/illumos-gate/usr/src/lib/libdhcpagent/common/ |
H A D | dhcpagent_ipc.c | 48 * the protocol used here is a simple request/reply scheme: a client 62 * the format of a reply is much the same: a single dhcp_ipc_reply_t; 122 * input: dhcp_ipc_request_t *: the request the reply is for 127 * output: dhcp_ipc_reply_t *: the reply on success, NULL on failure 134 dhcp_ipc_reply_t *reply = calloc(1, DHCP_IPC_REPLY_SIZE + buffer_size); local 136 if (reply == NULL) 139 reply->message_type = request->message_type; 140 reply->ipc_id = request->ipc_id; 141 reply->return_code = return_code; 142 reply 161 dhcp_ipc_get_data(dhcp_ipc_reply_t *reply, size_t *size, dhcp_data_type_t *type) argument 265 dhcp_ipc_recv_reply(int fd, dhcp_ipc_reply_t **reply, int32_t timeout) argument 328 dhcp_ipc_send_reply(int fd, dhcp_ipc_reply_t *reply) argument 369 dhcp_ipc_make_request(dhcp_ipc_request_t *request, dhcp_ipc_reply_t **reply, int32_t timeout) argument 721 dhcp_ipc_reply_t *reply; local 852 dhcp_ipc_reply_t *reply; local [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/inetd/ |
H A D | tlx.c | 260 struct t_optmgmt request, reply; local 280 reply.opt.maxlen = sizeof (struct opthdr) + optlen; 281 reply.opt.buf = (char *)&optbuf; 282 reply.flags = 0; 284 if ((t_optmgmt(fd, &request, &reply) == -1) || 285 (reply.flags != T_SUCCESS)) {
|
/illumos-gate/usr/src/cmd/ndmpd/ndmp/ |
H A D | ndmpd_connect.c | 145 ndmp_connect_open_reply reply; local 148 reply.error = NDMP_NO_ERR; 155 reply.error = NDMP_ILLEGAL_STATE_ERR; 157 reply.error = NDMP_ILLEGAL_ARGS_ERR; 159 ndmp_send_reply(connection, (void *) &reply, 160 "sending connect_open reply"); 164 * Must wait until after sending the reply since the reply 168 if (reply.error == NDMP_NO_ERR) { 193 ndmp_connect_client_auth_reply reply; local 356 ndmp_connect_server_auth_reply reply; local 437 ndmp_connect_client_auth_reply_v3 reply; local [all...] |
H A D | ndmpd_data.c | 100 ndmp_data_get_state_reply_v2 reply; local 103 reply.error = NDMP_NO_ERR; 104 reply.operation = session->ns_data.dd_operation; 105 reply.state = session->ns_data.dd_state; 106 reply.halt_reason = session->ns_data.dd_halt_reason; 108 reply.est_time_remain = 110 reply.est_bytes_remain = 114 reply.bytes_processed = 117 reply.mover = session->ns_data.dd_mover; 118 reply 142 ndmp_data_start_backup_reply_v2 reply; local 183 ndmp_data_start_recover_reply_v2 reply; local 224 ndmp_data_get_env_reply reply; local 258 ndmp_data_stop_reply reply; local 301 ndmp_data_abort_reply reply; local 347 ndmp_data_get_state_reply_v3 reply; local 396 ndmp_data_start_backup_reply_v3 reply; local 486 ndmp_data_start_recover_reply_v3 reply; local 569 ndmp_data_abort_reply reply; local 625 ndmp_data_stop_reply reply; local 666 ndmp_data_listen_reply_v3 reply; local 747 ndmp_data_connect_reply_v3 reply; local 830 ndmp_data_get_env_reply reply; local 869 ndmp_data_get_state_reply_v4 reply; local 920 ndmp_data_connect_reply_v4 reply; local 995 ndmp_data_listen_reply_v4 reply; local 1090 ndmp_data_start_recover_filehist_reply_v4 reply; local 1375 ndmp_data_start_backup_reply_v3 reply; local 1501 ndmp_data_start_recover_reply_v3 reply; local 1617 void *reply; local 2067 ndmp_data_start_backup_reply reply; local 2216 ndmp_data_start_recover_reply_v2 reply; local [all...] |
/illumos-gate/usr/src/cmd/fs.d/udfs/fsck/ |
H A D | utilities.c | 204 reply(char *question) function 209 pfatal(gettext("INTERNAL ERROR: GOT TO reply()")); 350 if (reply(gettext("CONTINUE")) == 0) 483 if (reply(gettext("SALVAGE")) == 0) {
