Home
last modified time | relevance | path

Searched refs:response (Results 1 – 25 of 932) sorted by relevance

12345678910>>...38

/netbsd-src/external/gpl2/lvm2/dist/daemons/clvmd/
H A Drefresh_clvmd.c41 char *response; member
189 lvm_response_t ** response, int *num) in _cluster_request() argument
231 *response = dm_malloc(sizeof(lvm_response_t) * num_responses + in _cluster_request()
233 if (!*response) { in _cluster_request()
239 rarray = *response; in _cluster_request()
251 rarray[i].response = dm_malloc(strlen(inptr) + 1); in _cluster_request()
252 if (rarray[i].response == NULL) { in _cluster_request()
256 dm_free(rarray[i].response); in _cluster_request()
257 free(*response); in _cluster_request()
263 strcpy(rarray[i].response, inptr); in _cluster_request()
[all …]
/netbsd-src/external/gpl2/lvm2/dist/lib/locking/
H A Dcluster_locking.c46 char *response; member
202 lvm_response_t ** response, int *num) in _cluster_request() argument
244 *response = dm_malloc(sizeof(lvm_response_t) * num_responses); in _cluster_request()
245 if (!*response) { in _cluster_request()
251 rarray = *response; in _cluster_request()
263 rarray[i].response = dm_malloc(strlen(inptr) + 1); in _cluster_request()
264 if (rarray[i].response == NULL) { in _cluster_request()
268 dm_free(rarray[i].response); in _cluster_request()
269 free(*response); in _cluster_request()
275 strcpy(rarray[i].response, inptr); in _cluster_request()
[all …]
/netbsd-src/usr.sbin/hdaudioctl/
H A Dgraph.c51 prop_dictionary_t request, response; in hdaudioctl_graph() local
79 HDAUDIO_FGRP_CODEC_INFO, &response); in hdaudioctl_graph()
86 prop_dictionary_get_uint16(response, "vendor-id", &vendor); in hdaudioctl_graph()
87 prop_dictionary_get_uint16(response, "product-id", &product); in hdaudioctl_graph()
95 HDAUDIO_FGRP_WIDGET_INFO, &response); in hdaudioctl_graph()
98 prop_dictionary_get_string(response, "name", &name); in hdaudioctl_graph()
99 prop_dictionary_get_uint32(response, "cap", &cap); in hdaudioctl_graph()
100 prop_dictionary_get_uint32(response, "config", &config); in hdaudioctl_graph()
101 prop_dictionary_get_uint8(response, "type", &type); in hdaudioctl_graph()
102 prop_dictionary_get_uint8(response, "nid", &nid); in hdaudioctl_graph()
[all …]
H A Dhdaudioctl.c110 prop_dictionary_t request, response; in hdaudioctl_list() local
128 HDAUDIO_FGRP_INFO, &response); in hdaudioctl_list()
134 array = prop_dictionary_get(response, "function-group-info"); in hdaudioctl_list()
153 prop_object_release(response); in hdaudioctl_list()
162 prop_dictionary_t request, response; in hdaudioctl_get() local
184 HDAUDIO_FGRP_GETCONFIG, &response); in hdaudioctl_get()
190 config = prop_dictionary_get(response, "pin-config"); in hdaudioctl_get()
195 prop_object_release(response); in hdaudioctl_get()
204 prop_dictionary_t request, response; in hdaudioctl_set() local
235 HDAUDIO_FGRP_SETCONFIG, &response); in hdaudioctl_set()
[all …]
/netbsd-src/external/mpl/bind/dist/bin/tests/system/resolver/ans8/
H A Dans.pl66 my $response = new Net::DNS::Packet($qname, $qtype, $qclass);
67 $response->header->qr(1);
68 $response->header->aa(1);
69 $response->header->tc(0);
70 $response->header->id($id);
75 $response->push("answer", new Net::DNS::RR($qname . " 300 NS ns.no-questions"));
76 $response->push("additional", new Net::DNS::RR("ns.no-questions. 300 A 10.53.0.8"));
77 return $response->data;
79 $response->push("answer", new Net::DNS::RR($qname . " 300 A 10.53.0.8"))
81 return $response->data;
[all …]
/netbsd-src/crypto/external/bsd/openssh/dist/
H A Dsk-usbhid.c482 struct sk_enroll_response *response) in pack_public_key_ecdsa() argument
490 response->public_key = NULL; in pack_public_key_ecdsa()
491 response->public_key_len = 0; in pack_public_key_ecdsa()
519 response->public_key_len = EC_POINT_point2oct(g, q, in pack_public_key_ecdsa()
521 if (response->public_key_len == 0 || response->public_key_len > 2048) { in pack_public_key_ecdsa()
523 response->public_key_len); in pack_public_key_ecdsa()
526 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_public_key_ecdsa()
