Searched refs:resp (Results 76 - 100 of 186) sorted by relevance

12345678

/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/include/dns/
H A Ddispatch.h364 isc_uint16_t *idp, dns_dispentry_t **resp,
370 isc_uint16_t *idp, dns_dispentry_t **resp);
374 * "*idp" is filled in with the assigned message ID, and *resp is filled in
388 *\li "resp" be non-NULL and *resp be NULL
409 dns_dispatch_removeresponse(dns_dispentry_t **resp,
417 *\li "resp" != NULL and "*resp" contain a value previously allocated
421 * argument to dns_dispatch_addresponse() when allocating '*resp'.
425 dns_dispatch_getentrysocket(dns_dispentry_t *resp);
[all...]
/netbsd-6-1-5-RELEASE/sys/arch/prep/stand/boot/
H A Dboot.c70 boot(void *resp, u_long loadaddr) argument
95 if (resp) {
96 memcpy(&residual, resp, sizeof(residual));
122 btinfo_clock.ticks_per_sec = resp ?
/netbsd-6-1-5-RELEASE/sys/dev/ieee1394/
H A Dsbp.h90 resp:2, member in struct:sbp_status
96 resp:2,
109 /* resp */
115 /* status (resp == 0) */
133 /* status (resp == 1) */
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tcs/rpc/tcstp/
H A Drpc_caps_tpm.c38 BYTE *resp; local
68 &resp);
76 free(resp);
79 if (setData(TCSD_PACKET_TYPE_PBYTE, 1, resp, respSize, &data->comm)) {
80 free(resp);
83 free(resp);
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/rpc/tcstp/
H A Drpc_caps_tpm.c34 BYTE ** resp) /* out */
62 *resp = (BYTE *) malloc(*respSize);
63 if (*resp == NULL) {
68 if (getData(TCSD_PACKET_TYPE_PBYTE, 1, *resp, *respSize, &hte->comm)) {
69 free(*resp);
88 BYTE ** resp, /* out */
29 RPC_GetTPMCapability_TP(struct host_table_entry *hte, TCPA_CAPABILITY_AREA capArea, UINT32 subCapSize, BYTE * subCap, UINT32 * respSize, BYTE ** resp) argument
79 RPC_GetCapabilitySigned_TP(struct host_table_entry *hte, TCS_KEY_HANDLE keyHandle, TCPA_NONCE antiReplay, TCPA_CAPABILITY_AREA capArea, UINT32 subCapSize, BYTE * subCap, TPM_AUTH * privAuth, TCPA_VERSION * Version, UINT32 * respSize, BYTE ** resp, UINT32 * sigSize, BYTE ** sig) argument
/netbsd-6-1-5-RELEASE/external/bsd/top/dist/
H A Dutils.c307 char *resp = NULL; local
317 resp = result = emalloc(cnt);
321 resp = strcpyend(resp, p);
324 resp = strcpyend(resp, ", ");
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/
H A Deap_ikev2.c140 struct wpabuf *resp; local
183 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, plen,
185 if (resp == NULL)
188 wpabuf_put_u8(resp, flags); /* Flags */
190 wpabuf_put_be32(resp, wpabuf_len(data->out_buf));
192 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used,
197 const u8 *msg = wpabuf_head(resp);
198 size_t len = wpabuf_len(resp);
202 msg, len, wpabuf_put(resp, icv_len));
249 return resp;
[all...]
H A Deap.c761 struct wpabuf *resp; local
768 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_EXPANDED,
770 if (resp == NULL)
773 wpabuf_put_be24(resp, EAP_VENDOR_IETF);
774 wpabuf_put_be32(resp, EAP_TYPE_NAK);
784 wpabuf_put_u8(resp, EAP_TYPE_EXPANDED);
785 wpabuf_put_be24(resp, m->vendor);
786 wpabuf_put_be32(resp, m->method);
793 wpabuf_put_u8(resp, EAP_TYPE_EXPANDED);
794 wpabuf_put_be24(resp, EAP_VENDOR_IET
806 struct wpabuf *resp; local
970 struct wpabuf *resp; local
1054 struct wpabuf *resp; local
2017 struct wpabuf *resp; local
[all...]
