Home
last modified time | relevance | path

Searched refs:reply (Results 1 – 25 of 343) sorted by relevance

12345678910>>...14

/freebsd/sys/dev/pst/
H A Dpst-iop.c52 struct i2o_single_reply *reply; member
121 struct i2o_get_param_reply *reply; in iop_attach() local
130 if ((reply = iop_get_util_params(sc, sc->lct[i].local_tid, in iop_attach()
134 (struct i2o_device_identity *)reply->result; in iop_attach()
139 free(reply, M_PSTIOP); in iop_attach()
169 struct i2o_single_reply *reply; in iop_intr() local
179 reply = (struct i2o_single_reply *)(sc->obase + (mfa - sc->phys_obase)); in iop_intr()
181 /* if this is an event register reply, shout! */ in iop_intr()
182 if (reply->function == I2O_UTIL_EVENT_REGISTER) { in iop_intr()
184 (struct i2o_util_event_reply_message *)reply; in iop_intr()
207 volatile u_int32_t reply = 0; iop_reset() local
240 volatile u_int32_t reply = 0; iop_init_outqueue() local
295 struct i2o_get_lct_reply *reply; iop_get_lct() local
340 struct i2o_get_param_reply *reply; iop_get_util_params() local
415 iop_done(struct iop_softc * sc,u_int32_t mfa,struct i2o_single_reply * reply) iop_done() argument
428 struct i2o_single_reply *reply; iop_queue_wait_msg() local
[all...]
/freebsd/sys/dev/mpr/
H A Dmpr_config.c74 MPI2_CONFIG_REPLY *reply; in mpr_config_get_ioc_pg8() local
99 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; in mpr_config_get_ioc_pg8()
100 if (error || (reply == NULL)) { in mpr_config_get_ioc_pg8()
111 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; in mpr_config_get_ioc_pg8()
112 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); in mpr_config_get_ioc_pg8()
158 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; in mpr_config_get_ioc_pg8()
159 if (error || (reply == NULL)) { in mpr_config_get_ioc_pg8()
170 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; in mpr_config_get_ioc_pg8()
171 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); in mpr_config_get_ioc_pg8()
206 MPI2_CONFIG_REPLY *reply; in mpr_config_get_iounit_pg8() local
[all …]
/freebsd/usr.sbin/mpsutil/
H A Dmps_cmd.c285 MPI2_SEP_REPLY reply; in mps_set_slot_status() local
295 if (mps_pass_command(fd, &req, sizeof(req), &reply, sizeof(reply), in mps_set_slot_status()
299 if (!IOC_STATUS_SUCCESS(le16toh(reply.IOCStatus))) in mps_set_slot_status()
309 MPI2_CONFIG_REPLY reply; in mps_read_config_page_header() local
318 if (mps_pass_command(fd, &req, sizeof(req), &reply, sizeof(reply), in mps_read_config_page_header()
322 if (!IOC_STATUS_SUCCESS(le16toh(reply.IOCStatus))) { in mps_read_config_page_header()
324 *IOCStatus = reply.IOCStatus; in mps_read_config_page_header()
329 *header = reply.Header; in mps_read_config_page_header()
337 MPI2_CONFIG_REPLY reply; in mps_read_ext_config_page_header() local
347 if (mps_pass_command(fd, &req, sizeof(req), &reply, sizeof(reply), in mps_read_ext_config_page_header()
[all …]
H A Dmps_set.c47 MPI2_CONFIG_REPLY reply; in set_ncq() local
52 bzero(&reply, sizeof(reply)); in set_ncq()
98 if (mps_pass_command(fd, &req, sizeof(req) - sizeof(req.PageBufferSGE), &reply, sizeof(reply), in set_ncq()
105 if (!IOC_STATUS_SUCCESS(reply.IOCStatus)) { in set_ncq()
108 warn("%s", mps_ioc_status(reply.IOCStatus)); in set_ncq()
