Searched refs:response (Results 1 - 25 of 169) sorted by relevance

1234567

/freebsd-10-stable/sys/cam/scsi/
H A Dsmp_all.c275 * Decode the SMP REPORT GENERAL response. The format is current as of SPL
280 smp_report_general_sbuf(struct smp_report_general_response *response, argument
285 response->response_len,
286 response->response_len * SMP_WORD_LEN);
288 scsi_2btoul(response->expander_change_count));
290 scsi_2btoul(response->expander_route_indexes));
292 smp_yesno(response->long_response &
294 sbuf_printf(sb, "Number of Phys: %d\n", response->num_phys);
296 smp_yesno(response->config_bits0 &
299 smp_yesno(response
419 smp_report_manuf_info_sbuf(struct smp_report_manuf_info_response *response, int response_len, struct sbuf *sb) argument
491 smp_report_general(struct ccb_smpio *smpio, uint32_t retries, void (*cbfcnp)(struct cam_periph *, union ccb *), struct smp_report_general_request *request, int request_len, uint8_t *response, int response_len, int long_response, uint32_t timeout) argument
520 smp_discover(struct ccb_smpio *smpio, uint32_t retries, void (*cbfcnp)(struct cam_periph *, union ccb *), struct smp_discover_request *request, int request_len, uint8_t *response, int response_len, int long_response, int ignore_zone_group, int phy, uint32_t timeout) argument
551 smp_report_manuf_info(struct ccb_smpio *smpio, uint32_t retries, void (*cbfcnp)(struct cam_periph *, union ccb *), struct smp_report_manuf_info_request *request, int request_len, uint8_t *response, int response_len, int long_response, uint32_t timeout) argument
580 smp_phy_control(struct ccb_smpio *smpio, uint32_t retries, void (*cbfcnp)(struct cam_periph *, union ccb *), struct smp_phy_control_request *request, int request_len, uint8_t *response, int response_len, int long_response, uint32_t expected_exp_change_count, int phy, int phy_op, int update_pp_timeout_val, uint64_t attached_device_name, int prog_min_prl, int prog_max_prl, int slumber_partial, int pp_timeout_value, uint32_t timeout) argument
[all...]
/freebsd-10-stable/contrib/ipfilter/l4check/
H A Dl4check.conf18 response timeout 4
19 response string <HTML>
20 #response file http.ok
/freebsd-10-stable/contrib/wpa/src/eap_common/
H A Dchap.c16 size_t challenge_len, u8 *response)
27 return md5_vector(3, addr, len, response);
15 chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, size_t challenge_len, u8 *response) argument
H A Dchap.h15 size_t challenge_len, u8 *response);
/freebsd-10-stable/contrib/llvm/tools/lldb/source/Plugins/Process/gdb-remote/
H A DGDBRemoteCommunicationServer.cpp379 StreamString response;
385 response.PutCString("triple:");
386 response.PutCStringAsRawHex8(host_triple.getTriple().c_str());
387 response.Printf (";ptrsize:%u;",host_arch.GetAddressByteSize());
392 response.PutCString("distribution_id:");
393 response.PutCStringAsRawHex8(distribution_id);
394 response.PutCString(";");
400 response.Printf ("cputype:%u;", cpu);
402 response.Printf ("cpusubtype:%u;", sub);
405 response
359 assert(packet_len < (int)sizeof(packet)); return SendPacketNoLock (packet, packet_len); } GDBRemoteCommunication::PacketResult GDBRemoteCommunicationServer::SendOKResponse () { return SendPacketNoLock (�, 2); } bool GDBRemoteCommunicationServer::HandshakeWithClient(Error *error_ptr) { return GetAck() == PacketResult::Success; } GDBRemoteCommunication::PacketResult GDBRemoteCommunicationServer::Handle_qHostInfo (StringExtractorGDBRemote &packet) { StreamString response; ArchSpec host_arch (Host::GetArchitecture ()); const llvm::Triple &host_triple = host_arch.GetTriple(); response.PutCString(�); response.PutCStringAsRawHex8(host_triple.getTriple().c_str()); response.Printf (�,host_arch.GetAddressByteSize()); const char* distribution_id = host_arch.GetDistributionId ().AsCString (); if (distribution_id) { response.PutCString(�); response.PutCStringAsRawHex8(distribution_id); response.PutCString(�); } uint32_t cpu = host_arch.GetMachOCPUType(); uint32_t sub = host_arch.GetMachOCPUSubType(); if (cpu != LLDB_INVALID_CPUTYPE) response.Printf (�, cpu); if (sub != LLDB_INVALID_CPUTYPE) response.Printf (�, sub); if (cpu == ArchSpec::kCore_arm_any) response.Printf(�); else response.Printf(�); switch (lldb::endian::InlHostByteOrder()) { case eByteOrderBig: response.PutCString (�); break; case eByteOrderLittle: response.PutCString (�); break; case eByteOrderPDP: response.PutCString (�); break; default: response.PutCString (�); break; } uint32_t major = UINT32_MAX; uint32_t minor = UINT32_MAX; uint32_t update = UINT32_MAX; if (Host::GetOSVersion (major, minor, update)) { if (major != UINT32_MAX) { response.Printf(�, major); if (minor != UINT32_MAX) { response.Printf(�, minor); if (update != UINT32_MAX) response.Printf(�, update); } response.PutChar(�); } } std::string s; if (Host::GetOSBuildString (s)) { response.PutCString (�); response.PutCStringAsRawHex8(s.c_str()); response.PutChar(�); } if (Host::GetOSKernelDescription (s)) { response.PutCString (�); response.PutCStringAsRawHex8(s.c_str()); response.PutChar(�); } response.PutCString (�); response.PutCStringAsRawHex8(�); response.PutChar(�); return SendPacketNoLock (response.GetData(), response.GetSize()); } static void CreateProcessInfoResponse (const ProcessInstanceInfo &proc_info, StreamString &response) { response.Printf (� PRIu64 � PRIu64 �, proc_info.GetProcessID(), proc_info.GetParentProcessID(), proc_info.GetUserID(), proc_info.GetGroupID(), proc_info.GetEffectiveUserID(), proc_info.GetEffectiveGroupID()); response.PutCString (�); response.PutCStringAsRawHex8(proc_info.GetName()); response.PutChar(�); const ArchSpec &proc_arch = proc_info.GetArchitecture(); if (proc_arch.IsValid()) { const llvm::Triple &proc_triple = proc_arch.GetTriple(); response.PutCString(�); response.PutCStringAsRawHex8(proc_triple.getTriple().c_str()); response.PutChar(�); } } GDBRemoteCommunication::PacketResult GDBRemoteCommunicationServer::Handle_qProcessInfoPID (StringExtractorGDBRemote &packet) { packet.SetFilePos(::strlen (�)); lldb::pid_t pid = packet.GetU32 (LLDB_INVALID_PROCESS_ID); if (pid != LLDB_INVALID_PROCESS_ID) { ProcessInstanceInfo proc_info; if (Host::GetProcessInfo(pid, proc_info)) { StreamString response; CreateProcessInfoResponse (proc_info, response); return SendPacketNoLock (response.GetData(), response.GetSize()); } } return SendErrorResponse (1); } GDBRemoteCommunication::PacketResult GDBRemoteCommunicationServer::Handle_qfProcessInfo (StringExtractorGDBRemote &packet) { m_proc_infos_index = 0; m_proc_infos.Clear(); ProcessInstanceInfoMatch match_info; packet.SetFilePos(::strlen (�)); if (packet.GetChar() == �) { std::string key; std::string value; while (packet.GetNameColonValue(key, value)) { bool success = true; if (key.compare(�) == 0) { StringExtractor extractor; extractor.GetStringRef().swap(value); extractor.GetHexByteString (value); match_info.GetProcessInfo().GetExecutableFile().SetFile(value.c_str(), false); } else if (key.compare(�) == 0) { if (value.compare(�) == 0) { match_info.SetNameMatchType (eNameMatchEquals); } else if (value.compare(�) == 