Searched refs:response (Results 126 - 150 of 175) sorted by relevance

1234567

/illumos-gate/usr/src/lib/print/libipp-core/common/
H A Dipp.h59 * response correctly, even if we can make sense of some of the data?
324 papi_attribute_t ***response);
/illumos-gate/usr/src/lib/libsasl/include/
H A Dsasl.h34 * sasl_chalprompt_t client: Display challenge and prompt for response
69 * sasl_checkapop Check an APOP challenge/response (uses pseudo "APOP"
85 * 4c. If SASL_OK, continue or goto 6 if last server response was success
86 * 5. send message to server, wait for response
87 * 5a. On data or success with server response, goto 4
89 * 5c. On success with no server response continue
101 * 5a. If SASL_CONTINUE, output to client, wait response, repeat 5
560 * prompt for input in response to a challenge.
609 * SASL_NOAUTHZ or other SASL response on failure
897 * clientout -- the initial client response t
[all...]
/illumos-gate/usr/src/cmd/fm/eversholt/common/
H A Dliterals.h126 L_DECL(response); variable
/illumos-gate/usr/src/uts/common/sys/
H A Dpppt_ic_if.h185 * Status message: sent in response to messages other than SCSI messages.
361 uint8_t response, /* was command processed? */
/illumos-gate/usr/src/uts/sun4u/lw8/io/
H A Dlw8.c838 sbbc_msg_t response, *resp = &response; local
845 bzero((caddr_t)&response, sizeof (response));
H A Dntwdt.c1733 * in response to a solicitation from ScApp (eg,
2087 sbbc_msg_t response; local
2096 resp = &response;
2097 bzero((caddr_t)&response, sizeof (response));
H A Dsgfru.c1159 sbbc_msg_t response, *resp = &response; local
1167 bzero((caddr_t)&response, sizeof (sbbc_msg_t));
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/
H A DmDNS.c84 mDNSlocal void mDNSParseNSEC3Records(mDNS *const m, const DNSMessage *const response, const mDNSu8 *end,
115 // sent with the "request unicast response" (QU) bit set.
420 LogInfo("GenerateNegativeResponse: Generating negative response for question %##s (%s)", q->qname.c, DNSTypeName(q->qtype));
423 // We need to force the response through in the following cases
454 // of throwing it away. If we have a CNAME response that answers
456 // away the response where the actual addresses are present.
756 // so a response of any type should match, even if it is not actually the type the client plans to use.
1708 // Sometimes the records don't complete proper deregistration i.e., don't wait for a response
2738 // When we're generating an NSEC record in response to a specify query for that type
2882 // For Unicast, when we get the response fro
6868 GenerateUnicastResponse(const DNSMessage *const query, const mDNSu8 *const end, const mDNSInterfaceID InterfaceID, mDNSBool LegacyQuery, DNSMessage *const response, AuthRecord *ResponseRecords) argument
7219 ProcessQuery(mDNS *const m, const DNSMessage *const query, const mDNSu8 *const end, const mDNSAddr *srcaddr, const mDNSInterfaceID InterfaceID, mDNSBool LegacyQuery, mDNSBool QueryWasMulticast, mDNSBool QueryWasLocalUnicast, DNSMessage *const response) argument
8180 mDNSCoreReceiveNoDNSSECAnswers(mDNS *const m, const DNSMessage *const response, const mDNSu8 *end, const mDNSAddr *dstaddr, mDNSIPPort dstport, const mDNSInterfaceID InterfaceID) argument
8223 mDNSCoreReceiveNoUnicastAnswers(mDNS *const m, const DNSMessage *const response, const mDNSu8 *end, const mDNSAddr *dstaddr, mDNSIPPort dstport, const mDNSInterfaceID InterfaceID, uDNS_LLQType LLQType, mDNSu8 rcode, CacheRecord *NSECRecords) argument
8496 mDNSCoreReceiveCacheCheck(mDNS *const m, const DNSMessage *const response, uDNS_LLQType LLQType, const mDNSu32 slot, CacheGroup *cg, DNSQuestion *unicastQuestion, CacheRecord ***cfp, CacheRecord **NSECCachePtr, mDNSInterfaceID InterfaceID) argument
8659 mDNSParseNSEC3Records(mDNS *const m, const DNSMessage *const response, const mDNSu8 *end, const mDNSInterfaceID InterfaceID, CacheRecord **NSEC3Records) argument
8717 mDNSCoreReceiveResponse(mDNS *const m, const DNSMessage *const response, const mDNSu8 *end, const mDNSAddr *srcaddr, const mDNSIPPort srcport, const mDNSAddr *dstaddr, mDNSIPPort dstport, const mDNSInterfaceID InterfaceID) argument
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dpreauth2.c776 char prompt[100], response[100]; local
839 response_data.data = response;
840 response_data.length = sizeof(response);
969 /* encode the encoded part of the response */
1049 char name[100], banner[100], prompt[100], response[100]; local
1130 response_data.data = response;
1131 response_data.length = sizeof(response);
/illumos-gate/usr/src/lib/libsasl/lib/
H A Dserver.c1657 * clientin -- client initial response (NUL terminated), NULL if empty
1658 * clientinlen -- length of initial response
2417 /* Screen out the SASL_BADPARAM response
2440 * response -- client response, "<user> <digest>" (RFC 1939)
2441 * resplen -- length of response, 0 = strlen(response)
2446 * SASL_BADPROT -- protocol error (e.g., response in wrong format)
2455 const char *response,
2460 const char *response __attribute_
[all...]
