/illumos-gate/usr/src/boot/lib/libstand/ |
H A D | rpc.c | 117 struct rpc_reply *reply; local 178 recv_head -= sizeof(*reply); 191 if (cc <= sizeof(*reply)) { 199 * Check the RPC reply status. 202 reply = (struct rpc_reply *)recv_head; 203 auth = &reply->rp_u.rpu_rok.rok_auth; 208 printf("callrpc: reply auth != NULL\n"); 213 x = ntohl(reply->rp_u.rpu_rok.rok_status); 219 recv_head += sizeof(*reply); 232 struct rpc_reply *reply; local [all...] |
/illumos-gate/usr/src/cmd/allocate/ |
H A D | disk_clean.sh | 166 read reply 170 if [ "$choice" = "$reply" ]
|
H A D | wdwmsg.sh | 46 reply=$(/usr/bin/zenity $type \ 51 exit $reply
|
/illumos-gate/usr/src/cmd/backup/restore/ |
H A D | dirs.c | 693 if (reply(gettext( 708 reply(gettext("set owner/mode for '.'")) == FAIL) {
|
H A D | restore.h | 286 extern int reply(char *); 350 extern int reply();
|
H A D | tape.c | 1581 if (!yflag && !reply(gettext("continue")))
|
H A D | utilities.c | 453 * Elicit a reply. 456 reply(char *question) function 501 if (reply(gettext("abort")) == GOOD) { 502 if (reply(gettext("dump core")) == GOOD) 521 if (reply(gettext("abort")) == GOOD) { 522 if (reply(gettext("dump core")) == GOOD)
|
/illumos-gate/usr/src/cmd/cmd-inet/lib/nwamd/ |
H A D | ncu_ip.c | 151 dhcp_ipc_reply_t *reply; local 184 err = dhcp_ipc_make_request(request, &reply, DHCP_IPC_WAIT_DEFAULT); 185 if (err != 0 || reply->return_code != 0) { 187 dhcp_ipc_strerror(err == 0 ? reply->return_code : err)); 190 /* get data from the reply */ 191 opt = dhcp_ipc_get_data(reply, &opt_len, NULL); 207 (void) snprintf(errmsg, LINE_MAX, "cannot decode reply"); 212 free(reply); 218 free(reply);
|
/illumos-gate/usr/src/cmd/cmd-inet/sbin/dhcpagent/ |
H A D | ipc_action.c | 198 * send_ok_reply(): sends an "ok" reply to a request and closes the ipc 201 * input: ipc_action_t *: the request to reply to 213 * send_error_reply(): sends an "error" reply to a request and closes the ipc 216 * input: ipc_action_t *: the request to reply to 229 * send_data_reply(): sends a reply to a request and closes the ipc connection 231 * input: ipc_action_t *: the request to reply to 234 * dhcp_data_type_t: the type of the payload in the reply 235 * const void *: the payload for the reply, or NULL if there is no 246 dhcp_ipc_reply_t *reply; local 252 reply [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/sbin/dhcpinfo/ |
H A D | dhcpinfo.c | 58 dhcp_ipc_reply_t *reply; local 163 * send the request to the agent and reap the reply 172 error = dhcp_ipc_make_request(request, &reply, DHCP_IPC_WAIT_DEFAULT); 173 if (error != 0 || reply->return_code != 0) { 176 error = reply->return_code; 187 opt = dhcp_ipc_get_data(reply, &opt_len, NULL); 237 "reply\n", argv[0]);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/netstat/ |
H A D | netstat.c | 758 * Each reply consists of a ctl part for one fixed structure 3368 dhcp_ipc_reply_t *reply; local 3375 error = dhcp_ipc_make_request(request, &reply, DHCP_IPC_WAIT_DEFAULT); 3382 error = reply->return_code; 3384 free(reply); 3388 free(reply); 3398 (void) printf("%s", dhcp_status_reply_to_string(reply)); 3399 free(reply);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/pppd/ |
H A D | auth.c | 1205 struct pam_response *reply = NULL; local 1209 reply = malloc(sizeof(struct pam_response) * num_msg); 1210 if (reply == NULL) 1216 reply[replies].resp_retcode = PAM_SUCCESS; 1217 reply[replies].resp = COPY_STRING(PAM_username); 1221 reply[replies].resp_retcode = PAM_SUCCESS; 1222 reply[replies].resp = COPY_STRING(PAM_password); 1229 reply[replies].resp_retcode = PAM_SUCCESS; 1230 reply[replies].resp = NULL; 1234 free (reply); [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
H A D | auth.c | 417 if (ap->reply) 418 (*ap->reply)(ap, data+2, cnt-2);
|
H A D | auth.h | 78 void (*reply)(struct XauthP *, unsigned char *, int); member in struct:XauthP
|
H A D | encrypt.c | 598 if (!ep->reply) { 607 ret = (*ep->reply)(data, cnt); 610 "(*ep->reply)(%x, %d) returned %s(%d)\n"),
|
H A D | encrypt.h | 86 int (*reply)(unsigned char *, int); member in struct:__anon144
|
H A D | kerberos5.c | 450 /* the rest of the reply should contain a krb_ap_rep */ 451 krb5_ap_rep_enc_part *reply; local 459 &inbuf, &reply); 467 krb5_free_ap_rep_enc_part(telnet_context, reply);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/ilbd/ |
