/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/arch/arm/kernel/ |
H A D | ecard.h | 20 unsigned char r_a:1; member in struct:ex_ecid
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/arch/arm/kernel/ |
H A D | ecard.h | 20 unsigned char r_a:1; member in struct:ex_ecid
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba/source/rpc_client/ |
H A D | cli_netlogon.c | 152 NET_R_AUTH_2 r_a; local 154 ok = net_io_r_auth_2("", &r_a, &rbuf, 0); 156 if (ok && r_a.status != 0) 159 DEBUG(0,("cli_net_auth2: Error %s\n", get_nt_error_msg(r_a.status))); 160 cli->nt_error = r_a.status; 173 if(cred_assert( &r_a.srv_chal, cli->sess_key, srv_chal, zerotime) == 0) { 189 if (ok && r_a.srv_flgs.neg_flags != q_a.clnt_flgs.neg_flags) 193 q_a.clnt_flgs.neg_flags, r_a.srv_flgs.neg_flags));
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba/source/rpc_client/ |
H A D | cli_netlogon.c | 152 NET_R_AUTH_2 r_a; local 154 ok = net_io_r_auth_2("", &r_a, &rbuf, 0); 156 if (ok && r_a.status != 0) 159 DEBUG(0,("cli_net_auth2: Error %s\n", get_nt_error_msg(r_a.status))); 160 cli->nt_error = r_a.status; 173 if(cred_assert( &r_a.srv_chal, cli->sess_key, srv_chal, zerotime) == 0) { 189 if (ok && r_a.srv_flgs.neg_flags != q_a.clnt_flgs.neg_flags) 193 q_a.clnt_flgs.neg_flags, r_a.srv_flgs.neg_flags));
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba/source/rpc_client/ |
H A D | cli_netlogon.c | 152 NET_R_AUTH_2 r_a; local 154 ok = net_io_r_auth_2("", &r_a, &rbuf, 0); 156 if (ok && r_a.status != 0) 159 DEBUG(0,("cli_net_auth2: Error %s\n", get_nt_error_msg(r_a.status))); 160 cli->nt_error = r_a.status; 173 if(cred_assert( &r_a.srv_chal, cli->sess_key, srv_chal, zerotime) == 0) { 189 if (ok && r_a.srv_flgs.neg_flags != q_a.clnt_flgs.neg_flags) 193 q_a.clnt_flgs.neg_flags, r_a.srv_flgs.neg_flags));
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba/source/rpc_server/ |
H A D | srv_netlog.c | 131 static void init_net_r_auth_2(NET_R_AUTH_2 *r_a, argument 134 memcpy(r_a->srv_chal.data, resp_cred->data, sizeof(resp_cred->data)); 135 memcpy(&r_a->srv_flgs, flgs, sizeof(r_a->srv_flgs)); 136 r_a->status = status; 146 NET_R_AUTH_2 r_a; local 153 init_net_r_auth_2(&r_a, resp_cred, &srv_flgs, status); 156 if(!net_io_r_auth_2("", &r_a, rdata, 0)) {
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba/source/rpc_server/ |
H A D | srv_netlog.c | 131 static void init_net_r_auth_2(NET_R_AUTH_2 *r_a, argument 134 memcpy(r_a->srv_chal.data, resp_cred->data, sizeof(resp_cred->data)); 135 memcpy(&r_a->srv_flgs, flgs, sizeof(r_a->srv_flgs)); 136 r_a->status = status; 146 NET_R_AUTH_2 r_a; local 153 init_net_r_auth_2(&r_a, resp_cred, &srv_flgs, status); 156 if(!net_io_r_auth_2("", &r_a, rdata, 0)) {
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba/source/rpc_server/ |
H A D | srv_netlog.c | 131 static void init_net_r_auth_2(NET_R_AUTH_2 *r_a, argument 134 memcpy(r_a->srv_chal.data, resp_cred->data, sizeof(resp_cred->data)); 135 memcpy(&r_a->srv_flgs, flgs, sizeof(r_a->srv_flgs)); 136 r_a->status = status; 146 NET_R_AUTH_2 r_a; local 153 init_net_r_auth_2(&r_a, resp_cred, &srv_flgs, status); 156 if(!net_io_r_auth_2("", &r_a, rdata, 0)) {
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/rpc_server/ |
H A D | srv_netlog_nt.c | 347 static void init_net_r_auth(NET_R_AUTH *r_a, DOM_CHAL *resp_cred, NTSTATUS status) argument 349 memcpy(r_a->srv_chal.data, resp_cred->data, sizeof(resp_cred->data)); 350 r_a->status = status; 414 static void init_net_r_auth_2(NET_R_AUTH_2 *r_a, argument 417 memcpy(r_a->srv_chal.data, resp_cred->data, sizeof(resp_cred->data)); 418 memcpy(&r_a->srv_flgs, flgs, sizeof(r_a->srv_flgs)); 419 r_a->status = status;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/rpc_server/ |
H A D | srv_netlog_nt.c | 347 static void init_net_r_auth(NET_R_AUTH *r_a, DOM_CHAL *resp_cred, NTSTATUS status) argument 349 memcpy(r_a->srv_chal.data, resp_cred->data, sizeof(resp_cred->data)); 350 r_a->status = status; 414 static void init_net_r_auth_2(NET_R_AUTH_2 *r_a, argument 417 memcpy(r_a->srv_chal.data, resp_cred->data, sizeof(resp_cred->data)); 418 memcpy(&r_a->srv_flgs, flgs, sizeof(r_a->srv_flgs)); 419 r_a->status = status;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/rpc_server/ |
