/freebsd/contrib/netbsd-tests/ipf/input/ |
H A D | ni4 | 2 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
|
H A D | ni12 | 2 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
|
H A D | ni8 | 20 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
|
H A D | ni9 | 2 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
|
H A D | ni11 | 2 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
|
H A D | f21 | 1 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
|
H A D | f22 | 1 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
|
H A D | ni10 | 2 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
|
H A D | ni1 | 2 # ICMP timeout exceeded in reply to a ICMP packet going out.
|
/freebsd/crypto/heimdal/kdc/ |
H A D | kdc.h | 104 krb5_data *reply,
|
/freebsd/crypto/openssh/ |
H A D | PROTOCOL | 110 and a corresponding SSH2_MSG_PONG reply. 120 The reply copies the data (which may be the empty string) from the 135 The ping/reply message is implemented at the transport layer rather 241 char want-reply 281 open, the server should reply with SSH_MSG_CHANNEL_OPEN_SUCCESS. 376 char 0 /* want-reply */ 391 char 1 /* want-reply */ 529 return the following SSH_FXP_EXTENDED_REPLY reply: 607 The server will respond with a SSH_FXP_EXTENDED_REPLY reply: 655 Its reply is the same format as that of SSH2_FXP_REALPATH. [all …]
|
/freebsd/sys/dev/mps/mpi/ |
H A D | mpi2_history.txt | 70 * Added union of reply descriptors. 87 * Added #defines for marking a reply descriptor as unused. 93 * In all request and reply descriptors, replaced VF_ID 274 * reply with MaxReplyDescriptorPostQueueDepth. 298 * IOCFacts reply. 359 * 08-31-07 02.00.01 Modifications to RAID Action request and reply, 401 * and reply messages.
|
/freebsd/sys/dev/mpr/ |
H A D | mpr_user.c | 1263 MPI2_DIAG_BUFFER_POST_REPLY *reply; in mpr_post_fw_diag_buffer() local 1321 reply = (MPI2_DIAG_BUFFER_POST_REPLY *)cm->cm_reply; in mpr_post_fw_diag_buffer() 1322 if (reply == NULL) { in mpr_post_fw_diag_buffer() 1329 if ((le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK) != in mpr_post_fw_diag_buffer() 1335 le16toh(reply->IOCStatus), le32toh(reply->IOCLogInfo), in mpr_post_fw_diag_buffer() 1336 le32toh(reply->TransferLength)); in mpr_post_fw_diag_buffer() 1360 MPI2_DIAG_RELEASE_REPLY *reply; in mpr_release_fw_diag_buffer() local 1415 reply = (MPI2_DIAG_RELEASE_REPLY *)cm->cm_reply; in mpr_release_fw_diag_buffer() 1416 if (reply == NULL) { in mpr_release_fw_diag_buffer() 1427 __func__, le16toh(reply->IOCStatus), in mpr_release_fw_diag_buffer() [all …]
|
/freebsd/sys/dev/mps/ |
H A D | mps_user.c | 1153 MPI2_DIAG_BUFFER_POST_REPLY *reply = NULL; in mps_post_fw_diag_buffer() local 1211 reply = (MPI2_DIAG_BUFFER_POST_REPLY *)cm->cm_reply; in mps_post_fw_diag_buffer() 1212 if (reply == NULL) { in mps_post_fw_diag_buffer() 1218 if ((le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK) != in mps_post_fw_diag_buffer() 1224 le16toh(reply->IOCStatus), le32toh(reply->IOCLogInfo), in mps_post_fw_diag_buffer() 1225 le32toh(reply->TransferLength)); in mps_post_fw_diag_buffer() 1249 MPI2_DIAG_RELEASE_REPLY *reply = NULL; in mps_release_fw_diag_buffer() local 1304 reply = (MPI2_DIAG_RELEASE_REPLY *)cm->cm_reply; in mps_release_fw_diag_buffer() 1305 if (reply == NULL) { in mps_release_fw_diag_buffer() 1316 __func__, le16toh(reply->IOCStatus), in mps_release_fw_diag_buffer() [all …]
|
H A D | mps_sas_lsi.c | 912 Mpi2SataPassthroughReply_t *reply = NULL; in mpssas_get_sata_identify() local 957 reply = (Mpi2SataPassthroughReply_t *)cm->cm_reply; in mpssas_get_sata_identify() 958 if (error || (reply == NULL)) { in mpssas_get_sata_identify() 971 bcopy(reply, mpi_reply, sizeof(Mpi2SataPassthroughReply_t)); in mpssas_get_sata_identify() 972 if ((le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK) != in mpssas_get_sata_identify() 976 handle, reply->IOCStatus); in mpssas_get_sata_identify()
|
/freebsd/contrib/wpa/wpa_supplicant/ |
H A D | eap_testing.txt | 237 server generates a valid looking reply in the same way as in Phase 361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE 379 terminate at this point (gets somewhat confused with reply to this) 385 as a reply 389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
|
H A D | hs20_supplicant.h | 47 char *reply, size_t buf_len);
|
/freebsd/contrib/ntp/scripts/update-leap/ |
H A D | update-leap.in | 295 my $reply = $http->get($LEAPSRC); 297 if ($reply->{success}) { 299 print $fh $reply->{content} ||
|
/freebsd/contrib/unbound/testdata/ |
H A D | serve_expired_cached_servfail_refresh.rpl | 7 serve-expired-reply-ttl: 123 18 SCENARIO_BEGIN Test serve-expired with client-timeout and a SERVFAIL upstream reply
|
H A D | cachedb_servfail_cname.crpl | 18 SCENARIO_BEGIN Test cachedb store and servfail reply from cname. 19 ; the servfail reply should not overwrite the cache contents.
|
/freebsd/libexec/ftpd/ |
H A D | extern.h | 56 void reply(int, const char *, ...) __printflike(2, 3);
|
/freebsd/contrib/wpa/src/fst/ |
H A D | fst_ctrl_iface.c | 764 int fst_ctrl_iface_receive(const char *cmd, char *reply, size_t reply_size) in fst_ctrl_iface_receive() argument 800 return os_snprintf(reply, reply_size, "FAIL\n"); in fst_ctrl_iface_receive() 812 return os_snprintf(reply, reply_size, "FAIL\n"); in fst_ctrl_iface_receive() 814 return c->process(p, reply, reply_size); in fst_ctrl_iface_receive() 817 return os_snprintf(reply, reply_size, "UNKNOWN FST COMMAND\n"); in fst_ctrl_iface_receive()
|
/freebsd/crypto/heimdal/appl/ftp/ftpd/ |
H A D | extern.h | 90 void reply(int, const char *, ...)
|
/freebsd/crypto/heimdal/lib/hx509/ |
H A D | hx509.h | 101 heim_octet_string reply; member
|
/freebsd/sbin/restore/ |
H A D | extern.h | 83 int reply(char *);
|