Home
last modified time | relevance | path

Searched refs:reply (Results 1 – 25 of 408) sorted by relevance

12345678910>>...17

/src/sys/dev/pst/
H A Dpst-iop.c52 struct i2o_single_reply *reply; member
121 struct i2o_get_param_reply *reply; in iop_attach() local
130 if ((reply = iop_get_util_params(sc, sc->lct[i].local_tid, in iop_attach()
134 (struct i2o_device_identity *)reply->result; in iop_attach()
139 free(reply, M_PSTIOP); in iop_attach()
169 struct i2o_single_reply *reply; in iop_intr() local
179 reply = (struct i2o_single_reply *)(sc->obase + (mfa - sc->phys_obase)); in iop_intr()
182 if (reply->function == I2O_UTIL_EVENT_REGISTER) { in iop_intr()
184 (struct i2o_util_event_reply_message *)reply; in iop_intr()
192 if (reply->message_flags & I2O_MESSAGE_FLAGS_FAIL) in iop_intr()
[all …]
/src/crypto/krb5/src/ccapi/lib/
H A Dccapi_context.c233 k5_ipc_stream reply = NULL; in ccapi_context_get_change_time() local
245 NULL, &reply); in ccapi_context_get_change_time()
248 if (!err && krb5int_ipc_stream_size (reply) > 0) { in ccapi_context_get_change_time()
252 err = krb5int_ipc_stream_read_time (reply, &change_time); in ccapi_context_get_change_time()
264 krb5int_ipc_stream_release (reply); in ccapi_context_get_change_time()
276 k5_ipc_stream reply = NULL; in ccapi_context_wait_for_change() local
296 &reply); in ccapi_context_wait_for_change()
300 err = krb5int_ipc_stream_read_time (reply, &context->last_wait_for_change_time); in ccapi_context_wait_for_change()
304 krb5int_ipc_stream_release (reply); in ccapi_context_wait_for_change()
316 k5_ipc_stream reply = NULL; in ccapi_context_get_default_ccache_name() local
[all …]
H A Dccapi_ccache.c210 k5_ipc_stream reply = NULL; in ccapi_ccache_get_credentials_version() local
219 &reply); in ccapi_ccache_get_credentials_version()
223 err = krb5int_ipc_stream_read_uint32 (reply, out_credentials_version); in ccapi_ccache_get_credentials_version()
226 krb5int_ipc_stream_release (reply); in ccapi_ccache_get_credentials_version()
238 k5_ipc_stream reply = NULL; in ccapi_ccache_get_name() local
248 &reply); in ccapi_ccache_get_name()
252 err = krb5int_ipc_stream_read_string (reply, &name); in ccapi_ccache_get_name()
259 krb5int_ipc_stream_release (reply); in ccapi_ccache_get_name()
274 k5_ipc_stream reply = NULL; in ccapi_ccache_get_principal() local
292 &reply); in ccapi_ccache_get_principal()
[all …]
H A Dccapi_ipc.c53 k5_ipc_stream reply = NULL; in _cci_ipc_send() local
73 err = cci_os_ipc (in_launch_server, request, &reply); in _cci_ipc_send()
75 if (!err && krb5int_ipc_stream_size (reply) > 0) { in _cci_ipc_send()
76 err = cci_message_read_reply_header (reply, &reply_error); in _cci_ipc_send()
85 *out_reply_data = reply; in _cci_ipc_send()
86 reply = NULL; /* take ownership */ in _cci_ipc_send()
90 krb5int_ipc_stream_release (reply); in _cci_ipc_send()
/src/sys/dev/mpr/
H A Dmpr_config.c73 MPI2_CONFIG_REPLY *reply; in mpr_config_get_ioc_pg8() local
98 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; in mpr_config_get_ioc_pg8()
99 if (error || (reply == NULL)) { in mpr_config_get_ioc_pg8()
110 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; in mpr_config_get_ioc_pg8()
