| /src/lib/libtelnet/ | 
| auth.h | 69 	void	(*reply)(struct XauthP *, unsigned char *, int);  member in struct:XauthP 
 | 
| encrypt.h | 87 	int	(*reply)(unsigned char *, int);  member in struct:__anon0da87be00208 
 | 
| /src/sys/external/bsd/drm2/dist/drm/vmwgfx/ | 
| vmwgfx_msg.c | 203  * @reply: Pointer to buffer holding reply. 204  * @reply_len: Length of the reply.
 209 static unsigned long vmw_port_hb_in(struct rpc_channel *channel, char *reply,
 219 		di = (uintptr_t) reply;
 248 		memcpy(reply, &ebx, bytes);
 250 		reply += bytes;
 321 	char *reply;  local in function:vmw_recv_msg
 343 			DRM_ERROR("Failed to get reply size for host message.\n");
 347 		/* No reply available.  This is okay. *
 427  char *msg, *reply = NULL;  local in function:vmw_host_get_guestinfo
 576  char *reply = NULL;  local in function:vmw_msg_ioctl
 [all...]
 | 
| /src/libexec/ftpd/ | 
| ftpcmd.y | 223 				reply(-221, "%s", ""); 224 				reply(0,
 228 				reply(0,
 233 			reply(221,
 268 			reply(500, "IPv6 support not available.");
 287 					reply(500, "PASV mode not available.");
 296 						reply(501,
 301 					reply(500, "LPSV mode not available.");
 312 					reply(500, "EPSV mode not available.");
 320 					reply(200
 [all...]
 | 
| ftpd.c | 658 			reply(-530, "%s", line); 662 		reply(530,
 757 		reply(530, "System not available.");
 761 		/* reply(220,) must follow */
 763 		reply(220, "%s FTP server ready.", hostname);
 765 		reply(220, "%s FTP server (%s) ready.", hostname, version);
 795 	reply(421,
 881 			reply(530, "Can't change user from guest login.");
 884 			reply(530, "Can't change user from chroot user.");
 888 				reply(530, "Can't change user.")
 2856 reply(int n, const char *fmt, ...)  function in typeref:typename:void
 [all...]
 | 
| /src/usr.sbin/apm/ | 
| apm.c | 81     struct apm_reply *reply) 88 		if (recv(fd, reply, sizeof(*reply), 0) != sizeof(*reply)) {
 89 			warn("invalid reply from APM daemon");
 103 	struct apm_reply reply;  local in function:do_zzz
 122 	exit(send_command(fd, &command, &reply));
 151 	struct apm_reply reply;  local in function:main
 152 	struct apm_power_info *api = &reply.batterystate;
 238 			memset(&reply, 0, sizeof(reply))
 [all...]
 | 
| /src/sbin/fsck_ext2fs/ | 
| pass2.c | 101 		if (reply("ALLOCATE") == 0) 109 		if (reply("REALLOCATE")) {
 115 		if (reply("CONTINUE") == 0)
 122 		if (reply("REALLOCATE")) {
 128 		if (reply("FIX") == 0)
 160 			if (reply("FIX") == 1) {
 173 			if (preen || reply("ADJUST") == 1) {
 201 			if (reply("FIX") == 0)
 209 		if (reply("FIX") == 0)
 244 			if (reply("FIX") == 1
 [all...]
 | 
| pass1.c | 177 			if (reply("CLEAR") == 1) { 190 			if (preen || reply("CORRECT")) {
 210 		if (preen || reply("CORRECT")) {
 221 	if (!preen && mode == IFMT && reply("HOLD BAD BLOCK") == 1) {
 283 			if (reply("CONTINUE") == 0)
 312 		else if (reply("CORRECT") == 0)
 322 	if (reply("CLEAR") == 1) {
 346 			else if (reply("CONTINUE") == 0)
 364 				else if (reply("CONTINUE") == 0)
 371 				if (reply("CONTINUE") == 0
 [all...]
 | 
| /src/sys/external/bsd/drm2/dist/drm/amd/display/include/ | 
| i2caux_interface.h | 50 	 * used to return the reply type of the transaction 53 	uint8_t *reply;  member in struct:aux_payload
 