0) { match_info.SetNameMatchType (eNameMatchStartsWith); } else if (value.compare(�) == 0) { match_info.SetNameMatchType (eNameMatchEndsWith); } else if (value.compare(�) == 0) { match_info.SetNameMatchType (eNameMatchContains); } else if (value.compare(�) == 0) { match_info.SetNameMatchType (eNameMatchRegularExpression); } else { success = false; } } else if (key.compare(�) == 0) { match_info.GetProcessInfo().SetProcessID (Args::StringToUInt32(value.c_str(), LLDB_INVALID_PROCESS_ID, 0, &success)); } else if (key.compare(�) == 0) { match_info.GetProcessInfo().SetParentProcessID (Args::StringToUInt32(value.c_str(), LLDB_INVALID_PROCESS_ID, 0, &success)); } else if (key.compare(�) == 0) { match_info.GetProcessInfo().SetUserID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success)); } else if (key.compare(�) == 0) { match_info.GetProcessInfo().SetGroupID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success)); } else if (key.compare(�) == 0) { match_info.GetProcessInfo().SetEffectiveUserID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success)); } else if (key.compare(�) == 0) { match_info.GetProcessInfo().SetEffectiveGroupID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success)); } else if (key.compare(�) == 0) { match_info.SetMatchAllUsers(Args::StringToBoolean(value.c_str(), false, &success)); } else if (key.compare(�) == 0) { match_info.GetProcessInfo().GetArchitecture().SetTriple (value.c_str(), NULL); } else { success = false; } if (!success) return SendErrorResponse (2); } } if (Host::FindProcesses (match_info, m_proc_infos)) { return Handle_qsProcessInfo (packet); } return SendErrorResponse (3); } GDBRemoteCommunication::PacketResult GDBRemoteCommunicationServer::Handle_qsProcessInfo (StringExtractorGDBRemote &packet) { if (m_proc_infos_index < m_proc_infos.GetSize()) { StreamString response; CreateProcessInfoResponse (m_proc_infos.GetProcessInfoAtIndex(m_proc_infos_index), response); ++m_proc_infos_index; return SendPacketNoLock (response.GetData(), response.GetSize()); } return SendErrorResponse (4); } GDBRemoteCommunication::PacketResult GDBRemoteCommunicationServer::Handle_qUserName (StringExtractorGDBRemote &packet) { packet.SetFilePos(::strlen (�)); uint32_t uid = packet.GetU32 (UINT32_MAX); if (uid != UINT32_MAX) { std::string name; if (Host::GetUserName (uid, name)) { StreamString response; response.PutCStringAsRawHex8 (name.c_str()); return SendPacketNoLock (response.GetData(), response.GetSize()); } } return SendErrorResponse (5); } GDBRemoteCommunication::PacketResult GDBRemoteCommunicationServer::Handle_qGroupName (StringExtractorGDBRemote &packet) { packet.SetFilePos(::strlen (�)); uint32_t gid = packet.GetU32 (UINT32_MAX); if (gid != UINT32_MAX) { std::string name; if (Host::GetGroupName (gid, name)) { StreamString response; response.PutCStringAsRawHex8 (name.c_str()); return SendPacketNoLock (response.GetData(), response.GetSize()); } } return SendErrorResponse (6); } GDBRemoteCommunication::PacketResult GDBRemoteCommunicationServer::Handle_qSpeedTest (StringExtractorGDBRemote &packet) { packet.SetFilePos(::strlen (�)); std::string key; std::string value; bool success = packet.GetNameColonValue(key, value); if (success && key.compare(�) == 0) { uint32_t response_size = Args::StringToUInt32(value.c_str(), 0, 0, &success); if (success) { if (response_size == 0) return SendOKResponse(); StreamString response; uint32_t bytes_left = response_size; response.PutCString(�); while (bytes_left > 0) { if (bytes_left >= 26) argument
[all...]