111 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); in mpr_config_get_ioc_pg8()
157 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; in mpr_config_get_ioc_pg8()
158 if (error || (reply == NULL)) { in mpr_config_get_ioc_pg8()
169 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; in mpr_config_get_ioc_pg8()
170 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); in mpr_config_get_ioc_pg8()
205 MPI2_CONFIG_REPLY *reply; in mpr_config_get_iounit_pg8() local
[all …]
/src/usr.sbin/mpsutil/
H A Dmps_cmd.c285 MPI2_SEP_REPLY reply; in mps_set_slot_status() local
295 if (mps_pass_command(fd, &req, sizeof(req), &reply, sizeof(reply), in mps_set_slot_status()
299 if (!IOC_STATUS_SUCCESS(le16toh(reply.IOCStatus))) in mps_set_slot_status()
309 MPI2_CONFIG_REPLY reply; in mps_read_config_page_header() local
318 if (mps_pass_command(fd, &req, sizeof(req), &reply, sizeof(reply), in mps_read_config_page_header()
322 if (!IOC_STATUS_SUCCESS(le16toh(reply.IOCStatus))) { in mps_read_config_page_header()
324 *IOCStatus = reply.IOCStatus; in mps_read_config_page_header()
329 *header = reply.Header; in mps_read_config_page_header()
337 MPI2_CONFIG_REPLY reply; in mps_read_ext_config_page_header() local
347 if (mps_pass_command(fd, &req, sizeof(req), &reply, sizeof(reply), in mps_read_ext_config_page_header()
[all …]
/src/crypto/heimdal/appl/ftp/ftpd/
H A Dftpcmd.y164 reply(500, "Illegal PORT range rejected.");
171 reply(200, "PORT command successful.");
204 reply(200, "Type set to A.");
208 reply(504, "Form must be N.");
212 reply(504, "Type E not implemented.");
216 reply(200, "Type set to I.");
223 reply(200,
227 reply(504, "Byte size must be 8.");
240 reply(200, "STRU F ok.");
244 reply(504, "Unimplemented STRU type.");
[all …]
H A Dftpd.c393 reply(530, "System not available."); in main()
400 reply(220, "%s FTP server (%s" in main()
493 reply(530, "No login allowed without authorization."); in user()
499 reply(530, "Can't change user from guest login."); in user()
502 reply(530, "Can't change user from chroot user."); in user()
513 reply(530, "User %s access denied.", name); in user()
518 reply(331, "Guest login ok, type your name as password."); in user()
520 reply(530, "User %s unknown.", name); in user()
537 reply(530, "Only authorized and anonymous login allowed."); in user()
549 reply(530, "User %s access denied.", name); in user()
[all …]
H A Dftpcmd.c1807 reply(500, "Illegal PORT range rejected."); in yyparse()
1814 reply(200, "PORT command successful."); in yyparse()
1862 reply(200, "Type set to A."); in yyparse()
1866 reply(504, "Form must be N."); in yyparse()
1870 reply(504, "Type E not implemented."); in yyparse()
1874 reply(200, "Type set to I."); in yyparse()
1881 reply(200, in yyparse()
1885 reply(504, "Byte size must be 8."); in yyparse()
1901 reply(200, "STRU F ok."); in yyparse()
1905 reply(504, "Unimplemented STRU type."); in yyparse()
[all …]
/src/sys/dev/mps/
H A Dmps_config.c73 MPI2_CONFIG_REPLY *reply = NULL; in mps_config_get_ioc_pg8() local
98 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; in mps_config_get_ioc_pg8()
99 if (error || (reply == NULL)) { in mps_config_get_ioc_pg8()
110 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; in mps_config_get_ioc_pg8()
