Searched refs:reply (Results 51 - 75 of 221) sorted by relevance

123456789

/freebsd-current/crypto/heimdal/lib/kadm5/
H A Dsend_recv.c78 _kadm5_client_recv(kadm5_client_context *context, krb5_data *reply) argument
97 ret = krb5_rd_priv(context->context, context->ac, &data, reply, NULL);
/freebsd-current/crypto/heimdal/appl/ftp/ftpd/
H A Dsecurity.c441 reply(431, "Unable to accept %s at this time", mech->name);
447 reply(431, "Unable to accept %s at this time", mech->name);
455 reply(334, "Send authorization data.");
457 reply(234, "Authorization complete.");
463 reply(504, "%s is unknown to me", auth_name);
476 reply(503, "You must %sissue an AUTH first.", mech ? "re-" : "");
483 reply(503, "Incomplete security data exchange.");
490 reply(200, "PBSZ=%lu", (unsigned long)new);
492 reply(200, "OK");
501 reply(50
[all...]
/freebsd-current/crypto/heimdal/appl/ftp/ftp/
H A Dsecurity.c441 reply(431, "Unable to accept %s at this time", mech->name);
447 reply(431, "Unable to accept %s at this time", mech->name);
455 reply(334, "Send authorization data.");
457 reply(234, "Authorization complete.");
463 reply(504, "%s is unknown to me", auth_name);
476 reply(503, "You must %sissue an AUTH first.", mech ? "re-" : "");
483 reply(503, "Incomplete security data exchange.");
490 reply(200, "PBSZ=%lu", (unsigned long)new);
492 reply(200, "OK");
501 reply(50
[all...]
/freebsd-current/crypto/heimdal/lib/hx509/
H A Dlock.c187 if(UI_UTIL_read_pw_string(prompter->reply.data,
188 prompter->reply.length,
193 char *s = prompter->reply.data;
197 if(fgets(prompter->reply.data,
198 prompter->reply.length,
/freebsd-current/contrib/wpa/wpa_supplicant/dbus/
H A Ddbus_new_handlers_p2p.c109 DBusMessage *reply = NULL; local
173 reply = wpas_dbus_error_no_p2p_mgmt_iface(message);
179 reply = wpas_dbus_error_unknown_error(
183 return reply;
188 reply = wpas_dbus_error_invalid_args(message, entry.key);
191 return reply;
352 DBusMessage *reply = NULL; local
391 reply = wpas_dbus_error_no_p2p_mgmt_iface(message);
409 reply =
417 reply
492 DBusMessage *reply = NULL; local
549 DBusMessage *reply = NULL; local
569 DBusMessage *reply = NULL; local
737 DBusMessage *reply = NULL; local
2129 DBusMessage *reply = NULL; local
2215 DBusMessage *reply = NULL; local
2665 DBusMessage *reply = NULL; local
2750 DBusMessage *reply = NULL; local
2838 DBusMessage *reply = NULL; local
2932 DBusMessage *reply = NULL; local
[all...]
H A Ddbus_new_introspect.c257 DBusMessage *reply; local
276 reply = dbus_message_new_method_return(message);
277 if (reply) {
280 dbus_message_append_args(reply, DBUS_TYPE_STRING, &intro_str,
285 return reply;
/freebsd-current/contrib/sendmail/contrib/
H A Dsmcontrol.pl68 # reply from sendmail daemon
76 my @reply;
97 @reply = <SOCK>;
99 return join '', @reply;
/freebsd-current/tests/sys/netpfil/pf/
H A Dsyncookie.sh68 reply=$(echo foo | nc -N -w 5 192.0.2.1 7)
69 if [ "${reply}" != "foo" ];
117 reply=$(echo foo | nc -N -w 5 2001:db8::1 7)
118 if [ "${reply}" != "foo" ];
175 reply=$(echo foo | nc -N -w 5 198.51.100.2 7)
176 if [ "${reply}" != "foo" ];
226 reply=$(echo foo | nc -N -w 5 2001:db8:1::2 7)
227 if [ "${reply}" != "foo" ];
458 reply=$(echo foo | nc -p 1234 -N -w 5 192.0.2.1 7)
459 if [ "${reply}" !
