/osnet-11/usr/src/lib/libscf/common/ |
H A D | lowlevel.c | 675 * This makes a door request on the client door associated with handle h. 906 * server claimed bad request 1059 rep_protocol_request_t request; local 1065 request.rpr_request = REP_PROTOCOL_CLOSE; 1067 (void) make_door_call(handle, &request, sizeof (request), 1087 struct rep_protocol_entity_setup request; local 1101 request.rpr_request = REP_PROTOCOL_ENTITY_SETUP; 1102 request.rpr_entityid = dp->rd_entity; 1103 request 1130 struct rep_protocol_iter_request request; local 1187 repository_door_request_t request; local 1620 struct rep_protocol_entity_teardown request; local 1654 struct rep_protocol_entity_reset request; local 1705 struct rep_protocol_entity_name request; local 1742 struct rep_protocol_entity_parent request; local 1785 struct rep_protocol_iter_start request; local 1873 struct rep_protocol_entity_get_child request; local 1994 struct rep_protocol_entity_delete request; local 2035 struct rep_protocol_masked_request request; local 2089 struct rep_protocol_entity_create_child request; local 2174 struct rep_protocol_entity_create_pg request; local 2237 struct rep_protocol_entity_delete request; local 2265 struct rep_protocol_entity_delete request; local 2293 struct rep_protocol_entity_delete request; local 2330 struct rep_protocol_bundle_remove request; local 2378 struct rep_protocol_entity_request request; local 2461 struct rep_protocol_iter_request request; local 2489 struct rep_protocol_iter_request request; local 2516 struct rep_protocol_entity_get request; local 2630 struct rep_protocol_iter_start request; local 2674 struct rep_protocol_iter_start request; local 2722 struct rep_protocol_iter_read request; local 3225 struct rep_protocol_transaction_commit *request; local 3313 struct rep_protocol_transaction_commit *request; local 3709 struct rep_protocol_entity_pair request; local 3845 struct rep_protocol_entity_update request; local 3897 struct rep_protocol_propertygrp_request request; local 3941 struct rep_protocol_notify_request request; local 3978 struct rep_protocol_wait_request request; local 4039 struct rep_protocol_snapshot_take request; local 4080 struct rep_protocol_snapshot_take_named request; local 4142 struct rep_protocol_snapshot_attach request; local 4215 struct rep_protocol_property_request request; local 4285 struct rep_protocol_property_request request; local 4419 struct rep_protocol_decoration_request request; local 4451 struct rep_protocol_decoration_request request; local 4543 struct rep_protocol_transaction_start request; local 4916 struct rep_protocol_transaction_commit *request; local 5889 struct rep_protocol_iter_read_value request; local 5965 struct rep_protocol_property_request request; local 6033 struct rep_protocol_property_request request; local 6769 struct rep_protocol_entity_parent_type request; local 8274 struct rep_protocol_backup_request request; local 8317 struct rep_protocol_switch_request request; local 8380 struct rep_protocol_request request; local 8406 struct rep_protocol_request request; local 8433 struct rep_protocol_decoration request; local [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | mk_req_ext.c | 49 to form the request. 55 options are passed on in a request to an appropriate KDC. 100 krb5_ap_req request; local 104 request.ap_options = ap_req_options & AP_OPTS_WIRE_MASK; 105 request.authenticator.ciphertext.data = NULL; 106 request.ticket = 0; 116 if ((retval = decode_krb5_ticket(&(in_creds)->ticket, &request.ticket))) 231 scratch, &request.authenticator))) 234 if ((retval = encode_krb5_ap_req(&request, &toutbuf))) 238 KERBEROS_PROBE_KRB_AP_REQ(MAKE, toutbuf, &request, [all...] |
H A D | send_tgs.c | 38 Constructs a TGS request 63 krb5_ap_req request; local 68 request.authenticator.ciphertext.data = NULL; 69 request.authenticator.kvno = 0; 70 request.ap_options = 0; 71 request.ticket = 0; 114 if ((retval = decode_krb5_ticket(&(in_cred)->ticket, &request.ticket))) 121 scratch, &request.authenticator))) 124 if (!(retval = encode_krb5_ap_req(&request, &toutbuf))) { 129 memset(request [all...] |
