Searched refs:resp (Results 1 - 25 of 325) sorted by relevance

1234567891011>>

/netbsd-current/sys/dev/sdmmc/
H A Dsdmmcreg.h109 #define MMC_R1(resp) ((resp)[0])
110 #define MMC_R3(resp) ((resp)[0])
111 #define SD_R6(resp) ((resp)[0])
112 #define MMC_R7(resp) ((resp)[0])
113 #define MMC_SPI_R1(resp) ((resp)[
[all...]
/netbsd-current/distrib/atari/floppies/prepare/
H A Dinstall.sh57 read resp
58 if [ -z "$resp" ]; then
59 resp=$1
90 if isin $resp $_DKDEVS ; then
91 ROOTDISK="$resp"
94 echo "The disk $resp does not exist."
109 case "$resp" in
114 if isin $resp $_DKDEVS ; then
115 md_labeldisk $resp
118 echo "The disk $resp doe
[all...]
/netbsd-current/distrib/amiga/floppies/inst/
H A Dinstall.sh47 read resp
48 if [ -z "$resp" ]; then
49 resp=$1
95 case $resp in
119 case "$resp" in
155 otherdrives=$( echo "${driveunits}" | sed -e "s,${resp},," )
158 echo "\"${resp}\" is an invalid drive name. Valid choices"
161 rdev=${resp}
185 case "$resp" in
220 resp
[all...]
/netbsd-current/crypto/external/cpl/trousers/dist/src/tcs/
H A Dtcsi_caps.c34 UINT32 * respSize, BYTE ** resp)
87 if ((*resp = malloc(*respSize)) == NULL) {
95 *(TSS_BOOL *)(*resp) = bValue;
97 *(UINT32 *)(*resp) = u32value;
101 if ((*resp = calloc(1, sizeof(TSS_VERSION))) == NULL) {
106 LoadBlob_VERSION(&offset, *resp, &tcsVersion);
111 if ((*resp = malloc(sizeof(TSS_BOOL))) == NULL) {
115 *(TSS_BOOL *)(*resp) = INTERNAL_CAP_TCS_PERSSTORAGE;
130 if ((*resp = malloc(sizeof(TSS_BOOL))) == NULL) {
135 *(TSS_BOOL *)(*resp)
31 internal_TCSGetCap(TCS_CONTEXT_HANDLE hContext, TCPA_CAPABILITY_AREA capArea, UINT32 subCap, UINT32 * respSize, BYTE ** resp) argument
[all...]
H A Dtcs_caps.c39 BYTE *resp; local
44 result = TCSP_GetCapability_Internal(InternalContext, capArea, 0, NULL, &respSize, &resp);
47 UnloadBlob_VERSION(&offset, resp, version);
48 free(resp);
53 &resp);
56 UnloadBlob_VERSION(&offset, resp, version);
57 free(resp);
68 BYTE *resp; local
73 &respSize, &resp);
78 UnloadBlob_BYTE(&offset, (BYTE *)v, resp);
[all...]
/netbsd-current/usr.sbin/timed/timed/
H A Dcandidate.c50 struct tsp *resp, msg; local
89 resp = readmsg(TSP_ANY, ANYADDR, &wait, net);
90 if (!resp)
93 switch (resp->tsp_type) {
96 (void)addmach(resp->tsp_name, &from,fromnet);
106 && !good_host_name(resp->tsp_name)) {
107 (void)addmach(resp->tsp_name, &from,fromnet);
108 suppress(&from, resp->tsp_name, net);
132 htp = addmach(resp->tsp_name,&from,fromnet);
144 (void)addmach(resp
[all...]