H A Deap_wsc.c252 struct wpabuf *resp; local
273 resp = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen,
275 if (resp == NULL)
278 wpabuf_put_u8(resp, data->out_op_code); /* Op-Code */
279 wpabuf_put_u8(resp, flags); /* Flags */
281 wpabuf_put_be16(resp, wpabuf_len(data->out_buf));
283 wpabuf_put_data(resp, wpabuf_head_u8(data->out_buf) + data->out_used,
312 return resp;
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_server/
H A Deap_server_psk.c222 const struct eap_psk_hdr_2 *resp; local
235 if (cpos == NULL || left < sizeof(*resp)) {
239 resp = (const struct eap_psk_hdr_2 *) cpos;
240 cpos = (const u8 *) (resp + 1);
241 left -= sizeof(*resp);
298 resp->rand_p, EAP_PSK_RAND_LEN);
299 os_memcpy(data->rand_p, resp->rand_p, EAP_PSK_RAND_LEN);
321 wpa_hexdump(MSG_DEBUG, "EAP-PSK: MAC_P", resp->mac_p, EAP_PSK_MAC_LEN);
322 if (os_memcmp(mac, resp->mac_p, EAP_PSK_MAC_LEN) != 0) {
338 const struct eap_psk_hdr_4 *resp; local
[all...]
H A Deap_server.c41 static void eap_sm_parseEapResp(struct eap_sm *sm, const struct wpabuf *resp);
866 static void eap_sm_parseEapResp(struct eap_sm *sm, const struct wpabuf *resp) argument
878 if (resp == NULL || wpabuf_len(resp) < sizeof(*hdr)) {
879 wpa_printf(MSG_DEBUG, "EAP: parseEapResp: invalid resp=%p "
880 "len=%lu", resp,
881 resp ? (unsigned long) wpabuf_len(resp) : 0);
885 hdr = wpabuf_head(resp);
887 if (plen > wpabuf_len(resp)) {
939 struct eap_hdr *resp; local
957 struct eap_hdr *resp; local
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/
H A Ddispatch.c183 dns_dispentry_t *resp; member in struct:dispsocket
311 dns_dispentry_t *resp);
390 request_log(dns_dispatch_t *disp, dns_dispentry_t *resp,
395 request_log(dns_dispatch_t *disp, dns_dispentry_t *resp, argument
409 if (VALID_RESPONSE(resp)) {
410 isc_sockaddr_format(&resp->host, peerbuf, sizeof(peerbuf));
413 "dispatch %p response %p %s: %s", disp, resp,
418 "dispatch %p req/resp %p: %s", disp, resp,
655 * Find the next entry after 'resp' i
659 linear_next(dns_qid_t *qid, dns_dispentry_t *resp) argument
1175 dns_dispentry_t *resp = NULL; local
1466 dns_dispentry_t *resp; local
3067 dns_dispatch_addresponse2(dns_dispatch_t *disp, isc_sockaddr_t *dest, isc_task_t *task, isc_taskaction_t action, void *arg, dns_messageid_t *idp, dns_dispentry_t **resp, isc_socketmgr_t *sockmgr) argument
3251 dns_dispatch_addresponse(dns_dispatch_t *disp, isc_sockaddr_t *dest, isc_task_t *task, isc_taskaction_t action, void *arg, dns_messageid_t *idp, dns_dispentry_t **resp) argument
3276 dns_dispatch_removeresponse(dns_dispentry_t **resp, dns_dispatchevent_t **sockevent) argument
3395 dns_dispentry_t *resp; local
3446 dns_dispatch_getentrysocket(dns_dispentry_t *resp) argument
[all...]
/netbsd-6-1-5-RELEASE/sys/arch/evbsh3/t_sh7706lan/
H A Dssumci.c359 uint16_t resp; local
379 resp = ssumci_getc();
380 if (!(resp & 0x80) && timo <= (MMC_TIME_OVER - 2))
390 resp |= (uint16_t) ssumci_getc() << 8;
396 DPRINTF(1, ("R3 resp: %#x\n", cmd->c_resp[1]));
398 cmd->c_resp[0] = resp;
399 if (resp != 0 && resp != R1_SPI_IDLE) {
400 DPRINTF(1,("response error: %#x\n", resp));
404 DPRINTF(1, ("R1 resp
[all...]
H A Dscimci.c422 uint16_t resp; local
450 while ((resp = scimci_getc()) & 0x80) {
460 resp |= (uint16_t)scimci_getc() << 8;
466 DPRINTF(1, ("R3 resp: %#x\n", cmd->c_resp[1]));
470 cmd->c_resp[0] = resp;
471 if (resp != 0 && resp != R1_SPI_IDLE) {
473 device_xname(sc->sc_dev), resp));
477 DPRINTF(1, ("R1 resp: %#x\n", resp));
[all...]