H A DGDBRemoteCommunicationClient.cpp127 StringExtractorGDBRemote response; local
129 const uint32_t timeout_usec = 10 * 1000; // Wait for 10 ms for a response
131 packet_result = WaitForPacketWithTimeoutMicroSecondsNoLock (response, timeout_usec);
134 // was sent and _any_ response (including UNIMPLEMENTED) was received),
135 // or false if no response was received. This quickly tells us if we have
208 StringExtractorGDBRemote response; local
209 if (SendPacketAndWaitForResponse("QStartNoAckMode", response, false) == PacketResult::Success)
211 if (response.IsOKResponse())
229 StringExtractorGDBRemote response; local
230 if (SendPacketAndWaitForResponse("QListThreadsInStopReply", response, fals
245 StringExtractorGDBRemote response; local
265 StringExtractorGDBRemote response; local
328 StringExtractorGDBRemote response; local
365 StringExtractorGDBRemote response; local
380 StringExtractorGDBRemote response; local
443 StringExtractorGDBRemote response; local
517 SendPacketAndWaitForResponse( const char *payload, StringExtractorGDBRemote &response, bool send_async ) argument
531 SendPacketAndWaitForResponseNoLock(const char *payload, size_t payload_length, StringExtractorGDBRemote &response) argument
542 SendPacketAndWaitForResponse( const char *payload, size_t payload_length, StringExtractorGDBRemote &response, bool send_async ) argument
1131 StringExtractorGDBRemote response; local
1145 StringExtractorGDBRemote response; local
1208 StringExtractorGDBRemote response; local
1249 StringExtractorGDBRemote response; local
1294 StringExtractorGDBRemote response; local
1394 StringExtractorGDBRemote response; local
[all...]
/freebsd-10-stable/lib/libc/locale/
H A Drpmatch.c35 rpmatch(const char *response) argument
46 if (regexec(&yes, response, 0, NULL, 0) == 0)
48 else if (regexec(&no, response, 0, NULL, 0) == 0)
/freebsd-10-stable/usr.bin/talk/
H A Dinvite.c71 CTL_RESPONSE response; local
113 ctl_transact(my_machine_addr, msg, DELETE, &response);
115 ctl_transact(his_machine_addr, msg, DELETE, &response);
151 * Transmit the invitation and process the response
156 CTL_RESPONSE response; local
159 ctl_transact(his_machine_addr, msg, ANNOUNCE, &response);
160 remote_id = response.id_num;
161 if (response.answer != SUCCESS) {
162 if (response.answer < NANSWERS)
163 message(answers[response
[all...]
/freebsd-10-stable/crypto/heimdal/lib/gssapi/ntlm/
H A Diter_cred.c46 krb5_storage *request, *response; local
57 ret = krb5_kcm_call(context, request, &response, &response_data);
67 ret = krb5_ret_uint32(response, &morep);
72 ret = krb5_ret_stringz(response, &user);
74 ret = krb5_ret_stringz(response, &domain);
92 krb5_storage_free(response);
/freebsd-10-stable/lib/libpam/modules/pam_opie/
H A Dpam_opie.c68 char *response; local
118 retval = pam_prompt(pamh, style, &response,
125 PAM_LOG("Completed challenge %d: %s", i, response);
127 if (response[0] != '\0')
134 pam_set_item(pamh, PAM_AUTHTOK, response);
138 * But it returns -1 even if the response string isn't in the form
142 retval = opieverify(&opie, response);
143 free(response);
/freebsd-10-stable/usr.sbin/iscsid/
H A Ddiscovery.c46 struct pdu *response; local
49 response = pdu_new(conn);
50 pdu_receive(response);
51 if (response->pdu_bhs->bhs_opcode != ISCSI_BHS_OPCODE_TEXT_RESPONSE)
53 response->pdu_bhs->bhs_opcode);
54 bhstr = (struct iscsi_bhs_text_response *)response->pdu_bhs;
71 return (response);
98 struct pdu *response; local
101 response = pdu_new(conn);
102 pdu_receive(response);
171 struct pdu *request, *response; local
[all...]
