/osnet-11/usr/src/lib/libcmdutils/common/ |
H A D | sysattrs.c | 51 nvlist_t *response = NULL; local 55 status = getattrat(AT_FDCWD, view, file, &response); 58 if (response) 59 (void) nvlist_free(response);
|
H A D | process_xattrs.c | 93 nvlist_t *response = NULL; local 101 response = sysattr_list(cmd, srcfd, infile); 208 if (response != NULL) { 248 if (response != NULL) 249 nvlist_free(response); 276 nvlist_t *response; local 281 if (fgetattr(fd, XATTR_VIEW_READWRITE, &response) != 0) { 288 while ((pair = nvlist_next_nvpair(response, pair)) != NULL) { 295 return (response); 310 return (response); [all...] |
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/ |
H A D | kdb_ext.c | 41 krb5_data *response) 48 rep = (kdb_check_policy_as_rep *)response->data; 64 krb5_data *response) 38 krb5_db2_check_policy_as(krb5_context context, unsigned int method, const krb5_data *request, krb5_data *response) argument 61 krb5_db2_audit_as(krb5_context context, unsigned int method, const krb5_data *request, krb5_data *response) argument
|
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/ |
H A D | kdb_ext.c | 41 krb5_data *response) 48 rep = (kdb_check_policy_as_rep *)response->data; 64 krb5_data *response) 81 krb5_data *response) 38 krb5_ldap_check_policy_as(krb5_context context, unsigned int method, const krb5_data *request, krb5_data *response) argument 61 krb5_ldap_audit_as(krb5_context context, unsigned int method, const krb5_data *request, krb5_data *response) argument 78 krb5_ldap_check_allowed_to_delegate(krb5_context context, unsigned int method, const krb5_data *request, krb5_data *response) argument
|
/osnet-11/usr/src/lib/libipmi/common/ |
H A D | ipmi_bmc.c | 94 ipmi_bmc_send(void *data, ipmi_cmd_t *cmd, ipmi_cmd_t *response, argument 139 /* get the response from the BMC */ 153 response->ic_netfn = bmcrsp->fn; 154 response->ic_lun = bmcrsp->lun; 155 response->ic_cmd = bmcrsp->cmd; 158 response->ic_dlen = 0; 159 response->ic_data = NULL; 162 response->ic_dlen = bmcrsp->datalength; 163 response->ic_data = bmcrsp->data;
|
H A D | ipmi_lan.c | 216 * the Connection Refused shows up _before_ the response packet, 218 * response is read before the connection refused is returned) 270 * parse response RMCP "pong" packet 272 * return -1 if ping response not received 344 /* parse response headers */ 349 /* ping response packet */ 386 /* shift response data to start of array */ 514 ipmi_lan_send(void *data, ipmi_cmd_t *cmd, ipmi_cmd_t *response, argument 546 response->ic_netfn = rsp->ir_ihdr.imh_netfn; 547 response [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | recvauth.c | 62 krb5_octet response; local 74 response = 0; 84 response = 1; 90 response = 1; 101 response = 2; 110 * Now we actually write the response. If the response is non-zero, 113 if ((krb5_net_write(context, *((int *)fd), (char *)&response, 1)) < 0) {
|
H A D | fast.c | 285 krb5_fast_response **response) 324 krb5_set_error_message(context, retval, "nonce modified in FAST response: KDC response modified"); 328 *response = local_resp; 466 krb5_set_error_message(context, retval, "FAST response missing finish message in KDC reply"); 282 decrypt_fast_reply(krb5_context context, struct krb5int_fast_request_state *state, krb5_pa_data **in_padata, krb5_fast_response **response) argument
|
H A D | preauth2.c | 841 char prompt[100], response[100]; local 906 response_data.data = response; 907 response_data.length = sizeof(response); 1037 /* encode the encoded part of the response */ 1399 char name[100], banner[100], prompt[100], response[100]; local 1482 response_data.data = response; 1483 response_data.length = sizeof(response);
|
/osnet-11/usr/src/cmd/hal/addons/network-devices/ |
H A D | snmp.c | 70 struct snmp_pdu *request = NULL, *response = NULL; local
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Net/ |
