/netbsd-6-1-5-RELEASE/external/gpl2/xcvs/dist/lib/ |
H A D | yesno.c | 1 /* yesno.c -- read a yes/no response from stdin 33 extern int rpmatch (char const *response); 38 char *response = NULL; local 40 ssize_t response_len = getline (&response, &response_size, stdin); 47 response[response_len - 1] = '\0'; 48 yes = (0 < rpmatch (response)); 51 free (response);
|
H A D | rpmatch.c | 1 /* Determine whether string value is affirmation or negative response 34 try (const char *response, const char *pattern, const int match, argument 53 return regexec (re, response, 0, NULL, 0) == 0 ? match : nomatch; 59 rpmatch (const char *response) argument 62 /* Match against one of the response patterns, compiling the pattern 65 /* We cache the response patterns and compiled regexps here. */ 70 return ((result = try (response, _("^[yY]"), 1, 0, 73 : try (response, _("^[nN]"), 0, -1, &noexpr, &nore)); 76 return (*response == 'y' || *response [all...] |
/netbsd-6-1-5-RELEASE/external/gpl3/gcc/dist/gcc/testsuite/gcc.c-torture/compile/ |
H A D | 20010903-2.c | 2 extern int rpmatch (const char *response); 5 rpmatch (const char *response) argument 11 return __dummy (re, response);
|
/netbsd-6-1-5-RELEASE/gnu/dist/gcc4/gcc/testsuite/gcc.c-torture/compile/ |
H A D | 20010903-2.c | 2 extern int rpmatch (const char *response); 5 rpmatch (const char *response) argument 11 return __dummy (re, response);
|
/netbsd-6-1-5-RELEASE/external/gpl2/lvm2/dist/daemons/clvmd/ |
H A D | refresh_clvmd.c | 41 char *response; member in struct:lvm_response 106 /* Get the response */ 189 lvm_response_t ** response, int *num) 227 * Allocate response array. 231 *response = dm_malloc(sizeof(lvm_response_t) * num_responses + 233 if (!*response) { 239 rarray = *response; 241 /* Unpack the response into an lvm_response_t array */ 251 rarray[i].response = dm_malloc(strlen(inptr) + 1); 252 if (rarray[i].response 188 _cluster_request(char cmd, const char *node, void *data, int len, lvm_response_t ** response, int *num) argument 279 _cluster_free_request(lvm_response_t * response, int num) argument 296 lvm_response_t *response; local 333 lvm_response_t *response; local [all...] |
/netbsd-6-1-5-RELEASE/dist/ipf/l4check/ |
H A D | l4check.conf | 18 response timeout 4 19 response string <HTML> 20 #response file http.ok
|
/netbsd-6-1-5-RELEASE/usr.sbin/hdaudioctl/ |
H A D | graph.c | 58 prop_dictionary_t request, response; local 86 HDAUDIO_FGRP_CODEC_INFO, &response); 93 prop_dictionary_get_uint16(response, "vendor-id", &vendor); 94 prop_dictionary_get_uint16(response, "product-id", &product); 102 HDAUDIO_FGRP_WIDGET_INFO, &response); 105 prop_dictionary_get_cstring_nocopy(response, "name", &name); 106 prop_dictionary_get_uint32(response, "cap", &cap); 107 prop_dictionary_get_uint32(response, "config", &config); 108 prop_dictionary_get_uint8(response, "type", &type); 109 prop_dictionary_get_uint8(response, "ni [all...] |
H A D | hdaudioctl.c | 69 prop_dictionary_t request, response; local 87 HDAUDIO_FGRP_INFO, &response); 93 array = prop_dictionary_get(response, "function-group-info"); 112 prop_object_release(response); 121 prop_dictionary_t request, response; local 143 HDAUDIO_FGRP_GETCONFIG, &response); 149 config = prop_dictionary_get(response, "pin-config"); 154 prop_object_release(response); 163 prop_dictionary_t request, response; local 194 HDAUDIO_FGRP_SETCONFIG, &response); [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_common/ |
H A D | chap.c | 22 size_t challenge_len, u8 *response) 33 return md5_vector(3, addr, len, response); 21 chap_md5(u8 id, const u8 *secret, size_t secret_len, const u8 *challenge, size_t challenge_len, u8 *response) argument
