/illumos-gate/usr/src/boot/lib/libstand/ |
H A D | rpc.c | 117 struct rpc_reply *reply; local 178 recv_head -= sizeof(*reply); 191 if (cc <= sizeof(*reply)) { 199 * Check the RPC reply status. 202 reply = (struct rpc_reply *)recv_head; 203 auth = &reply->rp_u.rpu_rok.rok_auth; 208 printf("callrpc: reply auth != NULL\n"); 213 x = ntohl(reply->rp_u.rpu_rok.rok_status); 219 recv_head += sizeof(*reply); 232 struct rpc_reply *reply; local [all...] |
/illumos-gate/usr/src/cmd/backup/restore/ |
H A D | utilities.c | 453 * Elicit a reply. 456 reply(char *question) function 501 if (reply(gettext("abort")) == GOOD) { 502 if (reply(gettext("dump core")) == GOOD) 521 if (reply(gettext("abort")) == GOOD) { 522 if (reply(gettext("dump core")) == GOOD)
|
/illumos-gate/usr/src/cmd/cmd-inet/lib/nwamd/ |
H A D | ncu_ip.c | 151 dhcp_ipc_reply_t *reply; local 184 err = dhcp_ipc_make_request(request, &reply, DHCP_IPC_WAIT_DEFAULT); 185 if (err != 0 || reply->return_code != 0) { 187 dhcp_ipc_strerror(err == 0 ? reply->return_code : err)); 190 /* get data from the reply */ 191 opt = dhcp_ipc_get_data(reply, &opt_len, NULL); 207 (void) snprintf(errmsg, LINE_MAX, "cannot decode reply"); 212 free(reply); 218 free(reply);
|
/illumos-gate/usr/src/cmd/cmd-inet/sbin/dhcpagent/ |
H A D | ipc_action.c | 198 * send_ok_reply(): sends an "ok" reply to a request and closes the ipc 201 * input: ipc_action_t *: the request to reply to 213 * send_error_reply(): sends an "error" reply to a request and closes the ipc 216 * input: ipc_action_t *: the request to reply to 229 * send_data_reply(): sends a reply to a request and closes the ipc connection 231 * input: ipc_action_t *: the request to reply to 234 * dhcp_data_type_t: the type of the payload in the reply 235 * const void *: the payload for the reply, or NULL if there is no 246 dhcp_ipc_reply_t *reply; local 252 reply [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/sbin/dhcpinfo/ |
H A D | dhcpinfo.c | 58 dhcp_ipc_reply_t *reply; local 163 * send the request to the agent and reap the reply 172 error = dhcp_ipc_make_request(request, &reply, DHCP_IPC_WAIT_DEFAULT); 173 if (error != 0 || reply->return_code != 0) { 176 error = reply->return_code; 187 opt = dhcp_ipc_get_data(reply, &opt_len, NULL); 237 "reply\n", argv[0]);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/chat/ |
H A D | chat.c | 906 char *reply; local 949 * Fetch the expect and reply string. 958 reply = expect_strtok (s, "-"); 967 * If there is a sub-reply string then send it. Otherwise any condition 970 if (reply == (char *) 0 || exit_code != 3) 973 chat_send (reply); 1011 * process the reply string
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/netstat/ |
H A D | netstat.c | 758 * Each reply consists of a ctl part for one fixed structure 3368 dhcp_ipc_reply_t *reply; local 3375 error = dhcp_ipc_make_request(request, &reply, DHCP_IPC_WAIT_DEFAULT); 3382 error = reply->return_code; 3384 free(reply); 3388 free(reply); 3398 (void) printf("%s", dhcp_status_reply_to_string(reply)); 3399 free(reply);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | auth.c | 1205 struct pam_response *reply = NULL; local 1209 reply = malloc(sizeof(struct pam_response) * num_msg); 1210 if (reply == NULL) 1216 reply[replies].resp_retcode = PAM_SUCCESS; 1217 reply[replies].resp = COPY_STRING(PAM_username); 1221 reply[replies].resp_retcode = PAM_SUCCESS; 1222 reply[replies].resp = COPY_STRING(PAM_password); 1229 reply[replies].resp_retcode = PAM_SUCCESS; 1230 reply[replies].resp = NULL; 1234 free (reply); [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | auth.h | 78 void (*reply)(struct XauthP *, unsigned char *, int); member in struct:XauthP
