Home
last modified time | relevance | path

Searched refs:reply (Results 176 – 200 of 353) sorted by relevance

12345678910>>...15

/freebsd/sys/dev/mpt/
H A Dmpt.c508 MSG_CONFIG_REPLY *reply; in mpt_config_reply_handler() local
511 reply = (MSG_CONFIG_REPLY *)reply_frame; in mpt_config_reply_handler()
513 bcopy(&reply->Header, &cfgp->Header, in mpt_config_reply_handler()
515 cfgp->ExtPageLength = reply->ExtPageLength; in mpt_config_reply_handler()
516 cfgp->ExtPageType = reply->ExtPageType; in mpt_config_reply_handler()
1245 mpt_send_event_ack(mpt, req, &record->reply, record->context); in mpt_free_request()
1246 offset = (uint32_t)((uint8_t *)record - mpt->reply); in mpt_free_request()
1444 data16 = (u_int16_t *)reply; in mpt_recv_handshake_reply()
1446 hdr = (MSG_DEFAULT_REPLY *)reply; in mpt_recv_handshake_reply()
1553 MSG_IOC_INIT_REPLY reply; in mpt_send_ioc_init() local
[all …]
H A Dmpt_pci.c680 if (bus_dmamem_alloc(mpt->reply_dmat, (void **)&mpt->reply, in mpt_dma_mem_alloc()
691 bus_dmamap_load(mpt->reply_dmat, mpt->reply_dmap, mpt->reply, in mpt_dma_mem_alloc()
717 bus_dmamem_free(mpt->reply_dmat, mpt->reply, mpt->reply_dmap); in mpt_dma_mem_free()
H A Dmpt.h493 MSG_EVENT_NOTIFY_REPLY reply; member
660 uint8_t *reply; /* KVA of reply memory */ member
854 ((void *)(&m->reply[i]))
1065 size_t reply_len, void *reply);
/freebsd/contrib/sendmail/cf/feature/
H A Dcompat_check.m429 dnl reply code
H A Dcheck_other.m423 dnl select which SMTP reply type(s) should be allowed to match?
/freebsd/usr.sbin/ppp/
H A Dtty.c257 struct ng_mesg *reply; in LoadLineDiscipline() local
272 reply = (struct ng_mesg *)rbuf; in LoadLineDiscipline()
273 info = (struct nodeinfo *)reply->data; in LoadLineDiscipline()
352 if (NgRecvMsg(cs, reply, sizeof rbuf, NULL) < 0) { in LoadLineDiscipline()
H A Dbundle.c1545 int niov, f, expect, newsid, fd[SEND_MAXFD], nfd, reply[2]; in bundle_SendDatalink() local
1570 if (fd[0] != -1 && socketpair(AF_UNIX, SOCK_STREAM, PF_UNSPEC, reply) != -1) { in bundle_SendDatalink()
1575 fd[1] = reply[1]; in bundle_SendDatalink()
1604 if (setsockopt(reply[0], SOL_SOCKET, SO_SNDBUF, &expect, sizeof(int)) == -1) in bundle_SendDatalink()
1607 if (setsockopt(reply[1], SOL_SOCKET, SO_RCVBUF, &expect, sizeof(int)) == -1) in bundle_SendDatalink()
1625 if ((got = read(reply[0], &newpid, sizeof newpid)) == sizeof newpid) { in bundle_SendDatalink()
1632 if ((got = writev(reply[0], iov + 1, niov - 1)) != expect) { in bundle_SendDatalink()
1648 close(reply[0]); in bundle_SendDatalink()
1649 close(reply[1]); in bundle_SendDatalink()
/freebsd/contrib/unbound/daemon/
H A Dstats.c380 uint8_t *reply = NULL; in server_stats_obtain() local
415 if(!tube_read_msg(worker->cmd, &reply, &len, 0)) in server_stats_obtain()
420 memcpy(s, reply, (size_t)len); in server_stats_obtain()
421 free(reply); in server_stats_obtain()
/freebsd/sbin/fsck_ffs/
H A Dinode.c104 if (reply("ADJUST LENGTH") == 1) { in ckinode()
145 if (reply("ADJUST LENGTH") == 1) { in ckinode()
231 if (reply("ADJUST LENGTH") == 1) { in iblock()
478 if (preen || reply("FIX") != 0) { in ginode()
567 if (preen || reply("FIX") != 0) { in getnextinode()
1068 else if (reply("CORRECT") == 0) in check_blkcnt()
1250 if (preen || reply("CLEAR") == 1) { in clri()
H A Dpass3.c103 if (reply("RECONNECT") == 0) in pass3()
/freebsd/contrib/telnet/libtelnet/
H A Dkerberos5.c625 krb5_ap_rep_enc_part *reply; in kerberos5_reply() local
632 ret = krb5_rd_rep(context, auth_context, &inbuf, &reply); in kerberos5_reply()
638 krb5_free_ap_rep_enc_part(context, reply); in kerberos5_reply()