531 response->public_key, response->public_key_len, NULL) == 0) { in pack_public_key_ecdsa()
538 if (ret != 0 && response->public_key != NULL) { in pack_public_key_ecdsa()
539 memset(response->public_key, 0, response->public_key_len); in pack_public_key_ecdsa()
[all …]
H A Dgetrrsetbyname.c196 struct dns_response *response = NULL; in getrrsetbyname() local
261 response = parse_dns_response(answer, length); in getrrsetbyname()
262 if (response == NULL) { in getrrsetbyname()
267 if (response->header.qdcount != 1) { in getrrsetbyname()
278 rrset->rri_rdclass = response->query->class; in getrrsetbyname()
279 rrset->rri_rdtype = response->query->type; in getrrsetbyname()
280 rrset->rri_ttl = response->answer->ttl; in getrrsetbyname()
281 rrset->rri_nrdatas = response->header.ancount; in getrrsetbyname()
285 if (response->header.ad == 1) in getrrsetbyname()
290 rrset->rri_name = strdup(response->answer->name); in getrrsetbyname()
[all …]
/netbsd-src/sys/dev/ic/
H A Dtpm.c143 struct tpm_header response; in tpm12_suspend() local
186 error = (*sc->sc_intf->read)(sc, &response, sizeof(response), &nread, in tpm12_suspend()
192 if (nread != sizeof(response)) { in tpm12_suspend()
208 if (be16toh(response.tag) != TPM_TAG_RSP_COMMAND || in tpm12_suspend()
209 be32toh(response.length) != sizeof(response) || in tpm12_suspend()
210 be32toh(response.code) != 0) { in tpm12_suspend()
214 be16toh(response.tag), in tpm12_suspend()
215 be32toh(response.length), in tpm12_suspend()
216 be32toh(response.code)); in tpm12_suspend()
242 struct tpm_header response; in tpm20_suspend() local
[all …]
/netbsd-src/external/mpl/bind/dist/bin/tests/system/timeouts/
H A Dtests_tcp_timeouts.py172 (response, _) = dns.query.receive_tcp(sock, timeout(), one_rr_per_rrset=True)
173 soa = response.get_rrset(
180 (response, _) = dns.query.receive_tcp(
183 soa = response.get_rrset(
228 (response, _) = dns.query.receive_tcp(sock, timeout(), one_rr_per_rrset=True)
229 soa = response.get_rrset(
239 (response, _) = dns.query.receive_tcp(
242 soa = response.get_rrset(
260 (response, _) = dns.query.receive_tcp(sock, timeout(), one_rr_per_rrset=True)
261 soa = response
[all...]
/netbsd-src/external/gpl2/xcvs/dist/lib/
H A Drpmatch.c37 try (const char *response, const char *pattern, const int match, in try() argument
56 return regexec (re, response, 0, NULL, 0) == 0 ? match : nomatch; in try()
62 rpmatch (const char *response) in rpmatch() argument
73 return ((result = try (response, _("^[yY]"), 1, 0, in rpmatch()
76 : try (response, _("^[nN]"), 0, -1, &noexpr, &nore)); in rpmatch()
79 return (*response == 'y' || *response == 'Y' ? 1 in rpmatch()
80 : *response == 'n' || *response == 'N' ? 0 : -1); in rpmatch()
H A Dyesno.c36 extern int rpmatch (char const *response);
41 char *response = NULL; in yesno() local
43 ssize_t response_len = getline (&response, &response_size, stdin); in yesno()
50 response[response_len - 1] = '\0'; in yesno()
51 yes = (0 < rpmatch (response)); in yesno()
54 free (response); in yesno()
/netbsd-src/usr.bin/talk/
H A Dinvite.c69 CTL_RESPONSE response; in invite_remote() local
111 ctl_transact(my_machine_addr, msg, DELETE, &response); in invite_remote()
113 ctl_transact(his_machine_addr, msg, DELETE, &response); in invite_remote()
151 CTL_RESPONSE response; in announce_invite() local
154 ctl_transact(his_machine_addr, msg, ANNOUNCE, &response); in announce_invite()
155 remote_id = response.id_num; in announce_invite()
156 if (response.answer != SUCCESS) { in announce_invite()
157 if (response.answer < NANSWERS) in announce_invite()
158 message(answers[response.answer]); in announce_invite()
162 ctl_transact(my_machine_addr, msg, LEAVE_INVITE, &response); in announce_invite()
[all …]
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/krb5/
H A Dkcm.c178 krb5_storage *response; in krb5_kcm_call() local
189 response = krb5_storage_from_data(&response_data); in krb5_kcm_call()
190 if (response == NULL) { in krb5_kcm_call()
195 ret = krb5_ret_int32(response, &status); in krb5_kcm_call()
197 krb5_storage_free(response); in krb5_kcm_call()
