| /netbsd-src/external/gpl2/lvm2/dist/daemons/clvmd/ |
| H A D | refresh_clvmd.c | 41 char *response; member 189 lvm_response_t ** response, int *num) in _cluster_request() argument 231 *response = dm_malloc(sizeof(lvm_response_t) * num_responses + in _cluster_request() 233 if (!*response) { in _cluster_request() 239 rarray = *response; in _cluster_request() 251 rarray[i].response = dm_malloc(strlen(inptr) + 1); in _cluster_request() 252 if (rarray[i].response == NULL) { in _cluster_request() 256 dm_free(rarray[i].response); in _cluster_request() 257 free(*response); in _cluster_request() 263 strcpy(rarray[i].response, inptr); in _cluster_request() [all …]
|
| /netbsd-src/external/gpl2/lvm2/dist/lib/locking/ |
| H A D | cluster_locking.c | 46 char *response; member 202 lvm_response_t ** response, int *num) in _cluster_request() argument 244 *response = dm_malloc(sizeof(lvm_response_t) * num_responses); in _cluster_request() 245 if (!*response) { in _cluster_request() 251 rarray = *response; in _cluster_request() 263 rarray[i].response = dm_malloc(strlen(inptr) + 1); in _cluster_request() 264 if (rarray[i].response == NULL) { in _cluster_request() 268 dm_free(rarray[i].response); in _cluster_request() 269 free(*response); in _cluster_request() 275 strcpy(rarray[i].response, inptr); in _cluster_request() [all …]
|
| /netbsd-src/usr.sbin/hdaudioctl/ |
| H A D | graph.c | 51 prop_dictionary_t request, response; in hdaudioctl_graph() local 79 HDAUDIO_FGRP_CODEC_INFO, &response); in hdaudioctl_graph() 86 prop_dictionary_get_uint16(response, "vendor-id", &vendor); in hdaudioctl_graph() 87 prop_dictionary_get_uint16(response, "product-id", &product); in hdaudioctl_graph() 95 HDAUDIO_FGRP_WIDGET_INFO, &response); in hdaudioctl_graph() 98 prop_dictionary_get_string(response, "name", &name); in hdaudioctl_graph() 99 prop_dictionary_get_uint32(response, "cap", &cap); in hdaudioctl_graph() 100 prop_dictionary_get_uint32(response, "config", &config); in hdaudioctl_graph() 101 prop_dictionary_get_uint8(response, "type", &type); in hdaudioctl_graph() 102 prop_dictionary_get_uint8(response, "nid", &nid); in hdaudioctl_graph() [all …]
|
| H A D | hdaudioctl.c | 110 prop_dictionary_t request, response; in hdaudioctl_list() local 128 HDAUDIO_FGRP_INFO, &response); in hdaudioctl_list() 134 array = prop_dictionary_get(response, "function-group-info"); in hdaudioctl_list() 153 prop_object_release(response); in hdaudioctl_list() 162 prop_dictionary_t request, response; in hdaudioctl_get() local 184 HDAUDIO_FGRP_GETCONFIG, &response); in hdaudioctl_get() 190 config = prop_dictionary_get(response, "pin-config"); in hdaudioctl_get() 195 prop_object_release(response); in hdaudioctl_get() 204 prop_dictionary_t request, response; in hdaudioctl_set() local 235 HDAUDIO_FGRP_SETCONFIG, &response); in hdaudioctl_set() [all …]
|
| /netbsd-src/external/mpl/bind/dist/bin/tests/system/resolver/ans8/ |
| H A D | ans.pl | 66 my $response = new Net::DNS::Packet($qname, $qtype, $qclass); 67 $response->header->qr(1); 68 $response->header->aa(1); 69 $response->header->tc(0); 70 $response->header->id($id); 75 $response->push("answer", new Net::DNS::RR($qname . " 300 NS ns.no-questions")); 76 $response->push("additional", new Net::DNS::RR("ns.no-questions. 300 A 10.53.0.8")); 77 return $response->data; 79 $response->push("answer", new Net::DNS::RR($qname . " 300 A 10.53.0.8")) 81 return $response->data; [all …]
|
| /netbsd-src/crypto/external/bsd/openssh/dist/ |
| H A D | sk-usbhid.c | 482 struct sk_enroll_response *response) in pack_public_key_ecdsa() argument 490 response->public_key = NULL; in pack_public_key_ecdsa() 491 response->public_key_len = 0; in pack_public_key_ecdsa() 519 response->public_key_len = EC_POINT_point2oct(g, q, in pack_public_key_ecdsa() 521 if (response->public_key_len == 0 || response->public_key_len > 2048) { in pack_public_key_ecdsa() 523 response->public_key_len); in pack_public_key_ecdsa() 526 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_public_key_ecdsa() 531 response->public_key, response->public_key_len, NULL) == 0) { in pack_public_key_ecdsa() 538 if (ret != 0 && response->public_key != NULL) { in pack_public_key_ecdsa() 539 memset(response->public_key, 0, response->public_key_len); in pack_public_key_ecdsa() [all …]
