P <update> Command ......................38
3. Result Codes .............................................. tains the following elements:
- One or more <result> elements that document the success or failure
... mmand was processed successfully,
only one <result> element MUST be returned. If the command was
not processed successfully, multiple <result> elements MAY be
returned to document failu
models. The interactions between
models could result in incompatibilities, security "holes", and other... n an SNMP Response PDU to the PDU Dispatcher:
result = -- SUCCESS or FAILURE
... preparing an outgoing SNMP Response Message:
result = -- SUCCESS or FAILURE
... data elements from an incoming SNMP message:
result = -- SUCCESS or errorIndi
datagram independently of other datagrams. As a result,
redundant paths can be exploited t... have full routing knowledge and as a result will be able
to make more optimal r... e problems are being addressed, and
as a result there will be continuing evolution of the
... bvious and simple, lest untoward
effects result elsewhere. A corollary of this is "watch out
nce
requests across multiple servers.
As a result, a server MUST NOT assume that two requests on th... TTP
component MAY perform normalization. As a result, distinct resources
SHOULD NOT be identified b... nse to POST might represent either the processing result or
the new state of the target resource after ... ow the message was received, such that the end
result is ordered according to the sequence of forwardin
consistently regardless
of context, though the result of that interpretation may be in
relation to t... l systems are designed to be
late-binding: the result of an access is generally determined when it
i... re: what is being identified is not some specific result that was
obtained in the past, but rather some... his does not
imply that use of these URIs will result in access to the resource
via the named protoc
he secure hash
function once and comparing the result with the previously accepted
one-time password... ret
pass-phrases by changing the seed.
The result of the concatenation is passed through the secure... through the secure hash
function once. If the result of this operation matches the stored
previous ... ference [2])
MD4_CTX md;
unsigned char result[16];
strcpy(buf, seed); /* seed must be
RP, and then back down the shared
tree may result in the packets traveling a relatively long
... ards RP that was used
Local membership is the result of the local membership mechanism
(such as IGM... tion 4.1.5.
PIM (*,G) Join/Prune state is the result of receiving PIM (*,G)
Join/Prune messages on ... nt upstream.
(*,G) Assert Winner state is the result of sending or receiving (*,G)
Assert messages
igest algorithm (see Section
5.4), and the result becomes the "message digest."
2. For each si... digital
signature.
signature is the result of digital signature generation, using the
... thm, not the tag
or the length octets.
The result of the message digest calculation process depends... eld is present. When the field is absent,
the result is just the message digest of the content as desc
.......... 177
16.7 Events generated as a result of routing table changes 177
16.8 Equal-... bility mismatch with a neighbor in this case will result in
only a subset of the link state database bein... onverge, some temporary
loss of connectivity may result. This may result in ICMP
unreachable messages being sent in response to data traffic.
For that reason,
any modification of the email, however
minor, result in a signature verification failure. These Signe... convenient to the Verifier, provided that the
result is semantically identical to the semantics that w... t verifies successfully or produces a TEMPFAIL
result, output of the DKIM algorithm MUST include the se... taken from the "d=" signature tag; and
o The result of the verification attempt for that signature.
f a server wishes to respond that it has an empty result set (that
is, no data appropriately satisfying... sms to gate access
to registration data. As a result of this, proxy and privacy
services have arise... 7480]. Failure to use these
limitations could result in slower adoption as these limitations have
b... re implementers, and
failure to use them could result in slower adoption of extensions.
Example rda
a new 32-bit ISN. There are security issues that result if
an off-path attacker is able to predict or ... connection has reached SYN-RECEIVED state as the result of a passive
OPEN or an active OPEN (MUST-11).... the
user at site B to send any data on it will result in the site B TCP
endpoint receiving a reset c... rom the beginning or from a recovery point. As a result, A
will probably try to OPEN the connection ag
surances of licenses to be made available, or the result of an
attempt made to obtain a general license... e implementations to tear down sessions as the
result of resource constraints, for example.
The dec... cache is Message-Processing-Model-specific.
result = -- SUCCESS or errorIndica... t compromise of long-term secret keys
does not result in disclosure of past session keys. Each propose
payloads for the deleted SAs,
since that would result in duplicate deletion and could in theory
dele... to zero. When the IKE_SA_INIT exchange does not result in the
creation of an IKE SA due to INVALID_KE... uest. In some situations, however, this
could result in packets unnecessarily being dropped, so an
... initiate a rekeying at the same time (which will result in
redundant SAs). To reduce the probability
need for general purpose name
service.
The result was several ideas about name spaces and their man... , but should
understand that they usually are the result of numerous compromises
between desires for upwar... d to use domain names.
The following syntax will result in fewer problems with many
applications that use... with the error conditions and referrals that may
result. Of course, the possible questions which can be