes as UF, so no need to set response IU address. 506 * waiting for a response frame. It will copy the response data, release 513 * index that should contain the response. 515 * @return This method returns an indication of whether the response 518 * successful processing of the TC response. 581 if (this_smp_response->response.discover.protocols.u.bits.attached_sata_device 582 && !this_smp_response->response [all...] |
/freebsd-13-stable/contrib/subversion/subversion/libsvn_ra_serf/ |
H A D | multistatus.c | 78 <D:response> 91 </D:response> 98 <D:response> 146 /* <response> */ 147 { MS_MULTISTATUS, D_, "response", MS_RESPONSE, 189 /* </response> */ 640 serf_bucket_t *response, 648 the multistatus response. */ 653 change the response handler). */ 660 hdrs = serf_bucket_response_get_headers(response); 638 svn_ra_serf__handle_multistatus_only(serf_request_t *request, serf_bucket_t *response, void *baton, apr_pool_t *scratch_pool) argument 688 svn_ra_serf__handle_server_error(svn_ra_serf__server_error_t *server_error, svn_ra_serf__handler_t *handler, serf_request_t *request, serf_bucket_t *response, apr_status_t *serf_status, apr_pool_t *scratch_pool) argument [all...] |
/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | tls_openssl_ocsp.c | 56 * response OCTET STRING } 60 ASN1_OCTET_STRING *response; member in struct:__anon6396 75 ASN1_SIMPLE(ResponseBytes, response, ASN1_OCTET_STRING) 358 "OpenSSL: Invalid OCSP response thisUpdate"); 365 wpa_printf(MSG_DEBUG, "OpenSSL: OCSP response not yet valid"); 370 return 1; /* OK - no limit on response age */ 374 "OpenSSL: Invalid OCSP response nextUpdate"); 380 wpa_printf(MSG_DEBUG, "OpenSSL: OCSP response expired"); 386 "OpenSSL: OCSP response nextUpdate before thisUpdate"); 515 "OpenSSL: Searching OCSP response fo [all...] |