/freebsd-current/crypto/heimdal/lib/kadm5/ |
H A D | send_recv.c | 78 _kadm5_client_recv(kadm5_client_context *context, krb5_data *reply) argument 97 ret = krb5_rd_priv(context->context, context->ac, &data, reply, NULL);
|
/freebsd-current/crypto/heimdal/appl/ftp/ftpd/ |
H A D | security.c | 441 reply(431, "Unable to accept %s at this time", mech->name); 447 reply(431, "Unable to accept %s at this time", mech->name); 455 reply(334, "Send authorization data."); 457 reply(234, "Authorization complete."); 463 reply(504, "%s is unknown to me", auth_name); 476 reply(503, "You must %sissue an AUTH first.", mech ? "re-" : ""); 483 reply(503, "Incomplete security data exchange."); 490 reply(200, "PBSZ=%lu", (unsigned long)new); 492 reply(200, "OK"); 501 reply(50 [all...] |
/freebsd-current/crypto/heimdal/appl/ftp/ftp/ |
H A D | security.c | 441 reply(431, "Unable to accept %s at this time", mech->name); 447 reply(431, "Unable to accept %s at this time", mech->name); 455 reply(334, "Send authorization data."); 457 reply(234, "Authorization complete."); 463 reply(504, "%s is unknown to me", auth_name); 476 reply(503, "You must %sissue an AUTH first.", mech ? "re-" : ""); 483 reply(503, "Incomplete security data exchange."); 490 reply(200, "PBSZ=%lu", (unsigned long)new); 492 reply(200, "OK"); 501 reply(50 [all...] |
/freebsd-current/crypto/heimdal/lib/hx509/ |
H A D | lock.c | 187 if(UI_UTIL_read_pw_string(prompter->reply.data, 188 prompter->reply.length, 193 char *s = prompter->reply.data; 197 if(fgets(prompter->reply.data, 198 prompter->reply.length,
|
/freebsd-current/contrib/wpa/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers_p2p.c | 109 DBusMessage *reply = NULL; local 173 reply = wpas_dbus_error_no_p2p_mgmt_iface(message); 179 reply = wpas_dbus_error_unknown_error( 183 return reply; 188 reply = wpas_dbus_error_invalid_args(message, entry.key); 191 return reply; 352 DBusMessage *reply = NULL; local 391 reply = wpas_dbus_error_no_p2p_mgmt_iface(message); 409 reply = 417 reply 492 DBusMessage *reply = NULL; local 549 DBusMessage *reply = NULL; local 569 DBusMessage *reply = NULL; local 737 DBusMessage *reply = NULL; local 2129 DBusMessage *reply = NULL; local 2215 DBusMessage *reply = NULL; local 2665 DBusMessage *reply = NULL; local 2750 DBusMessage *reply = NULL; local 2838 DBusMessage *reply = NULL; local 2932 DBusMessage *reply = NULL; local [all...] |
H A D | dbus_new_introspect.c | 257 DBusMessage *reply; local 276 reply = dbus_message_new_method_return(message); 277 if (reply) { 280 dbus_message_append_args(reply, DBUS_TYPE_STRING, &intro_str, 285 return reply;
|
/freebsd-current/contrib/sendmail/contrib/ |
H A D | smcontrol.pl | 68 # reply from sendmail daemon 76 my @reply; 97 @reply = <SOCK>; 99 return join '', @reply;
|
/freebsd-current/tests/sys/netpfil/pf/ |
H A D | syncookie.sh | 68 reply=$(echo foo | nc -N -w 5 192.0.2.1 7) 69 if [ "${reply}" != "foo" ]; 117 reply=$(echo foo | nc -N -w 5 2001:db8::1 7) 118 if [ "${reply}" != "foo" ]; 175 reply=$(echo foo | nc -N -w 5 198.51.100.2 7) 176 if [ "${reply}" != "foo" ]; 226 reply=$(echo foo | nc -N -w 5 2001:db8:1::2 7) 227 if [ "${reply}" != "foo" ]; 458 reply=$(echo foo | nc -p 1234 -N -w 5 192.0.2.1 7) 459 if [ "${reply}" ! [all...] |
/freebsd-current/sys/dev/pst/ |
H A D | pst-raid.c | 117 struct i2o_get_param_reply *reply; local 122 if (!(reply = iop_get_util_params(psc->iop, psc->lct->local_tid, 129 contigfree(reply, PAGE_SIZE, M_PSTIOP); 132 bcopy(reply->result, psc->info, sizeof(struct i2o_bsa_device)); 133 contigfree(reply, PAGE_SIZE, M_PSTIOP); 135 if (!(reply = iop_get_util_params(psc->iop, psc->lct->local_tid, 139 ident = (struct i2o_device_identity *)reply->result; 151 contigfree(reply, PAGE_SIZE, M_PSTIOP); 251 pst_done(struct iop_softc *sc, u_int32_t mfa, struct i2o_single_reply *reply) argument 254 (struct pst_request *)reply [all...] |
/freebsd-current/crypto/heimdal/kdc/ |
