/freebsd-9.3-release/sys/rpc/ |
H A D | rpc_prot.c | 175 xdr_replymsg(XDR *xdrs, struct rpc_msg *rmsg) argument 182 assert(rmsg != NULL); 187 rmsg->rm_xid = IXDR_GET_UINT32(buf); 188 rmsg->rm_direction = IXDR_GET_ENUM(buf, enum msg_type); 189 if (rmsg->rm_direction != REPLY) { 192 rmsg->rm_reply.rp_stat = 194 if (rmsg->rm_reply.rp_stat == MSG_ACCEPTED) 196 &rmsg->acpted_rply)); 197 else if (rmsg->rm_reply.rp_stat == MSG_DENIED) 199 &rmsg [all...] |
/freebsd-9.3-release/contrib/bind9/lib/dns/include/dns/ |
H A D | tkey.h | 167 dns_tkey_processdhresponse(dns_message_t *qmsg, dns_message_t *rmsg, 178 *\li 'rmsg' is a valid message (the response) 190 dns_tkey_processgssresponse(dns_message_t *qmsg, dns_message_t *rmsg, 199 dns_tkey_processdeleteresponse(dns_message_t *qmsg, dns_message_t *rmsg, 208 *\li 'rmsg' is a valid message (the response) 218 dns_tkey_gssnegotiate(dns_message_t *qmsg, dns_message_t *rmsg, 232 * 'rmsg' is a valid message, the incoming TKEY message
|
/freebsd-9.3-release/lib/libc/rpc/ |
H A D | rpc_prot.c | 185 xdr_replymsg(xdrs, rmsg) 187 struct rpc_msg *rmsg; 193 assert(rmsg != NULL); 195 prm_direction = &rmsg->rm_direction; 196 prp_stat = &rmsg->rm_reply.rp_stat; 199 xdr_u_int32_t(xdrs, &(rmsg->rm_xid)) && 201 (rmsg->rm_direction == REPLY) ) 203 (caddr_t)(void *)&(rmsg->rm_reply.ru), reply_dscrm,
|
/freebsd-9.3-release/crypto/openssl/engines/ |
H A D | e_chil.c | 510 HWCryptoHook_ErrMsgBuf rmsg; local 512 rmsg.buf = tempbuf; 513 rmsg.size = sizeof(tempbuf); 515 *hac = p_hwcrhk_Init(&hwcrhk_globals, sizeof(hwcrhk_globals), &rmsg, cac); 781 HWCryptoHook_ErrMsgBuf rmsg; local 786 rmsg.buf = tempbuf; 787 rmsg.size = sizeof(tempbuf); 802 if (p_hwcrhk_RSALoadKey(hwcrhk_context, key_id, hptr, &rmsg, &ppctx)) { 804 ERR_add_error_data(1, rmsg.buf); 820 if (p_hwcrhk_RSAGetPublicKey(*hptr, &n, &e, &rmsg) 907 HWCryptoHook_ErrMsgBuf rmsg; local 962 HWCryptoHook_ErrMsgBuf rmsg; local 1109 HWCryptoHook_ErrMsgBuf rmsg; local [all...] |
/freebsd-9.3-release/contrib/bind9/lib/dns/ |
H A D | tkey.c | 1118 dns_tkey_processdhresponse(dns_message_t *qmsg, dns_message_t *rmsg, argument 1136 REQUIRE(rmsg != NULL); 1143 if (rmsg->rcode != dns_rcode_noerror) 1144 return (ISC_RESULTCLASS_DNSRCODE + rmsg->rcode); 1145 RETERR(find_tkey(rmsg, &tkeyname, &rtkeyrdata, DNS_SECTION_ANSWER)); 1157 rmsg->rcode != dns_rcode_noerror) { 1172 RETERR(dns_message_findname(rmsg, DNS_SECTION_ANSWER, &keyname, 1176 result = dns_message_firstname(rmsg, DNS_SECTION_ANSWER); 1179 dns_message_currentname(rmsg, DNS_SECTION_ANSWER, 1191 result = dns_message_nextname(rmsg, DNS_SECTION_ANSWE 1248 dns_tkey_processgssresponse(dns_message_t *qmsg, dns_message_t *rmsg, dns_name_t *gname, gss_ctx_id_t *context, isc_buffer_t *outtoken, dns_tsigkey_t **outkey, dns_tsig_keyring_t *ring, char **err_message) argument 1326 dns_tkey_processdeleteresponse(dns_message_t *qmsg, dns_message_t *rmsg, dns_tsig_keyring_t *ring) argument 1381 dns_tkey_gssnegotiate(dns_message_t *qmsg, dns_message_t *rmsg, dns_name_t *server, gss_ctx_id_t *context, dns_tsigkey_t **outkey, dns_tsig_keyring_t *ring, isc_boolean_t win2k, char **err_message) argument [all...] |
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_peap.c | 995 struct wpabuf *rmsg, buf; local 1009 rmsg = resp; 1014 rmsg = &buf; 1019 rmsg, out_data)) {
|
/freebsd-9.3-release/contrib/bind9/bin/nsupdate/ |
H A D | nsupdate.c | 2557 dns_message_t *rmsg; local 2626 rmsg = NULL; 2627 result = dns_message_create(mctx, DNS_MESSAGE_INTENTRENDER, &rmsg); 2634 result = dns_tkey_buildgssquery(rmsg, keyname, servname, NULL, 0, 2644 send_gssrequest(localaddr, kserver, rmsg, &request, context);
|