/freebsd-10-stable/sys/cam/scsi/ |
H A D | smp_all.c | 275 * Decode the SMP REPORT GENERAL response. The format is current as of SPL 280 smp_report_general_sbuf(struct smp_report_general_response *response, argument 285 response->response_len, 286 response->response_len * SMP_WORD_LEN); 288 scsi_2btoul(response->expander_change_count)); 290 scsi_2btoul(response->expander_route_indexes)); 292 smp_yesno(response->long_response & 294 sbuf_printf(sb, "Number of Phys: %d\n", response->num_phys); 296 smp_yesno(response->config_bits0 & 299 smp_yesno(response 419 smp_report_manuf_info_sbuf(struct smp_report_manuf_info_response *response, int response_len, struct sbuf *sb) argument 491 smp_report_general(struct ccb_smpio *smpio, uint32_t retries, void (*cbfcnp)(struct cam_periph *, union ccb *), struct smp_report_general_request *request, int request_len, uint8_t *response, int response_len, int long_response, uint32_t timeout) argument 520 smp_discover(struct ccb_smpio *smpio, uint32_t retries, void (*cbfcnp)(struct cam_periph *, union ccb *), struct smp_discover_request *request, int request_len, uint8_t *response, int response_len, int long_response, int ignore_zone_group, int phy, uint32_t timeout) argument 551 smp_report_manuf_info(struct ccb_smpio *smpio, uint32_t retries, void (*cbfcnp)(struct cam_periph *, union ccb *), struct smp_report_manuf_info_request *request, int request_len, uint8_t *response, int response_len, int long_response, uint32_t timeout) argument 580 smp_phy_control(struct ccb_smpio *smpio, uint32_t retries, void (*cbfcnp)(struct cam_periph *, union ccb *), struct smp_phy_control_request *request, int request_len, uint8_t *response, int response_len, int long_response, uint32_t expected_exp_change_count, int phy, int phy_op, int update_pp_timeout_val, uint64_t attached_device_name, int prog_min_prl, int prog_max_prl, int slumber_partial, int pp_timeout_value, uint32_t timeout) argument [all...] |
/freebsd-10-stable/contrib/ipfilter/l4check/ |
H A D | l4check.conf | 18 response timeout 4 19 response string <HTML> 20 #response file http.ok
|
/freebsd-10-stable/contrib/wpa/src/eap_common/ |
H A D | chap.c | 16 size_t challenge_len, u8 *response) 27 return md5_vector(3, addr, len, response); 15 chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, size_t challenge_len, u8 *response) argument
|
H A D | chap.h | 15 size_t challenge_len, u8 *response);
|
/freebsd-10-stable/contrib/llvm/tools/lldb/source/Plugins/Process/gdb-remote/ |
H A D | GDBRemoteCommunicationServer.cpp | 379 StreamString response; 385 response.PutCString("triple:"); 386 response.PutCStringAsRawHex8(host_triple.getTriple().c_str()); 387 response.Printf (";ptrsize:%u;",host_arch.GetAddressByteSize()); 392 response.PutCString("distribution_id:"); 393 response.PutCStringAsRawHex8(distribution_id); 394 response.PutCString(";"); 400 response.Printf ("cputype:%u;", cpu); 402 response.Printf ("cpusubtype:%u;", sub); 405 response 359 assert(packet_len < (int)sizeof(packet)); return SendPacketNoLock (packet, packet_len); } GDBRemoteCommunication::PacketResult GDBRemoteCommunicationServer::SendOKResponse () { return SendPacketNoLock (�, 2); } bool GDBRemoteCommunicationServer::HandshakeWithClient(Error *error_ptr) { return GetAck() == PacketResult::Success; } GDBRemoteCommunication::PacketResult GDBRemoteCommunicationServer::Handle_qHostInfo (StringExtractorGDBRemote &packet) { StreamString response; ArchSpec host_arch (Host::GetArchitecture ()); const llvm::Triple &host_triple = host_arch.GetTriple(); response.PutCString(�); response.PutCStringAsRawHex8(host_triple.getTriple().c_str()); response.Printf (�,host_arch.GetAddressByteSize()); const char* distribution_id = host_arch.GetDistributionId ().AsCString (); if (distribution_id) { response.PutCString(�); response.PutCStringAsRawHex8(distribution_id); response.PutCString(�); } uint32_t cpu = host_arch.GetMachOCPUType(); uint32_t sub = host_arch.GetMachOCPUSubType(); if (cpu != LLDB_INVALID_CPUTYPE) response.Printf (�, cpu); if (sub != LLDB_INVALID_CPUTYPE) response.Printf (�, sub); if (cpu == ArchSpec::kCore_arm_any) response.Printf(�); else response.Printf(�); switch (lldb::endian::InlHostByteOrder()) { case eByteOrderBig: response.PutCString (�); break; case eByteOrderLittle: response.PutCString (�); break; case eByteOrderPDP: response.PutCString (�); break; default: response.PutCString (�); break; } uint32_t major = UINT32_MAX; uint32_t minor = UINT32_MAX; uint32_t update = UINT32_MAX; if (Host::GetOSVersion (major, minor, update)) { if (major != UINT32_MAX) { response.Printf(�, major); if (minor != UINT32_MAX) { response.Printf(�, minor); if (update != UINT32_MAX) response.Printf(�, update); } response.PutChar(�); } } std::string s; if (Host::GetOSBuildString (s)) { response.PutCString (�); response.PutCStringAsRawHex8(s.c_str()); response.PutChar(�); } if (Host::GetOSKernelDescription (s)) { response.PutCString (�); response.PutCStringAsRawHex8(s.c_str()); response.PutChar(�); } response.PutCString (�); response.PutCStringAsRawHex8(�); response.PutChar(�); return SendPacketNoLock (response.GetData(), response.GetSize()); } static void CreateProcessInfoResponse (const ProcessInstanceInfo &proc_info, StreamString &response) { response.Printf (� PRIu64 � PRIu64 �, proc_info.GetProcessID(), proc_info.GetParentProcessID(), proc_info.GetUserID(), proc_info.GetGroupID(), proc_info.GetEffectiveUserID(), proc_info.GetEffectiveGroupID()); response.PutCString (�); response.PutCStringAsRawHex8(proc_info.GetName()); response.PutChar(�); const ArchSpec &proc_arch = proc_info.GetArchitecture(); if (proc_arch.IsValid()) { const llvm::Triple &proc_triple = proc_arch.GetTriple(); response.PutCString(�); response.PutCStringAsRawHex8(proc_triple.getTriple().c_str()); response.PutChar(�); } } GDBRemoteCommunication::PacketResult GDBRemoteCommunicationServer::Handle_qProcessInfoPID (StringExtractorGDBRemote &packet) { packet.SetFilePos(::strlen (�)); lldb::pid_t pid = packet.GetU32 (LLDB_INVALID_PROCESS_ID); if (pid != LLDB_INVALID_PROCESS_ID) { ProcessInstanceInfo proc_info; if (Host::GetProcessInfo(pid, proc_info)) { StreamString response; CreateProcessInfoResponse (proc_info, response); return SendPacketNoLock (response.GetData(), response.GetSize()); } } return SendErrorResponse (1); } GDBRemoteCommunication::PacketResult GDBRemoteCommunicationServer::Handle_qfProcessInfo (StringExtractorGDBRemote &packet) { m_proc_infos_index = 0; m_proc_infos.Clear(); ProcessInstanceInfoMatch match_info; packet.SetFilePos(::strlen (�)); if (packet.GetChar() == �) { std::string key; std::string value; while (packet.GetNameColonValue(key, value)) { bool success = true; if (key.compare(�) == 0) { StringExtractor extractor; extractor.GetStringRef().swap(value); extractor.GetHexByteString (value); match_info.GetProcessInfo().GetExecutableFile().SetFile(value.c_str(), false); } else if (key.compare(�) == 0) { if (value.compare(�) == 0) { match_info.SetNameMatchType (eNameMatchEquals); } else if (value.compare(�) == 0) { match_info.SetNameMatchType (eNameMatchStartsWith); } else if (value.compare(�) == 0) { match_info.SetNameMatchType (eNameMatchEndsWith); } else if (value.compare(�) == 0) { match_info.SetNameMatchType (eNameMatchContains); } else if (value.compare(�) == 0) { match_info.SetNameMatchType (eNameMatchRegularExpression); } else { success = false; } } else if (key.compare(�) == 0) { match_info.GetProcessInfo().SetProcessID (Args::StringToUInt32(value.c_str(), LLDB_INVALID_PROCESS_ID, 0, &success)); } else if (key.compare(�) == 0) { match_info.GetProcessInfo().SetParentProcessID (Args::StringToUInt32(value.c_str(), LLDB_INVALID_PROCESS_ID, 0, &success)); } else if (key.compare(�) == 0) { match_info.GetProcessInfo().SetUserID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success)); } else if (key.compare(�) == 0) { match_info.GetProcessInfo().SetGroupID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success)); } else if (key.compare(�) == 0) { match_info.GetProcessInfo().SetEffectiveUserID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success)); } else if (key.compare(�) == 0) { match_info.GetProcessInfo().SetEffectiveGroupID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success)); } else if (key.compare(�) == 0) { match_info.SetMatchAllUsers(Args::StringToBoolean(value.c_str(), false, &success)); } else if (key.compare(�) == 0) { match_info.GetProcessInfo().GetArchitecture().SetTriple (value.c_str(), NULL); } else { success = false; } if (!success) return SendErrorResponse (2); } } if (Host::FindProcesses (match_info, m_proc_infos)) { return Handle_qsProcessInfo (packet); } return SendErrorResponse (3); } GDBRemoteCommunication::PacketResult GDBRemoteCommunicationServer::Handle_qsProcessInfo (StringExtractorGDBRemote &packet) { if (m_proc_infos_index < m_proc_infos.GetSize()) { StreamString response; CreateProcessInfoResponse (m_proc_infos.GetProcessInfoAtIndex(m_proc_infos_index), response); ++m_proc_infos_index; return SendPacketNoLock (response.GetData(), response.GetSize()); } return SendErrorResponse (4); } GDBRemoteCommunication::PacketResult GDBRemoteCommunicationServer::Handle_qUserName (StringExtractorGDBRemote &packet) { packet.SetFilePos(::strlen (�)); uint32_t uid = packet.GetU32 (UINT32_MAX); if (uid != UINT32_MAX) { std::string name; if (Host::GetUserName (uid, name)) { StreamString response; response.PutCStringAsRawHex8 (name.c_str()); return SendPacketNoLock (response.GetData(), response.GetSize()); } } return SendErrorResponse (5); } GDBRemoteCommunication::PacketResult GDBRemoteCommunicationServer::Handle_qGroupName (StringExtractorGDBRemote &packet) { packet.SetFilePos(::strlen (�)); uint32_t gid = packet.GetU32 (UINT32_MAX); if (gid != UINT32_MAX) { std::string name; if (Host::GetGroupName (gid, name)) { StreamString response; response.PutCStringAsRawHex8 (name.c_str()); return SendPacketNoLock (response.GetData(), response.GetSize()); } } return SendErrorResponse (6); } GDBRemoteCommunication::PacketResult GDBRemoteCommunicationServer::Handle_qSpeedTest (StringExtractorGDBRemote &packet) { packet.SetFilePos(::strlen (�)); std::string key; std::string value; bool success = packet.GetNameColonValue(key, value); if (success && key.compare(�) == 0) { uint32_t response_size = Args::StringToUInt32(value.c_str(), 0, 0, &success); if (success) { if (response_size == 0) return SendOKResponse(); StreamString response; uint32_t bytes_left = response_size; response.PutCString(�); while (bytes_left > 0) { if (bytes_left >= 26) argument [all...] |
