Searched refs:reply (Results 126 - 150 of 197) sorted by relevance

12345678

/illumos-gate/usr/src/cmd/fs.d/udfs/fsck/
H A Dutilities.c204 reply(char *question) function
209 pfatal(gettext("INTERNAL ERROR: GOT TO reply()"));
350 if (reply(gettext("CONTINUE")) == 0)
483 if (reply(gettext("SALVAGE")) == 0) {
/illumos-gate/usr/src/ucblib/librpcsoc/
H A Dsvc_udp.c198 char *reply; local
215 if (cache_get(xprt, msg, &reply, &replylen)) {
216 (void) _sendto(xprt->xp_sock, reply, (int) replylen, 0,
293 * Copies pointers to reply buffers into fifo cache
322 * The cached reply and length
/illumos-gate/usr/src/uts/common/fs/nfs/
H A Dnfs_dump.c110 int reply; local
131 if (error = nd_poll(tiptr, retry, &reply))
134 if (!reply) {
484 * Briefly enable interrupts before checking for a reply;
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/
H A DuDNS.c323 // negative response so that applications get a reply. We also need to reinitialize the DNS servers
1360 // It's perfectly fine for this socket to close after the first reply. The server might
1362 // We'll only log this event if we've never received a reply before.
1388 tcpInfo->reply = mDNSPlatformMemAllocate(tcpInfo->replylen);
1389 if (!tcpInfo->reply) { LogMsg("ERROR: tcpCallback - malloc failed"); err = mStatus_NoMemoryErr; goto exit; }
1392 n = mDNSPlatformReadTCP(sock, ((char *)tcpInfo->reply) + (tcpInfo->nread - 2), tcpInfo->replylen - (tcpInfo->nread - 2), &closed);
1429 DNSMessage *reply = tcpInfo->reply; local
1430 mDNSu8 *end = (mDNSu8 *)tcpInfo->reply + tcpInfo->replylen;
1435 tcpInfo->reply
3730 PCPMapReply *reply = (PCPMapReply*)pkt; local
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/include/
H A Dpreauth_plugin.h90 * supply us with a key for encrypting the AS reply (server-only). */
405 krb5_kdc_rep *reply,
/illumos-gate/usr/src/cmd/fs.d/ufs/fsck/
H A Dpass4.c216 if (reply("REPAIR") == 0)
H A Ddir.c454 if (preen || reply("ADJUST") == 1) {
536 if (!preen && (reply("RECONNECT") == 0))
550 if (preen || reply("CREATE") == 1) {
588 if (reply("REALLOCATE") == 0) {
985 if (!preen && (reply("EXPAND") == 0))
1366 if (reply("REMOVE OLD ENTRY") == 0) {
/illumos-gate/usr/src/cmd/krb5/krb5kdc/
H A Dkdc_util.h169 krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply,
H A Dkdc_preauth.c128 krb5_kdc_req *request, krb5_kdc_rep *reply,
138 krb5_kdc_req *request, krb5_kdc_rep *reply,
150 krb5_kdc_req *request, krb5_kdc_rep *reply,
162 krb5_kdc_req *request, krb5_kdc_rep *reply,
192 krb5_kdc_req *request, krb5_kdc_rep *reply,
1102 krb5_kdc_req *request, krb5_kdc_rep *reply,
1174 if ((retval = ap->return_padata(context, pa, client, req_pkt, request, reply,
1189 reply->padata = send_pa_list;
1512 krb5_kdc_req *request, krb5_kdc_rep *reply,
1590 krb5_kdc_req *request, krb5_kdc_rep *reply,
1101 return_padata(krb5_context context, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, void **padata_context) argument
1510 etype_info_as_rep_helper(krb5_context context, krb5_pa_data * padata, krb5_db_entry *client, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, int etype_info2) argument
1587 return_etype_info2(krb5_context context, krb5_pa_data * padata, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc etype_get_entry_data, void *pa_system_context, void **pa_request_context) argument
1604 return_etype_info(krb5_context context, krb5_pa_data * padata, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc etypeget_entry_data, void *pa_system_context, void **pa_request_context) argument
1620 return_pw_salt(krb5_context context, krb5_pa_data *in_padata, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc etype_get_entry_data, void *pa_system_context, void **pa_request_context) argument
1710 return_sam_data(krb5_context context, krb5_pa_data *in_padata, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc sam_get_entry_data, void *pa_system_context, void **pa_request_context) argument
[all...]