|
H A D | chap.h | 21 size_t challenge_len, u8 *response);
|
/netbsd-6-1-5-RELEASE/external/gpl2/lvm2/dist/lib/locking/ |
H A D | cluster_locking.c | 46 char *response; member in struct:lvm_response 118 /* Get the response */ 202 lvm_response_t ** response, int *num) 240 * Allocate response array. 244 *response = dm_malloc(sizeof(lvm_response_t) * num_responses); 245 if (!*response) { 251 rarray = *response; 253 /* Unpack the response into an lvm_response_t array */ 263 rarray[i].response = dm_malloc(strlen(inptr) + 1); 264 if (rarray[i].response 201 _cluster_request(char clvmd_cmd, const char *node, void *data, int len, lvm_response_t ** response, int *num) argument 291 _cluster_free_request(lvm_response_t * response, int num) argument 313 lvm_response_t *response = NULL; local 466 decode_lock_type(const char *response) argument 490 lvm_response_t *response = NULL; local [all...] |
/netbsd-6-1-5-RELEASE/usr.bin/talk/ |
H A D | invite.c | 68 CTL_RESPONSE response; local 110 ctl_transact(my_machine_addr, msg, DELETE, &response); 112 ctl_transact(his_machine_addr, msg, DELETE, &response); 145 * Transmit the invitation and process the response 150 CTL_RESPONSE response; local 153 ctl_transact(his_machine_addr, msg, ANNOUNCE, &response); 154 remote_id = response.id_num; 155 if (response.answer != SUCCESS) { 156 if (response.answer < NANSWERS) 157 message(answers[response [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/ |
H A D | iter_cred.c | 47 krb5_storage *request, *response; local 58 ret = krb5_kcm_call(context, request, &response, &response_data); 68 ret = krb5_ret_uint32(response, &morep); 73 ret = krb5_ret_stringz(response, &user); 75 ret = krb5_ret_stringz(response, &domain); 93 krb5_storage_free(response);
|
/netbsd-6-1-5-RELEASE/dist/pppd/pppd/ |
H A D | chap-md5.c | 68 unsigned char *challenge, unsigned char *response, 77 response_len = *response++; 86 /* Test if our hash matches the peer's response */ 87 if (memcmp(hash, response, MD5_HASH_SIZE) == 0) { 97 chap_md5_make_response(unsigned char *response, int id, char *our_name, argument 109 MD5Final(&response[1], &ctx); 110 response[0] = MD5_HASH_SIZE; 66 chap_md5_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
|
H A D | chap-new.h | 54 * Semi-arbitrary limits on challenge and response fields. 99 * Note: challenge and response arguments below are formatted as 100 * a length byte followed by the actual challenge/response data. 105 unsigned char *challenge, unsigned char *response, 107 void (*make_response)(unsigned char *response, int id, char *our_name, 119 unsigned char *challenge, unsigned char *response,
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/ntlm/ |
H A D | heim-auth.h | 18 heim_apop_verify(const char *challenge, const char *password, const char *response); 35 heim_cram_md5_verify(const char *challenge, const char *password, const char *response); 44 heim_cram_md5_verify_ctx(heim_cram_md5 ctx, const char *challenge, const char *response); 58 * response = read_from_client(); 60 * heim_digest_parse_response(d, response); 65 * if (heim_digest_verify(d, &response)) abort(); 67 * send_to_client(response); 92 heim_digest_parse_response(heim_digest_t context, const char *response); 107 heim_digest_verify(heim_digest_t context, char **response);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/netpgp/dist/src/libpaa/ |
H A D | client.c | 45 paa_response_t response; local 53 (void) memset(&response, 0x0, sizeof(response)); 66 response.realm = optarg; 84 cc = paa_format_response(&response, &netpgp, challenge, buf, sizeof(buf));
|
/netbsd-6-1-5-RELEASE/lib/libpam/modules/pam_skey/ |