H A D | preauth.c | 30 * kerberos kdc request, with various hardware/software verification devices. 122 krb5_error_code krb5_obtain_padata(krb5_context context, krb5_pa_data **preauth_to_use, git_key_proc key_proc, krb5_const_pointer key_seed, krb5_creds *creds, krb5_kdc_req *request) argument 164 enctype = request->ktype[0]; 179 if ((retval = krb5_principal2salt(context, request->client, &salt))) 198 request, send_pa); 210 request->padata = send_pa_list; 228 krb5_process_padata(krb5_context context, krb5_kdc_req *request, krb5_kdc_rep *as_reply, git_key_proc key_proc, krb5_const_pointer keyseed, git_decrypt_proc decrypt_proc, krb5_keyblock **decrypt_key, krb5_creds *creds, krb5_int32 *do_more) argument 246 retval = ((ops)->process)(context, *pa, request, as_reply, 265 obtain_enc_ts_padata(krb5_context context, krb5_pa_data *in_padata, krb5_etype_info etype_info, krb5_keyblock *def_enc_key, git_key_proc key_proc, krb5_const_pointer key_seed, krb5_creds *creds, krb5_kdc_req *request, krb5_pa_data **out_padata) argument 319 process_pw_salt(krb5_context context, krb5_pa_data *padata, krb5_kdc_req *request, krb5_kdc_re argument 357 sam_get_pass_from_user(krb5_context context, krb5_etype_info etype_info, git_key_proc key_proc, krb5_const_pointer key_seed, krb5_kdc_req *request, krb5_keyblock **new_enc_key, const char *prompt) argument 443 obtain_sam_padata(krb5_context context, krb5_pa_data *in_padata, krb5_etype_info etype_info, krb5_keyblock *def_enc_key, git_key_proc key_proc, krb5_const_pointer key_seed, krb5_creds *creds, krb5_kdc_req *request, krb5_pa_data **out_padata) argument [all...] |
H A D | init_creds_ctx.h | 22 krb5_kdc_req *request; member in struct:_krb5_init_creds_context
|
H A D | preauth2.c | 33 * kerberos kdc request, with various hardware/software verification devices. 59 krb5_kdc_req *request, 321 * function to give the plugin a chance to allocate a per-request context. */ 342 /* Free the per-AS-REQ context. This means clearing any request-specific 521 /* Tweak the request body, for now adding any enctypes which the module claims 527 krb5_kdc_req *request) 534 /* Add the module-specific enctype list to the request, but only if 541 grow_ktypes(&request->ktype, &request->nktypes, 554 krb5_kdc_req *request, 525 krb5_preauth_prepare_request(krb5_context kcontext, krb5_gic_opt_ext *opte, krb5_kdc_req *request) argument 552 run_preauth_plugins(krb5_context kcontext, int module_required_flags, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data *in_padata, krb5_prompter_fct prompter, void *prompter_data, preauth_get_as_key_proc gak_fct, krb5_data *salt, krb5_data *s2kparams, void *gak_data, krb5_preauth_client_rock *get_data_rock, krb5_keyblock *as_key, krb5_pa_data ***out_pa_list, int *out_pa_list_size, int *module_ret, int *module_flags, krb5_gic_opt_ext *opte) argument 651 pa_salt(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 672 pa_fx_cookie(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 696 pa_enc_timestamp(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 833 pa_sam(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 1085 pa_pkinit_gen_req(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 1259 pa_pkinit_parse_rep(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 1388 pa_sam_2(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 1714 pa_s4u_x509_user(krb5_context context, krb5_kdc_req *request, krb5_pa_data *in_padata, krb5_pa_data **out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data) argument 1822 krb5_do_preauth_tryagain(krb5_context kcontext, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data **padata, krb5_pa_data ***return_padata, krb5_error *err_reply, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data, krb5_preauth_client_rock *get_data_rock, krb5_gic_opt_ext *opte) argument 1893 krb5_do_preauth(krb5_context context, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data **in_padata, krb5_pa_data ***out_padata, krb5_data *salt, krb5_data *s2kparams, krb5_enctype *etype, krb5_keyblock *as_key, krb5_prompter_fct prompter, void *prompter_data, krb5_gic_get_as_key_fct gak_fct, void *gak_data, krb5_preauth_client_rock *get_data_rock, krb5_gic_opt_ext *opte) argument [all...] |
