HomeSort by: relevance | last modified time | path
    Searched defs:resp (Results 1 - 25 of 338) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/usr.sbin/ypserv/yppush/
yppush_proc.c 57 struct yppushresp_xfr *resp = argp; local
60 if (resp->status != YPPUSH_SUCC)
61 warnx("%s", yppush_err_string(resp->status));
yppush_proc.c 57 struct yppushresp_xfr *resp = argp; local
60 if (resp->status != YPPUSH_SUCC)
61 warnx("%s", yppush_err_string(resp->status));
  /src/lib/libc/stdlib/
strtonum.c 54 const char *resp; local
58 errstr = &resp;
strtonum.c 54 const char *resp; local
58 errstr = &resp;
  /src/external/bsd/openpam/dist/lib/libpam/
pam_get_user.c 71 char *resp; local
95 r = pam_prompt(pamh, PAM_PROMPT_ECHO_ON, &resp, "%s", prompt);
98 r = pam_set_item(pamh, PAM_USER, resp);
99 FREE(resp);
pam_get_user.c 71 char *resp; local
95 r = pam_prompt(pamh, PAM_PROMPT_ECHO_ON, &resp, "%s", prompt);
98 r = pam_set_item(pamh, PAM_USER, resp);
99 FREE(resp);
pam_get_authtok.c 78 char *resp, *resp2; local
141 r = pam_prompt(pamh, style, &resp, "%s", prompt);
147 strlset(resp, 0, PAM_MAX_RESP_SIZE);
148 FREE(resp);
151 if (strcmp(resp, resp2) != 0) {
152 strlset(resp, 0, PAM_MAX_RESP_SIZE);
153 FREE(resp);
158 if (resp == NULL)
160 r = pam_set_item(pamh, item, resp);
161 strlset(resp, 0, PAM_MAX_RESP_SIZE)
    [all...]
  /src/usr.sbin/timed/timed/
candidate.c 50 struct tsp *resp, msg; local
89 resp = readmsg(TSP_ANY, ANYADDR, &wait, net);
90 if (!resp)
93 switch (resp->tsp_type) {
96 (void)addmach(resp->tsp_name, &from,fromnet);
106 && !good_host_name(resp->tsp_name)) {
107 (void)addmach(resp->tsp_name, &from,fromnet);
108 suppress(&from, resp->tsp_name, net);
132 htp = addmach(resp->tsp_name,&from,fromnet);
144 (void)addmach(resp->tsp_name, &from,fromnet)
    [all...]
candidate.c 50 struct tsp *resp, msg; local
89 resp = readmsg(TSP_ANY, ANYADDR, &wait, net);
90 if (!resp)
93 switch (resp->tsp_type) {
96 (void)addmach(resp->tsp_name, &from,fromnet);
106 && !good_host_name(resp->tsp_name)) {
107 (void)addmach(resp->tsp_name, &from,fromnet);
108 suppress(&from, resp->tsp_name, net);
132 htp = addmach(resp->tsp_name,&from,fromnet);
144 (void)addmach(resp->tsp_name, &from,fromnet)
    [all...]
  /src/external/bsd/openpam/dist/include/security/
pam_types.h 56 char *resp; member in struct:pam_response
pam_types.h 56 char *resp; member in struct:pam_response
  /src/external/bsd/wpa/dist/src/eap_peer/
eap_md5.c 33 struct wpabuf *resp; local
76 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, 1 + CHAP_MD5_LEN,
78 if (resp == NULL)
85 wpabuf_put_u8(resp, CHAP_MD5_LEN);
87 id = eap_get_id(resp);
88 rpos = wpabuf_put(resp, CHAP_MD5_LEN);
93 wpabuf_free(resp);
98 return resp;
eap_otp.c 32 struct wpabuf *resp; local
66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
68 if (resp == NULL)
70 wpabuf_put_data(resp, password, password_len);
79 return resp;
eap_md5.c 33 struct wpabuf *resp; local
76 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_MD5, 1 + CHAP_MD5_LEN,
78 if (resp == NULL)
85 wpabuf_put_u8(resp, CHAP_MD5_LEN);
87 id = eap_get_id(resp);
88 rpos = wpabuf_put(resp, CHAP_MD5_LEN);
93 wpabuf_free(resp);
98 return resp;
eap_otp.c 32 struct wpabuf *resp; local
66 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_OTP, password_len,
68 if (resp == NULL)
70 wpabuf_put_data(resp, password, password_len);
79 return resp;
eap_gtc.c 49 struct wpabuf *resp; local
72 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC,
74 return resp;
104 resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, plen,
106 if (resp == NULL)
109 wpabuf_put_data(resp, "RESPONSE=", 9);
110 wpabuf_put_data(resp, identity, identity_len);
111 wpabuf_put_u8(resp, '\0');
113 wpabuf_put_data(resp, password, password_len);
115 wpabuf_head_u8(resp) + sizeof(struct eap_hdr)
    [all...]
  /src/external/bsd/wpa/dist/src/utils/
browser-android.c 33 struct wpabuf *resp; local
48 resp = wpabuf_alloc(1);
49 if (resp == NULL) {
61 http_request_send_and_deinit(req, resp);
browser-system.c 33 struct wpabuf *resp; local
48 resp = wpabuf_alloc(1);
49 if (resp == NULL) {
61 http_request_send_and_deinit(req, resp);
browser-wpadebug.c 33 struct wpabuf *resp; local
48 resp = wpabuf_alloc(100);
49 if (resp == NULL) {
55 wpabuf_put_str(resp, "HTTP/1.1\r\n\r\nUser input completed");
62 http_request_send_and_deinit(req, resp);
browser-android.c 33 struct wpabuf *resp; local
48 resp = wpabuf_alloc(1);
49 if (resp == NULL) {
61 http_request_send_and_deinit(req, resp);
browser-system.c 33 struct wpabuf *resp; local
48 resp = wpabuf_alloc(1);
49 if (resp == NULL) {
61 http_request_send_and_deinit(req, resp);
browser-wpadebug.c 33 struct wpabuf *resp; local
48 resp = wpabuf_alloc(100);
49 if (resp == NULL) {
55 wpabuf_put_str(resp, "HTTP/1.1\r\n\r\nUser input completed");
62 http_request_send_and_deinit(req, resp);
  /src/games/backgammon/backgammon/
extra.c 58 int resp; /* response to y/n */ local
85 if ((resp = yorn('R')) == 2) {
93 if (resp) {
  /src/usr.sbin/btattach/
init_bcm43xx.c 97 uint8_t resp[7]; local
107 uart_recv_cc(fd, HCI_CMD_RESET, &resp, sizeof(resp));
124 uart_recv_cc(fd, HCI_CMD_43XXFWDN, &resp, sizeof(resp));
134 uart_recv_cc(fd, fw_cmd, &resp, sizeof(resp));
141 uart_recv_cc(fd, HCI_CMD_RESET, &resp, sizeof(resp));
150 uart_recv_cc(fd, HCI_CMD_BCM43XX_SET_CLOCK, &resp, sizeof(resp))
    [all...]
  /src/external/bsd/openpam/dist/modules/pam_unix/
pam_unix.c 73 struct pam_response *resp; local
103 resp = NULL;
104 pam_err = (*conv->conv)(1, &msgp, &resp, conv->appdata_ptr);
105 if (resp != NULL) {
107 password = resp->resp;
109 free(resp->resp);
110 free(resp);

Completed in 160 milliseconds

1 2 3 4 5 6 7 8 91011>>