/freebsd-current/contrib/pam_modules/pam_passwdqc/ |
H A D | pam_macros.h | 16 #define _pam_drop_reply(/* struct pam_response * */ reply, /* int */ replies) \ 21 if ((reply)[i].resp) { \ 22 _pam_overwrite((reply)[i].resp); \ 23 free((reply)[i].resp); \ 25 if ((reply)) free((reply)); \
|
/freebsd-current/crypto/heimdal/lib/kadm5/ |
H A D | delete_c.c | 46 krb5_data reply; local 63 ret = _kadm5_client_recv(context, &reply); 66 sp = krb5_storage_from_data (&reply); 69 krb5_data_free (&reply); 75 krb5_data_free (&reply);
|
H A D | rename_c.c | 48 krb5_data reply; local 64 ret = _kadm5_client_recv(context, &reply); 67 sp = krb5_storage_from_data (&reply); 69 krb5_data_free (&reply); 75 krb5_data_free (&reply);
|
H A D | modify_c.c | 48 krb5_data reply; local 66 ret = _kadm5_client_recv(context, &reply); 69 sp = krb5_storage_from_data (&reply); 72 krb5_data_free (&reply); 78 krb5_data_free (&reply);
|
H A D | privs_c.c | 46 krb5_data reply; local 64 ret = _kadm5_client_recv(context, &reply); 67 sp = krb5_storage_from_data(&reply); 70 krb5_data_free (&reply); 80 krb5_data_free (&reply);
|
H A D | chpass_c.c | 48 krb5_data reply; local 66 ret = _kadm5_client_recv(context, &reply); 69 sp = krb5_storage_from_data (&reply); 72 krb5_data_free (&reply); 78 krb5_data_free (&reply); 93 krb5_data reply; local 114 ret = _kadm5_client_recv(context, &reply); 117 sp = krb5_storage_from_data (&reply); 120 krb5_data_free (&reply); 126 krb5_data_free (&reply); [all...] |
H A D | create_c.c | 49 krb5_data reply; local 68 ret = _kadm5_client_recv(context, &reply); 71 sp = krb5_storage_from_data (&reply); 74 krb5_data_free (&reply); 80 krb5_data_free (&reply);
|
H A D | get_princs_c.c | 49 krb5_data reply; local 66 ret = _kadm5_client_recv(context, &reply); 69 sp = krb5_storage_from_data (&reply); 71 krb5_data_free (&reply); 90 krb5_data_free (&reply);
|
H A D | randkey_c.c | 49 krb5_data reply; local 66 ret = _kadm5_client_recv(context, &reply); 69 sp = krb5_storage_from_data(&reply); 72 krb5_data_free (&reply); 95 krb5_data_free (&reply);
|
H A D | get_c.c | 49 krb5_data reply; local 67 ret = _kadm5_client_recv(context, &reply); 70 sp = krb5_storage_from_data (&reply); 73 krb5_data_free (&reply); 82 krb5_data_free (&reply);
|
/freebsd-current/crypto/heimdal/lib/krb5/ |
H A D | prompter_posix.c | 54 if(UI_UTIL_read_pw_string(prompts[i].reply->data, 55 prompts[i].reply->length, 60 char *s = prompts[i].reply->data; 64 if(fgets(prompts[i].reply->data, 65 prompts[i].reply->length,
|
H A D | mk_error.c | 45 krb5_data *reply) 86 ASN1_MALLOC_ENCODE(KRB_ERROR, reply->data, reply->length, &msg, &len, ret); 91 if(reply->length != len) 37 krb5_mk_error(krb5_context context, krb5_error_code error_code, const char *e_text, const krb5_data *e_data, const krb5_principal client, const krb5_principal server, time_t *client_time, int *client_usec, krb5_data *reply) argument
|
/freebsd-current/usr.sbin/mpsutil/ |
H A D | mps_set.c | 47 MPI2_CONFIG_REPLY reply; local 52 bzero(&reply, sizeof(reply)); 98 if (mps_pass_command(fd, &req, sizeof(req) - sizeof(req.PageBufferSGE), &reply, sizeof(reply), 105 if (!IOC_STATUS_SUCCESS(reply.IOCStatus)) { 108 warn("%s", mps_ioc_status(reply.IOCStatus));
|
H A D | mps_cmd.c | 285 MPI2_SEP_REPLY reply; local 295 if (mps_pass_command(fd, &req, sizeof(req), &reply, sizeof(reply), 299 if (!IOC_STATUS_SUCCESS(le16toh(reply.IOCStatus))) 309 MPI2_CONFIG_REPLY reply; local 318 if (mps_pass_command(fd, &req, sizeof(req), &reply, sizeof(reply), 322 if (!IOC_STATUS_SUCCESS(le16toh(reply.IOCStatus))) { 324 *IOCStatus = reply.IOCStatus; 329 *header = reply 337 MPI2_CONFIG_REPLY reply; local 369 MPI2_CONFIG_REPLY reply; local 418 MPI2_CONFIG_REPLY reply; local 470 MPI2_FW_DOWNLOAD_REPLY reply; local 490 MPI2_FW_UPLOAD_REPLY reply; local 652 mps_user_command(int fd, void *req, uint32_t req_len, void *reply, uint32_t reply_len, void *buffer, int len, uint32_t flags) argument 672 mps_pass_command(int fd, void *req, uint32_t req_len, void *reply, uint32_t reply_len, void *data_in, uint32_t datain_len, void *data_out, uint32_t dataout_len, uint32_t timeout) argument [all...] |