|
/illumos-gate/usr/src/cmd/hal/hald/ |
H A D | hald_runner.c | 368 DBusMessage *msg, *reply; local 384 /* Wait for the reply, should be almost instantanious */ 385 reply = 388 if (reply) { 390 (dbus_message_get_type(reply) == DBUS_MESSAGE_TYPE_METHOD_RETURN); 394 if (dbus_message_get_args (reply, &err, 413 dbus_message_unref(reply); 468 HAL_ERROR (("Malformed or unexpected reply message")); 545 DBusMessage *msg, *reply; local 562 /* Wait for the reply, shoul 575 DBusMessage *msg, *reply; local [all...] |
/illumos-gate/usr/src/cmd/ldmad/ |
H A D | ldmad.c | 41 * a reply message back to the control domain. The reply is either a result 299 ldma_message_header_t *reply = NULL; local 377 &reply, &reply_dlen); 379 LDMA_DBG("%s: DATA hdl=%llx, handler stat=%d reply=%p rlen=%d", 380 agent->info->name, hdl, status, (void *)reply, reply_dlen); 384 * If the handler has provided a reply message, we use it directly. 385 * Otherwise, we build a reply depending on the status of the request. 386 * In that case, we re-use the request buffer to build the reply 389 if (reply [all...] |
/illumos-gate/usr/src/uts/common/xen/io/ |
H A D | xenbus_dev.c | 484 const char *reply) 508 reply[i]; 526 void *reply; local 571 rc = xenbus_dev_request_and_reply(&xbs->u.msg, &reply); 581 (void) ddi_strtoul((char *)reply, NULL, 0, 601 rc = xenbusdrv_queue_reply(xbs, &xbs->u.msg, reply); 603 kmem_free(reply, xbs->u.msg.len + 1); 483 xenbusdrv_queue_reply(xenbus_dev_t *xbs, const struct xsd_sockmsg *msg, const char *reply) argument
|
/illumos-gate/usr/src/uts/sun4u/opl/io/ |
H A D | oplkmdrv.c | 904 * The max msg size should be at least the size of reply 1012 * okm_send_reply - Send a mailbox reply message. 1018 okm_rep_hdr_t reply; local 1023 reply.krp_version = htonl(OKM_PROTOCOL_VERSION); 1024 reply.krp_transid = htonl(transid); 1025 reply.krp_status = htonl(status); 1026 reply.krp_sadb_errno = htonl(sadb_err); 1027 reply.krp_sadb_version = htonl(sadb_ver); 1028 okmsp->km_sg_tx.msc_dptr = (caddr_t)&reply; 1029 okmsp->km_sg_tx.msc_len = sizeof (reply); [all...] |
/illumos-gate/usr/src/uts/common/io/scsi/adapters/mpt_sas/ |
H A D | mptsas_raid.c | 276 * Get the header and config page. reply contains the reply 391 * Get the header and config page. reply contains the reply frame, 447 * Get the header and config page. reply contains the reply frame, 515 * Get the header and config page. reply contains the reply frame, 581 pMPI2DefaultReply_t reply; local 642 * Even though reply doe [all...] |
/illumos-gate/usr/src/boot/lib/libstand/ |
H A D | rpc.c | 117 struct rpc_reply *reply; local 178 recv_head -= sizeof(*reply); 191 if (cc <= sizeof(*reply)) { 199 * Check the RPC reply status. 202 reply = (struct rpc_reply *)recv_head; 203 auth = &reply->rp_u.rpu_rok.rok_auth; 208 printf("callrpc: reply auth != NULL\n"); 213 x = ntohl(reply->rp_u.rpu_rok.rok_status); 219 recv_head += sizeof(*reply); 232 struct rpc_reply *reply; local [all...] |
/illumos-gate/usr/src/lib/libslp/clib/ |
H A D | SLPUtils.c | 66 char *reply, *unesc_reply; local 86 if ((err = slp_find_das("", &reply)) != SLP_OK && 90 /* Unpack the reply */ 91 if (reply) { 98 hSLP, reply, collate_scopes, 104 free(reply); 279 static SLPBoolean unpackSAAdvert_scope(slp_handle_impl_t *hSLP, char *reply, argument 285 if (!reply) { 293 if (slp_unpackSAAdvert(reply, &surl, &scopes, &attrs) != SLP_OK) { 311 * and sends it to slpd, returning the reply i 313 slp_find_das(const char *filter, char **reply) argument [all...] |