H A D | GDBRemoteCommunicationClient.cpp | 127 StringExtractorGDBRemote response; local 129 const uint32_t timeout_usec = 10 * 1000; // Wait for 10 ms for a response 131 packet_result = WaitForPacketWithTimeoutMicroSecondsNoLock (response, timeout_usec); 134 // was sent and _any_ response (including UNIMPLEMENTED) was received), 135 // or false if no response was received. This quickly tells us if we have 208 StringExtractorGDBRemote response; local 209 if (SendPacketAndWaitForResponse("QStartNoAckMode", response, false) == PacketResult::Success) 211 if (response.IsOKResponse()) 229 StringExtractorGDBRemote response; local 230 if (SendPacketAndWaitForResponse("QListThreadsInStopReply", response, fals 245 StringExtractorGDBRemote response; local 265 StringExtractorGDBRemote response; local 328 StringExtractorGDBRemote response; local 365 StringExtractorGDBRemote response; local 380 StringExtractorGDBRemote response; local 443 StringExtractorGDBRemote response; local 517 SendPacketAndWaitForResponse( const char *payload, StringExtractorGDBRemote &response, bool send_async ) argument 531 SendPacketAndWaitForResponseNoLock(const char *payload, size_t payload_length, StringExtractorGDBRemote &response) argument 542 SendPacketAndWaitForResponse( const char *payload, size_t payload_length, StringExtractorGDBRemote &response, bool send_async ) argument 1131 StringExtractorGDBRemote response; local 1145 StringExtractorGDBRemote response; local 1208 StringExtractorGDBRemote response; local 1249 StringExtractorGDBRemote response; local 1294 StringExtractorGDBRemote response; local 1394 StringExtractorGDBRemote response; local [all...] |
/freebsd-10-stable/lib/libc/locale/ |
H A D | rpmatch.c | 35 rpmatch(const char *response) argument 46 if (regexec(&yes, response, 0, NULL, 0) == 0) 48 else if (regexec(&no, response, 0, NULL, 0) == 0)
|
/freebsd-10-stable/usr.bin/talk/ |
H A D | invite.c | 71 CTL_RESPONSE response; local 113 ctl_transact(my_machine_addr, msg, DELETE, &response); 115 ctl_transact(his_machine_addr, msg, DELETE, &response); 151 * Transmit the invitation and process the response 156 CTL_RESPONSE response; local 159 ctl_transact(his_machine_addr, msg, ANNOUNCE, &response); 160 remote_id = response.id_num; 161 if (response.answer != SUCCESS) { 162 if (response.answer < NANSWERS) 163 message(answers[response [all...] |
/freebsd-10-stable/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | iter_cred.c | 46 krb5_storage *request, *response; local 57 ret = krb5_kcm_call(context, request, &response, &response_data); 67 ret = krb5_ret_uint32(response, &morep); 72 ret = krb5_ret_stringz(response, &user); 74 ret = krb5_ret_stringz(response, &domain); 92 krb5_storage_free(response);
|
/freebsd-10-stable/lib/libpam/modules/pam_opie/ |
H A D | pam_opie.c | 68 char *response; local 118 retval = pam_prompt(pamh, style, &response, 125 PAM_LOG("Completed challenge %d: %s", i, response); 127 if (response[0] != '\0') 134 pam_set_item(pamh, PAM_AUTHTOK, response); 138 * But it returns -1 even if the response string isn't in the form 142 retval = opieverify(&opie, response); 143 free(response);
|
/freebsd-10-stable/usr.sbin/iscsid/ |
H A D | discovery.c | 46 struct pdu *response; local 49 response = pdu_new(conn); 50 pdu_receive(response); 51 if (response->pdu_bhs->bhs_opcode != ISCSI_BHS_OPCODE_TEXT_RESPONSE) 53 response->pdu_bhs->bhs_opcode); 54 bhstr = (struct iscsi_bhs_text_response *)response->pdu_bhs; 71 return (response); 98 struct pdu *response; local 101 response = pdu_new(conn); 102 pdu_receive(response); 171 struct pdu *request, *response; local [all...] |
