| /src/sys/dev/pst/ |
| H A D | pst-iop.c | 52 struct i2o_single_reply *reply; member 121 struct i2o_get_param_reply *reply; in iop_attach() local 130 if ((reply = iop_get_util_params(sc, sc->lct[i].local_tid, in iop_attach() 134 (struct i2o_device_identity *)reply->result; in iop_attach() 139 free(reply, M_PSTIOP); in iop_attach() 169 struct i2o_single_reply *reply; in iop_intr() local 179 reply = (struct i2o_single_reply *)(sc->obase + (mfa - sc->phys_obase)); in iop_intr() 182 if (reply->function == I2O_UTIL_EVENT_REGISTER) { in iop_intr() 184 (struct i2o_util_event_reply_message *)reply; in iop_intr() 192 if (reply->message_flags & I2O_MESSAGE_FLAGS_FAIL) in iop_intr() [all …]
|
| /src/crypto/krb5/src/ccapi/lib/ |
| H A D | ccapi_context.c | 233 k5_ipc_stream reply = NULL; in ccapi_context_get_change_time() local 245 NULL, &reply); in ccapi_context_get_change_time() 248 if (!err && krb5int_ipc_stream_size (reply) > 0) { in ccapi_context_get_change_time() 252 err = krb5int_ipc_stream_read_time (reply, &change_time); in ccapi_context_get_change_time() 264 krb5int_ipc_stream_release (reply); in ccapi_context_get_change_time() 276 k5_ipc_stream reply = NULL; in ccapi_context_wait_for_change() local 296 &reply); in ccapi_context_wait_for_change() 300 err = krb5int_ipc_stream_read_time (reply, &context->last_wait_for_change_time); in ccapi_context_wait_for_change() 304 krb5int_ipc_stream_release (reply); in ccapi_context_wait_for_change() 316 k5_ipc_stream reply = NULL; in ccapi_context_get_default_ccache_name() local [all …]
|
| H A D | ccapi_ccache.c | 210 k5_ipc_stream reply = NULL; in ccapi_ccache_get_credentials_version() local 219 &reply); in ccapi_ccache_get_credentials_version() 223 err = krb5int_ipc_stream_read_uint32 (reply, out_credentials_version); in ccapi_ccache_get_credentials_version() 226 krb5int_ipc_stream_release (reply); in ccapi_ccache_get_credentials_version() 238 k5_ipc_stream reply = NULL; in ccapi_ccache_get_name() local 248 &reply); in ccapi_ccache_get_name() 252 err = krb5int_ipc_stream_read_string (reply, &name); in ccapi_ccache_get_name() 259 krb5int_ipc_stream_release (reply); in ccapi_ccache_get_name() 274 k5_ipc_stream reply = NULL; in ccapi_ccache_get_principal() local 292 &reply); in ccapi_ccache_get_principal() [all …]
|
| H A D | ccapi_ipc.c | 53 k5_ipc_stream reply = NULL; in _cci_ipc_send() local 73 err = cci_os_ipc (in_launch_server, request, &reply); in _cci_ipc_send() 75 if (!err && krb5int_ipc_stream_size (reply) > 0) { in _cci_ipc_send() 76 err = cci_message_read_reply_header (reply, &reply_error); in _cci_ipc_send() 85 *out_reply_data = reply; in _cci_ipc_send() 86 reply = NULL; /* take ownership */ in _cci_ipc_send() 90 krb5int_ipc_stream_release (reply); in _cci_ipc_send()
|
| /src/sys/dev/mpr/ |
| H A D | mpr_config.c | 73 MPI2_CONFIG_REPLY *reply; in mpr_config_get_ioc_pg8() local 98 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; in mpr_config_get_ioc_pg8() 99 if (error || (reply == NULL)) { in mpr_config_get_ioc_pg8() 110 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; in mpr_config_get_ioc_pg8() 111 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); in mpr_config_get_ioc_pg8() 157 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; in mpr_config_get_ioc_pg8() 158 if (error || (reply == NULL)) { in mpr_config_get_ioc_pg8() 169 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; in mpr_config_get_ioc_pg8() 170 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); in mpr_config_get_ioc_pg8() 205 MPI2_CONFIG_REPLY *reply; in mpr_config_get_iounit_pg8() local [all …]
