Searched defs:response (Results 1 - 25 of 27) sorted by relevance

12

/osnet-11/usr/src/lib/libcmdutils/common/
H A Dsysattrs.c51 nvlist_t *response = NULL; local
55 status = getattrat(AT_FDCWD, view, file, &response);
58 if (response)
59 (void) nvlist_free(response);
H A Dprocess_xattrs.c93 nvlist_t *response = NULL; local
101 response = sysattr_list(cmd, srcfd, infile);
208 if (response != NULL) {
248 if (response != NULL)
249 nvlist_free(response);
276 nvlist_t *response; local
281 if (fgetattr(fd, XATTR_VIEW_READWRITE, &response) != 0) {
288 while ((pair = nvlist_next_nvpair(response, pair)) != NULL) {
295 return (response);
310 return (response);
[all...]
/osnet-11/usr/src/lib/krb5/plugins/kdb/db2/
H A Dkdb_ext.c41 krb5_data *response)
48 rep = (kdb_check_policy_as_rep *)response->data;
64 krb5_data *response)
38 krb5_db2_check_policy_as(krb5_context context, unsigned int method, const krb5_data *request, krb5_data *response) argument
61 krb5_db2_audit_as(krb5_context context, unsigned int method, const krb5_data *request, krb5_data *response) argument
/osnet-11/usr/src/lib/krb5/plugins/kdb/ldap/libkdb_ldap/
H A Dkdb_ext.c41 krb5_data *response)
48 rep = (kdb_check_policy_as_rep *)response->data;
64 krb5_data *response)
81 krb5_data *response)
38 krb5_ldap_check_policy_as(krb5_context context, unsigned int method, const krb5_data *request, krb5_data *response) argument
61 krb5_ldap_audit_as(krb5_context context, unsigned int method, const krb5_data *request, krb5_data *response) argument
78 krb5_ldap_check_allowed_to_delegate(krb5_context context, unsigned int method, const krb5_data *request, krb5_data *response) argument
/osnet-11/usr/src/lib/libipmi/common/
H A Dipmi_bmc.c94 ipmi_bmc_send(void *data, ipmi_cmd_t *cmd, ipmi_cmd_t *response, argument
139 /* get the response from the BMC */
153 response->ic_netfn = bmcrsp->fn;
154 response->ic_lun = bmcrsp->lun;
155 response->ic_cmd = bmcrsp->cmd;
158 response->ic_dlen = 0;
159 response->ic_data = NULL;
162 response->ic_dlen = bmcrsp->datalength;
163 response->ic_data = bmcrsp->data;
H A Dipmi_lan.c216 * the Connection Refused shows up _before_ the response packet,
218 * response is read before the connection refused is returned)
270 * parse response RMCP "pong" packet
272 * return -1 if ping response not received
344 /* parse response headers */
349 /* ping response packet */
386 /* shift response data to start of array */
514 ipmi_lan_send(void *data, ipmi_cmd_t *cmd, ipmi_cmd_t *response, argument
546 response->ic_netfn = rsp->ir_ihdr.imh_netfn;
547 response
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Drecvauth.c62 krb5_octet response; local
74 response = 0;
84 response = 1;
90 response = 1;
101 response = 2;
110 * Now we actually write the response. If the response is non-zero,
113 if ((krb5_net_write(context, *((int *)fd), (char *)&response, 1)) < 0) {
H A Dfast.c285 krb5_fast_response **response)
324 krb5_set_error_message(context, retval, "nonce modified in FAST response: KDC response modified");
328 *response = local_resp;
466 krb5_set_error_message(context, retval, "FAST response missing finish message in KDC reply");
282 decrypt_fast_reply(krb5_context context, struct krb5int_fast_request_state *state, krb5_pa_data **in_padata, krb5_fast_response **response) argument
H A Dpreauth2.c841 char prompt[100], response[100]; local
906 response_data.data = response;
907 response_data.length = sizeof(response);
1037 /* encode the encoded part of the response */
1399 char name[100], banner[100], prompt[100], response[100]; local
1482 response_data.data = response;
1483 response_data.length = sizeof(response);
/osnet-11/usr/src/cmd/hal/addons/network-devices/
H A Dsnmp.c70 struct snmp_pdu *request = NULL, *response = NULL; local
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Net/
H A DCmd.pm220 ${*$cmd}{'net_cmd_resp'} = []; # the response
323 sub response subroutine
517 $cmd->response() == CMD_OK;
657 transmission. Once this data has been sent C<dataend> calls C<response> and
658 returns true if C<response> returns CMD_OK.
