/illumos-gate/usr/src/cmd/fs.d/udfs/fsck/ |
H A D | utilities.c | 204 reply(char *question) function 209 pfatal(gettext("INTERNAL ERROR: GOT TO reply()")); 350 if (reply(gettext("CONTINUE")) == 0) 483 if (reply(gettext("SALVAGE")) == 0) {
|
/illumos-gate/usr/src/ucblib/librpcsoc/ |
H A D | svc_udp.c | 198 char *reply; local 215 if (cache_get(xprt, msg, &reply, &replylen)) { 216 (void) _sendto(xprt->xp_sock, reply, (int) replylen, 0, 293 * Copies pointers to reply buffers into fifo cache 322 * The cached reply and length
|
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs_dump.c | 110 int reply; local 131 if (error = nd_poll(tiptr, retry, &reply)) 134 if (!reply) { 484 * Briefly enable interrupts before checking for a reply;
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | uDNS.c | 323 // negative response so that applications get a reply. We also need to reinitialize the DNS servers 1360 // It's perfectly fine for this socket to close after the first reply. The server might 1362 // We'll only log this event if we've never received a reply before. 1388 tcpInfo->reply = mDNSPlatformMemAllocate(tcpInfo->replylen); 1389 if (!tcpInfo->reply) { LogMsg("ERROR: tcpCallback - malloc failed"); err = mStatus_NoMemoryErr; goto exit; } 1392 n = mDNSPlatformReadTCP(sock, ((char *)tcpInfo->reply) + (tcpInfo->nread - 2), tcpInfo->replylen - (tcpInfo->nread - 2), &closed); 1429 DNSMessage *reply = tcpInfo->reply; local 1430 mDNSu8 *end = (mDNSu8 *)tcpInfo->reply + tcpInfo->replylen; 1435 tcpInfo->reply 3730 PCPMapReply *reply = (PCPMapReply*)pkt; local [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/include/ |
H A D | preauth_plugin.h | 90 * supply us with a key for encrypting the AS reply (server-only). */ 405 krb5_kdc_rep *reply,
|
/illumos-gate/usr/src/cmd/fs.d/ufs/fsck/ |
H A D | pass4.c | 216 if (reply("REPAIR") == 0)
|
H A D | dir.c | 454 if (preen || reply("ADJUST") == 1) { 536 if (!preen && (reply("RECONNECT") == 0)) 550 if (preen || reply("CREATE") == 1) { 588 if (reply("REALLOCATE") == 0) { 985 if (!preen && (reply("EXPAND") == 0)) 1366 if (reply("REMOVE OLD ENTRY") == 0) {
|
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_util.h | 169 krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply,
|
H A D | kdc_preauth.c | 128 krb5_kdc_req *request, krb5_kdc_rep *reply, 138 krb5_kdc_req *request, krb5_kdc_rep *reply, 150 krb5_kdc_req *request, krb5_kdc_rep *reply, 162 krb5_kdc_req *request, krb5_kdc_rep *reply, 192 krb5_kdc_req *request, krb5_kdc_rep *reply, 1102 krb5_kdc_req *request, krb5_kdc_rep *reply, 1174 if ((retval = ap->return_padata(context, pa, client, req_pkt, request, reply, 1189 reply->padata = send_pa_list; 1512 krb5_kdc_req *request, krb5_kdc_rep *reply, 1590 krb5_kdc_req *request, krb5_kdc_rep *reply, 1101 return_padata(krb5_context context, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, void **padata_context) argument 1510 etype_info_as_rep_helper(krb5_context context, krb5_pa_data * padata, krb5_db_entry *client, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, int etype_info2) argument 1587 return_etype_info2(krb5_context context, krb5_pa_data * padata, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc