/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | xdr_rec.c | 1075 * the main RPC request loop. However, first we reallocate the 1140 xdrrec_control(XDR *xdrs, int request, void *info) argument 1146 switch (request) {
|
H A D | clnt_vc.c | 894 clnt_vc_control(CLIENT *cl, int request, char *info) argument 905 switch (request) { 933 switch (request) {
|
/osnet-11/usr/src/lib/libnwam/common/ |
H A D | libnwam_util.c | 85 void *request, size_t request_size) 90 door_args.data_ptr = (void *)request; 94 door_args.rbuf = (void *)request; 107 send_msg_to_nwam(nwamd_door_arg_t *request) argument 112 request, sizeof (nwamd_door_arg_t))) != 0) { 118 switch (request->nwda_status) { 126 return (request->nwda_error); 84 nwam_make_door_call(const char *door_name, int *door_fdp, void *request, size_t request_size) argument
|
/osnet-11/usr/src/lib/fm/libfmd_snmp/common/ |
H A D | problem.c | 46 * not traversing the fault list for each request. 495 * to ASN.1 lexical ordering after the request in table_info. Indexes are 587 * Returns the problem data corresponding to the request in table_info. 588 * All request parameters are unmodified. 782 netsnmp_request_info *request; local 804 request = cache->requests; 808 table_info = netsnmp_extract_table_info(request); 809 request->delegated = 0; 819 * request. We have other guarantees as well: 848 (void) snmp_log(LOG_ERR, MODNAME_STR ": Unsupported request " 943 netsnmp_request_info *request; local 973 netsnmp_request_info *request; local 1170 netsnmp_request_info *request; local [all...] |
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_clnt.c | 74 krb5_kdc_req *request, const krb5_data *as_rep, 83 krb5_kdc_req * request, 104 request->kdc_options, request->till); 106 if (request->client == NULL) { 107 pkiDebug("No request->client; aborting PKINIT\n"); 112 reqctx->idctx, request->server); 119 retval = k5int_encode_krb5_kdc_req_body(request, &der_req); 143 nonce = request->nonce; 146 nonce, &cksum, request 80 pa_pkinit_gen_req(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_kdc_req * request, krb5_pa_data * in_padata, krb5_pa_data *** out_padata, krb5_prompter_fct prompter, void *prompter_data, krb5_get_init_creds_opt *gic_opt) argument 460 pa_pkinit_parse_rep(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_kdc_req * request, krb5_pa_data * in_padata, krb5_enctype etype, krb5_keyblock * as_key, krb5_data *encoded_request) argument 654 pkinit_as_rep_parse(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_preauthtype pa_type, krb5_kdc_req *request, const krb5_data *as_rep, krb5_keyblock *key_block, krb5_enctype etype, krb5_data *encoded_request) argument 982 pkinit_client_process(krb5_context context, void *plugin_context, void *request_context, krb5_get_init_creds_opt *gic_opt, preauth_get_client_data_proc get_data_proc, struct _krb5_preauth_client_rock *rock, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data *in_padata, krb5_prompter_fct prompter, void *prompter_data, preauth_get_as_key_proc gak_fct, void *gak_data, krb5_data *salt, krb5_data *s2kparams, krb5_keyblock *as_key, krb5_pa_data ***out_padata) argument 1097 pkinit_client_tryagain(krb5_context context, void *plugin_context, void *request_context, krb5_get_init_creds_opt *gic_opt, preauth_get_client_data_proc get_data_proc, struct _krb5_preauth_client_rock *rock, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data *in_padata, krb5_error *err_reply, krb5_prompter_fct prompter, void *prompter_data, preauth_get_as_key_proc gak_fct, void *gak_data, krb5_data *salt, krb5_data *s2kparams, krb5_keyblock *as_key, krb5_pa_data ***out_padata) argument [all...] |
H A D | pkinit_srv.c | 107 krb5_kdc_req * request, 121 retval = fast_kdc_get_armor_key(context, server_get_entry_data, request, 134 request->server); 299 krb5_kdc_req * request, 331 retval = fast_kdc_get_armor_key(context, server_get_entry_data, request, 343 request->server); 350 /* create a per-request context */ 412 retval = verify_client_san(context, plgctx, reqctx, request->client, 433 if (!krb5_principal_compare(context, request->client, 436 krb5_set_error_message(context, retval, "Pkinit request no 106 pkinit_server_get_edata(krb5_context context, krb5_kdc_req * request, struct _krb5_db_entry_new * client, struct _krb5_db_entry_new * server, preauth_get_entry_data_proc