/freebsd/sys/dev/mpt/ |
H A D | mpt.c | 508 MSG_CONFIG_REPLY *reply; in mpt_config_reply_handler() local 511 reply = (MSG_CONFIG_REPLY *)reply_frame; in mpt_config_reply_handler() 513 bcopy(&reply->Header, &cfgp->Header, in mpt_config_reply_handler() 515 cfgp->ExtPageLength = reply->ExtPageLength; in mpt_config_reply_handler() 516 cfgp->ExtPageType = reply->ExtPageType; in mpt_config_reply_handler() 1245 mpt_send_event_ack(mpt, req, &record->reply, record->context); in mpt_free_request() 1246 offset = (uint32_t)((uint8_t *)record - mpt->reply); in mpt_free_request() 1444 data16 = (u_int16_t *)reply; in mpt_recv_handshake_reply() 1446 hdr = (MSG_DEFAULT_REPLY *)reply; in mpt_recv_handshake_reply() 1553 MSG_IOC_INIT_REPLY reply; in mpt_send_ioc_init() local [all …]
|
H A D | mpt_pci.c | 680 if (bus_dmamem_alloc(mpt->reply_dmat, (void **)&mpt->reply, in mpt_dma_mem_alloc() 691 bus_dmamap_load(mpt->reply_dmat, mpt->reply_dmap, mpt->reply, in mpt_dma_mem_alloc() 717 bus_dmamem_free(mpt->reply_dmat, mpt->reply, mpt->reply_dmap); in mpt_dma_mem_free()
|
H A D | mpt.h | 493 MSG_EVENT_NOTIFY_REPLY reply; member 660 uint8_t *reply; /* KVA of reply memory */ member 854 ((void *)(&m->reply[i])) 1065 size_t reply_len, void *reply);
|
/freebsd/contrib/sendmail/cf/feature/ |
H A D | compat_check.m4 | 29 dnl reply code
|
H A D | check_other.m4 | 23 dnl select which SMTP reply type(s) should be allowed to match?
|
/freebsd/usr.sbin/ppp/ |
H A D | tty.c | 257 struct ng_mesg *reply; in LoadLineDiscipline() local 272 reply = (struct ng_mesg *)rbuf; in LoadLineDiscipline() 273 info = (struct nodeinfo *)reply->data; in LoadLineDiscipline() 352 if (NgRecvMsg(cs, reply, sizeof rbuf, NULL) < 0) { in LoadLineDiscipline()
|
H A D | bundle.c | 1545 int niov, f, expect, newsid, fd[SEND_MAXFD], nfd, reply[2]; in bundle_SendDatalink() local 1570 if (fd[0] != -1 && socketpair(AF_UNIX, SOCK_STREAM, PF_UNSPEC, reply) != -1) { in bundle_SendDatalink() 1575 fd[1] = reply[1]; in bundle_SendDatalink() 1604 if (setsockopt(reply[0], SOL_SOCKET, SO_SNDBUF, &expect, sizeof(int)) == -1) in bundle_SendDatalink() 1607 if (setsockopt(reply[1], SOL_SOCKET, SO_RCVBUF, &expect, sizeof(int)) == -1) in bundle_SendDatalink() 1625 if ((got = read(reply[0], &newpid, sizeof newpid)) == sizeof newpid) { in bundle_SendDatalink() 1632 if ((got = writev(reply[0], iov + 1, niov - 1)) != expect) { in bundle_SendDatalink() 1648 close(reply[0]); in bundle_SendDatalink() 1649 close(reply[1]); in bundle_SendDatalink()
|
/freebsd/contrib/unbound/daemon/ |
H A D | stats.c | 380 uint8_t *reply = NULL; in server_stats_obtain() local 415 if(!tube_read_msg(worker->cmd, &reply, &len, 0)) in server_stats_obtain() 420 memcpy(s, reply, (size_t)len); in server_stats_obtain() 421 free(reply); in server_stats_obtain()
|
/freebsd/sbin/fsck_ffs/ |
H A D | inode.c | 104 if (reply("ADJUST LENGTH") == 1) { in ckinode() 145 if (reply("ADJUST LENGTH") == 1) { in ckinode() 231 if (reply("ADJUST LENGTH") == 1) { in iblock() 478 if (preen || reply("FIX") != 0) { in ginode() 567 if (preen || reply("FIX") != 0) { in getnextinode() 1068 else if (reply("CORRECT") == 0) in check_blkcnt() 1250 if (preen || reply("CLEAR") == 1) { in clri()
|
H A D | pass3.c | 103 if (reply("RECONNECT") == 0) in pass3()
|
/freebsd/contrib/telnet/libtelnet/ |
H A D | kerberos5.c | 625 krb5_ap_rep_enc_part *reply; in kerberos5_reply() local 632 ret = krb5_rd_rep(context, auth_context, &inbuf, &reply); in kerberos5_reply() 638 krb5_free_ap_rep_enc_part(context, reply); in kerberos5_reply()
|
H A D | auth.c | 487 if (ap->reply) in auth_reply() 488 (*ap->reply)(ap, data+2, cnt-2); in auth_reply()
