HomeSort by: relevance | last modified time | path
    Searched defs:response (Results 1 - 25 of 123) sorted by relevancy

1 2 3 4 5

  /src/external/mpl/bind/dist/tests/isc/
dnsstream_utils_test_data.h 23 static const char response[] = { variable
  /src/usr.bin/talk/
look_up.c 51 CTL_RESPONSE response; local
52 CTL_RESPONSE *rp = &response;
73 p_error("Response uses invalid network address");
invite.c 69 CTL_RESPONSE response; local
111 ctl_transact(my_machine_addr, msg, DELETE, &response);
113 ctl_transact(his_machine_addr, msg, DELETE, &response);
146 * Transmit the invitation and process the response
151 CTL_RESPONSE response; local
154 ctl_transact(his_machine_addr, msg, ANNOUNCE, &response);
155 remote_id = response.id_num;
156 if (response.answer != SUCCESS) {
157 if (response.answer < NANSWERS)
158 message(answers[response.answer])
    [all...]
  /src/external/gpl2/xcvs/dist/lib/
yesno.c 1 /* yesno.c -- read a yes/no response from stdin
36 extern int rpmatch (char const *response);
41 char *response = NULL; local
43 ssize_t response_len = getline (&response, &response_size, stdin);
50 response[response_len - 1] = '\0';
51 yes = (0 < rpmatch (response));
54 free (response);
  /src/lib/libpam/modules/pam_skey/
pam_skey.c 58 char *response; local
87 response = strdup(pass);
88 if (response == NULL) {
89 pam_error(pamh, "Unable to copy S/Key response");
93 retval = skey_passcheck(user, response) == -1 ?
96 free(response);
  /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/
iter_cred.c 48 krb5_storage *request, *response; local
59 ret = krb5_kcm_call(context, request, &response, &response_data);
69 ret = krb5_ret_uint32(response, &morep);
74 ret = krb5_ret_stringz(response, &user);
76 ret = krb5_ret_stringz(response, &domain);
94 krb5_storage_free(response);
creds.c 106 krb5_storage *request, *response; local
130 ret = krb5_kcm_call(context, request, &response, &response_data);
135 krb5_storage_free(response);
  /src/crypto/external/bsd/netpgp/dist/src/libpaa/
client.c 45 paa_response_t response; local
53 (void) memset(&response, 0x0, sizeof(response));
66 response.realm = optarg;
84 cc = paa_format_response(&response, &netpgp, challenge, buf, sizeof(buf));
libpaa.h 59 /* used in client to formulate response */
65 char response[PAA_CHALLENGE_SIZE * 2]; /* output response */ member in struct:paa_response_t
69 /* this struct holds the identity information in the paa response */
75 int64_t timestamp; /* time of response */
85 /* body of pubkey access authentication challenge/response/check functionality */
  /src/external/apache2/mDNSResponder/dist/ServiceRegistration/
dso-utils.c 28 dns_wire_t response; local
29 memset(&response, 0, DNS_HEADER_SIZE);
34 response.id = wire->id;
35 dns_qr_set(&response, dns_qr_response);
36 dns_opcode_set(&response, dns_opcode_get(wire));
37 dns_rcode_set(&response, rcode);
49 towire.p = &response.data[0];
50 towire.lim = ((uint8_t *)&response) + sizeof(response);
51 towire.message = &response;
89 dns_wire_t response; local
    [all...]
  /src/libexec/talkd/
talkd.c 71 CTL_RESPONSE response; variable
119 memset(&response, 0, sizeof(response));
132 process_request(mp, &response);
139 cc = sendto(sockt, (char *)&response, sizeof (response), 0,
141 if (cc != sizeof (response))
  /src/usr.sbin/hdaudioctl/
graph.c 51 prop_dictionary_t request, response; local
79 HDAUDIO_FGRP_CODEC_INFO, &response);
86 prop_dictionary_get_uint16(response, "vendor-id", &vendor);
87 prop_dictionary_get_uint16(response, "product-id", &product);
95 HDAUDIO_FGRP_WIDGET_INFO, &response);
98 prop_dictionary_get_string(response, "name", &name);
99 prop_dictionary_get_uint32(response, "cap", &cap);
100 prop_dictionary_get_uint32(response, "config", &config);
101 prop_dictionary_get_uint8(response, "type", &type);
102 prop_dictionary_get_uint8(response, "nid", &nid)
    [all...]
hdaudioctl.c 110 prop_dictionary_t request, response; local
128 HDAUDIO_FGRP_INFO, &response);
134 array = prop_dictionary_get(response, "function-group-info");
153 prop_object_release(response);
162 prop_dictionary_t request, response; local
184 HDAUDIO_FGRP_GETCONFIG, &response);
190 config = prop_dictionary_get(response, "pin-config");
195 prop_object_release(response);
204 prop_dictionary_t request, response; local
235 HDAUDIO_FGRP_SETCONFIG, &response);
262 prop_dictionary_t request, response, dict; local
    [all...]
  /src/sys/dev/scsipi/
ss_scanjet.c 436 char response[20]; local
464 error = scanjet_ctl_read(ss, response, 20);
469 p = strchr(response, 'd');
485 error = scanjet_ctl_read(ss, response, 20);
