/illumos-gate/usr/src/lib/print/libipp-core/common/ |
H A D | ipp.h | 59 * response correctly, even if we can make sense of some of the data? 324 papi_attribute_t ***response);
|
/illumos-gate/usr/src/lib/libsasl/include/ |
H A D | sasl.h | 34 * sasl_chalprompt_t client: Display challenge and prompt for response 69 * sasl_checkapop Check an APOP challenge/response (uses pseudo "APOP" 85 * 4c. If SASL_OK, continue or goto 6 if last server response was success 86 * 5. send message to server, wait for response 87 * 5a. On data or success with server response, goto 4 89 * 5c. On success with no server response continue 101 * 5a. If SASL_CONTINUE, output to client, wait response, repeat 5 560 * prompt for input in response to a challenge. 609 * SASL_NOAUTHZ or other SASL response on failure 897 * clientout -- the initial client response t [all...] |
/illumos-gate/usr/src/cmd/fm/eversholt/common/ |
H A D | literals.h | 126 L_DECL(response); variable
|
/illumos-gate/usr/src/uts/common/sys/ |
H A D | pppt_ic_if.h | 185 * Status message: sent in response to messages other than SCSI messages. 361 uint8_t response, /* was command processed? */
|
/illumos-gate/usr/src/uts/sun4u/lw8/io/ |
H A D | lw8.c | 838 sbbc_msg_t response, *resp = &response; local 845 bzero((caddr_t)&response, sizeof (response));
|
H A D | ntwdt.c | 1733 * in response to a solicitation from ScApp (eg, 2087 sbbc_msg_t response; local 2096 resp = &response; 2097 bzero((caddr_t)&response, sizeof (response));
|
H A D | sgfru.c | 1159 sbbc_msg_t response, *resp = &response; local 1167 bzero((caddr_t)&response, sizeof (sbbc_msg_t));
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | mDNS.c | 84 mDNSlocal void mDNSParseNSEC3Records(mDNS *const m, const DNSMessage *const response, const mDNSu8 *end, 115 // sent with the "request unicast response" (QU) bit set. 420 LogInfo("GenerateNegativeResponse: Generating negative response for question %##s (%s)", q->qname.c, DNSTypeName(q->qtype)); 423 // We need to force the response through in the following cases 454 // of throwing it away. If we have a CNAME response that answers 456 // away the response where the actual addresses are present. 756 // so a response of any type should match, even if it is not actually the type the client plans to use. 1708 // Sometimes the records don't complete proper deregistration i.e., don't wait for a response 2738 // When we're generating an NSEC record in response to a specify query for that type 2882 // For Unicast, when we get the response fro 6868 GenerateUnicastResponse(const DNSMessage *const query, const mDNSu8 *const end, const mDNSInterfaceID InterfaceID, mDNSBool LegacyQuery, DNSMessage *const response, AuthRecord *ResponseRecords) argument 7219 ProcessQuery(mDNS *const m, const DNSMessage *const query, const mDNSu8 *const end, const mDNSAddr *srcaddr, const mDNSInterfaceID InterfaceID, mDNSBool LegacyQuery, mDNSBool QueryWasMulticast, mDNSBool QueryWasLocalUnicast, DNSMessage *const response) argument 8180 mDNSCoreReceiveNoDNSSECAnswers(mDNS *const m, const DNSMessage *const response, const mDNSu8 *end, const mDNSAddr *dstaddr, mDNSIPPort dstport, const mDNSInterfaceID InterfaceID) argument 8223 mDNSCoreReceiveNoUnicastAnswers(mDNS *const m, const DNSMessage *const response, const mDNSu8 *end, const mDNSAddr *dstaddr, mDNSIPPort dstport, const mDNSInterfaceID InterfaceID, uDNS_LLQType LLQType, mDNSu8 rcode, CacheRecord *NSECRecords) argument 8496 mDNSCoreReceiveCacheCheck(mDNS *const m, const DNSMessage *const response, uDNS_LLQType LLQType, const mDNSu32 slot, CacheGroup *cg, DNSQuestion *unicastQuestion, CacheRecord ***cfp, CacheRecord **NSECCachePtr, mDNSInterfaceID InterfaceID) argument 8659 mDNSParseNSEC3Records(mDNS *const m, const DNSMessage *const response, const mDNSu8 *end, const mDNSInterfaceID InterfaceID, CacheRecord **NSEC3Records) argument 8717 mDNSCoreReceiveResponse(mDNS *const m, const DNSMessage *const response, const mDNSu8 *end, const mDNSAddr *srcaddr, const mDNSIPPort srcport, const mDNSAddr *dstaddr, mDNSIPPort dstport, const mDNSInterfaceID InterfaceID) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | preauth2.c | 776 char prompt[100], response[100]; local 839 response_data.data = response; 840 response_data.length = sizeof(response); 969 /* encode the encoded part of the response */ 1049 char name[100], banner[100], prompt[100], response[100]; local 1130 response_data.data = response; 1131 response_data.length = sizeof(response);