/freebsd-current/sys/dev/pst/ |
H A D | pst-iop.c | 52 struct i2o_single_reply *reply; member in struct:iop_request 121 struct i2o_get_param_reply *reply; local 130 if ((reply = iop_get_util_params(sc, sc->lct[i].local_tid, 134 (struct i2o_device_identity *)reply->result; 139 contigfree(reply, PAGE_SIZE, M_PSTIOP); 169 struct i2o_single_reply *reply; local 179 reply = (struct i2o_single_reply *)(sc->obase + (mfa - sc->phys_obase)); 181 /* if this is an event register reply, shout! */ 182 if (reply->function == I2O_UTIL_EVENT_REGISTER) { 184 (struct i2o_util_event_reply_message *)reply; 207 volatile u_int32_t reply = 0; local 240 volatile u_int32_t reply = 0; local 295 struct i2o_get_lct_reply *reply; local 340 struct i2o_get_param_reply *reply; local 415 iop_done(struct iop_softc *sc, u_int32_t mfa, struct i2o_single_reply *reply) argument 428 struct i2o_single_reply *reply; local [all...] |
/freebsd-current/contrib/telnet/libtelnet/ |
H A D | auth.h | 68 void (*reply)(struct XauthP *, unsigned char *, int); member in struct:XauthP
|
/freebsd-current/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | auth.h | 73 void (*reply) (struct XauthP *, unsigned char *, int); member in struct:XauthP
|
/freebsd-current/sys/dev/mps/ |
H A D | mps_config.c | 63 * @mpi_reply: reply mf payload returned from firmware 74 MPI2_CONFIG_REPLY *reply = NULL; local 99 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; 100 if (error || (reply == NULL)) { 111 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; 112 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); 124 /* We have to do free and alloc for the reply-free and reply-post 125 * counters to match - Need to review the reply FIFO handling. 158 reply 205 MPI2_CONFIG_REPLY *reply = NULL; local 566 MPI2_CONFIG_REPLY *reply = NULL; local 704 MPI2_CONFIG_REPLY *reply = NULL; local 844 MPI2_CONFIG_REPLY *reply = NULL; local 979 MPI2_CONFIG_REPLY *reply = NULL; local 1111 MPI2_CONFIG_REPLY *reply = NULL; local 1242 MPI2_CONFIG_REPLY *reply = NULL; local 1401 MPI2_CONFIG_REPLY *reply = NULL; local [all...] |
/freebsd-current/sys/dev/mpr/ |
H A D | mpr_config.c | 63 * @mpi_reply: reply mf payload returned from firmware 74 MPI2_CONFIG_REPLY *reply; local 99 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; 100 if (error || (reply == NULL)) { 111 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; 112 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); 124 /* We have to do free and alloc for the reply-free and reply-post 125 * counters to match - Need to review the reply FIFO handling. 158 reply 206 MPI2_CONFIG_REPLY *reply; local 339 MPI2_CONFIG_REPLY *reply; local 527 MPI2_CONFIG_REPLY *reply; local 665 MPI2_CONFIG_REPLY *reply; local 804 MPI2_CONFIG_REPLY *reply; local 941 MPI2_CONFIG_REPLY *reply; local 1078 MPI2_CONFIG_REPLY *reply; local 1213 MPI2_CONFIG_REPLY *reply; local 1345 MPI2_CONFIG_REPLY *reply = NULL; local 1476 MPI2_CONFIG_REPLY *reply; local 1635 MPI2_CONFIG_REPLY *reply = NULL; local [all...] |
/freebsd-current/crypto/heimdal/kdc/ |