H A D | ilbd_nat.c | 73 * rbuf: reply buffer to be filled in. 74 * rbufsz: reply buffer size. 86 ilb_show_info_t *reply; local 96 * want to continue, reset the current client and reply OK. 111 reply = (ilb_show_info_t *)&((ilb_comm_t *)rbuf)->ic_data; 115 * reply. 144 reply->sn_num = kcmd->num_nat; 145 *rbufsz += reply->sn_num * sizeof (ilb_nat_info_t); 161 nat_ret = (ilb_nat_info_t *)&reply->sn_data; 193 * rbuf: reply buffe 207 ilb_show_info_t *reply; local [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/in.mpathd/ |
H A D | mpd_probe.c | 37 * or ICMP Echo reply. Packet format is same for both IPv4 and IPv6 64 struct pr_icmp *reply, struct in6_addr fromaddr, struct timeval *recv_tvp); 66 struct pr_icmp *reply, struct in6_addr fromaddr); 68 struct pr_icmp *reply, struct in6_addr fromaddr); 88 * Probe success - A matching probe reply received before CRTT ms has elapsed 90 * Probe failure - No probe reply received and more than CRTT ms has elapsed 305 * not see a reply to the probe and will fail the interface if normal 379 struct pr_icmp *reply; local 437 * reply, starting from the icmp hdr. 441 reply 507 struct pr_icmp *reply; local 617 incoming_rtt_reply(struct phyint_instance *pii, struct pr_icmp *reply, struct in6_addr fromaddr) argument 705 incoming_echo_reply(struct phyint_instance *pii, struct pr_icmp *reply, struct in6_addr fromaddr, struct timeval *recv_tvp) argument 1121 incoming_mcast_reply(struct phyint_instance *pii, struct pr_icmp *reply, struct in6_addr fromaddr) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/in.ndpd/ |
H A D | ndp.c | 320 dhcp_ipc_reply_t *reply = NULL; local 335 error = dhcp_ipc_make_request(request, &reply, 0); 343 error = reply->return_code; 344 free(reply);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/inetd/ |
H A D | tlx.c | 260 struct t_optmgmt request, reply; local 280 reply.opt.maxlen = sizeof (struct opthdr) + optlen; 281 reply.opt.buf = (char *)&optbuf; 282 reply.flags = 0; 284 if ((t_optmgmt(fd, &request, &reply) == -1) || 285 (reply.flags != T_SUCCESS)) {
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | mDNSEmbeddedAPI.h | 522 DNSMessage *reply; member in struct:tcpInfo_t 922 mDNSu16 err; // Or UDP reply port, in setup request 1243 mDNSu8 *Reply; // xml reply from router 1427 regState_Pending = 1, // update sent, reply not received 1428 regState_Registered = 2, // update sent, reply received 1429 regState_DeregPending = 3, // dereg sent, reply not received 2001 mDNSu8 TimeoutQuestion; // Timeout this question if there is no reply in configured time
|
H A D | uDNS.c | 323 // negative response so that applications get a reply. We also need to reinitialize the DNS servers 1360 // It's perfectly fine for this socket to close after the first reply. The server might 1362 // We'll only log this event if we've never received a reply before. 1388 tcpInfo->reply = mDNSPlatformMemAllocate(tcpInfo->replylen); 1389 if (!tcpInfo->reply) { LogMsg("ERROR: tcpCallback - malloc failed"); err = mStatus_NoMemoryErr; goto exit; } 1392 n = mDNSPlatformReadTCP(sock, ((char *)tcpInfo->reply) + (tcpInfo->nread - 2), tcpInfo->replylen - (tcpInfo->nread - 2), &closed); 1429 DNSMessage *reply = tcpInfo->reply; local 1430 mDNSu8 *end = (mDNSu8 *)tcpInfo->reply + tcpInfo->replylen; 1435 tcpInfo->reply 3730 PCPMapReply *reply = (PCPMapReply*)pkt; local [all...] |
H A D | uds_daemon.c | 167 // reply, termination, error, and client context info 171 struct reply_state *replies; // corresponding (active) reply list 521 reply_state *reply; local 529 reply = mallocL("reply_state", sizeof(reply_state) + datalen - sizeof(reply_hdr)); 530 if (!reply) FatalError("ERROR: malloc"); 532 reply->next = mDNSNULL; 533 reply->totallen = (mDNSu32)datalen + sizeof(ipc_msg_hdr); 534 reply->nwriten = 0; 536 reply->mhdr->version = VERSION; 537 reply 1103 reply_state *reply = create_reply(reg_record_reply_op, len, request); local 3867 reply_state *reply; local 3907 reply_state *reply; local [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | wpa.c | 805 struct wpa_eapol_key *reply; local 823 rlen = sizeof (*ethhdr) + sizeof (*hdr) + sizeof (*reply); 837 hdr->length = htons(sizeof (*reply)); 839 reply = (struct wpa_eapol_key *)(hdr + 1); 840 reply->type = wpa_s->proto == WPA_PROTO_RSN ? 849 reply->key_info = BE_16(key_info); 850 reply->key_length = 0; 851 (void) memcpy(reply->replay_counter, wpa_s->request_counter, 855 reply->key_data_length = BE_16(0); 859 rlen - sizeof (*ethhdr), reply 876 struct wpa_eapol_key *reply; local 1109 struct wpa_eapol_key *reply; local 1302 struct wpa_eapol_key *reply; local [all...] |