/freebsd/contrib/wpa/src/common/ |
H A D | gas_server.c | 57 static void gas_server_free_response(struct gas_server_response *response); 62 struct gas_server_response *response = eloop_ctx; in gas_server_response_timeout() local 64 wpa_printf(MSG_DEBUG, "GAS: Response @%p timeout for " MACSTR in gas_server_response_timeout() 66 response, MAC2STR(response->dst), response->dialog_token, in gas_server_response_timeout() 67 response->freq, response->frag_id, in gas_server_response_timeout() 68 (unsigned long) response->offset, in gas_server_response_timeout() 69 (unsigned long) (response->resp ? in gas_server_response_timeout() 70 wpabuf_len(response->resp) : 0)); in gas_server_response_timeout() 71 response->handler->status_cb(response->handler->ctx, in gas_server_response_timeout() 72 response->resp, 0); in gas_server_response_timeout() [all …]
|
/freebsd/crypto/openssh/regress/misc/sk-dummy/ |
H A D | sk-dummy.c | 91 pack_key_ecdsa(struct sk_enroll_response *response) in pack_key_ecdsa() argument 102 response->public_key = NULL; in pack_key_ecdsa() 103 response->public_key_len = 0; in pack_key_ecdsa() 104 response->key_handle = NULL; in pack_key_ecdsa() 105 response->key_handle_len = 0; in pack_key_ecdsa() 122 response->public_key_len = EC_POINT_point2oct(g, q, in pack_key_ecdsa() 124 if (response->public_key_len == 0 || response->public_key_len > 2048) { in pack_key_ecdsa() 126 response->public_key_len); in pack_key_ecdsa() 129 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_key_ecdsa() 134 response->public_key, response->public_key_len, NULL) == 0) { in pack_key_ecdsa() [all …]
|
/freebsd/contrib/llvm-project/lldb/source/Plugins/Process/gdb-remote/ |
H A D | GDBRemoteCommunicationServerCommon.cpp | 180 StreamString response; in Handle_qHostInfo() local 186 response.PutCString("triple:"); in Handle_qHostInfo() 187 response.PutStringAsRawHex8(host_triple.getTriple()); in Handle_qHostInfo() 188 response.Printf(";ptrsize:%u;", host_arch.GetAddressByteSize()); in Handle_qHostInfo() 192 response.PutCString("distribution_id:"); in Handle_qHostInfo() 193 response.PutStringAsRawHex8(distribution_id); in Handle_qHostInfo() 194 response.PutCString(";"); in Handle_qHostInfo() 199 response.PutCString("vendor:apple;"); in Handle_qHostInfo() 205 response.Printf("cputype:%u;", cpu); in Handle_qHostInfo() 207 response.Printf("cpusubtype:%u;", sub); in Handle_qHostInfo() [all …]
|
H A D | GDBRemoteCommunicationClient.cpp | 94 // was sent and _any_ response (including UNIMPLEMENTED) was received), or in HandshakeWithServer() 95 // false if no response was received. This quickly tells us if we have a in HandshakeWithServer() 211 StringExtractorGDBRemote response; in QueryNoAckModeSupported() local 212 if (SendPacketAndWaitForResponse("QStartNoAckMode", response) == in QueryNoAckModeSupported() 214 if (response.IsOKResponse()) { in QueryNoAckModeSupported() 228 StringExtractorGDBRemote response; in GetListThreadsInStopReplySupported() local 229 if (SendPacketAndWaitForResponse("QListThreadsInStopReply", response) == in GetListThreadsInStopReplySupported() 231 if (response.IsOKResponse()) in GetListThreadsInStopReplySupported() 241 StringExtractorGDBRemote response; in GetVAttachOrWaitSupported() local 242 if (SendPacketAndWaitForResponse("qVAttachOrWaitSupported", response) == in GetVAttachOrWaitSupported() [all …]
|
H A D | GDBRemoteClientBase.cpp | 41 StringExtractorGDBRemote &response) { in SendContinuePacketAndWaitForResponse() argument 43 response.Clear(); in SendContinuePacketAndWaitForResponse() 62 PacketResult read_result = ReadPacket(response, computed_timeout, false); in SendContinuePacketAndWaitForResponse() 94 if (response.Empty()) in SendContinuePacketAndWaitForResponse() 97 const char stop_type = response.GetChar(); in SendContinuePacketAndWaitForResponse() 99 response.GetStringRef().data()); in SendContinuePacketAndWaitForResponse() 114 response.GetHexByteString(inferior_stdout); in SendContinuePacketAndWaitForResponse() 120 llvm::StringRef(response.GetStringRef()).substr(1)); in SendContinuePacketAndWaitForResponse() 123 delegate.HandleAsyncStructuredDataPacket(response.GetStringRef()); in SendContinuePacketAndWaitForResponse() 128 const bool should_stop = ShouldStop(signals, response); in SendContinuePacketAndWaitForResponse() [all …]