|
| H A D | getrrsetbyname.c | 196 struct dns_response *response = NULL; in getrrsetbyname() local 261 response = parse_dns_response(answer, length); in getrrsetbyname() 262 if (response == NULL) { in getrrsetbyname() 267 if (response->header.qdcount != 1) { in getrrsetbyname() 278 rrset->rri_rdclass = response->query->class; in getrrsetbyname() 279 rrset->rri_rdtype = response->query->type; in getrrsetbyname() 280 rrset->rri_ttl = response->answer->ttl; in getrrsetbyname() 281 rrset->rri_nrdatas = response->header.ancount; in getrrsetbyname() 285 if (response->header.ad == 1) in getrrsetbyname() 290 rrset->rri_name = strdup(response->answer->name); in getrrsetbyname() [all …]
|
| /netbsd-src/sys/dev/ic/ |
| H A D | tpm.c | 143 struct tpm_header response; in tpm12_suspend() local 186 error = (*sc->sc_intf->read)(sc, &response, sizeof(response), &nread, in tpm12_suspend() 192 if (nread != sizeof(response)) { in tpm12_suspend() 208 if (be16toh(response.tag) != TPM_TAG_RSP_COMMAND || in tpm12_suspend() 209 be32toh(response.length) != sizeof(response) || in tpm12_suspend() 210 be32toh(response.code) != 0) { in tpm12_suspend() 214 be16toh(response.tag), in tpm12_suspend() 215 be32toh(response.length), in tpm12_suspend() 216 be32toh(response.code)); in tpm12_suspend() 242 struct tpm_header response; in tpm20_suspend() local [all …]
|
| /netbsd-src/external/mpl/bind/dist/bin/tests/system/timeouts/ |
| H A D | tests_tcp_timeouts.py | 172 (response, _) = dns.query.receive_tcp(sock, timeout(), one_rr_per_rrset=True) 173 soa = response.get_rrset( 180 (response, _) = dns.query.receive_tcp( 183 soa = response.get_rrset( 228 (response, _) = dns.query.receive_tcp(sock, timeout(), one_rr_per_rrset=True) 229 soa = response.get_rrset( 239 (response, _) = dns.query.receive_tcp( 242 soa = response.get_rrset( 260 (response, _) = dns.query.receive_tcp(sock, timeout(), one_rr_per_rrset=True) 261 soa = response [all...] |
| /netbsd-src/external/gpl2/xcvs/dist/lib/ |
| H A D | rpmatch.c | 37 try (const char *response, const char *pattern, const int match, in try() argument 56 return regexec (re, response, 0, NULL, 0) == 0 ? match : nomatch; in try() 62 rpmatch (const char *response) in rpmatch() argument 73 return ((result = try (response, _("^[yY]"), 1, 0, in rpmatch() 76 : try (response, _("^[nN]"), 0, -1, &noexpr, &nore)); in rpmatch() 79 return (*response == 'y' || *response == 'Y' ? 1 in rpmatch() 80 : *response == 'n' || *response == 'N' ? 0 : -1); in rpmatch()
|
| H A D | yesno.c | 36 extern int rpmatch (char const *response); 41 char *response = NULL; in yesno() local 43 ssize_t response_len = getline (&response, &response_size, stdin); in yesno() 50 response[response_len - 1] = '\0'; in yesno() 51 yes = (0 < rpmatch (response)); in yesno() 54 free (response); in yesno()
|
| /netbsd-src/usr.bin/talk/ |
| H A D | invite.c | 69 CTL_RESPONSE response; in invite_remote() local 111 ctl_transact(my_machine_addr, msg, DELETE, &response); in invite_remote() 113 ctl_transact(his_machine_addr, msg, DELETE, &response); in invite_remote() 151 CTL_RESPONSE response; in announce_invite() local 154 ctl_transact(his_machine_addr, msg, ANNOUNCE, &response); in announce_invite() 155 remote_id = response.id_num; in announce_invite() 156 if (response.answer != SUCCESS) { in announce_invite() 157 if (response.answer < NANSWERS) in announce_invite() 158 message(answers[response.answer]); in announce_invite() 162 ctl_transact(my_machine_addr, msg, LEAVE_INVITE, &response); in announce_invite() [all …]
|
| /netbsd-src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| H A D | kcm.c | 178 krb5_storage *response; in krb5_kcm_call() local 189 response = krb5_storage_from_data(&response_data); in krb5_kcm_call() 190 if (response == NULL) { in krb5_kcm_call() 195 ret = krb5_ret_int32(response, &status); in krb5_kcm_call() 197 krb5_storage_free(response); in krb5_kcm_call() 203 krb5_storage_free(response); in krb5_kcm_call() 210 *response_p = response; in krb5_kcm_call() 215 krb5_storage_free(response); in krb5_kcm_call() 258 krb5_storage *request, *response; in kcm_gen_new() local 273 ret = krb5_kcm_call(context, request, &response, &response_data); in kcm_gen_new() [all …]
