/freebsd/usr.sbin/rmt/ |
H A D | rmt.c | 102 goto respond; in main() 110 goto respond; in main() 119 goto respond; in main() 136 goto respond; in main() 162 goto respond; in main() 182 goto respond; in main() 188 respond: in main()
|
/freebsd/usr.bin/mail/ |
H A D | cmdtab.c | 87 { "Reply", Respond, R|I|MSGLIST, 0, MMNDEL }, 88 { "Respond", Respond, R|I|MSGLIST, 0, MMNDEL }, 89 { "reply", respond, R|I|MSGLIST, 0, MMNDEL }, 90 { "respond", respond, R|I|MSGLIST, 0, MMNDEL },
|
/freebsd/sys/contrib/alpine-hal/ |
H A D | al_hal_serdes_25g_regs.h | 307 * 0x0 – PHY is not ready to respond to 310 * 0x1 - PHY is ready to respond to 321 * 0x0 – PHY is not ready to respond to 324 * 0x1 - PHY is ready to respond to lnX_rst_n_i 329 * 0x0 – PHY is not ready to respond to 332 * 0x1 - PHY is ready to respond to lnX_rst_n_i
|
/freebsd/usr.sbin/arp/ |
H A D | arp.4 | 53 If the target host does not respond after several requests, 72 in which case the system will respond to ARP requests for that host 82 Proxy ARP is a feature whereby the local host will respond to requests 132 address, which might not respond.
|
/freebsd/crypto/heimdal/kdc/ |
H A D | kdc.8 | 97 don't respond to 524 requests 99 respond to Kerberos 4 requests 101 respond to Kerberos 4 requests from foreign realms.
|
/freebsd/contrib/unbound/dnstap/ |
H A D | dnstap.proto | 86 NXDOMAIN = 1; // Respond with NXDOMAIN 87 NODATA = 2; // Respond with empty answer section 89 DROP = 4; // Do not respond. 91 LOCAL_DATA = 6; // Respond with local data from policy
|
/freebsd/crypto/openssh/ |
H A D | PROTOCOL | 507 rename(oldpath, newpath) and will respond with a SSH_FXP_STATUS message. 564 link(oldpath, newpath) and will respond with a SSH_FXP_STATUS message. 577 respond with a SSH_FXP_STATUS message. 607 The server will respond with a SSH_FXP_EXTENDED_REPLY reply: 619 Even if the client requests a larger size, servers will usually respond 677 write-to-handle starting from write-to-offset, and then respond with a 685 fail the request and respond with a SSH_FX_INVALID_PARAMETER message.
|
/freebsd/share/man/man4/ |
H A D | ng_deflate.4 | 108 The receiver should respond by sending a PPP CCP Reset-Request to the peer. 112 The node will respond by flushing its compression state so the sides
|
H A D | ng_pred1.4 | 95 The receiver should respond by sending a PPP CCP Reset-Request to the peer. 99 The node will respond by flushing its compression state so the sides
|
H A D | ng_mppc.4 | 136 The receiver should respond by sending a PPP CCP Reset-Request to the peer. 140 The node will respond by flushing its outgoing compression and encryption
|
H A D | lp.4 | 216 to respond by writing 0x01 to its data lines. 229 waiting for the receiving system to respond to an interrupt for the start
|
/freebsd/libexec/rc/rc.d/ |
H A D | netwait | 13 # waits for any single IP in the list to respond to the ping. If your 85 echo -n "Waiting for ${ip} to respond to ICMP ping"
|
/freebsd/libexec/rbootd/ |
H A D | rbootd.8 | 65 Respond to boot requests from any machine. 150 and respond to the same boot packets.
|
/freebsd/contrib/lib9p/ |
H A D | threadpool.h | 96 * the other request (the "flushee") to go through the respond 97 * path. The respond routine gets to decide whether to send a
|
/freebsd/sys/netgraph/bluetooth/l2cap/ |
H A D | ng_l2cap_evnt.c | 649 u_int16_t dcid, respond, result; in ng_l2cap_process_cfg_req() local 662 respond = NG_L2CAP_OPT_CFLAG(le16toh(cp->flags)); in ng_l2cap_process_cfg_req() 712 respond = 1; in ng_l2cap_process_cfg_req() 735 * Now check and see if we have to respond. If everything was OK then in ng_l2cap_process_cfg_req() 736 * respond contain "C flag" and (if set) we will respond with empty in ng_l2cap_process_cfg_req() 739 * Other case is that we did not like peer's options and will respond in ng_l2cap_process_cfg_req() 742 * When "respond == 0" than we have received all options and we will in ng_l2cap_process_cfg_req() 746 if (respond) { in ng_l2cap_process_cfg_req() 982 * to be disconnected and send L2CA_DisconnectInd message. Then respond in ng_l2cap_process_discon_req()
|
/freebsd/sys/dev/jedec_dimm/ |
H A D | jedec_dimm.h | 46 * functions. They respond on multiple SMBus addresses, depending on the 56 * respond to them, changing their mode based on the Logical Serial Address
|
/freebsd/share/man/man8/ |
H A D | yp.8 | 217 it will respond to 223 will use the address of the first one to respond. 420 to respond only to selected client machines.
|
/freebsd/share/doc/usd/07.mail/ |
H A D | mail9.nr | 48 Respond Same as \fBReply\fP 79 respond Same as \fBreply\fP
|
H A D | mail5.nr | 156 .ip "\fBReply\fP or \fBRespond\fP\ \ " 184 \fBReply\fP (and \fBRespond\fP) can be abbreviated to \fBR\fP. 568 .ip "\fBreply\fP or \fBrespond\fP\ \ " 588 The \fBreply\fP (and \fBrespond\fP) command can be abbreviated to \fBr\fP. 845 If you respond with simply a newline, no subject field will be sent.
|
/freebsd/sys/contrib/device-tree/Bindings/iio/pressure/ |
H A D | ms5611.txt | 7 - reg: the I2C address or SPI chip select the device will respond to
|
H A D | zpa2326.txt | 7 - reg: the I2C address or SPI chip select the device will respond to
|
/freebsd/contrib/llvm-project/lldb/source/Plugins/Process/gdb-remote/ |
H A D | GDBRemoteClientBase.h | 55 // It the target doesn't respond within the given timeout, it returns 134 /// stub does not respond to interrupt requests.
|
/freebsd/usr.bin/talk/ |
H A D | invite.c | 86 message("Waiting for your party to respond"); in invite_remote() 101 current_state = "Waiting for your party to respond"; in invite_remote()
|
/freebsd/contrib/wpa/src/ap/ |
H A D | wmm.c | 331 /* TODO: respond with action frame refused status code */ in hostapd_wmm_action() 344 /* TODO: respond with action frame invalid parameters status in hostapd_wmm_action() 355 /* TODO: respond with action frame invalid parameters status in hostapd_wmm_action()
|
/freebsd/sys/contrib/device-tree/Bindings/rtc/ |
H A D | isil,isl12026.txt | 4 registers respond at bus address 0x6f, and the EEPROM array responds
|