Searched defs:reply (Results 1 - 25 of 40) sorted by relevance

12

/osnet-11/usr/src/lib/libslp/clib/
H A DDAAdvert.c39 SLPError slp_unpackDAAdvert(char *reply, char **surl, char **scopes, argument
52 len = slp_get_length(reply);
53 off = SLP_HDRLEN + slp_get_langlen(reply);
55 if ((err = slp_get_sht(reply, len, &off, &protoErrCode)) != SLP_OK)
64 iov[0].iov_base = reply + off;
66 if ((err = slp_get_sht(reply, len, &off, &dummy)) != SLP_OK) {
69 if ((err = slp_get_sht(reply, len, &off, &dummy)) != SLP_OK) {
75 iov[1].iov_base = reply + off;
77 if ((err = slp_get_string(reply, len, &off, surl)) != SLP_OK) {
83 iov[3].iov_base = reply
[all...]
H A DSAAdvert.c40 SLPError slp_unpackSAAdvert(char *reply, char **surl, argument
52 len = slp_get_length(reply);
53 off = SLP_HDRLEN + slp_get_langlen(reply);
56 iov[0].iov_base = reply + off;
58 if ((err = slp_get_string(reply, len, &off, surl)) != SLP_OK) {
64 iov[2].iov_base = reply + off;
66 if ((err = slp_get_string(reply, len, &off, scopes)) != SLP_OK) {
72 iov[1].iov_base = reply + off;
74 if ((err = slp_get_string(reply, len, &off, attrs)) != SLP_OK) {
80 if ((err = slp_get_byte(reply, le
[all...]
H A DSLPGetRefreshInterval.c48 char *reply = NULL; /* reply from slpd */ local
74 if (slp_send2slpd(msg, &reply) != SLP_OK) {
78 (void) slp_UnpackAttrReply(hp, reply, refresh_interval_cb,
87 if (reply) free(reply);
H A Dslp_ipc.c147 * Sends 'msg' to slpd, placing the response in 'reply'. Caller should
148 * free memory associated with 'reply'. All IPC is handled transparantly
152 SLPError slp_send2slpd(const char *msg, char **reply) { argument
157 return (slp_send2slpd_iov(iov, 1, reply));
160 SLPError slp_send2slpd_iov(struct iovec *msg, int iovlen, char **reply) { argument
166 *reply = NULL;
228 err = slp_tcp_read(slpdfd, reply);
236 if (err == SLP_OK && slp_get_errcode(*reply) != 0) {
H A DSLPFindSrvTypes.c72 static SLPBoolean UnpackSrvTypesReply(slp_handle_impl_t *hp, char *reply, argument
82 if (!reply) {
97 /* parse reply into params */
98 len = slp_get_length(reply);
99 off = SLP_HDRLEN + slp_get_langlen(reply);
101 if (slp_get_sht(reply, len, &off, &protoErrCode) != SLP_OK)
109 if (slp_get_string(reply, len, &off, &pcSrvTypes) != SLP_OK)
H A Dslp_da_cache.c43 * table. Associated with each query is a reply (in the format of an
48 * slp_put_das_cached: adds a reply to the cache
86 const char *reply; member in struct:cache_entry
98 * Searches the cache for the reply to 'query'. Returns the reply if
104 char *reply = NULL; local
123 /* copy out the reply */
124 if (!(reply = malloc((*ans)->reply_len))) {
129 (void) memcpy(reply, (*ans)->reply, (*an
149 slp_put_das_cached(const char *query, const char *reply, unsigned int len) argument
[all...]
H A Dslp_ua_common.c126 char *reply; local
138 reply = slp_dequeue(hp->q);
139 /* reply == NULL if no more available or SLPClosed */
140 cont = args->msg_cb(hp, reply, args->cb, args->cookie,
143 if (reply) {
144 free(reply);
H A DSLPFindAttrs.c105 SLPBoolean slp_UnpackAttrReply(slp_handle_impl_t *hp, char *reply, argument
118 if (!reply) {
132 /* parse reply into params */
133 len = slp_get_length(reply);
134 off = SLP_HDRLEN + slp_get_langlen(reply);
136 if (slp_get_sht(reply, len, &off, &protoErrCode) != SLP_OK)
144 attr_tbv = reply + off;
146 if (slp_get_string(reply, len, &off, &pcAttrList) != SLP_OK)
151 if (slp_get_byte(reply, len, &off, &auth_cnt) != SLP_OK) {
164 reply
196 unpackDAAdvert_attr(slp_handle_impl_t *hp, char *reply, SLPAttrCallback cb, void *cookie, void **collator, int *numResults) argument
253 unpackSAAdvert_attr(slp_handle_impl_t *hp, char *reply, SLPAttrCallback cb, void *cookie, void **collator, int *numResults) argument
[all...]