111 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); in mps_config_get_ioc_pg8()
157 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; in mps_config_get_ioc_pg8()
158 if (error || (reply == NULL)) { in mps_config_get_ioc_pg8()
169 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; in mps_config_get_ioc_pg8()
170 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); in mps_config_get_ioc_pg8()
204 MPI2_CONFIG_REPLY *reply = NULL; in mps_config_get_man_pg10() local
[all …]
/src/tests/sys/netpfil/pf/
H A Dreturn.py86 reply = sp.sr1(pkt, timeout=3, verbose=False)
87 print(reply)
89 ip = reply.getlayer(sp.IP)
90 tcp = reply.getlayer(sp.TCP)
111 reply = sp.sr1(pkt, timeout=3, verbose=False)
112 print(reply)
113 ip = reply.getlayer(sp.IP)
114 icmp = reply.getlayer(sp.ICMP)
115 udp = reply.getlayer(sp.UDPerror)
140 reply = sp.sr1(pkt, timeout=3, verbose=False)
[all …]
H A Dheader.py70 reply = sp.sniff(iface=recvif, timeout=3)
71 print(reply)
74 for r in reply:
92 reply = sp.sniff(iface=recvif, timeout=3)
93 print(reply)
95 for r in reply:
112 reply = sp.sniff(iface=recvif, timeout=3)
113 print(reply)
116 for r in reply:
165 reply = sp.sniff(iface=recvif, timeout=3)
[all …]
H A Dnat64.py118 reply = sp.sr1(packet)
121 tcp = reply.getlayer(sp.TCP)
128 reply = sp.sr1(packet)
130 tcp = reply.getlayer(sp.TCP)
149 reply = sp.sr1(packet, timeout=3)
150 print(reply.show())
153 assert not reply.getlayer(sp.UDP)
154 icmp = reply.getlayer(sp.ICMPv6DestUnreach)
158 udp = reply.getlayer(sp.UDPerror)
171 reply = sp.sr1(packet, timeout=3)
[all …]
/src/contrib/libfido2/src/
H A Du2f.c148 unsigned char *reply = NULL; in send_dummy_register() local
166 if ((reply = malloc(FIDO_MAXMSG)) == NULL) { in send_dummy_register()
179 if (fido_rx(dev, CTAP_CMD_MSG, reply, FIDO_MAXMSG, ms) < 2) { in send_dummy_register()
189 } while (((reply[0] << 8) | reply[1]) == SW_CONDITIONS_NOT_SATISFIED); in send_dummy_register()
194 freezero(reply, FIDO_MAXMSG); in send_dummy_register()
204 unsigned char *reply = NULL; in key_lookup() local
240 if ((reply = malloc(FIDO_MAXMSG)) == NULL) { in key_lookup()
252 if (fido_rx(dev, CTAP_CMD_MSG, reply, FIDO_MAXMSG, ms) != 2) { in key_lookup()
258 switch ((reply[0] << 8) | reply[1]) { in key_lookup()
274 freezero(reply, FIDO_MAXMSG); in key_lookup()
[all …]
/src/contrib/wpa/wpa_supplicant/dbus/
H A Ddbus_new_handlers_wps.c36 DBusMessage **reply) in wpas_dbus_handler_wps_role() argument
46 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_role()
57 *reply = wpas_dbus_error_invalid_args(message, val); in wpas_dbus_handler_wps_role()
67 DBusMessage **reply) in wpas_dbus_handler_wps_type() argument
76 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_type()
88 *reply = wpas_dbus_error_invalid_args(message, val); in wpas_dbus_handler_wps_type()
98 DBusMessage **reply) in wpas_dbus_handler_wps_bssid() argument
109 *reply = wpas_dbus_error_invalid_args( in wpas_dbus_handler_wps_bssid()
118 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_bssid()
129 DBusMessage **reply) in wpas_dbus_handler_wps_pin() argument
[all …]
H A Ddbus_new_handlers.c102 DBusMessage *reply; in wpas_dbus_error_invalid_args() local
