/freebsd-10.0-release/sys/cam/scsi/ |
H A D | smp_all.c | 275 * Decode the SMP REPORT GENERAL response. The format is current as of SPL 280 smp_report_general_sbuf(struct smp_report_general_response *response, argument 285 response->response_len, 286 response->response_len * SMP_WORD_LEN); 288 scsi_2btoul(response->expander_change_count)); 290 scsi_2btoul(response->expander_route_indexes)); 292 smp_yesno(response->long_response & 294 sbuf_printf(sb, "Number of Phys: %d\n", response->num_phys); 296 smp_yesno(response->config_bits0 & 299 smp_yesno(response 419 smp_report_manuf_info_sbuf(struct smp_report_manuf_info_response *response, int response_len, struct sbuf *sb) argument 491 smp_report_general(struct ccb_smpio *smpio, uint32_t retries, void (*cbfcnp)(struct cam_periph *, union ccb *), struct smp_report_general_request *request, int request_len, uint8_t *response, int response_len, int long_response, uint32_t timeout) argument 520 smp_discover(struct ccb_smpio *smpio, uint32_t retries, void (*cbfcnp)(struct cam_periph *, union ccb *), struct smp_discover_request *request, int request_len, uint8_t *response, int response_len, int long_response, int ignore_zone_group, int phy, uint32_t timeout) argument 551 smp_report_manuf_info(struct ccb_smpio *smpio, uint32_t retries, void (*cbfcnp)(struct cam_periph *, union ccb *), struct smp_report_manuf_info_request *request, int request_len, uint8_t *response, int response_len, int long_response, uint32_t timeout) argument 580 smp_phy_control(struct ccb_smpio *smpio, uint32_t retries, void (*cbfcnp)(struct cam_periph *, union ccb *), struct smp_phy_control_request *request, int request_len, uint8_t *response, int response_len, int long_response, uint32_t expected_exp_change_count, int phy, int phy_op, int update_pp_timeout_val, uint64_t attached_device_name, int prog_min_prl, int prog_max_prl, int slumber_partial, int pp_timeout_value, uint32_t timeout) argument [all...] |
/freebsd-10.0-release/contrib/ipfilter/l4check/ |
H A D | l4check.conf | 18 response timeout 4 19 response string <HTML> 20 #response file http.ok
|
/freebsd-10.0-release/contrib/wpa/src/eap_common/ |
H A D | chap.c | 16 size_t challenge_len, u8 *response) 27 return md5_vector(3, addr, len, response); 15 chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, size_t challenge_len, u8 *response) argument
|
H A D | chap.h | 15 size_t challenge_len, u8 *response);
|
/freebsd-10.0-release/contrib/llvm/tools/lldb/source/Plugins/Process/gdb-remote/ |
H A D | GDBRemoteCommunicationServer.cpp | 209 StreamString response; 215 response.PutCString("triple:"); 216 response.PutCStringAsRawHex8(host_triple.getTriple().c_str()); 217 response.Printf (";ptrsize:%u;",host_arch.GetAddressByteSize()); 222 response.Printf ("cputype:%u;", cpu); 224 response.Printf ("cpusubtype:%u;", sub); 227 response.Printf("watchpoint_exceptions_received:before;"); // On armv7 we use "synchronous" watchpoints which means the exception is delivered before the instruction executes. 229 response.Printf("watchpoint_exceptions_received:after;"); 233 case eByteOrderBig: response.PutCString ("endian:big;"); break; 234 case eByteOrderLittle: response [all...] |
H A D | GDBRemoteCommunicationClient.cpp | 116 StringExtractorGDBRemote response; local 117 if (SendPacketAndWaitForResponse("QStartNoAckMode", response, false)) 119 if (response.IsOKResponse()) 135 StringExtractorGDBRemote response; local 136 if (SendPacketAndWaitForResponse("QListThreadsInStopReply", response, false)) 138 if (response.IsOKResponse()) 151 StringExtractorGDBRemote response; local 152 if (SendPacketAndWaitForResponse("qVAttachOrWaitSupported", response, false)) 154 if (response.IsOKResponse()) 171 StringExtractorGDBRemote response; local 222 StringExtractorGDBRemote response; local 237 StringExtractorGDBRemote response; local 292 SendPacketAndWaitForResponse( const char *payload, StringExtractorGDBRemote &response, bool send_async ) argument 306 SendPacketAndWaitForResponse( const char *payload, size_t payload_length, StringExtractorGDBRemote &response, bool send_async ) argument 909 StringExtractorGDBRemote response; local 923 StringExtractorGDBRemote response; local 962 StringExtractorGDBRemote response; local 982 StringExtractorGDBRemote response; local 1002 StringExtractorGDBRemote response; local 1102 StringExtractorGDBRemote response; local [all...] |
