HomeSort by: relevance | last modified time | path
    Searched refs:replylen (Results 1 - 10 of 10) sorted by relevancy

  /src/sys/fs/nfs/common/
bootp_subr.c 142 int replylen; member in struct:bootpc_ifcontext
196 int replylen; member in struct:bootpc_globalcontext
509 gctx->replylen,
517 gctx->replylen, TAG_DHCP_MSGTYPE);
546 ifctx->replylen,
549 gctx->replylen,
553 bcopy(&gctx->reply, &ifctx->reply, gctx->replylen);
554 ifctx->replylen = gctx->replylen;
573 ifctx->replylen, TAG_DHCP_SERVERID)
    [all...]
  /src/sys/nfs/
nfs_bootdhcp.c 297 int replylen; member in struct:bootpcontext
393 bpc->replylen = m->m_pkthdr.len;
394 m_copydata(m, 0, bpc->replylen, (void *)bpc->replybuf);
417 limit = ((u_char*)bootp) + bpc->replylen;
683 bootp_extract(bpc.replybuf, bpc.replylen, nd, flags);
694 bootp_extract(struct bootp *bootp, int replylen,
726 limit = ((u_char*)bootp) + replylen;
  /src/lib/libc/rpc/
svc_dg.c 191 size_t replylen; local
228 if (cache_get(xprt, msg, &reply, &replylen)) {
229 (void)sendto(xprt->xp_fd, reply, replylen, 0,
476 cache_set(SVCXPRT *xprt, size_t replylen)
543 victim->cache_replylen = replylen;
  /src/external/gpl2/lvm2/dist/daemons/clvmd/
clvmd.c 1279 int replylen = 0; local
1343 &replylen);
1353 realloc(replyargs, replylen + sizeof(struct clvm_header));
1361 replyargs, replylen);
1368 agghead->arglen = replylen;
1372 replylen, csid, fd,
1556 int replylen = 0; local
1565 status = do_command(client, msg, msglen, &replybuf, buflen, &replylen);
1572 add_reply_to_list(client, status, our_csid, replybuf, replylen);
  /src/sys/netinet6/
icmp6.c 1227 int replylen = sizeof(struct ip6_hdr) + sizeof(struct icmp6_nodeinfo); local
1398 replylen += sizeof(u_int32_t);
1402 replylen += offsetof(struct ni_reply_fqdn, ni_fqdn_namelen);
1406 replylen += addrs *
1408 if (replylen > MCLBYTES)
1409 replylen = MCLBYTES; /* XXX: will truncate pkt later */
1426 replylen += offsetof(struct ni_reply_fqdn, ni_fqdn_namelen);
1437 if (replylen > MHLEN) {
1438 if (replylen > MCLBYTES) {
1450 n->m_pkthdr.len = n->m_len = replylen;
    [all...]
  /src/external/bsd/libpcap/dist/rpcapd/
daemon.c 1590 * We check whether replylen + itemlen > UINT32_MAX, but subtract itemlen
1594 if (replylen > UINT32_MAX - (itemlen)) { \
1599 replylen += (uint32)(itemlen)
1611 uint32 replylen; // length of reply payload local
1641 replylen = 0;
1704 RPCAP_MSG_FINDALLIF_REPLY, nif, replylen);
  /src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/
peers.cpp 772 size_t replylen = sizeof(reply) - 1; local
773 wpagui->ctrlRequest("WPS_ER_START", reply, &replylen);
1556 size_t replylen = sizeof(reply) - 1; local
1557 wpagui->ctrlRequest("WPS_ER_STOP", reply, &replylen);
  /src/sys/external/bsd/drm2/dist/drm/
drm_dp_mst_topology.c 3719 int replylen, origlen __unused, curreply; local
3737 replylen = msg->curchunk_len + msg->curchunk_hdrlen;
3739 origlen = replylen;
3740 replylen -= len;
3742 while (replylen > 0) {
3743 len = min3(replylen, mgr->max_dpcd_transaction_bytes, 16);
3759 replylen -= len;
  /src/external/apache2/mDNSResponder/dist/mDNSCore/
uDNS.c 1417 const mDNSBool Read_replylen = (tcpInfo->nread < 2); // Do we need to read the replylen field first?
1420 mDNSu8 *lenptr = (mDNSu8 *)&tcpInfo->replylen;
1454 tcpInfo->replylen = (mDNSu16)((mDNSu16)lenptr[0] << 8 | lenptr[1]);
1455 if (tcpInfo->replylen < sizeof(DNSMessageHeader))
1456 { LogMsg("ERROR: tcpCallback - length too short (%d bytes)", tcpInfo->replylen); err = mStatus_UnknownErr; goto exit; }
1458 tcpInfo->reply = (DNSMessage *) mDNSPlatformMemAllocate(tcpInfo->replylen);
1462 n = mDNSPlatformReadTCP(sock, ((char *)tcpInfo->reply) + (tcpInfo->nread - 2), tcpInfo->replylen - (tcpInfo->nread - 2), &closed);
1467 // But if we did successfully read some or all of the replylen field this time through,
1496 if ((tcpInfo->nread - 2) == tcpInfo->replylen)
1500 mDNSu8 *end = (mDNSu8 *)tcpInfo->reply + tcpInfo->replylen;
    [all...]
mDNSEmbeddedAPI.h 597 mDNSu16 replylen; member in struct:tcpInfo_t
1208 int replyLen;

Completed in 50 milliseconds