/netbsd-current/sys/dev/sdmmc/ |
H A D | sdmmcreg.h | 109 #define MMC_R1(resp) ((resp)[0]) 110 #define MMC_R3(resp) ((resp)[0]) 111 #define SD_R6(resp) ((resp)[0]) 112 #define MMC_R7(resp) ((resp)[0]) 113 #define MMC_SPI_R1(resp) ((resp)[ [all...] |
/netbsd-current/distrib/atari/floppies/prepare/ |
H A D | install.sh | 57 read resp 58 if [ -z "$resp" ]; then 59 resp=$1 90 if isin $resp $_DKDEVS ; then 91 ROOTDISK="$resp" 94 echo "The disk $resp does not exist." 109 case "$resp" in 114 if isin $resp $_DKDEVS ; then 115 md_labeldisk $resp 118 echo "The disk $resp doe [all...] |
/netbsd-current/distrib/amiga/floppies/inst/ |
H A D | install.sh | 47 read resp 48 if [ -z "$resp" ]; then 49 resp=$1 95 case $resp in 119 case "$resp" in 155 otherdrives=$( echo "${driveunits}" | sed -e "s,${resp},," ) 158 echo "\"${resp}\" is an invalid drive name. Valid choices" 161 rdev=${resp} 185 case "$resp" in 220 resp [all...] |
/netbsd-current/crypto/external/cpl/trousers/dist/src/tcs/ |
H A D | tcsi_caps.c | 34 UINT32 * respSize, BYTE ** resp) 87 if ((*resp = malloc(*respSize)) == NULL) { 95 *(TSS_BOOL *)(*resp) = bValue; 97 *(UINT32 *)(*resp) = u32value; 101 if ((*resp = calloc(1, sizeof(TSS_VERSION))) == NULL) { 106 LoadBlob_VERSION(&offset, *resp, &tcsVersion); 111 if ((*resp = malloc(sizeof(TSS_BOOL))) == NULL) { 115 *(TSS_BOOL *)(*resp) = INTERNAL_CAP_TCS_PERSSTORAGE; 130 if ((*resp = malloc(sizeof(TSS_BOOL))) == NULL) { 135 *(TSS_BOOL *)(*resp) 31 internal_TCSGetCap(TCS_CONTEXT_HANDLE hContext, TCPA_CAPABILITY_AREA capArea, UINT32 subCap, UINT32 * respSize, BYTE ** resp) argument [all...] |
H A D | tcs_caps.c | 39 BYTE *resp; local 44 result = TCSP_GetCapability_Internal(InternalContext, capArea, 0, NULL, &respSize, &resp); 47 UnloadBlob_VERSION(&offset, resp, version); 48 free(resp); 53 &resp); 56 UnloadBlob_VERSION(&offset, resp, version); 57 free(resp); 68 BYTE *resp; local 73 &respSize, &resp); 78 UnloadBlob_BYTE(&offset, (BYTE *)v, resp); [all...] |
/netbsd-current/usr.sbin/timed/timed/ |
H A D | candidate.c | 50 struct tsp *resp, msg; local 89 resp = readmsg(TSP_ANY, ANYADDR, &wait, net); 90 if (!resp) 93 switch (resp->tsp_type) { 96 (void)addmach(resp->tsp_name, &from,fromnet); 106 && !good_host_name(resp->tsp_name)) { 107 (void)addmach(resp->tsp_name, &from,fromnet); 108 suppress(&from, resp->tsp_name, net); 132 htp = addmach(resp->tsp_name,&from,fromnet); 144 (void)addmach(resp [all...] |
/netbsd-current/external/bsd/openpam/dist/lib/libpam/ |
H A D | openpam_nullconv.c | 60 struct pam_response **resp, 70 (void)resp; 58 openpam_nullconv(int n, const struct pam_message **msg, struct pam_response **resp, void *data) argument
|
H A D | pam_prompt.c | 61 char **resp, 69 r = pam_vprompt(pamh, style, resp, fmt, ap); 89 * not return one, is stored in the location pointed to by the =resp 59 pam_prompt(const pam_handle_t *pamh, int style, char **resp, const char *fmt, ...) argument
|
/netbsd-current/external/mpl/bind/dist/lib/dns/ |