H A D | kdc.h | 104 krb5_data *reply,
|
H A D | connect.c | 403 krb5_data *reply) 406 "sending %lu bytes to %s", (unsigned long)reply->length, 410 l[0] = (reply->length >> 24) & 0xff; 411 l[1] = (reply->length >> 16) & 0xff; 412 l[2] = (reply->length >> 8) & 0xff; 413 l[3] = reply->length & 0xff; 421 if(rk_IS_SOCKET_ERROR(sendto(d->s, reply->data, reply->length, 0, d->sa, d->sock_len))) { 439 krb5_data reply; local 444 krb5_data_zero(&reply); 399 send_reply(krb5_context context, krb5_kdc_configuration *config, krb5_boolean prependlength, struct descr *d, krb5_data *reply) argument 811 krb5_data reply; local [all...] |
/freebsd-current/crypto/heimdal/lib/ipc/ |
H A D | hi_locl.h | 71 typedef boolean_t (*dispatch_mig_callback_t)(mach_msg_header_t *message, mach_msg_header_t *reply);
|
/freebsd-current/sbin/fsdb/ |
H A D | fsdb.h | 35 extern int reply(const char *question);
|
/freebsd-current/sys/nfs/ |
H A D | bootp_subr.c | 129 struct bootp_packet reply; member in struct:bootpc_ifcontext 183 struct bootp_packet reply; member in struct:bootpc_globalcontext 397 (void) bootpc_tag(&gctx->tmptag, &gctx->reply, 405 p = bootpc_tag(&gctx->tmptag, &gctx->reply, 434 (bootpc_tag(&gctx->tmptag, &ifctx->reply, 437 bootpc_tag(&gctx->tmptag, &gctx->reply, 442 bcopy(&gctx->reply, &ifctx->reply, gctx->replylen); 460 p = bootpc_tag(&gctx->tmptag, &ifctx->reply, 470 ifctx->gotrootpath = (bootpc_tag(&gctx->tmptag, &ifctx->reply, [all...] |
/freebsd-current/contrib/wpa/src/wps/ |
H A D | wps_upnp_web.c | 424 struct wpabuf **reply, const char **replyname) 458 *reply = wps_get_msg(peer->wps, &op_code); 459 if (*reply == NULL) { 464 *reply = NULL; 465 if (*reply == NULL) { 490 struct wpabuf **reply, const char **replyname) 559 *reply = NULL; 563 *reply = wps_get_msg(peer->wps, &op_code); 566 if (*reply == NULL) 575 struct wpabuf **reply, cons 423 web_process_get_device_info(struct upnp_wps_device_sm *sm, struct wpabuf **reply, const char **replyname) argument 489 web_process_put_message(struct upnp_wps_device_sm *sm, char *data, struct wpabuf **reply, const char **replyname) argument 574 web_process_put_wlan_response(struct upnp_wps_device_sm *sm, char *data, struct wpabuf **reply, const char **replyname) argument 699 web_process_set_selected_registrar(struct upnp_wps_device_sm *sm, struct sockaddr_in *cli, char *data, struct wpabuf **reply, const char **replyname) argument 755 web_connection_send_reply(struct http_request *req, enum http_reply_code ret, const char *action, int action_len, const struct wpabuf *reply, const char *replyname) argument 928 struct wpabuf *reply = NULL; /* data for the reply */ local [all...] |
/freebsd-current/contrib/ntp/scripts/monitoring/ |
H A D | ntploopstat | 110 $timeout = 12.0 unless defined($timeout); # wait $timeout seconds for reply 264 ;# get reply 285 &msg("Waiting for reply...\n"); 306 &msg("Receiving reply...\n"); 309 $reply = ""; # just make it defined for -w 310 $ret = recv(S,$reply,$len,0); 340 = unpack($loopinfo_response_fmt,$reply); 342 ;# check reply 345 die("$0: got error reply ".($s1>>12)."\n"); 350 $b4 != $REQ_LOOP_INFO || # Ehh.. not loopinfo reply [all...] |
/freebsd-current/contrib/telnet/libtelnet/ |
H A D | sra.c | 483 struct pam_response *reply = local 486 if (reply == NULL) 492 reply[i].resp_retcode = PAM_SUCCESS; 493 reply[i].resp = COPY_STRING(cred->uname); 497 reply[i].resp_retcode = PAM_SUCCESS; 498 reply[i].resp = COPY_STRING(cred->pass); 503 reply[i].resp_retcode = PAM_SUCCESS; 504 reply[i].resp = NULL; 507 free(reply); 512 *resp = reply; [all...] |
/freebsd-current/crypto/openssh/ |
