/osnet-11/usr/src/lib/libslp/clib/ |
H A D | DAAdvert.c | 39 SLPError slp_unpackDAAdvert(char *reply, char **surl, char **scopes, argument 52 len = slp_get_length(reply); 53 off = SLP_HDRLEN + slp_get_langlen(reply); 55 if ((err = slp_get_sht(reply, len, &off, &protoErrCode)) != SLP_OK) 64 iov[0].iov_base = reply + off; 66 if ((err = slp_get_sht(reply, len, &off, &dummy)) != SLP_OK) { 69 if ((err = slp_get_sht(reply, len, &off, &dummy)) != SLP_OK) { 75 iov[1].iov_base = reply + off; 77 if ((err = slp_get_string(reply, len, &off, surl)) != SLP_OK) { 83 iov[3].iov_base = reply [all...] |
H A D | SAAdvert.c | 40 SLPError slp_unpackSAAdvert(char *reply, char **surl, argument 52 len = slp_get_length(reply); 53 off = SLP_HDRLEN + slp_get_langlen(reply); 56 iov[0].iov_base = reply + off; 58 if ((err = slp_get_string(reply, len, &off, surl)) != SLP_OK) { 64 iov[2].iov_base = reply + off; 66 if ((err = slp_get_string(reply, len, &off, scopes)) != SLP_OK) { 72 iov[1].iov_base = reply + off; 74 if ((err = slp_get_string(reply, len, &off, attrs)) != SLP_OK) { 80 if ((err = slp_get_byte(reply, le [all...] |
H A D | SLPGetRefreshInterval.c | 48 char *reply = NULL; /* reply from slpd */ local 74 if (slp_send2slpd(msg, &reply) != SLP_OK) { 78 (void) slp_UnpackAttrReply(hp, reply, refresh_interval_cb, 87 if (reply) free(reply);
|
H A D | slp_ipc.c | 147 * Sends 'msg' to slpd, placing the response in 'reply'. Caller should 148 * free memory associated with 'reply'. All IPC is handled transparantly 152 SLPError slp_send2slpd(const char *msg, char **reply) { argument 157 return (slp_send2slpd_iov(iov, 1, reply)); 160 SLPError slp_send2slpd_iov(struct iovec *msg, int iovlen, char **reply) { argument 166 *reply = NULL; 228 err = slp_tcp_read(slpdfd, reply); 236 if (err == SLP_OK && slp_get_errcode(*reply) != 0) {
|
H A D | SLPFindSrvTypes.c | 72 static SLPBoolean UnpackSrvTypesReply(slp_handle_impl_t *hp, char *reply, argument 82 if (!reply) { 97 /* parse reply into params */ 98 len = slp_get_length(reply); 99 off = SLP_HDRLEN + slp_get_langlen(reply); 101 if (slp_get_sht(reply, len, &off, &protoErrCode) != SLP_OK) 109 if (slp_get_string(reply, len, &off, &pcSrvTypes) != SLP_OK)
|
H A D | slp_da_cache.c | 43 * table. Associated with each query is a reply (in the format of an 48 * slp_put_das_cached: adds a reply to the cache 86 const char *reply; member in struct:cache_entry 98 * Searches the cache for the reply to 'query'. Returns the reply if 104 char *reply = NULL; local 123 /* copy out the reply */ 124 if (!(reply = malloc((*ans)->reply_len))) { 129 (void) memcpy(reply, (*ans)->reply, (*an 149 slp_put_das_cached(const char *query, const char *reply, unsigned int len) argument [all...] |
H A D | slp_ua_common.c | 126 char *reply; local 138 reply = slp_dequeue(hp->q); 139 /* reply == NULL if no more available or SLPClosed */ 140 cont = args->msg_cb(hp, reply, args->cb, args->cookie, 143 if (reply) { 144 free(reply);
|
H A D | SLPFindAttrs.c | 105 SLPBoolean slp_UnpackAttrReply(slp_handle_impl_t *hp, char *reply, argument 118 if (!reply) { 132 /* parse reply into params */ 133 len = slp_get_length(reply); 134 off = SLP_HDRLEN + slp_get_langlen(reply); 136 if (slp_get_sht(reply, len, &off, &protoErrCode) != SLP_OK) 144 attr_tbv = reply + off; 146 if (slp_get_string(reply, len, &off, &pcAttrList) != SLP_OK) 151 if (slp_get_byte(reply, len, &off, &auth_cnt) != SLP_OK) { 164 reply 196 unpackDAAdvert_attr(slp_handle_impl_t *hp, char *reply, SLPAttrCallback cb, void *cookie, void **collator, int *numResults) argument 253 unpackSAAdvert_attr(slp_handle_impl_t *hp, char *reply, SLPAttrCallback cb, void *cookie, void **collator, int *numResults) argument [all...] |
