Searched refs:response (Results 26 - 50 of 176) sorted by relevance

12345678

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/nsswitch/
H A Dwinbind_nss_aix.c269 struct winbindd_response response; local
276 ZERO_STRUCT(response);
281 ret = winbindd_request(WINBINDD_GETGRGID, &request, &response);
287 grp = fill_grent(&response.data.gr, response.extra_data);
289 free_response(&response);
297 struct winbindd_response response; local
308 ZERO_STRUCT(response);
313 ret = winbindd_request(WINBINDD_GETGRNAM, &request, &response);
317 grp = fill_grent(&response
344 struct winbindd_response response; local
396 struct winbindd_response response; local
425 struct winbindd_response response; local
461 struct winbindd_response response; local
509 struct winbindd_response response; local
595 struct winbindd_response response; local
810 struct winbindd_response response; local
858 struct winbindd_response response; local
[all...]
H A Dwinbindd_sid.c57 fstrcpy(state->response.data.name.dom_name, dom_name);
58 fstrcpy(state->response.data.name.name, name);
60 state->response.data.name.type = type;
110 fstrcpy(state->response.data.sid.sid, sid_str);
111 state->response.data.sid.type = type;
169 if ( NT_STATUS_IS_OK(idmap_sid_to_uid(&sid, &(state->response.data.uid), ID_QUERY_ONLY)) )
183 state->response.data.uid = pw->pw_uid;
195 result = idmap_sid_to_uid(&sid, &(state->response.data.uid),
217 result = idmap_sid_to_uid(&sid, &(state->response.data.uid), 0);
278 if ( NT_STATUS_IS_OK(idmap_sid_to_gid(&sid, &(state->response
[all...]
H A Dwinbindd_group.c261 memcpy( &state->response.data.gr, grp, sizeof(WINBINDD_GR) );
265 state->response.data.gr.gr_mem_ofs = 0;
266 state->response.length += gr_mem_len;
267 state->response.extra_data = buffer; /* give the memory away */
317 if (!fill_grent(&state->response.data.gr, name_domain,
320 &state->response.data.gr.num_gr_mem,
327 state->response.data.gr.gr_mem_ofs = 0;
329 state->response.length += gr_mem_len;
330 state->response.extra_data = gr_mem;
361 memcpy( &state->response
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/printing/
H A Dprint_cups.c59 *response = NULL; /* IPP Response */ local
117 * Do the request and get back a response...
120 if ((response = cupsDoRequest(http, request, "/")) == NULL) {
126 for (attr = response->attrs; attr != NULL;) {
168 ippDelete(response);
169 response = NULL;
197 * Do the request and get back a response...
200 if ((response = cupsDoRequest(http, request, "/")) == NULL) {
206 for (attr = response->attrs; attr != NULL;) {
251 if (response)
273 *response = NULL; /* IPP Response */ local
365 *response = NULL; /* IPP Response */ local
457 *response = NULL; /* IPP Response */ local
549 *response = NULL; /* IPP Response */ local
682 *response = NULL; /* IPP Response */ local
1006 *response = NULL; /* IPP Response */ local
1100 *response = NULL; /* IPP Response */ local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/firewire/
H A Dfw-cdev.c60 struct response { struct
65 struct fw_cdev_event_response response; member in struct:response
337 struct response *response = local
338 container_of(resource, struct response, resource);
340 fw_cancel_transaction(client->device->card, &response->transaction);
347 struct response *response = data; local
348 struct client *client = response->client;
351 if (length < response
372 struct response *response; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/isdn/gigaset/
H A Di4l.c82 isdn_ctrl response; local
96 response.driver = bcs->cs->myid;
97 response.command = ISDN_STAT_BSENT;
98 response.arg = bcs->channel;
99 response.parm.length = len;
100 bcs->cs->iif.statcallb(&response);
112 //isdn_ctrl response;
454 isdn_ctrl response; local
458 response.parm.setup.si1 = 0; /* default: unknown */
459 response
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/l2tpd-0.69/
H A Daaa.h41 unsigned char response[MD_SIG_SIZE]; /* What we expect as a respsonse */ member in struct:challenge
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/read/
H A Dread_1.c37 char* response; local
52 response = malloc(msg_len);
64 err = smbc_read(fd,response,msg_len);
67 free(response);
H A Dread_12.c37 char* response; local
52 response = malloc(msg_len);
70 err = smbc_read(fd,response,msg_len);
80 free(response);
H A Dread_13.c37 char* response; local
52 response = malloc(msg_len);
76 err = smbc_read(fd,response,msg_len);
84 free(response);
H A Dread_2.c37 char* response; local
52 response = malloc(msg_len);
64 smbc_read(fd,response,msg_len);
68 free(response);
H A Dread_3.c37 char* response; local
52 response = malloc(msg_len);
64 err = smbc_read(fd,response,msg_len);
67 free(response);
H A Dread_5.c37 char* response; local
52 response = malloc(msg_len);
64 err = smbc_read(fd,response,msg_len);
67 free(response);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/
H A Dchap-new.h52 * Semi-arbitrary limits on challenge and response fields.
97 * Note: challenge and response arguments below are formatted as
98 * a length byte followed by the actual challenge/response data.
103 unsigned char *challenge, unsigned char *response,
105 void (*make_response)(unsigned char *response, int id, char *our_name,
117 unsigned char *challenge, unsigned char *response,
H A Dchap_ms.c34 * Implemented LANManager type password response to MS-CHAP challenges.
191 unsigned char *challenge, unsigned char *response,
199 response_len = *response++;
204 if (!response[MS_CHAP_USENT]) {