|
| /netbsd-src/external/bsd/wpa/dist/src/crypto/ |
| H A D | ms_funcs.c | 146 u8 *response) in challenge_response() argument 150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response() 151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response() 156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response() 174 u8 *response) in generate_nt_response() argument 182 challenge_response(challenge, password_hash, response)) in generate_nt_response() 202 u8 *response) in generate_nt_response_pwhash() argument 209 challenge_response(challenge, password_hash, response)) in generate_nt_response_pwhash() 231 const u8 *nt_response, u8 *response) in generate_authenticator_response_pwhash() argument 257 addr2[0] = response; in generate_authenticator_response_pwhash() [all …]
|
| /netbsd-src/external/gpl3/gcc/dist/contrib/ |
| H A D | mark_spam.py | 35 response = json.loads(r.text) 37 if 'error' in response and response['error']: 38 print(response['message']) 42 bug = response['bugs'][0] 68 response = json.loads(r.text) 69 for c in response['bugs'][str(id)]['comments']: 81 response = json.loads(r.text) 82 attachments = response['bugs'][str(id)]
|
| /netbsd-src/external/gpl3/gcc.old/dist/contrib/ |
| H A D | mark_spam.py | 35 response = json.loads(r.text) 37 if 'error' in response and response['error']: 38 print(response['message']) 42 bug = response['bugs'][0] 68 response = json.loads(r.text) 69 for c in response['bugs'][str(id)]['comments']: 81 response = json.loads(r.text) 82 attachments = response['bugs'][str(id)]
|
| /netbsd-src/crypto/external/bsd/heimdal/dist/lib/ipc/ |
| H A D | client.c | 96 const heim_idata *request, heim_idata *response, in mach_ipc() argument 156 response->data = malloc(replyout_length); in mach_ipc() 157 if (response->data == NULL) { in mach_ipc() 162 memcpy(response->data, replyout, replyout_length); in mach_ipc() 163 response->length = replyout_length; in mach_ipc() 167 response->data = malloc(replyin_length); in mach_ipc() 168 if (response->data == NULL) in mach_ipc() 170 memcpy(response->data, replyin, replyin_length); in mach_ipc() 171 response->length = replyin_length; in mach_ipc() 195 heim_idata response; in mheim_ado_acall_reply() local [all …]
|
| /netbsd-src/crypto/external/bsd/netpgp/dist/src/libpaa/ |
| H A D | libpaa.c | 93 fill_identity(paa_identity_t *id, char *response, char *raw_challenge) in fill_identity() argument 102 if (regexec(&id_re, response, 10, matches, 0) != 0) { in fill_identity() 108 &response[(int)matches[1].rm_so]); in fill_identity() 225 paa_format_response(paa_response_t *response, netpgp_t *netpgp, char *in, char *out, size_t outsize) in paa_format_response() argument 237 if (response->realm == NULL) { in paa_format_response() 250 response->userid = netpgp_getvar(netpgp, "userid"); in paa_format_response() 251 outc += snprintf(&out[outc], outsize - outc, " id=\"%s\"", response->userid); in paa_format_response() 253 outc += snprintf(&out[outc], outsize - outc, ",\r\n realm=\"%s\"", response->realm); in paa_format_response() 256 (void) snprintf(sig, sizeof(sig), "%s;%s;%s;", response->userid, response->realm, challenge); in paa_format_response() 257 sigc = netpgp_sign_memory(netpgp, response->userid, challenge, in paa_format_response() [all …]
|
| /netbsd-src/crypto/external/bsd/heimdal/dist/kcm/ |
| H A D | protocol.c | 60 krb5_storage *response) in kcm_op_noop() argument 79 krb5_storage *response) in kcm_op_get_name() argument 99 ret = krb5_store_stringz(response, ccache->name); in kcm_op_get_name() 122 krb5_storage *response) in kcm_op_gen_new() argument 134 ret = krb5_store_stringz(response, name); in kcm_op_gen_new() 153 krb5_storage *response) in kcm_op_initialize() argument 219 krb5_storage *response) in kcm_op_destroy() argument 252 krb5_storage *response) in kcm_op_store() argument 310 krb5_storage *response) in kcm_op_retrieve() argument 376 ret = krb5_store_creds(response, credp); in kcm_op_retrieve() [all …]