 | 
| /src/sys/dev/ic/ | 
| bha.c | 492 	rlen = sizeof(hwsetup.reply) + 498 	    rlen, (u_char *)&hwsetup.reply);
 532 	     &hwsetup.reply.sync_low[toff];
 544 			rlen = sizeof(hwperiod.reply) +
 552 			    (u_char *)&hwperiod.reply);
 557 				period = hwperiod.reply.period[toff];
 926 	inquire.cmd.len = sizeof(inquire.reply);
 929 	    sizeof(inquire.reply), (u_char *)&inquire.reply);
 935 	 * by checking the size of the reply is what a BusLogic card returns
 [all...]
 | 
| aha.c | 790 	    sizeof(config.reply), (u_char *)&config.reply); 791 	switch (config.reply.chan) {
 808 		printf("aha_find: illegal drq setting %x\n", config.reply.chan);
 812 	switch (config.reply.intr) {
 832 		printf("aha_find: illegal irq setting %x\n", config.reply.intr);
 839 		sc->sc_scsi_dev = config.reply.scsi_dev;
 875 		    sizeof(extbios.reply), (u_char *)&extbios.reply);
 880 		    extbios.reply.flags, extbios.reply.mailboxlock)
 [all...]
 | 
| /src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/subdev/pmu/ | 
| nouveau_nvkm_subdev_pmu_memx.c | 53 	u32 reply[2];  local in function:nvkm_memx_init 56 	ret = nvkm_pmu_send(pmu, reply, PROC_MEMX, MEMX_MSG_INFO,
 65 	memx->base = reply[0];
 66 	memx->size = reply[1];
 83 	u32 finish, reply[2];  local in function:nvkm_memx_fini
 92 	/* call MEMX process to execute the script, and wait for reply */
 94 		nvkm_pmu_send(pmu, reply, PROC_MEMX, MEMX_MSG_EXEC,
 97 			   reply[0], reply[1]);
 174 	u32 reply[2], base, size, i  local in function:nvkm_memx_train_result
 [all...]
 | 
| /src/usr.bin/tip/ | 
| tipout.c | 75 	char reply;  local in function:intEMT 87 		reply = 'y';
 90 			reply = 'n';
 92 			reply = 'y';
 96 	(void)write(repdes[1], &reply, 1);	/* Now coprocess waits for us */
 
 | 
| /src/sys/arch/arc/dti/ | 
| btl.c | 952 	inquire.cmd.len = sizeof(inquire.reply); 954 	    sizeof(inquire.reply), (u_char *)&inquire.reply);
 961 	 * by checking the size of the reply is what a BusLogic card returns.
 966 		       i, sizeof(inquire.reply), "INQUIRE_EXTENDED");
 974 	switch (inquire.reply.bus_type) {
 982 		printf("bt_find: illegal bus type %c\n", inquire.reply.bus_type);
 993 	    sizeof(config.reply), (u_char *)&config.reply);
 994 	switch (config.reply.chan)
 [all...]
 | 
| btlreg.h | 195 	} reply;  member in struct:bt_extended_inquire 207 	} reply;  member in struct:bt_config
 233 	} reply;  member in struct:bt_model
 245 	} reply;  member in struct:bt_revision
 254 	} reply;  member in struct:bt_digit
 263 	} reply;  member in struct:bt_devices
 287 	} reply;  member in struct:bt_setup
 297 	} reply;  member in struct:bt_period
 
