/freebsd-10.0-release/contrib/pam_modules/pam_passwdqc/ |
H A D | pam_macros.h | 16 #define _pam_drop_reply(/* struct pam_response * */ reply, /* int */ replies) \ 21 if ((reply)[i].resp) { \ 22 _pam_overwrite((reply)[i].resp); \ 23 free((reply)[i].resp); \ 25 if ((reply)) free((reply)); \
|
/freebsd-10.0-release/crypto/heimdal/lib/kadm5/ |
H A D | delete_c.c | 46 krb5_data reply; local 63 ret = _kadm5_client_recv(context, &reply); 66 sp = krb5_storage_from_data (&reply); 69 krb5_data_free (&reply); 75 krb5_data_free (&reply);
|
H A D | modify_c.c | 48 krb5_data reply; local 66 ret = _kadm5_client_recv(context, &reply); 69 sp = krb5_storage_from_data (&reply); 72 krb5_data_free (&reply); 78 krb5_data_free (&reply);
|
H A D | privs_c.c | 46 krb5_data reply; local 64 ret = _kadm5_client_recv(context, &reply); 67 sp = krb5_storage_from_data(&reply); 70 krb5_data_free (&reply); 80 krb5_data_free (&reply);
|
H A D | rename_c.c | 48 krb5_data reply; local 64 ret = _kadm5_client_recv(context, &reply); 67 sp = krb5_storage_from_data (&reply); 69 krb5_data_free (&reply); 75 krb5_data_free (&reply);
|
H A D | chpass_c.c | 48 krb5_data reply; local 66 ret = _kadm5_client_recv(context, &reply); 69 sp = krb5_storage_from_data (&reply); 72 krb5_data_free (&reply); 78 krb5_data_free (&reply); 93 krb5_data reply; local 114 ret = _kadm5_client_recv(context, &reply); 117 sp = krb5_storage_from_data (&reply); 120 krb5_data_free (&reply); 126 krb5_data_free (&reply); [all...] |
H A D | create_c.c | 49 krb5_data reply; local 68 ret = _kadm5_client_recv(context, &reply); 71 sp = krb5_storage_from_data (&reply); 74 krb5_data_free (&reply); 80 krb5_data_free (&reply);
|
H A D | get_c.c | 49 krb5_data reply; local 67 ret = _kadm5_client_recv(context, &reply); 70 sp = krb5_storage_from_data (&reply); 73 krb5_data_free (&reply); 82 krb5_data_free (&reply);
|
H A D | get_princs_c.c | 49 krb5_data reply; local 66 ret = _kadm5_client_recv(context, &reply); 69 sp = krb5_storage_from_data (&reply); 71 krb5_data_free (&reply); 90 krb5_data_free (&reply);
|
H A D | randkey_c.c | 49 krb5_data reply; local 66 ret = _kadm5_client_recv(context, &reply); 69 sp = krb5_storage_from_data(&reply); 72 krb5_data_free (&reply); 95 krb5_data_free (&reply);
|
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | prompter_posix.c | 54 if(UI_UTIL_read_pw_string(prompts[i].reply->data, 55 prompts[i].reply->length, 60 char *s = prompts[i].reply->data; 64 if(fgets(prompts[i].reply->data, 65 prompts[i].reply->length,
|
H A D | mk_error.c | 45 krb5_data *reply) 86 ASN1_MALLOC_ENCODE(KRB_ERROR, reply->data, reply->length, &msg, &len, ret); 91 if(reply->length != len) 37 krb5_mk_error(krb5_context context, krb5_error_code error_code, const char *e_text, const krb5_data *e_data, const krb5_principal client, const krb5_principal server, time_t *client_time, int *client_usec, krb5_data *reply) argument
|
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers_wps.c | 36 DBusMessage **reply) 46 *reply = wpas_dbus_error_invalid_args(message, 57 *reply = wpas_dbus_error_invalid_args(message, val); 67 DBusMessage **reply) 77 *reply = wpas_dbus_error_invalid_args(message, 89 *reply = wpas_dbus_error_invalid_args(message, val); 99 DBusMessage **reply) 110 *reply = wpas_dbus_error_invalid_args( 119 *reply = wpas_dbus_error_invalid_args(message, 130 DBusMessage **reply) 33 wpas_dbus_handler_wps_role(DBusMessage *message, DBusMessageIter *entry_iter, struct wps_start_params *params, DBusMessage **reply) argument 64 wpas_dbus_handler_wps_type(DBusMessage *message, DBusMessageIter *entry_iter, struct wps_start_params *params, DBusMessage **reply) argument 96 wpas_dbus_handler_wps_bssid(DBusMessage *message, DBusMessageIter *entry_iter, struct wps_start_params *params, DBusMessage **reply) argument 127 wpas_dbus_handler_wps_pin(DBusMessage *message, DBusMessageIter *entry_iter, struct wps_start_params *params, DBusMessage **reply) argument 149 wpas_dbus_handler_wps_p2p_dev_addr(DBusMessage *message, DBusMessageIter *entry_iter, struct wps_start_params *params, DBusMessage **reply) argument 183 wpas_dbus_handler_wps_start_entry(DBusMessage *message, char *key, DBusMessageIter *entry_iter, struct wps_start_params *params, DBusMessage **reply) argument 226 DBusMessage *reply = NULL; local [all...] |
