/freebsd/sys/dev/pst/ |
H A D | pst-iop.c | 52 struct i2o_single_reply *reply; member 121 struct i2o_get_param_reply *reply; in iop_attach() local 130 if ((reply = iop_get_util_params(sc, sc->lct[i].local_tid, in iop_attach() 134 (struct i2o_device_identity *)reply->result; in iop_attach() 139 free(reply, M_PSTIOP); in iop_attach() 169 struct i2o_single_reply *reply; in iop_intr() local 179 reply = (struct i2o_single_reply *)(sc->obase + (mfa - sc->phys_obase)); in iop_intr() 181 /* if this is an event register reply, shout! */ in iop_intr() 182 if (reply->function == I2O_UTIL_EVENT_REGISTER) { in iop_intr() 184 (struct i2o_util_event_reply_message *)reply; in iop_intr() 207 volatile u_int32_t reply = 0; iop_reset() local 240 volatile u_int32_t reply = 0; iop_init_outqueue() local 295 struct i2o_get_lct_reply *reply; iop_get_lct() local 340 struct i2o_get_param_reply *reply; iop_get_util_params() local 415 iop_done(struct iop_softc * sc,u_int32_t mfa,struct i2o_single_reply * reply) iop_done() argument 428 struct i2o_single_reply *reply; iop_queue_wait_msg() local [all...] |
/freebsd/sys/dev/mpr/ |
H A D | mpr_config.c | 74 MPI2_CONFIG_REPLY *reply; in mpr_config_get_ioc_pg8() local 99 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; in mpr_config_get_ioc_pg8() 100 if (error || (reply == NULL)) { in mpr_config_get_ioc_pg8() 111 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; in mpr_config_get_ioc_pg8() 112 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); in mpr_config_get_ioc_pg8() 158 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; in mpr_config_get_ioc_pg8() 159 if (error || (reply == NULL)) { in mpr_config_get_ioc_pg8() 170 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; in mpr_config_get_ioc_pg8() 171 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); in mpr_config_get_ioc_pg8() 206 MPI2_CONFIG_REPLY *reply; in mpr_config_get_iounit_pg8() local [all …]
|
/freebsd/usr.sbin/mpsutil/ |
H A D | mps_cmd.c | 285 MPI2_SEP_REPLY reply; in mps_set_slot_status() local 295 if (mps_pass_command(fd, &req, sizeof(req), &reply, sizeof(reply), in mps_set_slot_status() 299 if (!IOC_STATUS_SUCCESS(le16toh(reply.IOCStatus))) in mps_set_slot_status() 309 MPI2_CONFIG_REPLY reply; in mps_read_config_page_header() local 318 if (mps_pass_command(fd, &req, sizeof(req), &reply, sizeof(reply), in mps_read_config_page_header() 322 if (!IOC_STATUS_SUCCESS(le16toh(reply.IOCStatus))) { in mps_read_config_page_header() 324 *IOCStatus = reply.IOCStatus; in mps_read_config_page_header() 329 *header = reply.Header; in mps_read_config_page_header() 337 MPI2_CONFIG_REPLY reply; in mps_read_ext_config_page_header() local 347 if (mps_pass_command(fd, &req, sizeof(req), &reply, sizeof(reply), in mps_read_ext_config_page_header() [all …]
|
H A D | mps_set.c | 47 MPI2_CONFIG_REPLY reply; in set_ncq() local 52 bzero(&reply, sizeof(reply)); in set_ncq() 98 if (mps_pass_command(fd, &req, sizeof(req) - sizeof(req.PageBufferSGE), &reply, sizeof(reply), in set_ncq() 105 if (!IOC_STATUS_SUCCESS(reply.IOCStatus)) { in set_ncq() 108 warn("%s", mps_ioc_status(reply.IOCStatus)); in set_ncq()
|
/freebsd/crypto/heimdal/appl/ftp/ftpd/ |
