Searched refs:reply (Results 1 - 25 of 204) sorted by relevance

123456789

/freebsd-10.0-release/contrib/pam_modules/pam_passwdqc/
H A Dpam_macros.h16 #define _pam_drop_reply(/* struct pam_response * */ reply, /* int */ replies) \
21 if ((reply)[i].resp) { \
22 _pam_overwrite((reply)[i].resp); \
23 free((reply)[i].resp); \
25 if ((reply)) free((reply)); \
/freebsd-10.0-release/crypto/heimdal/lib/kadm5/
H A Ddelete_c.c46 krb5_data reply; local
63 ret = _kadm5_client_recv(context, &reply);
66 sp = krb5_storage_from_data (&reply);
69 krb5_data_free (&reply);
75 krb5_data_free (&reply);
H A Dmodify_c.c48 krb5_data reply; local
66 ret = _kadm5_client_recv(context, &reply);
69 sp = krb5_storage_from_data (&reply);
72 krb5_data_free (&reply);
78 krb5_data_free (&reply);
H A Dprivs_c.c46 krb5_data reply; local
64 ret = _kadm5_client_recv(context, &reply);
67 sp = krb5_storage_from_data(&reply);
70 krb5_data_free (&reply);
80 krb5_data_free (&reply);
H A Drename_c.c48 krb5_data reply; local
64 ret = _kadm5_client_recv(context, &reply);
67 sp = krb5_storage_from_data (&reply);
69 krb5_data_free (&reply);
75 krb5_data_free (&reply);
H A Dchpass_c.c48 krb5_data reply; local
66 ret = _kadm5_client_recv(context, &reply);
69 sp = krb5_storage_from_data (&reply);
72 krb5_data_free (&reply);
78 krb5_data_free (&reply);
93 krb5_data reply; local
114 ret = _kadm5_client_recv(context, &reply);
117 sp = krb5_storage_from_data (&reply);
120 krb5_data_free (&reply);
126 krb5_data_free (&reply);
[all...]
H A Dcreate_c.c49 krb5_data reply; local
68 ret = _kadm5_client_recv(context, &reply);
71 sp = krb5_storage_from_data (&reply);
74 krb5_data_free (&reply);
80 krb5_data_free (&reply);
H A Dget_c.c49 krb5_data reply; local
67 ret = _kadm5_client_recv(context, &reply);
70 sp = krb5_storage_from_data (&reply);
73 krb5_data_free (&reply);
82 krb5_data_free (&reply);
H A Dget_princs_c.c49 krb5_data reply; local
66 ret = _kadm5_client_recv(context, &reply);
69 sp = krb5_storage_from_data (&reply);
71 krb5_data_free (&reply);
90 krb5_data_free (&reply);
H A Drandkey_c.c49 krb5_data reply; local
66 ret = _kadm5_client_recv(context, &reply);
69 sp = krb5_storage_from_data(&reply);
72 krb5_data_free (&reply);
95 krb5_data_free (&reply);
/freebsd-10.0-release/crypto/heimdal/lib/krb5/
H A Dprompter_posix.c54 if(UI_UTIL_read_pw_string(prompts[i].reply->data,
55 prompts[i].reply->length,
60 char *s = prompts[i].reply->data;
64 if(fgets(prompts[i].reply->data,
65 prompts[i].reply->length,
H A Dmk_error.c45 krb5_data *reply)
86 ASN1_MALLOC_ENCODE(KRB_ERROR, reply->data, reply->length, &msg, &len, ret);
91 if(reply->length != len)
37 krb5_mk_error(krb5_context context, krb5_error_code error_code, const char *e_text, const krb5_data *e_data, const krb5_principal client, const krb5_principal server, time_t *client_time, int *client_usec, krb5_data *reply) argument
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/dbus/
H A Ddbus_new_handlers_wps.c36 DBusMessage **reply)
46 *reply = wpas_dbus_error_invalid_args(message,
57 *reply = wpas_dbus_error_invalid_args(message, val);
67 DBusMessage **reply)
77 *reply = wpas_dbus_error_invalid_args(message,
89 *reply = wpas_dbus_error_invalid_args(message, val);
99 DBusMessage **reply)
110 *reply = wpas_dbus_error_invalid_args(
119 *reply = wpas_dbus_error_invalid_args(message,
130 DBusMessage **reply)
33 wpas_dbus_handler_wps_role(DBusMessage *message, DBusMessageIter *entry_iter, struct wps_start_params *params, DBusMessage **reply) argument
64 wpas_dbus_handler_wps_type(DBusMessage *message, DBusMessageIter *entry_iter, struct wps_start_params *params, DBusMessage **reply) argument
96 wpas_dbus_handler_wps_bssid(DBusMessage *message, DBusMessageIter *entry_iter, struct wps_start_params *params, DBusMessage **reply) argument
127 wpas_dbus_handler_wps_pin(DBusMessage *message, DBusMessageIter *entry_iter, struct wps_start_params *params, DBusMessage **reply) argument
149 wpas_dbus_handler_wps_p2p_dev_addr(DBusMessage *message, DBusMessageIter *entry_iter, struct wps_start_params *params, DBusMessage **reply) argument
183 wpas_dbus_handler_wps_start_entry(DBusMessage *message, char *key, DBusMessageIter *entry_iter, struct wps_start_params *params, DBusMessage **reply) argument
226 DBusMessage *reply = NULL; local
[all...]
