Searched refs:reply (Results 1 - 25 of 221) sorted by relevance

123456789

/freebsd-current/contrib/pam_modules/pam_passwdqc/
H A Dpam_macros.h16 #define _pam_drop_reply(/* struct pam_response * */ reply, /* int */ replies) \
21 if ((reply)[i].resp) { \
22 _pam_overwrite((reply)[i].resp); \
23 free((reply)[i].resp); \
25 if ((reply)) free((reply)); \
/freebsd-current/crypto/heimdal/lib/kadm5/
H A Ddelete_c.c46 krb5_data reply; local
63 ret = _kadm5_client_recv(context, &reply);
66 sp = krb5_storage_from_data (&reply);
69 krb5_data_free (&reply);
75 krb5_data_free (&reply);
H A Drename_c.c48 krb5_data reply; local
64 ret = _kadm5_client_recv(context, &reply);
67 sp = krb5_storage_from_data (&reply);
69 krb5_data_free (&reply);
75 krb5_data_free (&reply);
H A Dmodify_c.c48 krb5_data reply; local
66 ret = _kadm5_client_recv(context, &reply);
69 sp = krb5_storage_from_data (&reply);
72 krb5_data_free (&reply);
78 krb5_data_free (&reply);
H A Dprivs_c.c46 krb5_data reply; local
64 ret = _kadm5_client_recv(context, &reply);
67 sp = krb5_storage_from_data(&reply);
70 krb5_data_free (&reply);
80 krb5_data_free (&reply);
H A Dchpass_c.c48 krb5_data reply; local
66 ret = _kadm5_client_recv(context, &reply);
69 sp = krb5_storage_from_data (&reply);
72 krb5_data_free (&reply);
78 krb5_data_free (&reply);
93 krb5_data reply; local
114 ret = _kadm5_client_recv(context, &reply);
117 sp = krb5_storage_from_data (&reply);
120 krb5_data_free (&reply);
126 krb5_data_free (&reply);
[all...]
H A Dcreate_c.c49 krb5_data reply; local
68 ret = _kadm5_client_recv(context, &reply);
71 sp = krb5_storage_from_data (&reply);
74 krb5_data_free (&reply);
80 krb5_data_free (&reply);
H A Dget_princs_c.c49 krb5_data reply; local
66 ret = _kadm5_client_recv(context, &reply);
69 sp = krb5_storage_from_data (&reply);
71 krb5_data_free (&reply);
90 krb5_data_free (&reply);
H A Drandkey_c.c49 krb5_data reply; local
66 ret = _kadm5_client_recv(context, &reply);
69 sp = krb5_storage_from_data(&reply);
72 krb5_data_free (&reply);
95 krb5_data_free (&reply);
H A Dget_c.c49 krb5_data reply; local
67 ret = _kadm5_client_recv(context, &reply);
70 sp = krb5_storage_from_data (&reply);
73 krb5_data_free (&reply);
82 krb5_data_free (&reply);
/freebsd-current/crypto/heimdal/lib/krb5/
H A Dprompter_posix.c54 if(UI_UTIL_read_pw_string(prompts[i].reply->data,
55 prompts[i].reply->length,
60 char *s = prompts[i].reply->data;
64 if(fgets(prompts[i].reply->data,
65 prompts[i].reply->length,
H A Dmk_error.c45 krb5_data *reply)
86 ASN1_MALLOC_ENCODE(KRB_ERROR, reply->data, reply->length, &msg, &len, ret);
91 if(reply->length != len)
37 krb5_mk_error(krb5_context context, krb5_error_code error_code, const char *e_text, const krb5_data *e_data, const krb5_principal client, const krb5_principal server, time_t *client_time, int *client_usec, krb5_data *reply) argument
/freebsd-current/usr.sbin/mpsutil/
H A Dmps_set.c47 MPI2_CONFIG_REPLY reply; local
52 bzero(&reply, sizeof(reply));
98 if (mps_pass_command(fd, &req, sizeof(req) - sizeof(req.PageBufferSGE), &reply, sizeof(reply),
105 if (!IOC_STATUS_SUCCESS(reply.IOCStatus)) {
108 warn("%s", mps_ioc_status(reply.IOCStatus));
H A Dmps_cmd.c285 MPI2_SEP_REPLY reply; local
295 if (mps_pass_command(fd, &req, sizeof(req), &reply, sizeof(reply),
299 if (!IOC_STATUS_SUCCESS(le16toh(reply.IOCStatus)))
309 MPI2_CONFIG_REPLY reply; local
318 if (mps_pass_command(fd, &req, sizeof(req), &reply, sizeof(reply),
322 if (!IOC_STATUS_SUCCESS(le16toh(reply.IOCStatus))) {
324 *IOCStatus = reply.IOCStatus;
329 *header = reply
337 MPI2_CONFIG_REPLY reply; local
369 MPI2_CONFIG_REPLY reply; local
418 MPI2_CONFIG_REPLY reply; local
470 MPI2_FW_DOWNLOAD_REPLY reply; local
490 MPI2_FW_UPLOAD_REPLY reply; local
652 mps_user_command(int fd, void *req, uint32_t req_len, void *reply, uint32_t reply_len, void *buffer, int len, uint32_t flags) argument
672 mps_pass_command(int fd, void *req, uint32_t req_len, void *reply, uint32_t reply_len, void *data_in, uint32_t datain_len, void *data_out, uint32_t dataout_len, uint32_t timeout) argument
[all...]