/freebsd/crypto/heimdal/appl/ftp/ftpd/
H A Dftpcmd.y164 reply(500, "Illegal PORT range rejected.");
171 reply(200, "PORT command successful.");
204 reply(200, "Type set to A.");
208 reply(504, "Form must be N.");
212 reply(504, "Type E not implemented.");
216 reply(200, "Type set to I.");
223 reply(200,
227 reply(504, "Byte size must be 8.");
240 reply(200, "STRU F ok.");
244 reply(504, "Unimplemented STRU type.");
[all …]
H A Dftpd.c393 reply(530, "System not available."); in main()
400 reply(220, "%s FTP server (%s" in main()
493 reply(530, "No login allowed without authorization."); in user()
499 reply(530, "Can't change user from guest login."); in user()
502 reply(530, "Can't change user from chroot user."); in user()
513 reply(530, "User %s access denied.", name); in user()
518 reply(331, "Guest login ok, type your name as password."); in user()
520 reply(530, "User %s unknown.", name); in user()
537 reply(530, "Only authorized and anonymous login allowed."); in user()
549 reply(530, "User %s access denied.", name); in user()
[all …]
H A Dftpcmd.c1807 reply(500, "Illegal PORT range rejected."); in yyparse()
1814 reply(200, "PORT command successful."); in yyparse()
1862 reply(200, "Type set to A."); in yyparse()
1866 reply(504, "Form must be N."); in yyparse()
1870 reply(504, "Type E not implemented."); in yyparse()
1874 reply(200, "Type set to I."); in yyparse()
1881 reply(200, in yyparse()
1885 reply(504, "Byte size must be 8."); in yyparse()
1901 reply(200, "STRU F ok."); in yyparse()
1905 reply(504, "Unimplemented STRU type."); in yyparse()
[all …]
/freebsd/sys/dev/mps/
H A Dmps_config.c74 MPI2_CONFIG_REPLY *reply = NULL; in mps_config_get_ioc_pg8() local
99 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; in mps_config_get_ioc_pg8()
100 if (error || (reply == NULL)) { in mps_config_get_ioc_pg8()
111 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; in mps_config_get_ioc_pg8()
112 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); in mps_config_get_ioc_pg8()
158 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; in mps_config_get_ioc_pg8()
159 if (error || (reply == NULL)) { in mps_config_get_ioc_pg8()
170 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; in mps_config_get_ioc_pg8()
171 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); in mps_config_get_ioc_pg8()
205 MPI2_CONFIG_REPLY *reply = NULL; in mps_config_get_man_pg10() local
[all …]
/freebsd/libexec/ftpd/
H A Dftpcmd.y150 reply(501, "No PORT allowed after EPSV ALL.");
162 reply(500, "Invalid address rejected.");
173 reply(501, "No LPRT allowed after EPSV ALL.");
183 reply(500, "Invalid address rejected.");
203 reply(501, "No EPRT allowed after EPSV ALL.");
225 reply(500,
284 reply(500, "Invalid address rejected.");
296 reply(501, "No PASV allowed after EPSV ALL.");
303 reply(501, "No LPSV allowed after EPSV ALL.");
330 reply(200, "EPSV ALL command successful.");
[all …]
H A Dftpd.c594 reply(530, "System not available."); in main()
620 reply(220, "%s FTP server (%s) ready.", hostname, version); in main()
622 reply(220, "FTP server ready."); in main()
918 reply(421, "Ran out of memory."); in sgetsave()