|
H A D | encrypt.h | 86 int (*reply)(unsigned char *, int); member in struct:__anon144
|
H A D | kerberos5.c | 450 /* the rest of the reply should contain a krb_ap_rep */ 451 krb5_ap_rep_enc_part *reply; local 459 &inbuf, &reply); 467 krb5_free_ap_rep_enc_part(telnet_context, reply);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/ilbd/ |
H A D | ilbd_nat.c | 73 * rbuf: reply buffer to be filled in. 74 * rbufsz: reply buffer size. 86 ilb_show_info_t *reply; local 96 * want to continue, reset the current client and reply OK. 111 reply = (ilb_show_info_t *)&((ilb_comm_t *)rbuf)->ic_data; 115 * reply. 144 reply->sn_num = kcmd->num_nat; 145 *rbufsz += reply->sn_num * sizeof (ilb_nat_info_t); 161 nat_ret = (ilb_nat_info_t *)&reply->sn_data; 193 * rbuf: reply buffe 207 ilb_show_info_t *reply; local [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/in.mpathd/ |
H A D | mpd_probe.c | 37 * or ICMP Echo reply. Packet format is same for both IPv4 and IPv6 64 struct pr_icmp *reply, struct in6_addr fromaddr, struct timeval *recv_tvp); 66 struct pr_icmp *reply, struct in6_addr fromaddr); 68 struct pr_icmp *reply, struct in6_addr fromaddr); 88 * Probe success - A matching probe reply received before CRTT ms has elapsed 90 * Probe failure - No probe reply received and more than CRTT ms has elapsed 305 * not see a reply to the probe and will fail the interface if normal 379 struct pr_icmp *reply; local 437 * reply, starting from the icmp hdr. 441 reply 507 struct pr_icmp *reply; local 617 incoming_rtt_reply(struct phyint_instance *pii, struct pr_icmp *reply, struct in6_addr fromaddr) argument 705 incoming_echo_reply(struct phyint_instance *pii, struct pr_icmp *reply, struct in6_addr fromaddr, struct timeval *recv_tvp) argument 1121 incoming_mcast_reply(struct phyint_instance *pii, struct pr_icmp *reply, struct in6_addr fromaddr) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/in.ndpd/ |
H A D | ndp.c | 320 dhcp_ipc_reply_t *reply = NULL; local 335 error = dhcp_ipc_make_request(request, &reply, 0); 343 error = reply->return_code; 344 free(reply);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/inetd/ |
H A D | tlx.c | 260 struct t_optmgmt request, reply; local 280 reply.opt.maxlen = sizeof (struct opthdr) + optlen; 281 reply.opt.buf = (char *)&optbuf; 282 reply.flags = 0; 284 if ((t_optmgmt(fd, &request, &reply) == -1) || 285 (reply.flags != T_SUCCESS)) {
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | mDNSEmbeddedAPI.h | 522 DNSMessage *reply; member in struct:tcpInfo_t 922 mDNSu16 err; // Or UDP reply port, in setup request 1243 mDNSu8 *Reply; // xml reply from router 1427 regState_Pending = 1, // update sent, reply not received 1428 regState_Registered = 2, // update sent, reply received 1429 regState_DeregPending = 3, // dereg sent, reply not received 2001 mDNSu8 TimeoutQuestion; // Timeout this question if there is no reply in configured time
|
H A D | uDNS.c | 323 // negative response so that applications get a reply. We also need to reinitialize the DNS servers 1360 // It's perfectly fine for this socket to close after the first reply. The server might 1362 // We'll only log this event if we've never received a reply before. 1388 tcpInfo->reply = mDNSPlatformMemAllocate(tcpInfo->replylen); 1389 if (!tcpInfo->reply) { LogMsg("ERROR: tcpCallback - malloc failed"); err = mStatus_NoMemoryErr; goto exit; } 1392 n = mDNSPlatformReadTCP(sock, ((char *)tcpInfo->reply) + (tcpInfo->nread - 2), tcpInfo->replylen - (tcpInfo->nread - 2), &closed); 1429 DNSMessage *reply = tcpInfo->reply; local 1430 mDNSu8 *end = (mDNSu8 *)tcpInfo->reply + tcpInfo->replylen; 1435 tcpInfo->reply 3730 PCPMapReply *reply = (PCPMapReply*)pkt; local [all...] |