H A D | SLPFindSrvs.c | 106 SLPBoolean slp_unpackSrvReply(slp_handle_impl_t *hp, char *reply, argument 116 if (!reply) { 126 len = slp_get_length(reply); 127 off = SLP_HDRLEN + slp_get_langlen(reply); 129 if (slp_get_sht(reply, len, &off, &protoErrCode) != SLP_OK) 137 if (slp_get_sht(reply, len, &off, &urlCount) != SLP_OK) 151 if (slp_get_sht(reply, len, &off, &sLifetime) != SLP_OK) 154 url_tbv = reply + off; 156 if (slp_get_string(reply, len, &off, &pcSrvURL) != SLP_OK) 161 if (slp_get_byte(reply, le 224 unpackDAAdvert_srv(slp_handle_impl_t *hp, char *reply, SLPSrvURLCallback cb, void *cookie, void **collator, int *numResults) argument 282 unpackSAAdvert_srv(slp_handle_impl_t *hp, char *reply, SLPSrvURLCallback cb, void *cookie, void **collator, int *numResults) argument [all...] |
H A D | SLPReg.c | 36 * reply. 43 * reply from slpd 56 * code found in the reply from slpd 627 * 'reply' should point to the beginning of the header. 629 static SLPError UnpackSrvAck(char *reply, SLPError *ans) { argument 632 char *p = reply + SLP_HDRLEN; 634 langlen = slp_get_langlen(reply); 646 * dispatches the reply to the user callback. 650 char *reply = NULL; local 656 if ((err = slp_send2slpd_iov(msg->msgiov, msg->msgiov_len, &reply)) 763 char *reply; local [all...] |
H A D | slp_targets.c | 148 char *query, *reply; local 210 if ((err = slp_find_das(query, &reply)) != SLP_OK && 221 /* Unpack the reply */ 222 if (reply) { 227 (void) slp_unpackSrvReply(hp, reply, collect_DAs, 229 free(reply);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | mk_rep.c | 82 krb5_ap_rep reply; local 86 /* Make the reply */ 128 scratch, &reply.enc_part))) 131 if (!(retval = encode_krb5_ap_rep(&reply, &toutbuf))) { 133 KERBEROS_PROBE_KRB_AP_REP(MAKE, toutbuf, &reply, &repl); 138 memset(reply.enc_part.ciphertext.data, 0, reply.enc_part.ciphertext.length); 139 free(reply.enc_part.ciphertext.data); 140 reply.enc_part.ciphertext.length = 0; 141 reply [all...] |
H A D | rd_rep.c | 83 krb5_ap_rep *reply = NULL; local 93 retval = decode_krb5_ap_rep(inbuf, &reply); 98 scratch.length = reply->enc_part.ciphertext.length; 107 &reply->enc_part, &scratch); 110 KERBEROS_PROBE_KRB_AP_REP(READ, inbuf, reply, NULL); 120 KERBEROS_PROBE_KRB_AP_REP(READ, inbuf, reply, enc); 122 /* Check reply fields. */ 155 krb5_free_ap_rep(context, reply); 165 krb5_ap_rep * reply; local 174 if ((retval = decode_krb5_ap_rep(inbuf, &reply))) [all...] |
H A D | init_creds_ctx.h | 23 krb5_kdc_rep *reply; member in struct:_krb5_init_creds_context
|
/osnet-11/usr/src/cmd/hal/utils/ |
H A D | adt_data.c | 26 DBusMessage *reply; local 49 reply = dbus_connection_send_with_reply_and_block (bus, 58 if (reply == NULL) { 63 dbus_message_iter_init (reply, &iter); 69 dbus_message_unref (reply); 84 dbus_message_unref (reply); 95 dbus_message_unref (reply);
|
/osnet-11/usr/src/lib/libdhcpagent/common/ |
H A D | dhcpagent_util.c | 124 dhcp_ipc_reply_t *reply; local 141 error = dhcp_ipc_make_request(request, &reply, 0); 143 free(reply); 177 error = dhcp_ipc_make_request(request, &reply, 0); 179 free(reply); 194 * when printing DHCP_STATUS reply. 226 * dhcp_status_reply_to_string(): Return DHCP IPC reply of type DHCP_STATUS 233 dhcp_status_reply_to_string(dhcp_ipc_reply_t *reply) argument 239 status = dhcp_ipc_get_data(reply, &reply_size, NULL);
|
H A D | dhcpagent_ipc.c | 48 * the protocol used here is a simple request/reply scheme: a client 62 * the format of a reply is much the same: a single dhcp_ipc_reply_t; 122 * input: dhcp_ipc_request_t *: the request the reply is for 127 * output: dhcp_ipc_reply_t *: the reply on success, NULL on failure 134 dhcp_ipc_reply_t *reply = calloc(1, DHCP_IPC_REPLY_SIZE + buffer_size); local 136 if (reply == NULL) 139 reply->message_type = request->message_type; 140 reply->ipc_id = request->ipc_id; 141 reply->return_code = return_code; 142 reply 161 dhcp_ipc_get_data(dhcp_ipc_reply_t *reply, size_t *size, dhcp_data_type_t *type) argument 265 dhcp_ipc_recv_reply(int fd, dhcp_ipc_reply_t **reply, int32_t timeout) argument 328 dhcp_ipc_send_reply(int fd, dhcp_ipc_reply_t *reply) argument 369 dhcp_ipc_make_request(dhcp_ipc_request_t *request, dhcp_ipc_reply_t **reply, int32_t timeout) argument 721 dhcp_ipc_reply_t *reply; local 852 dhcp_ipc_reply_t *reply; local [all...] |