 | 
| /src/sys/lib/libsa/ | 
| rpc.c | 122 	struct rpc_reply *reply;  local in function:rpc_call 183 	recv_head -= sizeof(*reply);
 196 	if ((size_t)cc <= sizeof(*reply)) {
 204 	 * Check the RPC reply status.
 207 	reply = (struct rpc_reply *)recv_head;
 208 	auth = &reply->rp_u.rpu_rok.rok_auth;
 213 			printf("%s: reply auth != NULL\n", __func__);
 218 	x = ntohl(reply->rp_u.rpu_rok.rok_status);
 224 	recv_head += sizeof(*reply);
 237 	struct rpc_reply *reply;  local in function:recvrpc
 [all...]
 | 
| /src/sbin/fsck_ffs/ | 
| wapbl.c | 108 			if (reply("CONTINUE") == 0) { 177 			if (reply("CONTINUE") == 0) {
 206 				if (reply("CONTINUE") == 0) {
 224 					if (reply("CONTINUE") == 0) {
 258 			if (reply("CONTINUE") == 0) {
 273 		if (reply("CONTINUE") == 0) {
 
 | 
| pass2.c | 83 		if (reply("ALLOCATE") == 0) { 94 		if (reply("REALLOCATE")) {
 101 		if (reply("CONTINUE") == 0) {
 110 		if (reply("REALLOCATE")) {
 116 		if (reply("FIX") == 0) {
 167 			if (reply("FIX") == 1) {
 187 			if (preen || reply("ADJUST") == 1) {
 283 		if (reply("FIX") == 0) {
 352 			if (reply("FIX") == 1) {
 360 			if (reply("FIX") == 1)
 [all...]
 | 
| pass6.c | 59 			if (preen || reply( 74 		if (preen || reply("CLEAR SUPERBLOCK QUOTA FLAG") != 0) {
 
 | 
| /src/sbin/fsck_lfs/ | 
| pass0.c | 130 			if (preen || reply("FIX") == 1) { 146 			if (preen || reply("FIX") == 1) {
 178 		if (preen || reply("FIX") == 1) {
 202 		if (preen || reply("FIX")) {
 211 		if (preen || reply("FIX")) {
 224 		if (preen || reply("FIX"))
 
 | 
| pass2.c | 78 		if (reply("ALLOCATE") == 0) 86 		if (reply("REALLOCATE")) {
 92 		if (reply("CONTINUE") == 0)
 99 		if (reply("REALLOCATE")) {
 105 		if (reply("FIX") == 0)
 142 			if (reply("FIX") == 1) {
 156 			if (preen || reply("ADJUST") == 1) {
 192 			if (reply("FIX") == 0)
 200 		if (reply("FIX") == 0)
 233 			if (reply("FIX") == 1)
 [all...]
 | 
| /src/sys/fs/nfs/common/ | 
| krpc_subr.c | 183  * Do a remote procedure call (RPC) and wait for its reply. 196 	struct krpc_reply *reply;  local in function:krpc_call
 303 	 * Send it, repeatedly, until a reply is received,
 332 		 * Wait for up to timo seconds for a reply.
 355 			/* Does the reply contain at least a header? */
 360 			reply = mtod(m, struct krpc_reply *);
 362 			/* Is it the right reply? */
 363 			if (reply->rp_direction != txdr_unsigned(REPLY))
 366 			if (reply->rp_xid != txdr_unsigned(xid)
 [all...]
 | 
| /src/sys/external/bsd/drm2/dist/drm/nouveau/include/nvif/ | 
| notify.h | 30 		      bool work, u8 type, void *data, u32 size, u32 reply, 
 | 
| /src/sys/external/bsd/drm2/dist/drm/nouveau/include/nvkm/core/ | 
| notify.h | 35 		      void *data, u32 size, u32 reply, 
 | 
| /src/sys/nfs/ | 
| krpc_subr.c | 188 	struct rpc_reply *reply;  local in function:krpccheck 191 	/* Does the reply contain at least a header? */
 199 	reply = mtod(m, struct rpc_reply *);
 201 	/* Is it the right reply? */
 202 	if (reply->rp_direction != txdr_unsigned(RPC_REPLY))
 205 	if (reply->rp_xid != txdr_unsigned(*(u_int32_t*)context))
 212  * Do a remote procedure call (RPC) and wait for its reply.
 225 	struct rpc_reply *reply;  local in function:krpc_call
 321 	reply = mtod(m, struct rpc_reply *);
 324 	if (reply->rp_astatus != 0)
 [all...]
 |