H A D | uds_daemon.c | 167 // reply, termination, error, and client context info 171 struct reply_state *replies; // corresponding (active) reply list 521 reply_state *reply; local 529 reply = mallocL("reply_state", sizeof(reply_state) + datalen - sizeof(reply_hdr)); 530 if (!reply) FatalError("ERROR: malloc"); 532 reply->next = mDNSNULL; 533 reply->totallen = (mDNSu32)datalen + sizeof(ipc_msg_hdr); 534 reply->nwriten = 0; 536 reply->mhdr->version = VERSION; 537 reply 1103 reply_state *reply = create_reply(reg_record_reply_op, len, request); local 3867 reply_state *reply; local 3907 reply_state *reply; local [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | wpa.c | 805 struct wpa_eapol_key *reply; local 823 rlen = sizeof (*ethhdr) + sizeof (*hdr) + sizeof (*reply); 837 hdr->length = htons(sizeof (*reply)); 839 reply = (struct wpa_eapol_key *)(hdr + 1); 840 reply->type = wpa_s->proto == WPA_PROTO_RSN ? 849 reply->key_info = BE_16(key_info); 850 reply->key_length = 0; 851 (void) memcpy(reply->replay_counter, wpa_s->request_counter, 855 reply->key_data_length = BE_16(0); 859 rlen - sizeof (*ethhdr), reply 876 struct wpa_eapol_key *reply; local 1109 struct wpa_eapol_key *reply; local 1302 struct wpa_eapol_key *reply; local [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ifconfig/ |
H A D | ifconfig.c | 4310 dhcp_ipc_reply_t *reply = NULL; local 4380 error = dhcp_ipc_make_request(request, &reply, timeout); 4397 error = reply->return_code; 4400 free(reply); 4416 (void) printf("%s", dhcp_status_reply_to_string(reply)); 4420 free(reply);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ |
H A D | in.telnetd.c | 410 uchar_t reply[BUFSIZ]; local 411 uchar_t *p = reply; 416 else if (len > (sizeof (reply) - 9)) { 418 "krb5 auth reply length too large (%d)", len); 421 "krb5 auth reply length too large (%d)\n", 442 write_data_len((const char *)reply, p-reply); 710 "Kerberos auth reply: " 892 "reply\n"); 1078 * 2. Generate reply fo [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/traceroute/ |
H A D | traceroute.c | 250 * not necessarily received reply from the target (this behavior is from 1498 int reply; local 1679 reply = (*pr->check_reply_fn) (&in_msg, cc, seq, 1685 if (reply == REPLY_SHORT_PKT) { 1692 * if reply comes from a different host, print 1725 if (reply == REPLY_GOT_TARGET) { 1745 if (reply == REPLY_GOT_OTHER) { 1905 * Wait until a reply arrives or timeout occurs. If packet arrived, read it
|
/illumos-gate/usr/src/cmd/fs.d/udfs/fsck/ |
H A D | utilities.c | 204 reply(char *question) function 209 pfatal(gettext("INTERNAL ERROR: GOT TO reply()")); 350 if (reply(gettext("CONTINUE")) == 0) 483 if (reply(gettext("SALVAGE")) == 0) {
|
/illumos-gate/usr/src/cmd/fs.d/ufs/fsck/ |
H A D | utilities.c | 122 reply(caddr_t fmt, ...) function 128 pfatal("INTERNAL ERROR: GOT TO reply() in preen mode"); 394 if (reply("CONTINUE") == 0) { 413 if (preen || reply("UPDATE STANDARD SUPERBLOCK") == 1) { 857 if (reply("SALVAGE") == 0) { 1280 (reply("FILE SYSTEM STATE IN SUPERBLOCK IS WRONG; FIX") == 0))
|
/illumos-gate/usr/src/cmd/hal/addons/network-devices/ |
H A D | addon-network-discovery.c | 153 DBusMessage *reply; local 209 if ((reply = dbus_message_new_method_return(message)) == NULL) { 210 HAL_WARNING(("Could not allocate memory for the DBus reply")); 214 dbus_message_append_args(reply, DBUS_TYPE_INT32, &rc, 217 if (!dbus_connection_send(connection, reply, NULL)) { 218 HAL_WARNING(("Could not sent reply")); 221 dbus_message_unref(reply);
|