Home
last modified time | relevance | path

Searched refs:reply (Results 151 – 175 of 353) sorted by relevance

12345678910>>...15

/freebsd/contrib/netbsd-tests/ipf/input/
H A Dni42 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
H A Dni122 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
H A Dni820 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
H A Dni92 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
H A Dni112 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
H A Df211 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
H A Df221 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
H A Dni102 # ICMP dest unreachable with 64 bits in payload (in reply to a TCP packet
H A Dni12 # ICMP timeout exceeded in reply to a ICMP packet going out.
/freebsd/crypto/heimdal/kdc/
H A Dkdc.h104 krb5_data *reply,
/freebsd/crypto/openssh/
H A DPROTOCOL110 and a corresponding SSH2_MSG_PONG reply.
120 The reply copies the data (which may be the empty string) from the
135 The ping/reply message is implemented at the transport layer rather
241 char want-reply
281 open, the server should reply with SSH_MSG_CHANNEL_OPEN_SUCCESS.
376 char 0 /* want-reply */
391 char 1 /* want-reply */
529 return the following SSH_FXP_EXTENDED_REPLY reply:
607 The server will respond with a SSH_FXP_EXTENDED_REPLY reply:
655 Its reply is the same format as that of SSH2_FXP_REALPATH.
[all …]
/freebsd/sys/dev/mps/mpi/
H A Dmpi2_history.txt70 * Added union of reply descriptors.
87 * Added #defines for marking a reply descriptor as unused.
93 * In all request and reply descriptors, replaced VF_ID
274 * reply with MaxReplyDescriptorPostQueueDepth.
298 * IOCFacts reply.
359 * 08-31-07 02.00.01 Modifications to RAID Action request and reply,
401 * and reply messages.
/freebsd/sys/dev/mpr/
H A Dmpr_user.c1263 MPI2_DIAG_BUFFER_POST_REPLY *reply; in mpr_post_fw_diag_buffer() local
1321 reply = (MPI2_DIAG_BUFFER_POST_REPLY *)cm->cm_reply; in mpr_post_fw_diag_buffer()
1322 if (reply == NULL) { in mpr_post_fw_diag_buffer()
1329 if ((le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK) != in mpr_post_fw_diag_buffer()
1335 le16toh(reply->IOCStatus), le32toh(reply->IOCLogInfo), in mpr_post_fw_diag_buffer()
1336 le32toh(reply->TransferLength)); in mpr_post_fw_diag_buffer()
1360 MPI2_DIAG_RELEASE_REPLY *reply; in mpr_release_fw_diag_buffer() local
1415 reply = (MPI2_DIAG_RELEASE_REPLY *)cm->cm_reply; in mpr_release_fw_diag_buffer()
1416 if (reply == NULL) { in mpr_release_fw_diag_buffer()
1427 __func__, le16toh(reply->IOCStatus), in mpr_release_fw_diag_buffer()
[all …]
/freebsd/sys/dev/mps/
H A Dmps_user.c1153 MPI2_DIAG_BUFFER_POST_REPLY *reply = NULL; in mps_post_fw_diag_buffer() local
1211 reply = (MPI2_DIAG_BUFFER_POST_REPLY *)cm->cm_reply; in mps_post_fw_diag_buffer()
1212 if (reply == NULL) { in mps_post_fw_diag_buffer()
1218 if ((le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK) != in mps_post_fw_diag_buffer()
1224 le16toh(reply->IOCStatus), le32toh(reply->IOCLogInfo), in mps_post_fw_diag_buffer()
1225 le32toh(reply->TransferLength)); in mps_post_fw_diag_buffer()
1249 MPI2_DIAG_RELEASE_REPLY *reply = NULL; in mps_release_fw_diag_buffer() local
1304 reply = (MPI2_DIAG_RELEASE_REPLY *)cm->cm_reply; in mps_release_fw_diag_buffer()
1305 if (reply == NULL) { in mps_release_fw_diag_buffer()
1316 __func__, le16toh(reply->IOCStatus), in mps_release_fw_diag_buffer()
[all …]
H A Dmps_sas_lsi.c912 Mpi2SataPassthroughReply_t *reply = NULL; in mpssas_get_sata_identify() local
957 reply = (Mpi2SataPassthroughReply_t *)cm->cm_reply; in mpssas_get_sata_identify()
958 if (error || (reply == NULL)) { in mpssas_get_sata_identify()
971 bcopy(reply, mpi_reply, sizeof(Mpi2SataPassthroughReply_t)); in mpssas_get_sata_identify()
972 if ((le16toh(reply->IOCStatus) & MPI2_IOCSTATUS_MASK) != in mpssas_get_sata_identify()
976 handle, reply->IOCStatus); in mpssas_get_sata_identify()
/freebsd/contrib/wpa/wpa_supplicant/
H A Deap_testing.txt237 server generates a valid looking reply in the same way as in Phase
361 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
367 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
379 terminate at this point (gets somewhat confused with reply to this)
385 as a reply
389 - uses tunneled EAP-Success, expects reply in tunnel or TLS ACK, sends MPPE
H A Dhs20_supplicant.h47 char *reply, size_t buf_len);
/freebsd/contrib/ntp/scripts/update-leap/
H A Dupdate-leap.in295 my $reply = $http->get($LEAPSRC);
297 if ($reply->{success}) {
299 print $fh $reply->{content} ||
/freebsd/contrib/unbound/testdata/
H A Dserve_expired_cached_servfail_refresh.rpl7 serve-expired-reply-ttl: 123
18 SCENARIO_BEGIN Test serve-expired with client-timeout and a SERVFAIL upstream reply
H A Dcachedb_servfail_cname.crpl18 SCENARIO_BEGIN Test cachedb store and servfail reply from cname.
19 ; the servfail reply should not overwrite the cache contents.
/freebsd/libexec/ftpd/
H A Dextern.h56 void reply(int, const char *, ...) __printflike(2, 3);
/freebsd/contrib/wpa/src/fst/
H A Dfst_ctrl_iface.c764 int fst_ctrl_iface_receive(const char *cmd, char *reply, size_t reply_size) in fst_ctrl_iface_receive() argument
800 return os_snprintf(reply, reply_size, "FAIL\n"); in fst_ctrl_iface_receive()
812 return os_snprintf(reply, reply_size, "FAIL\n"); in fst_ctrl_iface_receive()
814 return c->process(p, reply, reply_size); in fst_ctrl_iface_receive()
817 return os_snprintf(reply, reply_size, "UNKNOWN FST COMMAND\n"); in fst_ctrl_iface_receive()
/freebsd/crypto/heimdal/appl/ftp/ftpd/
H A Dextern.h90 void reply(int, const char *, ...)
/freebsd/crypto/heimdal/lib/hx509/
H A Dhx509.h101 heim_octet_string reply; member
/freebsd/sbin/restore/
H A Dextern.h83 int reply(char *);

12345678910>>...15