Searched refs:response (Results 51 - 75 of 176) sorted by relevance

12345678

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/s390/scsi/
H A Dzfcp_dbf.c145 struct zfcp_hba_dbf_record_response *response = &rec->type.response; local
175 response->fsf_command = fsf_req->fsf_command;
176 response->fsf_reqid = (unsigned long)fsf_req;
177 response->fsf_seqno = fsf_req->seq_no;
178 response->fsf_issued = fsf_req->issued;
179 response->fsf_prot_status = qtcb->prefix.prot_status;
180 response->fsf_status = qtcb->header.fsf_status;
181 memcpy(response->fsf_prot_status_qual,
183 memcpy(response
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/isdn/sc/
H A Dpacket.c111 if (!(skb = dev_alloc_skb(rcvmsg->msg_data.response.msg_len))) {
116 skb_put(skb, rcvmsg->msg_data.response.msg_len);
119 rcvmsg->msg_data.response.buff_offset);
121 skb_put(skb, rcvmsg->msg_data.response.msg_len),
122 (char *)rcvmsg->msg_data.response.buff_offset,
123 rcvmsg->msg_data.response.msg_len);
133 /* memset_shmem(card, rcvmsg->msg_data.response.buff_offset, 0, BUFFER_SIZE); */
134 newll.buff_offset = rcvmsg->msg_data.response.buff_offset;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpcclient/
H A Dcmd_echo.c28 uint32 request = 1, response; local
39 result = cli_echo_add_one(cli, mem_ctx, request, &response);
44 printf("%d + 1 = %d\n", request, response);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/plugins/
H A Dwinbind.c101 unsigned char *response,
367 fprintf(pipe_in, "LANMAN-response: %s\n", lm_hex_hash);
377 fprintf(pipe_in, "NT-response: %s\n", nt_hex_hash);
476 * msgp -- Message which will be sent in PAP response
514 unsigned char *response,
526 response_len = *response++;
559 /* Determine which part of response to verify against */
560 if (response[MS_CHAP_USENT]) {
561 nt_response = &response[MS_CHAP_NTRESP];
565 lm_response = &response[MS_CHAP_LANMANRES
511 winbind_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/firewire/
H A Dfw-transaction.c429 struct fw_packet response; member in struct:fw_request
442 request = container_of(packet, struct fw_request, response);
447 fw_fill_response(struct fw_packet *response, u32 *request_header, argument
458 response->header[0] =
462 response->header[1] =
465 response->header[2] = 0;
470 response->header[0] |= HEADER_TCODE(TCODE_WRITE_RESPONSE);
471 response->header_length = 12;
472 response->payload_length = 0;
476 response
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/nsswitch/
H A Dpam_winbind.c66 struct pam_response **response)
74 response, conv->appdata_ptr);
103 struct winbindd_response *response)
116 if (read_reply(response) == -1) {
126 if (response->result != WINBINDD_OK) {
127 if (response->data.auth.pam_error != PAM_SUCCESS) {
129 response->data.auth.error_string,
130 response->data.auth.pam_error,
131 response->data.auth.nt_status_string);
132 return response
64 converse(pam_handle_t *pamh, int nargs, struct pam_message **message, struct pam_response **response) argument
101 pam_winbind_request(enum winbindd_cmd req_type, struct winbindd_request *request, struct winbindd_response *response) argument
142 pam_winbind_request_log(enum winbindd_cmd req_type, struct winbindd_request *request, struct winbindd_response *response, int ctrl, const char *user) argument
202 struct winbindd_response response; local
249 struct winbindd_response response; local
[all...]
H A Dwinbindd.c307 /* Free response data - we may be interrupted and receive another
310 SAFE_FREE(state->response.extra_data);
312 ZERO_STRUCT(state->response);
314 state->response.result = WINBINDD_ERROR;
315 state->response.length = sizeof(struct winbindd_response);
322 state->response.result = table->fn(state);
332 if (!state->response.extra_data)
333 state->response.length = sizeof(struct winbindd_response);
395 SAFE_FREE(state->response.extra_data);
507 /* Write response structur
[all...]