|
| /src/usr.sbin/mpsutil/ |
| H A D | mps_cmd.c | 285 MPI2_SEP_REPLY reply; in mps_set_slot_status() local 295 if (mps_pass_command(fd, &req, sizeof(req), &reply, sizeof(reply), in mps_set_slot_status() 299 if (!IOC_STATUS_SUCCESS(le16toh(reply.IOCStatus))) in mps_set_slot_status() 309 MPI2_CONFIG_REPLY reply; in mps_read_config_page_header() local 318 if (mps_pass_command(fd, &req, sizeof(req), &reply, sizeof(reply), in mps_read_config_page_header() 322 if (!IOC_STATUS_SUCCESS(le16toh(reply.IOCStatus))) { in mps_read_config_page_header() 324 *IOCStatus = reply.IOCStatus; in mps_read_config_page_header() 329 *header = reply.Header; in mps_read_config_page_header() 337 MPI2_CONFIG_REPLY reply; in mps_read_ext_config_page_header() local 347 if (mps_pass_command(fd, &req, sizeof(req), &reply, sizeof(reply), in mps_read_ext_config_page_header() [all …]
|
| /src/crypto/heimdal/appl/ftp/ftpd/ |
| H A D | ftpcmd.y | 164 reply(500, "Illegal PORT range rejected."); 171 reply(200, "PORT command successful."); 204 reply(200, "Type set to A."); 208 reply(504, "Form must be N."); 212 reply(504, "Type E not implemented."); 216 reply(200, "Type set to I."); 223 reply(200, 227 reply(504, "Byte size must be 8."); 240 reply(200, "STRU F ok."); 244 reply(504, "Unimplemented STRU type."); [all …]
|
| H A D | ftpd.c | 393 reply(530, "System not available."); in main() 400 reply(220, "%s FTP server (%s" in main() 493 reply(530, "No login allowed without authorization."); in user() 499 reply(530, "Can't change user from guest login."); in user() 502 reply(530, "Can't change user from chroot user."); in user() 513 reply(530, "User %s access denied.", name); in user() 518 reply(331, "Guest login ok, type your name as password."); in user() 520 reply(530, "User %s unknown.", name); in user() 537 reply(530, "Only authorized and anonymous login allowed."); in user() 549 reply(530, "User %s access denied.", name); in user() [all …]
|
| H A D | ftpcmd.c | 1807 reply(500, "Illegal PORT range rejected."); in yyparse() 1814 reply(200, "PORT command successful."); in yyparse() 1862 reply(200, "Type set to A."); in yyparse() 1866 reply(504, "Form must be N."); in yyparse() 1870 reply(504, "Type E not implemented."); in yyparse() 1874 reply(200, "Type set to I."); in yyparse() 1881 reply(200, in yyparse() 1885 reply(504, "Byte size must be 8."); in yyparse() 1901 reply(200, "STRU F ok."); in yyparse() 1905 reply(504, "Unimplemented STRU type."); in yyparse() [all …]
|
| /src/sys/dev/mps/ |