H A D | process.c | 54 krb5_data *reply, 71 reply, from, addr, datagram_reply); 81 krb5_data *reply, 97 ret = _kdc_tgs_rep(context, config, &req, reply, 109 krb5_data *reply, 126 ret = _kdc_do_digest(context, config, &digestreq, reply, from, addr); 139 krb5_data *reply, 156 ret = _kdc_do_kx509(context, config, &kx509req, reply, from, addr); 178 * sending a reply in `reply' 51 kdc_as_req(krb5_context context, krb5_kdc_configuration *config, krb5_data *req_buffer, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply, int *claim) argument 78 kdc_tgs_req(krb5_context context, krb5_kdc_configuration *config, krb5_data *req_buffer, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply, int *claim) argument 106 kdc_digest(krb5_context context, krb5_kdc_configuration *config, krb5_data *req_buffer, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply, int *claim) argument 136 kdc_kx509(krb5_context context, krb5_kdc_configuration *config, krb5_data *req_buffer, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply, int *claim) argument 182 krb5_kdc_process_request(krb5_context context, krb5_kdc_configuration *config, unsigned char *buf, size_t len, krb5_data *reply, krb5_boolean *prependlength, const char *from, struct sockaddr *addr, int datagram_reply) argument 222 krb5_kdc_process_krb5_request(krb5_context context, krb5_kdc_configuration *config, unsigned char *buf, size_t len, krb5_data *reply, const char *from, struct sockaddr *addr, int datagram_reply) argument 257 krb5_kdc_save_request(krb5_context context, const char *fn, const unsigned char *buf, size_t len, const krb5_data *reply, const struct sockaddr *sa) argument [all...] |
/freebsd-current/contrib/ntp/sntp/libevent/include/event2/ |
H A D | rpc.h | 64 * is invoked. The callback needs to fill in the reply structure. 68 * To send the reply, call EVRPC_REQUEST_DONE(rpc); 173 * @param replystruct the name of the RPC reply structure 180 struct rplystruct* reply; \ 197 struct evrpc_pool *pool, void *request, void *reply, 212 * @param replystruct the name of the RPC reply structure 215 * @param reply a pointer to the RPC reply structure object 220 pool, request, reply, cb, cbarg) \ 221 evrpc_make_request_ctx(pool, request, reply, \ [all...] |
/freebsd-current/contrib/libevent/include/event2/ |
H A D | rpc.h | 64 * is invoked. The callback needs to fill in the reply structure. 68 * To send the reply, call EVRPC_REQUEST_DONE(rpc); 173 * @param replystruct the name of the RPC reply structure 180 struct rplystruct* reply; \ 197 struct evrpc_pool *pool, void *request, void *reply, 212 * @param replystruct the name of the RPC reply structure 215 * @param reply a pointer to the RPC reply structure object 220 pool, request, reply, cb, cbarg) \ 221 evrpc_make_request_ctx(pool, request, reply, \ [all...] |
/freebsd-current/crypto/heimdal/appl/ftp/ftpd/ |
H A D | ftpcmd.y | 164 reply(500, "Illegal PORT range rejected."); 171 reply(200, "PORT command successful."); 204 reply(200, "Type set to A."); 208 reply(504, "Form must be N."); 212 reply(504, "Type E not implemented."); 216 reply(200, "Type set to I."); 223 reply(200, 227 reply(504, "Byte size must be 8."); 240 reply(200, "STRU F ok."); 244 reply(50 [all...] |
/freebsd-current/libexec/ftpd/ |
H A D | ftpcmd.y | 150 reply(501, "No PORT allowed after EPSV ALL."); 162 reply(500, "Invalid address rejected."); 173 reply(501, "No LPRT allowed after EPSV ALL."); 183 reply(500, "Invalid address rejected."); 203 reply(501, "No EPRT allowed after EPSV ALL."); 225 reply(500, 284 reply(500, "Invalid address rejected."); 296 reply(501, "No PASV allowed after EPSV ALL."); 303 reply(501, "No LPSV allowed after EPSV ALL."); 330 reply(20 [all...] |
/freebsd-current/tests/sys/netlink/ |
H A D | netlink_socket.c | 85 /* Check the expected size of reply on a single RTM_GETLINK. */ 286 } reply, msg = { local 310 ATF_REQUIRE(recv(fd, &reply, sizeof(reply), 0) == sizeof(reply)); 311 ATF_REQUIRE(reply.hdr.nlmsg_type == msg.hdr.nlmsg_type); 312 ATF_REQUIRE(reply.rtm.rtm_type == msg.rtm.rtm_type); 313 ATF_REQUIRE(reply.rtm.rtm_dst_len == msg.rtm.rtm_dst_len); 314 ATF_REQUIRE(nla = nla_RTA_DST(&reply.rta_dst, sizeof(reply))); [all...] |