[all...]
/freebsd-current/sys/dev/pst/
H A Dpst-raid.c117 struct i2o_get_param_reply *reply; local
122 if (!(reply = iop_get_util_params(psc->iop, psc->lct->local_tid,
129 contigfree(reply, PAGE_SIZE, M_PSTIOP);
132 bcopy(reply->result, psc->info, sizeof(struct i2o_bsa_device));
133 contigfree(reply, PAGE_SIZE, M_PSTIOP);
135 if (!(reply = iop_get_util_params(psc->iop, psc->lct->local_tid,
139 ident = (struct i2o_device_identity *)reply->result;
151 contigfree(reply, PAGE_SIZE, M_PSTIOP);
251 pst_done(struct iop_softc *sc, u_int32_t mfa, struct i2o_single_reply *reply) argument
254 (struct pst_request *)reply
[all...]
/freebsd-current/crypto/heimdal/kdc/
H A Dkdc.h104 krb5_data *reply,
H A Dconnect.c403 krb5_data *reply)
406 "sending %lu bytes to %s", (unsigned long)reply->length,
410 l[0] = (reply->length >> 24) & 0xff;
411 l[1] = (reply->length >> 16) & 0xff;
412 l[2] = (reply->length >> 8) & 0xff;
413 l[3] = reply->length & 0xff;
421 if(rk_IS_SOCKET_ERROR(sendto(d->s, reply->data, reply->length, 0, d->sa, d->sock_len))) {
439 krb5_data reply; local
444 krb5_data_zero(&reply);
399 send_reply(krb5_context context, krb5_kdc_configuration *config, krb5_boolean prependlength, struct descr *d, krb5_data *reply) argument
811 krb5_data reply; local
[all...]
/freebsd-current/crypto/heimdal/lib/ipc/
H A Dhi_locl.h71 typedef boolean_t (*dispatch_mig_callback_t)(mach_msg_header_t *message, mach_msg_header_t *reply);
/freebsd-current/sbin/fsdb/
H A Dfsdb.h35 extern int reply(const char *question);
/freebsd-current/sys/nfs/
H A Dbootp_subr.c129 struct bootp_packet reply; member in struct:bootpc_ifcontext
183 struct bootp_packet reply; member in struct:bootpc_globalcontext
397 (void) bootpc_tag(&gctx->tmptag, &gctx->reply,
405 p = bootpc_tag(&gctx->tmptag, &gctx->reply,
434 (bootpc_tag(&gctx->tmptag, &ifctx->reply,
437 bootpc_tag(&gctx->tmptag, &gctx->reply,
442 bcopy(&gctx->reply, &ifctx->reply, gctx->replylen);
460 p = bootpc_tag(&gctx->tmptag, &ifctx->reply,
470 ifctx->gotrootpath = (bootpc_tag(&gctx->tmptag, &ifctx->reply,
[all...]
/freebsd-current/contrib/wpa/src/wps/
H A Dwps_upnp_web.c424 struct wpabuf **reply, const char **replyname)
458 *reply = wps_get_msg(peer->wps, &op_code);
459 if (*reply == NULL) {
464 *reply = NULL;
465 if (*reply == NULL) {
490 struct wpabuf **reply, const char **replyname)
559 *reply = NULL;
563 *reply = wps_get_msg(peer->wps, &op_code);
566 if (*reply == NULL)
575 struct wpabuf **reply, cons
423 web_process_get_device_info(struct upnp_wps_device_sm *sm, struct wpabuf **reply, const char **replyname) argument
489 web_process_put_message(struct upnp_wps_device_sm *sm, char *data, struct wpabuf **reply, const char **replyname) argument
574 web_process_put_wlan_response(struct upnp_wps_device_sm *sm, char *data, struct wpabuf **reply, const char **replyname) argument
699 web_process_set_selected_registrar(struct upnp_wps_device_sm *sm, struct sockaddr_in *cli, char *data, struct wpabuf **reply, const char **replyname) argument
755 web_connection_send_reply(struct http_request *req, enum http_reply_code ret, const char *action, int action_len, const struct wpabuf *reply, const char *replyname) argument
928 struct wpabuf *reply = NULL; /* data for the reply */ local
[all...]