211 /* Generate the expected response. */
215 /* Determine which part of response to verify against */
216 if (!response[MS_CHAP_USENT])
217 diff = memcmp(&response[MS_CHAP_LANMANRESP],
221 diff = memcmp(&response[MS_CHAP_NTRESP], &md[MS_CHAP_NTRESP],
239 unsigned char *challenge, unsigned char *response,
189 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
237 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
314 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
324 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument
442 ChallengeResponse(u_char *challenge, u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument
567 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument
814 ChapMS(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument
847 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/utils/
H A Dntlm_auth.c97 struct winbindd_response response; local
104 ZERO_STRUCT(response);
108 if (winbindd_request(WINBINDD_INFO, NULL, &response) !=
114 sep = response.data.info.winbind_separator;
127 struct winbindd_response response; local
134 ZERO_STRUCT(response);
138 if (winbindd_request(WINBINDD_DOMAIN_NAME, NULL, &response) !=
144 fstrcpy(winbind_domain, response.data.domain_name);
152 struct winbindd_response response; local
160 ZERO_STRUCT(response);
211 struct winbindd_response response; local
254 struct winbindd_response response; local
315 struct winbindd_response response; local
792 SPNEGO_DATA request, response; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/include/rdma/
H A Dib_user_verbs.h113 * length of the command block and response buffer if any in 32-bit
125 __u64 response; member in struct:ib_uverbs_get_context
135 __u64 response; member in struct:ib_uverbs_query_device
184 __u64 response; member in struct:ib_uverbs_query_port
214 __u64 response; member in struct:ib_uverbs_alloc_pd
227 __u64 response; member in struct:ib_uverbs_reg_mr
247 __u64 response; member in struct:ib_uverbs_create_comp_channel
255 __u64 response; member in struct:ib_uverbs_create_cq
270 __u64 response; member in struct:ib_uverbs_resize_cq
283 __u64 response; member in struct:ib_uverbs_poll_cq
318 __u64 response; member in struct:ib_uverbs_destroy_cq
387 __u64 response; member in struct:ib_uverbs_create_qp
436 __u64 response; member in struct:ib_uverbs_query_qp
510 __u64 response; member in struct:ib_uverbs_destroy_qp
560 __u64 response; member in struct:ib_uverbs_post_send
579 __u64 response; member in struct:ib_uverbs_post_recv
592 __u64 response; member in struct:ib_uverbs_post_srq_recv
605 __u64 response; member in struct:ib_uverbs_create_ah
637 __u64 response; member in struct:ib_uverbs_create_srq
662 __u64 response; member in struct:ib_uverbs_query_srq
676 __u64 response; member in struct:ib_uverbs_destroy_srq
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/smbd/
H A Dse_access_check_utils.c34 struct winbindd_response response; local
39 ZERO_STRUCT(response);
43 &response) != NSS_STATUS_SUCCESS) {
49 string_to_sid(sid, response.data.sid.sid);
51 response.data.sid.sid);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/s390/char/
H A Dvmcp.c41 session->response = NULL;
54 free_pages((unsigned long)session->response, get_order(session->bufsize));
68 if (!session->response) {
79 if (copy_to_user(buff, session->response + (*ppos), tocopy)) {
110 if (!session->response)
111 session->response = (char *)__get_free_pages(GFP_KERNEL
114 if (!session->response) {
120 session->resp_size = cpcmd(cmd, session->response,
136 * VMCP_SETBUF: sets the response buffer for the next write call. diagnose 8
138 * dont know the size of the response
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/write/
H A Dwrite_12.c37 char* response; local
52 response = malloc(msg_len);
76 free(response);
H A Dwrite_13.c37 char* response; local
52 response = malloc(msg_len);
80 free(response);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/
H A Drpc_echo.h38 uint32 response; member in struct:echo_r_add_one
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/ffmpeg-0.5.1/libavformat/
H A Drdt.h48 * Calculate the response (RealChallenge2 in the RTSP header) to the
52 * @param response pointer to response buffer, it should be at least 41 bytes
54 * @param chksum pointer to buffer containing a checksum of the response,
59 void ff_rdt_calc_response_and_checksum(char response[41], char chksum[9],
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/papd/
H A Dprint_cups.c100 *response; /* IPP Response */ local
154 * Do the request and get back a response...
157 if ((response = cupsDoRequest(http, request, "/")) == NULL)
167 if (response->request.status.status_code >= IPP_OK_CONFLICT)
170 ippErrorString(response->request.status.status_code));
171 ippDelete(response);
176 ippDelete(response);
196 *response; /* IPP Response */ local
266 * Do the request and get back a response...
269 if ((response
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/papd/
H A Dprint_cups.c100 *response; /* IPP Response */ local
154 * Do the request and get back a response...
157 if ((response = cupsDoRequest(http, request, "/")) == NULL)
167 if (response->request.status.status_code >= IPP_OK_CONFLICT)
170 ippErrorString(response->request.status.status_code));
171 ippDelete(response);
176 ippDelete(response);
196 *response; /* IPP Response */ local
266 * Do the request and get back a response...
269 if ((response
[all...]

Completed in 401 milliseconds

12345678