H A DSLPFindSrvs.c106 SLPBoolean slp_unpackSrvReply(slp_handle_impl_t *hp, char *reply, argument
116 if (!reply) {
126 len = slp_get_length(reply);
127 off = SLP_HDRLEN + slp_get_langlen(reply);
129 if (slp_get_sht(reply, len, &off, &protoErrCode) != SLP_OK)
137 if (slp_get_sht(reply, len, &off, &urlCount) != SLP_OK)
151 if (slp_get_sht(reply, len, &off, &sLifetime) != SLP_OK)
154 url_tbv = reply + off;
156 if (slp_get_string(reply, len, &off, &pcSrvURL) != SLP_OK)
161 if (slp_get_byte(reply, le
224 unpackDAAdvert_srv(slp_handle_impl_t *hp, char *reply, SLPSrvURLCallback cb, void *cookie, void **collator, int *numResults) argument
282 unpackSAAdvert_srv(slp_handle_impl_t *hp, char *reply, SLPSrvURLCallback cb, void *cookie, void **collator, int *numResults) argument
[all...]
H A DSLPReg.c36 * reply.
43 * reply from slpd
56 * code found in the reply from slpd
627 * 'reply' should point to the beginning of the header.
629 static SLPError UnpackSrvAck(char *reply, SLPError *ans) { argument
632 char *p = reply + SLP_HDRLEN;
634 langlen = slp_get_langlen(reply);
646 * dispatches the reply to the user callback.
650 char *reply = NULL; local
656 if ((err = slp_send2slpd_iov(msg->msgiov, msg->msgiov_len, &reply))
763 char *reply; local
[all...]
H A Dslp_targets.c148 char *query, *reply; local
210 if ((err = slp_find_das(query, &reply)) != SLP_OK &&
221 /* Unpack the reply */
222 if (reply) {
227 (void) slp_unpackSrvReply(hp, reply, collect_DAs,
229 free(reply);
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dmk_rep.c82 krb5_ap_rep reply; local
86 /* Make the reply */
128 scratch, &reply.enc_part)))
131 if (!(retval = encode_krb5_ap_rep(&reply, &toutbuf))) {
133 KERBEROS_PROBE_KRB_AP_REP(MAKE, toutbuf, &reply, &repl);
138 memset(reply.enc_part.ciphertext.data, 0, reply.enc_part.ciphertext.length);
139 free(reply.enc_part.ciphertext.data);
140 reply.enc_part.ciphertext.length = 0;
141 reply
[all...]
H A Drd_rep.c83 krb5_ap_rep *reply = NULL; local
93 retval = decode_krb5_ap_rep(inbuf, &reply);
98 scratch.length = reply->enc_part.ciphertext.length;
107 &reply->enc_part, &scratch);
110 KERBEROS_PROBE_KRB_AP_REP(READ, inbuf, reply, NULL);
120 KERBEROS_PROBE_KRB_AP_REP(READ, inbuf, reply, enc);
122 /* Check reply fields. */
155 krb5_free_ap_rep(context, reply);
165 krb5_ap_rep * reply; local
174 if ((retval = decode_krb5_ap_rep(inbuf, &reply)))
[all...]
H A Dinit_creds_ctx.h23 krb5_kdc_rep *reply; member in struct:_krb5_init_creds_context
/osnet-11/usr/src/cmd/hal/utils/
H A Dadt_data.c26 DBusMessage *reply; local
49 reply = dbus_connection_send_with_reply_and_block (bus,
58 if (reply == NULL) {
63 dbus_message_iter_init (reply, &iter);
69 dbus_message_unref (reply);
84 dbus_message_unref (reply);
95 dbus_message_unref (reply);
/osnet-11/usr/src/lib/libdhcpagent/common/
H A Ddhcpagent_util.c124 dhcp_ipc_reply_t *reply; local
141 error = dhcp_ipc_make_request(request, &reply, 0);
143 free(reply);
177 error = dhcp_ipc_make_request(request, &reply, 0);
179 free(reply);
194 * when printing DHCP_STATUS reply.