/osnet-11/usr/src/lib/libdhcpsvc/private/ |
H A D | dsvcd_synch.c | 196 dsvcd_reply_t reply; local 221 args.rbuf = (char *)&reply; 245 if (args.rbuf != (char *)&reply) { 246 (void) memcpy(&reply, args.rbuf, sizeof (reply)); 251 reply.rp_version != DSVCD_DOOR_VERSION) { 256 if (reply.rp_retval == DSVC_SUCCESS && unlockfd == -1) 260 return (reply.rp_retval); 273 dsvcd_reply_t reply; local 284 args.rbuf = (char *)&reply; [all...] |
/osnet-11/usr/src/cmd/hal/hald-runner/ |
H A D | main.c | 69 DBusMessage *reply; local 96 /* let run_request_run handle the reply */ 102 reply = dbus_message_new_error(msg, "org.freedesktop.HalRunner.Malformed", 104 dbus_connection_send(con, reply, NULL); 105 dbus_message_unref(reply); 111 DBusMessage *reply; local 125 reply = dbus_message_new_method_return(msg); 126 dbus_message_append_args (reply, 131 reply = dbus_message_new_error(msg, "org.freedesktop.HalRunner.Failed", 134 dbus_connection_send(con, reply, NUL 149 DBusMessage *reply = NULL; local 174 DBusMessage *reply; local [all...] |
H A D | runner.c | 109 DBusMessage *reply; local 116 reply = dbus_message_new_method_return(msg); 117 g_assert(reply != NULL); 119 dbus_message_iter_init_append(reply, &iter); 126 dbus_connection_send(con, reply, NULL); 127 dbus_message_unref(reply); 195 /* Time is up, kill the process, send reply that it was killed! 234 /* Run the given request and reply it's result on msg */
|
/osnet-11/usr/src/cmd/sendmail/src/ |
H A D | sm_resolve.c | 158 ** PARSE_DNS_REPLY -- parse DNS reply data. 402 unsigned char *reply; local 428 reply = (unsigned char *)&reply_buf; 429 len = res_search(domain, rr_class, rr_type, reply, SMRBSIZE); 445 reply = (unsigned char *)sm_malloc(IP_MAXPACKET); 446 if (reply == NULL) 450 reply, IP_MAXPACKET); 459 if (len >= 0 && len < IP_MAXPACKET && reply != NULL) 460 r = parse_dns_reply(reply, len); 461 if (reply ! [all...] |
/osnet-11/usr/src/grub/grub-0.97/netboot/ |
H A D | nfs.h | 30 /* Block size used for NFS read accesses. A RPC reply packet (including all 59 } reply; member in union:rpc_t::__anon217
|
/osnet-11/usr/src/lib/krb5/plugins/preauth/encrypted_challenge/ |
H A D | encrypted_challenge_main.c | 278 * If this fails, we won't generate a reply to the client. That 309 krb5_kdc_req *request, krb5_kdc_rep *reply, 307 kdc_return_preauth(krb5_context context, krb5_pa_data *padata, struct _krb5_db_entry_new *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, struct _krb5_key_data *client_keys, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc get_entry_proc, void *pa_module_context, void **pa_request_context) argument
|
/osnet-11/usr/src/cmd/hal/addons/network-devices/ |
H A D | addon-network-discovery.c | 153 DBusMessage *reply; local 209 if ((reply = dbus_message_new_method_return(message)) == NULL) { 210 HAL_WARNING(("Could not allocate memory for the DBus reply")); 214 dbus_message_append_args(reply, DBUS_TYPE_INT32, &rc, 217 if (!dbus_connection_send(connection, reply, NULL)) { 218 HAL_WARNING(("Could not sent reply")); 221 dbus_message_unref(reply);
|
/osnet-11/usr/src/cmd/hal/addons/storage/ |
H A D | addon-storage.c | 139 DBusMessage *reply = NULL; local 177 if (!(reply = dbus_connection_send_with_reply_and_block (dbus_connection, msg, -1, &error))) { 195 if (reply != NULL) 196 dbus_message_unref (reply);
|