server_get_entry_data, void *pa_plugin_context, krb5_pa_data * data) argument 296 pkinit_server_verify_padata(krb5_context context, struct _krb5_db_entry_new * client, krb5_data *req_pkt, krb5_kdc_req * request, krb5_enc_tkt_part * enc_tkt_reply, krb5_pa_data * data, preauth_get_entry_data_proc server_get_entry_data, void *pa_plugin_context, void **pa_request_context, krb5_data **e_data, krb5_authdata ***authz_data) argument 606 return_pkinit_kx(krb5_context context, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_keyblock *encrypting_key, krb5_pa_data **out_padata) argument 667 pkinit_server_return_padata(krb5_context context, krb5_pa_data * padata, struct _krb5_db_entry_new * client, krb5_data *req_pkt, krb5_kdc_req * request, krb5_kdc_rep * reply, struct _krb5_key_data * client_key, krb5_keyblock * encrypting_key, krb5_pa_data ** send_pa, preauth_get_entry_data_proc server_get_entry_data, void *pa_plugin_context, void **pa_request_context) argument [all...] |
/osnet-11/usr/src/lib/libvdp/common/ |
H A D | vdp_impl.c | 117 * be sent in a VDP request. 204 * request, sending KeepAlives and timing out a VDP profile 370 * VSI Type ID in its request, it also expects the peer to return the 415 * If we don't get a request/response using our org specific 970 * Since the previous request never made it to the bridge 1276 boolean_t request = B_TRUE; local 1281 request = B_FALSE; 1283 if (request) {
|
/osnet-11/usr/src/lib/libsip/common/ |
H A D | sip_dialog.c | 222 * Depending on the route-set, determine the request URI. 299 * the request. 482 * header field from the request, taken in order and preserving all URI 570 * number in the CSeq header field of the request. The local sequence 572 * MUST be set to the value of the Call-ID in the request. The local 574 * in the response to the request (which always includes a tag), and the 576 * From field in the request. A UAS MUST be prepared to receive a 577 * request without a tag in the From field, in which case the tag is 582 * of the request. 586 * number in the CSeq header field of the request 1427 boolean_t request; local [all...] |
/osnet-11/usr/src/lib/libdtrace_jni/common/ |
H A D | dtrace_jni.c | 983 dtj_request_t *request; local 988 request = dtj_request_create(env, DTJ_REQUEST_OPTION, opt, val); 989 if (request) { 991 request)) { 993 "Failed to add setOption request");
|
/osnet-11/usr/src/lib/libidmap/common/ |
H A D | idmap_api.c | 966 * stat - status of the get request 988 * stat - status of the get request 1017 /* Extend the request array and the return list */ 1021 /* Setup the request */ 1060 * stat - status of the get request 1083 * stat - status of the get request 1112 /* Extend the request array and the return list */ 1116 /* Setup the request */ 1155 * stat - status of the get request 1181 * stat - status of the get request 1608 idmap_mapping request, *mapping; local 1713 idmap_mapping request, *mapping; local [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | get_in_tkt.c | 146 * This function sends a request to the KDC, and gets back a response; 160 krb5_kdc_req *request, 180 * krb5_sendto_kdc takes an extra parameter - "request" which is the 183 retval = krb5_sendto_kdc(context, packet, request, 275 krb5_kdc_req *request, 326 verify_anonymous( krb5_context context, krb5_kdc_req *request, argument 336 if (!krb5_principal_compare_any_realm(context, request->client, 381 "for anonymous request"); 388 krb5_kdc_req *request, 405 canon_req = ((request 158 send_as_request(krb5_context context, krb5_data *packet, krb5_kdc_req *request, const krb5_data *realm, krb5_error ** ret_err_reply, krb5_kdc_rep ** ret_as_reply, int *use_master) argument 274 decrypt_as_reply(krb5_context context, krb5_kdc_req *request, krb5_kdc_rep *as_reply, git_key_proc key_proc, krb5_const_pointer keyseed, krb5_keyblock * key, git_decrypt_proc decrypt_proc, krb5_const_pointer decryptarg) argument 386 verify_as_reply(krb5_context context, krb5_timestamp time_now, krb5_kdc_req *request, krb5_kdc_rep *as_reply) argument 485 stash_as_reply(krb5_context context, krb5_timestamp time_now, krb5_kdc_req *request, krb5_kdc_rep *as_reply, krb5_creds * creds, krb5_ccache ccache) argument 710 krb5_kdc_req request; local 1151 krb5_data request; local [all...] |