H A Dlogin.c47 login_nsg(const struct pdu *response) argument
51 bhslr = (struct iscsi_bhs_login_response *)response->pdu_bhs;
190 login_handle_redirection(struct connection *conn, struct pdu *response) argument
196 bhslr = (struct iscsi_bhs_login_response *)response->pdu_bhs;
200 keys_load(response_keys, response);
219 struct pdu *response; local
224 response = pdu_new(conn);
225 pdu_receive(response);
226 if (response->pdu_bhs->bhs_opcode != ISCSI_BHS_OPCODE_LOGIN_RESPONSE) {
228 response
435 struct pdu *request, *response; local
545 login_send_chap_r(struct pdu *response) argument
630 login_verify_mutual(const struct pdu *response) argument
675 struct pdu *response; local
703 struct pdu *request, *response; local
[all...]
/freebsd-10-stable/contrib/wpa/src/crypto/
H A Dms_funcs.h15 u8 *response);
20 u8 *response);
25 const u8 *nt_response, u8 *response);
30 const u8 *nt_response, u8 *response);
32 size_t password_len, u8 *response);
35 u8 *response);
/freebsd-10-stable/sbin/camcontrol/
H A Dutil.c168 int response = -1; local
174 response = 1;
176 response = 0;
181 response = 0;
182 } while (response == -1);
183 return (response);
/freebsd-10-stable/contrib/ofed/libibverbs/src/
H A Dkern_abi.h73 * length of the command block and response buffer if any in 32-bit
82 __u64 response; member in struct:ibv_get_context
93 __u64 response; member in struct:ibv_get_event_fds
/freebsd-10-stable/contrib/opie/
H A Dopiekey.c5 and outputs a response.
141 char response[OPIE_RESPONSE_MAX + 1]; local
201 fprintf(stderr, "%s: %s: unknown response type.\n", argv[0], optarg);
220 fprintf(stderr, "Using the %s algorithm to compute response.\n", algnames[algorithm]);
304 opiebtoh(response, &key);
306 opiebtoe(response, &key);
309 strcpy(response, "word:");
310 strcat(response, opiebtoe(buf, &key));
313 strcpy(response, "hex:");
314 strcat(response, opiebto
[all...]
H A Dopiegen.c30 char response[OPIE_RESPONSE_MAX+1]; local
67 switch (result = opiegenerator(buffer, secret, response)) {
78 fputs(response, stdout);
/freebsd-10-stable/libexec/talkd/
H A Dtalkd.c69 static CTL_RESPONSE response; variable
118 process_request(mp, &response);
120 cc = sendto(STDIN_FILENO, (char *)&response,
121 sizeof(response), 0, &ctl_addr, sizeof(ctl_addr));
122 if (cc != sizeof (response))
/freebsd-10-stable/sys/boot/arm/at91/libat91/
H A Dsd-card.c109 // wait for CMDRDY Status flag to read the response
132 // Test error ==> if crc error and response R3 ==> don't check error
261 MCI_GetCSD(unsigned int rca, unsigned int *response) argument
267 response[0] = AT91C_BASE_MCI->MCI_RSPR[0];
268 response[1] = AT91C_BASE_MCI->MCI_RSPR[1];
269 response[2] = AT91C_BASE_MCI->MCI_RSPR[2];
270 response[3] = AT91C_BASE_MCI->MCI_RSPR[3];
282 unsigned int response=0x0; local
287 while( (response & AT91C_CARD_POWER_UP_BUSY) != AT91C_CARD_POWER_UP_BUSY ) {
291 response
301 MCI_SDCard_GetCID(unsigned int *response) argument
[all...]
/freebsd-10-stable/usr.sbin/ctld/
H A Dlogin.c48 login_set_nsg(struct pdu *response, int nsg) argument
56 bhslr = (struct iscsi_bhs_login_response *)response->pdu_bhs;
74 login_set_csg(struct pdu *response, int csg) argument
82 bhslr = (struct iscsi_bhs_login_response *)response->pdu_bhs;
101 * without sending response ("A target receiving any PDU
151 struct pdu *response; local
159 response = pdu_new_response(request);
160 bhslr2 = (struct iscsi_bhs_login_response *)response->pdu_bhs;
162 login_set_csg(response, BHSLR_STAGE_SECURITY_NEGOTIATION);
170 return (response);
176 struct pdu *response; local
258 struct pdu *response; local
340 struct pdu *response; local
620 struct pdu *response; local
679 struct pdu *response; local
747 struct pdu *request, *response; local
771 struct pdu *request, *response; local
[all...]