H A Dsaslint.h709 const char *response,
/illumos-gate/usr/src/cmd/fm/eversholt/files/i386/i86pc/
H A Damd64.esc105 * trips we diagnose a fault.memory.page so that the response agent can
156 count=stat.sbpgflt@chip/memory-controller/dimm/rank, response=0,
159 count=stat.ckpgflt@chip/memory-controller/dimm/rank, response=0,
185 * limit bounds the maximum real response to page faults across all ranks
186 * that fault manager response agents can effect, but it should not be confused
190 * in response to that and other faults). It is, however, desirable to
231 * response agents can continue to retire those pages up to the system-imposed
305 response=0;
369 event fault.cpu.amd.dramchannel@chip/memory-controller/dram-channel, response=0;
H A Dgcpu.esc163 response=0, engine=serd.cpu.generic-x86.fltleaf@chip/core/strand;\
/illumos-gate/usr/src/cmd/fs.d/nfs/mountd/
H A Dmountd.c1801 int response; local
1832 response = 0;
1835 response = 1;
1868 return (response);
1881 return (response);
1908 return (response);
1913 return (response);
1919 return (response);
3186 * on the net blasting the requester with a response.
/illumos-gate/usr/src/lib/sasl_plugins/digestmd5/
H A Ddigestmd5.c325 * calculate request-digest/response-digest as per HTTP Digest spec
338 HASHHEX Response /* request-digest or response-digest */
365 /* calculate response */
2408 Response /* request-digest or response-digest */
2432 Response /* request-digest or response-digest */
2856 char *response = NULL; local
2904 * digest-response = 1#( username | realm | nonce | cnonce |
2905 * nonce-count | qop | digest-uri | response | maxbuf | charset |
2972 } else if (strcasecmp(name, "response") == 0) {
2973 _plug_strdup(sparams->utils, value, &response, NUL
3953 char *response = NULL; local
[all...]
/illumos-gate/usr/src/uts/common/io/fibre-channel/fca/emlxs/
H A Demlxs_sli4.c4039 wqe->CQId = (uint16_t)0xffff; /* default CQ for response */
4157 wqe->CQId = (uint16_t)0xffff; /* default CQ for response */
4309 wqe->CQId = (uint16_t)0xffff; /* default CQ for response */
4663 wqe->CQId = (uint16_t)0xffff; /* default CQ for response */
4890 wqe->CQId = (uint16_t)0xffff; /* default CQ for response */
6347 /* Try to send abort response */
6441 wqe->CQId = (uint16_t)0xffff; /* default CQ for response */
8398 hba->sli.sli4.eq[i].qid = eq->params.response.EQId;
8430 cq->params.response.CQId;
8478 wq->params.response
[all...]
H A Demlxs_download.c641 if ((phy->params.response.phy_type != PHY_TN_8022) ||
642 (phy->params.response.interface_type != BASET_10GB_TYPE)) {
646 phy->params.response.phy_type,
647 phy->params.response.interface_type);
658 phy->params.response.phy_type,
659 phy->params.response.interface_type);
1872 write_obj->params.response.actual_write_length,
1878 /* Check response length */
1879 if (write_obj->params.response.actual_write_length == 0) {
1886 if (write_obj->params.response
[all...]
/illumos-gate/usr/src/uts/common/io/scsi/adapters/iscsi/
H A Discsi_io.c49 if (((ICHK_HDR)->response == 0) && \
275 /* reset the session timer when we receive the response */
601 * iscsi_rx_process_login_pdup - Process login response PDU. This function
620 * this login response and we should just drop it.