H A D | preauth2.c | 33 * kerberos kdc request, with various hardware/software verification devices. 59 krb5_kdc_req *request, 321 * function to give the plugin a chance to allocate a per-request context. */ 342 /* Free the per-AS-REQ context. This means clearing any request-specific 521 /* Tweak the request body, for now adding any enctypes which the module claims 527 krb5_kdc_req *request) 534 /* Add the module-specific enctype list to the request, but only if 541 grow_ktypes(&request->ktype, &request->nktypes, 554 krb5_kdc_req *request, 525 krb5_preauth_prepare_request(krb5_context kcontext, krb5_gic_opt_ext *opte, krb5_kdc_req *request) argument 552 run_preauth_plugins(krb5_context kcontext, int module_required_flags, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data *in_padata, krb5_prompter_fct prompter, void *prompter_data, preauth_get_as_key_proc gak_fct, krb5_data *salt, krb5_data *s2kparams, void *gak_data, krb5_preauth_client_rock *get_data_rock, krb5_keyblock *as_key, krb5_pa_data ***out_pa_list, int *out_pa_list_size, int *module_ret, int *module_flags, krb5_gic_opt_ext *opte) argument 651 pa_salt(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 672 pa_fx_cookie(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 696 pa_enc_timestamp(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 833 pa_sam(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 1085 pa_pkinit_gen_req(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 1259 pa_pkinit_parse_rep(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 1388 pa_sam_2(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 1714 pa_s4u_x509_user(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 1822 krb5_do_preauth_tryagain(krb5_context kcontext, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data **padata, krb5_pa_data ***return_padata, krb5_error *err_reply, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data, krb5_preauth_client_rock *get_data_rock, krb5_gic_opt_ext *opte) argument 1893 krb5_do_preauth(krb5_context context, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data **in_padata, krb5_pa_data ***out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data, krb5_preauth_client_rock *get_data_rock, krb5_gic_opt_ext *opte) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
H A D | sendto_kdc.c | 369 * send the formatted request 'message' to a KDC for realm 'realm' and 381 * that sent the request and an arg for a DTrace probe (request). Caller (at 386 const krb5_kdc_req *request, const krb5_data *realm, 395 KERBEROS_PROBE_KRB_KDC_REQ(MAKE, message, request); 471 * we didn't explicitly request to 775 * a kpasswd request 385 krb5_sendto_kdc(krb5_context context, const krb5_data *message, const krb5_kdc_req *request, const krb5_data *realm, krb5_data *reply, int *use_master, int tcp_only, char **hostname_used) argument
|
/osnet-11/usr/src/lib/libproc/common/ |
H A D | Pcontrol.c | 1634 long request, /* PCNULL, PCDSTOP, PCSTOP, PCWSTOP */ 1647 if (request != PCNULL && request != PCDSTOP) 1651 if (request != PCNULL) { 1659 if (request != PCNULL) { 1674 switch (request) { 1721 switch (request) { 1746 if (request == PCNULL || request == PCDSTOP || msec != 0) 3227 long request, /* PCNUL 1633 Pstopstatus(struct ps_prochandle *P, long request, uint_t msec) argument 3226 Lstopstatus(struct ps_lwphandle *L, long request, uint_t msec) argument [all...] |
/osnet-11/usr/src/lib/libsldap/common/ |
H A D | ns_connect.c | 184 __s_api_requestServer(const char *request, const char *server, argument 209 if (request == NULL) 212 ireq = request; 975 "request for a server failed"), 1021 * return this server on the next get-server request
|
H A D | ns_standalone.c | 682 * This function obtains data returned by an LDAP search request and puts it 2192 * request is one of the following: 2214 __s_api_findRootDSE(const char *request, argument 2259 if (strcmp(request, NS_CACHE_NEW) == 0 || 2275 if (strcmp(request, NS_CACHE_NORESP) == 0) { 2342 if (strcmp(request, NS_CACHE_WRITE) == 0) {
|
/osnet-11/usr/src/lib/fm/libasr/common/ |
H A D | asr.c | 677 * Creates an empty registration request structure used for registering a 775 * Gets the transport URL endpoint for an ASR registration request. 819 * Frees up all resources used for a registration request. 962 * registration request structure and system information. 986 asr_reg(asr_handle_t *ah, asr_regreq_t *request, nvlist_t **out_rsp) argument 1003 err = ah->asr_tprt->asr_register_client(ah, request, rsp);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/include/krb5/ |
