/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/s390/scsi/ |
H A D | zfcp_dbf.c | 145 struct zfcp_hba_dbf_record_response *response = &rec->type.response; local 175 response->fsf_command = fsf_req->fsf_command; 176 response->fsf_reqid = (unsigned long)fsf_req; 177 response->fsf_seqno = fsf_req->seq_no; 178 response->fsf_issued = fsf_req->issued; 179 response->fsf_prot_status = qtcb->prefix.prot_status; 180 response->fsf_status = qtcb->header.fsf_status; 181 memcpy(response->fsf_prot_status_qual, 183 memcpy(response [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/isdn/sc/ |
H A D | packet.c | 111 if (!(skb = dev_alloc_skb(rcvmsg->msg_data.response.msg_len))) { 116 skb_put(skb, rcvmsg->msg_data.response.msg_len); 119 rcvmsg->msg_data.response.buff_offset); 121 skb_put(skb, rcvmsg->msg_data.response.msg_len), 122 (char *)rcvmsg->msg_data.response.buff_offset, 123 rcvmsg->msg_data.response.msg_len); 133 /* memset_shmem(card, rcvmsg->msg_data.response.buff_offset, 0, BUFFER_SIZE); */ 134 newll.buff_offset = rcvmsg->msg_data.response.buff_offset;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpcclient/ |
H A D | cmd_echo.c | 28 uint32 request = 1, response; local 39 result = cli_echo_add_one(cli, mem_ctx, request, &response); 44 printf("%d + 1 = %d\n", request, response);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/plugins/ |
H A D | winbind.c | 101 unsigned char *response, 367 fprintf(pipe_in, "LANMAN-response: %s\n", lm_hex_hash); 377 fprintf(pipe_in, "NT-response: %s\n", nt_hex_hash); 476 * msgp -- Message which will be sent in PAP response 514 unsigned char *response, 526 response_len = *response++; 559 /* Determine which part of response to verify against */ 560 if (response[MS_CHAP_USENT]) { 561 nt_response = &response[MS_CHAP_NTRESP]; 565 lm_response = &response[MS_CHAP_LANMANRES 511 winbind_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/firewire/ |
H A D | fw-transaction.c | 429 struct fw_packet response; member in struct:fw_request 442 request = container_of(packet, struct fw_request, response); 447 fw_fill_response(struct fw_packet *response, u32 *request_header, argument 458 response->header[0] = 462 response->header[1] = 465 response->header[2] = 0; 470 response->header[0] |= HEADER_TCODE(TCODE_WRITE_RESPONSE); 471 response->header_length = 12; 472 response->payload_length = 0; 476 response [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/nsswitch/ |
H A D | pam_winbind.c | 66 struct pam_response **response) 74 response, conv->appdata_ptr); 103 struct winbindd_response *response) 116 if (read_reply(response) == -1) { 126 if (response->result != WINBINDD_OK) { 127 if (response->data.auth.pam_error != PAM_SUCCESS) { 129 response->data.auth.error_string, 130 response->data.auth.pam_error, 131 response->data.auth.nt_status_string); 132 return response 64 converse(pam_handle_t *pamh, int nargs, struct pam_message **message, struct pam_response **response) argument 101 pam_winbind_request(enum winbindd_cmd req_type, struct winbindd_request *request, struct winbindd_response *response) argument 142 pam_winbind_request_log(enum winbindd_cmd req_type, struct winbindd_request *request, struct winbindd_response *response, int ctrl, const char *user) argument 202 struct winbindd_response response; local 249 struct winbindd_response response; local [all...] |
H A D | winbindd.c | 307 /* Free response data - we may be interrupted and receive another 310 SAFE_FREE(state->response.extra_data); 312 ZERO_STRUCT(state->response); 314 state->response.result = WINBINDD_ERROR; 315 state->response.length = sizeof(struct winbindd_response); 322 state->response.result = table->fn(state); 332 if (!state->response.extra_data) 333 state->response.length = sizeof(struct winbindd_response); 395 SAFE_FREE(state->response.extra_data); 507 /* Write response structur [all...] |