/netbsd-current/external/bsd/openpam/dist/lib/libpam/
H A Dopenpam_nullconv.c60 struct pam_response **resp,
70 (void)resp;
58 openpam_nullconv(int n, const struct pam_message **msg, struct pam_response **resp, void *data) argument
H A Dpam_prompt.c61 char **resp,
69 r = pam_vprompt(pamh, style, resp, fmt, ap);
89 * not return one, is stored in the location pointed to by the =resp
59 pam_prompt(const pam_handle_t *pamh, int style, char **resp, const char *fmt, ...) argument
/netbsd-current/external/mpl/bind/dist/lib/dns/
H A Ddispatch.c195 tcp_recv_done(dns_dispentry_t *resp, isc_result_t eresult,
200 dispentry_cancel(dns_dispentry_t *resp, isc_result_t result);
209 udp_startrecv(isc_nmhandle_t *handle, dns_dispentry_t *resp);
211 udp_dispatch_connect(dns_dispatch_t *disp, dns_dispentry_t *resp);
214 dns_dispentry_t *resp);
216 tcp_dispatch_getnext(dns_dispatch_t *disp, dns_dispentry_t *resp,
219 udp_dispatch_getnext(dns_dispentry_t *resp, int32_t timeout);
224 socktype2str(dns_dispentry_t *resp) { argument
225 dns_dispatch_t *disp = resp->disp;
319 dispentry_log(dns_dispentry_t *resp, in
323 dispentry_log(dns_dispentry_t *resp, int level, const char *fmt, ...) argument
368 setup_socket(dns_dispatch_t *disp, dns_dispentry_t *resp, const isc_sockaddr_t *dest, in_port_t *portp) argument
431 dispentry_destroy(dns_dispentry_t *resp) argument
478 dispentry_runtime(dns_dispentry_t *resp, const isc_time_t *now) argument
503 dns_dispentry_t *resp = (dns_dispentry_t *)arg; local
648 dns_dispentry_t *resp = NULL; local
668 dns_dispentry_t *resp = NULL; local
723 tcp_recv_add(dns_displist_t *resps, dns_dispentry_t *resp, isc_result_t result) argument
736 dns_dispentry_t *resp = NULL, *next = NULL; local
749 tcp_recv_done(dns_dispentry_t *resp, isc_result_t eresult, isc_region_t *region) argument
760 dns_dispentry_t *resp = NULL, *next = NULL; local
786 dns_dispentry_t *resp = NULL; local
1432 dns_dispentry_t *resp = NULL; local
1552 dns_dispatch_getnext(dns_dispentry_t *resp) argument
1587 udp_dispentry_cancel(dns_dispentry_t *resp, isc_result_t result) argument
1655 tcp_dispentry_cancel(dns_dispentry_t *resp, isc_result_t result) argument
1758 dispentry_cancel(dns_dispentry_t *resp, isc_result_t result) argument
1780 dns_dispentry_t *resp = *respp; local
1788 udp_startrecv(isc_nmhandle_t *handle, dns_dispentry_t *resp) argument
1801 tcp_startrecv(isc_nmhandle_t *handle, dns_dispatch_t *disp, dns_dispentry_t *resp) argument
1825 dns_dispentry_t *resp = NULL; local
1903 dns_dispentry_t *resp = (dns_dispentry_t *)arg; local
1961 udp_dispatch_connect(dns_dispatch_t *disp, dns_dispentry_t *resp) argument
1974 tcp_dispatch_connect(dns_dispatch_t *disp, dns_dispentry_t *resp) argument
2042 dns_dispatch_connect(dns_dispentry_t *resp) argument
2063 dns_dispentry_t *resp = (dns_dispentry_t *)cbarg; local
2084 tcp_dispatch_getnext(dns_dispatch_t *disp, dns_dispentry_t *resp, int32_t timeout) argument
2107 udp_dispatch_getnext(dns_dispentry_t *resp, int32_t timeout) argument
2126 dns_dispatch_resume(dns_dispentry_t *resp, uint16_t timeout) argument
2151 dns_dispatch_send(dns_dispentry_t *resp, isc_region_t *r) argument
2186 dns_dispentry_getlocaladdress(dns_dispentry_t *resp, isc_sockaddr_t *addrp) argument
[all...]
/netbsd-current/external/bsd/wpa/dist/wpa_supplicant/
H A Dp2p_supplicant_sd.c183 static void wpas_sd_add_empty(struct wpabuf *resp, u8 srv_proto, argument
188 if (wpabuf_tailroom(resp) < 5)
192 len_pos = wpabuf_put(resp, 2);
193 wpabuf_put_u8(resp, srv_proto);
194 wpabuf_put_u8(resp, srv_trans_id);
196 wpabuf_put_u8(resp, status);
198 WPA_PUT_LE16(len_pos, (u8 *) wpabuf_put(resp, 0) - len_pos - 2);
202 static void wpas_sd_add_proto_not_avail(struct wpabuf *resp, u8 srv_proto, argument
205 wpas_sd_add_empty(resp, srv_proto, srv_trans_id,
210 static void wpas_sd_add_bad_request(struct wpabuf *resp, u argument
217 wpas_sd_add_not_found(struct wpabuf *resp, u8 srv_proto, u8 srv_trans_id) argument
225 wpas_sd_all_bonjour(struct wpa_supplicant *wpa_s, struct wpabuf *resp, u8 srv_trans_id) argument
288 wpas_sd_req_bonjour(struct wpa_supplicant *wpa_s, struct wpabuf *resp, u8 srv_trans_id, const u8 *query, size_t query_len) argument
359 wpas_sd_all_upnp(struct wpa_supplicant *wpa_s, struct wpabuf *resp, u8 srv_trans_id) argument
395 wpas_sd_req_upnp(struct wpa_supplicant *wpa_s, struct wpabuf *resp, u8 srv_trans_id, const u8 *query, size_t query_len) argument
477 wpas_sd_req_wfd(struct wpa_supplicant *wpa_s, struct wpabuf *resp, u8 srv_trans_id, const u8 *query, size_t query_len) argument
557 wpas_sd_req_asp(struct wpa_supplicant *wpa_s, struct wpabuf *resp, u8 srv_trans_id, const u8 *query, size_t query_len) argument
674 wpas_sd_all_asp(struct wpa_supplicant *wpa_s, struct wpabuf *resp, u8 srv_trans_id) argument
697 struct wpabuf *resp; local
1208 wpas_p2p_service_add_bonjour(struct wpa_supplicant *wpa_s, struct wpabuf *query, struct wpabuf *resp) argument
[all...]