H A D | ftpcmd.y | 164 reply(500, "Illegal PORT range rejected."); 171 reply(200, "PORT command successful."); 204 reply(200, "Type set to A."); 208 reply(504, "Form must be N."); 212 reply(504, "Type E not implemented."); 216 reply(200, "Type set to I."); 223 reply(200, 227 reply(504, "Byte size must be 8."); 240 reply(200, "STRU F ok."); 244 reply(504, "Unimplemented STRU type."); [all …]
|
H A D | ftpd.c | 393 reply(530, "System not available."); in main() 400 reply(220, "%s FTP server (%s" in main() 493 reply(530, "No login allowed without authorization."); in user() 499 reply(530, "Can't change user from guest login."); in user() 502 reply(530, "Can't change user from chroot user."); in user() 513 reply(530, "User %s access denied.", name); in user() 518 reply(331, "Guest login ok, type your name as password."); in user() 520 reply(530, "User %s unknown.", name); in user() 537 reply(530, "Only authorized and anonymous login allowed."); in user() 549 reply(530, "User %s access denied.", name); in user() [all …]
|
H A D | ftpcmd.c | 1807 reply(500, "Illegal PORT range rejected."); in yyparse() 1814 reply(200, "PORT command successful."); in yyparse() 1862 reply(200, "Type set to A."); in yyparse() 1866 reply(504, "Form must be N."); in yyparse() 1870 reply(504, "Type E not implemented."); in yyparse() 1874 reply(200, "Type set to I."); in yyparse() 1881 reply(200, in yyparse() 1885 reply(504, "Byte size must be 8."); in yyparse() 1901 reply(200, "STRU F ok."); in yyparse() 1905 reply(504, "Unimplemented STRU type."); in yyparse() [all …]
|
/freebsd/sys/dev/mps/ |
H A D | mps_config.c | 74 MPI2_CONFIG_REPLY *reply = NULL; in mps_config_get_ioc_pg8() local 99 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; in mps_config_get_ioc_pg8() 100 if (error || (reply == NULL)) { in mps_config_get_ioc_pg8() 111 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; in mps_config_get_ioc_pg8() 112 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); in mps_config_get_ioc_pg8() 158 reply = (MPI2_CONFIG_REPLY *)cm->cm_reply; in mps_config_get_ioc_pg8() 159 if (error || (reply == NULL)) { in mps_config_get_ioc_pg8() 170 ioc_status = le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK; in mps_config_get_ioc_pg8() 171 bcopy(reply, mpi_reply, sizeof(MPI2_CONFIG_REPLY)); in mps_config_get_ioc_pg8() 205 MPI2_CONFIG_REPLY *reply = NULL; in mps_config_get_man_pg10() local [all …]
|
/freebsd/libexec/ftpd/ |
H A D | ftpcmd.y | 150 reply(501, "No PORT allowed after EPSV ALL."); 162 reply(500, "Invalid address rejected."); 173 reply(501, "No LPRT allowed after EPSV ALL."); 183 reply(500, "Invalid address rejected."); 203 reply(501, "No EPRT allowed after EPSV ALL."); 225 reply(500, 284 reply(500, "Invalid address rejected."); 296 reply(501, "No PASV allowed after EPSV ALL."); 303 reply(501, "No LPSV allowed after EPSV ALL."); 330 reply(200, "EPSV ALL command successful."); [all …]
|
H A D | ftpd.c | 594 reply(530, "System not available."); in main() 620 reply(220, "%s FTP server (%s) ready.", hostname, version); in main() 622 reply(220, "FTP server ready."); in main() 918 reply(421, "Ran out of memory."); in sgetsave() 983 reply(530, "Can't change user from guest login."); in user() 986 reply(530, "Can't change user from chroot user."); in user() 1001 reply(530, "User %s access denied.", name); in user() 1004 reply(530, "User %s access denied.", name); in user() 1008 reply(331, in user() 1011 reply(530, "User %s unknown.", name); in user() [all …]