/freebsd-current/contrib/ntp/scripts/monitoring/
H A Dntploopstat110 $timeout = 12.0 unless defined($timeout); # wait $timeout seconds for reply
264 ;# get reply
285 &msg("Waiting for reply...\n");
306 &msg("Receiving reply...\n");
309 $reply = ""; # just make it defined for -w
310 $ret = recv(S,$reply,$len,0);
340 = unpack($loopinfo_response_fmt,$reply);
342 ;# check reply
345 die("$0: got error reply ".($s1>>12)."\n");
350 $b4 != $REQ_LOOP_INFO || # Ehh.. not loopinfo reply
[all...]
/freebsd-current/contrib/telnet/libtelnet/
H A Dsra.c483 struct pam_response *reply = local
486 if (reply == NULL)
492 reply[i].resp_retcode = PAM_SUCCESS;
493 reply[i].resp = COPY_STRING(cred->uname);
497 reply[i].resp_retcode = PAM_SUCCESS;
498 reply[i].resp = COPY_STRING(cred->pass);
503 reply[i].resp_retcode = PAM_SUCCESS;
504 reply[i].resp = NULL;
507 free(reply);
512 *resp = reply;
[all...]
/freebsd-current/crypto/openssh/
H A Dmux.c268 Channel *c, struct sshbuf *m, struct sshbuf *reply)
309 /* Enqueue a "ok" response to the reply buffer */
311 reply_ok(struct sshbuf *reply, u_int rid) argument
315 if ((r = sshbuf_put_u32(reply, MUX_S_OK)) != 0 ||
316 (r = sshbuf_put_u32(reply, rid)) != 0)
317 fatal_fr(r, "reply");
320 /* Enqueue an error response to the reply buffer */
322 reply_error(struct sshbuf *reply, u_int type, u_int rid, const char *msg) argument
326 if ((r = sshbuf_put_u32(reply, type)) != 0 ||
327 (r = sshbuf_put_u32(reply, ri
267 mux_master_process_hello(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument
333 mux_master_process_new_session(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument
490 mux_master_process_alive_check(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument
507 mux_master_process_terminate(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument
683 mux_master_process_open_fwd(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument
848 mux_master_process_close_fwd(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument
960 mux_master_process_stdio_fwd(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument
1061 struct sshbuf *reply; local
1103 mux_master_process_stop_listening(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument
1133 mux_master_process_proxy(struct ssh *ssh, u_int rid, Channel *c, struct sshbuf *m, struct sshbuf *reply) argument
1362 struct sshbuf *reply; local
[all...]
