Searched refs:reqp (Results 1 – 7 of 7) sorted by relevance
| /src/sys/dev/hyperv/utilities/ |
| H A D | hv_snapshot.c | 252 #define SEARCH_REMOVE_REQ_LOCKED(reqp, queue, link, tmp, id) \ argument 254 STAILQ_FOREACH_SAFE(reqp, queue, link, tmp) { \ 255 if (reqp->vss_req.opt_msg.msgid == id) { \ 257 reqp, hv_vss_req_internal, link); \ 310 hv_vss_notify_host_result_locked(struct hv_vss_req_internal *reqp, uint32_t status) in hv_vss_notify_host_result_locked() argument 312 struct hv_vss_msg* msg = (struct hv_vss_msg *)reqp->rcv_buf; in hv_vss_notify_host_result_locked() 313 hv_vss_sc *sc = reqp->sc; in hv_vss_notify_host_result_locked() 314 if (reqp->vss_req.opt_msg.opt == HV_VSS_CHECK) { in hv_vss_notify_host_result_locked() 318 vss_opt_name[reqp->vss_req.opt_msg.opt], in hv_vss_notify_host_result_locked() 320 hv_vss_respond_host(reqp->rcv_buf, vmbus_get_channel(reqp->sc->dev), in hv_vss_notify_host_result_locked() [all …]
|
| /src/sys/dev/hyperv/storvsc/ |
| H A D | hv_storvsc_drv_freebsd.c | 340 static int create_storvsc_request(union ccb *ccb, struct hv_storvsc_request *reqp); 341 static void storvsc_free_request(struct storvsc_softc *sc, struct hv_storvsc_request *reqp); 349 static void storvsc_io_done(struct hv_storvsc_request *reqp); 948 struct hv_storvsc_request *reqp; in storvsc_init_requests() local 978 reqp = malloc(sizeof(struct hv_storvsc_request), in storvsc_init_requests() 980 reqp->softc = sc; in storvsc_init_requests() 982 &reqp->data_dmap); in storvsc_init_requests() 988 LIST_INSERT_HEAD(&sc->hs_free_list, reqp, link); in storvsc_init_requests() 993 while ((reqp = LIST_FIRST(&sc->hs_free_list)) != NULL) { in storvsc_init_requests() 994 LIST_REMOVE(reqp, link); in storvsc_init_requests() [all …]
|
| /src/crypto/krb5/src/plugins/preauth/pkinit/ |
| H A D | pkinit_srv.c | 429 krb5_pa_pk_as_req *reqp = NULL; in pkinit_server_verify_padata() local 479 retval = k5int_decode_krb5_pa_pk_as_req(&k5data, &reqp); in pkinit_server_verify_padata() 485 print_buffer_bin(reqp->signedAuthPack.data, reqp->signedAuthPack.length, in pkinit_server_verify_padata() 492 (unsigned char *)reqp->signedAuthPack.data, in pkinit_server_verify_padata() 493 reqp->signedAuthPack.length, in pkinit_server_verify_padata() 567 if (reqp->kdcPkId.data != NULL) { in pkinit_server_verify_padata() 571 (unsigned char *)reqp->kdcPkId.data, in pkinit_server_verify_padata() 572 reqp->kdcPkId.length, &valid_kdcPkId); in pkinit_server_verify_padata() 615 free_krb5_pa_pk_as_req(&reqp); in pkinit_server_verify_padata() 741 krb5_pa_pk_as_req *reqp = NULL; in pkinit_server_return_padata() local [all …]
|
| /src/usr.sbin/bhyve/ |
| H A D | virtio.c | 217 int n_iov, struct vi_req *reqp) in _vq_record() argument 229 reqp->readable++; in _vq_record() 231 reqp->writable++; in _vq_record() 271 struct vi_req *reqp) in vq_getchain() argument 395 *reqp = req; in vq_getchain()
|
| H A D | virtio.h | 418 struct vi_req *reqp);
|
| /src/crypto/krb5/src/lib/krad/ |
| H A D | client.c | 171 on_response(krb5_error_code retval, const krad_packet *reqp, in on_response() argument 195 req->cb(retval, reqp, rspp, req->data); in on_response()
|
| /src/sys/dev/isp/ |
| H A D | isp.c | 2826 ispreqt7_t local, *reqp = &local; in isp_start() local 2910 ISP_MEMZERO(reqp, QENTRY_LEN); in isp_start() 2912 isp_marker_24xx_t *m = (isp_marker_24xx_t *) reqp; in isp_start() 2927 if (cdblen > sizeof (reqp->req_cdb)) { in isp_start() 2933 reqp->req_header.rqs_entry_type = RQSTYPE_T7RQS; in isp_start() 2934 reqp->req_header.rqs_entry_count = 1; in isp_start() 2935 reqp->req_nphdl = lp->handle; in isp_start() 2936 reqp->req_time = XS_TIME(xs); in isp_start() 2937 be64enc(reqp->req_lun, CAM_EXTLUN_BYTE_SWIZZLE(XS_LUN(xs))); in isp_start() 2939 reqp->req_alen_datadir = FCP_CMND_DATA_READ; in isp_start() [all …]
|