|
/freebsd/tests/sys/netpfil/pf/ |
H A D | nat64.py | 107 reply = sp.sr1(packet) 110 tcp = reply.getlayer(sp.TCP) 117 reply = sp.sr1(packet) 119 tcp = reply.getlayer(sp.TCP) 138 reply = sp.sr1(packet, timeout=3) 139 print(reply.show()) 142 assert not reply.getlayer(sp.UDP) 143 icmp = reply.getlayer(sp.ICMPv6DestUnreach) 147 udp = reply.getlayer(sp.UDPerror) 160 reply = sp.sr1(packet, timeout=3) [all …]
|
/freebsd/contrib/libfido2/src/ |
H A D | u2f.c | 148 unsigned char *reply = NULL; in send_dummy_register() local 166 if ((reply = malloc(FIDO_MAXMSG)) == NULL) { in send_dummy_register() 179 if (fido_rx(dev, CTAP_CMD_MSG, reply, FIDO_MAXMSG, ms) < 2) { in send_dummy_register() 189 } while (((reply[0] << 8) | reply[1]) == SW_CONDITIONS_NOT_SATISFIED); in send_dummy_register() 194 freezero(reply, FIDO_MAXMSG); in send_dummy_register() 204 unsigned char *reply = NULL; in key_lookup() local 240 if ((reply = malloc(FIDO_MAXMSG)) == NULL) { in key_lookup() 252 if (fido_rx(dev, CTAP_CMD_MSG, reply, FIDO_MAXMSG, ms) != 2) { in key_lookup() 258 switch ((reply[0] << 8) | reply[1]) { in key_lookup() 274 freezero(reply, FIDO_MAXMSG); in key_lookup() [all …]
|
/freebsd/contrib/wpa/wpa_supplicant/dbus/ |
H A D | dbus_new_handlers_wps.c | 36 DBusMessage **reply) in wpas_dbus_handler_wps_role() argument 46 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_role() 57 *reply = wpas_dbus_error_invalid_args(message, val); in wpas_dbus_handler_wps_role() 67 DBusMessage **reply) in wpas_dbus_handler_wps_type() argument 76 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_type() 88 *reply = wpas_dbus_error_invalid_args(message, val); in wpas_dbus_handler_wps_type() 98 DBusMessage **reply) in wpas_dbus_handler_wps_bssid() argument 109 *reply = wpas_dbus_error_invalid_args( in wpas_dbus_handler_wps_bssid() 118 *reply = wpas_dbus_error_invalid_args(message, in wpas_dbus_handler_wps_bssid() 129 DBusMessage **reply) in wpas_dbus_handler_wps_pin() argument [all …]
|
H A D | dbus_new_handlers.c | 102 DBusMessage *reply; in wpas_dbus_error_invalid_args() local 104 reply = dbus_message_new_error( in wpas_dbus_error_invalid_args() 108 dbus_message_append_args(reply, DBUS_TYPE_STRING, &arg, in wpas_dbus_error_invalid_args() 111 return reply; in wpas_dbus_error_invalid_args() 769 DBusMessage *reply = NULL; in wpas_dbus_handler_create_interface() local 856 reply = dbus_message_new_error( in wpas_dbus_handler_create_interface() 873 reply = wpas_dbus_error_unknown_error( in wpas_dbus_handler_create_interface() 891 reply = dbus_message_new_method_return(message); in wpas_dbus_handler_create_interface() 892 dbus_message_append_args(reply, DBUS_TYPE_OBJECT_PATH, in wpas_dbus_handler_create_interface() 895 reply = wpas_dbus_error_unknown_error( in wpas_dbus_handler_create_interface() [all …]
|
/freebsd/crypto/heimdal/lib/kadm5/ |