/freebsd-10.0-release/lib/libc/locale/ |
H A D | rpmatch.c | 35 rpmatch(const char *response) argument 46 if (regexec(&yes, response, 0, NULL, 0) == 0) 48 else if (regexec(&no, response, 0, NULL, 0) == 0)
|
/freebsd-10.0-release/usr.bin/talk/ |
H A D | invite.c | 71 CTL_RESPONSE response; local 113 ctl_transact(my_machine_addr, msg, DELETE, &response); 115 ctl_transact(his_machine_addr, msg, DELETE, &response); 151 * Transmit the invitation and process the response 156 CTL_RESPONSE response; local 159 ctl_transact(his_machine_addr, msg, ANNOUNCE, &response); 160 remote_id = response.id_num; 161 if (response.answer != SUCCESS) { 162 if (response.answer < NANSWERS) 163 message(answers[response [all...] |
/freebsd-10.0-release/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | iter_cred.c | 46 krb5_storage *request, *response; local 57 ret = krb5_kcm_call(context, request, &response, &response_data); 67 ret = krb5_ret_uint32(response, &morep); 72 ret = krb5_ret_stringz(response, &user); 74 ret = krb5_ret_stringz(response, &domain); 92 krb5_storage_free(response);
|
/freebsd-10.0-release/lib/libpam/modules/pam_opie/ |
H A D | pam_opie.c | 68 char *response; local 118 retval = pam_prompt(pamh, style, &response, 125 PAM_LOG("Completed challenge %d: %s", i, response); 127 if (response[0] != '\0') 134 pam_set_item(pamh, PAM_AUTHTOK, response); 138 * But it returns -1 even if the response string isn't in the form 142 retval = opieverify(&opie, response); 143 free(response);
|
/freebsd-10.0-release/usr.sbin/iscsid/ |
H A D | discovery.c | 47 struct pdu *response; local 50 response = pdu_new(conn); 51 pdu_receive(response); 52 if (response->pdu_bhs->bhs_opcode != ISCSI_BHS_OPCODE_TEXT_RESPONSE) 54 response->pdu_bhs->bhs_opcode); 55 bhstr = (struct iscsi_bhs_text_response *)response->pdu_bhs; 65 if (response->pdu_data_len == 0) 74 return (response); 101 struct pdu *response; local 104 response 174 struct pdu *request, *response; local [all...] |
H A D | login.c | 47 login_nsg(const struct pdu *response) argument 51 bhslr = (struct iscsi_bhs_login_response *)response->pdu_bhs; 164 struct pdu *response; local 168 response = pdu_new(conn); 169 pdu_receive(response); 170 if (response->pdu_bhs->bhs_opcode != ISCSI_BHS_OPCODE_LOGIN_RESPONSE) { 172 response->pdu_bhs->bhs_opcode); 174 bhslr = (struct iscsi_bhs_login_response *)response->pdu_bhs; 193 if (response->pdu_data_len == 0) 208 return (response); 378 login_compute_md5(const char id, const char *secret, const void *challenge, size_t challenge_len, void *response, size_t response_len) argument 497 struct pdu *request, *response; local 587 login_send_chap_r(struct pdu *response) argument 682 login_verify_mutual(const struct pdu *response) argument 731 struct pdu *response; local 777 struct pdu *request, *response; local [all...] |
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | ms_funcs.h | 15 u8 *response); 20 u8 *response); 25 const u8 *nt_response, u8 *response); 30 const u8 *nt_response, u8 *response); 32 size_t password_len, u8 *response); 35 u8 *response);
|
/freebsd-10.0-release/sbin/camcontrol/ |
H A D | util.c | 168 int response = -1; local 174 response = 1; 176 response = 0; 181 response = 0; 182 } while (response == -1); 183 return (response);
|
/freebsd-10.0-release/contrib/ofed/libibverbs/src/ |
H A D | kern_abi.h | 73 * length of the command block and response buffer if any in 32-bit 82 __u64 response; member in struct:ibv_get_context 93 __u64 response; member in struct:ibv_get_event_fds
|
/freebsd-10.0-release/contrib/opie/ |
H A D | opiekey.c | 5 and outputs a response. 141 char response[OPIE_RESPONSE_MAX + 1]; local 201 fprintf(stderr, "%s: %s: unknown response type.\n", argv[0], optarg); 220 fprintf(stderr, "Using the %s algorithm to compute response.\n", algnames[algorithm]); 304 opiebtoh(response, &key); 306 opiebtoe(response, &key); 309 strcpy(response, "word:"); 310 strcat(response, opiebtoe(buf, &key)); 313 strcpy(response, "hex:"); 314 strcat(response, opiebto [all...] |
H A D | opiegen.c | 30 char response[OPIE_RESPONSE_MAX+1]; local 67 switch (result = opiegenerator(buffer, secret, response)) { 78 fputs(response, stdout);
|
H A D | opieserv.c | 28 char response[OPIE_RESPONSE_MAX+1]; local 64 if (!opiereadpass(response, OPIE_RESPONSE_MAX, 1)) { 65 fputs("Error reading response!\n", stderr); 69 switch (result = opieverify(&opie, response)) {