H A D | winbindd_user.c | 141 memcpy( &state->response.data.pw, pw, sizeof(WINBINDD_PW) ); 193 &state->response.data.pw)) { 230 memcpy( &state->response.data.pw, pw, sizeof(WINBINDD_PW) ); 290 user_info.full_name, &state->response.data.pw)) { 497 if ((state->response.extra_data = SMB_MALLOC_ARRAY(struct winbindd_pw, num_users)) == NULL) 500 memset(state->response.extra_data, 0, num_users * 503 user_list = (struct winbindd_pw *)state->response.extra_data; 560 state->response.data.num_entries++; 561 state->response.length += 652 /* Assign extra_data fields in response structur [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpc_client/ |
H A D | cli_echo.c | 26 uint32 request, uint32 *response) 54 /* Unmarshall response */ 59 if (response) 60 *response = r.response; 100 /* Unmarshall response */ 149 /* Unmarshall response */ 194 /* Unmarshall response */ 25 cli_echo_add_one(struct cli_state *cli, TALLOC_CTX *mem_ctx, uint32 request, uint32 *response) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/web/ |
H A D | diagnose.c | 28 struct winbindd_response *response); 39 response */
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/ocfs2/ |
H A D | vote.c | 113 int n_response; /* an agreggate response. 0 if 115 * negative response from any 152 struct ocfs2_response_msg response; local 186 memset(&response, 0, sizeof(struct ocfs2_response_msg)); 187 response.r_hdr.h_response_id = hdr->h_response_id; 188 response.r_hdr.h_blkno = hdr->h_blkno; 189 response.r_hdr.h_generation = hdr->h_generation; 190 response.r_hdr.h_node_num = cpu_to_be32(osb->node_num); 191 response.r_response = cpu_to_be32(vote_response); 195 &response, 383 ocfs2_broadcast_vote(struct ocfs2_super *osb, struct ocfs2_vote_msg *request, unsigned int response_id, int *response, struct ocfs2_net_response_cb *callback) argument 492 int status, response = -EBUSY; local 595 ocfs2_translate_response(int response) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/net/wireless/prism54/ |
H A D | oid_mgt.c | 423 struct islpci_mgmtframe *response = NULL; local 457 _data, dlen, &response); 459 response_op = response->header->operation; 460 islpci_mgt_release(response); 485 struct islpci_mgmtframe *response; local 499 data, dlen + extra_len, &response); 501 response_op = response->header->operation; 502 islpci_mgt_release(response); 523 struct islpci_mgmtframe *response = NULL; local 549 oid, data, dlen, &response); 597 struct islpci_mgmtframe *response; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/s390/kernel/ |
H A D | early.c | 40 int response; local 89 __cpcmd(defsys_cmd, NULL, 0, &response); 91 if (response != 0) 94 __cpcmd(savesys_cmd, NULL, 0, &response); 96 if (response != strlen(savesys_cmd))
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/busybox-1.x/networking/ |
H A D | ftpgetput.c | 34 bb_error_msg_and_die("unexpected server response%s%s: %.*s", 231 int response; local 246 response = ftpcmd(buf, NULL, control_stream, buf); 247 switch (response) { 257 response = ftpcmd("STOR", server_path, control_stream, buf); 258 switch (response) {
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/include/rdma/ |
H A D | ib_user_cm.h | 77 __u64 response; member in struct:ib_ucm_create_id 85 __u64 response; member in struct:ib_ucm_destroy_id 95 __u64 response; member in struct:ib_ucm_attr_id 108 __u64 response; member in struct:ib_ucm_init_qp_attr 225 __u64 response; member in struct:ib_ucm_event_get
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/rxrpc/ |
H A D | rxkad.c | 623 * send a Kerberos security response 673 * calculate the response checksum 675 static void rxkad_calc_response_checksum(struct rxkad_response *response) argument 679 u8 *p = (u8 *) response; 681 for (loop = sizeof(*response); loop > 0; loop--) 684 response->encrypted.checksum = htonl(csum); 707 * encrypt the response packet 778 /* build the response packet */ 798 /* calculate the response checksum and then do the encryption */ 810 * decrypt the kerberos IV ticket in the response 997 struct rxkad_response response local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/s390/cio/ |