|
/illumos-gate/usr/src/lib/libsasl/lib/ |
H A D | server.c | 1657 * clientin -- client initial response (NUL terminated), NULL if empty 1658 * clientinlen -- length of initial response 2417 /* Screen out the SASL_BADPARAM response 2440 * response -- client response, "<user> <digest>" (RFC 1939) 2441 * resplen -- length of response, 0 = strlen(response) 2446 * SASL_BADPROT -- protocol error (e.g., response in wrong format) 2455 const char *response, 2460 const char *response __attribute_ [all...] |
H A D | saslint.h | 709 const char *response,
|
/illumos-gate/usr/src/cmd/fm/eversholt/files/i386/i86pc/ |
H A D | amd64.esc | 105 * trips we diagnose a fault.memory.page so that the response agent can 156 count=stat.sbpgflt@chip/memory-controller/dimm/rank, response=0, 159 count=stat.ckpgflt@chip/memory-controller/dimm/rank, response=0, 185 * limit bounds the maximum real response to page faults across all ranks 186 * that fault manager response agents can effect, but it should not be confused 190 * in response to that and other faults). It is, however, desirable to 231 * response agents can continue to retire those pages up to the system-imposed 305 response=0; 369 event fault.cpu.amd.dramchannel@chip/memory-controller/dram-channel, response=0;
|
H A D | gcpu.esc | 163 response=0, engine=serd.cpu.generic-x86.fltleaf@chip/core/strand;\
|
/illumos-gate/usr/src/cmd/fs.d/nfs/mountd/ |
H A D | mountd.c | 1801 int response; local 1832 response = 0; 1835 response = 1; 1868 return (response); 1881 return (response); 1908 return (response); 1913 return (response); 1919 return (response); 3186 * on the net blasting the requester with a response.
|
/illumos-gate/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 325 * calculate request-digest/response-digest as per HTTP Digest spec 338 HASHHEX Response /* request-digest or response-digest */ 365 /* calculate response */ 2408 Response /* request-digest or response-digest */ 2432 Response /* request-digest or response-digest */ 2856 char *response = NULL; local 2904 * digest-response = 1#( username | realm | nonce | cnonce | 2905 * nonce-count | qop | digest-uri | response | maxbuf | charset | 2972 } else if (strcasecmp(name, "response") == 0) { 2973 _plug_strdup(sparams->utils, value, &response, NUL 3953 char *response = NULL; local [all...] |
/illumos-gate/usr/src/uts/common/io/fibre-channel/fca/emlxs/ |
H A D | emlxs_sli4.c | 4039 wqe->CQId = (uint16_t)0xffff; /* default CQ for response */ 4157 wqe->CQId = (uint16_t)0xffff; /* default CQ for response */ 4309 wqe->CQId = (uint16_t)0xffff; /* default CQ for response */ 4663 wqe->CQId = (uint16_t)0xffff; /* default CQ for response */ 4890 wqe->CQId = (uint16_t)0xffff; /* default CQ for response */ 6347 /* Try to send abort response */ 6441 wqe->CQId = (uint16_t)0xffff; /* default CQ for response */ 8398 hba->sli.sli4.eq[i].qid = eq->params.response.EQId; 8430 cq->params.response.CQId; 8478 wq->params.response [all...] |
H A D | emlxs_download.c | 641 if ((phy->params.response.phy_type != PHY_TN_8022) || 642 (phy->params.response.interface_type != BASET_10GB_TYPE)) { 646 phy->params.response.phy_type, 647 phy->params.response.interface_type); 658 phy->params.response.phy_type, 659 phy->params.response.interface_type); 1872 write_obj->params.response.actual_write_length, 1878 /* Check response length */ 1879 if (write_obj->params.response.actual_write_length == 0) { 1886 if (write_obj->params.response [all...] |
/illumos-gate/usr/src/uts/common/io/scsi/adapters/iscsi/ |