H A Ddbus_old_handlers.c42 DBusMessage *reply; local
44 reply = dbus_message_new_error(message, WPAS_ERROR_INVALID_OPTS,
48 dbus_message_append_args(reply, DBUS_TYPE_STRING, &arg,
51 return reply;
56 * wpas_dbus_new_success_reply - Return a new success reply message
57 * @message: Pointer to incoming dbus message this reply refers to
61 * Convenience function to create and return a success reply message
65 DBusMessage *reply; local
68 reply = dbus_message_new_method_return(message);
69 dbus_message_append_args(reply, DBUS_TYPE_UINT3
94 DBusMessage *reply = NULL; local
211 DBusMessage *reply = NULL; local
253 DBusMessage *reply = NULL; local
295 DBusMessage *reply = NULL; local
353 DBusMessage *reply = NULL; local
401 DBusMessage *reply; local
495 DBusMessage *reply = NULL; local
783 DBusMessage *reply = NULL; local
825 DBusMessage *reply = NULL; local
913 DBusMessage *reply = NULL; local
1067 DBusMessage *reply = NULL; local
1157 DBusMessage *reply = NULL; local
1262 DBusMessage *reply = NULL; local
1287 DBusMessage *reply = NULL; local
1315 DBusMessage *reply = NULL; local
[all...]
H A Ddbus_old.c134 * Returns: a reply dbus message, or a dbus error message
142 DBusMessage *reply = NULL; local
151 reply = wpas_dbus_iface_set_network(message, wpa_s, ssid);
153 reply = wpas_dbus_iface_enable_network(message, wpa_s, ssid);
155 reply = wpas_dbus_iface_disable_network(message, wpa_s, ssid);
157 return reply;
166 * Returns: a reply dbus message, or a dbus error message
213 DBusMessage *reply = NULL; local
222 reply = wpas_dbus_new_invalid_iface_error(message);
231 reply
321 DBusMessage *reply = NULL; local
[all...]
H A Ddbus_old_handlers_wps.c71 DBusMessage *reply = NULL; local
103 reply = dbus_message_new_method_return(message);
104 if (reply == NULL)
108 dbus_message_append_args(reply, DBUS_TYPE_STRING, &pin,
113 dbus_message_append_args(reply, DBUS_TYPE_STRING, &npin,
116 return reply;
/freebsd-10.0-release/sys/dev/pst/
H A Dpst-iop.c53 struct i2o_single_reply *reply; member in struct:iop_request
122 struct i2o_get_param_reply *reply; local
131 if ((reply = iop_get_util_params(sc, sc->lct[i].local_tid,
135 (struct i2o_device_identity *)reply->result;
140 contigfree(reply, PAGE_SIZE, M_PSTIOP);
170 struct i2o_single_reply *reply; local
180 reply = (struct i2o_single_reply *)(sc->obase + (mfa - sc->phys_obase));
182 /* if this is an event register reply, shout! */
183 if (reply->function == I2O_UTIL_EVENT_REGISTER) {
185 (struct i2o_util_event_reply_message *)reply;
208 volatile u_int32_t reply = 0; local
241 volatile u_int32_t reply = 0; local
296 struct i2o_get_lct_reply *reply; local
341 struct i2o_get_param_reply *reply; local
416 iop_done(struct iop_softc *sc, u_int32_t mfa, struct i2o_single_reply *reply) argument
429 struct i2o_single_reply *reply; local
[all...]
/freebsd-10.0-release/contrib/telnet/libtelnet/
H A Dauth.h72 void (*reply)(struct XauthP *, unsigned char *, int); member in struct:XauthP
/freebsd-10.0-release/crypto/heimdal/appl/telnet/libtelnet/
H A Dauth.h73 void (*reply) (struct XauthP *, unsigned char *, int); member in struct:XauthP
/freebsd-10.0-release/sys/dev/mps/
H A Dmps_config.c62 * @mpi_reply: reply mf payload returned from firmware
73 MPI2_CONFIG_REPLY *reply; local
97 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply;
98 if (error || (reply == NULL)) {
109 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK;
110 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY));
122 /* We have to do free and alloc for the reply-free and reply-post
123 * counters to match - Need to review the reply FIFO handling.