203 krb5_storage_free(response); in krb5_kcm_call()
210 *response_p = response; in krb5_kcm_call()
215 krb5_storage_free(response); in krb5_kcm_call()
258 krb5_storage *request, *response; in kcm_gen_new() local
273 ret = krb5_kcm_call(context, request, &response, &response_data); in kcm_gen_new()
[all …]
/netbsd-src/external/bsd/wpa/dist/src/crypto/
H A Dms_funcs.c146 u8 *response) in challenge_response() argument
150 if (des_encrypt(challenge, password_hash, response) < 0 || in challenge_response()
151 des_encrypt(challenge, password_hash + 7, response + 8) < 0) in challenge_response()
156 return des_encrypt(challenge, zpwd, response + 16); in challenge_response()
174 u8 *response) in generate_nt_response() argument
182 challenge_response(challenge, password_hash, response)) in generate_nt_response()
202 u8 *response) in generate_nt_response_pwhash() argument
209 challenge_response(challenge, password_hash, response)) in generate_nt_response_pwhash()
231 const u8 *nt_response, u8 *response) in generate_authenticator_response_pwhash() argument
257 addr2[0] = response; in generate_authenticator_response_pwhash()
[all …]
/netbsd-src/external/gpl3/gcc/dist/contrib/
H A Dmark_spam.py35 response = json.loads(r.text)
37 if 'error' in response and response['error']:
38 print(response['message'])
42 bug = response['bugs'][0]
68 response = json.loads(r.text)
69 for c in response['bugs'][str(id)]['comments']:
81 response = json.loads(r.text)
82 attachments = response['bugs'][str(id)]
/netbsd-src/external/gpl3/gcc.old/dist/contrib/
H A Dmark_spam.py35 response = json.loads(r.text)
37 if 'error' in response and response['error']:
38 print(response['message'])
42 bug = response['bugs'][0]
68 response = json.loads(r.text)
69 for c in response['bugs'][str(id)]['comments']:
81 response = json.loads(r.text)
82 attachments = response['bugs'][str(id)]
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/ipc/
H A Dclient.c96 const heim_idata *request, heim_idata *response, in mach_ipc() argument
156 response->data = malloc(replyout_length); in mach_ipc()
157 if (response->data == NULL) { in mach_ipc()
162 memcpy(response->data, replyout, replyout_length); in mach_ipc()
163 response->length = replyout_length; in mach_ipc()
167 response->data = malloc(replyin_length); in mach_ipc()
168 if (response->data == NULL) in mach_ipc()
170 memcpy(response->data, replyin, replyin_length); in mach_ipc()
171 response->length = replyin_length; in mach_ipc()
195 heim_idata response; in mheim_ado_acall_reply() local
[all …]
/netbsd-src/crypto/external/bsd/netpgp/dist/src/libpaa/
H A Dlibpaa.c93 fill_identity(paa_identity_t *id, char *response, char *raw_challenge) in fill_identity() argument
102 if (regexec(&id_re, response, 10, matches, 0) != 0) { in fill_identity()
108 &response[(int)matches[1].rm_so]); in fill_identity()
225 paa_format_response(paa_response_t *response, netpgp_t *netpgp, char *in, char *out, size_t outsize) in paa_format_response() argument
237 if (response->realm == NULL) { in paa_format_response()
250 response->userid = netpgp_getvar(netpgp, "userid"); in paa_format_response()
251 outc += snprintf(&out[outc], outsize - outc, " id=\"%s\"", response->userid); in paa_format_response()
253 outc += snprintf(&out[outc], outsize - outc, ",\r\n realm=\"%s\"", response->realm); in paa_format_response()
256 (void) snprintf(sig, sizeof(sig), "%s;%s;%s;", response->userid, response->realm, challenge); in paa_format_response()
257 sigc = netpgp_sign_memory(netpgp, response->userid, challenge, in paa_format_response()
[all …]
/netbsd-src/crypto/external/bsd/heimdal/dist/kcm/
H A Dprotocol.c60 krb5_storage *response) in kcm_op_noop() argument
79 krb5_storage *response) in kcm_op_get_name() argument
99 ret = krb5_store_stringz(response, ccache->name); in kcm_op_get_name()
122 krb5_storage *response) in kcm_op_gen_new() argument
134 ret = krb5_store_stringz(response, name); in kcm_op_gen_new()
153 krb5_storage *response) in kcm_op_initialize() argument
219 krb5_storage *response) in kcm_op_destroy() argument