983 reply(530, "Can't change user from guest login."); in user()
986 reply(530, "Can't change user from chroot user."); in user()
1001 reply(530, "User %s access denied.", name); in user()
1004 reply(530, "User %s access denied.", name); in user()
1008 reply(331, in user()
1011 reply(530, "User %s unknown.", name); in user()
[all …]
/freebsd/tests/sys/netpfil/pf/
H A Dnat64.py107 reply = sp.sr1(packet)
110 tcp = reply.getlayer(sp.TCP)
117 reply = sp.sr1(packet)
119 tcp = reply.getlayer(sp.TCP)
138 reply = sp.sr1(packet, timeout=3)
139 print(reply.show())
142 assert not reply.getlayer(sp.UDP)
143 icmp = reply.getlayer(sp.ICMPv6DestUnreach)
147 udp = reply.getlayer(sp.UDPerror)
160 reply = sp.sr1(packet, timeout=3)
[all …]
/freebsd/contrib/libfido2/src/
H A Du2f.c148 unsigned char *reply = NULL; in send_dummy_register() local
166 if ((reply = malloc(FIDO_MAXMSG)) == NULL) { in send_dummy_register()
179 if (fido_rx(dev, CTAP_CMD_MSG, reply, FIDO_MAXMSG, ms) < 2) { in send_dummy_register()
189 } while (((reply[0] << 8) | reply[1]) == SW_CONDITIONS_NOT_SATISFIED); in send_dummy_register()
194 freezero(reply, FIDO_MAXMSG); in send_dummy_register()
204 unsigned char *reply = NULL; in key_lookup() local
240 if ((reply = malloc(FIDO_MAXMSG)) == NULL) { in key_lookup()
252 if (fido_rx(dev, CTAP_CMD_MSG, reply, FIDO_MAXMSG, ms) != 2) { in key_lookup()
258 switch ((reply[0] << 8) | reply[1]) { in key_lookup()
274 freezero(reply, FIDO_MAXMSG); in key_lookup()
[all …]
/freebsd/contrib/wpa/wpa_supplicant/dbus/
H A Ddbus_new_handlers_wps.c36 DBusMessage **reply) in wpas_dbus_handler_wps_role() argument
46 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_role()
57 *reply = wpas_dbus_error_invalid_args(message, val); in wpas_dbus_handler_wps_role()
67 DBusMessage **reply) in wpas_dbus_handler_wps_type() argument
76 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_type()
88 *reply = wpas_dbus_error_invalid_args(message, val); in wpas_dbus_handler_wps_type()
98 DBusMessage **reply) in wpas_dbus_handler_wps_bssid() argument
109 *reply = wpas_dbus_error_invalid_args( in wpas_dbus_handler_wps_bssid()
118 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_bssid()
129 DBusMessage **reply) in wpas_dbus_handler_wps_pin() argument
[all …]
H A Ddbus_new_handlers.c102 DBusMessage *reply; in wpas_dbus_error_invalid_args() local
104 reply = dbus_message_new_error( in wpas_dbus_error_invalid_args()
108 dbus_message_append_args(reply, DBUS_TYPE_STRING, &arg, in wpas_dbus_error_invalid_args()
111 return reply; in wpas_dbus_error_invalid_args()
769 DBusMessage *reply = NULL; in wpas_dbus_handler_create_interface() local
856 reply = dbus_message_new_error( in wpas_dbus_handler_create_interface()
873 reply = wpas_dbus_error_unknown_error( in wpas_dbus_handler_create_interface()
891 reply = dbus_message_new_method_return(message); in wpas_dbus_handler_create_interface()
892 dbus_message_append_args(reply, DBUS_TYPE_OBJECT_PATH, in wpas_dbus_handler_create_interface()
895 reply = wpas_dbus_error_unknown_error( in wpas_dbus_handler_create_interface()
[all …]
/freebsd/crypto/heimdal/lib/kadm5/
H A Dchpass_c.c48 krb5_data reply; in kadm5_c_chpass_principal() local