H A D | Cmd.pm | 220 ${*$cmd}{'net_cmd_resp'} = []; # the response 323 sub response subroutine 517 $cmd->response() == CMD_OK; 657 transmission. Once this data has been sent C<dataend> calls C<response> and 658 returns true if C<response> returns CMD_OK. 693 Sets the status code to 580 and the response text to 'Unsupported command'. 696 =item response () 698 Obtain a response from the server. Upon success the most significant digit 704 This method is called by C<response> as a method with one argument. It should 706 when this is part of a multi-line response an [all...] |
H A D | POP3.pm | 51 unless ($obj->response() == CMD_OK) 296 sub _STAT { shift->command('STAT')->response() == CMD_OK } 297 sub _LIST { shift->command('LIST',@_)->response() == CMD_OK } 298 sub _RETR { shift->command('RETR',$_[0])->response() == CMD_OK } 299 sub _DELE { shift->command('DELE',$_[0])->response() == CMD_OK } 300 sub _NOOP { shift->command('NOOP')->response() == CMD_OK } 301 sub _RSET { shift->command('RSET')->response() == CMD_OK } 302 sub _QUIT { shift->command('QUIT')->response() == CMD_OK } 303 sub _TOP { shift->command('TOP', @_)->response() == CMD_OK } 304 sub _UIDL { shift->command('UIDL',@_)->response() 336 sub response subroutine [all...] |
H A D | FTP.pm | 113 unless ($ftp->response() == CMD_OK) 174 $ftp->response(); 182 $ftp->response(); 287 $ok = $ftp->command("SITE",${*$ftp}{'net_ftp_host'})->response; 290 $ok = $ftp->command("OPEN",${*$ftp}{'net_ftp_host'})->response; 301 $ok = $ftp->response() 426 $ftp->response(); 524 unless ($data->close()) # implied $ftp->response 1032 $ok = CMD_INFO == $ftp->response(); 1060 $ok = CMD_INFO == $ftp->response(); 1094 sub response subroutine [all...] |
/osnet-11/usr/src/lib/libsasl/lib/ |
H A D | checkpw.c | 266 const char *response, 282 if (!conn || !userstr || !challenge || !response) 320 if (!strncasecmp(digeststr, response, 32)) { 418 static char response[1024]; local 447 while (start < sizeof(response) - 1) { 448 n = read(s, response+start, sizeof(response) - 1 - start); 455 if (start > 1 && !strncmp(response, "OK", 2)) { 459 response[start] = '\0'; 460 sasl_seterror(conn,0,response); 263 _sasl_auxprop_verify_apop(sasl_conn_t *conn, const char *userstr, const char *challenge, const char *response, const char *user_realm __attribute__((unused))) argument 503 char response[1024]; local [all...] |
/osnet-11/usr/src/cmd/hal/probing/network-printer/ |
H A D | probe-snmp.c | 91 struct snmp_pdu *response = NULL; local 93 response = snmp_get_item(host, community, mib_item); 95 if ((response != NULL) && (response->errstat == SNMP_ERR_NOERROR)) { 96 struct variable_list *v = response->variables; 107 if (response != NULL) 108 snmp_free_pdu(response);
|
/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | attrat.c | 176 cgetattr(int fd, nvlist_t **response) argument 199 if (nvunpacker(nv_response, nv_responselen, response)) { 236 fgetattr(int basefd, xattr_view_t view, nvlist_t **response) argument 243 error = cgetattr(xattrfd, response); 265 getattrat(int basefd, xattr_view_t view, const char *name, nvlist_t **response) argument 279 error = cgetattr(xattrfd, response);
|
/osnet-11/usr/src/lib/libsip/common/ |
H A D | sip_msg.c | 39 * Response consists of SIP version, response code, response phrase and CRLF. 537 * Add a response line to sip_response 540 sip_add_response_line(sip_msg_t sip_response, int response, char *response_code) argument 547 if (sip_response == NULL || response < 0 || response_code == NULL) 567 SIP_RESPONSE, SIP_VERSION, response, response_code, SIP_CRLF); 581 * create a response based on the sip_request. 585 sip_create_response(sip_msg_t sip_request, int response, char *response_code, argument 605 * Add response line. 607 if (sip_add_response_line(new_msg, response, response_cod 710 sip_create_nonOKack(sip_msg_t request, sip_msg_t response, sip_msg_t ack_msg) argument 798 sip_create_OKack(sip_msg_t response, sip_msg_t ack_msg, char *transport, char *sent_by, int sent_by_port, char *via_params) argument [all...] |
/osnet-11/usr/src/lib/libkmf/libkmf/common/ |