etype_get_entry_data, void *pa_system_context, void **pa_request_context) argument 1604 return_etype_info(krb5_context context, krb5_pa_data * padata, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc etypeget_entry_data, void *pa_system_context, void **pa_request_context) argument 1620 return_pw_salt(krb5_context context, krb5_pa_data *in_padata, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc etype_get_entry_data, void *pa_system_context, void **pa_request_context) argument 1710 return_sam_data(krb5_context context, krb5_pa_data *in_padata, krb5_db_entry *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_key_data *client_key, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc sam_get_entry_data, void *pa_system_context, void **pa_request_context) argument [all...] |
/illumos-gate/usr/src/uts/common/io/scsi/adapters/mpt_sas/ |
H A D | mptsas_impl.c | 307 pMpi2ConfigReply_t reply; local 386 * cmd_rfm points to the reply message if a reply was given. Check the 393 reply = (pMpi2ConfigReply_t)(mpt->m_reply_frame + (cmd->cmd_rfm 396 &reply->Header.PageType); 398 &reply->Header.PageNumber); 400 &reply->Header.PageLength); 402 &reply->Header.PageVersion); 404 &reply->ExtPageType); 406 &reply 1088 mptsas_ioc_task_management(mptsas_t *mpt, int task_type, uint16_t dev_handle, int lun, uint8_t *reply, uint32_t reply_size, int mode) argument [all...] |
H A D | mptsas_raid.c | 276 * Get the header and config page. reply contains the reply 391 * Get the header and config page. reply contains the reply frame, 447 * Get the header and config page. reply contains the reply frame, 515 * Get the header and config page. reply contains the reply frame, 581 pMPI2DefaultReply_t reply; local 642 * Even though reply doe [all...] |
/illumos-gate/usr/src/uts/common/sys/scsi/adapters/mpt_sas/mpi/ |
H A D | mpi2_history.txt | 69 * Added union of reply descriptors. 86 * Added #defines for marking a reply descriptor as unused. 92 * In all request and reply descriptors, replaced VF_ID 333 * reply with MaxReplyDescriptorPostQueueDepth. 357 * IOCFacts reply. 419 * Added Send Host Message request and reply. 442 * 08-31-07 02.00.01 Modifications to RAID Action request and reply, 502 * and reply messages.
|
/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb2_ioctl.c | 183 * SMB2 Ioctl reply 187 &sr->reply, "w..lqqlllll4.#C",
|
H A D | smb_vss.c | 70 * before the reply. If the the max data bytes to return is 417 smb_vss_get_snapshots_free(smb_gmttoken_response_t *reply) argument 419 xdr_free(smb_gmttoken_response_xdr, (char *)reply);
|
H A D | smb2_query_dir.c | 249 * SMB2 Query Directory reply 255 &sr->reply, "wwlC", 261 (void) smb_mbc_encodef(&sr->reply, ".");
|
H A D | smb_negotiate.c | 275 * if it's Negotiate execute it, then send the reply, etc. 313 * Reserve space for the reply header. 315 (void) smb_mbc_encodef(&sr->reply, "#.", SMB_HEADER_LEN); 333 sr->cur_reply_offset = sr->reply.chain_offset; 425 * send an SMB2 reply to that SMB1 request. Yes, it's very 426 * strange, but this SMB1 request can have an SMB2 reply! 427 * To accomplish this, we let the SMB2 code send the reply 429 * dispatch logic so it will NOT send an SMB1 reply. 430 * (Or possibly send an SMB1 error reply.)