H A D | kdb.h | 357 krb5_kdc_req *request; member in struct:_kdb_check_policy_as_req 371 krb5_kdc_req *request; member in struct:_kdb_check_policy_tgs_req 384 krb5_kdc_req *request; member in struct:_kdb_audit_as_req 393 krb5_kdc_req *request; member in struct:_kdb_audit_tgs_req
|
/osnet-11/usr/src/lib/libzfs/common/ |
H A D | libzfs_util.c | 1138 zfs_ioctl(libzfs_handle_t *hdl, int request, zfs_cmd_t *zc) argument 1143 error = ioctl(hdl->libzfs_fd, request, zc);
|
/osnet-11/usr/src/lib/libipadm/common/ |
H A D | ipadm_addr.c | 3087 * the request was to persist *only*, just persist the request. 3558 * After making the dhcpagent request, it also updates the 3682 dhcp_ipc_request_t *request; local 3705 request = dhcp_ipc_alloc_request(type, ifname, buffer, buffer_size, 3707 if (request == NULL) 3717 error = dhcp_ipc_make_request(request, &reply, dhcp_timeout); 3718 free(request); 3748 * for the request being made. Specifically, this means that ipadm_aobjname
|
/osnet-11/usr/src/lib/libscf/common/ |
H A D | lowlevel.c | 675 * This makes a door request on the client door associated with handle h. 906 * server claimed bad request 1059 rep_protocol_request_t request; local 1065 request.rpr_request = REP_PROTOCOL_CLOSE; 1067 (void) make_door_call(handle, &request, sizeof (request), 1087 struct rep_protocol_entity_setup request; local 1101 request.rpr_request = REP_PROTOCOL_ENTITY_SETUP; 1102 request.rpr_entityid = dp->rd_entity; 1103 request 1130 struct rep_protocol_iter_request request; local 1187 repository_door_request_t request; local 1620 struct rep_protocol_entity_teardown request; local 1654 struct rep_protocol_entity_reset request; local 1705 struct rep_protocol_entity_name request; local 1742 struct rep_protocol_entity_parent request; local 1785 struct rep_protocol_iter_start request; local 1873 struct rep_protocol_entity_get_child request; local 1994 struct rep_protocol_entity_delete request; local 2035 struct rep_protocol_masked_request request; local 2089 struct rep_protocol_entity_create_child request; local 2174 struct rep_protocol_entity_create_pg request; local 2237 struct rep_protocol_entity_delete request; local 2265 struct rep_protocol_entity_delete request; local 2293 struct rep_protocol_entity_delete request; local 2330 struct rep_protocol_bundle_remove request; local 2378 struct rep_protocol_entity_request request; local 2461 struct rep_protocol_iter_request request; local 2489 struct rep_protocol_iter_request request; local 2516 struct rep_protocol_entity_get request; local 2630 struct rep_protocol_iter_start request; local 2674 struct rep_protocol_iter_start request; local 2722 struct rep_protocol_iter_read request; local 3225 struct rep_protocol_transaction_commit *request; local 3313 struct rep_protocol_transaction_commit *request; local 3709 struct rep_protocol_entity_pair request; local 3845 struct rep_protocol_entity_update request; local 3897 struct rep_protocol_propertygrp_request request; local 3941 struct rep_protocol_notify_request request; local 3978 struct rep_protocol_wait_request request; local 4039 struct rep_protocol_snapshot_take request; local 4080 struct rep_protocol_snapshot_take_named request; local 4142 struct rep_protocol_snapshot_attach request; local 4215 struct rep_protocol_property_request request; local 4285 struct rep_protocol_property_request request; local 4419 struct rep_protocol_decoration_request request; local 4451 struct rep_protocol_decoration_request request; local 4543 struct rep_protocol_transaction_start request; local 4916 struct rep_protocol_transaction_commit *request; local 5889 struct rep_protocol_iter_read_value request; local 5965 struct rep_protocol_property_request request; local 6033 struct rep_protocol_property_request request; local 6769 struct rep_protocol_entity_parent_type request; local 8274 struct rep_protocol_backup_request request; local 8317 struct rep_protocol_switch_request request; local 8380 struct rep_protocol_request request; local 8406 struct rep_protocol_request request; local 8433 struct rep_protocol_decoration request; local [all...] |