| H A D | mps_config.c | 73 MPI2_CONFIG_REPLY *reply = NULL; in mps_config_get_ioc_pg8() local 98 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; in mps_config_get_ioc_pg8() 99 if (error || (reply == NULL)) { in mps_config_get_ioc_pg8() 110 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; in mps_config_get_ioc_pg8() 111 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); in mps_config_get_ioc_pg8() 157 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; in mps_config_get_ioc_pg8() 158 if (error || (reply == NULL)) { in mps_config_get_ioc_pg8() 169 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; in mps_config_get_ioc_pg8() 170 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); in mps_config_get_ioc_pg8() 204 MPI2_CONFIG_REPLY *reply = NULL; in mps_config_get_man_pg10() local [all …]
|
| /src/tests/sys/netpfil/pf/ |
| H A D | return.py | 86 reply = sp.sr1(pkt, timeout=3, verbose=False) 87 print(reply) 89 ip = reply.getlayer(sp.IP) 90 tcp = reply.getlayer(sp.TCP) 111 reply = sp.sr1(pkt, timeout=3, verbose=False) 112 print(reply) 113 ip = reply.getlayer(sp.IP) 114 icmp = reply.getlayer(sp.ICMP) 115 udp = reply.getlayer(sp.UDPerror) 140 reply = sp.sr1(pkt, timeout=3, verbose=False) [all …]
|
| H A D | header.py | 70 reply = sp.sniff(iface=recvif, timeout=3) 71 print(reply) 74 for r in reply: 92 reply = sp.sniff(iface=recvif, timeout=3) 93 print(reply) 95 for r in reply: 112 reply = sp.sniff(iface=recvif, timeout=3) 113 print(reply) 116 for r in reply: 165 reply = sp.sniff(iface=recvif, timeout=3) [all …]
|
| H A D | nat64.py | 118 reply = sp.sr1(packet) 121 tcp = reply.getlayer(sp.TCP) 128 reply = sp.sr1(packet) 130 tcp = reply.getlayer(sp.TCP) 149 reply = sp.sr1(packet, timeout=3) 150 print(reply.show()) 153 assert not reply.getlayer(sp.UDP) 154 icmp = reply.getlayer(sp.ICMPv6DestUnreach) 158 udp = reply.getlayer(sp.UDPerror) 171 reply = sp.sr1(packet, timeout=3) [all …]
|
| /src/contrib/libfido2/src/ |
| H A D | u2f.c | 148 unsigned char *reply = NULL; in send_dummy_register() local 166 if ((reply = malloc(FIDO_MAXMSG)) == NULL) { in send_dummy_register() 179 if (fido_rx(dev, CTAP_CMD_MSG, reply, FIDO_MAXMSG, ms) < 2) { in send_dummy_register() 189 } while (((reply[0] << 8) | reply[1]) == SW_CONDITIONS_NOT_SATISFIED); in send_dummy_register() 194 freezero(reply, FIDO_MAXMSG); in send_dummy_register() 204 unsigned char *reply = NULL; in key_lookup() local 240 if ((reply = malloc(FIDO_MAXMSG)) == NULL) { in key_lookup() 252 if (fido_rx(dev, CTAP_CMD_MSG, reply, FIDO_MAXMSG, ms) != 2) { in key_lookup() 258 switch ((reply[0] << 8) | reply[1]) { in key_lookup() 274 freezero(reply, FIDO_MAXMSG); in key_lookup() [all …]
|
| /src/contrib/wpa/wpa_supplicant/dbus/ |
| H A D | dbus_new_handlers_wps.c | 36 DBusMessage **reply) in wpas_dbus_handler_wps_role() argument 46 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_role() 57 *reply = wpas_dbus_error_invalid_args(message, val); in wpas_dbus_handler_wps_role() 67 DBusMessage **reply) in wpas_dbus_handler_wps_type() argument 76 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_type() 88 *reply = wpas_dbus_error_invalid_args(message, val); in wpas_dbus_handler_wps_type() 98 DBusMessage **reply) in wpas_dbus_handler_wps_bssid() argument 109 *reply = wpas_dbus_error_invalid_args( in wpas_dbus_handler_wps_bssid() 118 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_bssid() 129 DBusMessage **reply) in wpas_dbus_handler_wps_pin() argument [all …]
|