H A D | chsc.c | 38 struct chsc_header response; member in struct:chsc_ssd_area 73 /* Check response. */ 78 if (ssd_area->response.code != 0x0001) { 81 ssd_area->response.code); 345 struct chsc_header response; member in struct:chsc_sei_area 490 if (sei_area->response.code == 0x0001) { 495 sei_area->response.code); 729 struct chsc_header response; member in struct:__anon6259 751 switch (secm_area->response.code) { 778 CIO_CRW_EVENT(2, "Unknown CHSC response 841 struct chsc_header response; member in struct:__anon6260 928 struct chsc_header response; member in struct:__anon6261 1015 struct chsc_header response; member in struct:__anon6262 1067 struct chsc_header response; member in struct:__anon6263 [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | smb_signing.c | 450 const DATA_BLOB response) 470 data->mac_key = data_blob(NULL, response.length + user_session_key.length); 477 if (response.length) { 478 memcpy(&data->mac_key.data[user_session_key.length],response.data, response.length); 480 dump_data(10, (const char *)response.data, response.length); 1033 void srv_set_signing(const DATA_BLOB user_session_key, const DATA_BLOB response) argument 1062 data->mac_key = data_blob(NULL, response.length + user_session_key.length); 1065 if (response 448 cli_simple_set_signing(struct cli_state *cli, const DATA_BLOB user_session_key, const DATA_BLOB response) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/s390/mm/ |
H A D | extmem.c | 544 int i, response; local 568 response = 0; 569 cpcmd(cmd1, NULL, 0, &response); 570 if (response) { 571 PRINT_ERR("segment_save: DEFSEG failed with response code %i\n", 572 response); 575 cpcmd(cmd2, NULL, 0, &response); 576 if (response) { 577 PRINT_ERR("segment_save: SAVESEG failed with response code %i\n", 578 response); [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/ |
H A D | chap-new.c | 51 unsigned char *challenge, unsigned char *response, 85 * These limits apply to challenge and response packets we send. 122 unsigned char *challenge, unsigned char *response, 302 * chap_handle_response - check the response to our challenge. 309 unsigned char *response, *p; local 320 response = pkt; 346 response, ss->message, sizeof(ss->message)); 354 /* send the response */ 387 * chap_verify_response - check whether the peer's response matches 394 unsigned char *challenge, unsigned char *response, 392 chap_verify_response(char *name, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument 424 unsigned char response[RESP_MAX_PKTLEN]; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/ocfs2/dlm/ |
H A D | dlmdomain.c | 669 enum dlm_query_join_response response; local 687 response = JOIN_DISALLOW; 691 response = JOIN_OK_NO_MAP; 710 response = JOIN_DISALLOW; 730 response = JOIN_OK_NO_MAP; 733 response = JOIN_DISALLOW; 737 response = JOIN_DISALLOW; 741 response = JOIN_DISALLOW; 746 response = JOIN_DISALLOW; 752 response 893 dlm_request_join(struct dlm_ctxt *dlm, int node, enum dlm_query_join_response *response) argument 1002 dlm_should_restart_join(struct dlm_ctxt *dlm, struct domain_join_ctxt *ctxt, enum dlm_query_join_response response) argument 1030 enum dlm_query_join_response response = JOIN_DISALLOW; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpc_server/ |
H A D | srv_echo_nt.c | 37 r_u->response = q_u->request + 1;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/db-4.7.25.NC/test/ |
H A D | rep010.tcl | 193 set response [lindex $perm_response_list end] 194 set permtype [lindex $response 0] 195 set messagelsn [lindex [lindex $response 1] 1] 197 if { [llength $response] != 0 } {
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/ |
H A D | pingpong.h | 39 * It holds response cache and non-blocking sending data. 44 size_t nread_resp; /* number of bytes currently read of a server response */ 45 char *linestart_resp; /* line start pointer for the server response 47 bool pending_resp; /* set TRUE when a server response is pending or in 48 progress, and is cleared once the last response is 54 struct timeval response; /* set to Curl_tvnow() when a command has been sent member in struct:pingpong 55 off, used to time-out response reading */ 57 milliseconds we await for a server response. */ 85 /* initialize stuff to prepare for reading a fresh new response */ 123 * Reads a piece of a server response [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/test/ |
H A D | testca.com | 19 $ open/read sys$ca_input VMSca-response.1 31 $ open/read sys$ca_input VMSca-response.2
|