H A D | login.c | 47 login_nsg(const struct pdu *response) argument 51 bhslr = (struct iscsi_bhs_login_response *)response->pdu_bhs; 190 login_handle_redirection(struct connection *conn, struct pdu *response) argument 196 bhslr = (struct iscsi_bhs_login_response *)response->pdu_bhs; 200 keys_load(response_keys, response); 219 struct pdu *response; local 224 response = pdu_new(conn); 225 pdu_receive(response); 226 if (response->pdu_bhs->bhs_opcode != ISCSI_BHS_OPCODE_LOGIN_RESPONSE) { 228 response 435 struct pdu *request, *response; local 545 login_send_chap_r(struct pdu *response) argument 630 login_verify_mutual(const struct pdu *response) argument 675 struct pdu *response; local 703 struct pdu *request, *response; local [all...] |
/freebsd-10-stable/contrib/wpa/src/crypto/ |
H A D | ms_funcs.h | 15 u8 *response); 20 u8 *response); 25 const u8 *nt_response, u8 *response); 30 const u8 *nt_response, u8 *response); 32 size_t password_len, u8 *response); 35 u8 *response);
|
/freebsd-10-stable/sbin/camcontrol/ |
H A D | util.c | 168 int response = -1; local 174 response = 1; 176 response = 0; 181 response = 0; 182 } while (response == -1); 183 return (response);
|
/freebsd-10-stable/contrib/ofed/libibverbs/src/ |
H A D | kern_abi.h | 73 * length of the command block and response buffer if any in 32-bit 82 __u64 response; member in struct:ibv_get_context 93 __u64 response; member in struct:ibv_get_event_fds
|
/freebsd-10-stable/contrib/opie/ |
H A D | opiekey.c | 5 and outputs a response. 141 char response[OPIE_RESPONSE_MAX + 1]; local 201 fprintf(stderr, "%s: %s: unknown response type.\n", argv[0], optarg); 220 fprintf(stderr, "Using the %s algorithm to compute response.\n", algnames[algorithm]); 304 opiebtoh(response, &key); 306 opiebtoe(response, &key); 309 strcpy(response, "word:"); 310 strcat(response, opiebtoe(buf, &key)); 313 strcpy(response, "hex:"); 314 strcat(response, opiebto [all...] |
H A D | opiegen.c | 30 char response[OPIE_RESPONSE_MAX+1]; local 67 switch (result = opiegenerator(buffer, secret, response)) { 78 fputs(response, stdout);
|
/freebsd-10-stable/libexec/talkd/ |
H A D | talkd.c | 69 static CTL_RESPONSE response; variable 118 process_request(mp, &response); 120 cc = sendto(STDIN_FILENO, (char *)&response, 121 sizeof(response), 0, &ctl_addr, sizeof(ctl_addr)); 122 if (cc != sizeof (response))
|
/freebsd-10-stable/sys/boot/arm/at91/libat91/ |
H A D | sd-card.c | 109 // wait for CMDRDY Status flag to read the response 132 // Test error ==> if crc error and response R3 ==> don't check error 261 MCI_GetCSD(unsigned int rca, unsigned int *response) argument 267 response[0] = AT91C_BASE_MCI->MCI_RSPR[0]; 268 response[1] = AT91C_BASE_MCI->MCI_RSPR[1]; 269 response[2] = AT91C_BASE_MCI->MCI_RSPR[2]; 270 response[3] = AT91C_BASE_MCI->MCI_RSPR[3]; 282 unsigned int response=0x0; local 287 while( (response & AT91C_CARD_POWER_UP_BUSY) != AT91C_CARD_POWER_UP_BUSY ) { 291 response 301 MCI_SDCard_GetCID(unsigned int *response) argument [all...] |
/freebsd-10-stable/usr.sbin/ctld/ |
H A D | login.c | 48 login_set_nsg(struct pdu *response, int nsg) argument 56 bhslr = (struct iscsi_bhs_login_response *)response->pdu_bhs; 74 login_set_csg(struct pdu *response, int csg) argument 82 bhslr = (struct iscsi_bhs_login_response *)response->pdu_bhs; 101 * without sending response ("A target receiving any PDU 151 struct pdu *response; local 159 response = pdu_new_response(request); 160 bhslr2 = (struct iscsi_bhs_login_response *)response->pdu_bhs; 162 login_set_csg(response, BHSLR_STAGE_SECURITY_NEGOTIATION); 170 return (response); 176 struct pdu *response; local 258 struct pdu *response; local 340 struct pdu *response; local 620 struct pdu *response; local 679 struct pdu *response; local 747 struct pdu *request, *response; local 771 struct pdu *request, *response; local [all...] |