| H A D | dbus_new_handlers.c | 102 DBusMessage *reply; in wpas_dbus_error_invalid_args() local 104 reply = dbus_message_new_error( in wpas_dbus_error_invalid_args() 108 dbus_message_append_args(reply, DBUS_TYPE_STRING, &arg, in wpas_dbus_error_invalid_args() 111 return reply; in wpas_dbus_error_invalid_args() 769 DBusMessage *reply = NULL; in wpas_dbus_handler_create_interface() local 856 reply = dbus_message_new_error( in wpas_dbus_handler_create_interface() 873 reply = wpas_dbus_error_unknown_error( in wpas_dbus_handler_create_interface() 891 reply = dbus_message_new_method_return(message); in wpas_dbus_handler_create_interface() 892 dbus_message_append_args(reply, DBUS_TYPE_OBJECT_PATH, in wpas_dbus_handler_create_interface() 895 reply = wpas_dbus_error_unknown_error( in wpas_dbus_handler_create_interface() [all …]
|
| /src/crypto/heimdal/lib/kadm5/ |
| H A D | chpass_c.c | 48 krb5_data reply; in kadm5_c_chpass_principal() local 66 ret = _kadm5_client_recv(context, &reply); in kadm5_c_chpass_principal() 69 sp = krb5_storage_from_data (&reply); in kadm5_c_chpass_principal() 72 krb5_data_free (&reply); in kadm5_c_chpass_principal() 78 krb5_data_free (&reply); in kadm5_c_chpass_principal() 93 krb5_data reply; in kadm5_c_chpass_principal_with_key() local 114 ret = _kadm5_client_recv(context, &reply); in kadm5_c_chpass_principal_with_key() 117 sp = krb5_storage_from_data (&reply); in kadm5_c_chpass_principal_with_key() 120 krb5_data_free (&reply); in kadm5_c_chpass_principal_with_key() 126 krb5_data_free (&reply); in kadm5_c_chpass_principal_with_key()
|
| /src/crypto/krb5/src/lib/krb5/os/ |
| H A D | prompter.c | 75 if (prompts[i].reply->length > INT_MAX) in krb5_prompter_posix() 86 (void)memset(prompts[i].reply->data, 0, prompts[i].reply->length); in krb5_prompter_posix() 89 retp = fgets(prompts[i].reply->data, (int)prompts[i].reply->length, in krb5_prompter_posix() 103 retp = strchr(prompts[i].reply->data, '\n'); in krb5_prompter_posix() 116 prompts[i].reply->length = strlen(prompts[i].reply->data); in krb5_prompter_posix() 267 memset(prompts[i].reply->data, 0, prompts[i].reply->length); in krb5_prompter_posix() 269 if (fgets(prompts[i].reply->data, prompts[i].reply->length, stdin) in krb5_prompter_posix() 281 if ((ptr = strchr(prompts[i].reply->data, '\n'))) in krb5_prompter_posix() 288 prompts[i].reply->length = strlen(prompts[i].reply->data); in krb5_prompter_posix() 299 memset(prompts[i].reply->data, 0, prompts[i].reply->length); in krb5_prompter_posix()
|
| /src/crypto/heimdal/kdc/ |
| H A D | process.c | 54 krb5_data *reply, in kdc_as_req() argument 71 reply, from, addr, datagram_reply); in kdc_as_req() 81 krb5_data *reply, in kdc_tgs_req() argument 97 ret = _kdc_tgs_rep(context, config, &req, reply, in kdc_tgs_req() 109 krb5_data *reply, in kdc_digest() argument 126 ret = _kdc_do_digest(context, config, &digestreq, reply, from, addr); in kdc_digest() 139 krb5_data *reply, in kdc_kx509() argument 156 ret = _kdc_do_kx509(context, config, &kx509req, reply, from, addr); in kdc_kx509() 186 krb5_data *reply, in krb5_kdc_process_request() argument 202 reply, from, addr, datagram_reply, in krb5_kdc_process_request() [all …]
|
| /src/crypto/krb5/src/lib/krb5/krb/ |