H A D | chpass_c.c | 48 krb5_data reply; in kadm5_c_chpass_principal() local 66 ret = _kadm5_client_recv(context, &reply); in kadm5_c_chpass_principal() 69 sp = krb5_storage_from_data (&reply); in kadm5_c_chpass_principal() 72 krb5_data_free (&reply); in kadm5_c_chpass_principal() 78 krb5_data_free (&reply); in kadm5_c_chpass_principal() 93 krb5_data reply; in kadm5_c_chpass_principal_with_key() local 114 ret = _kadm5_client_recv(context, &reply); in kadm5_c_chpass_principal_with_key() 117 sp = krb5_storage_from_data (&reply); in kadm5_c_chpass_principal_with_key() 120 krb5_data_free (&reply); in kadm5_c_chpass_principal_with_key() 126 krb5_data_free (&reply); in kadm5_c_chpass_principal_with_key()
|
/freebsd/crypto/heimdal/kdc/ |
H A D | process.c | 54 krb5_data *reply, in kdc_as_req() argument 71 reply, from, addr, datagram_reply); in kdc_as_req() 81 krb5_data *reply, in kdc_tgs_req() argument 97 ret = _kdc_tgs_rep(context, config, &req, reply, in kdc_tgs_req() 109 krb5_data *reply, in kdc_digest() argument 126 ret = _kdc_do_digest(context, config, &digestreq, reply, from, addr); in kdc_digest() 139 krb5_data *reply, in kdc_kx509() argument 156 ret = _kdc_do_kx509(context, config, &kx509req, reply, from, addr); in kdc_kx509() 186 krb5_data *reply, in krb5_kdc_process_request() argument 202 reply, from, addr, datagram_reply, in krb5_kdc_process_request() [all …]
|
/freebsd/contrib/wpa/src/radius/ |
H A D | radius_das.c | 40 struct radius_msg *reply; in radius_das_disconnect() local 175 reply = radius_msg_new(error ? RADIUS_CODE_DISCONNECT_NAK : in radius_das_disconnect() 177 if (reply == NULL) in radius_das_disconnect() 180 if (!radius_msg_add_msg_auth(reply)) { in radius_das_disconnect() 181 radius_msg_free(reply); in radius_das_disconnect() 186 if (!radius_msg_add_attr_int32(reply, RADIUS_ATTR_ERROR_CAUSE, in radius_das_disconnect() 188 radius_msg_free(reply); in radius_das_disconnect() 193 return reply; in radius_das_disconnect() 202 struct radius_msg *reply; in radius_das_coa() local 371 reply = radius_msg_new(error ? RADIUS_CODE_COA_NAK : in radius_das_coa() [all …]
|
/freebsd/contrib/ntp/sntp/libevent/include/event2/ |
H A D | rpc.h | 180 struct rplystruct* reply; \ 197 struct evrpc_pool *pool, void *request, void *reply, 220 pool, request, reply, cb, cbarg) \ argument 221 evrpc_make_request_ctx(pool, request, reply, \ 241 struct reqstruct *request, struct rplystruct *reply, \ 245 return evrpc_send_request_generic(pool, request, reply, \ 330 #define EVRPC_REGISTER(base, name, request, reply, callback, cbarg) \ argument 336 (void *(*)(void *))reply##_new_with_arg, NULL, \ 337 (void (*)(void *))reply##_free, \ 338 (int (*)(void *))reply##_complete, \ [all …]
|
/freebsd/contrib/libevent/include/event2/ |
H A D | rpc.h | 180 struct rplystruct* reply; \ 197 struct evrpc_pool *pool, void *request, void *reply, 220 pool, request, reply, cb, cbarg) \ argument 221 evrpc_make_request_ctx(pool, request, reply, \ 241 struct reqstruct *request, struct rplystruct *reply, \ 245 return evrpc_send_request_generic(pool, request, reply, \ 330 #define EVRPC_REGISTER(base, name, request, reply, callback, cbarg) \ argument 336 (void *(*)(void *))reply##_new_with_arg, NULL, \ 337 (void (*)(void *))reply##_free, \ 338 (int (*)(void *))reply##_complete, \ [all …]
|
/freebsd/contrib/pam_modules/pam_passwdqc/ |
