/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/nsswitch/ |
H A D | winbind_nss_aix.c | 269 struct winbindd_response response; local 276 ZERO_STRUCT(response); 281 ret = winbindd_request(WINBINDD_GETGRGID, &request, &response); 287 grp = fill_grent(&response.data.gr, response.extra_data); 289 free_response(&response); 297 struct winbindd_response response; local 308 ZERO_STRUCT(response); 313 ret = winbindd_request(WINBINDD_GETGRNAM, &request, &response); 317 grp = fill_grent(&response 344 struct winbindd_response response; local 396 struct winbindd_response response; local 425 struct winbindd_response response; local 461 struct winbindd_response response; local 509 struct winbindd_response response; local 595 struct winbindd_response response; local 810 struct winbindd_response response; local 858 struct winbindd_response response; local [all...] |
H A D | winbindd_sid.c | 57 fstrcpy(state->response.data.name.dom_name, dom_name); 58 fstrcpy(state->response.data.name.name, name); 60 state->response.data.name.type = type; 110 fstrcpy(state->response.data.sid.sid, sid_str); 111 state->response.data.sid.type = type; 169 if ( NT_STATUS_IS_OK(idmap_sid_to_uid(&sid, &(state->response.data.uid), ID_QUERY_ONLY)) ) 183 state->response.data.uid = pw->pw_uid; 195 result = idmap_sid_to_uid(&sid, &(state->response.data.uid), 217 result = idmap_sid_to_uid(&sid, &(state->response.data.uid), 0); 278 if ( NT_STATUS_IS_OK(idmap_sid_to_gid(&sid, &(state->response [all...] |
H A D | winbindd_group.c | 261 memcpy( &state->response.data.gr, grp, sizeof(WINBINDD_GR) ); 265 state->response.data.gr.gr_mem_ofs = 0; 266 state->response.length += gr_mem_len; 267 state->response.extra_data = buffer; /* give the memory away */ 317 if (!fill_grent(&state->response.data.gr, name_domain, 320 &state->response.data.gr.num_gr_mem, 327 state->response.data.gr.gr_mem_ofs = 0; 329 state->response.length += gr_mem_len; 330 state->response.extra_data = gr_mem; 361 memcpy( &state->response [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/printing/ |
H A D | print_cups.c | 59 *response = NULL; /* IPP Response */ local 117 * Do the request and get back a response... 120 if ((response = cupsDoRequest(http, request, "/")) == NULL) { 126 for (attr = response->attrs; attr != NULL;) { 168 ippDelete(response); 169 response = NULL; 197 * Do the request and get back a response... 200 if ((response = cupsDoRequest(http, request, "/")) == NULL) { 206 for (attr = response->attrs; attr != NULL;) { 251 if (response) 273 *response = NULL; /* IPP Response */ local 365 *response = NULL; /* IPP Response */ local 457 *response = NULL; /* IPP Response */ local 549 *response = NULL; /* IPP Response */ local 682 *response = NULL; /* IPP Response */ local 1006 *response = NULL; /* IPP Response */ local 1100 *response = NULL; /* IPP Response */ local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/firewire/ |
H A D | fw-cdev.c | 60 struct response { struct 65 struct fw_cdev_event_response response; member in struct:response 337 struct response *response = local 338 container_of(resource, struct response, resource); 340 fw_cancel_transaction(client->device->card, &response->transaction); 347 struct response *response = data; local 348 struct client *client = response->client; 351 if (length < response 372 struct response *response; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/isdn/gigaset/ |
H A D | i4l.c | 82 isdn_ctrl response; local 96 response.driver = bcs->cs->myid; 97 response.command = ISDN_STAT_BSENT; 98 response.arg = bcs->channel; 99 response.parm.length = len; 100 bcs->cs->iif.statcallb(&response); 112 //isdn_ctrl response; 454 isdn_ctrl response; local 458 response.parm.setup.si1 = 0; /* default: unknown */ 459 response [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/l2tpd-0.69/ |
H A D | aaa.h | 41 unsigned char response[MD_SIG_SIZE]; /* What we expect as a respsonse */ member in struct:challenge
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/read/ |
H A D | read_1.c | 37 char* response; local 52 response = malloc(msg_len); 64 err = smbc_read(fd,response,msg_len); 67 free(response);
|
H A D | read_12.c | 37 char* response; local 52 response = malloc(msg_len); 70 err = smbc_read(fd,response,msg_len); 80 free(response);
|
H A D | read_13.c | 37 char* response; local 52 response = malloc(msg_len); 76 err = smbc_read(fd,response,msg_len); 84 free(response);
|
H A D | read_2.c | 37 char* response; local 52 response = malloc(msg_len); 64 smbc_read(fd,response,msg_len); 68 free(response);
|
H A D | read_3.c | 37 char* response; local 52 response = malloc(msg_len); 64 err = smbc_read(fd,response,msg_len); 67 free(response);
|
H A D | read_5.c | 37 char* response; local 52 response = malloc(msg_len); 64 err = smbc_read(fd,response,msg_len); 67 free(response);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/ |
H A D | chap-new.h | 52 * Semi-arbitrary limits on challenge and response fields. 97 * Note: challenge and response arguments below are formatted as 98 * a length byte followed by the actual challenge/response data. 103 unsigned char *challenge, unsigned char *response, 105 void (*make_response)(unsigned char *response, int id, char *our_name, 117 unsigned char *challenge, unsigned char *response,
|