/illumos-gate/usr/src/uts/common/io/scsi/adapters/mpt_sas/
H A Dmptsas_impl.c307 pMpi2ConfigReply_t reply; local
386 * cmd_rfm points to the reply message if a reply was given. Check the
393 reply = (pMpi2ConfigReply_t)(mpt->m_reply_frame + (cmd->cmd_rfm
396 &reply->Header.PageType);
398 &reply->Header.PageNumber);
400 &reply->Header.PageLength);
402 &reply->Header.PageVersion);
404 &reply->ExtPageType);
406 &reply
1088 mptsas_ioc_task_management(mptsas_t *mpt, int task_type, uint16_t dev_handle, int lun, uint8_t *reply, uint32_t reply_size, int mode) argument
[all...]
H A Dmptsas_raid.c276 * Get the header and config page. reply contains the reply
391 * Get the header and config page. reply contains the reply frame,
447 * Get the header and config page. reply contains the reply frame,
515 * Get the header and config page. reply contains the reply frame,
581 pMPI2DefaultReply_t reply; local
642 * Even though reply doe
[all...]
/illumos-gate/usr/src/uts/common/sys/scsi/adapters/mpt_sas/mpi/
H A Dmpi2_history.txt69 * Added union of reply descriptors.
86 * Added #defines for marking a reply descriptor as unused.
92 * In all request and reply descriptors, replaced VF_ID
333 * reply with MaxReplyDescriptorPostQueueDepth.
357 * IOCFacts reply.
419 * Added Send Host Message request and reply.
442 * 08-31-07 02.00.01 Modifications to RAID Action request and reply,
502 * and reply messages.
/illumos-gate/usr/src/uts/common/fs/smbsrv/
H A Dsmb2_ioctl.c183 * SMB2 Ioctl reply
187 &sr->reply, "w..lqqlllll4.#C",
H A Dsmb_vss.c70 * before the reply. If the the max data bytes to return is
417 smb_vss_get_snapshots_free(smb_gmttoken_response_t *reply) argument
419 xdr_free(smb_gmttoken_response_xdr, (char *)reply);
H A Dsmb2_query_dir.c249 * SMB2 Query Directory reply
255 &sr->reply, "wwlC",
261 (void) smb_mbc_encodef(&sr->reply, ".");
H A Dsmb_negotiate.c275 * if it's Negotiate execute it, then send the reply, etc.
313 * Reserve space for the reply header.
315 (void) smb_mbc_encodef(&sr->reply, "#.", SMB_HEADER_LEN);
333 sr->cur_reply_offset = sr->reply.chain_offset;
425 * send an SMB2 reply to that SMB1 request. Yes, it's very
426 * strange, but this SMB1 request can have an SMB2 reply!
427 * To accomplish this, we let the SMB2 code send the reply
429 * dispatch logic so it will NOT send an SMB1 reply.
430 * (Or possibly send an SMB1 error reply.)
H A Dsmb_common_transact.c822 struct mbuf_chain reply; local
858 * Initialize the reply mbuf chain. Note that we re-initialize
861 MBC_SETUP(&reply, smb_maxbufsize);
919 MBC_FLUSH(&reply);
920 (void) smb_mbc_encodef(&reply, SMB_HEADER_ED_FMT,
934 (void) smb_mbc_encodef(&reply,
954 smb_sign_reply(sr, &reply);
956 (void) smb_session_send(sr->session, 0, &reply);
960 m_freem(reply.chain);
1586 pos = MBC_LENGTH(&sr->reply)
[all...]