H A D | pam_skey.c | 58 char *response; local 87 response = strdup(pass); 88 if (response == NULL) { 89 pam_error(pamh, "Unable to copy S/Key response"); 93 retval = skey_passcheck(user, response) == -1 ? 96 free(response);
|
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/lwres/ |
H A D | getrrset.c | 150 lwres_grbnresponse_t *response = NULL; local 186 lwflags, &response); 198 rrset->rri_rdclass = response->rdclass; 199 rrset->rri_rdtype = response->rdtype; 200 rrset->rri_ttl = response->ttl; 207 rrset->rri_name = sane_malloc(response->realnamelen + 1); 212 strncpy(rrset->rri_name, response->realname, response->realnamelen); 213 rrset->rri_name[response->realnamelen] = 0; 215 if ((response [all...] |
H A D | lwresutil.c | 247 lwres_gabnresponse_t *response; local 264 response = NULL; 332 * Parse the response. 334 ret = lwres_gabnresponse_parse(ctx, &b_in, &pkt, &response); 337 response->base = buffer; 338 response->baselen = LWRES_RECVLENGTH; 341 *structp = response; 349 if (response != NULL) 350 lwres_gabnresponse_free(ctx, &response); 363 lwres_gnbaresponse_t *response; local 478 lwres_grbnresponse_t *response; local [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/ |
H A D | ms_funcs.h | 21 u8 *response); 26 u8 *response); 31 const u8 *nt_response, u8 *response); 36 const u8 *nt_response, u8 *response); 38 size_t password_len, u8 *response); 41 u8 *response);
|
/netbsd-6-1-5-RELEASE/libexec/talkd/ |
H A D | talkd.c | 71 CTL_RESPONSE response; variable 119 memset(&response, 0, sizeof(response)); 132 process_request(mp, &response); 139 cc = sendto(sockt, (char *)&response, sizeof (response), 0, 141 if (cc != sizeof (response))
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/ipc/ |
H A D | client.c | 96 const heim_idata *request, heim_idata *response, 156 response->data = malloc(replyout_length); 157 if (response->data == NULL) { 162 memcpy(response->data, replyout, replyout_length); 163 response->length = replyout_length; 167 response->data = malloc(replyin_length); 168 if (response->data == NULL) 170 memcpy(response->data, replyin, replyin_length); 171 response->length = replyin_length; 195 heim_idata response; local 95 mach_ipc(void *ctx, const heim_idata *request, heim_idata *response, heim_icred *cred) argument 447 door_ipc(void *ctx, const heim_idata *request, heim_idata *response, heim_icred *cred) argument [all...] |
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/query-loc-0.4.0/ |
H A D | loc.c | 353 response; /* response buffers */ local 382 (u_char *) & response, /*response buffer */ 383 sizeof (response))) /*buffer size */ 392 * pass it while parsing the response. responseLen is 395 endOfMsg = response.buf + responseLen; 401 cp = response.buf + sizeof (HEADER); 415 count = ntohs (response.hdr.ancount) + 416 ntohs (response 498 response; /* response buffers */ local [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/krb5/ |
H A D | kcm.c | 178 krb5_storage *response; local 189 response = krb5_storage_from_data(&response_data); 190 if (response == NULL) { 195 ret = krb5_ret_int32(response, &status); 197 krb5_storage_free(response); 203 krb5_storage_free(response); 210 *response_p = response; 215 krb5_storage_free(response); 258 krb5_storage *request, *response; local 273 ret = krb5_kcm_call(context, request, &response, 492 krb5_storage *request, *response; local 538 krb5_storage *request, *response; local 623 krb5_storage *request, *response; local 786 krb5_storage *request, *response; local 858 krb5_storage *request, *response; local 965 krb5_storage *request, *response; local 1071 krb5_storage *request, *response; local [all...] |