|
/freebsd-10.0-release/usr.sbin/ctld/ |
H A D | discovery.c | 84 struct pdu *response; local 92 response = pdu_new_response(request); 93 bhstr2 = (struct iscsi_bhs_text_response *)response->pdu_bhs; 103 return (response); 140 struct pdu *response; local 148 response = pdu_new_response(request); 149 bhslr2 = (struct iscsi_bhs_logout_response *)response->pdu_bhs; 158 return (response); 164 struct pdu *request, *response; local 178 response [all...] |
/freebsd-10.0-release/libexec/talkd/ |
H A D | talkd.c | 73 static CTL_RESPONSE response; variable 122 process_request(mp, &response); 124 cc = sendto(STDIN_FILENO, (char *)&response, 125 sizeof(response), 0, &ctl_addr, sizeof(ctl_addr)); 126 if (cc != sizeof (response))
|
/freebsd-10.0-release/sys/boot/arm/at91/libat91/ |
H A D | sd-card.c | 109 // wait for CMDRDY Status flag to read the response 132 // Test error ==> if crc error and response R3 ==> don't check error 261 MCI_GetCSD(unsigned int rca, unsigned int *response) argument 267 response[0] = AT91C_BASE_MCI->MCI_RSPR[0]; 268 response[1] = AT91C_BASE_MCI->MCI_RSPR[1]; 269 response[2] = AT91C_BASE_MCI->MCI_RSPR[2]; 270 response[3] = AT91C_BASE_MCI->MCI_RSPR[3]; 282 unsigned int response=0x0; local 287 while( (response & AT91C_CARD_POWER_UP_BUSY) != AT91C_CARD_POWER_UP_BUSY ) { 291 response 301 MCI_SDCard_GetCID(unsigned int *response) argument [all...] |
/freebsd-10.0-release/contrib/ofed/librdmacm/include/rdma/ |
H A D | rdma_cma_abi.h | 78 __u64 response; member in struct:ucma_abi_create_id 88 __u64 response; member in struct:ucma_abi_destroy_id 98 __u64 response; member in struct:ucma_abi_bind_addr 116 __u64 response; member in struct:ucma_abi_query_route 185 __u64 response; member in struct:ucma_abi_init_qp_attr 196 __u64 response; /* ucma_abi_create_id_resp */ member in struct:ucma_abi_join_mcast 203 __u64 response; member in struct:ucma_abi_get_event 226 __u64 response; member in struct:ucma_abi_migrate_id
|
/freebsd-10.0-release/sys/ofed/include/rdma/ |
H A D | rdma_user_cm.h | 78 __u64 response; member in struct:rdma_ucm_create_id 88 __u64 response; member in struct:rdma_ucm_destroy_id 98 __u64 response; member in struct:rdma_ucm_bind_addr 116 __u64 response; member in struct:rdma_ucm_query_route 184 __u64 response; member in struct:rdma_ucm_init_qp_attr 195 __u64 response; /* rdma_ucm_create_id_resp */ member in struct:rdma_ucm_join_mcast 202 __u64 response; member in struct:rdma_ucm_get_event 237 __u64 response; member in struct:rdma_ucm_migrate_id
|
/freebsd-10.0-release/crypto/heimdal/lib/ipc/ |
H A D | client.c | 94 const heim_idata *request, heim_idata *response, 154 response->data = malloc(replyout_length); 155 if (response->data == NULL) { 160 memcpy(response->data, replyout, replyout_length); 161 response->length = replyout_length; 165 response->data = malloc(replyin_length); 166 if (response->data == NULL) 168 memcpy(response->data, replyin, replyin_length); 169 response->length = replyin_length; 193 heim_idata response; local 93 mach_ipc(void *ctx, const heim_idata *request, heim_idata *response, heim_icred *cred) argument 445 door_ipc(void *ctx, const heim_idata *request, heim_idata *response, heim_icred *cred) argument [all...] |
/freebsd-10.0-release/contrib/serf/auth/ |
H A D | auth.c | 30 serf_bucket_t *response, 96 /* Reads and discards all bytes in the response body. */ 97 static apr_status_t discard_body(serf_bucket_t *response) argument 104 status = serf_bucket_read(response, SERF_READ_ALL_AVAIL, &data, &len); 115 * handle_auth_header is called for each header in the response. It filters 125 serf_bucket_t *response, 188 status = handler(code, request, response, 250 serf_bucket_t *response, 269 hdrs = serf_bucket_response_get_headers(response); 285 and handle each header in the response, lookin 26 default_auth_response_handler(peer_t peer, int code, serf_connection_t *conn, serf_request_t *request, serf_bucket_t *response, apr_pool_t *pool) argument 121 handle_auth_headers(int code, void *baton, apr_hash_t *hdrs, serf_request_t *request, serf_bucket_t *response, apr_pool_t *pool) argument 248 dispatch_auth(int code, serf_request_t *request, serf_bucket_t *response, void *baton, apr_pool_t *pool) argument 303 serf__handle_auth_response(int *consumed_response, serf_request_t *request, serf_bucket_t *response, void *baton, apr_pool_t *pool) argument [all...] |