|
H A D | smb_common_transact.c | 822 struct mbuf_chain reply; local 858 * Initialize the reply mbuf chain. Note that we re-initialize 861 MBC_SETUP(&reply, smb_maxbufsize); 919 MBC_FLUSH(&reply); 920 (void) smb_mbc_encodef(&reply, SMB_HEADER_ED_FMT, 934 (void) smb_mbc_encodef(&reply, 954 smb_sign_reply(sr, &reply); 956 (void) smb_session_send(sr->session, 0, &reply); 960 m_freem(reply.chain); 1586 pos = MBC_LENGTH(&sr->reply) [all...] |
/illumos-gate/usr/src/uts/common/io/ |
H A D | bscbus.c | 125 BSC_CMD_REPLY = 7, /* got reply byte */ 285 uint8_t reply[BSCBUS_BUFSIZE]; member in struct:bscbus_channel_state 703 csp->reply[rcvd = csp->index] = data; 710 csp->reply[0], csp->reply[1], 711 csp->reply[2], csp->reply[3], 712 csp->reply[4], csp->reply[5], 713 csp->reply[ [all...] |
/illumos-gate/usr/src/cmd/allocate/ |
H A D | disk_clean.sh | 166 read reply 170 if [ "$choice" = "$reply" ]
|
/illumos-gate/usr/src/stand/lib/fs/nfs/ |
H A D | nfs3_xdr.c | 264 if (!xdr_pointer(xdrs, (char **)&objp->reply.entries, 267 return (xdr_bool(xdrs, &objp->reply.eof));
|
/illumos-gate/usr/src/cmd/sendmail/src/ |
H A D | usersmtp.c | 36 #define REPLYCLASS(r) (((r) / 10) % 10) /* second digit of reply code */ 139 r = reply(m, mci, e, TimeOuts.to_initial, esmtp_check, NULL, 183 r = reply(m, mci, e, 239 r = reply(m, mci, e, TimeOuts.to_miscshort, NULL, &enhsc, 277 ** firstline -- set if this is the first line of the reply. 388 ** firstline -- set if this is the first line of the reply. 590 ** This gets the relevant sasl response data out of the reply 595 ** firstline -- set if this is the first line of the reply. 1767 ** "Unlike a zero-length client answer to a 334 reply, a zero- 1790 /* get the reply */ 3047 reply(m, mci, e, timeout, pfunc, enhstat, rtype) function [all...] |
/illumos-gate/usr/src/cmd/fs.d/nfs/mountd/ |
H A D | mountd.c | 771 syslog(LOG_ERR, "couldn't send reply to %s", host); 773 syslog(LOG_ERR, "couldn't send reply to %s: %m", host); 1252 goto reply; 1266 goto reply; 1281 goto reply; 1296 goto reply; 1302 goto reply; 1311 goto reply; 1321 goto reply; 1339 goto reply; [all...] |
/illumos-gate/usr/src/uts/common/io/rsm/ |
H A D | rsm.c | 2765 rsmipc_reply_t *reply) 2822 reply->rsmipc_mode = perm; 2823 reply->rsmipc_uid = seg->s_uid; 2824 reply->rsmipc_gid = seg->s_gid; 2825 reply->rsmipc_segid = seg->s_segid; 2826 reply->rsmipc_seglen = seg->s_len; 3617 rsmipc_reply_t reply; local 3624 reply.rsmipc_status = (short)rsmsegacl_validate(req, src, &reply); 3626 reply 2764 rsmsegacl_validate(rsmipc_request_t *req, rsm_node_id_t rnode, rsmipc_reply_t *reply) argument 4921 rsmipc_reply_t reply; local 5290 rsmipc_send(rsm_node_id_t dest, rsmipc_request_t *req, rsmipc_reply_t *reply) argument 6093 rsmipc_reply_t reply; local [all...] |
/illumos-gate/usr/src/cmd/backup/restore/ |
H A D | utilities.c | 453 * Elicit a reply. 456 reply(char *question) function 501 if (reply(gettext("abort")) == GOOD) { 502 if (reply(gettext("dump core")) == GOOD) 521 if (reply(gettext("abort")) == GOOD) { 522 if (reply(gettext("dump core")) == GOOD)
|
/illumos-gate/usr/src/uts/sun4u/starcat/io/ |
H A D | schpc.c | 134 kcondvar_t reply_cv; /* condvar for getting reply */ 135 kmutex_t reply_lock; /* mutex for getting reply */ 140 pcimsg_t reply; /* mboxsc_xxxmsg() reply msg */ member in struct:schpc_replylist 141 boolean_t reply_recvd; /* msg reply received */ 2835 "schpc_reply_handler() - 0x%lx transid reply " 2845 * emulate mboxsc_getmsg by copying the reply 2851 bcopy((caddr_t)pmsg, &entry->reply, length); 2853 /* reply was received */ 2857 * wake up thread waiting for reply wit 3083 pcimsg_t reply; local 3175 pcimsg_t reply; local [all...] |