| /src/external/gpl2/xcvs/dist/lib/ |
| yesno.c | 1 /* yesno.c -- read a yes/no response from stdin 36 extern int rpmatch (char const *response); 41 char *response = NULL; local 43 ssize_t response_len = getline (&response, &response_size, stdin); 50 response[response_len - 1] = '\0'; 51 yes = (0 < rpmatch (response)); 54 free (response);
|
| rpmatch.c | 1 /* Determine whether string value is affirmation or negative response 37 try (const char *response, const char *pattern, const int match, 55 /* See if the regular expression matches RESPONSE. */ 56 return regexec (re, response, 0, NULL, 0) == 0 ? match : nomatch; 62 rpmatch (const char *response) 65 /* Match against one of the response patterns, compiling the pattern 68 /* We cache the response patterns and compiled regexps here. */ 73 return ((result = try (response, _("^[yY]"), 1, 0, 76 : try (response, _("^[nN]"), 0, -1, &noexpr, &nore)); 79 return (*response == 'y' || *response == 'Y' ? [all...] |
| /src/external/gpl2/lvm2/dist/daemons/clvmd/ |
| refresh_clvmd.c | 41 char *response; member in struct:lvm_response 106 /* Get the response */ 189 lvm_response_t ** response, int *num) 227 * Allocate response array. 231 *response = dm_malloc(sizeof(lvm_response_t) * num_responses + 233 if (!*response) { 239 rarray = *response; 241 /* Unpack the response into an lvm_response_t array */ 251 rarray[i].response = dm_malloc(strlen(inptr) + 1); 252 if (rarray[i].response == NULL) 296 lvm_response_t *response; local 333 lvm_response_t *response; local [all...] |
| /src/external/bsd/wpa/dist/src/common/ |
| gas_server.c | 57 static void gas_server_free_response(struct gas_server_response *response); 62 struct gas_server_response *response = eloop_ctx; local 64 wpa_printf(MSG_DEBUG, "GAS: Response @%p timeout for " MACSTR 66 response, MAC2STR(response->dst), response->dialog_token, 67 response->freq, response->frag_id, 68 (unsigned long) response->offset, 69 (unsigned long) (response->resp 175 struct gas_server_response *response; local 350 struct gas_server_response *response; local 453 struct gas_server_response *response; local 486 struct gas_server_response *tmp, *response = NULL; local 513 struct gas_server_response *tmp, *response = NULL; local 572 struct gas_server_response *response, *tmp_r; local [all...] |
| /src/external/apache2/mDNSResponder/dist/ServiceRegistration/ |
| dso-utils.c | 28 dns_wire_t response; local 29 memset(&response, 0, DNS_HEADER_SIZE); 34 response.id = wire->id; 35 dns_qr_set(&response, dns_qr_response); 36 dns_opcode_set(&response, dns_opcode_get(wire)); 37 dns_rcode_set(&response, rcode); 49 towire.p = &response.data[0]; 50 towire.lim = ((uint8_t *)&response) + sizeof(response); 51 towire.message = &response; 89 dns_wire_t response; local [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/ttl/ |
| tests_cache_ttl.py | 28 response = isctest.query.udp(msg, "10.53.0.2") 29 for rr in response.answer + response.authority:
|
| /src/external/bsd/ipf/dist/l4check/ |
| l4check.conf | 18 response timeout 4 19 response string <HTML> 20 #response file http.ok
|
| /src/usr.sbin/hdaudioctl/ |
| graph.c | 51 prop_dictionary_t request, response; local 79 HDAUDIO_FGRP_CODEC_INFO, &response); 86 prop_dictionary_get_uint16(response, "vendor-id", &vendor); 87 prop_dictionary_get_uint16(response, "product-id", &product); 95 HDAUDIO_FGRP_WIDGET_INFO, &response); 98 prop_dictionary_get_string(response, "name", &name); 99 prop_dictionary_get_uint32(response, "cap", &cap); 100 prop_dictionary_get_uint32(response, "config", &config); 101 prop_dictionary_get_uint8(response, "type", &type); 102 prop_dictionary_get_uint8(response, "nid", &nid) [all...] |