H A Dwinbindd_user.c141 memcpy( &state->response.data.pw, pw, sizeof(WINBINDD_PW) );
193 &state->response.data.pw)) {
230 memcpy( &state->response.data.pw, pw, sizeof(WINBINDD_PW) );
290 user_info.full_name, &state->response.data.pw)) {
497 if ((state->response.extra_data = SMB_MALLOC_ARRAY(struct winbindd_pw, num_users)) == NULL)
500 memset(state->response.extra_data, 0, num_users *
503 user_list = (struct winbindd_pw *)state->response.extra_data;
560 state->response.data.num_entries++;
561 state->response.length +=
652 /* Assign extra_data fields in response structur
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpc_client/
H A Dcli_echo.c26 uint32 request, uint32 *response)
54 /* Unmarshall response */
59 if (response)
60 *response = r.response;
100 /* Unmarshall response */
149 /* Unmarshall response */
194 /* Unmarshall response */
25 cli_echo_add_one(struct cli_state *cli, TALLOC_CTX *mem_ctx, uint32 request, uint32 *response) argument
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/web/
H A Ddiagnose.c28 struct winbindd_response *response);
39 response */
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/ocfs2/
H A Dvote.c113 int n_response; /* an agreggate response. 0 if
115 * negative response from any
152 struct ocfs2_response_msg response; local
186 memset(&response, 0, sizeof(struct ocfs2_response_msg));
187 response.r_hdr.h_response_id = hdr->h_response_id;
188 response.r_hdr.h_blkno = hdr->h_blkno;
189 response.r_hdr.h_generation = hdr->h_generation;
190 response.r_hdr.h_node_num = cpu_to_be32(osb->node_num);
191 response.r_response = cpu_to_be32(vote_response);
195 &response,
383 ocfs2_broadcast_vote(struct ocfs2_super *osb, struct ocfs2_vote_msg *request, unsigned int response_id, int *response, struct ocfs2_net_response_cb *callback) argument
492 int status, response = -EBUSY; local
595 ocfs2_translate_response(int response) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/net/wireless/prism54/
H A Doid_mgt.c423 struct islpci_mgmtframe *response = NULL; local
457 _data, dlen, &response);
459 response_op = response->header->operation;
460 islpci_mgt_release(response);
485 struct islpci_mgmtframe *response; local
499 data, dlen + extra_len, &response);
501 response_op = response->header->operation;
502 islpci_mgt_release(response);
523 struct islpci_mgmtframe *response = NULL; local
549 oid, data, dlen, &response);
597 struct islpci_mgmtframe *response; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/s390/kernel/
H A Dearly.c40 int response; local
89 __cpcmd(defsys_cmd, NULL, 0, &response);
91 if (response != 0)
94 __cpcmd(savesys_cmd, NULL, 0, &response);
96 if (response != strlen(savesys_cmd))
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/busybox-1.x/networking/
H A Dftpgetput.c34 bb_error_msg_and_die("unexpected server response%s%s: %.*s",
231 int response; local
246 response = ftpcmd(buf, NULL, control_stream, buf);
247 switch (response) {
257 response = ftpcmd("STOR", server_path, control_stream, buf);
258 switch (response) {
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/include/rdma/
H A Dib_user_cm.h77 __u64 response; member in struct:ib_ucm_create_id
85 __u64 response; member in struct:ib_ucm_destroy_id
95 __u64 response; member in struct:ib_ucm_attr_id
108 __u64 response; member in struct:ib_ucm_init_qp_attr
225 __u64 response; member in struct:ib_ucm_event_get
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/rxrpc/
H A Drxkad.c623 * send a Kerberos security response
673 * calculate the response checksum
675 static void rxkad_calc_response_checksum(struct rxkad_response *response) argument
679 u8 *p = (u8 *) response;
681 for (loop = sizeof(*response); loop > 0; loop--)
684 response->encrypted.checksum = htonl(csum);
707 * encrypt the response packet
778 /* build the response packet */
798 /* calculate the response checksum and then do the encryption */
810 * decrypt the kerberos IV ticket in the response
997 struct rxkad_response response local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/s390/cio/
H A Dchsc.c38 struct chsc_header response; member in struct:chsc_ssd_area
73 /* Check response. */
78 if (ssd_area->response.code != 0x0001) {
81 ssd_area->response.code);
345 struct chsc_header response; member in struct:chsc_sei_area
