| /src/usr.sbin/ypserv/yppush/ |
| yppush_proc.c | 57 struct yppushresp_xfr *resp = argp; local 60 if (resp->status != YPPUSH_SUCC) 61 warnx("%s", yppush_err_string(resp->status));
|
| yppush_proc.c | 57 struct yppushresp_xfr *resp = argp; local 60 if (resp->status != YPPUSH_SUCC) 61 warnx("%s", yppush_err_string(resp->status));
|
| /src/lib/libc/stdlib/ |
| strtonum.c | 54 const char *resp; local 58 errstr = &resp;
|
| strtonum.c | 54 const char *resp; local 58 errstr = &resp;
|
| /src/external/bsd/openpam/dist/lib/libpam/ |
| pam_get_user.c | 71 char *resp; local 95 r = pam_prompt(pamh, PAM_PROMPT_ECHO_ON, &resp, "%s", prompt); 98 r = pam_set_item(pamh, PAM_USER, resp); 99 FREE(resp);
|
| pam_get_user.c | 71 char *resp; local 95 r = pam_prompt(pamh, PAM_PROMPT_ECHO_ON, &resp, "%s", prompt); 98 r = pam_set_item(pamh, PAM_USER, resp); 99 FREE(resp);
|
| pam_get_authtok.c | 78 char *resp, *resp2; local 141 r = pam_prompt(pamh, style, &resp, "%s", prompt); 147 strlset(resp, 0, PAM_MAX_RESP_SIZE); 148 FREE(resp); 151 if (strcmp(resp, resp2) != 0) { 152 strlset(resp, 0, PAM_MAX_RESP_SIZE); 153 FREE(resp); 158 if (resp == NULL) 160 r = pam_set_item(pamh, item, resp); 161 strlset(resp, 0, PAM_MAX_RESP_SIZE) [all...] |
| /src/usr.sbin/timed/timed/ |
| candidate.c | 50 struct tsp *resp, msg; local 89 resp = readmsg(TSP_ANY, ANYADDR, &wait, net); 90 if (!resp) 93 switch (resp->tsp_type) { 96 (void)addmach(resp->tsp_name, &from,fromnet); 106 && !good_host_name(resp->tsp_name)) { 107 (void)addmach(resp->tsp_name, &from,fromnet); 108 suppress(&from, resp->tsp_name, net); 132 htp = addmach(resp->tsp_name,&from,fromnet); 144 (void)addmach(resp->tsp_name, &from,fromnet) [all...] |
| candidate.c | 50 struct tsp *resp, msg; local 89 resp = readmsg(TSP_ANY, ANYADDR, &wait, net); 90 if (!resp) 93 switch (resp->tsp_type) { 96 (void)addmach(resp->tsp_name, &from,fromnet); 106 && !good_host_name(resp->tsp_name)) { 107 (void)addmach(resp->tsp_name, &from,fromnet); 108 suppress(&from, resp->tsp_name, net); 132 htp = addmach(resp->tsp_name,&from,fromnet); 144 (void)addmach(resp->tsp_name, &from,fromnet) [all...] |
| /src/external/bsd/openpam/dist/include/security/ |
| pam_types.h | 56 char *resp; member in struct:pam_response
|
| pam_types.h | 56 char *resp; member in struct:pam_response
|
| /src/external/bsd/wpa/dist/src/eap_peer/ |
| eap_md5.c | 33 struct wpabuf *resp; local 76 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, 1 + CHAP_MD5_LEN, 78 if (resp == NULL) 85 wpabuf_put_u8(resp, CHAP_MD5_LEN); 87 id = eap_get_id(resp); 88 rpos = wpabuf_put(resp, CHAP_MD5_LEN); 93 wpabuf_free(resp); 98 return resp;
|
| eap_otp.c | 32 struct wpabuf *resp; local 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 68 if (resp == NULL) 70 wpabuf_put_data(resp, password, password_len); 79 return resp;
|
| eap_md5.c | 33 struct wpabuf *resp; local 76 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, 1 + CHAP_MD5_LEN, 78 if (resp == NULL) 85 wpabuf_put_u8(resp, CHAP_MD5_LEN); 87 id = eap_get_id(resp); 88 rpos = wpabuf_put(resp, CHAP_MD5_LEN); 93 wpabuf_free(resp); 98 return resp;
|
| eap_otp.c | 32 struct wpabuf *resp; local 66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len, 68 if (resp == NULL) 70 wpabuf_put_data(resp, password, password_len); 79 return resp;
|
| eap_gtc.c | 49 struct wpabuf *resp; local 72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, 74 return resp; 104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen, 106 if (resp == NULL) 109 wpabuf_put_data(resp, "RESPONSE=", 9); 110 wpabuf_put_data(resp, identity, identity_len); 111 wpabuf_put_u8(resp, '\0'); 113 wpabuf_put_data(resp, password, password_len); 115 wpabuf_head_u8(resp) + sizeof(struct eap_hdr) [all...] |
| /src/external/bsd/wpa/dist/src/utils/ |
| browser-android.c | 33 struct wpabuf *resp; local 48 resp = wpabuf_alloc(1); 49 if (resp == NULL) { 61 http_request_send_and_deinit(req, resp);
|
| browser-system.c | 33 struct wpabuf *resp; local 48 resp = wpabuf_alloc(1); 49 if (resp == NULL) { 61 http_request_send_and_deinit(req, resp);
|
| browser-wpadebug.c | 33 struct wpabuf *resp; local 48 resp = wpabuf_alloc(100); 49 if (resp == NULL) { 55 wpabuf_put_str(resp, "HTTP/1.1\r\n\r\nUser input completed"); 62 http_request_send_and_deinit(req, resp);
|
| browser-android.c | 33 struct wpabuf *resp; local 48 resp = wpabuf_alloc(1); 49 if (resp == NULL) { 61 http_request_send_and_deinit(req, resp);
|
| browser-system.c | 33 struct wpabuf *resp; local 48 resp = wpabuf_alloc(1); 49 if (resp == NULL) { 61 http_request_send_and_deinit(req, resp);
|
| browser-wpadebug.c | 33 struct wpabuf *resp; local 48 resp = wpabuf_alloc(100); 49 if (resp == NULL) { 55 wpabuf_put_str(resp, "HTTP/1.1\r\n\r\nUser input completed"); 62 http_request_send_and_deinit(req, resp);
|
| /src/games/backgammon/backgammon/ |
| extra.c | 58 int resp; /* response to y/n */ local 85 if ((resp = yorn('R')) == 2) { 93 if (resp) {
|
| /src/usr.sbin/btattach/ |
| init_bcm43xx.c | 97 uint8_t resp[7]; local 107 uart_recv_cc(fd, HCI_CMD_RESET, &resp, sizeof(resp)); 124 uart_recv_cc(fd, HCI_CMD_43XXFWDN, &resp, sizeof(resp)); 134 uart_recv_cc(fd, fw_cmd, &resp, sizeof(resp)); 141 uart_recv_cc(fd, HCI_CMD_RESET, &resp, sizeof(resp)); 150 uart_recv_cc(fd, HCI_CMD_BCM43XX_SET_CLOCK, &resp, sizeof(resp)) [all...] |
| /src/external/bsd/openpam/dist/modules/pam_unix/ |
| pam_unix.c | 73 struct pam_response *resp; local 103 resp = NULL; 104 pam_err = (*conv->conv)(1, &msgp, &resp, conv->appdata_ptr); 105 if (resp != NULL) { 107 password = resp->resp; 109 free(resp->resp); 110 free(resp);
|