693 Sets the status code to 580 and the response text to 'Unsupported command'.
696 =item response ()
698 Obtain a response from the server. Upon success the most significant digit
704 This method is called by C<response> as a method with one argument. It should
706 when this is part of a multi-line response an
[all...]
H A DPOP3.pm51 unless ($obj->response() == CMD_OK)
296 sub _STAT { shift->command('STAT')->response() == CMD_OK }
297 sub _LIST { shift->command('LIST',@_)->response() == CMD_OK }
298 sub _RETR { shift->command('RETR',$_[0])->response() == CMD_OK }
299 sub _DELE { shift->command('DELE',$_[0])->response() == CMD_OK }
300 sub _NOOP { shift->command('NOOP')->response() == CMD_OK }
301 sub _RSET { shift->command('RSET')->response() == CMD_OK }
302 sub _QUIT { shift->command('QUIT')->response() == CMD_OK }
303 sub _TOP { shift->command('TOP', @_)->response() == CMD_OK }
304 sub _UIDL { shift->command('UIDL',@_)->response()
336 sub response subroutine
[all...]
H A DFTP.pm113 unless ($ftp->response() == CMD_OK)
174 $ftp->response();
182 $ftp->response();
287 $ok = $ftp->command("SITE",${*$ftp}{'net_ftp_host'})->response;
290 $ok = $ftp->command("OPEN",${*$ftp}{'net_ftp_host'})->response;
301 $ok = $ftp->response()
426 $ftp->response();
524 unless ($data->close()) # implied $ftp->response
1032 $ok = CMD_INFO == $ftp->response();
1060 $ok = CMD_INFO == $ftp->response();
1094 sub response subroutine
[all...]
/osnet-11/usr/src/lib/libsasl/lib/
H A Dcheckpw.c266 const char *response,
282 if (!conn || !userstr || !challenge || !response)
320 if (!strncasecmp(digeststr, response, 32)) {
418 static char response[1024]; local
447 while (start < sizeof(response) - 1) {
448 n = read(s, response+start, sizeof(response) - 1 - start);
455 if (start > 1 && !strncmp(response, "OK", 2)) {
459 response[start] = '\0';
460 sasl_seterror(conn,0,response);
263 _sasl_auxprop_verify_apop(sasl_conn_t *conn, const char *userstr, const char *challenge, const char *response, const char *user_realm __attribute__((unused))) argument
503 char response[1024]; local
[all...]
/osnet-11/usr/src/cmd/hal/probing/network-printer/
H A Dprobe-snmp.c91 struct snmp_pdu *response = NULL; local
93 response = snmp_get_item(host, community, mib_item);
95 if ((response != NULL) && (response->errstat == SNMP_ERR_NOERROR)) {
96 struct variable_list *v = response->variables;
107 if (response != NULL)
108 snmp_free_pdu(response);
/osnet-11/usr/src/lib/libc/port/gen/
H A Dattrat.c176 cgetattr(int fd, nvlist_t **response) argument
199 if (nvunpacker(nv_response, nv_responselen, response)) {
236 fgetattr(int basefd, xattr_view_t view, nvlist_t **response) argument
243 error = cgetattr(xattrfd, response);
265 getattrat(int basefd, xattr_view_t view, const char *name, nvlist_t **response) argument
279 error = cgetattr(xattrfd, response);
/osnet-11/usr/src/lib/libsip/common/
H A Dsip_msg.c39 * Response consists of SIP version, response code, response phrase and CRLF.
537 * Add a response line to sip_response
540 sip_add_response_line(sip_msg_t sip_response, int response, char *response_code) argument
547 if (sip_response == NULL || response < 0 || response_code == NULL)
567 SIP_RESPONSE, SIP_VERSION, response, response_code, SIP_CRLF);
581 * create a response based on the sip_request.
585 sip_create_response(sip_msg_t sip_request, int response, char *response_code, argument
605 * Add response line.
607 if (sip_add_response_line(new_msg, response, response_cod
710 sip_create_nonOKack(sip_msg_t request, sip_msg_t response, sip_msg_t ack_msg) argument
798 sip_create_OKack(sip_msg_t response, sip_msg_t ack_msg, char *transport, char *sent_by, int sent_by_port, char *via_params) argument
[all...]