226 * dhcp_status_reply_to_string(): Return DHCP IPC reply of type DHCP_STATUS
233 dhcp_status_reply_to_string(dhcp_ipc_reply_t *reply) argument
239 status = dhcp_ipc_get_data(reply, &reply_size, NULL);
H A Ddhcpagent_ipc.c48 * the protocol used here is a simple request/reply scheme: a client
62 * the format of a reply is much the same: a single dhcp_ipc_reply_t;
122 * input: dhcp_ipc_request_t *: the request the reply is for
127 * output: dhcp_ipc_reply_t *: the reply on success, NULL on failure
134 dhcp_ipc_reply_t *reply = calloc(1, DHCP_IPC_REPLY_SIZE + buffer_size); local
136 if (reply == NULL)
139 reply->message_type = request->message_type;
140 reply->ipc_id = request->ipc_id;
141 reply->return_code = return_code;
142 reply
161 dhcp_ipc_get_data(dhcp_ipc_reply_t *reply, size_t *size, dhcp_data_type_t *type) argument
265 dhcp_ipc_recv_reply(int fd, dhcp_ipc_reply_t **reply, int32_t timeout) argument
328 dhcp_ipc_send_reply(int fd, dhcp_ipc_reply_t *reply) argument
369 dhcp_ipc_make_request(dhcp_ipc_request_t *request, dhcp_ipc_reply_t **reply, int32_t timeout) argument
721 dhcp_ipc_reply_t *reply; local
852 dhcp_ipc_reply_t *reply; local
[all...]
/osnet-11/usr/src/lib/libdhcpsvc/private/
H A Ddsvcd_synch.c196 dsvcd_reply_t reply; local
221 args.rbuf = (char *)&reply;
245 if (args.rbuf != (char *)&reply) {
246 (void) memcpy(&reply, args.rbuf, sizeof (reply));
251 reply.rp_version != DSVCD_DOOR_VERSION) {
256 if (reply.rp_retval == DSVC_SUCCESS && unlockfd == -1)
260 return (reply.rp_retval);
273 dsvcd_reply_t reply; local
284 args.rbuf = (char *)&reply;
[all...]
/osnet-11/usr/src/cmd/hal/hald-runner/
H A Dmain.c69 DBusMessage *reply; local
96 /* let run_request_run handle the reply */
102 reply = dbus_message_new_error(msg, "org.freedesktop.HalRunner.Malformed",
104 dbus_connection_send(con, reply, NULL);
105 dbus_message_unref(reply);
111 DBusMessage *reply; local
125 reply = dbus_message_new_method_return(msg);
126 dbus_message_append_args (reply,
131 reply = dbus_message_new_error(msg, "org.freedesktop.HalRunner.Failed",
134 dbus_connection_send(con, reply, NUL
149 DBusMessage *reply = NULL; local
174 DBusMessage *reply; local
[all...]
H A Drunner.c109 DBusMessage *reply; local
116 reply = dbus_message_new_method_return(msg);
117 g_assert(reply != NULL);
119 dbus_message_iter_init_append(reply, &iter);
126 dbus_connection_send(con, reply, NULL);
127 dbus_message_unref(reply);
195 /* Time is up, kill the process, send reply that it was killed!
234 /* Run the given request and reply it's result on msg */
/osnet-11/usr/src/cmd/sendmail/src/
H A Dsm_resolve.c158 ** PARSE_DNS_REPLY -- parse DNS reply data.
402 unsigned char *reply; local
428 reply = (unsigned char *)&reply_buf;
429 len = res_search(domain, rr_class, rr_type, reply, SMRBSIZE);
445 reply = (unsigned char *)sm_malloc(IP_MAXPACKET);
446 if (reply == NULL)
450 reply, IP_MAXPACKET);
459 if (len >= 0 && len < IP_MAXPACKET && reply != NULL)
460 r = parse_dns_reply(reply, len);
461 if (reply !
[all...]
/osnet-11/usr/src/grub/grub-0.97/netboot/
H A Dnfs.h30 /* Block size used for NFS read accesses. A RPC reply packet (including all
59 } reply; member in union:rpc_t::__anon217
/osnet-11/usr/src/lib/krb5/plugins/preauth/encrypted_challenge/
H A Dencrypted_challenge_main.c278 * If this fails, we won't generate a reply to the client. That
309 krb5_kdc_req *request, krb5_kdc_rep *reply,
307 kdc_return_preauth(krb5_context context, krb5_pa_data *padata, struct _krb5_db_entry_new *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, struct _krb5_key_data *client_keys, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc get_entry_proc, void *pa_module_context, void **pa_request_context) argument
/osnet-11/usr/src/cmd/hal/addons/network-devices/
H A Daddon-network-discovery.c153 DBusMessage *reply; local
209 if ((reply = dbus_message_new_method_return(message)) == NULL) {
210 HAL_WARNING(("Could not allocate memory for the DBus reply"));
214 dbus_message_append_args(reply, DBUS_TYPE_INT32, &rc,
217 if (!dbus_connection_send(connection, reply, NULL)) {
218 HAL_WARNING(("Could not sent reply"));
221 dbus_message_unref(reply);
/osnet-11/usr/src/cmd/hal/addons/storage/
H A Daddon-storage.c139 DBusMessage *reply = NULL; local
177 if (!(reply = dbus_connection_send_with_reply_and_block (dbus_connection, msg, -1, &error))) {
195 if (reply != NULL)
196 dbus_message_unref (reply);

Completed in 47 milliseconds

12