Searched refs:want_reply (Results 1 - 3 of 3) sorted by relevance
/freebsd-10.0-release/crypto/openssh/ |
H A D | serverloop.c | 1126 int want_reply; local 1130 want_reply = packet_get_char(); 1131 debug("server_input_global_request: rtype %s want_reply %d", rtype, want_reply); 1150 (!want_reply && listen_port == 0) 1181 if (want_reply) {
|
H A D | clientloop.c | 2087 int want_reply; local 2091 want_reply = packet_get_char(); 2092 debug("client_input_global_request: rtype %s want_reply %d", 2093 rtype, want_reply); 2094 if (want_reply) {
|
H A D | channels.c | 3804 const char *proto, const char *data, int want_reply) 3857 channel_request_start(client_session_id, "x11-req", want_reply); 3803 x11_request_forwarding_with_spoofing(int client_session_id, const char *disp, const char *proto, const char *data, int want_reply) argument
|
Completed in 84 milliseconds