/freebsd-current/contrib/wpa/hostapd/
H A Dctrl_iface.c261 char *cmd, char *reply,
279 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf),
281 reply[res++] = '\n';
282 reply[res] = '\0';
291 char *reply, size_t max_len,
301 res = wpa_snprintf_hex_uppercase(reply, max_len, wpabuf_head(buf),
303 reply[res++] = '\n';
304 reply[res] = '\0';
313 char *cmd, char *reply,
317 return hostapd_ctrl_iface_wps_nfc_token_gen(hapd, reply,
260 hostapd_ctrl_iface_wps_nfc_config_token(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument
290 hostapd_ctrl_iface_wps_nfc_token_gen(struct hostapd_data *hapd, char *reply, size_t max_len, int ndef) argument
312 hostapd_ctrl_iface_wps_nfc_token(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument
336 hostapd_ctrl_iface_nfc_get_handover_sel(struct hostapd_data *hapd, char *cmd, char *reply, size_t max_len) argument
2856 hostapd_ctrl_iface_mib(struct hostapd_data *hapd, char *reply, int reply_size, const char *param) argument
2877 struct wpabuf *reply; local
3134 hostapd_ctrl_iface_req_beacon(struct hostapd_data *hapd, const char *cmd, char *reply, size_t reply_size) argument
3503 hostapd_ctrl_iface_receive_process(struct hostapd_data *hapd, char *buf, char *reply, int reply_size, struct sockaddr_storage *from, socklen_t fromlen) argument
4041 char *reply, *pos = buf; local
4653 hostapd_global_ctrl_iface_interfaces(struct hapd_interfaces *interfaces, const char *input, char *reply, int reply_size) argument
4742 hostapd_global_ctrl_iface_ifname(struct hapd_interfaces *interfaces, const char *ifname, char *buf, char *reply, int reply_size, struct sockaddr_storage *from, socklen_t fromlen) argument
4774 char *reply; local
[all...]
/freebsd-current/contrib/libfido2/src/
H A Dnetlink.c512 uint8_t reply[512]; local
527 if ((r = nlmsg_rx(fd, reply, sizeof(reply), -1)) < 0) {
531 if ((ok = nl_parse_reply(reply, (size_t)r, GENL_ID_CTRL,
568 uint8_t reply[512]; local
580 if ((r = nlmsg_rx(nl->fd, reply, sizeof(reply), -1)) < 0) {
584 if ((ok = nl_parse_reply(reply, (size_t)r, nl->nfc_type,
597 uint8_t reply[512]; local
610 if ((r = nlmsg_rx(nl->fd, reply, sizeo
628 uint8_t reply[512]; local
684 uint8_t reply[512]; local
[all...]
/freebsd-current/contrib/ntp/sntp/libevent/
H A Devrpc.c363 /* at this point, we have a well formed request, prepare the reply */
365 rpc_state->reply = rpc->reply_new(rpc->reply_new_arg);
366 if (rpc_state->reply == NULL)
393 if (rpc_state->reply != NULL)
394 rpc->reply_free(rpc_state->reply);
414 if (rpc->reply_complete(rpc_state->reply) == -1) {
415 /* the reply was not completely filled in. error out */
424 /* serialize the reply */
425 rpc->reply_marshal(rpc_state->rpc_data, rpc_state->reply);
470 return req->reply;
823 evrpc_make_request_ctx( struct evrpc_pool *pool, void *request, void *reply, const char *rpcname, void (*req_marshal)(struct evbuffer*, void *), void (*rpl_clear)(void *), int (*rpl_unmarshal)(void *, struct evbuffer *), void (*cb)(struct evrpc_status *, void *, void *, void *), void *cbarg) argument
1079 evrpc_send_request_generic(struct evrpc_pool *pool, void *request, void *reply, void (*cb)(struct evrpc_status *, void *, void *, void *), void *cb_arg, const char *rpcname, void (*req_marshal)(struct evbuffer *, void *), void (*rpl_clear)(void *), int (*rpl_unmarshal)(void *, struct evbuffer *)) argument
1165 evrpc_request_set_cb(struct evrpc_request_wrapper *ctx, void (*cb)(struct evrpc_status*, void *request, void *reply, void *arg), void *cb_arg) argument
[all...]