66 ret = _kadm5_client_recv(context, &reply); in kadm5_c_chpass_principal()
69 sp = krb5_storage_from_data (&reply); in kadm5_c_chpass_principal()
72 krb5_data_free (&reply); in kadm5_c_chpass_principal()
78 krb5_data_free (&reply); in kadm5_c_chpass_principal()
93 krb5_data reply; in kadm5_c_chpass_principal_with_key() local
114 ret = _kadm5_client_recv(context, &reply); in kadm5_c_chpass_principal_with_key()
117 sp = krb5_storage_from_data (&reply); in kadm5_c_chpass_principal_with_key()
120 krb5_data_free (&reply); in kadm5_c_chpass_principal_with_key()
126 krb5_data_free (&reply); in kadm5_c_chpass_principal_with_key()
/freebsd/crypto/heimdal/kdc/
H A Dprocess.c54 krb5_data *reply, in kdc_as_req() argument
71 reply, from, addr, datagram_reply); in kdc_as_req()
81 krb5_data *reply, in kdc_tgs_req() argument
97 ret = _kdc_tgs_rep(context, config, &req, reply, in kdc_tgs_req()
109 krb5_data *reply, in kdc_digest() argument
126 ret = _kdc_do_digest(context, config, &digestreq, reply, from, addr); in kdc_digest()
139 krb5_data *reply, in kdc_kx509() argument
156 ret = _kdc_do_kx509(context, config, &kx509req, reply, from, addr); in kdc_kx509()
186 krb5_data *reply, in krb5_kdc_process_request() argument
202 reply, from, addr, datagram_reply, in krb5_kdc_process_request()
[all …]
/freebsd/contrib/wpa/src/radius/
H A Dradius_das.c40 struct radius_msg *reply; in radius_das_disconnect() local
175 reply = radius_msg_new(error ? RADIUS_CODE_DISCONNECT_NAK : in radius_das_disconnect()
177 if (reply == NULL) in radius_das_disconnect()
180 if (!radius_msg_add_msg_auth(reply)) { in radius_das_disconnect()
181 radius_msg_free(reply); in radius_das_disconnect()
186 if (!radius_msg_add_attr_int32(reply, RADIUS_ATTR_ERROR_CAUSE, in radius_das_disconnect()
188 radius_msg_free(reply); in radius_das_disconnect()
193 return reply; in radius_das_disconnect()
202 struct radius_msg *reply; in radius_das_coa() local
371 reply = radius_msg_new(error ? RADIUS_CODE_COA_NAK : in radius_das_coa()
[all …]
/freebsd/contrib/ntp/sntp/libevent/include/event2/
H A Drpc.h180 struct rplystruct* reply; \
197 struct evrpc_pool *pool, void *request, void *reply,
220 pool, request, reply, cb, cbarg) \ argument
221 evrpc_make_request_ctx(pool, request, reply, \
241 struct reqstruct *request, struct rplystruct *reply, \
245 return evrpc_send_request_generic(pool, request, reply, \
330 #define EVRPC_REGISTER(base, name, request, reply, callback, cbarg) \ argument
336 (void *(*)(void *))reply##_new_with_arg, NULL, \
337 (void (*)(void *))reply##_free, \
338 (int (*)(void *))reply##_complete, \
[all …]
/freebsd/contrib/libevent/include/event2/
H A Drpc.h180 struct rplystruct* reply; \
197 struct evrpc_pool *pool, void *request, void *reply,
220 pool, request, reply, cb, cbarg) \ argument
221 evrpc_make_request_ctx(pool, request, reply, \
241 struct reqstruct *request, struct rplystruct *reply, \
245 return evrpc_send_request_generic(pool, request, reply, \
330 #define EVRPC_REGISTER(base, name, request, reply, callback, cbarg) \ argument
336 (void *(*)(void *))reply##_new_with_arg, NULL, \
337 (void (*)(void *))reply##_free, \
338 (int (*)(void *))reply##_complete, \
[all …]
/freebsd/contrib/pam_modules/pam_passwdqc/