H A D | fast.c | 34 * It is possible to support sending a request that includes both a 45 * We store the outer version of the request to use . The caller 46 * stores the inner version. We handle the encoding of the request 47 * body (and request) and provide encoded request bodies for the 111 krb5_kdc_req *request, krb5_data **encoded_request_body) 118 return encode_krb5_kdc_req_body(request, encoded_request_body); 120 state->fast_outer_request = *request; 138 krb5_kdc_req *request) 145 target_realm = krb5_princ_realm(context, request 110 krb5int_fast_prep_req_body(krb5_context context, struct krb5int_fast_request_state *state, krb5_kdc_req *request, krb5_data **encoded_request_body) argument 135 krb5int_fast_as_armor(krb5_context context, struct krb5int_fast_request_state *state, krb5_gic_opt_ext *opte, krb5_kdc_req *request) argument 188 krb5int_fast_prep_req(krb5_context context, struct krb5int_fast_request_state *state, krb5_kdc_req *request, const krb5_data *to_be_checksummed, kdc_req_encoder_proc encoder, krb5_data **encoded_request) argument 563 krb5int_fast_verify_nego(krb5_context context, struct krb5int_fast_request_state *state, krb5_kdc_rep *rep, krb5_data *request, krb5_keyblock *decrypting_key, krb5_boolean *fast_avail) argument [all...] |
/osnet-11/usr/src/lib/fm/libfmd_snmp/common/ |
H A D | problem.c | 46 * not traversing the fault list for each request. 495 * to ASN.1 lexical ordering after the request in table_info. Indexes are 587 * Returns the problem data corresponding to the request in table_info. 588 * All request parameters are unmodified. 782 netsnmp_request_info *request; local 804 request = cache->requests; 808 table_info = netsnmp_extract_table_info(request); 809 request->delegated = 0; 819 * request. We have other guarantees as well: 848 (void) snmp_log(LOG_ERR, MODNAME_STR ": Unsupported request " 943 netsnmp_request_info *request; local 973 netsnmp_request_info *request; local 1170 netsnmp_request_info *request; local [all...] |
H A D | resource.c | 164 * we're not going to return for this request. 467 * - First, frob the request to set all the index variables to correspond 566 netsnmp_request_info *request; local 588 request = cache->requests; 592 table_info = netsnmp_extract_table_info(request); 593 request->delegated = 0; 603 * request. We have other guarantees as well: 632 (void) snmp_log(LOG_ERR, MODNAME_STR ": Unsupported request " 641 (void) netsnmp_table_build_result(reginfo, request, table_info, 661 (void) netsnmp_table_build_result(reginfo, request, table_inf 682 netsnmp_request_info *request; local 711 netsnmp_request_info *request; local [all...] |
H A D | module.c | 178 * we're not going to return for this request. 454 * - First, frob the request to set all the index variables to correspond 553 netsnmp_request_info *request; local 575 request = cache->requests; 579 table_info = netsnmp_extract_table_info(request); 580 request->delegated = 0; 590 * request. We have other guarantees as well: 619 (void) snmp_log(LOG_ERR, MODNAME_STR ": Unsupported request " 628 (void) netsnmp_table_build_result(reginfo, request, table_info, 633 (void) netsnmp_table_build_result(reginfo, request, table_inf 661 netsnmp_request_info *request; local [all...] |
/osnet-11/usr/src/lib/libwrap/ |
H A D | socket.c | 80 void sock_host(request) 81 struct request_info *request; 87 int fd = request->fd; 89 sock_methods(request); 102 request->sink = sock_sink; 114 request->client->sin = &client; 128 request->server->sin = &server;
|
/osnet-11/usr/src/cmd/hal/addons/network-devices/ |
H A D | snmp.c | 70 struct snmp_pdu *request = NULL, *response = NULL; local 91 /* initialize the request PDU */ 92 request = snmp_pdu_create(SNMP_MSG_GET); 97 snmp_add_null_var(request, Oid, oid_len); 99 snmp_async_send(ss, request, snmp_response_cb, NULL);
|
/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | attrat.c | 113 attr_nv_pack(nvlist_t *request, void **nv_request, size_t *nv_requestlen) argument 118 if (nvsize(request, &bufsize, NV_ENCODE_XDR) != 0) { 126 if (nvpacker(request, &packbuf, &bufsize, NV_ENCODE_XDR, 0) != 0) { 210 csetattr(int fd, nvlist_t *request) argument 220 if ((error = attr_nv_pack(request, &nv_request, &nv_requestlen)) != 0) 251 fsetattr(int basefd, xattr_view_t view, nvlist_t *request) argument 257 error = csetattr(xattrfd, request); 288 setattrat(int basefd, xattr_view_t view, const char *name, nvlist_t *request) argument 302 error = csetattr(xattrfd, request);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/include/ |