|
/freebsd/sys/rpc/rpcsec_gss/ |
H A D | rpcsec_gss.c | 1018 struct rpc_msg *reply = (struct rpc_msg *) msg; in rpc_gss_refresh() local 1040 if (reply->rm_reply.rp_stat == MSG_DENIED in rpc_gss_refresh() 1041 && reply->rm_reply.rp_rjct.rj_stat == AUTH_ERROR in rpc_gss_refresh() 1042 && (reply->rm_reply.rp_rjct.rj_why == RPCSEC_GSS_CREDPROBLEM in rpc_gss_refresh() 1043 || reply->rm_reply.rp_rjct.rj_why == RPCSEC_GSS_CTXPROBLEM)) { in rpc_gss_refresh()
|
/freebsd/crypto/heimdal/kdc/ |
H A D | kerberos5.c | 330 krb5_data *reply) in _kdc_encode_reply() argument 436 reply->data = buf; in _kdc_encode_reply() 437 reply->length = buf_size; in _kdc_encode_reply() 960 krb5_data *reply, in _kdc_as_rep() argument 1814 reply_key, 0, &e_text, reply); in _kdc_as_rep() 1821 if (datagram_reply && reply->length > config->max_datagram_reply_length) { in _kdc_as_rep() 1822 krb5_data_free(reply); in _kdc_as_rep() 1838 reply); in _kdc_as_rep()
|
/freebsd/contrib/ntp/sntp/m4/ |
H A D | openldap.m4 | 202 unsigned char reply[64*1024]; 208 len = res_query(request, ns_c_in, ns_t_srv, reply, sizeof(reply)); 214 len = res_query(request, C_IN, T_SRV, reply, sizeof(reply)); 216 p = reply; 227 status = dn_expand( reply, reply+len, p, host, sizeof(host));
|
/freebsd/sys/dev/mpr/mpi/ |
H A D | mpi2_history.txt | 71 * Added union of reply descriptors. 88 * Added #defines for marking a reply descriptor as unused. 94 * In all request and reply descriptors, replaced VF_ID 436 * reply with MaxReplyDescriptorPostQueueDepth. 460 * IOCFacts reply. 522 * Added Send Host Message request and reply. 585 * 08-31-07 02.00.01 Modifications to RAID Action request and reply, 653 * and reply messages.
|
/freebsd/libexec/bootpd/ |
H A D | Changes | 65 determine the size of the reply message. 71 address provided in reply messages. (Also minor bug fix) 94 will be put in the reply if either the client or bootpd 198 HP clients (need reply sent to broadcast address)
|
/freebsd/usr.bin/chat/ |
H A D | chat.c | 762 char *reply; in chat_expect() local 814 reply = expect_strtok (s, "-"); in chat_expect() 826 if (reply == (char *) 0 || exit_code != 3) in chat_expect() 829 chat_send (reply); in chat_expect()
|
/freebsd/crypto/heimdal/lib/hdb/ |
H A D | db.c | 176 DB__get(krb5_context context, HDB *db, krb5_data key, krb5_data *reply) in DB__get() argument 200 krb5_data_copy(reply, v.data, v.size); in DB__get()
|
H A D | db3.c | 173 DB__get(krb5_context context, HDB *db, krb5_data key, krb5_data *reply) in DB__get() argument 193 krb5_data_copy(reply, v.data, v.size); in DB__get()
|
H A D | ndbm.c | 224 NDBM__get(krb5_context context, HDB *db, krb5_data key, krb5_data *reply) in NDBM__get() argument 240 krb5_data_copy(reply, v.dptr, v.dsize); in NDBM__get()
|
/freebsd/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | auth.c | 490 if (ap->reply) in auth_reply() 491 (*ap->reply)(ap, data+2, cnt-2); in auth_reply()
|
H A D | kerberos5.c | 670 krb5_ap_rep_enc_part *reply; in kerberos5_reply() local 677 ret = krb5_rd_rep(context, auth_context, &inbuf, &reply); in kerberos5_reply() 684 krb5_free_ap_rep_enc_part(context, reply); in kerberos5_reply()
|
/freebsd/sys/dev/cxgbe/ |
H A D | t4_l2t.c | 147 mk_write_l2e(struct adapter *sc, struct l2t_entry *e, int sync, int reply, in mk_write_l2e() argument 158 req->params = htons(V_L2T_W_PORT(e->lport) | V_L2T_W_NOREPLY(!reply)); in mk_write_l2e()
|
/freebsd/contrib/unbound/testdata/ |
H A D | cachedb_expired_reply_ttl.crpl | 7 serve-expired-reply-ttl: 30 20 SCENARIO_BEGIN Test cachedb and serve-expired-reply-ttl.
|