HomeSort by: relevance | last modified time | path
    Searched refs:response (Results 1 - 25 of 402) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/external/gpl2/xcvs/dist/lib/
yesno.c 1 /* yesno.c -- read a yes/no response from stdin
36 extern int rpmatch (char const *response);
41 char *response = NULL; local
43 ssize_t response_len = getline (&response, &response_size, stdin);
50 response[response_len - 1] = '\0';
51 yes = (0 < rpmatch (response));
54 free (response);
rpmatch.c 1 /* Determine whether string value is affirmation or negative response
37 try (const char *response, const char *pattern, const int match,
55 /* See if the regular expression matches RESPONSE. */
56 return regexec (re, response, 0, NULL, 0) == 0 ? match : nomatch;
62 rpmatch (const char *response)
65 /* Match against one of the response patterns, compiling the pattern
68 /* We cache the response patterns and compiled regexps here. */
73 return ((result = try (response, _("^[yY]"), 1, 0,
76 : try (response, _("^[nN]"), 0, -1, &noexpr, &nore));
79 return (*response == 'y' || *response == 'Y' ?
    [all...]
  /src/external/gpl2/lvm2/dist/daemons/clvmd/
refresh_clvmd.c 41 char *response; member in struct:lvm_response
106 /* Get the response */
189 lvm_response_t ** response, int *num)
227 * Allocate response array.
231 *response = dm_malloc(sizeof(lvm_response_t) * num_responses +
233 if (!*response) {
239 rarray = *response;
241 /* Unpack the response into an lvm_response_t array */
251 rarray[i].response = dm_malloc(strlen(inptr) + 1);
252 if (rarray[i].response == NULL)
296 lvm_response_t *response; local
333 lvm_response_t *response; local
    [all...]
  /src/external/bsd/wpa/dist/src/common/
gas_server.c 57 static void gas_server_free_response(struct gas_server_response *response);
62 struct gas_server_response *response = eloop_ctx; local
64 wpa_printf(MSG_DEBUG, "GAS: Response @%p timeout for " MACSTR
66 response, MAC2STR(response->dst), response->dialog_token,
67 response->freq, response->frag_id,
68 (unsigned long) response->offset,
69 (unsigned long) (response->resp
175 struct gas_server_response *response; local
350 struct gas_server_response *response; local
453 struct gas_server_response *response; local
486 struct gas_server_response *tmp, *response = NULL; local
513 struct gas_server_response *tmp, *response = NULL; local
572 struct gas_server_response *response, *tmp_r; local
    [all...]
  /src/external/apache2/mDNSResponder/dist/ServiceRegistration/
dso-utils.c 28 dns_wire_t response; local
29 memset(&response, 0, DNS_HEADER_SIZE);
34 response.id = wire->id;
35 dns_qr_set(&response, dns_qr_response);
36 dns_opcode_set(&response, dns_opcode_get(wire));
37 dns_rcode_set(&response, rcode);
49 towire.p = &response.data[0];
50 towire.lim = ((uint8_t *)&response) + sizeof(response);
51 towire.message = &response;
89 dns_wire_t response; local
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/ttl/
tests_cache_ttl.py 28 response = isctest.query.udp(msg, "10.53.0.2")
29 for rr in response.answer + response.authority:
  /src/external/bsd/ipf/dist/l4check/
l4check.conf 18 response timeout 4
19 response string <HTML>
20 #response file http.ok
  /src/usr.sbin/hdaudioctl/
graph.c 51 prop_dictionary_t request, response; local
79 HDAUDIO_FGRP_CODEC_INFO, &response);
86 prop_dictionary_get_uint16(response, "vendor-id", &vendor);
87 prop_dictionary_get_uint16(response, "product-id", &product);
95 HDAUDIO_FGRP_WIDGET_INFO, &response);
98 prop_dictionary_get_string(response, "name", &name);
99 prop_dictionary_get_uint32(response, "cap", &cap);
100 prop_dictionary_get_uint32(response, "config", &config);
101 prop_dictionary_get_uint8(response, "type", &type);
102 prop_dictionary_get_uint8(response, "nid", &nid)
    [all...]