H A D | mux.c | 268 Channel *c, struct sshbuf *m, struct sshbuf *reply) 309 /* Enqueue a "ok" response to the reply buffer */ 311 reply_ok(struct sshbuf *reply, u_int rid) argument 315 if ((r = sshbuf_put_u32(reply, MUX_S_OK)) != 0 || 316 (r = sshbuf_put_u32(reply, rid)) != 0) 317 fatal_fr(r, "reply"); 320 /* Enqueue an error response to the reply buffer */ 322 reply_error(struct sshbuf *reply, u_int type, u_int rid, const char *msg) argument 326 if ((r = sshbuf_put_u32(reply, type)) != 0 || 327 (r = sshbuf_put_u32(reply, ri 267 mux_master_process_hello(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument 333 mux_master_process_new_session(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument 490 mux_master_process_alive_check(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument 507 mux_master_process_terminate(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument 683 mux_master_process_open_fwd(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument 848 mux_master_process_close_fwd(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument 960 mux_master_process_stdio_fwd(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument 1061 struct sshbuf *reply; local 1103 mux_master_process_stop_listening(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument 1133 mux_master_process_proxy(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument 1362 struct sshbuf *reply; local [all...] |
/freebsd-current/contrib/wpa/hostapd/ |
H A D | ctrl_iface.c | 261 char *cmd, char *reply, 279 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf), 281 reply[res++] = '\n'; 282 reply[res] = '\0'; 291 char *reply, size_t max_len, 301 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf), 303 reply[res++] = '\n'; 304 reply[res] = '\0'; 313 char *cmd, char *reply, 317 return hostapd_ctrl_iface_wps_nfc_token_gen(hapd, reply, 260 hostapd_ctrl_iface_wps_nfc_config_token(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument 290 hostapd_ctrl_iface_wps_nfc_token_gen(struct hostapd_data *hapd, char *reply, size_t max_len, int ndef) argument 312 hostapd_ctrl_iface_wps_nfc_token(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument 336 hostapd_ctrl_iface_nfc_get_handover_sel(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument 2856 hostapd_ctrl_iface_mib(struct hostapd_data *hapd, char *reply, int reply_size, const char *param) argument 2877 struct wpabuf *reply; local 3134 hostapd_ctrl_iface_req_beacon(struct hostapd_data *hapd, const char *cmd, char *reply, size_t reply_size) argument 3503 hostapd_ctrl_iface_receive_process(struct hostapd_data *hapd, char *buf, char *reply, int reply_size, struct sockaddr_storage *from, socklen_t fromlen) argument 4041 char *reply, *pos = buf; local 4653 hostapd_global_ctrl_iface_interfaces(struct hapd_interfaces *interfaces, const char *input, char *reply, int reply_size) argument 4742 hostapd_global_ctrl_iface_ifname(struct hapd_interfaces *interfaces, const char *ifname, char *buf, char *reply, int reply_size, struct sockaddr_storage *from, socklen_t fromlen) argument 4774 char *reply; local [all...] |
/freebsd-current/contrib/libfido2/src/ |
H A D | netlink.c | 512 uint8_t reply[512]; local 527 if ((r = nlmsg_rx(fd, reply, sizeof(reply), -1)) < 0) { 531 if ((ok = nl_parse_reply(reply, (size_t)r, GENL_ID_CTRL, 568 uint8_t reply[512]; local 580 if ((r = nlmsg_rx(nl->fd, reply, sizeof(reply), -1)) < 0) { 584 if ((ok = nl_parse_reply(reply, (size_t)r, nl->nfc_type, 597 uint8_t reply[512]; local 610 if ((r = nlmsg_rx(nl->fd, reply, sizeo 628 uint8_t reply[512]; local 684 uint8_t reply[512]; local [all...] |
/freebsd-current/contrib/ntp/sntp/libevent/ |
H A D | evrpc.c | 363 /* at this point, we have a well formed request, prepare the reply */ 365 rpc_state->reply = rpc->reply_new(rpc->reply_new_arg); 366 if (rpc_state->reply == NULL) 393 if (rpc_state->reply != NULL) 394 rpc->reply_free(rpc_state->reply); 414 if (rpc->reply_complete(rpc_state->reply) == -1) { 415 /* the reply was not completely filled in. error out */ 424 /* serialize the reply */ 425 rpc->reply_marshal(rpc_state->rpc_data, rpc_state->reply); 470 return req->reply; 823 evrpc_make_request_ctx( struct evrpc_pool *pool, void *request, void *reply, const char *rpcname, void (*req_marshal)(struct