|
H A D | GDBRemoteCommunicationServerLLGS.cpp | 485 StreamGDBRemote response; in SendWResponse() local 486 response.PutChar('E'); in SendWResponse() 487 response.PutHex8(GDBRemoteServerError::eErrorExitStatus); in SendWResponse() 488 return SendPacketNoLock(response.GetString()); in SendWResponse() 499 StreamGDBRemote response; in SendWResponse() local 500 response.Format("{0:g}", *wait_status); in SendWResponse() 503 response.Format(";process:{0:x-}", process->GetID()); in SendWResponse() 506 response.GetString()); in SendWResponse() 507 return SendPacketNoLock(response.GetString()); in SendWResponse() 510 static void AppendHexValue(StreamString &response, const uint8_t *buf, in AppendHexValue() argument [all …]
|
/freebsd/sys/cam/scsi/ |
H A D | smp_all.c | 273 * Decode the SMP REPORT GENERAL response. The format is current as of SPL 278 smp_report_general_sbuf(struct smp_report_general_response *response, in smp_report_general_sbuf() argument 282 sbuf_printf(sb, "Response Length: %d words (%d bytes)\n", in smp_report_general_sbuf() 283 response->response_len, in smp_report_general_sbuf() 284 response->response_len * SMP_WORD_LEN); in smp_report_general_sbuf() 286 scsi_2btoul(response->expander_change_count)); in smp_report_general_sbuf() 288 scsi_2btoul(response->expander_route_indexes)); in smp_report_general_sbuf() 289 sbuf_printf(sb, "Long Response: %s\n", in smp_report_general_sbuf() 290 smp_yesno(response->long_response & in smp_report_general_sbuf() 292 sbuf_printf(sb, "Number of Phys: %d\n", response->num_phys); in smp_report_general_sbuf() [all …]
|
/freebsd/lib/libpmc/pmu-events/arch/x86/westmereep-dp/ |
H A D | memory.json | 11 "BriefDescription": "REQUEST = ANY_DATA read and RESPONSE = ANY_DRAM AND REMOTE_FWD", 22 "BriefDescription": "REQUEST = ANY_DATA read and RESPONSE = ANY_LLC_MISS", 33 "BriefDescription": "REQUEST = ANY_DATA read and RESPONSE = OTHER_LOCAL_DRAM", 44 "BriefDescription": "REQUEST = ANY_DATA read and RESPONSE = REMOTE_DRAM", 55 "BriefDescription": "REQUEST = ANY IFETCH and RESPONSE = ANY_DRAM AND REMOTE_FWD", 66 "BriefDescription": "REQUEST = ANY IFETCH and RESPONSE = ANY_LLC_MISS", 77 "BriefDescription": "REQUEST = ANY IFETCH and RESPONSE = OTHER_LOCAL_DRAM", 88 "BriefDescription": "REQUEST = ANY IFETCH and RESPONSE = REMOTE_DRAM", 99 "BriefDescription": "REQUEST = ANY_REQUEST and RESPONSE = ANY_DRAM AND REMOTE_FWD", 110 "BriefDescription": "REQUEST = ANY_REQUEST and RESPONSE = ANY_LLC_MISS", [all …]
|
H A D | cache.json | 916 … "BriefDescription": "REQUEST = ANY_DATA read and RESPONSE = ALL_LOCAL_DRAM AND REMOTE_CACHE_HIT", 927 "BriefDescription": "REQUEST = ANY_DATA read and RESPONSE = ANY_CACHE_DRAM", 938 "BriefDescription": "REQUEST = ANY_DATA read and RESPONSE = ANY_LOCATION", 949 "BriefDescription": "REQUEST = ANY_DATA read and RESPONSE = IO_CSR_MMIO", 960 "BriefDescription": "REQUEST = ANY_DATA read and RESPONSE = LLC_HIT_NO_OTHER_CORE", 971 "BriefDescription": "REQUEST = ANY_DATA read and RESPONSE = LLC_HIT_OTHER_CORE_HIT", 982 "BriefDescription": "REQUEST = ANY_DATA read and RESPONSE = LLC_HIT_OTHER_CORE_HITM", 993 "BriefDescription": "REQUEST = ANY_DATA read and RESPONSE = LOCAL_CACHE", 1004 … "BriefDescription": "REQUEST = ANY_DATA read and RESPONSE = LOCAL_DRAM AND REMOTE_CACHE_HIT", 1015 "BriefDescription": "REQUEST = ANY_DATA read and RESPONSE = REMOTE_CACHE_HITM", [all …]
