/netbsd-current/external/gpl2/lvm2/dist/include/ |
H A D | dm-log-userspace.h | 357 * (DM_ULOG_REQUEST_MASK & request_type) to get the request type 364 * We are reserving 8 bits of the 32-bit 'request_type' field for the 369 * request type from the 'request_type' field to maintain forward compatibility. 372 #define DM_ULOG_REQUEST_TYPE(request_type) \ 373 (DM_ULOG_REQUEST_MASK & (request_type)) 393 uint32_t request_type; /* DM_ULOG_* defined above */ member in struct:dm_ulog_request
|
/netbsd-current/external/gpl2/lvm2/dist/libdm/misc/ |
H A D | dm-log-userspace.h | 357 * (DM_ULOG_REQUEST_MASK & request_type) to get the request type 364 * We are reserving 8 bits of the 32-bit 'request_type' field for the 369 * request type from the 'request_type' field to maintain forward compatibility. 372 #define DM_ULOG_REQUEST_TYPE(request_type) \ 373 (DM_ULOG_REQUEST_MASK & (request_type)) 393 uint32_t request_type; /* DM_ULOG_* defined above */ member in struct:dm_ulog_request
|
/netbsd-current/external/gpl2/lvm2/dist/daemons/cmirrord/ |
H A D | local.c | 140 if (!u_rq->request_type) { 238 SHORT_UUID(u_rq->uuid), RQ_TYPE(u_rq->request_type), 240 switch (u_rq->request_type) { 253 RQ_TYPE(u_rq->request_type)); 257 RQ_TYPE(u_rq->request_type)); 269 RQ_TYPE(u_rq->request_type)); 273 RQ_TYPE(u_rq->request_type)); 307 u_rq->request_type);
|
H A D | cluster.c | 247 if (tmp->u_rq.request_type == DM_ULOG_RESUME) { 261 (tmp->u_rq.request_type != DM_ULOG_CLEAR_REGION) && 262 (tmp->u_rq.request_type != DM_ULOG_POSTSUSPEND)) { 263 tmp->u_rq.request_type |= DM_ULOG_RESPONSE; 288 rq->u_rq.request_type &= ~DM_ULOG_RESPONSE; 296 _RQ_TYPE(rq->u_rq.request_type), 306 _RQ_TYPE(orig_rq->u_rq.request_type), 316 _RQ_TYPE(rq->u_rq.request_type), 584 rq->u_rq.request_type = DM_ULOG_CHECKPOINT_READY; 819 switch (rq->u_rq.request_type) { [all...] |
H A D | functions.c | 1578 switch (rq->u_rq.request_type) {
|
/netbsd-current/external/bsd/wpa/dist/src/wps/ |
H A D | wps_attr_parse.h | 51 const u8 *request_type; /* 1 octet */ member in struct:wps_parse_attr
|
H A D | wps.c | 111 } else if (attr.request_type == NULL) { 117 *attr.request_type); 118 data->request_type = *attr.request_type;
|
H A D | wps_validate.c | 59 static int wps_validate_request_type(const u8 *request_type, int mandatory) argument 61 if (request_type == NULL) { 69 if (*request_type > 0x03) { 71 "attribute value 0x%x", *request_type); 1198 wps_validate_request_type(attr.request_type, 1) || 1245 wps_validate_request_type(attr.request_type, 1) ||
|
H A D | wps_i.h | 82 * request_type - Request Type attribute from (Re)AssocReq 84 u8 request_type; member in struct:wps_data
|
H A D | wps_attr_parse.c | 449 attr->request_type = pos;
|
H A D | wps.h | 338 * @request_type: Request Type 343 u16 dev_password_id, u8 request_type,
|
H A D | wps_registrar.c | 160 u16 dev_password_id, u8 request_type, 1173 attr.primary_dev_type && attr.request_type && !p2p_wildcard) { 1186 *attr.request_type, dev_name);
|
/netbsd-current/crypto/external/bsd/openssh/dist/ |
H A D | clientloop.c | 176 const char *request_type; member in struct:channel_reply_ctx 831 cr->request_type, c->self); 835 "%s request failed\r\n", cr->request_type); 839 cr->request_type, c->self); 850 cr->request_type); 885 cr->request_type = request; 1705 client_request_forwarded_tcpip(struct ssh *ssh, const char *request_type, argument 1743 (r = sshbuf_put_cstring(b, request_type)) != 0 || 1766 const char *request_type, int rchan) 1787 client_request_x11(struct ssh *ssh, const char *request_type, in argument 1765 client_request_forwarded_streamlocal(struct ssh *ssh, const char *request_type, int rchan) argument 1831 client_request_agent(struct ssh *ssh, const char *request_type, int rchan) argument [all...] |