  /src/external/bsd/wpa/dist/src/eap_common/
chap.c 16 size_t challenge_len, u8 *response)
27 return md5_vector(3, addr, len, response);
chap.h 15 size_t challenge_len, u8 *response);
  /src/external/gpl3/gcc/dist/contrib/
mark_spam.py 37 response = json.loads(r.text)
39 if 'error' in response and response['error']:
40 print(response['message'])
44 bug = response['bugs'][0]
70 response = json.loads(r.text)
71 for c in response['bugs'][str(id)]['comments']:
83 response = json.loads(r.text)
84 attachments = response['bugs'][str(id)]
  /src/external/gpl3/gcc.old/dist/contrib/
mark_spam.py 35 response = json.loads(r.text)
37 if 'error' in response and response['error']:
38 print(response['message'])
42 bug = response['bugs'][0]
68 response = json.loads(r.text)
69 for c in response['bugs'][str(id)]['comments']:
81 response = json.loads(r.text)
82 attachments = response['bugs'][str(id)]
  /src/external/mpl/bind/dist/bin/tests/system/doth/
tests_gnutls.py 63 # the TLS connection immediately, preventing the response from being
73 # upon receiving a DNS response.
78 response = b""
79 while not response and not gnutls_cli.poll():
86 response = dns.message.from_wire(gnutls_cli_output[2:])
90 # At this point either a DNS response was received or a timeout fired
100 # Store the response received for diagnostic purposes.
103 if response:
105 response_txt.write(response.to_text())
107 # Check whether a response was received and whether it is sane
    [all...]
  /src/external/mpl/bind/dist/bin/tests/system/bailiwick/ans2/
ans.py 39 response = qctx.prepare_new_response(with_zone_data=False)
48 response.answer.append(txt_rrset)
53 response.authority.append(ns_rrset)
55 yield DnsResponseSend(response, authoritative=True)
65 response = qctx.prepare_new_response(with_zone_data=False)
70 response.authority.append(ns_rrset)
75 response.additional.append(glue_rrset)
77 yield DnsResponseSend(response, authoritative=False)
87 response = qctx.prepare_new_response(with_zone_data=False)
99 response.answer.append(cname_rrset
    [all...]
  /src/external/gpl2/lvm2/dist/lib/locking/
cluster_locking.c 46 char *response; member in struct:lvm_response
118 /* Get the response */
202 lvm_response_t ** response, int *num)
240 * Allocate response array.
244 *response = dm_malloc(sizeof(lvm_response_t) * num_responses);
245 if (!*response) {
251 rarray = *response;
253 /* Unpack the response into an lvm_response_t array */
263 rarray[i].response = dm_malloc(strlen(inptr) + 1);
264 if (rarray[i].response == NULL)
313 lvm_response_t *response = NULL; local
490 lvm_response_t *response = NULL; local
    [all...]
  /src/external/gpl3/gdb/dist/gdb/python/lib/gdb/dap/
pause.py 20 @request("pause", response=False, expect_stopped=False)
  /src/external/gpl3/gdb.old/dist/gdb/python/lib/gdb/dap/
pause.py 20 @request("pause", response=False, expect_stopped=False)
  /src/external/mpl/bind/dist/bin/tests/system/dialup/
tests_dialup_zone_transfer.py 35 response = isctest.query.tcp(msg, f"10.53.0.{ns}")
36 if response.rcode() != dns.rcode.SERVFAIL:
37 assert response.answer == ns1response.answer
38 assert response.authority == ns1response.authority
  /src/usr.bin/talk/
invite.c 69 CTL_RESPONSE response; local
111 ctl_transact(my_machine_addr, msg, DELETE, &response);
113 ctl_transact(his_machine_addr, msg, DELETE, &response);
146 * Transmit the invitation and process the response
151 CTL_RESPONSE response; local
154 ctl_transact(his_machine_addr, msg, ANNOUNCE, &response);
155 remote_id = response.id_num;
156 if (response.answer != SUCCESS) {
157 if (response.answer < NANSWERS)
158 message(answers[response.answer])
    [all...]