H A D | preauth_plugin.h | 123 * A client module's callback functions are allowed to request various 124 * information to enable it to process a request. 170 /* Per-request initialization/cleanup. The request_init function is 171 * called when beginning to process a get_init_creds request and the 172 * request_fini function is called when processing of the request is 199 krb5_kdc_req *request, 215 * of in_pa_data, then the client library will retransmit the request. */ 223 krb5_kdc_req *request, 281 /* Per-request initialization/cleanup. The request_init function is 282 * called when beginning to process a get_init_creds request an [all...] |
/osnet-11/usr/src/lib/udapl/udapl_tavor/common/ |
H A D | dapl_rmr_util.c | 93 IN DAT_COMPLETION_FLAGS request) 95 if ((mask & request) && !(mask & allow)) { 91 dapl_rmr_validate_completion_flag(IN DAT_COMPLETION_FLAGS mask, IN DAT_COMPLETION_FLAGS allow, IN DAT_COMPLETION_FLAGS request) argument
|
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_clnt.c | 74 krb5_kdc_req *request, const krb5_data *as_rep, 83 krb5_kdc_req * request, 104 request->kdc_options, request->till); 106 if (request->client == NULL) { 107 pkiDebug("No request->client; aborting PKINIT\n"); 112 reqctx->idctx, request->server); 119 retval = k5int_encode_krb5_kdc_req_body(request, &der_req); 143 nonce = request->nonce; 146 nonce, &cksum, request 80 pa_pkinit_gen_req(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_kdc_req * request, krb5_pa_data * in_padata, krb5_pa_data *** out_padata, krb5_prompter_fct prompter, void *prompter_data, krb5_get_init_creds_opt *gic_opt) argument 460 pa_pkinit_parse_rep(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_kdc_req * request, krb5_pa_data * in_padata, krb5_enctype etype, krb5_keyblock * as_key, krb5_data *encoded_request) argument 654 pkinit_as_rep_parse(krb5_context context, pkinit_context plgctx, pkinit_req_context reqctx, krb5_preauthtype pa_type, krb5_kdc_req *request, const krb5_data *as_rep, krb5_keyblock *key_block, krb5_enctype etype, krb5_data *encoded_request) argument 982 pkinit_client_process(krb5_context context, void *plugin_context, void *request_context, krb5_get_init_creds_opt *gic_opt, preauth_get_client_data_proc get_data_proc, struct _krb5_preauth_client_rock *rock, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data *in_padata, krb5_prompter_fct prompter, void *prompter_data, preauth_get_as_key_proc gak_fct, void *gak_data, krb5_data *salt, krb5_data *s2kparams, krb5_keyblock *as_key, krb5_pa_data ***out_padata) argument 1097 pkinit_client_tryagain(krb5_context context, void *plugin_context, void *request_context, krb5_get_init_creds_opt *gic_opt, preauth_get_client_data_proc get_data_proc, struct _krb5_preauth_client_rock *rock, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data *in_padata, krb5_error *err_reply, krb5_prompter_fct prompter, void *prompter_data, preauth_get_as_key_proc gak_fct, void *gak_data, krb5_data *salt, krb5_data *s2kparams, krb5_keyblock *as_key, krb5_pa_data ***out_padata) argument [all...] |
H A D | pkinit_srv.c | 107 krb5_kdc_req * request, 121 retval = fast_kdc_get_armor_key(context, server_get_entry_data, request, 134 request->server); 299 krb5_kdc_req * request, 331 retval = fast_kdc_get_armor_key(context, server_get_entry_data, request, 343 request->server); 350 /* create a per-request context */ 412 retval = verify_client_san(context, plgctx, reqctx, request->client, 433 if (!krb5_principal_compare(context, request->client, 436 krb5_set_error_message(context, retval, "Pkinit request no 106 pkinit_server_get_edata(krb5_context context, krb5_kdc_req * request, struct _krb5_db_entry_new * client, struct _krb5_db_entry_new * server, preauth_get_entry_data_proc server_get_entry_data, void *pa_plugin_context, krb5_pa_data * data) argument 296 pkinit_server_verify_padata(krb5_context context, struct _krb5_db_entry_new * client, krb5_data *req_pkt, krb5_kdc_req * request, krb5_enc_tkt_part * enc_tkt_reply, krb5_pa_data * data, preauth_get_entry_data_proc server_get_entry_data, void *pa_plugin_context, void **pa_request_context, krb5_data **e_data, krb5_authdata ***authz_data) argument 606 return_pkinit_kx(krb5_context context, krb5_kdc_req *request, krb5_kdc_rep *reply, krb5_keyblock *encrypting_key, krb5_pa_data **out_padata) argument 667 pkinit_server_return_padata(krb5_context context, krb5_pa_data * padata, struct _krb5_db_entry_new * client, krb5_data *req_pkt, krb5_kdc_req * request, krb5_kdc_rep * reply, struct _krb5_key_data * client_key, krb5_keyblock * encrypting_key, krb5_pa_data ** send_pa, preauth_get_entry_data_proc server_get_entry_data, void *pa_plugin_context, void **pa_request_context) argument [all...] |