evbuffer*, void *), void (*rpl_clear)(void *), int (*rpl_unmarshal)(void *, struct evbuffer *), void (*cb)(struct evrpc_status *, void *, void *, void *), void *cbarg) argument 1079 evrpc_send_request_generic(struct evrpc_pool *pool, void *request, void *reply, void (*cb)(struct evrpc_status *, void *, void *, void *), void *cb_arg, const char *rpcname, void (*req_marshal)(struct evbuffer *, void *), void (*rpl_clear)(void *), int (*rpl_unmarshal)(void *, struct evbuffer *)) argument 1165 evrpc_request_set_cb(struct evrpc_request_wrapper *ctx, void (*cb)(struct evrpc_status*, void *request, void *reply, void *arg), void *cb_arg) argument [all...] |
/freebsd-current/contrib/libevent/ |
H A D | evrpc.c | 363 /* at this point, we have a well formed request, prepare the reply */ 365 rpc_state->reply = rpc->reply_new(rpc->reply_new_arg); 366 if (rpc_state->reply == NULL) 393 if (rpc_state->reply != NULL) 394 rpc->reply_free(rpc_state->reply); 414 if (rpc->reply_complete(rpc_state->reply) == -1) { 415 /* the reply was not completely filled in. error out */ 424 /* serialize the reply */ 425 rpc->reply_marshal(rpc_state->rpc_data, rpc_state->reply); 470 return req->reply; 823 evrpc_make_request_ctx( struct evrpc_pool *pool, void *request, void *reply, const char *rpcname, void (*req_marshal)(struct evbuffer*, void *), void (*rpl_clear)(void *), int (*rpl_unmarshal)(void *, struct evbuffer *), void (*cb)(struct evrpc_status *, void *, void *, void *), void *cbarg) argument 1079 evrpc_send_request_generic(struct evrpc_pool *pool, void *request, void *reply, void (*cb)(struct evrpc_status *, void *, void *, void *), void *cb_arg, const char *rpcname, void (*req_marshal)(struct evbuffer *, void *), void (*rpl_clear)(void *), int (*rpl_unmarshal)(void *, struct evbuffer *)) argument 1165 evrpc_request_set_cb(struct evrpc_request_wrapper *ctx, void (*cb)(struct evrpc_status*, void *request, void *reply, void *arg), void *cb_arg) argument [all...] |
/freebsd-current/contrib/wpa/wpa_supplicant/ |
H A D | ctrl_iface_named_pipe.c | 282 char *reply = NULL, *send_buf; local 306 reply = wpa_supplicant_ctrl_iface_process(wpa_s, buf, 310 if (reply) { 311 send_buf = reply; 325 os_free(reply); 328 os_free(reply); 720 char *reply = NULL, *send_buf; local 729 reply = wpa_supplicant_global_ctrl_iface_process(global, buf, 731 if (reply) { 732 send_buf = reply; [all...] |
/freebsd-current/contrib/wpa/src/common/ |
H A D | wpa_ctrl.c | 143 * side (wpa_supplicant or hostapd) can reply to the control interface 482 char *reply, size_t *reply_len, 553 res = recv(ctrl->s, reply, *reply_len, 0); 556 if ((res > 0 && reply[0] == '<') || 557 (res > 6 && strncmp(reply, "IFNAME=", 7) == 0)) { 559 * wpa_supplicant, not the reply to the 567 reply[res] = '\0'; 568 msg_cb(reply, res); 613 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument 617 res = recv(ctrl->s, reply, *reply_le 481 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument 721 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument 739 wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument [all...] |
/freebsd-current/sys/contrib/ncsw/Peripherals/FM/ |
H A D | fm_ncsw.c | 674 t_FmIpcReply reply; local 679 memset(&reply, 0, sizeof(reply)); 690 (uint8_t*)&reply, 698 memcpy((uint8_t*)&p_Fm->partVSPBase, reply.replyBody, sizeof(uint8_t)); 739 t_FmIpcReply reply; local 744 memset(&reply, 0, sizeof(reply)); 755 (uint8_t*)&reply, 1190 t_FmIpcReply reply; local 1425 t_FmIpcReply reply; local 1588 t_FmIpcReply reply; local 1716 t_FmIpcReply reply; local 1964 t_FmIpcReply reply; local 2273 t_FmIpcReply reply; local 2323 t_FmIpcReply reply; local 2381 t_FmIpcReply reply; local 2503 t_FmIpcReply reply; local 2607 t_FmIpcReply reply; local 2703 t_FmIpcReply reply; local 2789 t_FmIpcReply reply; local 3058 t_FmIpcReply reply; local 4699 t_FmIpcReply reply; local 4759 t_FmIpcReply reply; local 4889 t_FmIpcReply reply; local [all...] |