/illumos-gate/usr/src/uts/common/io/
H A Dbscbus.c125 BSC_CMD_REPLY = 7, /* got reply byte */
285 uint8_t reply[BSCBUS_BUFSIZE]; member in struct:bscbus_channel_state
703 csp->reply[rcvd = csp->index] = data;
710 csp->reply[0], csp->reply[1],
711 csp->reply[2], csp->reply[3],
712 csp->reply[4], csp->reply[5],
713 csp->reply[
[all...]
/illumos-gate/usr/src/cmd/allocate/
H A Ddisk_clean.sh166 read reply
170 if [ "$choice" = "$reply" ]
/illumos-gate/usr/src/stand/lib/fs/nfs/
H A Dnfs3_xdr.c264 if (!xdr_pointer(xdrs, (char **)&objp->reply.entries,
267 return (xdr_bool(xdrs, &objp->reply.eof));
/illumos-gate/usr/src/cmd/sendmail/src/
H A Dusersmtp.c36 #define REPLYCLASS(r) (((r) / 10) % 10) /* second digit of reply code */
139 r = reply(m, mci, e, TimeOuts.to_initial, esmtp_check, NULL,
183 r = reply(m, mci, e,
239 r = reply(m, mci, e, TimeOuts.to_miscshort, NULL, &enhsc,
277 ** firstline -- set if this is the first line of the reply.
388 ** firstline -- set if this is the first line of the reply.
590 ** This gets the relevant sasl response data out of the reply
595 ** firstline -- set if this is the first line of the reply.
1767 ** "Unlike a zero-length client answer to a 334 reply, a zero-
1790 /* get the reply */
3047 reply(m, mci, e, timeout, pfunc, enhstat, rtype) function
[all...]
/illumos-gate/usr/src/cmd/fs.d/nfs/mountd/
H A Dmountd.c771 syslog(LOG_ERR, "couldn't send reply to %s", host);
773 syslog(LOG_ERR, "couldn't send reply to %s: %m", host);
1252 goto reply;
1266 goto reply;
1281 goto reply;
1296 goto reply;
1302 goto reply;
1311 goto reply;
1321 goto reply;
1339 goto reply;
[all...]
/illumos-gate/usr/src/uts/common/io/rsm/
H A Drsm.c2765 rsmipc_reply_t *reply)
2822 reply->rsmipc_mode = perm;
2823 reply->rsmipc_uid = seg->s_uid;
2824 reply->rsmipc_gid = seg->s_gid;
2825 reply->rsmipc_segid = seg->s_segid;
2826 reply->rsmipc_seglen = seg->s_len;
3617 rsmipc_reply_t reply; local
3624 reply.rsmipc_status = (short)rsmsegacl_validate(req, src, &reply);
3626 reply
2764 rsmsegacl_validate(rsmipc_request_t *req, rsm_node_id_t rnode, rsmipc_reply_t *reply) argument
4921 rsmipc_reply_t reply; local
5290 rsmipc_send(rsm_node_id_t dest, rsmipc_request_t *req, rsmipc_reply_t *reply) argument
6093 rsmipc_reply_t reply; local
[all...]
/illumos-gate/usr/src/cmd/backup/restore/
H A Dutilities.c453 * Elicit a reply.
456 reply(char *question) function
501 if (reply(gettext("abort")) == GOOD) {
502 if (reply(gettext("dump core")) == GOOD)
521 if (reply(gettext("abort")) == GOOD) {
522 if (reply(gettext("dump core")) == GOOD)
/illumos-gate/usr/src/uts/sun4u/starcat/io/
H A Dschpc.c134 kcondvar_t reply_cv; /* condvar for getting reply */
135 kmutex_t reply_lock; /* mutex for getting reply */
140 pcimsg_t reply; /* mboxsc_xxxmsg() reply msg */ member in struct:schpc_replylist
141 boolean_t reply_recvd; /* msg reply received */
2835 "schpc_reply_handler() - 0x%lx transid reply "
2845 * emulate mboxsc_getmsg by copying the reply
2851 bcopy((caddr_t)pmsg, &entry->reply, length);
2853 /* reply was received */
2857 * wake up thread waiting for reply wit
3083 pcimsg_t reply; local
3175 pcimsg_t reply; local
[all...]

Completed in 159 milliseconds

12345678