/netbsd-current/sys/dev/scsipi/ |
H A D | scsipi_cd.h | 154 uint8_t request_type; member in struct:scsipi_get_configuration
|
/netbsd-current/external/bsd/ntp/dist/sntp/libevent/ |
H A D | evdns.c | 175 u8 request_type; /* TYPE_PTR or TYPE_A or TYPE_AAAA */ member in struct:request 778 u8 request_type; member in struct:deferred_reply_callback 792 switch (cb->request_type) { 844 d->request_type = req->request_type; 935 req->request_type != TYPE_PTR) { 1084 reply.type = req->request_type; 1114 if (req->request_type != TYPE_A) { 1132 if (req->request_type != TYPE_PTR) { 1152 if (req->request_type ! [all...] |
/netbsd-current/external/bsd/libevent/dist/ |
H A D | evdns.c | 178 u8 request_type; /* TYPE_PTR or TYPE_A or TYPE_AAAA */ member in struct:request 784 u8 request_type; member in struct:deferred_reply_callback 798 switch (cb->request_type) { 850 d->request_type = req->request_type; 954 req->request_type != TYPE_PTR) { 1085 reply.type = req->request_type; 1131 if (req->request_type != TYPE_A) { 1149 if (req->request_type != TYPE_PTR) { 1169 if (req->request_type ! [all...] |
/netbsd-current/external/bsd/libpcap/dist/ |
H A D | pcap-rpcap.c | 177 static int rpcap_check_msg_type(SOCKET sock, SSL *, uint8 request_type, struct rpcap_header *header, uint16 *errcode, char *errbuf); 178 static int rpcap_process_msg_header(SOCKET sock, SSL *, uint8 ver, uint8 request_type, struct rpcap_header *header, char *errbuf); 3354 static int rpcap_check_msg_type(SOCKET sock, SSL *ssl, uint8 request_type, struct rpcap_header *header, uint16 *errcode, char *errbuf) argument 3379 if (header->type != (request_type | RPCAP_MSG_IS_REPLY)) 3394 request_type_string = rpcap_msg_type_string(request_type); 3403 request_type); 3424 static int rpcap_process_msg_header(SOCKET sock, SSL *ssl, uint8 expected_ver, uint8 request_type, struct rpcap_header *header, char *errbuf) argument 3443 return rpcap_check_msg_type(sock, ssl, request_type, header,
|
/netbsd-current/external/mpl/bind/dist/lib/isc/netmgr/ |
H A D | http.c | 1655 .request_type = ISC_HTTP_REQ_UNSUPPORTED, 1759 socket->h2.request_type = ISC_HTTP_REQ_GET; 1761 socket->h2.request_type = ISC_HTTP_REQ_POST; 2082 } else if (socket->h2.request_type == ISC_HTTP_REQ_POST && 2086 } else if (socket->h2.request_type == ISC_HTTP_REQ_POST && 2091 } else if (socket->h2.request_type == ISC_HTTP_REQ_POST && 2096 } else if (socket->h2.request_type == ISC_HTTP_REQ_POST && 2106 } else if (socket->h2.request_type == ISC_HTTP_REQ_GET && 2110 } else if (socket->h2.request_type == ISC_HTTP_REQ_GET && 2123 if (socket->h2.request_type [all...] |
H A D | netmgr-int.h | 932 isc_http_request_type_t request_type; member in struct:isc_nmsocket_h2
|
/netbsd-current/external/bsd/ntp/dist/lib/isc/win32/ |
H A D | socket.c | 305 int request_type; member in struct:IoCompletionInfo 765 lpo->request_type = SOCKET_RECV; 1389 lpo->request_type = SOCKET_SEND; 2465 request = lpo->request_type; 3393 lpo->request_type = SOCKET_ACCEPT; 3505 lpo->request_type = SOCKET_CONNECT;
|
/netbsd-current/external/bsd/wpa/dist/src/ap/ |
H A D | wps_hostapd.c | 253 u16 dev_password_id, u8 request_type, 268 config_methods, dev_password_id, request_type, dev_name); 249 hostapd_wps_enrollee_seen_cb(void *ctx, const u8 *addr, const u8 *uuid_e, const u8 *pri_dev_type, u16 config_methods, u16 dev_password_id, u8 request_type, const char *dev_name) argument
|