|
| /netbsd-src/crypto/external/bsd/heimdal/dist/lib/ntlm/ |
| H A D | ntlm_err.et | 19 error_code INVALID_APOP, "Invalid APOP response" 20 error_code INVALID_CRAM_MD5, "Invalid CRAM-MD5 response" 21 error_code INVALID_DIGEST_MD5, "Invalid DIGEST-MD5 response" 35 error_code INVALID_LMv1_RESPONSE, "Invalid client LMv1 response" 36 error_code INVALID_NT_RESPONSE, "Invalid client NT response" 37 error_code INVALID_LMv2_RESPONSE, "Invalid client LMv2 response" 38 error_code INVALID_NTv1_RESPONSE, "Invalid client NTv1 response" 39 error_code INVALID_NTv2_RESPONSE, "Invalid client NTv2 response"
|
| /netbsd-src/libexec/talkd/ |
| H A D | talkd.c | 71 CTL_RESPONSE response; variable 119 memset(&response, 0, sizeof(response)); in main() 132 process_request(mp, &response); in main() 139 cc = sendto(sockt, (char *)&response, sizeof (response), 0, in main() 141 if (cc != sizeof (response)) in main()
|
| /netbsd-src/external/bsd/unbound/dist/iterator/ |
| H A D | iterator.c | 195 if(iq->response == NULL) { in next_state() 648 } else if(iq->response == NULL && iq->timeout_count != 0) { in errinf_reply() 650 } else if(iq->response == NULL) { in errinf_reply() 662 if(iq->response && iq->response->rep) { in errinf_reply() 663 if(FLAGS_GET_RCODE(iq->response->rep->flags) != 0) { in errinf_reply() 666 FLAGS_GET_RCODE(iq->response->rep->flags), in errinf_reply() 672 if(iq->response->rep->an_numrrsets == 0) { in errinf_reply() 1126 struct reply_info* rep = iq->response->rep; in generate_a_aaaa_check() 1475 iq->response = forged_response; in processInitRequest() 1505 iq->response = msg; in processInitRequest() [all …]
|
| /netbsd-src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/ |
| H A D | iter_cred.c | 48 krb5_storage *request, *response; in _gss_ntlm_iter_creds_f() local 59 ret = krb5_kcm_call(context, request, &response, &response_data); in _gss_ntlm_iter_creds_f() 69 ret = krb5_ret_uint32(response, &morep); in _gss_ntlm_iter_creds_f() 74 ret = krb5_ret_stringz(response, &user); in _gss_ntlm_iter_creds_f() 76 ret = krb5_ret_stringz(response, &domain); in _gss_ntlm_iter_creds_f() 94 krb5_storage_free(response); in _gss_ntlm_iter_creds_f()
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
| H A D | SSL_CTX_set_tlsext_status_cb.pod | 38 A client application may request that a server send back an OCSP status response 49 with the returned OCSP response by calling SSL_CTX_set_tlsext_status_cb(). The 50 callback function should determine whether the returned OCSP response is 66 The response returned by the server can be obtained via a call to 68 to the OCSP response data and the return value will be the length of that data. 71 response data then B<*resp> will be NULL and the return value from 78 obtain the OCSP response to be sent back; and then set that response data by 79 calling SSL_set_tlsext_status_ocsp_resp(). A pointer to the response data should 86 error; 0 if the response is not acceptable (in which case the handshake will 90 SSL_TLSEXT_ERR_OK (meaning that the OCSP response that has been set should be [all …]
|
| /netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
| H A D | SSL_CTX_set_tlsext_status_cb.pod | 38 A client application may request that a server send back an OCSP status response 49 with the returned OCSP response by calling SSL_CTX_set_tlsext_status_cb(). The 50 callback function should determine whether the returned OCSP response is 66 The response returned by the server can be obtained via a call to 68 to the OCSP response data and the return value will be the length of that data. 71 response data then B<*resp> will be NULL and the return value from 78 obtain the OCSP response to be sent back; and then set that response data by 79 calling SSL_set_tlsext_status_ocsp_resp(). A pointer to the response data should 86 error; 0 if the response is not acceptable (in which case the handshake will 90 SSL_TLSEXT_ERR_OK (meaning that the OCSP response that has been set should be [all …]
|