H A D | slp_net.c | 120 * retransmission due to a large reply, 'xid' should be the same as for 202 char *reply = NULL; local 219 /* make the socket, msghdr and reply buf */ 230 if (!reply && !(reply = malloc(mtu))) { 263 if (recvfrom(sockfd, reply, mtu, 0, NULL, NULL) < 0) { 264 /* if reply overflows, hand off to TCP */ 266 free(reply); reply = NULL; 275 slp_proto_err errcode = slp_get_errcode(reply); 459 char *reply, header[SLP_DEFAULT_SENDMTU]; local 574 slp_tcp_read(int sockfd, char **reply) argument 1012 char *reply = NULL; local [all...] |
/illumos-gate/usr/src/lib/libnsl/rpc/ |
H A D | svc_dg.c | 422 char *reply; local 425 if (cache_get(xprt, msg, &reply, &replylen)) { 427 tu_data->udata.buf = reply; 625 * Copies pointers to reply buffers into fifo cache 645 * The cached reply and length
|
/illumos-gate/usr/src/cmd/backup/restore/ |
H A D | utilities.c | 453 * Elicit a reply. 456 reply(char *question) function 501 if (reply(gettext("abort")) == GOOD) { 502 if (reply(gettext("dump core")) == GOOD) 521 if (reply(gettext("abort")) == GOOD) { 522 if (reply(gettext("dump core")) == GOOD)
|
/illumos-gate/usr/src/cmd/cmd-inet/lib/nwamd/ |
H A D | ncu_ip.c | 151 dhcp_ipc_reply_t *reply; local 184 err = dhcp_ipc_make_request(request, &reply, DHCP_IPC_WAIT_DEFAULT); 185 if (err != 0 || reply->return_code != 0) { 187 dhcp_ipc_strerror(err == 0 ? reply->return_code : err)); 190 /* get data from the reply */ 191 opt = dhcp_ipc_get_data(reply, &opt_len, NULL); 207 (void) snprintf(errmsg, LINE_MAX, "cannot decode reply"); 212 free(reply); 218 free(reply);
|
/illumos-gate/usr/src/uts/common/io/drm/ |
H A D | drm_io32.h | 181 struct drm_wait_vblank_reply_32 reply; member in union:drm_wait_vblank_32
|
/illumos-gate/usr/src/lib/smbsrv/libsmbns/common/ |
H A D | smbns_browser.c | 598 int data_count, int reply, char *mailbox) 604 short class = (reply == ONE_WAY_TRANSACTION) ? 2 : 0; 631 reply, /* No reply */ 900 unsigned short reply; local 926 &reply, /* No reply */ 597 smb_browser_load_transact_header(unsigned char *buffer, int maxcnt, int data_count, int reply, char *mailbox) argument
|
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_srv.c | 66 krb5_kdc_rep * reply, 624 /* remember to set the PREAUTH flag in the reply */ 672 krb5_kdc_rep * reply, 882 /* if this is an RFC reply or draft9 client requested a checksum 883 * in the reply instead of the nonce, create an RFC-style keypack 891 /* retrieve checksums for a given enctype of the reply key */ 667 pkinit_server_return_padata(krb5_context context, krb5_pa_data * padata, struct _krb5_db_entry_new * client, krb5_data *req_pkt, krb5_kdc_req * request, krb5_kdc_rep * reply, struct _krb5_key_data * client_key, krb5_keyblock * encrypting_key, krb5_pa_data ** send_pa, preauth_get_entry_data_proc server_get_entry_data, void *pa_plugin_context, void **pa_request_context) argument
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/in.ndpd/ |
H A D | ndp.c | 320 dhcp_ipc_reply_t *reply = NULL; local 335 error = dhcp_ipc_make_request(request, &reply, 0); 343 error = reply->return_code; 344 free(reply);
|
/illumos-gate/usr/src/cmd/smbsrv/smbd/ |