| /src/external/bsd/wpa/dist/src/eap_common/ |
| chap.c | 16 size_t challenge_len, u8 *response) 27 return md5_vector(3, addr, len, response);
|
| chap.h | 15 size_t challenge_len, u8 *response);
|
| /src/external/gpl3/gcc/dist/contrib/ |
| mark_spam.py | 37 response = json.loads(r.text) 39 if 'error' in response and response['error']: 40 print(response['message']) 44 bug = response['bugs'][0] 70 response = json.loads(r.text) 71 for c in response['bugs'][str(id)]['comments']: 83 response = json.loads(r.text) 84 attachments = response['bugs'][str(id)]
|
| /src/external/gpl3/gcc.old/dist/contrib/ |
| mark_spam.py | 35 response = json.loads(r.text) 37 if 'error' in response and response['error']: 38 print(response['message']) 42 bug = response['bugs'][0] 68 response = json.loads(r.text) 69 for c in response['bugs'][str(id)]['comments']: 81 response = json.loads(r.text) 82 attachments = response['bugs'][str(id)]
|
| /src/external/mpl/bind/dist/bin/tests/system/doth/ |
| tests_gnutls.py | 63 # the TLS connection immediately, preventing the response from being 73 # upon receiving a DNS response. 78 response = b"" 79 while not response and not gnutls_cli.poll(): 86 response = dns.message.from_wire(gnutls_cli_output[2:]) 90 # At this point either a DNS response was received or a timeout fired 100 # Store the response received for diagnostic purposes. 103 if response: 105 response_txt.write(response.to_text()) 107 # Check whether a response was received and whether it is sane [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/bailiwick/ans2/ |
| ans.py | 39 response = qctx.prepare_new_response(with_zone_data=False) 48 response.answer.append(txt_rrset) 53 response.authority.append(ns_rrset) 55 yield DnsResponseSend(response, authoritative=True) 65 response = qctx.prepare_new_response(with_zone_data=False) 70 response.authority.append(ns_rrset) 75 response.additional.append(glue_rrset) 77 yield DnsResponseSend(response, authoritative=False) 87 response = qctx.prepare_new_response(with_zone_data=False) 99 response.answer.append(cname_rrset [all...] |
| /src/external/gpl2/lvm2/dist/lib/locking/ |
| cluster_locking.c | 46 char *response; member in struct:lvm_response 118 /* Get the response */ 202 lvm_response_t ** response, int *num) 240 * Allocate response array. 244 *response = dm_malloc(sizeof(lvm_response_t) * num_responses); 245 if (!*response) { 251 rarray = *response; 253 /* Unpack the response into an lvm_response_t array */ 263 rarray[i].response = dm_malloc(strlen(inptr) + 1); 264 if (rarray[i].response == NULL) 313 lvm_response_t *response = NULL; local 490 lvm_response_t *response = NULL; local [all...] |
| /src/external/gpl3/gdb/dist/gdb/python/lib/gdb/dap/ |
| pause.py | 20 @request("pause", response=False, expect_stopped=False)
|
| /src/external/gpl3/gdb.old/dist/gdb/python/lib/gdb/dap/ |
| pause.py | 20 @request("pause", response=False, expect_stopped=False)
|
| /src/external/mpl/bind/dist/bin/tests/system/dialup/ |
| tests_dialup_zone_transfer.py | 35 response = isctest.query.tcp(msg, f"10.53.0.{ns}") 36 if response.rcode() != dns.rcode.SERVFAIL: 37 assert response.answer == ns1response.answer 38 assert response.authority == ns1response.authority