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | openssl-ts.1 | 100 [\fB\-in\fR \fIresponse.tsr\fR] 102 [\fB\-out\fR \fIresponse.tsr\fR] 116 [\fB\-in\fR \fIresponse.tsr\fR] 170 data file at the time of response generation. 177 timestamp request to the TSA and one for sending the timestamp response 180 creating a timestamp response based on a request, verifying if a 181 response corresponds to a particular request or a data file. 196 Generate a TS reply. For details see "Timestamp Response generation". 199 Verify a TS response. For details see "Timestamp Response verification". 241 response. (Optional) [all …]
|
/freebsd/lib/libiscsiutil/ |
H A D | text.c | 98 struct pdu *response; in text_new_response() local 106 response = pdu_new_response(request); in text_new_response() 107 bhstr2 = (struct iscsi_bhs_text_response *)response->pdu_bhs; in text_new_response() 120 return (response); in text_new_response() 127 struct pdu *response; in text_receive_response() local 131 response = pdu_new(conn); in text_receive_response() 132 pdu_receive(response); in text_receive_response() 133 if (response->pdu_bhs->bhs_opcode != ISCSI_BHS_OPCODE_TEXT_RESPONSE) in text_receive_response() 135 response->pdu_bhs->bhs_opcode); in text_receive_response() 136 bhstr = (struct iscsi_bhs_text_response *)response->pdu_bhs; in text_receive_response() [all …]
|
/freebsd/contrib/unbound/iterator/ |
H A D | iter_resptype.h | 2 * iterator/iter_resptype.h - response type information and classification. 39 * This file defines the response type. DNS Responses can be classified as 40 * one of the response types. 50 * The response type is used to interpret the response. 54 * 'untyped' means that the type of this response hasn't been 60 * 'answer' means that the response terminates the resolution 65 /** 'delegation' means that the response is a delegation. */ 69 * 'cname' means that the response is a cname without the final 75 * 'throwaway' means that this particular response should be 81 * 'lame' means that this particular response indicates that [all …]
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | kcm.c | 176 krb5_storage *response; in krb5_kcm_call() local 187 response = krb5_storage_from_data(&response_data); in krb5_kcm_call() 188 if (response == NULL) { in krb5_kcm_call() 193 ret = krb5_ret_int32(response, &status); in krb5_kcm_call() 195 krb5_storage_free(response); in krb5_kcm_call() 201 krb5_storage_free(response); in krb5_kcm_call() 208 *response_p = response; in krb5_kcm_call() 213 krb5_storage_free(response); in krb5_kcm_call() 248 * Response: 256 krb5_storage *request, *response; in kcm_gen_new() local [all …]
|
/freebsd/crypto/openssh/ |
H A D | sk-usbhid.c | 606 struct sk_enroll_response *response) in pack_public_key_ecdsa() argument 614 response->public_key = NULL; in pack_public_key_ecdsa() 615 response->public_key_len = 0; in pack_public_key_ecdsa() 643 response->public_key_len = EC_POINT_point2oct(g, q, in pack_public_key_ecdsa() 645 if (response->public_key_len == 0 || response->public_key_len > 2048) { in pack_public_key_ecdsa() 647 response->public_key_len); in pack_public_key_ecdsa() 650 if ((response->public_key = malloc(response->public_key_len)) == NULL) { in pack_public_key_ecdsa() 655 response->public_key, response->public_key_len, NULL) == 0) { in pack_public_key_ecdsa() 662 if (ret != 0 && response->public_key != NULL) { in pack_public_key_ecdsa() 663 memset(response->public_key, 0, response->public_key_len); in pack_public_key_ecdsa() [all …]
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-ts.pod.in | 41 [B<-in> I<response.tsr>] 43 [B<-out> I<response.tsr>] 53 [B<-in> I<response.tsr>] 82 data file at the time of response generation. 93 timestamp request to the TSA and one for sending the timestamp response 96 creating a timestamp response based on a request, verifying if a 97 response corresponds to a particular request or a data file. 117 Generate a TS reply. For details see L</Timestamp Response generation>. 121 Verify a TS response. For details see L</Timestamp Response verification>. 175 response. (Optional) [all …]