H A D | iscsi_io.c | 49 if (((ICHK_HDR)->response == 0) && \ 275 /* reset the session timer when we receive the response */ 601 * iscsi_rx_process_login_pdup - Process login response PDU. This function 620 * this login response and we should just drop it. 641 * iscsi_rx_process_cmd_rsp - Process received scsi command response. This 700 * status info. If the response field indicates that 715 if (issrhp->response != 0) { 741 if (issrhp->response) { 744 " %p response: %d bcount: %lu", (void *)ic, (void *)pdu, 745 issrhp->response, icmd [all...] |
/illumos-gate/usr/src/cmd/krb5/krb5kdc/ |
H A D | kdc_preauth.c | 246 "sam-response", 1866 char response[9]; local 2026 sc.sam_response_prompt.data = "response prompt"; 2132 gettext("snk4 response generation failed")); 2137 /* now output block is the raw bits of the response; convert it 2153 response[2*j+0] = '0' + n[1]; 2154 response[2*j+1] = '0' + n[0]; 2155 /* and now, response has what we work with. */ 2157 response[8] = 0; 2158 predict_response.data = response; [all...] |
/illumos-gate/usr/src/uts/common/fs/sockfs/ |
H A D | nl7curi.c | 447 uri_rd_t *rdp = &uri->response; 483 * URI request/response processing. 928 ruri->response.sz = 0; 1071 * After response parse now no cache, 1101 * Called to sink application response data, the processing of the data 1103 * going to cache the URI but want to parse it for detecting response 1178 /* Successfull sink of data, response parse the data */ 1192 * No more data needed and no pending response 1193 * data or current data count >= response length 1273 * Called to sink application response sendfile [all...] |
/illumos-gate/usr/src/cmd/ldap/common/ |
H A D | ldapsearch.c | 817 gettext("Unsolicited response") ); 819 fprintf( stderr, gettext("%s: ignoring LDAP response message"
|
/illumos-gate/usr/src/uts/common/io/ib/mgt/ibcm/ |
H A D | ibcm_sm.c | 927 * generates REP/REJ response 928 * stores the response MAD in state structure for future re-sends 952 ibcm_status_t response; local 1241 response = ibcm_cep_state_req(statep, req_msgp, 1245 if (response == IBCM_DEFER) { 1247 "statep %0xp client returned DEFER response", 1253 ibcm_handle_cep_req_response(statep, response, 1276 * the REP/REJ response, and this REQ is an old MAD popping 1391 * Processes the response from ibcm_cep_state_req. Called holding a 1395 ibcm_handle_cep_req_response(ibcm_state_data_t *statep, ibcm_status_t response, argument 1442 ibcm_status_t response; local 1797 ibcm_handle_cep_rep_response(ibcm_state_data_t *statep, ibcm_status_t response, ibt_cm_reason_t reject_reason, uint8_t arej_info_len, ibcm_rep_msg_t *rep_msgp) argument [all...] |
/illumos-gate/usr/src/cmd/ls/ |
H A D | ls.c | 374 static nvlist_t *response; variable 2538 &response)) != 0) { 2553 while ((pair = nvlist_next_nvpair(response, pair)) != NULL) { 2573 nvlist_free(response); 3203 nvlist_free(response);
|
/illumos-gate/usr/src/uts/common/io/myri10ge/drv/ |
H A D | myri10ge.c | 1216 volatile mcp_cmd_response_t *response = mgp->cmd; local 1231 response->result = 0xffffffff; 1239 if (response->result != 0xffffffff) { 1240 if (response->result == 0) { 1241 data->data0 = ntohl(response->data); 1244 } else if (ntohl(response->result) 1248 } else if (ntohl(response->result) 1255 mgp->name, cmd, ntohl(response->result)); 1264 mgp->name, cmd, ntohl(response->result)); 1291 * response i [all...] |
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | certop.c | 1735 KMF_DATA *user_cert, KMF_DATA *issuer_cert, KMF_DATA *response, 1758 * Get the response lifetime from policy. 1768 * If ignore_response_sign is FALSE, we need to verify the response. 1871 * If the caller provides an OCSP response, we will use it directly. 1872 * Otherwise, we will try to fetch an OCSP response for the given 1875 if (response == NULL) { 1891 * Process the OCSP response and retrieve the certificate status. 1909 response == NULL ? new_response : response, sizeof (KMF_DATA)); 1734 cert_ocsp_check(KMF_HANDLE_T handle, KMF_KEYSTORE_TYPE *kstype, KMF_DATA *user_cert, KMF_DATA *issuer_cert, KMF_DATA *response, char *slotlabel, char *dirpath) argument
|