|
| /src/usr.bin/talk/ |
| invite.c | 69 CTL_RESPONSE response; local 111 ctl_transact(my_machine_addr, msg, DELETE, &response); 113 ctl_transact(his_machine_addr, msg, DELETE, &response); 146 * Transmit the invitation and process the response 151 CTL_RESPONSE response; local 154 ctl_transact(his_machine_addr, msg, ANNOUNCE, &response); 155 remote_id = response.id_num; 156 if (response.answer != SUCCESS) { 157 if (response.answer < NANSWERS) 158 message(answers[response.answer]) [all...] |
| /src/external/apache2/mDNSResponder/dist/unittests/ |
| mdns_ut.c | 32 const DNSMessage *const response, 39 ParseCNameChainFromMessage(response, limit, InterfaceID, qname, cnameChain, outChainLen); 44 const DNSMessage *const response, 57 ParseDenialOfExistenceObjsFromMessage(response, limit, InterfaceID, outObjSOA, objSOARRSIG, outSOARRSIGCount, 66 // This function is only used in the XCTest to help the test of wildcard data response since this kind of denial of 69 GetRRTypeFromMessage(const DNSMessage * const response, const mDNSu8 * const limit, const mDNSInterfaceID InterfaceID) 72 const mDNSu16 answerCount = response->h.numAnswers; 77 const mDNSu8 *ptr = LocateAnswers(response, limit); 84 ptr = GetLargeResourceRecord(m, response, ptr, limit, InterfaceID, kDNSRecordTypePacketAuth, &m->rec);
|
| /src/external/bsd/ppp/dist/pppd/ |
| chap-md5.c | 61 unsigned char *challenge, unsigned char *response, 71 response_len = *response++; 97 if (success && memcmp(hash, response, hash_len) == 0) { 106 chap_md5_make_response(unsigned char *response, int id, char *our_name, 114 response[0] = 0; 126 if (PPP_DigestFinal(ctx, &response[1], &hash_len)) { 128 response[0] = hash_len; 136 if (response[0] == 0) 137 warn("Error occurred in preparing CHAP-Response");
|
| /src/external/mpl/bind/dist/bin/tests/system/qmin/ |
| qmin_ans.py | 54 yield DnsResponseSend(qctx.response) 78 qctx.response.rcode() == dns.rcode.NOERROR 79 and not qctx.response.answer 80 and qctx.response.authority 81 and qctx.response.authority[0].rdtype == dns.rdatatype.SOA 84 qctx.response.set_rcode(self.rcode) 85 yield DnsResponseSend(qctx.response) 104 yield DnsResponseSend(qctx.response, delay=self.delay)
|
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/ |
| iter_cred.c | 48 krb5_storage *request, *response; local 59 ret = krb5_kcm_call(context, request, &response, &response_data); 69 ret = krb5_ret_uint32(response, &morep); 74 ret = krb5_ret_stringz(response, &user); 76 ret = krb5_ret_stringz(response, &domain); 94 krb5_storage_free(response);
|
| /src/external/gpl3/gdb/dist/gdb/testsuite/gdb.ada/ |
| limited-length.exp | 78 set response \ 81 gdb_test "print Large_1d_Array" $response 82 gdb_test "output Large_1d_Array" $response 83 gdb_test "print Large_3d_Array" $response 84 gdb_test "output Large_3d_Array" $response
|
| /src/external/mpl/bind/dist/bin/tests/system/resolver/ans8/ |
| ans.pl | 66 my $response = new Net::DNS::Packet($qname, $qtype, $qclass); 67 $response->header->qr(1); 68 $response->header->aa(1); 69 $response->header->tc(0); 70 $response->header->id($id); 75 $response->push("answer", new Net::DNS::RR($qname . " 300 NS ns.no-questions")); 76 $response->push("additional", new Net::DNS::RR("ns.no-questions. 300 A 10.53.0.8")); 77 return $response->data; 79 $response->push("answer", new Net::DNS::RR($qname . " 300 A 10.53.0.8")) 81 return $response->data [all...] |