H A D | client.c | 206 * This function will get the response from the server, check the http status 207 * line, and write the response content to a file. If this is a OCSP response, 333 * Check the HTTP status code. If it is not 200, the HTTP response 391 /* Check the contenttype if this is an OCSP response */ 397 "application/ocsp-response") != 0) { 403 /* Now we are ready to read the body of the response */ 410 /* resize buffer to only what's needed to hold the current response */ 522 /* Retrieve the OCSP response */ 639 /* Retrieve the response */ 806 kmf_get_ocsp_for_cert(KMF_HANDLE_T handle, KMF_DATA *user_cert, KMF_DATA *ta_cert, KMF_DATA *response) argument [all...] |
H A D | certop.c | 1740 KMF_DATA *user_cert, KMF_DATA *issuer_cert, KMF_DATA *response, 1763 * Get the response lifetime from policy. 1773 * If ignore_response_sign is FALSE, we need to verify the response. 1876 * If the caller provides an OCSP response, we will use it directly. 1877 * Otherwise, we will try to fetch an OCSP response for the given 1880 if (response == NULL) { 1896 * Process the OCSP response and retrieve the certificate status. 1914 response == NULL ? new_response : response, sizeof (KMF_DATA)); 1739 cert_ocsp_check(KMF_HANDLE_T handle, KMF_KEYSTORE_TYPE *kstype, KMF_DATA *user_cert, KMF_DATA *issuer_cert, KMF_DATA *response, char *slotlabel, char *dirpath) argument
|
/osnet-11/usr/src/lib/libradproto/common/ |
H A D | radclient.c | 187 /* Select version, send response */ 454 /* No reader thread is active; synchronously read response */ 470 /* All requests are synchronous; we should only see our response */ 508 response_data *response = &mw->message.message_u.rdata; local 510 response->payload.payload_len, response->payload.payload_val);
|
/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_util.c | 428 int response; local 474 response = 0; 477 response = 1; 495 return (response); 500 return (response); 511 return (response); 517 return (response); 667 boolean_t response; local 701 response = (*gr != '-') ? B_TRUE : B_FALSE; 708 if ((response [all...] |
/osnet-11/usr/src/cmd/sendmail/src/ |
H A D | milter.c | 132 if (response == NULL || \ 133 strlen(response) + 1 != (size_t) rlen || \ 135 (response[0] != '4' && response[0] != '5') || \ 136 !isascii(response[1]) || !isdigit(response[1]) || \ 137 !isascii(response[2]) || !isdigit(response[2])) \ 139 if (response != NULL) \ 140 sm_free(response); /* XX 1998 char *response; local 2233 char *response = NULL; local 2409 char *response; local 2707 char *response = NULL; local 2797 char *response = NULL; local 3920 char *response; local 4056 char *response; local 4106 char *response; local 4207 char *response; local 4324 char *response = NULL; local [all...] |
H A D | srvrsmtp.c | 403 str, addr, response); \ 406 if (strncmp(response, "421 ", 4) == 0 \ 407 || strncmp(response, "421-", 4) == 0) \ 412 usrerr(response); \ 418 usrerr(response); \ 456 if (response != NULL) \ 457 sm_free(response); /* XXX */ \ 961 char *response; local 967 response = milter_connect(q, RealHostAddr, e, &state); 1007 if (response ! 2143 char *response; local 2510 char *response; local 2759 char *response; local 2843 char *response; local 3272 char *response; local 3374 char *response; local 3498 char *response; local [all...] |
/osnet-11/usr/src/lib/rad/pyrad/common/ |
H A D | client.py | 1106 response = xdrlib.Packer() variable in class:RadConnection 1107 response.pack_string(name) 1108 response.pack_int(1) 1109 response.pack_string(locale) 1110 self._rs.write(response.get_buffer(), True) 1171 otherwise it is an event response from the server. """ 1191 """ Read a RAD protocol response and return the unpacked 1198 raise Exception('Bad response (serial %d, expected %d)' %
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 2536 * This function will verify the signature of a basic response, using 2556 * Find the certificate that signed the basic response. 2561 * certificate list came with the response file. 2604 /* Verify the signature of the response */ 2654 KMF_DATA *response; local 2669 response = kmf_get_attr_ptr(KMF_OCSP_RESPONSE_DATA_ATTR, 2671 if (response == NULL) 2689 /* Read in the response */ 2690 derbio = BIO_new_mem_buf(response->Data, response [all...] |