155 reply
202 MPI2_CONFIG_REPLY *reply; local
560 MPI2_CONFIG_REPLY *reply; local
696 MPI2_CONFIG_REPLY *reply; local
834 MPI2_CONFIG_REPLY *reply; local
967 MPI2_CONFIG_REPLY *reply; local
1097 MPI2_CONFIG_REPLY *reply; local
1226 MPI2_CONFIG_REPLY *reply; local
1383 MPI2_CONFIG_REPLY *reply; local
[all...]
/freebsd-10.0-release/crypto/heimdal/kdc/
H A Dprocess.c54 krb5_data *reply,
71 reply, from, addr, datagram_reply);
81 krb5_data *reply,
97 ret = _kdc_tgs_rep(context, config, &req, reply,
109 krb5_data *reply,
126 ret = _kdc_do_digest(context, config, &digestreq, reply, from, addr);
139 krb5_data *reply,
156 ret = _kdc_do_kx509(context, config, &kx509req, reply, from, addr);
178 * sending a reply in `reply'
51 kdc_as_req(krb5_context context, krb5_kdc_configuration *config, krb5_data *req_buffer, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply, int *claim) argument
78 kdc_tgs_req(krb5_context context, krb5_kdc_configuration *config, krb5_data *req_buffer, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply, int *claim) argument
106 kdc_digest(krb5_context context, krb5_kdc_configuration *config, krb5_data *req_buffer, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply, int *claim) argument
136 kdc_kx509(krb5_context context, krb5_kdc_configuration *config, krb5_data *req_buffer, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply, int *claim) argument
182 krb5_kdc_process_request(krb5_context context, krb5_kdc_configuration *config, unsigned char *buf, size_t len, krb5_data *reply, krb5_boolean *prependlength, const char *from, struct sockaddr *addr, int datagram_reply) argument
222 krb5_kdc_process_krb5_request(krb5_context context, krb5_kdc_configuration *config, unsigned char *buf, size_t len, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply) argument
257 krb5_kdc_save_request(krb5_context context, const char *fn, const unsigned char *buf, size_t len, const krb5_data *reply, const struct sockaddr *sa) argument
[all...]
/freebsd-10.0-release/contrib/lukemftpd/src/
H A Dftpcmd.y229 reply(-221, "%s", "");
230 reply(0,
234 reply(0,
239 reply(221,
274 reply(500, "IPv6 support not available.");
293 reply(500, "PASV mode not available.");
302 reply(501,
307 reply(500, "LPSV mode not available.");
318 reply(500, "EPSV mode not available.");
326 reply(20
[all...]
/freebsd-10.0-release/contrib/wpa/src/radius/
H A Dradius_das.c41 struct radius_msg *reply; local
124 reply = radius_msg_new(error ? RADIUS_CODE_DISCONNECT_NAK :
126 if (reply == NULL)
130 if (!radius_msg_add_attr_int32(reply, RADIUS_ATTR_ERROR_CAUSE,
132 radius_msg_free(reply);
137 return reply;
156 struct radius_msg *msg, *reply = NULL; local
221 reply = radius_das_disconnect(das, msg, abuf, from_port);
225 reply = radius_msg_new(RADIUS_CODE_COA_NAK,
227 if (reply
[all...]
/freebsd-10.0-release/crypto/heimdal/appl/ftp/ftpd/
H A Dftpcmd.y164 reply(500, "Illegal PORT range rejected.");
171 reply(200, "PORT command successful.");
204 reply(200, "Type set to A.");
208 reply(504, "Form must be N.");
212 reply(504, "Type E not implemented.");
216 reply(200, "Type set to I.");
223 reply(200,
227 reply(504, "Byte size must be 8.");
240 reply(200, "STRU F ok.");
244 reply(50
[all...]
/freebsd-10.0-release/contrib/wpa/wpa_supplicant/
H A Dctrl_iface_udp.c130 char *reply; local
131 reply = os_malloc(7 + 2 * COOKIE_LEN + 1);
132 if (reply == NULL) {
137 os_memcpy(reply, "COOKIE=", 7);
138 wpa_snprintf_hex(reply + 7, 2 * COOKIE_LEN + 1,
142 return reply;
155 char *reply = NULL; local
184 reply = wpa_supplicant_ctrl_iface_get_cookie(priv, &reply_len);
236 reply = wpa_supplicant_ctrl_iface_process(wpa_s, pos,
241 if (reply) {
427 char *reply; local
452 char *reply; local
[all...]

Completed in 147 milliseconds

123456789