/freebsd-current/sys/dev/pst/
H A Dpst-iop.c52 struct i2o_single_reply *reply; member in struct:iop_request
121 struct i2o_get_param_reply *reply; local
130 if ((reply = iop_get_util_params(sc, sc->lct[i].local_tid,
134 (struct i2o_device_identity *)reply->result;
139 contigfree(reply, PAGE_SIZE, M_PSTIOP);
169 struct i2o_single_reply *reply; local
179 reply = (struct i2o_single_reply *)(sc->obase + (mfa - sc->phys_obase));
181 /* if this is an event register reply, shout! */
182 if (reply->function == I2O_UTIL_EVENT_REGISTER) {
184 (struct i2o_util_event_reply_message *)reply;
207 volatile u_int32_t reply = 0; local
240 volatile u_int32_t reply = 0; local
295 struct i2o_get_lct_reply *reply; local
340 struct i2o_get_param_reply *reply; local
415 iop_done(struct iop_softc *sc, u_int32_t mfa, struct i2o_single_reply *reply) argument
428 struct i2o_single_reply *reply; local
[all...]
/freebsd-current/contrib/telnet/libtelnet/
H A Dauth.h68 void (*reply)(struct XauthP *, unsigned char *, int); member in struct:XauthP
/freebsd-current/crypto/heimdal/appl/telnet/libtelnet/
H A Dauth.h73 void (*reply) (struct XauthP *, unsigned char *, int); member in struct:XauthP
/freebsd-current/sys/dev/mps/
H A Dmps_config.c63 * @mpi_reply: reply mf payload returned from firmware
74 MPI2_CONFIG_REPLY *reply = NULL; local
99 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply;
100 if (error || (reply == NULL)) {
111 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK;
112 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY));
124 /* We have to do free and alloc for the reply-free and reply-post
125 * counters to match - Need to review the reply FIFO handling.
158 reply
205 MPI2_CONFIG_REPLY *reply = NULL; local
566 MPI2_CONFIG_REPLY *reply = NULL; local
704 MPI2_CONFIG_REPLY *reply = NULL; local
844 MPI2_CONFIG_REPLY *reply = NULL; local
979 MPI2_CONFIG_REPLY *reply = NULL; local
1111 MPI2_CONFIG_REPLY *reply = NULL; local
1242 MPI2_CONFIG_REPLY *reply = NULL; local
1401 MPI2_CONFIG_REPLY *reply = NULL; local
[all...]
/freebsd-current/sys/dev/mpr/
H A Dmpr_config.c63 * @mpi_reply: reply mf payload returned from firmware
74 MPI2_CONFIG_REPLY *reply; local
99 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply;
100 if (error || (reply == NULL)) {
111 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK;
112 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY));
124 /* We have to do free and alloc for the reply-free and reply-post
125 * counters to match - Need to review the reply FIFO handling.
158 reply
206 MPI2_CONFIG_REPLY *reply; local
339 MPI2_CONFIG_REPLY *reply; local
527 MPI2_CONFIG_REPLY *reply; local
665 MPI2_CONFIG_REPLY *reply; local
804 MPI2_CONFIG_REPLY *reply; local
941 MPI2_CONFIG_REPLY *reply; local
1078 MPI2_CONFIG_REPLY *reply; local
1213 MPI2_CONFIG_REPLY *reply; local
1345 MPI2_CONFIG_REPLY *reply = NULL; local
1476 MPI2_CONFIG_REPLY *reply; local
1635 MPI2_CONFIG_REPLY *reply = NULL; local
[all...]