/osnet-11/usr/src/lib/krb5/plugins/preauth/encrypted_challenge/ |
H A D | encrypted_challenge_main.c | 51 struct _krb5_preauth_client_rock *rock, krb5_kdc_req *request, 74 retval = gak_fct(context, request->client, 178 kdc_include_padata(krb5_context context, krb5_kdc_req *request, argument 186 retval = fast_kdc_get_armor_key(context, get_entry_proc, request, client, &armor_key); 197 krb5_data *req_pkt, krb5_kdc_req *request, 219 retval = fast_kdc_get_armor_key(context, get_entry_proc, request, client, &armor_key); 236 retval = get_entry_proc(context, request, client, 282 fast_kdc_replace_reply_key(context, get_entry_proc, request); 309 krb5_kdc_req *request, krb5_kdc_rep *reply, 393 NULL, /* request ini 48 process_preauth(krb5_context context, void *plugin_context, void *request_context, krb5_get_init_creds_opt *opt, preauth_get_client_data_proc get_data_proc, struct _krb5_preauth_client_rock *rock, krb5_kdc_req *request, krb5_data *encoded_request_body, krb5_data *encoded_previous_request, krb5_pa_data *padata, krb5_prompter_fct prompter, void *prompter_data, preauth_get_as_key_proc gak_fct, void *gak_data, krb5_data *salt, krb5_data *s2kparams, krb5_keyblock *as_key, krb5_pa_data ***out_padata) argument 196 kdc_verify_preauth(krb5_context context, struct _krb5_db_entry_new *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_enc_tkt_part *enc_tkt_reply, krb5_pa_data *data, preauth_get_entry_data_proc get_entry_proc, void *pa_module_context, void **pa_request_context, krb5_data **e_data, krb5_authdata ***authz_data) argument 307 kdc_return_preauth(krb5_context context, krb5_pa_data *padata, struct _krb5_db_entry_new *client, krb5_data *req_pkt, krb5_kdc_req *request, krb5_kdc_rep *reply, struct _krb5_key_data *client_keys, krb5_keyblock *encrypting_key, krb5_pa_data **send_pa, preauth_get_entry_data_proc get_entry_proc, void *pa_module_context, void **pa_request_context) argument [all...] |
/osnet-11/usr/src/lib/krb5/ss/ |
H A D | listen.c | 67 ss_request_entry *request; local 74 for (request = (*table)->requests; 75 request->command_names != NULL; request++) { 76 for (cmd = request->command_names; 295 "Unknown request \"%s\". Type \"?\" for a request list."),
|
/osnet-11/usr/src/lib/libradproto/common/ |
H A D | protocol.x | 38 * We programmatically impose an limit on the request size, but it is 39 * still possible for the XDR-encoded content of a request to deny 174 struct request {
|
/osnet-11/usr/src/lib/libadm/common/ |
H A D | pkginfo.c | 68 * instance available which matches the request will be returned 110 /* request to check indicated instance */ 367 /* request to close or rewind the file */ 470 verscmp(char *request, char *actual) argument 475 while (isspace((unsigned char)*request)) 476 request++; 478 while (*request || *actual) { 483 if (*request++ != *actual++) 487 if (isspace((unsigned char)*request)) { 490 while (isspace((unsigned char)*request)) [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/bus/usb/emu/ |
H A D | usb.c | 117 grub_uint8_t request, grub_uint16_t value, 124 if (usb_control_msg (devh, reqtype, request, 114 grub_usb_control_msg(grub_usb_device_t dev, grub_uint8_t reqtype, grub_uint8_t request, grub_uint16_t value, grub_uint16_t idx, grub_size_t size, char *data) argument
|
/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_kmod.c | 183 * Initialization for an smb_kmod_enum request. If this call succeeds, 187 smb_kmod_enum_init(smb_svcenum_t *request) argument 205 svcenum->se_type = request->se_type; 206 svcenum->se_level = request->se_level; 208 svcenum->se_nlimit = request->se_nlimit; 209 svcenum->se_nskip = request->se_nskip; 212 request->se_qualifier.seq_qualstr, 214 svcenum->se_qualifier.seq_mode = request->se_qualifier.seq_mode;
|
/osnet-11/usr/src/lib/libntfs/common/libntfs/ |
H A D | unix_io.c | 294 * @request: 301 static int ntfs_device_unix_io_ioctl(struct ntfs_device *dev, int request, argument 304 return ioctl(DEV_FD(dev), request, argp);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/include/krb5/ |
H A D | authdata_plugin.h | 109 krb5_kdc_req *request, 158 krb5_kdc_req *request,
|