| H A D | rd_rep.c | 73 krb5_ap_rep *reply = NULL; in krb5_rd_rep() local 83 retval = decode_krb5_ap_rep(inbuf, &reply); in krb5_rd_rep() 88 scratch.length = reply->enc_part.ciphertext.length; in krb5_rd_rep() 97 &reply->enc_part, &scratch); in krb5_rd_rep() 142 krb5_free_ap_rep(context, reply); in krb5_rd_rep() 152 krb5_ap_rep * reply; in krb5_rd_rep_dce() local 161 if ((retval = decode_krb5_ap_rep(inbuf, &reply))) in krb5_rd_rep_dce() 166 scratch.length = reply->enc_part.ciphertext.length; in krb5_rd_rep_dce() 168 krb5_free_ap_rep(context, reply); in krb5_rd_rep_dce() 174 &reply->enc_part, &scratch))) in krb5_rd_rep_dce() [all …]
|
| /src/contrib/wpa/src/radius/ |
| H A D | radius_das.c | 40 struct radius_msg *reply; in radius_das_disconnect() local 175 reply = radius_msg_new(error ? RADIUS_CODE_DISCONNECT_NAK : in radius_das_disconnect() 177 if (reply == NULL) in radius_das_disconnect() 180 if (!radius_msg_add_msg_auth(reply)) { in radius_das_disconnect() 181 radius_msg_free(reply); in radius_das_disconnect() 186 if (!radius_msg_add_attr_int32(reply, RADIUS_ATTR_ERROR_CAUSE, in radius_das_disconnect() 188 radius_msg_free(reply); in radius_das_disconnect() 193 return reply; in radius_das_disconnect() 202 struct radius_msg *reply; in radius_das_coa() local 371 reply = radius_msg_new(error ? RADIUS_CODE_COA_NAK : in radius_das_coa() [all …]
|
| /src/contrib/libevent/include/event2/ |
| H A D | rpc.h | 180 struct rplystruct* reply; \ 197 struct evrpc_pool *pool, void *request, void *reply, 220 pool, request, reply, cb, cbarg) \ argument 221 evrpc_make_request_ctx(pool, request, reply, \ 241 struct reqstruct *request, struct rplystruct *reply, \ 245 return evrpc_send_request_generic(pool, request, reply, \ 330 #define EVRPC_REGISTER(base, name, request, reply, callback, cbarg) \ argument 336 (void *(*)(void *))reply##_new_with_arg, NULL, \ 337 (void (*)(void *))reply##_free, \ 338 (int (*)(void *))reply##_complete, \ [all …]
|
| /src/contrib/ntp/sntp/libevent/include/event2/ |
| H A D | rpc.h | 180 struct rplystruct* reply; \ 197 struct evrpc_pool *pool, void *request, void *reply, 220 pool, request, reply, cb, cbarg) \ argument 221 evrpc_make_request_ctx(pool, request, reply, \ 241 struct reqstruct *request, struct rplystruct *reply, \ 245 return evrpc_send_request_generic(pool, request, reply, \ 330 #define EVRPC_REGISTER(base, name, request, reply, callback, cbarg) \ argument 336 (void *(*)(void *))reply##_new_with_arg, NULL, \ 337 (void (*)(void *))reply##_free, \ 338 (int (*)(void *))reply##_complete, \ [all …]
|
| /src/contrib/pam_modules/pam_passwdqc/ |
| H A D | pam_macros.h | 16 #define _pam_drop_reply(/* struct pam_response * */ reply, /* int */ replies) \ argument 21 if ((reply)[i].resp) { \ 22 _pam_overwrite((reply)[i].resp); \ 23 free((reply)[i].resp); \ 25 if ((reply)) free((reply)); \
|
| /src/stand/libsa/ |
| H A D | rpc.c | 112 struct rpc_reply *reply; in rpc_call() local 165 recvrpc, &ptr, (void **)&reply, NULL); in rpc_call() 174 if (cc <= sizeof(*reply)) { in rpc_call() 184 auth = &reply->rp_u.rpu_rok.rok_auth; in rpc_call() 195 x = ntohl(reply->rp_u.rpu_rok.rok_status); in rpc_call() 203 rsize = cc - sizeof(*reply); in rpc_call() 204 *rdata = (void *)((uintptr_t)reply + sizeof(*reply)); in rpc_call() 218 struct rpc_reply *reply; in recvrpc() local 229 n = readudp(d, &ptr, (void **)&reply, tleft); in recvrpc() 235 x = ntohl(reply->rp_xid); in recvrpc() [all …]
|