H A Dauth.c487 if (ap->reply) in auth_reply()
488 (*ap->reply)(ap, data+2, cnt-2); in auth_reply()
/freebsd/sys/rpc/rpcsec_gss/
H A Drpcsec_gss.c1018 struct rpc_msg *reply = (struct rpc_msg *) msg; in rpc_gss_refresh() local
1040 if (reply->rm_reply.rp_stat == MSG_DENIED in rpc_gss_refresh()
1041 && reply->rm_reply.rp_rjct.rj_stat == AUTH_ERROR in rpc_gss_refresh()
1042 && (reply->rm_reply.rp_rjct.rj_why == RPCSEC_GSS_CREDPROBLEM in rpc_gss_refresh()
1043 || reply->rm_reply.rp_rjct.rj_why == RPCSEC_GSS_CTXPROBLEM)) { in rpc_gss_refresh()
/freebsd/crypto/heimdal/kdc/
H A Dkerberos5.c330 krb5_data *reply) in _kdc_encode_reply() argument
436 reply->data = buf; in _kdc_encode_reply()
437 reply->length = buf_size; in _kdc_encode_reply()
960 krb5_data *reply, in _kdc_as_rep() argument
1814 reply_key, 0, &e_text, reply); in _kdc_as_rep()
1821 if (datagram_reply && reply->length > config->max_datagram_reply_length) { in _kdc_as_rep()
1822 krb5_data_free(reply); in _kdc_as_rep()
1838 reply); in _kdc_as_rep()
/freebsd/contrib/ntp/sntp/m4/
H A Dopenldap.m4202 unsigned char reply[64*1024];
208 len = res_query(request, ns_c_in, ns_t_srv, reply, sizeof(reply));
214 len = res_query(request, C_IN, T_SRV, reply, sizeof(reply));
216 p = reply;
227 status = dn_expand( reply, reply+len, p, host, sizeof(host));
/freebsd/sys/dev/mpr/mpi/
H A Dmpi2_history.txt71 * Added union of reply descriptors.
88 * Added #defines for marking a reply descriptor as unused.
94 * In all request and reply descriptors, replaced VF_ID
436 * reply with MaxReplyDescriptorPostQueueDepth.
460 * IOCFacts reply.
522 * Added Send Host Message request and reply.
585 * 08-31-07 02.00.01 Modifications to RAID Action request and reply,
653 * and reply messages.
/freebsd/libexec/bootpd/
H A DChanges65 determine the size of the reply message.
71 address provided in reply messages. (Also minor bug fix)
94 will be put in the reply if either the client or bootpd
198 HP clients (need reply sent to broadcast address)
/freebsd/usr.bin/chat/
H A Dchat.c762 char *reply; in chat_expect() local
814 reply = expect_strtok (s, "-"); in chat_expect()
826 if (reply == (char *) 0 || exit_code != 3) in chat_expect()
829 chat_send (reply); in chat_expect()
/freebsd/crypto/heimdal/lib/hdb/
H A Ddb.c176 DB__get(krb5_context context, HDB *db, krb5_data key, krb5_data *reply) in DB__get() argument
200 krb5_data_copy(reply, v.data, v.size); in DB__get()
H A Ddb3.c173 DB__get(krb5_context context, HDB *db, krb5_data key, krb5_data *reply) in DB__get() argument
193 krb5_data_copy(reply, v.data, v.size); in DB__get()
H A Dndbm.c224 NDBM__get(krb5_context context, HDB *db, krb5_data key, krb5_data *reply) in NDBM__get() argument
240 krb5_data_copy(reply, v.dptr, v.dsize); in NDBM__get()
/freebsd/crypto/heimdal/appl/telnet/libtelnet/
H A Dauth.c490 if (ap->reply) in auth_reply()
491 (*ap->reply)(ap, data+2, cnt-2); in auth_reply()
H A Dkerberos5.c670 krb5_ap_rep_enc_part *reply; in kerberos5_reply() local
677 ret = krb5_rd_rep(context, auth_context, &inbuf, &reply); in kerberos5_reply()
684 krb5_free_ap_rep_enc_part(context, reply); in kerberos5_reply()
/freebsd/sys/dev/cxgbe/
H A Dt4_l2t.c147 mk_write_l2e(struct adapter *sc, struct l2t_entry *e, int sync, int reply, in mk_write_l2e() argument
158 req->params = htons(V_L2T_W_PORT(e->lport) | V_L2T_W_NOREPLY(!reply)); in mk_write_l2e()
/freebsd/contrib/unbound/testdata/
H A Dcachedb_expired_reply_ttl.crpl7 serve-expired-reply-ttl: 30
20 SCENARIO_BEGIN Test cachedb and serve-expired-reply-ttl.

12345678910>>...15