H A D | srv_netlog_nt.c | 347 static void init_net_r_auth(NET_R_AUTH *r_a, DOM_CHAL *resp_cred, NTSTATUS status) argument 349 memcpy(r_a->srv_chal.data, resp_cred->data, sizeof(resp_cred->data)); 350 r_a->status = status; 414 static void init_net_r_auth_2(NET_R_AUTH_2 *r_a, argument 417 memcpy(r_a->srv_chal.data, resp_cred->data, sizeof(resp_cred->data)); 418 memcpy(&r_a->srv_flgs, flgs, sizeof(r_a->srv_flgs)); 419 r_a->status = status;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba/source/rpc_parse/ |
H A D | parse_net.c | 524 BOOL net_io_r_auth_2(char *desc, NET_R_AUTH_2 *r_a, prs_struct *ps, int depth) argument 526 if (r_a == NULL) 535 if(!smb_io_chal("", &r_a->srv_chal, ps, depth)) /* server challenge */ 537 if(!net_io_neg_flags("", &r_a->srv_flgs, ps, depth)) 540 if(!prs_uint32("status", ps, depth, &r_a->status))
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba/source/rpc_parse/ |
H A D | parse_net.c | 524 BOOL net_io_r_auth_2(char *desc, NET_R_AUTH_2 *r_a, prs_struct *ps, int depth) argument 526 if (r_a == NULL) 535 if(!smb_io_chal("", &r_a->srv_chal, ps, depth)) /* server challenge */ 537 if(!net_io_neg_flags("", &r_a->srv_flgs, ps, depth)) 540 if(!prs_uint32("status", ps, depth, &r_a->status))
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba/source/rpc_parse/ |
H A D | parse_net.c | 524 BOOL net_io_r_auth_2(char *desc, NET_R_AUTH_2 *r_a, prs_struct *ps, int depth) argument 526 if (r_a == NULL) 535 if(!smb_io_chal("", &r_a->srv_chal, ps, depth)) /* server challenge */ 537 if(!net_io_neg_flags("", &r_a->srv_flgs, ps, depth)) 540 if(!prs_uint32("status", ps, depth, &r_a->status))
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/rpc_parse/ |
H A D | parse_net.c | 772 BOOL net_io_r_auth(const char *desc, NET_R_AUTH *r_a, prs_struct *ps, int depth) argument 774 if (r_a == NULL) 783 if(!smb_io_chal("", &r_a->srv_chal, ps, depth)) /* server challenge */ 786 if(!prs_ntstatus("status", ps, depth, &r_a->status)) 838 BOOL net_io_r_auth_2(const char *desc, NET_R_AUTH_2 *r_a, prs_struct *ps, int depth) argument 840 if (r_a == NULL) 849 if(!smb_io_chal("", &r_a->srv_chal, ps, depth)) /* server challenge */ 851 if(!net_io_neg_flags("", &r_a->srv_flgs, ps, depth)) 854 if(!prs_ntstatus("status", ps, depth, &r_a->status)) 906 BOOL net_io_r_auth_3(const char *desc, NET_R_AUTH_3 *r_a, prs_struc argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/rpc_parse/ |
H A D | parse_net.c | 772 BOOL net_io_r_auth(const char *desc, NET_R_AUTH *r_a, prs_struct *ps, int depth) argument 774 if (r_a == NULL) 783 if(!smb_io_chal("", &r_a->srv_chal, ps, depth)) /* server challenge */ 786 if(!prs_ntstatus("status", ps, depth, &r_a->status)) 838 BOOL net_io_r_auth_2(const char *desc, NET_R_AUTH_2 *r_a, prs_struct *ps, int depth) argument 840 if (r_a == NULL) 849 if(!smb_io_chal("", &r_a->srv_chal, ps, depth)) /* server challenge */ 851 if(!net_io_neg_flags("", &r_a->srv_flgs, ps, depth)) 854 if(!prs_ntstatus("status", ps, depth, &r_a->status)) 906 BOOL net_io_r_auth_3(const char *desc, NET_R_AUTH_3 *r_a, prs_struc argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/rpc_parse/ |
H A D | parse_net.c | 772 BOOL net_io_r_auth(const char *desc, NET_R_AUTH *r_a, prs_struct *ps, int depth) argument 774 if (r_a == NULL) 783 if(!smb_io_chal("", &r_a->srv_chal, ps, depth)) /* server challenge */ 786 if(!prs_ntstatus("status", ps, depth, &r_a->status)) 838 BOOL net_io_r_auth_2(const char *desc, NET_R_AUTH_2 *r_a, prs_struct *ps, int depth) argument 840 if (r_a == NULL) 849 if(!smb_io_chal("", &r_a->srv_chal, ps, depth)) /* server challenge */ 851 if(!net_io_neg_flags("", &r_a->srv_flgs, ps, depth)) 854 if(!prs_ntstatus("status", ps, depth, &r_a->status)) 906 BOOL net_io_r_auth_3(const char *desc, NET_R_AUTH_3 *r_a, prs_struc argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba/source/include/ |
H A D | proto.h | 1683 BOOL net_io_r_auth_2(char *desc, NET_R_AUTH_2 *r_a, prs_struct *ps, int depth);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba/source/include/ |
H A D | proto.h | 1683 BOOL net_io_r_auth_2(char *desc, NET_R_AUTH_2 *r_a, prs_struct *ps, int depth);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba/source/include/ |
H A D | proto.h | 1683 BOOL net_io_r_auth_2(char *desc, NET_R_AUTH_2 *r_a, prs_struct *ps, int depth);
|