| /src/external/mpl/bind/dist/tests/isc/ |
| dnsstream_utils_test_data.h | 23 static const char response[] = { variable
|
| /src/usr.bin/talk/ |
| look_up.c | 51 CTL_RESPONSE response; local 52 CTL_RESPONSE *rp = &response; 73 p_error("Response uses invalid network address");
|
| invite.c | 69 CTL_RESPONSE response; local 111 ctl_transact(my_machine_addr, msg, DELETE, &response); 113 ctl_transact(his_machine_addr, msg, DELETE, &response); 146 * Transmit the invitation and process the response 151 CTL_RESPONSE response; local 154 ctl_transact(his_machine_addr, msg, ANNOUNCE, &response); 155 remote_id = response.id_num; 156 if (response.answer != SUCCESS) { 157 if (response.answer < NANSWERS) 158 message(answers[response.answer]) [all...] |
| /src/external/gpl2/xcvs/dist/lib/ |
| yesno.c | 1 /* yesno.c -- read a yes/no response from stdin 36 extern int rpmatch (char const *response); 41 char *response = NULL; local 43 ssize_t response_len = getline (&response, &response_size, stdin); 50 response[response_len - 1] = '\0'; 51 yes = (0 < rpmatch (response)); 54 free (response);
|
| /src/lib/libpam/modules/pam_skey/ |
| pam_skey.c | 58 char *response; local 87 response = strdup(pass); 88 if (response == NULL) { 89 pam_error(pamh, "Unable to copy S/Key response"); 93 retval = skey_passcheck(user, response) == -1 ? 96 free(response);
|
| /src/crypto/external/bsd/heimdal/dist/lib/gssapi/ntlm/ |
| iter_cred.c | 48 krb5_storage *request, *response; local 59 ret = krb5_kcm_call(context, request, &response, &response_data); 69 ret = krb5_ret_uint32(response, &morep); 74 ret = krb5_ret_stringz(response, &user); 76 ret = krb5_ret_stringz(response, &domain); 94 krb5_storage_free(response);
|
| creds.c | 106 krb5_storage *request, *response; local 130 ret = krb5_kcm_call(context, request, &response, &response_data); 135 krb5_storage_free(response);
|
| /src/crypto/external/bsd/netpgp/dist/src/libpaa/ |
| client.c | 45 paa_response_t response; local 53 (void) memset(&response, 0x0, sizeof(response)); 66 response.realm = optarg; 84 cc = paa_format_response(&response, &netpgp, challenge, buf, sizeof(buf));
|
| libpaa.h | 59 /* used in client to formulate response */ 65 char response[PAA_CHALLENGE_SIZE * 2]; /* output response */ member in struct:paa_response_t 69 /* this struct holds the identity information in the paa response */ 75 int64_t timestamp; /* time of response */ 85 /* body of pubkey access authentication challenge/response/check functionality */
|
| /src/external/apache2/mDNSResponder/dist/ServiceRegistration/ |
| dso-utils.c | 28 dns_wire_t response; local 29 memset(&response, 0, DNS_HEADER_SIZE); 34 response.id = wire->id; 35 dns_qr_set(&response, dns_qr_response); 36 dns_opcode_set(&response, dns_opcode_get(wire)); 37 dns_rcode_set(&response, rcode); 49 towire.p = &response.data[0]; 50 towire.lim = ((uint8_t *)&response) + sizeof(response); 51 towire.message = &response; 89 dns_wire_t response; local [all...] |
| /src/libexec/talkd/ |
| talkd.c | 71 CTL_RESPONSE response; variable 119 memset(&response, 0, sizeof(response)); 132 process_request(mp, &response); 139 cc = sendto(sockt, (char *)&response, sizeof (response), 0, 141 if (cc != sizeof (response))
|
| /src/usr.sbin/hdaudioctl/ |
| graph.c | 51 prop_dictionary_t request, response; local 79 HDAUDIO_FGRP_CODEC_INFO, &response); 86 prop_dictionary_get_uint16(response, "vendor-id", &vendor); 87 prop_dictionary_get_uint16(response, "product-id", &product); 95 HDAUDIO_FGRP_WIDGET_INFO, &response); 98 prop_dictionary_get_string(response, "name", &name); 99 prop_dictionary_get_uint32(response, "cap", &cap); 100 prop_dictionary_get_uint32(response, "config", &config); 101 prop_dictionary_get_uint8(response, "type", &type); 102 prop_dictionary_get_uint8(response, "nid", &nid) [all...] |
| hdaudioctl.c | 110 prop_dictionary_t request, response; local 128 HDAUDIO_FGRP_INFO, &response); 134 array = prop_dictionary_get(response, "function-group-info"); 153 prop_object_release(response); 162 prop_dictionary_t request, response; local 184 HDAUDIO_FGRP_GETCONFIG, &response); 190 config = prop_dictionary_get(response, "pin-config"); 195 prop_object_release(response); 204 prop_dictionary_t request, response; local 235 HDAUDIO_FGRP_SETCONFIG, &response); 262 prop_dictionary_t request, response, dict; local [all...] |
| /src/sys/dev/scsipi/ |
| ss_scanjet.c | 436 char response[20]; local 464 error = scanjet_ctl_read(ss, response, 20); 469 p = strchr(response, 'd'); 485 error = scanjet_ctl_read(ss, response, 20); 490 p = strchr(response, 'd');
|
