/illumos-gate/usr/src/uts/common/fs/smbsrv/ |
H A D | smb2_close.c | 73 * SMB2 Close reply 76 &sr->reply,
|
H A D | smb2_tree_connect.c | 99 * SMB2 Tree Connect reply 102 &sr->reply,
|
H A D | smb_signing.c | 398 /* Save the reply sequence number */ 412 smb_sign_reply(smb_request_t *sr, struct mbuf_chain *reply) argument 417 if (reply) 418 mbc = *reply; 420 mbc = sr->reply; 422 /* Reset offset to start of reply */
|
H A D | smb_dispatch.c | 91 * last command in the reply chain. 93 * indicating this message is a reply 520 * (oplock break reply) and things like "NT_cancel". 588 * have no reply. Just free it. 651 * The reply "header" is filled in now even though it will, 654 * the dialect dispatcher has to send a special reply (like 666 (void) smb_mbc_encodef(&sr->reply, SMB_HEADER_ED_FMT, 711 sr->sr_txb = sr->reply.chain_offset; 740 sr->cur_reply_offset = sr->reply.chain_offset; 804 (int64_t)(sr->reply [all...] |
H A D | smb2_lock.c | 138 * SMB2 Lock reply (sync) 142 &sr->reply, "w..", 190 * SMB2 Lock reply (async) 194 &sr->reply, "w..",
|
H A D | smb2_change_notify.c | 133 * SMB2 Change Notify reply 138 &sr->reply, "wwlC",
|
H A D | smb2_query_info.c | 130 * SMB2 Query Info reply 135 &sr->reply, "wwlC",
|
H A D | smb2_set_info.c | 111 * SMB2 Query Info reply 114 &sr->reply, "w..",
|
H A D | smb2_signing.c | 309 msg_len = sr->reply.chain_offset - sr->smb2_reply_hdr; 310 (void) MBC_SHADOW_CHAIN(&tmp_mbc, &sr->reply, 314 * Calculate the MAC signature for this reply. 323 (void) smb_mbc_poke(&sr->reply, hdr_off, "#c",
|
H A D | smb2_create.c | 373 * SMB2 Create reply 376 &sr->reply, 398 CreateCtxOffset = sr->reply.chain_offset - sr->smb2_reply_hdr; 404 sr->reply.chain_offset -= 8; 406 &sr->reply, 417 (void) smb_mbc_encodef(&sr->reply, ".");
|
/illumos-gate/usr/src/cmd/fs.d/ufs/fsck/ |
H A D | pass5.c | 147 if (reply("REPAIR") == 0) 292 update_csums = (reply( 330 reply("FIX") == 1) { 348 if (preen || update_bitmaps || reply("FIX") == 1) { 364 if (preen || update_bitmaps || reply("FIX") == 1) { 383 if (preen || update_bitmaps || reply("FIX") == 1) { 404 if (preen || update_bitmaps || reply("FIX") == 1) {
|
H A D | pass3b.c | 99 } else if (reply("CLEAR") == 1) { 151 if (preen || reply("CLEAR") == 1) { 189 if (preen || reply("FIX") == 1) { 334 if (reply("CLEAR SHADOW INODE") == 1) { 430 } else if (reply("IGNORE") == 0) { 431 if (reply("CLEAR SHADOW INODE") == 1) {
|
H A D | setup.c | 276 reply( 468 if (reply("CONTINUE") == 0) { 554 if (reply("LOOK FOR ALTERNATE SUPERBLOCKS WITH %s", 582 if (reply( 610 if (reply("USE GENERIC SUPERBLOCK FROM %s", 657 if (reply("CANCEL FILESYSTEM CHECK") == 1) { 703 if (reply("SET TO DEFAULT") == 1) { 711 if (reply("SET TO DEFAULT") == 1) { 736 if (reply("marked FSFIX, CONTINUE") == 0) { 744 if (reply("marke [all...] |
/illumos-gate/usr/src/cmd/ndmpd/ndmp/ |
H A D | ndmpd_util.c | 853 * Send the reply, check for error and print the msg if any error 854 * occured when sending the reply. 863 ndmp_send_reply(ndmp_connection_t *connection, void *reply, char *msg) argument 865 if (ndmp_send_response(connection, NDMP_NO_ERR, reply) < 0) 1179 * reply.error The general errno (ioctl) 1196 ndmp_execute_cdb_reply reply; local 1203 (void) memset((void *)&reply, 0, sizeof (reply)); 1210 reply.error = NDMP_NO_MEM_ERR; 1212 NDMP_NO_ERR, (void *)&reply) < [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | sendto_kdc.c | 343 const krb5_data *reply, 350 if (krb5_is_krb_error(reply)) { 353 if (decode_krb5_error(reply, &err_reply) == 0) { 367 * return the response (if any) in 'reply'. 