H A D | dbus_old_handlers.c | 42 DBusMessage *reply; local 44 reply = dbus_message_new_error(message, WPAS_ERROR_INVALID_OPTS, 48 dbus_message_append_args(reply, DBUS_TYPE_STRING, &arg, 51 return reply; 56 * wpas_dbus_new_success_reply - Return a new success reply message 57 * @message: Pointer to incoming dbus message this reply refers to 61 * Convenience function to create and return a success reply message 65 DBusMessage *reply; local 68 reply = dbus_message_new_method_return(message); 69 dbus_message_append_args(reply, DBUS_TYPE_UINT3 94 DBusMessage *reply = NULL; local 211 DBusMessage *reply = NULL; local 253 DBusMessage *reply = NULL; local 295 DBusMessage *reply = NULL; local 353 DBusMessage *reply = NULL; local 401 DBusMessage *reply; local 495 DBusMessage *reply = NULL; local 783 DBusMessage *reply = NULL; local 825 DBusMessage *reply = NULL; local 913 DBusMessage *reply = NULL; local 1067 DBusMessage *reply = NULL; local 1157 DBusMessage *reply = NULL; local 1262 DBusMessage *reply = NULL; local 1287 DBusMessage *reply = NULL; local 1315 DBusMessage *reply = NULL; local [all...] |
H A D | dbus_old.c | 134 * Returns: a reply dbus message, or a dbus error message 142 DBusMessage *reply = NULL; local 151 reply = wpas_dbus_iface_set_network(message, wpa_s, ssid); 153 reply = wpas_dbus_iface_enable_network(message, wpa_s, ssid); 155 reply = wpas_dbus_iface_disable_network(message, wpa_s, ssid); 157 return reply; 166 * Returns: a reply dbus message, or a dbus error message 213 DBusMessage *reply = NULL; local 222 reply = wpas_dbus_new_invalid_iface_error(message); 231 reply 321 DBusMessage *reply = NULL; local [all...] |
H A D | dbus_old_handlers_wps.c | 71 DBusMessage *reply = NULL; local 103 reply = dbus_message_new_method_return(message); 104 if (reply == NULL) 108 dbus_message_append_args(reply, DBUS_TYPE_STRING, &pin, 113 dbus_message_append_args(reply, DBUS_TYPE_STRING, &npin, 116 return reply;
|
/freebsd-10.0-release/sys/dev/pst/ |
H A D | pst-iop.c | 53 struct i2o_single_reply *reply; member in struct:iop_request 122 struct i2o_get_param_reply *reply; local 131 if ((reply = iop_get_util_params(sc, sc->lct[i].local_tid, 135 (struct i2o_device_identity *)reply->result; 140 contigfree(reply, PAGE_SIZE, M_PSTIOP); 170 struct i2o_single_reply *reply; local 180 reply = (struct i2o_single_reply *)(sc->obase + (mfa - sc->phys_obase)); 182 /* if this is an event register reply, shout! */ 183 if (reply->function == I2O_UTIL_EVENT_REGISTER) { 185 (struct i2o_util_event_reply_message *)reply; 208 volatile u_int32_t reply = 0; local 241 volatile u_int32_t reply = 0; local 296 struct i2o_get_lct_reply *reply; local 341 struct i2o_get_param_reply *reply; local 416 iop_done(struct iop_softc *sc, u_int32_t mfa, struct i2o_single_reply *reply) argument 429 struct i2o_single_reply *reply; local [all...] |
/freebsd-10.0-release/contrib/telnet/libtelnet/ |
H A D | auth.h | 72 void (*reply)(struct XauthP *, unsigned char *, int); member in struct:XauthP
|
/freebsd-10.0-release/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | auth.h | 73 void (*reply) (struct XauthP *, unsigned char *, int); member in struct:XauthP
|
/freebsd-10.0-release/sys/dev/mps/ |