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/smtp/
H A Dsmtp.h383 #define SMTP_RESP_FAKE(resp, _dsn) \
384 ((resp)->code = 0, \
385 (resp)->dsn = (_dsn), \
386 (resp)->str = DSN_BY_LOCAL_MTA, \
387 (resp))
H A Dsmtp_sasl_auth_cache.c16 /* void smtp_sasl_auth_cache_store(auth_cache, session, resp)
19 /* const SMTP_RESP *resp;
55 /* .IP resp
255 const SMTP_RESP *resp)
262 resp->dsn, resp->str);
253 smtp_sasl_auth_cache_store(SMTP_SASL_AUTH_CACHE *auth_cache, const SMTP_SESSION *session, const SMTP_RESP *resp) argument
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/
H A Dtsp_caps_tpm.c79 BYTE** resp) /* out */
115 if ((*resp = malloc(*respLen)) == NULL) {
121 Trspi_UnloadBlob(&offset, *respLen, dec, *resp);
74 Transport_GetTPMCapability(TSS_HCONTEXT tspContext, TPM_CAPABILITY_AREA capArea, UINT32 subCapLen, BYTE* subCap, UINT32* respLen, BYTE** resp) argument
/netbsd-6-1-5-RELEASE/lib/libc/rpc/
H A Dpmap_rmt.c90 pmap_rmtcall(addr, prog, vers, proc, xdrargs, argsp, xdrres, resp, tout,
95 caddr_t argsp, resp;
117 r.results_ptr = resp;
/netbsd-6-1-5-RELEASE/games/backgammon/backgammon/
H A Dextra.c58 int resp; /* response to y/n */ local
85 if ((resp = yorn('R')) == 2) {
93 if (resp) {
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/bn/
H A Dbn_div.c186 BN_ULONG *resp,*wnump; local
288 resp= &(res->d[loop-1]);
302 *resp=1;
309 * the resp pointer */
313 resp--;
315 for (i=0; i<loop-1; i++, wnump--, resp--)
426 *resp = q;
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tcs/
H A Dtcsi_caps_tpm.c36 BYTE ** resp) /* out */
57 result = tpm_rsp_parse(TPM_ORD_GetCapability, txBlob, paramSize, respSize, resp,
31 TCSP_GetCapability_Internal(TCS_CONTEXT_HANDLE hContext, TCPA_CAPABILITY_AREA capArea, UINT32 subCapSize, BYTE * subCap, UINT32 * respSize, BYTE ** resp) argument
/netbsd-6-1-5-RELEASE/distrib/mac68k/miniroot/
H A Dinstall.md46 TERM="$resp"
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/ap/
H A Ddrv_callbacks.c119 int resp; local
124 resp = WLAN_REASON_GROUP_CIPHER_NOT_VALID;
126 resp = WLAN_REASON_PAIRWISE_CIPHER_NOT_VALID;
128 resp = WLAN_REASON_AKMP_NOT_VALID;
131 resp = WLAN_REASON_INVALID_IE;
133 resp = WLAN_REASON_GROUP_CIPHER_NOT_VALID;
136 resp = WLAN_REASON_INVALID_IE;
137 hapd->drv.sta_disassoc(hapd, sta->addr, resp);
/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/cleanup/
H A Dcleanup_milter.c1816 const char *resp)
1825 msg_info("%s: %s", myname, resp);
1832 strcmp(resp, STR(state->milter_hbc_reply)) == 0)
1846 state->queue_id, resp);
1862 switch (resp[0]) {
1895 CLEANUP_MILTER_SET_SMTP_REPLY(state, resp);
1899 text = resp + 4;
1902 CLEANUP_MILTER_SET_SMTP_REPLY(state, resp);
1906 text = resp + 4;
1909 msg_panic("%s: unexpected mail filter reply: %s", myname, resp);
1815 cleanup_milter_apply(CLEANUP_STATE *state, const char *event, const char *resp) argument
1965 const char *resp; local
2006 const char *resp; local
2065 const char *resp; local
2103 const char *resp; local
2344 const char *resp = 0; local
[all...]
/netbsd-6-1-5-RELEASE/sys/dev/pckbport/
H A Dpckbd.c265 u_char cmd[1], resp[1]; local
273 sc->id->t_kbcslot, cmd, 1, 1, resp, 1);
276 if (resp[0] != KBR_RSTDONE)
278 resp[0]);
295 u_char cmd[1], resp[1]; local
312 res = pckbport_poll_cmd(pa->pa_tag, pa->pa_slot, cmd, 1, 1, resp, 1);
322 if (resp[0] != KBR_RSTDONE) {
323 printf("pckbdprobe: reset response 0x%x\n", resp[0]);

Completed in 301 milliseconds

12345678