H A D | dispatch.c | 195 tcp_recv_done(dns_dispentry_t *resp, isc_result_t eresult, 200 dispentry_cancel(dns_dispentry_t *resp, isc_result_t result); 209 udp_startrecv(isc_nmhandle_t *handle, dns_dispentry_t *resp); 211 udp_dispatch_connect(dns_dispatch_t *disp, dns_dispentry_t *resp); 214 dns_dispentry_t *resp); 216 tcp_dispatch_getnext(dns_dispatch_t *disp, dns_dispentry_t *resp, 219 udp_dispatch_getnext(dns_dispentry_t *resp, int32_t timeout); 224 socktype2str(dns_dispentry_t *resp) { argument 225 dns_dispatch_t *disp = resp->disp; 319 dispentry_log(dns_dispentry_t *resp, in 323 dispentry_log(dns_dispentry_t *resp, int level, const char *fmt, ...) argument 368 setup_socket(dns_dispatch_t *disp, dns_dispentry_t *resp, const isc_sockaddr_t *dest, in_port_t *portp) argument 431 dispentry_destroy(dns_dispentry_t *resp) argument 478 dispentry_runtime(dns_dispentry_t *resp, const isc_time_t *now) argument 503 dns_dispentry_t *resp = (dns_dispentry_t *)arg; local 648 dns_dispentry_t *resp = NULL; local 668 dns_dispentry_t *resp = NULL; local 723 tcp_recv_add(dns_displist_t *resps, dns_dispentry_t *resp, isc_result_t result) argument 736 dns_dispentry_t *resp = NULL, *next = NULL; local 749 tcp_recv_done(dns_dispentry_t *resp, isc_result_t eresult, isc_region_t *region) argument 760 dns_dispentry_t *resp = NULL, *next = NULL; local 786 dns_dispentry_t *resp = NULL; local 1432 dns_dispentry_t *resp = NULL; local 1552 dns_dispatch_getnext(dns_dispentry_t *resp) argument 1587 udp_dispentry_cancel(dns_dispentry_t *resp, isc_result_t result) argument 1655 tcp_dispentry_cancel(dns_dispentry_t *resp, isc_result_t result) argument 1758 dispentry_cancel(dns_dispentry_t *resp, isc_result_t result) argument 1780 dns_dispentry_t *resp = *respp; local 1788 udp_startrecv(isc_nmhandle_t *handle, dns_dispentry_t *resp) argument 1801 tcp_startrecv(isc_nmhandle_t *handle, dns_dispatch_t *disp, dns_dispentry_t *resp) argument 1825 dns_dispentry_t *resp = NULL; local 1903 dns_dispentry_t *resp = (dns_dispentry_t *)arg; local 1961 udp_dispatch_connect(dns_dispatch_t *disp, dns_dispentry_t *resp) argument 1974 tcp_dispatch_connect(dns_dispatch_t *disp, dns_dispentry_t *resp) argument 2042 dns_dispatch_connect(dns_dispentry_t *resp) argument 2063 dns_dispentry_t *resp = (dns_dispentry_t *)cbarg; local 2084 tcp_dispatch_getnext(dns_dispatch_t *disp, dns_dispentry_t *resp, int32_t timeout) argument 2107 udp_dispatch_getnext(dns_dispentry_t *resp, int32_t timeout) argument 2126 dns_dispatch_resume(dns_dispentry_t *resp, uint16_t timeout) argument 2151 dns_dispatch_send(dns_dispentry_t *resp, isc_region_t *r) argument 2186 dns_dispentry_getlocaladdress(dns_dispentry_t *resp, isc_sockaddr_t *addrp) argument [all...] |
/netbsd-current/external/bsd/wpa/dist/wpa_supplicant/ |
H A D | p2p_supplicant_sd.c | 183 static void wpas_sd_add_empty(struct wpabuf *resp, u8 srv_proto, argument 188 if (wpabuf_tailroom(resp) < 5) 192 len_pos = wpabuf_put(resp, 2); 193 wpabuf_put_u8(resp, srv_proto); 194 wpabuf_put_u8(resp, srv_trans_id); 196 wpabuf_put_u8(resp, status); 198 WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos - 2); 202 static void wpas_sd_add_proto_not_avail(struct wpabuf *resp, u8 srv_proto, argument 205 wpas_sd_add_empty(resp, srv_proto, srv_trans_id, 210 static void wpas_sd_add_bad_request(struct wpabuf *resp, u argument 217 wpas_sd_add_not_found(struct wpabuf *resp, u8 srv_proto, u8 srv_trans_id) argument 225 wpas_sd_all_bonjour(struct wpa_supplicant *wpa_s, struct wpabuf *resp, u8 srv_trans_id) argument 288 wpas_sd_req_bonjour(struct wpa_supplicant *wpa_s, struct wpabuf *resp, u8 srv_trans_id, const u8 *query, size_t query_len) argument 359 wpas_sd_all_upnp(struct wpa_supplicant *wpa_s, struct wpabuf *resp, u8 srv_trans_id) argument 395 wpas_sd_req_upnp(struct wpa_supplicant *wpa_s, struct wpabuf *resp, u8 srv_trans_id, const u8 *query, size_t query_len) argument 477 wpas_sd_req_wfd(struct wpa_supplicant *wpa_s, struct wpabuf *resp, u8 srv_trans_id, const u8 *query, size_t query_len) argument 557 wpas_sd_req_asp(struct wpa_supplicant *wpa_s, struct wpabuf *resp, u8 srv_trans_id, const u8 *query, size_t query_len) argument 674 wpas_sd_all_asp(struct wpa_supplicant *wpa_s, struct wpabuf *resp, u8 srv_trans_id) argument 697 struct wpabuf *resp; local 1208 wpas_p2p_service_add_bonjour(struct wpa_supplicant *wpa_s, struct wpabuf *query, struct wpabuf *resp) argument [all...] |
/netbsd-current/distrib/miniroot/ |
H A D | install.sub | 59 read resp 60 if [ -z "$resp" ]; then 61 resp=$1 198 _dir=$resp 204 case "$resp" in 225 case "$resp" in 253 if isin $resp $_DKDEVS ; then 254 ROOTDISK="$resp" 257 echo "The disk $resp does not exist." 272 case "$resp" i [all...] |
H A D | install.sh | 87 case "$resp" in 147 resp="not-done" # force at least one iteration 148 while [ "$resp" != "done" ]; do 152 case "$resp" in 157 _device_name=$(basename $resp) 164 _mount_point=$resp 173 resp="X" # force loop to repeat 179 resp="" # force at least one iteration 180 while [ -z "${resp}" ]; do 183 case "$resp" i [all...] |
/netbsd-current/usr.sbin/btattach/ |
H A D | init_bcm43xx.c | 97 uint8_t resp[7]; local 107 uart_recv_cc(fd, HCI_CMD_RESET, &resp, sizeof(resp)); 124 uart_recv_cc(fd, HCI_CMD_43XXFWDN, &resp, sizeof(resp)); 134 uart_recv_cc(fd, fw_cmd, &resp, sizeof(resp)); 141 uart_recv_cc(fd, HCI_CMD_RESET, &resp, sizeof(resp)); 150 uart_recv_cc(fd, HCI_CMD_BCM43XX_SET_CLOCK, &resp, sizeo [all...] |
/netbsd-current/usr.sbin/ypserv/yppush/ |
H A D | yppush_proc.c | 57 struct yppushresp_xfr *resp = argp; local 60 if (resp->status != YPPUSH_SUCC) 61 warnx("%s", yppush_err_string(resp->status));
|
/netbsd-current/crypto/external/bsd/openssh/dist/ |
H A D | ssh-sk-helper.c | 60 struct sshbuf *resp; local 71 if ((resp = sshbuf_new()) == NULL) 73 if (sshbuf_put_u32(resp, SSH_SK_HELPER_ERROR) != 0 || 74 sshbuf_put_u32(resp, (u_int)-r) != 0) 76 return resp; 94 struct sshbuf *resp, *kbuf; local 127 resp = reply_error(r, "Signing failed: %s", ssh_err(r)); 131 if ((resp = sshbuf_new()) == NULL) 134 if ((r = sshbuf_put_u32(resp, SSH_SK_HELPER_SIGN)) != 0 || 135 (r = sshbuf_put_string(resp, si 155 struct sshbuf *challenge, *attest, *kbuf, *resp; local 217 struct sshbuf *kbuf, *resp; local 278 struct sshbuf *req, *resp; local [all...] |
H A D | getrrsetbyname.c | 400 struct dns_response *resp; local 404 resp = calloc(1, sizeof(*resp)); 405 if (resp == NULL) 412 memcpy(&resp->header, cp, HFIXEDSZ); 416 resp->header.qdcount = ntohs(resp->header.qdcount); 417 resp->header.ancount = ntohs(resp->header.ancount); 418 resp [all...] |
/netbsd-current/sys/netinet/ |
H A D | sctp_input.h | 42 sctp_handle_stream_reset_response(struct sctp_tcb *, struct sctp_stream_reset_response *resp);
|
/netbsd-current/external/bsd/wpa/dist/src/eap_peer/ |
H A D | eap_gtc.c | 49 struct wpabuf *resp; local 72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, 74 return resp; 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 106 if (resp == NULL) 109 wpabuf_put_data(resp, "RESPONSE=", 9); 110 wpabuf_put_data(resp, identity, identity_len); 111 wpabuf_put_u8(resp, '\0'); 113 wpabuf_put_data(resp, password, password_len); 115 wpabuf_head_u8(resp) [all...] |