H A D | discovery.c | 86 struct pdu *response; local 94 response = pdu_new_response(request); 95 bhstr2 = (struct iscsi_bhs_text_response *)response->pdu_bhs; 105 return (response); 144 struct pdu *response; local 152 response = pdu_new_response(request); 153 bhslr2 = (struct iscsi_bhs_logout_response *)response->pdu_bhs; 162 return (response); 278 struct pdu *request, *response; local 295 response [all...] |
/freebsd-10-stable/contrib/ofed/librdmacm/include/rdma/ |
H A D | rdma_cma_abi.h | 78 __u64 response; member in struct:ucma_abi_create_id 88 __u64 response; member in struct:ucma_abi_destroy_id 98 __u64 response; member in struct:ucma_abi_bind_addr 116 __u64 response; member in struct:ucma_abi_query_route 185 __u64 response; member in struct:ucma_abi_init_qp_attr 196 __u64 response; /* ucma_abi_create_id_resp */ member in struct:ucma_abi_join_mcast 203 __u64 response; member in struct:ucma_abi_get_event 226 __u64 response; member in struct:ucma_abi_migrate_id
|
/freebsd-10-stable/sys/ofed/include/rdma/ |
H A D | rdma_user_cm.h | 78 __u64 response; member in struct:rdma_ucm_create_id 88 __u64 response; member in struct:rdma_ucm_destroy_id 98 __u64 response; member in struct:rdma_ucm_bind_addr 116 __u64 response; member in struct:rdma_ucm_query_route 184 __u64 response; member in struct:rdma_ucm_init_qp_attr 195 __u64 response; /* rdma_ucm_create_id_resp */ member in struct:rdma_ucm_join_mcast 202 __u64 response; member in struct:rdma_ucm_get_event 237 __u64 response; member in struct:rdma_ucm_migrate_id
|
/freebsd-10-stable/crypto/heimdal/lib/ipc/ |
H A D | client.c | 94 const heim_idata *request, heim_idata *response, 154 response->data = malloc(replyout_length); 155 if (response->data == NULL) { 160 memcpy(response->data, replyout, replyout_length); 161 response->length = replyout_length; 165 response->data = malloc(replyin_length); 166 if (response->data == NULL) 168 memcpy(response->data, replyin, replyin_length); 169 response->length = replyin_length; 193 heim_idata response; local 93 mach_ipc(void *ctx, const heim_idata *request, heim_idata *response, heim_icred *cred) argument 445 door_ipc(void *ctx, const heim_idata *request, heim_idata *response, heim_icred *cred) argument [all...] |
/freebsd-10-stable/contrib/serf/auth/ |
H A D | auth.c | 31 serf_bucket_t *response, 97 /* Reads and discards all bytes in the response body. */ 98 static apr_status_t discard_body(serf_bucket_t *response) argument 105 status = serf_bucket_read(response, SERF_READ_ALL_AVAIL, &data, &len); 116 * handle_auth_header is called for each header in the response. It filters 126 serf_bucket_t *response, 195 status = handler(code, request, response, 263 serf_bucket_t *response, 282 hdrs = serf_bucket_response_get_headers(response); 298 and handle each header in the response, lookin 26 default_auth_response_handler(const serf__authn_scheme_t *scheme, peer_t peer, int code, serf_connection_t *conn, serf_request_t *request, serf_bucket_t *response, apr_pool_t *pool) argument 122 handle_auth_headers(int code, void *baton, apr_hash_t *hdrs, serf_request_t *request, serf_bucket_t *response, apr_pool_t *pool) argument 261 dispatch_auth(int code, serf_request_t *request, serf_bucket_t *response, void *baton, apr_pool_t *pool) argument 316 serf__handle_auth_response(int *consumed_response, serf_request_t *request, serf_bucket_t *response, void *baton, apr_pool_t *pool) argument [all...] |