490 if (sei_area->response.code == 0x0001) {
495 sei_area->response.code);
729 struct chsc_header response; member in struct:__anon6259
751 switch (secm_area->response.code) {
778 CIO_CRW_EVENT(2, "Unknown CHSC response
841 struct chsc_header response; member in struct:__anon6260
928 struct chsc_header response; member in struct:__anon6261
1015 struct chsc_header response; member in struct:__anon6262
1067 struct chsc_header response; member in struct:__anon6263
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/
H A Dsmb_signing.c450 const DATA_BLOB response)
470 data->mac_key = data_blob(NULL, response.length + user_session_key.length);
477 if (response.length) {
478 memcpy(&data->mac_key.data[user_session_key.length],response.data, response.length);
480 dump_data(10, (const char *)response.data, response.length);
1033 void srv_set_signing(const DATA_BLOB user_session_key, const DATA_BLOB response) argument
1062 data->mac_key = data_blob(NULL, response.length + user_session_key.length);
1065 if (response
448 cli_simple_set_signing(struct cli_state *cli, const DATA_BLOB user_session_key, const DATA_BLOB response) argument
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/s390/mm/
H A Dextmem.c544 int i, response; local
568 response = 0;
569 cpcmd(cmd1, NULL, 0, &response);
570 if (response) {
571 PRINT_ERR("segment_save: DEFSEG failed with response code %i\n",
572 response);
575 cpcmd(cmd2, NULL, 0, &response);
576 if (response) {
577 PRINT_ERR("segment_save: SAVESEG failed with response code %i\n",
578 response);
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/
H A Dchap-new.c51 unsigned char *challenge, unsigned char *response,
85 * These limits apply to challenge and response packets we send.
122 unsigned char *challenge, unsigned char *response,
302 * chap_handle_response - check the response to our challenge.
309 unsigned char *response, *p; local
320 response = pkt;
346 response, ss->message, sizeof(ss->message));
354 /* send the response */
387 * chap_verify_response - check whether the peer's response matches
394 unsigned char *challenge, unsigned char *response,
392 chap_verify_response(char *name, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) argument
424 unsigned char response[RESP_MAX_PKTLEN]; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/ocfs2/dlm/
H A Ddlmdomain.c669 enum dlm_query_join_response response; local
687 response = JOIN_DISALLOW;
691 response = JOIN_OK_NO_MAP;
710 response = JOIN_DISALLOW;
730 response = JOIN_OK_NO_MAP;
733 response = JOIN_DISALLOW;
737 response = JOIN_DISALLOW;
741 response = JOIN_DISALLOW;
746 response = JOIN_DISALLOW;
752 response
893 dlm_request_join(struct dlm_ctxt *dlm, int node, enum dlm_query_join_response *response) argument
1002 dlm_should_restart_join(struct dlm_ctxt *dlm, struct domain_join_ctxt *ctxt, enum dlm_query_join_response response) argument
1030 enum dlm_query_join_response response = JOIN_DISALLOW; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/rpc_server/
H A Dsrv_echo_nt.c37 r_u->response = q_u->request + 1;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/db-4.7.25.NC/test/
H A Drep010.tcl193 set response [lindex $perm_response_list end]
194 set permtype [lindex $response 0]
195 set messagelsn [lindex [lindex $response 1] 1]
197 if { [llength $response] != 0 } {
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/
H A Dpingpong.h39 * It holds response cache and non-blocking sending data.
44 size_t nread_resp; /* number of bytes currently read of a server response */
45 char *linestart_resp; /* line start pointer for the server response
47 bool pending_resp; /* set TRUE when a server response is pending or in
48 progress, and is cleared once the last response is
54 struct timeval response; /* set to Curl_tvnow() when a command has been sent member in struct:pingpong
55 off, used to time-out response reading */
57 milliseconds we await for a server response. */
85 /* initialize stuff to prepare for reading a fresh new response */
123 * Reads a piece of a server response
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/test/
H A Dtestca.com19 $ open/read sys$ca_input VMSca-response.1
31 $ open/read sys$ca_input VMSca-response.2

Completed in 291 milliseconds

12345678