H A D | eap_md5.c | 33 struct wpabuf *resp; local 76 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, 1 + CHAP_MD5_LEN, 78 if (resp == NULL) 85 wpabuf_put_u8(resp, CHAP_MD5_LEN); 87 id = eap_get_id(resp); 88 rpos = wpabuf_put(resp, CHAP_MD5_LEN); 93 wpabuf_free(resp); 98 return resp;
|
H A D | eap_otp.c | 32 struct wpabuf *resp; local 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 68 if (resp == NULL) 70 wpabuf_put_data(resp, password, password_len); 79 return resp;
|
/netbsd-current/crypto/external/cpl/trousers/dist/src/tcs/rpc/tcstp/ |
H A D | rpc_caps.c | 38 BYTE *resp; local 65 &respSize, &resp); 71 free(resp); 74 if (setData(TCSD_PACKET_TYPE_PBYTE, 1, resp, respSize, &data->comm)) { 75 free(resp); 78 free(resp);
|
/netbsd-current/external/bsd/wpa/dist/src/common/ |
H A D | gas_server.c | 28 void (*status_cb)(void *ctx, struct wpabuf *resp, int ok); 37 struct wpabuf *resp; member in struct:gas_server_response 47 void (*tx)(void *ctx, int freq, const u8 *da, struct wpabuf *resp, 64 (unsigned long) wpabuf_len(response->resp)); 66 response->resp, 0); 67 response->resp = NULL; 79 wpabuf_free(response->resp); 92 struct wpabuf *resp; local 119 resp = gas_build_initial_resp(dialog_token, WLAN_STATUS_SUCCESS, 123 if (!resp) { 167 struct wpabuf *resp; local 245 struct wpabuf *resp; local 461 gas_server_register(struct gas_server *gas, const u8 *adv_proto_id, u8 adv_proto_id_len, struct wpabuf * (*req_cb)(void *ctx, const u8 *sa, const u8 *query, size_t query_len), void (*status_cb)(void *ctx, struct wpabuf *resp, int ok), void *ctx) argument [all...] |
/netbsd-current/crypto/external/bsd/heimdal/dist/kadmin/ |
H A D | util.c | 104 * try to parse the string `resp' into attributes in `attr', also 109 parse_attributes (const char *resp, krb5_flags *attr, int *mask, int bit) argument 113 if (str2attributes(resp, &tmp) == 0) { 118 } else if(*resp == '?') { 121 fprintf (stderr, "Unable to parse \"%s\"\n", resp); 133 char buf[1024], resp[1024]; local 140 if(get_response("Attributes", buf, resp, sizeof(resp)) != 0) 142 if (resp[0] == '\0') 144 if (parse_attributes (resp, att 159 parse_policy(const char *resp, char **policy, int *mask, int bit) argument 187 char buf[1024], resp[1024]; local 294 parse_timet(const char *resp, krb5_timestamp *value, int *mask, int bit) argument 317 char buf[1024], resp[1024]; local 380 parse_deltat(const char *resp, krb5_deltat *value, int *mask, int bit) argument 404 char buf[1024], resp[1024]; local [all...] |
/netbsd-current/external/bsd/openpam/dist/modules/pam_unix/ |
H A D | pam_unix.c | 73 struct pam_response *resp; local 103 resp = NULL; 104 pam_err = (*conv->conv)(1, &msgp, &resp, conv->appdata_ptr); 105 if (resp != NULL) { 107 password = resp->resp; 109 free(resp->resp); 110 free(resp);
|
/netbsd-current/crypto/external/cpl/trousers/dist/src/tspi/rpc/tcstp/ |
H A D | rpc_caps.c | 34 BYTE ** resp) /* out */ 62 *resp = (BYTE *) calloc_tspi(hte->tspContext, *respSize); 63 if (*resp == NULL) { 68 if (getData(TCSD_PACKET_TYPE_PBYTE, 1, *resp, *respSize, &hte->comm)) { 69 free_tspi(hte->tspContext, *resp); 29 RPC_GetCapability_TP(struct host_table_entry *hte, TCPA_CAPABILITY_AREA capArea, UINT32 subCapSize, BYTE * subCap, UINT32 * respSize, BYTE ** resp) argument
|