|
/freebsd/sys/fs/p9fs/ |
H A D | p9_protocol.h | 37 P9PROTO_RLERROR, /* response for any failed request */ 39 P9PROTO_RSTATFS, /* file system status response */ 41 P9PROTO_RLOPEN, /* response to opne request (9P2000.L) */ 43 P9PROTO_RLCREATE, /* response with file access information (9P2000.L) */ 45 P9PROTO_RSYMLINK, /* symlink creation response */ 47 P9PROTO_RMKNOD, /* create a special file object response */ 49 P9PROTO_RRENAME, /* rename a file response */ 51 P9PROTO_RREADLINK, /* response to read value of symbolic link request */ 53 P9PROTO_RGETATTR, /* get file attributes response */ 55 P9PROTO_RSETATTR, /* set file attributes response */ [all …]
|
/freebsd/crypto/krb5/src/kdc/ |
H A D | dispatch.c | 49 krb5_data *response) in finish_dispatch() argument 54 if (state->is_tcp == 0 && response && in finish_dispatch() 55 response->length > (unsigned int)max_dgram_reply_size) { in finish_dispatch() 56 krb5_free_data(NULL, response); in finish_dispatch() 57 response = NULL; in finish_dispatch() 58 code = make_too_big_error(state->active_realm, &response); in finish_dispatch() 66 (*oldrespond)(oldarg, code, response); in finish_dispatch() 70 finish_dispatch_cache(void *arg, krb5_error_code code, krb5_data *response) in finish_dispatch_cache() argument 81 /* Put the response into the lookaside buffer (if we produced one). */ in finish_dispatch_cache() 82 if (code == 0 && response != NULL) in finish_dispatch_cache() [all …]
|
/freebsd/usr.sbin/iscsid/ |
H A D | login.c | 45 login_nsg(const struct pdu *response) in login_nsg() argument 49 bhslr = (struct iscsi_bhs_login_response *)response->pdu_bhs; in login_nsg() 188 login_handle_redirection(struct iscsid_connection *conn, struct pdu *response) in login_handle_redirection() argument 194 bhslr = (struct iscsi_bhs_login_response *)response->pdu_bhs; in login_handle_redirection() 198 keys_load_pdu(response_keys, response); in login_handle_redirection() 217 struct pdu *response; in login_receive() local 222 response = pdu_new(conn); in login_receive() 223 pdu_receive(response); in login_receive() 224 if (response->pdu_bhs->bhs_opcode != ISCSI_BHS_OPCODE_LOGIN_RESPONSE) { in login_receive() 226 response->pdu_bhs->bhs_opcode); in login_receive() [all …]
|
/freebsd/contrib/sendmail/src/ |
H A D | milter.c | 139 if (response == NULL || \ 140 strlen(response) + 1 != (size_t) rlen || \ 142 (response[0] != '4' && response[0] != '5') || \ 143 !isascii(response[1]) || !isdigit(response[1]) || \ 144 !isascii(response[2]) || !isdigit(response[2])) \ 146 if (response != NULL) \ 147 sm_free(response); /* XXX */ \ 148 response = newstr(default); \ 152 char *ptr = response; \ 159 sm_free(response); /* XXX */ \ [all …]
|
/freebsd/lib/libpmc/pmu-events/arch/x86/goldmontplus/ |
H A D | cache.json | 81 …s) the L1 cache, hit (or miss) the L2 cache, hit DRAM, hit in the WCB or receive a HITM response.", 94 …cated that they had a dirty copy of the data. Loads that obtain a HITM response incur greater lat… 211 …s and bus locks. (To specifically count bus locks only, see the Offcore response event.) A locked… 255 …"BriefDescription": "Requires MSR_OFFCORE_RESP[0,1] to specify request type and response. (duplica… 276 …e subsystem. Requires MSR_OFFCORE_RESP[0,1] to specify request type and response. (duplicated for … 291 …he L2 cache. Requires MSR_OFFCORE_RESP[0,1] to specify request type and response. (duplicated for … 306 …is required. Requires MSR_OFFCORE_RESP[0,1] to specify request type and response. (duplicated for … 321 …sor module. Requires MSR_OFFCORE_RESP[0,1] to specify request type and response. (duplicated for … 326 … prefetch) outstanding, per cycle, from the time of the L2 miss to when any response is received.", 336 …time of the L2 miss to when any response is received. Requires MSR_OFFCORE_RESP[0,1] to specify re… [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | OSSL_HTTP_REQ_CTX.3 | 117 \&\fBOSSL_HTTP_REQ_CTX\fR is a context structure for an HTTP request and response, 126 the \fBBIO\fR to read/receive the response from (\fIrbio\fR, which may be equal to 127 \&\fIwbio\fR), and the maximum expected response header line length \fIbuf_size\fR. 158 of the HTTP client on the response. 