H A D | chap_ms.c | 34 * Implemented LANManager type password response to MS-CHAP challenges. 191 unsigned char *challenge, unsigned char *response, 199 response_len = *response++; 204 if (!response[MS_CHAP_USENT]) { 211 /* Generate the expected response. */ 215 /* Determine which part of response to verify against */ 216 if (!response[MS_CHAP_USENT]) 217 diff = memcmp(&response[MS_CHAP_LANMANRESP], 221 diff = memcmp(&response[MS_CHAP_NTRESP], &md[MS_CHAP_NTRESP], 239 unsigned char *challenge, unsigned char *response, 189 chapms_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 237 chapms2_verify_response(int id, char *name, unsigned char *secret, int secret_len, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 314 chapms_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 324 chapms2_make_response(unsigned char *response, int id, char *our_name, unsigned char *challenge, char *secret, int secret_len, unsigned char *private) argument 442 ChallengeResponse(u_char *challenge, u_char PasswordHash[MD4_SIGNATURE_SIZE], u_char response[24]) argument 567 ChapMS_LANMan(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument 814 ChapMS(u_char *rchallenge, char *secret, int secret_len, unsigned char *response) argument 847 ChapMS2(u_char *rchallenge, u_char *PeerChallenge, char *user, char *secret, int secret_len, unsigned char *response, u_char authResponse[], int authenticator) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/utils/ |
H A D | ntlm_auth.c | 97 struct winbindd_response response; local 104 ZERO_STRUCT(response); 108 if (winbindd_request(WINBINDD_INFO, NULL, &response) != 114 sep = response.data.info.winbind_separator; 127 struct winbindd_response response; local 134 ZERO_STRUCT(response); 138 if (winbindd_request(WINBINDD_DOMAIN_NAME, NULL, &response) != 144 fstrcpy(winbind_domain, response.data.domain_name); 152 struct winbindd_response response; local 160 ZERO_STRUCT(response); 211 struct winbindd_response response; local 254 struct winbindd_response response; local 315 struct winbindd_response response; local 792 SPNEGO_DATA request, response; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/include/rdma/ |
H A D | ib_user_verbs.h | 113 * length of the command block and response buffer if any in 32-bit 125 __u64 response; member in struct:ib_uverbs_get_context 135 __u64 response; member in struct:ib_uverbs_query_device 184 __u64 response; member in struct:ib_uverbs_query_port 214 __u64 response; member in struct:ib_uverbs_alloc_pd 227 __u64 response; member in struct:ib_uverbs_reg_mr 247 __u64 response; member in struct:ib_uverbs_create_comp_channel 255 __u64 response; member in struct:ib_uverbs_create_cq 270 __u64 response; member in struct:ib_uverbs_resize_cq 283 __u64 response; member in struct:ib_uverbs_poll_cq 318 __u64 response; member in struct:ib_uverbs_destroy_cq 387 __u64 response; member in struct:ib_uverbs_create_qp 436 __u64 response; member in struct:ib_uverbs_query_qp 510 __u64 response; member in struct:ib_uverbs_destroy_qp 560 __u64 response; member in struct:ib_uverbs_post_send 579 __u64 response; member in struct:ib_uverbs_post_recv 592 __u64 response; member in struct:ib_uverbs_post_srq_recv 605 __u64 response; member in struct:ib_uverbs_create_ah 637 __u64 response; member in struct:ib_uverbs_create_srq 662 __u64 response; member in struct:ib_uverbs_query_srq 676 __u64 response; member in struct:ib_uverbs_destroy_srq [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/smbd/ |
H A D | se_access_check_utils.c | 34 struct winbindd_response response; local 39 ZERO_STRUCT(response); 43 &response) != NSS_STATUS_SUCCESS) { 49 string_to_sid(sid, response.data.sid.sid); 51 response.data.sid.sid);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/s390/char/ |
H A D | vmcp.c | 41 session->response = NULL; 54 free_pages((unsigned long)session->response, get_order(session->bufsize)); 68 if (!session->response) { 79 if (copy_to_user(buff, session->response + (*ppos), tocopy)) { 110 if (!session->response) 111 session->response = (char *)__get_free_pages(GFP_KERNEL 114 if (!session->response) { 120 session->resp_size = cpcmd(cmd, session->response, 136 * VMCP_SETBUF: sets the response buffer for the next write call. diagnose 8 138 * dont know the size of the response [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/testsuite/libsmbclient/src/write/ |
H A D | write_12.c | 37 char* response; local 52 response = malloc(msg_len); 76 free(response);
|
H A D | write_13.c | 37 char* response; local 52 response = malloc(msg_len); 80 free(response);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/ |
H A D | rpc_echo.h | 38 uint32 response; member in struct:echo_r_add_one
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/ffmpeg-0.5.1/libavformat/ |
H A D | rdt.h | 48 * Calculate the response (RealChallenge2 in the RTSP header) to the 52 * @param response pointer to response buffer, it should be at least 41 bytes 54 * @param chksum pointer to buffer containing a checksum of the response, 59 void ff_rdt_calc_response_and_checksum(char response[41], char chksum[9],
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/papd/ |
H A D | print_cups.c | 100 *response; /* IPP Response */ local 154 * Do the request and get back a response... 157 if ((response = cupsDoRequest(http, request, "/")) == NULL) 167 if (response->request.status.status_code >= IPP_OK_CONFLICT) 170 ippErrorString(response->request.status.status_code)); 171 ippDelete(response); 176 ippDelete(response); 196 *response; /* IPP Response */ local 266 * Do the request and get back a response... 269 if ((response [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/papd/ |
H A D | print_cups.c | 100 *response; /* IPP Response */ local 154 * Do the request and get back a response... 157 if ((response = cupsDoRequest(http, request, "/")) == NULL) 167 if (response->request.status.status_code >= IPP_OK_CONFLICT) 170 ippErrorString(response->request.status.status_code)); 171 ippDelete(response); 176 ippDelete(response); 196 *response; /* IPP Response */ local 266 * Do the request and get back a response... 269 if ((response [all...] |