104 reply = dbus_message_new_error( in wpas_dbus_error_invalid_args()
108 dbus_message_append_args(reply, DBUS_TYPE_STRING, &arg, in wpas_dbus_error_invalid_args()
111 return reply; in wpas_dbus_error_invalid_args()
769 DBusMessage *reply = NULL; in wpas_dbus_handler_create_interface() local
856 reply = dbus_message_new_error( in wpas_dbus_handler_create_interface()
873 reply = wpas_dbus_error_unknown_error( in wpas_dbus_handler_create_interface()
891 reply = dbus_message_new_method_return(message); in wpas_dbus_handler_create_interface()
892 dbus_message_append_args(reply, DBUS_TYPE_OBJECT_PATH, in wpas_dbus_handler_create_interface()
895 reply = wpas_dbus_error_unknown_error( in wpas_dbus_handler_create_interface()
[all …]
/src/crypto/heimdal/lib/kadm5/
H A Dchpass_c.c48 krb5_data reply; in kadm5_c_chpass_principal() local
66 ret = _kadm5_client_recv(context, &reply); in kadm5_c_chpass_principal()
69 sp = krb5_storage_from_data (&reply); in kadm5_c_chpass_principal()
72 krb5_data_free (&reply); in kadm5_c_chpass_principal()
78 krb5_data_free (&reply); in kadm5_c_chpass_principal()
93 krb5_data reply; in kadm5_c_chpass_principal_with_key() local
114 ret = _kadm5_client_recv(context, &reply); in kadm5_c_chpass_principal_with_key()
117 sp = krb5_storage_from_data (&reply); in kadm5_c_chpass_principal_with_key()
120 krb5_data_free (&reply); in kadm5_c_chpass_principal_with_key()
126 krb5_data_free (&reply); in kadm5_c_chpass_principal_with_key()
/src/crypto/krb5/src/lib/krb5/os/
H A Dprompter.c75 if (prompts[i].reply->length > INT_MAX) in krb5_prompter_posix()
86 (void)memset(prompts[i].reply->data, 0, prompts[i].reply->length); in krb5_prompter_posix()
89 retp = fgets(prompts[i].reply->data, (int)prompts[i].reply->length, in krb5_prompter_posix()
103 retp = strchr(prompts[i].reply->data, '\n'); in krb5_prompter_posix()
116 prompts[i].reply->length = strlen(prompts[i].reply->data); in krb5_prompter_posix()
267 memset(prompts[i].reply->data, 0, prompts[i].reply->length); in krb5_prompter_posix()
269 if (fgets(prompts[i].reply->data, prompts[i].reply->length, stdin) in krb5_prompter_posix()
281 if ((ptr = strchr(prompts[i].reply->data, '\n'))) in krb5_prompter_posix()
288 prompts[i].reply->length = strlen(prompts[i].reply->data); in krb5_prompter_posix()
299 memset(prompts[i].reply->data, 0, prompts[i].reply->length); in krb5_prompter_posix()
/src/crypto/heimdal/kdc/
H A Dprocess.c54 krb5_data *reply, in kdc_as_req() argument
71 reply, from, addr, datagram_reply); in kdc_as_req()
81 krb5_data *reply, in kdc_tgs_req() argument
97 ret = _kdc_tgs_rep(context, config, &req, reply, in kdc_tgs_req()
109 krb5_data *reply, in kdc_digest() argument
126 ret = _kdc_do_digest(context, config, &digestreq, reply, from, addr); in kdc_digest()
139 krb5_data *reply, in kdc_kx509() argument
156 ret = _kdc_do_kx509(context, config, &kx509req, reply, from, addr); in kdc_kx509()
186 krb5_data *reply, in krb5_kdc_process_request() argument
202 reply, from, addr, datagram_reply, in krb5_kdc_process_request()
[all …]
/src/crypto/krb5/src/lib/krb5/krb/
H A Drd_rep.c73 krb5_ap_rep *reply = NULL; in krb5_rd_rep() local
83 retval = decode_krb5_ap_rep(inbuf, &reply); in krb5_rd_rep()