164 is included in the HTTP header of the response and return an error if not. 173 expected as the response content and input streaming is disabled. This means 175 \&\fBOSSL_HTTP_REQ_CTX_get0_mem_bio()\fR should be used to get the buffered response. 179 be used directly to read the response contents, which may support streaming. 182 the subsequent HTTP transfer (sending the request and receiving a response) 190 kept open after receiving a response. This is the default behavior for HTTP 1.0. [all …]
|
/freebsd/sys/dev/pms/RefTisa/sallsdk/spc/ |
H A D | sampidefs.h | 101 /* for Response Opcode of IOMB */ 675 /** \brief the data structure of SSP TGT Response Start Command 677 * use to describe MPI SSP TGT Response Start Command (64 bytes) 948 /** \brief the data structure of Echo Response 950 * use to describe MPI Echo Response (64 bytes) 1000 /** \brief the data structure of SSP Completion Response 1002 * use to describe MPI SSP Completion Response (1024 bytes) 1017 /** \brief the data structure of SSP Completion DIF Response 1019 * use to describe MPI SSP Completion DIF Response (1024 bytes) 1049 /** \brief the data structure of SMP Completion Response [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | OSSL_HTTP_REQ_CTX.pod | 58 B<OSSL_HTTP_REQ_CTX> is a context structure for an HTTP request and response, 67 the B<BIO> to read/receive the response from (I<rbio>, which may be equal to 68 I<wbio>), and the maximum expected response header line length I<buf_size>. 97 of the HTTP client on the response. 103 is included in the HTTP header of the response and return an error if not. 112 expected as the response content and input streaming is disabled. This means 114 OSSL_HTTP_REQ_CTX_get0_mem_bio() should be used to get the buffered response. 118 be used directly to read the response contents, which may support streaming. 121 the subsequent HTTP transfer (sending the request and receiving a response) 129 kept open after receiving a response. This is the default behavior for HTTP 1.0. [all …]
|
/freebsd/sys/arm/qualcomm/ |
H A D | qcom_scm_legacy_defs.h | 54 * up to 5 argument DWORDs, up to 3 response DWORDs, done atomically, 57 * The former use the structures below to represent the request and response 67 * Atomic SCM call command/response buffer definitions. 84 * Legacy command/response buffer definitions. 87 * but only a single command/response pair per call. 89 * A command and response buffer is laid out in memory as such: 93 * | response header | 94 * | (response payload) | 100 * len - the length of the total command and response, including 108 * the response header is found. [all …]
|
/freebsd/contrib/wpa/src/p2p/ |
H A D | p2p_sd.c | 226 /* ANQP Query Response Frame */ in p2p_build_sd_response() 256 /* ANQP Query Response Frame */ in p2p_build_gas_comeback_resp() 418 /* the response will be indicated with a call to p2p_sd_response() */ in p2p_rx_gas_initial_req() 437 p2p_dbg(p2p, "SD response long enough to require fragmentation"); in p2p_sd_response() 440 * TODO: Could consider storing the fragmented response in p2p_sd_response() 446 p2p_dbg(p2p, "Drop previous SD response"); in p2p_sd_response() 451 p2p_err(p2p, "Failed to allocate SD response fragmentation area"); in p2p_sd_response() 461 p2p_dbg(p2p, "SD response fits in initial response"); in p2p_sd_response() 495 p2p_dbg(p2p, "Ignore unexpected GAS Initial Response from " in p2p_rx_gas_initial_resp() 500 /* It is possible for the TX status and RX response events to be in p2p_rx_gas_initial_resp() [all …]
|