/osnet-11/usr/src/lib/libkmf/libkmf/common/
H A Dclient.c206 * This function will get the response from the server, check the http status
207 * line, and write the response content to a file. If this is a OCSP response,
333 * Check the HTTP status code. If it is not 200, the HTTP response
391 /* Check the contenttype if this is an OCSP response */
397 "application/ocsp-response") != 0) {
403 /* Now we are ready to read the body of the response */
410 /* resize buffer to only what's needed to hold the current response */
522 /* Retrieve the OCSP response */
639 /* Retrieve the response */
806 kmf_get_ocsp_for_cert(KMF_HANDLE_T handle, KMF_DATA *user_cert, KMF_DATA *ta_cert, KMF_DATA *response) argument
[all...]
H A Dcertop.c1740 KMF_DATA *user_cert, KMF_DATA *issuer_cert, KMF_DATA *response,
1763 * Get the response lifetime from policy.
1773 * If ignore_response_sign is FALSE, we need to verify the response.
1876 * If the caller provides an OCSP response, we will use it directly.
1877 * Otherwise, we will try to fetch an OCSP response for the given
1880 if (response == NULL) {
1896 * Process the OCSP response and retrieve the certificate status.
1914 response == NULL ? new_response : response, sizeof (KMF_DATA));
1739 cert_ocsp_check(KMF_HANDLE_T handle, KMF_KEYSTORE_TYPE *kstype, KMF_DATA *user_cert, KMF_DATA *issuer_cert, KMF_DATA *response, char *slotlabel, char *dirpath) argument
/osnet-11/usr/src/lib/libradproto/common/
H A Dradclient.c187 /* Select version, send response */
454 /* No reader thread is active; synchronously read response */
470 /* All requests are synchronous; we should only see our response */
508 response_data *response = &mw->message.message_u.rdata; local
510 response->payload.payload_len, response->payload.payload_val);
/osnet-11/usr/src/lib/libsmb/common/
H A Dsmb_util.c428 int response; local
474 response = 0;
477 response = 1;
495 return (response);
500 return (response);
511 return (response);
517 return (response);
667 boolean_t response; local
701 response = (*gr != '-') ? B_TRUE : B_FALSE;
708 if ((response
[all...]
/osnet-11/usr/src/cmd/sendmail/src/
H A Dmilter.c132 if (response == NULL || \
133 strlen(response) + 1 != (size_t) rlen || \
135 (response[0] != '4' && response[0] != '5') || \
136 !isascii(response[1]) || !isdigit(response[1]) || \
137 !isascii(response[2]) || !isdigit(response[2])) \
139 if (response != NULL) \
140 sm_free(response); /* XX
1998 char *response; local
2233 char *response = NULL; local
2409 char *response; local
2707 char *response = NULL; local
2797 char *response = NULL; local
3920 char *response; local
4056 char *response; local
4106 char *response; local
4207 char *response; local
4324 char *response = NULL; local
[all...]
H A Dsrvrsmtp.c403 str, addr, response); \
406 if (strncmp(response, "421 ", 4) == 0 \
407 || strncmp(response, "421-", 4) == 0) \
412 usrerr(response); \
418 usrerr(response); \
456 if (response != NULL) \
457 sm_free(response); /* XXX */ \
961 char *response; local
967 response = milter_connect(q, RealHostAddr, e, &state);
1007 if (response !
2143 char *response; local
2510 char *response; local
2759 char *response; local
2843 char *response; local
3272 char *response; local
3374 char *response; local
3498 char *response; local
[all...]
/osnet-11/usr/src/lib/rad/pyrad/common/
H A Dclient.py1106 response = xdrlib.Packer() variable in class:RadConnection
1107 response.pack_string(name)
1108 response.pack_int(1)
1109 response.pack_string(locale)
1110 self._rs.write(response.get_buffer(), True)
1171 otherwise it is an event response from the server. """
1191 """ Read a RAD protocol response and return the unpacked
1198 raise Exception('Bad response (serial %d, expected %d)' %
/osnet-11/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c2536 * This function will verify the signature of a basic response, using
2556 * Find the certificate that signed the basic response.
2561 * certificate list came with the response file.
2604 /* Verify the signature of the response */
2654 KMF_DATA *response; local
2669 response = kmf_get_attr_ptr(KMF_OCSP_RESPONSE_DATA_ATTR,
2671 if (response == NULL)
2689 /* Read in the response */
2690 derbio = BIO_new_mem_buf(response->Data, response
[all...]

Completed in 103 milliseconds

12