/netbsd-current/distrib/miniroot/
H A Dinstall.sub59 read resp
60 if [ -z "$resp" ]; then
61 resp=$1
198 _dir=$resp
204 case "$resp" in
225 case "$resp" in
253 if isin $resp $_DKDEVS ; then
254 ROOTDISK="$resp"
257 echo "The disk $resp does not exist."
272 case "$resp" i
[all...]
H A Dinstall.sh87 case "$resp" in
147 resp="not-done" # force at least one iteration
148 while [ "$resp" != "done" ]; do
152 case "$resp" in
157 _device_name=$(basename $resp)
164 _mount_point=$resp
173 resp="X" # force loop to repeat
179 resp="" # force at least one iteration
180 while [ -z "${resp}" ]; do
183 case "$resp" i
[all...]
/netbsd-current/usr.sbin/btattach/
H A Dinit_bcm43xx.c97 uint8_t resp[7]; local
107 uart_recv_cc(fd, HCI_CMD_RESET, &resp, sizeof(resp));
124 uart_recv_cc(fd, HCI_CMD_43XXFWDN, &resp, sizeof(resp));
134 uart_recv_cc(fd, fw_cmd, &resp, sizeof(resp));
141 uart_recv_cc(fd, HCI_CMD_RESET, &resp, sizeof(resp));
150 uart_recv_cc(fd, HCI_CMD_BCM43XX_SET_CLOCK, &resp, sizeo
[all...]
/netbsd-current/usr.sbin/ypserv/yppush/
H A Dyppush_proc.c57 struct yppushresp_xfr *resp = argp; local
60 if (resp->status != YPPUSH_SUCC)
61 warnx("%s", yppush_err_string(resp->status));
/netbsd-current/crypto/external/bsd/openssh/dist/
H A Dssh-sk-helper.c60 struct sshbuf *resp; local
71 if ((resp = sshbuf_new()) == NULL)
73 if (sshbuf_put_u32(resp, SSH_SK_HELPER_ERROR) != 0 ||
74 sshbuf_put_u32(resp, (u_int)-r) != 0)
76 return resp;
94 struct sshbuf *resp, *kbuf; local
127 resp = reply_error(r, "Signing failed: %s", ssh_err(r));
131 if ((resp = sshbuf_new()) == NULL)
134 if ((r = sshbuf_put_u32(resp, SSH_SK_HELPER_SIGN)) != 0 ||
135 (r = sshbuf_put_string(resp, si
155 struct sshbuf *challenge, *attest, *kbuf, *resp; local
217 struct sshbuf *kbuf, *resp; local
278 struct sshbuf *req, *resp; local
[all...]
H A Dgetrrsetbyname.c400 struct dns_response *resp; local
404 resp = calloc(1, sizeof(*resp));
405 if (resp == NULL)
412 memcpy(&resp->header, cp, HFIXEDSZ);
416 resp->header.qdcount = ntohs(resp->header.qdcount);
417 resp->header.ancount = ntohs(resp->header.ancount);
418 resp
[all...]