  /src/external/apache2/mDNSResponder/dist/unittests/
mdns_ut.c 32 const DNSMessage *const response,
39 ParseCNameChainFromMessage(response, limit, InterfaceID, qname, cnameChain, outChainLen);
44 const DNSMessage *const response,
57 ParseDenialOfExistenceObjsFromMessage(response, limit, InterfaceID, outObjSOA, objSOARRSIG, outSOARRSIGCount,
66 // This function is only used in the XCTest to help the test of wildcard data response since this kind of denial of
69 GetRRTypeFromMessage(const DNSMessage * const response, const mDNSu8 * const limit, const mDNSInterfaceID InterfaceID)
72 const mDNSu16 answerCount = response->h.numAnswers;
77 const mDNSu8 *ptr = LocateAnswers(response, limit);
84 ptr = GetLargeResourceRecord(m, response, ptr, limit, InterfaceID, kDNSRecordTypePacketAuth, &m->rec);
  /src/external/bsd/ppp/dist/pppd/
chap-md5.c 61 unsigned char *challenge, unsigned char *response,
71 response_len = *response++;
97 if (success && memcmp(hash, response, hash_len) == 0) {
106 chap_md5_make_response(unsigned char *response, int id, char *our_name,
114 response[0] = 0;
126 if (PPP_DigestFinal(ctx, &response[1], &hash_len)) {
128 response[0] = hash_len;
136 if (response[0] == 0)
137 warn("Error occurred in preparing CHAP-Response");
  /src/external/mpl/bind/dist/bin/tests/system/qmin/
qmin_ans.py 54 yield DnsResponseSend(qctx.response)
78 qctx.response.rcode() == dns.rcode.NOERROR
79 and not qctx.response.answer
80 and qctx.response.authority
81 and qctx.response.authority[0].rdtype == dns.rdatatype.SOA
84 qctx.response.set_rcode(self.rcode)
85 yield DnsResponseSend(qctx.response)
104 yield DnsResponseSend(qctx.response, delay=self.delay)
  /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/
iter_cred.c 48 krb5_storage *request, *response; local
59 ret = krb5_kcm_call(context, request, &response, &response_data);
69 ret = krb5_ret_uint32(response, &morep);
74 ret = krb5_ret_stringz(response, &user);
76 ret = krb5_ret_stringz(response, &domain);
94 krb5_storage_free(response);
  /src/external/gpl3/gdb/dist/gdb/testsuite/gdb.ada/
limited-length.exp 78 set response \
81 gdb_test "print Large_1d_Array" $response
82 gdb_test "output Large_1d_Array" $response
83 gdb_test "print Large_3d_Array" $response
84 gdb_test "output Large_3d_Array" $response
  /src/external/mpl/bind/dist/bin/tests/system/resolver/ans8/
ans.pl 66 my $response = new Net::DNS::Packet($qname, $qtype, $qclass);
67 $response->header->qr(1);
68 $response->header->aa(1);
69 $response->header->tc(0);
70 $response->header->id($id);
75 $response->push("answer", new Net::DNS::RR($qname . " 300 NS ns.no-questions"));
76 $response->push("additional", new Net::DNS::RR("ns.no-questions. 300 A 10.53.0.8"));
77 return $response->data;
79 $response->push("answer", new Net::DNS::RR($qname . " 300 A 10.53.0.8"))
81 return $response->data
    [all...]

Completed in 35 milliseconds

1 2 3 4 5 6 7 8 91011>>