490 p = strchr(response, 'd');
  /src/external/bsd/ppp/dist/pppd/
crypto_ms.c 207 unsigned char response[24] = {}; local
210 DesEncrypt(Challenge, ZPasswordHash + 0, response + 0);
211 DesEncrypt(Challenge, ZPasswordHash + 7, response + 8);
212 DesEncrypt(Challenge, ZPasswordHash + 14, response + 16);
214 return memcmp(response, expected, sizeof(response)) == 0;
228 unsigned char Response[24] = {
236 if (DesDecrypt(Response + 0, ZPasswordHash + 0, Output)) {
240 if (DesDecrypt(Response + 8, ZPasswordHash + 7, Output)) {
244 if (DesDecrypt(Response +16, ZPasswordHash +14, Output))
    [all...]
  /src/external/gpl2/xcvs/dist/src/
client.h 143 struct response
145 /* Name of the response. */
150 * Function to carry out the response. ARGS is the text of the
167 /* Used by the server to indicate whether response is supported by
171 * Failure to implement this response can imply a fatal
178 /* Some clients might not understand this response. */
192 extern struct response responses[];
142 struct response struct
  /src/sys/arch/sparc/dev/
pckbc_js.c 210 int response; local
212 response = pckbc_poll_data1(t, PCKBC_KBD_SLOT);
213 if (response == 0x55)
217 response);
  /src/sys/arch/sparc64/dev/
pckbc_ebus.c 170 int response; local
172 response = pckbc_poll_data1(t, PCKBC_KBD_SLOT);
173 if (response == 0x55)
177 response);
  /src/sys/dev/pckbport/
pmsvar.h 47 int response; member in struct:pms_protocol
  /src/crypto/external/bsd/openssh/dist/
auth2-chall.c 202 * try challenge-response, set authctxt->postponed if we have to
203 * wait for the response.
312 char **response = NULL; local
330 response = xcalloc(nresp, sizeof(char *));
332 if ((r = sshpkt_get_cstring(ssh, &response[i], NULL)) != 0)
333 fatal_fr(r, "parse response");
339 res = kbdintctxt->device->respond(kbdintctxt->ctxt, nresp, response);
342 explicit_bzero(response[i], strlen(response[i]));
343 free(response[i])
    [all...]
  /src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/
key_correctness_proof.c 344 proof->response[i]->array[j], n);
364 DUMP_BI( proof->response[i]->array[j]);
479 // STEP c - compute response
480 LogDebug("Step c: compute response\n");
481 bi_array_ptr *response = (bi_array_ptr *)malloc( sizeof(bi_array_ptr) * num_of_variables); local
482 if (response == NULL) {
487 response[i] = ALLOC_BI_ARRAY();
488 bi_new_array( response[i], bit_size_message_digest);
491 bi_sub( response[i]->array[j],
495 bi_set( response[i]->array[j]
    [all...]
  /src/external/bsd/openldap/dist/servers/lloadd/
bind.c 137 * 2) there is one bind operation pending (waiting on an upstream response)
141 * response)
178 * On a response (in handle_bind_response):
181 * - failure response to a SASL bind - reset client to state 1
185 * - all of the above forward the response immediately
187 * the client's DN, only on receiving the response do we finalise the
188 * exchange by forwarding the successful bind response
449 /* Was it unlinked in the meantime? No need to send a response since the
525 * Remember the response, but first ask the server what
575 /* remember the response for later *
602 BerValue response; local
    [all...]
  /src/external/bsd/pdisk/dist/
DoSCSICommand.c 614 long response; local
616 status = Gestalt(gestaltVMAttr, &response);
618 * VM is active iff Gestalt succeeded and the response is appropriate.
620 return (status == noErr && ((response & (1 << gestaltVMPresent)) != 0));
  /src/external/gpl2/lvm2/dist/daemons/clvmd/
refresh_clvmd.c 41 char *response; member in struct:lvm_response
106 /* Get the response */
189 lvm_response_t ** response, int *num)
227 * Allocate response array.
231 *response = dm_malloc(sizeof(lvm_response_t) * num_responses +
233 if (!*response) {
239 rarray = *response;
241 /* Unpack the response into an lvm_response_t array */
251 rarray[i].response = dm_malloc(strlen(inptr) + 1);
252 if (rarray[i].response == NULL)
296 lvm_response_t *response; local
333 lvm_response_t *response; local
    [all...]
  /src/external/gpl2/lvm2/dist/lib/locking/
cluster_locking.c 46 char *response; member in struct:lvm_response
118 /* Get the response */
202 lvm_response_t ** response, int *num)
240 * Allocate response array.
244 *response = dm_malloc(sizeof(lvm_response_t) * num_responses);
245 if (!*response) {
251 rarray = *response;
253 /* Unpack the response into an lvm_response_t array */
263 rarray[i].response = dm_malloc(strlen(inptr) + 1);
264 if (rarray[i].response == NULL)
313 lvm_response_t *response = NULL; local
490 lvm_response_t *response = NULL; local
    [all...]

Completed in 35 milliseconds

1 2 3 4 5