H A Ddiscovery.c86 struct pdu *response; local
94 response = pdu_new_response(request);
95 bhstr2 = (struct iscsi_bhs_text_response *)response->pdu_bhs;
105 return (response);
144 struct pdu *response; local
152 response = pdu_new_response(request);
153 bhslr2 = (struct iscsi_bhs_logout_response *)response->pdu_bhs;
162 return (response);
278 struct pdu *request, *response; local
295 response
[all...]
/freebsd-10-stable/contrib/ofed/librdmacm/include/rdma/
H A Drdma_cma_abi.h78 __u64 response; member in struct:ucma_abi_create_id
88 __u64 response; member in struct:ucma_abi_destroy_id
98 __u64 response; member in struct:ucma_abi_bind_addr
116 __u64 response; member in struct:ucma_abi_query_route
185 __u64 response; member in struct:ucma_abi_init_qp_attr
196 __u64 response; /* ucma_abi_create_id_resp */ member in struct:ucma_abi_join_mcast
203 __u64 response; member in struct:ucma_abi_get_event
226 __u64 response; member in struct:ucma_abi_migrate_id
/freebsd-10-stable/sys/ofed/include/rdma/
H A Drdma_user_cm.h78 __u64 response; member in struct:rdma_ucm_create_id
88 __u64 response; member in struct:rdma_ucm_destroy_id
98 __u64 response; member in struct:rdma_ucm_bind_addr
116 __u64 response; member in struct:rdma_ucm_query_route
184 __u64 response; member in struct:rdma_ucm_init_qp_attr
195 __u64 response; /* rdma_ucm_create_id_resp */ member in struct:rdma_ucm_join_mcast
202 __u64 response; member in struct:rdma_ucm_get_event
237 __u64 response; member in struct:rdma_ucm_migrate_id
/freebsd-10-stable/crypto/heimdal/lib/ipc/
H A Dclient.c94 const heim_idata *request, heim_idata *response,
154 response->data = malloc(replyout_length);
155 if (response->data == NULL) {
160 memcpy(response->data, replyout, replyout_length);
161 response->length = replyout_length;
165 response->data = malloc(replyin_length);
166 if (response->data == NULL)
168 memcpy(response->data, replyin, replyin_length);
169 response->length = replyin_length;
193 heim_idata response; local
93 mach_ipc(void *ctx, const heim_idata *request, heim_idata *response, heim_icred *cred) argument
445 door_ipc(void *ctx, const heim_idata *request, heim_idata *response, heim_icred *cred) argument
[all...]
/freebsd-10-stable/contrib/serf/auth/
H A Dauth.c31 serf_bucket_t *response,
97 /* Reads and discards all bytes in the response body. */
98 static apr_status_t discard_body(serf_bucket_t *response) argument
105 status = serf_bucket_read(response, SERF_READ_ALL_AVAIL, &data, &len);
116 * handle_auth_header is called for each header in the response. It filters
126 serf_bucket_t *response,
195 status = handler(code, request, response,
263 serf_bucket_t *response,
282 hdrs = serf_bucket_response_get_headers(response);
298 and handle each header in the response, lookin
26 default_auth_response_handler(const serf__authn_scheme_t *scheme, peer_t peer, int code, serf_connection_t *conn, serf_request_t *request, serf_bucket_t *response, apr_pool_t *pool) argument
122 handle_auth_headers(int code, void *baton, apr_hash_t *hdrs, serf_request_t *request, serf_bucket_t *response, apr_pool_t *pool) argument
261 dispatch_auth(int code, serf_request_t *request, serf_bucket_t *response, void *baton, apr_pool_t *pool) argument
316 serf__handle_auth_response(int *consumed_response, serf_request_t *request, serf_bucket_t *response, void *baton, apr_pool_t *pool) argument
[all...]

Completed in 301 milliseconds

1234567