Searched refs:secret2 (Results 1 - 10 of 10) sorted by relevance
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/drivers/scsi/ |
H A D | gvp11.h | 42 volatile unsigned short secret2; /* store 1 here */ member in struct:gvp11_scsiregs
|
H A D | gvp11.c | 324 regs->secret2 = 1;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/drivers/scsi/ |
H A D | gvp11.h | 42 volatile unsigned short secret2; /* store 1 here */ member in struct:gvp11_scsiregs
|
H A D | gvp11.c | 324 regs->secret2 = 1;
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/torture/rpc/ |
H A D | session_key.c | 53 char *secret2; local 126 secret2 = sess_decrypt_string(tctx, &blob1, &session_key); 128 torture_assert_str_equal(tctx, secret1, secret2, "Returned secret invalid");
|
H A D | lsa.c | 1212 char *secret2; local 1333 secret2 = sess_decrypt_string(tctx, 1336 if (strcmp(secret1, secret2) != 0) { 1338 secret2, secret1); 1409 secret2 = sess_decrypt_string(tctx, 1412 if (strcmp(secret1, secret2) != 0) { 1413 torture_comment(tctx, "Returned OLD secret %s doesn't match %s\n", secret2, secret1);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/torture/rpc/ |
H A D | session_key.c | 53 char *secret2; local 126 secret2 = sess_decrypt_string(tctx, &blob1, &session_key); 128 torture_assert_str_equal(tctx, secret1, secret2, "Returned secret invalid");
|
H A D | lsa.c | 1212 char *secret2; local 1333 secret2 = sess_decrypt_string(tctx, 1336 if (strcmp(secret1, secret2) != 0) { 1338 secret2, secret1); 1409 secret2 = sess_decrypt_string(tctx, 1412 if (strcmp(secret1, secret2) != 0) { 1413 torture_comment(tctx, "Returned OLD secret %s doesn't match %s\n", secret2, secret1);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/torture/rpc/ |
H A D | session_key.c | 53 char *secret2; local 126 secret2 = sess_decrypt_string(tctx, &blob1, &session_key); 128 torture_assert_str_equal(tctx, secret1, secret2, "Returned secret invalid");
|
H A D | lsa.c | 1212 char *secret2; local 1333 secret2 = sess_decrypt_string(tctx, 1336 if (strcmp(secret1, secret2) != 0) { 1338 secret2, secret1); 1409 secret2 = sess_decrypt_string(tctx, 1412 if (strcmp(secret1, secret2) != 0) { 1413 torture_comment(tctx, "Returned OLD secret %s doesn't match %s\n", secret2, secret1);
|
Completed in 143 milliseconds