88 scratch.length = reply->enc_part.ciphertext.length; in krb5_rd_rep()
97 &reply->enc_part, &scratch); in krb5_rd_rep()
142 krb5_free_ap_rep(context, reply); in krb5_rd_rep()
152 krb5_ap_rep * reply; in krb5_rd_rep_dce() local
161 if ((retval = decode_krb5_ap_rep(inbuf, &reply))) in krb5_rd_rep_dce()
166 scratch.length = reply->enc_part.ciphertext.length; in krb5_rd_rep_dce()
168 krb5_free_ap_rep(context, reply); in krb5_rd_rep_dce()
174 &reply->enc_part, &scratch))) in krb5_rd_rep_dce()
[all …]
/src/contrib/wpa/src/radius/
H A Dradius_das.c40 struct radius_msg *reply; in radius_das_disconnect() local
175 reply = radius_msg_new(error ? RADIUS_CODE_DISCONNECT_NAK : in radius_das_disconnect()
177 if (reply == NULL) in radius_das_disconnect()
180 if (!radius_msg_add_msg_auth(reply)) { in radius_das_disconnect()
181 radius_msg_free(reply); in radius_das_disconnect()
186 if (!radius_msg_add_attr_int32(reply, RADIUS_ATTR_ERROR_CAUSE, in radius_das_disconnect()
188 radius_msg_free(reply); in radius_das_disconnect()
193 return reply; in radius_das_disconnect()
202 struct radius_msg *reply; in radius_das_coa() local
371 reply = radius_msg_new(error ? RADIUS_CODE_COA_NAK : in radius_das_coa()
[all …]
/src/contrib/libevent/include/event2/
H A Drpc.h180 struct rplystruct* reply; \
197 struct evrpc_pool *pool, void *request, void *reply,
220 pool, request, reply, cb, cbarg) \ argument
221 evrpc_make_request_ctx(pool, request, reply, \
241 struct reqstruct *request, struct rplystruct *reply, \
245 return evrpc_send_request_generic(pool, request, reply, \
330 #define EVRPC_REGISTER(base, name, request, reply, callback, cbarg) \ argument
336 (void *(*)(void *))reply##_new_with_arg, NULL, \
337 (void (*)(void *))reply##_free, \
338 (int (*)(void *))reply##_complete, \
[all …]
/src/contrib/ntp/sntp/libevent/include/event2/
H A Drpc.h180 struct rplystruct* reply; \
197 struct evrpc_pool *pool, void *request, void *reply,
220 pool, request, reply, cb, cbarg) \ argument
221 evrpc_make_request_ctx(pool, request, reply, \
241 struct reqstruct *request, struct rplystruct *reply, \
245 return evrpc_send_request_generic(pool, request, reply, \
330 #define EVRPC_REGISTER(base, name, request, reply, callback, cbarg) \ argument
336 (void *(*)(void *))reply##_new_with_arg, NULL, \
337 (void (*)(void *))reply##_free, \
338 (int (*)(void *))reply##_complete, \
[all …]
/src/contrib/pam_modules/pam_passwdqc/
H A Dpam_macros.h16 #define _pam_drop_reply(/* struct pam_response * */ reply, /* int */ replies) \ argument
21 if ((reply)[i].resp) { \
22 _pam_overwrite((reply)[i].resp); \
23 free((reply)[i].resp); \
25 if ((reply)) free((reply)); \
/src/stand/libsa/
H A Drpc.c112 struct rpc_reply *reply; in rpc_call() local
165 recvrpc, &ptr, (void **)&reply, NULL); in rpc_call()
174 if (cc <= sizeof(*reply)) { in rpc_call()
184 auth = &reply->rp_u.rpu_rok.rok_auth; in rpc_call()
195 x = ntohl(reply->rp_u.rpu_rok.rok_status); in rpc_call()
203 rsize = cc - sizeof(*reply); in rpc_call()
204 *rdata = (void *)((uintptr_t)reply + sizeof(*reply)); in rpc_call()
218 struct rpc_reply *reply; in recvrpc() local
229 n = readudp(d, &ptr, (void **)&reply, tleft); in recvrpc()
235 x = ntohl(reply->rp_xid); in recvrpc()
[all …]

12345678910>>...17