/freebsd-current/crypto/heimdal/kdc/
H A Dprocess.c54 krb5_data *reply,
71 reply, from, addr, datagram_reply);
81 krb5_data *reply,
97 ret = _kdc_tgs_rep(context, config, &req, reply,
109 krb5_data *reply,
126 ret = _kdc_do_digest(context, config, &digestreq, reply, from, addr);
139 krb5_data *reply,
156 ret = _kdc_do_kx509(context, config, &kx509req, reply, from, addr);
178 * sending a reply in `reply'
51 kdc_as_req(krb5_context context, krb5_kdc_configuration *config, krb5_data *req_buffer, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply, int *claim) argument
78 kdc_tgs_req(krb5_context context, krb5_kdc_configuration *config, krb5_data *req_buffer, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply, int *claim) argument
106 kdc_digest(krb5_context context, krb5_kdc_configuration *config, krb5_data *req_buffer, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply, int *claim) argument
136 kdc_kx509(krb5_context context, krb5_kdc_configuration *config, krb5_data *req_buffer, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply, int *claim) argument
182 krb5_kdc_process_request(krb5_context context, krb5_kdc_configuration *config, unsigned char *buf, size_t len, krb5_data *reply, krb5_boolean *prependlength, const char *from, struct sockaddr *addr, int datagram_reply) argument
222 krb5_kdc_process_krb5_request(krb5_context context, krb5_kdc_configuration *config, unsigned char *buf, size_t len, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply) argument
257 krb5_kdc_save_request(krb5_context context, const char *fn, const unsigned char *buf, size_t len, const krb5_data *reply, const struct sockaddr *sa) argument
[all...]
/freebsd-current/contrib/ntp/sntp/libevent/include/event2/
H A Drpc.h64 * is invoked. The callback needs to fill in the reply structure.
68 * To send the reply, call EVRPC_REQUEST_DONE(rpc);
173 * @param replystruct the name of the RPC reply structure
180 struct rplystruct* reply; \
197 struct evrpc_pool *pool, void *request, void *reply,
212 * @param replystruct the name of the RPC reply structure
215 * @param reply a pointer to the RPC reply structure object
220 pool, request, reply, cb, cbarg) \
221 evrpc_make_request_ctx(pool, request, reply, \
[all...]
/freebsd-current/contrib/libevent/include/event2/
H A Drpc.h64 * is invoked. The callback needs to fill in the reply structure.
68 * To send the reply, call EVRPC_REQUEST_DONE(rpc);
173 * @param replystruct the name of the RPC reply structure
180 struct rplystruct* reply; \
197 struct evrpc_pool *pool, void *request, void *reply,
212 * @param replystruct the name of the RPC reply structure
215 * @param reply a pointer to the RPC reply structure object
220 pool, request, reply, cb, cbarg) \
221 evrpc_make_request_ctx(pool, request, reply, \
[all...]
/freebsd-current/crypto/heimdal/appl/ftp/ftpd/
H A Dftpcmd.y164 reply(500, "Illegal PORT range rejected.");
171 reply(200, "PORT command successful.");
204 reply(200, "Type set to A.");
208 reply(504, "Form must be N.");
212 reply(504, "Type E not implemented.");
216 reply(200, "Type set to I.");
223 reply(200,
227 reply(504, "Byte size must be 8.");
240 reply(200, "STRU F ok.");
244 reply(50
[all...]
/freebsd-current/libexec/ftpd/
H A Dftpcmd.y150 reply(501, "No PORT allowed after EPSV ALL.");
162 reply(500, "Invalid address rejected.");
173 reply(501, "No LPRT allowed after EPSV ALL.");
183 reply(500, "Invalid address rejected.");
203 reply(501, "No EPRT allowed after EPSV ALL.");
225 reply(500,
284 reply(500, "Invalid address rejected.");
296 reply(501, "No PASV allowed after EPSV ALL.");
303 reply(501, "No LPSV allowed after EPSV ALL.");
330 reply(20
[all...]
/freebsd-current/tests/sys/netlink/
H A Dnetlink_socket.c85 /* Check the expected size of reply on a single RTM_GETLINK. */
286 } reply, msg = { local
310 ATF_REQUIRE(recv(fd, &reply, sizeof(reply), 0) == sizeof(reply));
311 ATF_REQUIRE(reply.hdr.nlmsg_type == msg.hdr.nlmsg_type);
312 ATF_REQUIRE(reply.rtm.rtm_type == msg.rtm.rtm_type);
313 ATF_REQUIRE(reply.rtm.rtm_dst_len == msg.rtm.rtm_dst_len);
314 ATF_REQUIRE(nla = nla_RTA_DST(&reply.rta_dst, sizeof(reply)));
[all...]

Completed in 136 milliseconds

123456789