/netbsd-current/sys/netinet/
H A Dsctp_input.h42 sctp_handle_stream_reset_response(struct sctp_tcb *, struct sctp_stream_reset_response *resp);
/netbsd-current/external/bsd/wpa/dist/src/eap_peer/
H A Deap_gtc.c49 struct wpabuf *resp; local
72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC,
74 return resp;
104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
106 if (resp == NULL)
109 wpabuf_put_data(resp, "RESPONSE=", 9);
110 wpabuf_put_data(resp, identity, identity_len);
111 wpabuf_put_u8(resp, '\0');
113 wpabuf_put_data(resp, password, password_len);
115 wpabuf_head_u8(resp)
[all...]
H A Deap_md5.c33 struct wpabuf *resp; local
76 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, 1 + CHAP_MD5_LEN,
78 if (resp == NULL)
85 wpabuf_put_u8(resp, CHAP_MD5_LEN);
87 id = eap_get_id(resp);
88 rpos = wpabuf_put(resp, CHAP_MD5_LEN);
93 wpabuf_free(resp);
98 return resp;
H A Deap_otp.c32 struct wpabuf *resp; local
66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
68 if (resp == NULL)
70 wpabuf_put_data(resp, password, password_len);
79 return resp;
/netbsd-current/crypto/external/cpl/trousers/dist/src/tcs/rpc/tcstp/
H A Drpc_caps.c38 BYTE *resp; local
65 &respSize, &resp);
71 free(resp);
74 if (setData(TCSD_PACKET_TYPE_PBYTE, 1, resp, respSize, &data->comm)) {
75 free(resp);
78 free(resp);
/netbsd-current/external/bsd/wpa/dist/src/common/
H A Dgas_server.c28 void (*status_cb)(void *ctx, struct wpabuf *resp, int ok);
37 struct wpabuf *resp; member in struct:gas_server_response
47 void (*tx)(void *ctx, int freq, const u8 *da, struct wpabuf *resp,
64 (unsigned long) wpabuf_len(response->resp));
66 response->resp, 0);
67 response->resp = NULL;
79 wpabuf_free(response->resp);
92 struct wpabuf *resp; local
119 resp = gas_build_initial_resp(dialog_token, WLAN_STATUS_SUCCESS,
123 if (!resp) {
167 struct wpabuf *resp; local
245 struct wpabuf *resp; local
461 gas_server_register(struct gas_server *gas, const u8 *adv_proto_id, u8 adv_proto_id_len, struct wpabuf * (*req_cb)(void *ctx, const u8 *sa, const u8 *query, size_t query_len), void (*status_cb)(void *ctx, struct wpabuf *resp, int ok), void *ctx) argument
[all...]
/netbsd-current/crypto/external/bsd/heimdal/dist/kadmin/
H A Dutil.c104 * try to parse the string `resp' into attributes in `attr', also
109 parse_attributes (const char *resp, krb5_flags *attr, int *mask, int bit) argument
113 if (str2attributes(resp, &tmp) == 0) {
118 } else if(*resp == '?') {
121 fprintf (stderr, "Unable to parse \"%s\"\n", resp);
133 char buf[1024], resp[1024]; local
140 if(get_response("Attributes", buf, resp, sizeof(resp)) != 0)
142 if (resp[0] == '\0')
144 if (parse_attributes (resp, att
159 parse_policy(const char *resp, char **policy, int *mask, int bit) argument
187 char buf[1024], resp[1024]; local
294 parse_timet(const char *resp, krb5_timestamp *value, int *mask, int bit) argument
317 char buf[1024], resp[1024]; local
380 parse_deltat(const char *resp, krb5_deltat *value, int *mask, int bit) argument
404 char buf[1024], resp[1024]; local
[all...]
/netbsd-current/external/bsd/openpam/dist/modules/pam_unix/
H A Dpam_unix.c73 struct pam_response *resp; local
103 resp = NULL;
104 pam_err = (*conv->conv)(1, &msgp, &resp, conv->appdata_ptr);
105 if (resp != NULL) {
107 password = resp->resp;
109 free(resp->resp);
110 free(resp);
/netbsd-current/crypto/external/cpl/trousers/dist/src/tspi/rpc/tcstp/
H A Drpc_caps.c34 BYTE ** resp) /* out */
62 *resp = (BYTE *) calloc_tspi(hte->tspContext, *respSize);
63 if (*resp == NULL) {
68 if (getData(TCSD_PACKET_TYPE_PBYTE, 1, *resp, *respSize, &hte->comm)) {
69 free_tspi(hte->tspContext, *resp);
29 RPC_GetCapability_TP(struct host_table_entry *hte, TCPA_CAPABILITY_AREA capArea, UINT32 subCapSize, BYTE * subCap, UINT32 * respSize, BYTE ** resp) argument

Completed in 189 milliseconds

1234567891011>>