H A D | pam_macros.h | 16 #define _pam_drop_reply(/* struct pam_response * */ reply, /* int */ replies) \ argument 21 if ((reply)[i].resp) { \ 22 _pam_overwrite((reply)[i].resp); \ 23 free((reply)[i].resp); \ 25 if ((reply)) free((reply)); \
|
/freebsd/tests/sys/netlink/ |
H A D | netlink_socket.c | 286 } reply, msg = { in ATF_TC_BODY() local 310 ATF_REQUIRE(recv(fd, &reply, sizeof(reply), 0) == sizeof(reply)); in ATF_TC_BODY() 311 ATF_REQUIRE(reply.hdr.nlmsg_type == msg.hdr.nlmsg_type); in ATF_TC_BODY() 312 ATF_REQUIRE(reply.rtm.rtm_type == msg.rtm.rtm_type); in ATF_TC_BODY() 313 ATF_REQUIRE(reply.rtm.rtm_dst_len == msg.rtm.rtm_dst_len); in ATF_TC_BODY() 314 ATF_REQUIRE(nla = nla_RTA_DST(&reply.rta_dst, sizeof(reply))); in ATF_TC_BODY() 321 ATF_REQUIRE(recv(fd, &reply, sizeof(reply), 0) == sizeof(reply)); in ATF_TC_BODY() 322 ATF_REQUIRE(reply.hdr.nlmsg_type == msg.hdr.nlmsg_type); in ATF_TC_BODY() 323 ATF_REQUIRE(reply.rtm.rtm_type == msg.rtm.rtm_type); in ATF_TC_BODY() 324 ATF_REQUIRE(reply.rtm.rtm_dst_len == msg.rtm.rtm_dst_len); in ATF_TC_BODY() [all …]
|
/freebsd/stand/libsa/ |
H A D | rpc.c | 112 struct rpc_reply *reply; in rpc_call() local 165 recvrpc, &ptr, (void **)&reply, NULL); in rpc_call() 174 if (cc <= sizeof(*reply)) { in rpc_call() 184 auth = &reply->rp_u.rpu_rok.rok_auth; in rpc_call() 195 x = ntohl(reply->rp_u.rpu_rok.rok_status); in rpc_call() 203 rsize = cc - sizeof(*reply); in rpc_call() 204 *rdata = (void *)((uintptr_t)reply + sizeof(*reply)); in rpc_call() 218 struct rpc_reply *reply; in recvrpc() local 229 n = readudp(d, &ptr, (void **)&reply, tleft); in recvrpc() 235 x = ntohl(reply->rp_xid); in recvrpc() [all …]
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | ctrl_iface_udp.c | 201 char *reply; local 202 reply = os_malloc(7 + 2 * COOKIE_LEN + 1); 203 if (reply == NULL) { 208 os_memcpy(reply, "COOKIE=", 7); 209 wpa_snprintf_hex(reply + 7, 2 * COOKIE_LEN + 1, 213 return reply; 233 char *reply = NULL; local 283 reply = wpa_supplicant_ctrl_iface_get_cookie(priv, &reply_len); 340 reply = wpa_supplicant_ctrl_iface_process(wpa_s, pos, 345 if (reply) { [all …]
|
/freebsd/sbin/fsck_ffs/ |
H A D | pass2.c | 69 if (reply("ALLOCATE") == 0) { in pass2() 79 if (reply("REALLOCATE")) { in pass2() 86 if (reply("CONTINUE") == 0) { in pass2() 96 if (reply("REALLOCATE")) { in pass2() 103 if (reply("FIX") == 0) { in pass2() 155 if (reply("FIX") == 1) { in pass2() 174 if (preen || reply("ADJUST") == 1) { in pass2() 263 else if (reply("FIX") == 0) in pass2() 297 if (reply("FIX") == 1) { in pass2check() 304 if (reply("FIX") == 1) { in pass2check() [all …]
|
/freebsd/crypto/openssh/ |
H A D | auth-pam.c | 401 struct pam_response *reply; in sshpam_thread_conv() local 416 if ((reply = calloc(n, sizeof(*reply))) == NULL) in sshpam_thread_conv() 419 free(reply); in sshpam_thread_conv() 443 &reply[i].resp, NULL)) != 0) in sshpam_thread_conv() 463 *resp = reply; in sshpam_thread_conv() 468 free(reply[i].resp); in sshpam_thread_conv() 470 free(reply); in sshpam_thread_conv() 630 struct pam_response *reply; in sshpam_store_conv() local 639 if ((reply = calloc(n, sizeof(*reply))) == NULL) in sshpam_store_conv() 650 reply[i].resp_retcode = PAM_SUCCESS; in sshpam_store_conv() [all …]
|