H A Dpam_macros.h16 #define _pam_drop_reply(/* struct pam_response * */ reply, /* int */ replies) \ argument
21 if ((reply)[i].resp) { \
22 _pam_overwrite((reply)[i].resp); \
23 free((reply)[i].resp); \
25 if ((reply)) free((reply)); \
/freebsd/tests/sys/netlink/
H A Dnetlink_socket.c286 } reply, msg = { in ATF_TC_BODY() local
310 ATF_REQUIRE(recv(fd, &reply, sizeof(reply), 0) == sizeof(reply)); in ATF_TC_BODY()
311 ATF_REQUIRE(reply.hdr.nlmsg_type == msg.hdr.nlmsg_type); in ATF_TC_BODY()
312 ATF_REQUIRE(reply.rtm.rtm_type == msg.rtm.rtm_type); in ATF_TC_BODY()
313 ATF_REQUIRE(reply.rtm.rtm_dst_len == msg.rtm.rtm_dst_len); in ATF_TC_BODY()
314 ATF_REQUIRE(nla = nla_RTA_DST(&reply.rta_dst, sizeof(reply))); in ATF_TC_BODY()
321 ATF_REQUIRE(recv(fd, &reply, sizeof(reply), 0) == sizeof(reply)); in ATF_TC_BODY()
322 ATF_REQUIRE(reply.hdr.nlmsg_type == msg.hdr.nlmsg_type); in ATF_TC_BODY()
323 ATF_REQUIRE(reply.rtm.rtm_type == msg.rtm.rtm_type); in ATF_TC_BODY()
324 ATF_REQUIRE(reply.rtm.rtm_dst_len == msg.rtm.rtm_dst_len); in ATF_TC_BODY()
[all …]
/freebsd/stand/libsa/
H A Drpc.c112 struct rpc_reply *reply; in rpc_call() local
165 recvrpc, &ptr, (void **)&reply, NULL); in rpc_call()
174 if (cc <= sizeof(*reply)) { in rpc_call()
184 auth = &reply->rp_u.rpu_rok.rok_auth; in rpc_call()
195 x = ntohl(reply->rp_u.rpu_rok.rok_status); in rpc_call()
203 rsize = cc - sizeof(*reply); in rpc_call()
204 *rdata = (void *)((uintptr_t)reply + sizeof(*reply)); in rpc_call()
218 struct rpc_reply *reply; in recvrpc() local
229 n = readudp(d, &ptr, (void **)&reply, tleft); in recvrpc()
235 x = ntohl(reply->rp_xid); in recvrpc()
[all …]
/freebsd/contrib/wpa/wpa_supplicant/
H A Dctrl_iface_udp.c201 char *reply; local
202 reply = os_malloc(7 + 2 * COOKIE_LEN + 1);
203 if (reply == NULL) {
208 os_memcpy(reply, "COOKIE=", 7);
209 wpa_snprintf_hex(reply + 7, 2 * COOKIE_LEN + 1,
213 return reply;
233 char *reply = NULL; local
283 reply = wpa_supplicant_ctrl_iface_get_cookie(priv, &reply_len);
340 reply = wpa_supplicant_ctrl_iface_process(wpa_s, pos,
345 if (reply) {
[all …]
/freebsd/sbin/fsck_ffs/
H A Dpass2.c69 if (reply("ALLOCATE") == 0) { in pass2()
79 if (reply("REALLOCATE")) { in pass2()
86 if (reply("CONTINUE") == 0) { in pass2()
96 if (reply("REALLOCATE")) { in pass2()
103 if (reply("FIX") == 0) { in pass2()
155 if (reply("FIX") == 1) { in pass2()
174 if (preen || reply("ADJUST") == 1) { in pass2()
263 else if (reply("FIX") == 0) in pass2()
297 if (reply("FIX") == 1) { in pass2check()
304 if (reply("FIX") == 1) { in pass2check()
[all …]
/freebsd/crypto/openssh/
H A Dauth-pam.c401 struct pam_response *reply; in sshpam_thread_conv() local
416 if ((reply = calloc(n, sizeof(*reply))) == NULL) in sshpam_thread_conv()
419 free(reply); in sshpam_thread_conv()
443 &reply[i].resp, NULL)) != 0) in sshpam_thread_conv()
463 *resp = reply; in sshpam_thread_conv()
468 free(reply[i].resp); in sshpam_thread_conv()
470 free(reply); in sshpam_thread_conv()
630 struct pam_response *reply; in sshpam_store_conv() local
639 if ((reply = calloc(n, sizeof(*reply))) == NULL) in sshpam_store_conv()
650 reply[i].resp_retcode = PAM_SUCCESS; in sshpam_store_conv()
[all …]

12345678910>>...14