372 * The storage for 'reply' is allocated and should be freed by the caller 378 const krb5_data *realm, krb5_data *reply, 381 return (krb5_sendto_kdc2(context, message, realm, reply, use_master, 393 const krb5_data *realm, krb5_data *reply, 470 retval = krb5int_sendto (context, message, &addrs, 0, reply, 0, 0, 1223 krb5_data reply; local 342 check_for_svc_unavailable(krb5_context context, const krb5_data *reply, void *msg_handler_data) argument 377 krb5_sendto_kdc(krb5_context context, const krb5_data *message, const krb5_data *realm, krb5_data *reply, int *use_master, int tcp_only) argument 392 krb5_sendto_kdc2(krb5_context context, const krb5_data *message, const krb5_data *realm, krb5_data *reply, int *use_master, int tcp_only, char **hostname_used) argument 1272 krb5int_sendto(krb5_context context, const krb5_data *message, const struct addrlist *addrs, struct sendto_callback_info* callback_info, krb5_data *reply, struct sockaddr *localaddr, socklen_t *localaddrlen, struct sockaddr *remoteaddr, socklen_t *remoteaddrlen, int *addr_used, int (*msg_handler)(krb5_context, const krb5_data *, void *), void *msg_handler_data) argument [all...] |
H A D | read_pwd.c | 53 k5prompt.reply = &reply_data; 62 k5prompt.reply = &verify_data; 75 *size_return = k5prompt.reply->length;
|
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | do_tgs_req.c | 71 krb5_kdc_rep reply; local 314 /* include new addresses in ticket & reply */ 328 /* include new addresses in ticket & reply */ 640 reply.msg_type = KRB5_TGS_REP; 641 reply.padata = 0; /* always */ 642 reply.client = header_ticket->enc_part2->client; 643 reply.enc_part.kvno = 0; /* We are using the session key */ 644 reply.ticket = &ticket_reply; 671 reply.enc_part.enctype = subkey ? subkey->enctype : 677 &reply, respons [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/inetd/ |
H A D | tlx.c | 260 struct t_optmgmt request, reply; local 280 reply.opt.maxlen = sizeof (struct opthdr) + optlen; 281 reply.opt.buf = (char *)&optbuf; 282 reply.flags = 0; 284 if ((t_optmgmt(fd, &request, &reply) == -1) || 285 (reply.flags != T_SUCCESS)) {
|
/illumos-gate/usr/src/stand/lib/fs/nfs/ |
H A D | getdents.c | 106 while (!res.readdirres_u.reply.eof) { 125 res.readdirres_u.reply.entries = rdbuf.etlist;
|
H A D | getdents3.c | 107 while (!res.READDIR3res_u.resok.reply.eof) { 126 res.READDIR3res_u.resok.reply.entries = rdbuf.etlist;
|
/illumos-gate/usr/src/cmd/sendmail/src/ |
H A D | sm_resolve.c | 156 ** PARSE_DNS_REPLY -- parse DNS reply data. 399 unsigned char reply[1024]; local 420 len = res_search(domain, rr_class, rr_type, reply, sizeof(reply)); 428 r = parse_dns_reply(reply, len);
|
/illumos-gate/usr/src/cmd/hal/addons/storage/ |
H A D | addon-storage.c | 139 DBusMessage *reply = NULL; local 177 if (!(reply = dbus_connection_send_with_reply_and_block (dbus_connection, msg, -1, &error))) { 195 if (reply != NULL) 196 dbus_message_unref (reply);
|
/illumos-gate/usr/src/uts/common/io/drm/ |
H A D | drm_io32.h | 181 struct drm_wait_vblank_reply_32 reply; member in union:drm_wait_vblank_32
|
/illumos-gate/usr/src/lib/libslp/clib/ |
H A D | slp_targets.c | 148 char *query, *reply; local 210 if ((err = slp_find_das(query, &reply)) != SLP_OK && 221 /* Unpack the reply */ 222 if (reply) { 227 (void) slp_unpackSrvReply(hp, reply, collect_DAs, 229 free(reply);
|
/illumos-gate/usr/src/lib/pam_modules/krb5/ |
H A D | krb5_authenticate.c | 450 /* convert PAM response to krb prompt reply format */ 451 assert(prompts[i].reply->data != NULL); 454 if (strlcpy(prompts[i].reply->data, 455 ret_respp[i].resp, prompts[i].reply->length) >= 456 prompts[i].reply->length) { 471 retp = strchr(prompts[i].reply->data, '\n'); 475 prompts[i].reply->length = 476 strlen(prompts[i].reply->data);
|