641 * iscsi_rx_process_cmd_rsp - Process received scsi command response. This
700 * status info. If the response field indicates that
715 if (issrhp->response != 0) {
741 if (issrhp->response) {
744 " %p response: %d bcount: %lu", (void *)ic, (void *)pdu,
745 issrhp->response, icmd
[all...]
/illumos-gate/usr/src/cmd/krb5/krb5kdc/
H A Dkdc_preauth.c246 "sam-response",
1866 char response[9]; local
2026 sc.sam_response_prompt.data = "response prompt";
2132 gettext("snk4 response generation failed"));
2137 /* now output block is the raw bits of the response; convert it
2153 response[2*j+0] = '0' + n[1];
2154 response[2*j+1] = '0' + n[0];
2155 /* and now, response has what we work with. */
2157 response[8] = 0;
2158 predict_response.data = response;
[all...]
/illumos-gate/usr/src/uts/common/fs/sockfs/
H A Dnl7curi.c447 uri_rd_t *rdp = &uri->response;
483 * URI request/response processing.
928 ruri->response.sz = 0;
1071 * After response parse now no cache,
1101 * Called to sink application response data, the processing of the data
1103 * going to cache the URI but want to parse it for detecting response
1178 /* Successfull sink of data, response parse the data */
1192 * No more data needed and no pending response
1193 * data or current data count >= response length
1273 * Called to sink application response sendfile
[all...]
/illumos-gate/usr/src/cmd/ldap/common/
H A Dldapsearch.c817 gettext("Unsolicited response") );
819 fprintf( stderr, gettext("%s: ignoring LDAP response message"
/illumos-gate/usr/src/uts/common/io/ib/mgt/ibcm/
H A Dibcm_sm.c927 * generates REP/REJ response
928 * stores the response MAD in state structure for future re-sends
952 ibcm_status_t response; local
1241 response = ibcm_cep_state_req(statep, req_msgp,
1245 if (response == IBCM_DEFER) {
1247 "statep %0xp client returned DEFER response",
1253 ibcm_handle_cep_req_response(statep, response,
1276 * the REP/REJ response, and this REQ is an old MAD popping
1391 * Processes the response from ibcm_cep_state_req. Called holding a
1395 ibcm_handle_cep_req_response(ibcm_state_data_t *statep, ibcm_status_t response, argument
1442 ibcm_status_t response; local
1797 ibcm_handle_cep_rep_response(ibcm_state_data_t *statep, ibcm_status_t response, ibt_cm_reason_t reject_reason, uint8_t arej_info_len, ibcm_rep_msg_t *rep_msgp) argument
[all...]
/illumos-gate/usr/src/cmd/ls/
H A Dls.c374 static nvlist_t *response; variable
2538 &response)) != 0) {
2553 while ((pair = nvlist_next_nvpair(response, pair)) != NULL) {
2573 nvlist_free(response);
3203 nvlist_free(response);
/illumos-gate/usr/src/uts/common/io/myri10ge/drv/
H A Dmyri10ge.c1216 volatile mcp_cmd_response_t *response = mgp->cmd; local
1231 response->result = 0xffffffff;
1239 if (response->result != 0xffffffff) {
1240 if (response->result == 0) {
1241 data->data0 = ntohl(response->data);
1244 } else if (ntohl(response->result)
1248 } else if (ntohl(response->result)
1255 mgp->name, cmd, ntohl(response->result));
1264 mgp->name, cmd, ntohl(response->result));
1291 * response i
[all...]
/illumos-gate/usr/src/lib/libkmf/libkmf/common/
H A Dcertop.c1735 KMF_DATA *user_cert, KMF_DATA *issuer_cert, KMF_DATA *response,
1758 * Get the response lifetime from policy.
1768 * If ignore_response_sign is FALSE, we need to verify the response.
1871 * If the caller provides an OCSP response, we will use it directly.
1872 * Otherwise, we will try to fetch an OCSP response for the given
1875 if (response == NULL) {
1891 * Process the OCSP response and retrieve the certificate status.
1909 response == NULL ? new_response : response, sizeof (KMF_DATA));
1734 cert_ocsp_check(KMF_HANDLE_T handle, KMF_KEYSTORE_TYPE *kstype, KMF_DATA *user_cert, KMF_DATA *issuer_cert, KMF_DATA *response, char *slotlabel, char *dirpath) argument

Completed in 218 milliseconds

1234567