H A D | smbd_doorsvc.c | 741 smb_gmttoken_response_t reply; local 745 bzero(&reply, sizeof (smb_gmttoken_response_t)); 751 reply.gtr_gmttokens.gtr_gmttokens_val = malloc(request.gtq_count * 753 bzero(reply.gtr_gmttokens.gtr_gmttokens_val, request.gtq_count * 756 if (reply.gtr_gmttokens.gtr_gmttokens_val == NULL) { 762 &reply.gtr_count, 763 &reply.gtr_gmttokens.gtr_gmttokens_len, 764 reply.gtr_gmttokens.gtr_gmttokens_val); 766 arg->rbuf = smb_common_encode(&reply, smb_gmttoken_response_xdr, 773 for (i = 0, gmtp = reply 854 smb_quota_response_t reply; local 907 dfs_referral_response_t reply; local 939 uint32_t reply; local 964 int reply; local [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | sendto_kdc.c | 343 const krb5_data *reply, 350 if (krb5_is_krb_error(reply)) { 353 if (decode_krb5_error(reply, &err_reply) == 0) { 367 * return the response (if any) in 'reply'. 372 * The storage for 'reply' is allocated and should be freed by the caller 378 const krb5_data *realm, krb5_data *reply, 381 return (krb5_sendto_kdc2(context, message, realm, reply, use_master, 393 const krb5_data *realm, krb5_data *reply, 470 retval = krb5int_sendto (context, message, &addrs, 0, reply, 0, 0, 1223 krb5_data reply; local 342 check_for_svc_unavailable(krb5_context context, const krb5_data *reply, void *msg_handler_data) argument 377 krb5_sendto_kdc(krb5_context context, const krb5_data *message, const krb5_data *realm, krb5_data *reply, int *use_master, int tcp_only) argument 392 krb5_sendto_kdc2(krb5_context context, const krb5_data *message, const krb5_data *realm, krb5_data *reply, int *use_master, int tcp_only, char **hostname_used) argument 1272 krb5int_sendto(krb5_context context, const krb5_data *message, const struct addrlist *addrs, struct sendto_callback_info* callback_info, krb5_data *reply, struct sockaddr *localaddr, socklen_t *localaddrlen, struct sockaddr *remoteaddr, socklen_t *remoteaddrlen, int *addr_used, int (*msg_handler)(krb5_context, const krb5_data *, void *), void *msg_handler_data) argument [all...] |
/illumos-gate/usr/src/cmd/xargs/ |
H A D | xargs.c | 696 char reply[LINE_MAX]; local 721 for (i = 0; i < LINE_MAX && read(PROMPT, &reply[i], 1) > 0; i++) { 722 if (reply[i] == '\n') { 728 reply[i] = 0; 738 return (yes_check(reply));
|
/illumos-gate/usr/src/grub/grub-0.97/netboot/ |
H A D | nic.c | 445 * broadcast packets. This will cause the reply to the packets we are 708 BOOTP reply, be backward compatible with 881 int await_reply(reply_t reply, int ival, void *ptr, long timeout) argument 969 result = reply(ival, ptr, ptype, ip, udp); 975 * action. This allows us reply to arp and igmp queryies. 996 printf("Sent ARP reply to: %@\n",tmp);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/in.mpathd/ |
H A D | mpd_probe.c | 37 * or ICMP Echo reply. Packet format is same for both IPv4 and IPv6 64 struct pr_icmp *reply, struct in6_addr fromaddr, struct timeval *recv_tvp); 66 struct pr_icmp *reply, struct in6_addr fromaddr); 68 struct pr_icmp *reply, struct in6_addr fromaddr); 88 * Probe success - A matching probe reply received before CRTT ms has elapsed 90 * Probe failure - No probe reply received and more than CRTT ms has elapsed 305 * not see a reply to the probe and will fail the interface if normal 379 struct pr_icmp *reply; local 437 * reply, starting from the icmp hdr. 441 reply 507 struct pr_icmp *reply; local 617 incoming_rtt_reply(struct phyint_instance *pii, struct pr_icmp *reply, struct in6_addr fromaddr) argument 705 incoming_echo_reply(struct phyint_instance *pii, struct pr_icmp *reply, struct in6_addr fromaddr, struct timeval *recv_tvp) argument 1121 incoming_mcast_reply(struct phyint_instance *pii, struct pr_icmp *reply, struct in6_addr fromaddr) argument [all...] |