252 krb5_storage *response) in kcm_op_store() argument
310 krb5_storage *response) in kcm_op_retrieve() argument
376 ret = krb5_store_creds(response, credp); in kcm_op_retrieve()
[all …]
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/ntlm/
H A Dntlm_err.et19 error_code INVALID_APOP, "Invalid APOP response"
20 error_code INVALID_CRAM_MD5, "Invalid CRAM-MD5 response"
21 error_code INVALID_DIGEST_MD5, "Invalid DIGEST-MD5 response"
35 error_code INVALID_LMv1_RESPONSE, "Invalid client LMv1 response"
36 error_code INVALID_NT_RESPONSE, "Invalid client NT response"
37 error_code INVALID_LMv2_RESPONSE, "Invalid client LMv2 response"
38 error_code INVALID_NTv1_RESPONSE, "Invalid client NTv1 response"
39 error_code INVALID_NTv2_RESPONSE, "Invalid client NTv2 response"
/netbsd-src/libexec/talkd/
H A Dtalkd.c71 CTL_RESPONSE response; variable
119 memset(&response, 0, sizeof(response)); in main()
132 process_request(mp, &response); in main()
139 cc = sendto(sockt, (char *)&response, sizeof (response), 0, in main()
141 if (cc != sizeof (response)) in main()
/netbsd-src/external/bsd/unbound/dist/iterator/
H A Diterator.c195 if(iq->response == NULL) { in next_state()
648 } else if(iq->response == NULL && iq->timeout_count != 0) { in errinf_reply()
650 } else if(iq->response == NULL) { in errinf_reply()
662 if(iq->response && iq->response->rep) { in errinf_reply()
663 if(FLAGS_GET_RCODE(iq->response->rep->flags) != 0) { in errinf_reply()
666 FLAGS_GET_RCODE(iq->response->rep->flags), in errinf_reply()
672 if(iq->response->rep->an_numrrsets == 0) { in errinf_reply()
1126 struct reply_info* rep = iq->response->rep; in generate_a_aaaa_check()
1475 iq->response = forged_response; in processInitRequest()
1505 iq->response = msg; in processInitRequest()
[all …]
/netbsd-src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/
H A Diter_cred.c48 krb5_storage *request, *response; in _gss_ntlm_iter_creds_f() local
59 ret = krb5_kcm_call(context, request, &response, &response_data); in _gss_ntlm_iter_creds_f()
69 ret = krb5_ret_uint32(response, &morep); in _gss_ntlm_iter_creds_f()
74 ret = krb5_ret_stringz(response, &user); in _gss_ntlm_iter_creds_f()
76 ret = krb5_ret_stringz(response, &domain); in _gss_ntlm_iter_creds_f()
94 krb5_storage_free(response); in _gss_ntlm_iter_creds_f()
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/
H A DSSL_CTX_set_tlsext_status_cb.pod38 A client application may request that a server send back an OCSP status response
49 with the returned OCSP response by calling SSL_CTX_set_tlsext_status_cb(). The
50 callback function should determine whether the returned OCSP response is
66 The response returned by the server can be obtained via a call to
68 to the OCSP response data and the return value will be the length of that data.
71 response data then B<*resp> will be NULL and the return value from
78 obtain the OCSP response to be sent back; and then set that response data by
79 calling SSL_set_tlsext_status_ocsp_resp(). A pointer to the response data should
86 error; 0 if the response is not acceptable (in which case the handshake will
90 SSL_TLSEXT_ERR_OK (meaning that the OCSP response that has been set should be
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/
H A DSSL_CTX_set_tlsext_status_cb.pod38 A client application may request that a server send back an OCSP status response
49 with the returned OCSP response by calling SSL_CTX_set_tlsext_status_cb(). The
50 callback function should determine whether the returned OCSP response is
66 The response returned by the server can be obtained via a call to
68 to the OCSP response data and the return value will be the length of that data.
71 response data then B<*resp> will be NULL and the return value from
78 obtain the OCSP response to be sent back; and then set that response data by
79 calling SSL_set_tlsext_status_ocsp_resp(). A pointer to the response data should
86 error; 0 if the response is not acceptable (in which case the handshake will
90 SSL_TLSEXT_ERR_OK (meaning that the OCSP response that has been set should be
[all …]

12345678910>>...38