| /src/external/bsd/ppp/dist/pppd/ |
| crypto_ms.c | 207 unsigned char response[24] = {}; local 210 DesEncrypt(Challenge, ZPasswordHash + 0, response + 0); 211 DesEncrypt(Challenge, ZPasswordHash + 7, response + 8); 212 DesEncrypt(Challenge, ZPasswordHash + 14, response + 16); 214 return memcmp(response, expected, sizeof(response)) == 0; 228 unsigned char Response[24] = { 236 if (DesDecrypt(Response + 0, ZPasswordHash + 0, Output)) { 240 if (DesDecrypt(Response + 8, ZPasswordHash + 7, Output)) { 244 if (DesDecrypt(Response +16, ZPasswordHash +14, Output)) [all...] |
| /src/external/gpl2/xcvs/dist/src/ |
| client.h | 143 struct response 145 /* Name of the response. */ 150 * Function to carry out the response. ARGS is the text of the 167 /* Used by the server to indicate whether response is supported by 171 * Failure to implement this response can imply a fatal 178 /* Some clients might not understand this response. */ 192 extern struct response responses[]; 142 struct response struct
|
| /src/sys/arch/sparc/dev/ |
| pckbc_js.c | 210 int response; local 212 response = pckbc_poll_data1(t, PCKBC_KBD_SLOT); 213 if (response == 0x55) 217 response);
|
| /src/sys/arch/sparc64/dev/ |
| pckbc_ebus.c | 170 int response; local 172 response = pckbc_poll_data1(t, PCKBC_KBD_SLOT); 173 if (response == 0x55) 177 response);
|
| /src/sys/dev/pckbport/ |
| pmsvar.h | 47 int response; member in struct:pms_protocol
|
| /src/crypto/external/bsd/openssh/dist/ |
| auth2-chall.c | 202 * try challenge-response, set authctxt->postponed if we have to 203 * wait for the response. 312 char **response = NULL; local 330 response = xcalloc(nresp, sizeof(char *)); 332 if ((r = sshpkt_get_cstring(ssh, &response[i], NULL)) != 0) 333 fatal_fr(r, "parse response"); 339 res = kbdintctxt->device->respond(kbdintctxt->ctxt, nresp, response); 342 explicit_bzero(response[i], strlen(response[i])); 343 free(response[i]) [all...] |
| /src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/ |
| key_correctness_proof.c | 344 proof->response[i]->array[j], n); 364 DUMP_BI( proof->response[i]->array[j]); 479 // STEP c - compute response 480 LogDebug("Step c: compute response\n"); 481 bi_array_ptr *response = (bi_array_ptr *)malloc( sizeof(bi_array_ptr) * num_of_variables); local 482 if (response == NULL) { 487 response[i] = ALLOC_BI_ARRAY(); 488 bi_new_array( response[i], bit_size_message_digest); 491 bi_sub( response[i]->array[j], 495 bi_set( response[i]->array[j] [all...] |
| /src/external/bsd/openldap/dist/servers/lloadd/ |
| bind.c | 137 * 2) there is one bind operation pending (waiting on an upstream response) 141 * response) 178 * On a response (in handle_bind_response): 181 * - failure response to a SASL bind - reset client to state 1 185 * - all of the above forward the response immediately 187 * the client's DN, only on receiving the response do we finalise the 188 * exchange by forwarding the successful bind response 449 /* Was it unlinked in the meantime? No need to send a response since the 525 * Remember the response, but first ask the server what 575 /* remember the response for later * 602 BerValue response; local [all...] |
| /src/external/bsd/pdisk/dist/ |
| DoSCSICommand.c | 614 long response; local 616 status = Gestalt(gestaltVMAttr, &response); 618 * VM is active iff Gestalt succeeded and the response is appropriate. 620 return (status == noErr && ((response & (1 << gestaltVMPresent)) != 0));
|
| /src/external/gpl2/lvm2/dist/daemons/clvmd/ |
| refresh_clvmd.c | 41 char *response; member in struct:lvm_response 106 /* Get the response */ 189 lvm_response_t ** response, int *num) 227 * Allocate response array. 231 *response = dm_malloc(sizeof(lvm_response_t) * num_responses + 233 if (!*response) { 239 rarray = *response; 241 /* Unpack the response into an lvm_response_t array */ 251 rarray[i].response = dm_malloc(strlen(inptr) + 1); 252 if (rarray[i].response == NULL) 296 lvm_response_t *response; local 333 lvm_response_t *response; local [all...] |
| /src/external/gpl2/lvm2/dist/lib/locking/ |
| cluster_locking.c | 46 char *response; member in struct:lvm_response 118 /* Get the response */ 202 lvm_response_t ** response, int *num) 240 * Allocate response array. 244 *response = dm_malloc(sizeof(lvm_response_t) * num_responses); 245 if (!*response) { 251 rarray = *response; 253 /* Unpack the response into an lvm_response_t array */ 263 rarray[i].response = dm_malloc(strlen(inptr) + 1); 264 if (rarray[i].response == NULL) 313 lvm_response_t *response = NULL; local 490 lvm_response_t *response = NULL; local [all...] |