/freebsd-current/contrib/libevent/
H A Devrpc.c363 /* at this point, we have a well formed request, prepare the reply */
365 rpc_state->reply = rpc->reply_new(rpc->reply_new_arg);
366 if (rpc_state->reply == NULL)
393 if (rpc_state->reply != NULL)
394 rpc->reply_free(rpc_state->reply);
414 if (rpc->reply_complete(rpc_state->reply) == -1) {
415 /* the reply was not completely filled in. error out */
424 /* serialize the reply */
425 rpc->reply_marshal(rpc_state->rpc_data, rpc_state->reply);
470 return req->reply;
823 evrpc_make_request_ctx( struct evrpc_pool *pool, void *request, void *reply, const char *rpcname, void (*req_marshal)(struct evbuffer*, void *), void (*rpl_clear)(void *), int (*rpl_unmarshal)(void *, struct evbuffer *), void (*cb)(struct evrpc_status *, void *, void *, void *), void *cbarg) argument
1079 evrpc_send_request_generic(struct evrpc_pool *pool, void *request, void *reply, void (*cb)(struct evrpc_status *, void *, void *, void *), void *cb_arg, const char *rpcname, void (*req_marshal)(struct evbuffer *, void *), void (*rpl_clear)(void *), int (*rpl_unmarshal)(void *, struct evbuffer *)) argument
1165 evrpc_request_set_cb(struct evrpc_request_wrapper *ctx, void (*cb)(struct evrpc_status*, void *request, void *reply, void *arg), void *cb_arg) argument
[all...]
/freebsd-current/contrib/wpa/wpa_supplicant/
H A Dctrl_iface_named_pipe.c282 char *reply = NULL, *send_buf; local
306 reply = wpa_supplicant_ctrl_iface_process(wpa_s, buf,
310 if (reply) {
311 send_buf = reply;
325 os_free(reply);
328 os_free(reply);
720 char *reply = NULL, *send_buf; local
729 reply = wpa_supplicant_global_ctrl_iface_process(global, buf,
731 if (reply) {
732 send_buf = reply;
[all...]
/freebsd-current/contrib/wpa/src/common/
H A Dwpa_ctrl.c143 * side (wpa_supplicant or hostapd) can reply to the control interface
482 char *reply, size_t *reply_len,
553 res = recv(ctrl->s, reply, *reply_len, 0);
556 if ((res > 0 && reply[0] == '<') ||
557 (res > 6 && strncmp(reply, "IFNAME=", 7) == 0)) {
559 * wpa_supplicant, not the reply to the
567 reply[res] = '\0';
568 msg_cb(reply, res);
613 int wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument
617 res = recv(ctrl->s, reply, *reply_le
481 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument
721 wpa_ctrl_request(struct wpa_ctrl *ctrl, const char *cmd, size_t cmd_len, char *reply, size_t *reply_len, void (*msg_cb)(char *msg, size_t len)) argument
739 wpa_ctrl_recv(struct wpa_ctrl *ctrl, char *reply, size_t *reply_len) argument
[all...]
/freebsd-current/sys/contrib/ncsw/Peripherals/FM/
H A Dfm_ncsw.c674 t_FmIpcReply reply; local
679 memset(&reply, 0, sizeof(reply));
690 (uint8_t*)&reply,
698 memcpy((uint8_t*)&p_Fm->partVSPBase, reply.replyBody, sizeof(uint8_t));
739 t_FmIpcReply reply; local
744 memset(&reply, 0, sizeof(reply));
755 (uint8_t*)&reply,
1190 t_FmIpcReply reply; local
1425 t_FmIpcReply reply; local
1588 t_FmIpcReply reply; local
1716 t_FmIpcReply reply; local
1964 t_FmIpcReply reply; local
2273 t_FmIpcReply reply; local
2323 t_FmIpcReply reply; local
2381 t_FmIpcReply reply; local
2503 t_FmIpcReply reply; local
2607 t_FmIpcReply reply; local
2703 t_FmIpcReply reply; local
2789 t_FmIpcReply reply; local
3058 t_FmIpcReply reply; local
4699 t_FmIpcReply reply; local
4759 t_FmIpcReply reply; local
4889 t_FmIpcReply reply; local
[all...]

Completed in 211 milliseconds

123456789