H A D | mps_config.c | 62 * @mpi_reply: reply mf payload returned from firmware 73 MPI2_CONFIG_REPLY *reply; local 97 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; 98 if (error || (reply == NULL)) { 109 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; 110 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); 122 /* We have to do free and alloc for the reply-free and reply-post 123 * counters to match - Need to review the reply FIFO handling. 155 reply 202 MPI2_CONFIG_REPLY *reply; local 560 MPI2_CONFIG_REPLY *reply; local 696 MPI2_CONFIG_REPLY *reply; local 834 MPI2_CONFIG_REPLY *reply; local 967 MPI2_CONFIG_REPLY *reply; local 1097 MPI2_CONFIG_REPLY *reply; local 1226 MPI2_CONFIG_REPLY *reply; local 1383 MPI2_CONFIG_REPLY *reply; local [all...] |
/freebsd-10.0-release/crypto/heimdal/kdc/ |
H A D | process.c | 54 krb5_data *reply, 71 reply, from, addr, datagram_reply); 81 krb5_data *reply, 97 ret = _kdc_tgs_rep(context, config, &req, reply, 109 krb5_data *reply, 126 ret = _kdc_do_digest(context, config, &digestreq, reply, from, addr); 139 krb5_data *reply, 156 ret = _kdc_do_kx509(context, config, &kx509req, reply, from, addr); 178 * sending a reply in `reply' 51 kdc_as_req(krb5_context context, krb5_kdc_configuration *config, krb5_data *req_buffer, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply, int *claim) argument 78 kdc_tgs_req(krb5_context context, krb5_kdc_configuration *config, krb5_data *req_buffer, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply, int *claim) argument 106 kdc_digest(krb5_context context, krb5_kdc_configuration *config, krb5_data *req_buffer, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply, int *claim) argument 136 kdc_kx509(krb5_context context, krb5_kdc_configuration *config, krb5_data *req_buffer, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply, int *claim) argument 182 krb5_kdc_process_request(krb5_context context, krb5_kdc_configuration *config, unsigned char *buf, size_t len, krb5_data *reply, krb5_boolean *prependlength, const char *from, struct sockaddr *addr, int datagram_reply) argument 222 krb5_kdc_process_krb5_request(krb5_context context, krb5_kdc_configuration *config, unsigned char *buf, size_t len, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply) argument 257 krb5_kdc_save_request(krb5_context context, const char *fn, const unsigned char *buf, size_t len, const krb5_data *reply, const struct sockaddr *sa) argument [all...] |
/freebsd-10.0-release/contrib/lukemftpd/src/ |
H A D | ftpcmd.y | 229 reply(-221, "%s", ""); 230 reply(0, 234 reply(0, 239 reply(221, 274 reply(500, "IPv6 support not available."); 293 reply(500, "PASV mode not available."); 302 reply(501, 307 reply(500, "LPSV mode not available."); 318 reply(500, "EPSV mode not available."); 326 reply(20 [all...] |
/freebsd-10.0-release/contrib/wpa/src/radius/ |
H A D | radius_das.c | 41 struct radius_msg *reply; local 124 reply = radius_msg_new(error ? RADIUS_CODE_DISCONNECT_NAK : 126 if (reply == NULL) 130 if (!radius_msg_add_attr_int32(reply, RADIUS_ATTR_ERROR_CAUSE, 132 radius_msg_free(reply); 137 return reply; 156 struct radius_msg *msg, *reply = NULL; local 221 reply = radius_das_disconnect(das, msg, abuf, from_port); 225 reply = radius_msg_new(RADIUS_CODE_COA_NAK, 227 if (reply [all...] |
/freebsd-10.0-release/crypto/heimdal/appl/ftp/ftpd/ |
H A D | ftpcmd.y | 164 reply(500, "Illegal PORT range rejected."); 171 reply(200, "PORT command successful."); 204 reply(200, "Type set to A."); 208 reply(504, "Form must be N."); 212 reply(504, "Type E not implemented."); 216 reply(200, "Type set to I."); 223 reply(200, 227 reply(504, "Byte size must be 8."); 240 reply(200, "STRU F ok."); 244 reply(50 [all...] |
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/ |
H A D | ctrl_iface_udp.c | 130 char *reply; local 131 reply = os_malloc(7 + 2 * COOKIE_LEN + 1); 132 if (reply == NULL) { 137 os_memcpy(reply, "COOKIE=", 7); 138 wpa_snprintf_hex(reply + 7, 2 * COOKIE_LEN + 1, 142 return reply; 155 char *reply = NULL; local 184 reply = wpa_supplicant_ctrl_iface_get_cookie(priv, &reply_len); 236 reply = wpa_supplicant_ctrl_iface_process(wpa_s, pos, 241 if (reply) { 427 char *reply; local 452 char *reply; local [all...] |