Searched refs:sres (Results 1 - 14 of 14) sorted by relevance

/netbsd-6-1-5-RELEASE/external/bsd/tmux/dist/
H A Dcmd-find-window.c60 char *str, *sres, *sctx, *searchstr; local
86 sres = window_pane_search(wp, str, &line);
87 if (sres == NULL &&
91 if (sres == NULL) {
98 line + 1, sres);
99 xfree(sres);
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/crypto/
H A Dmilenage.h23 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres,
H A Dmilenage.c237 * @sres: Buffer for SRES = 32-bit SRES
241 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) argument
253 os_memcpy(sres, res, 4);
256 sres[i] = res[i] ^ res[i + 4];
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/utils/
H A Dpcsc_funcs.h51 unsigned char *sres, unsigned char *kc);
H A Dpcsc_funcs.c1030 * @sres: 4-byte buffer for SRES
1039 * successfully, SRES and Kc values will be written into sres and kc buffers.
1042 unsigned char *sres, unsigned char *kc)
1094 os_memcpy(sres, buf, 4);
1108 os_memcpy(sres, buf + 1, 4);
1112 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - SRES", sres, 4);
1041 scard_gsm_auth(struct scard_data *scard, const unsigned char *_rand, unsigned char *sres, unsigned char *kc) argument
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_server/
H A Deap_sim_db.h36 u8 *_rand, u8 *kc, u8 *sres,
H A Deap_sim_db.c50 u8 sres[EAP_SIM_MAX_CHAL][EAP_SIM_SRES_LEN]; member in struct:eap_sim_db_pending::__anon2509::__anon2510
157 if (hexstr2bin(start, entry->u.sim.sres[num_chal],
528 * @sres: Buffer for SRES values
549 u8 *_rand, u8 *kc, u8 *sres,
602 os_memcpy(sres, entry->u.sim.sres,
547 eap_sim_db_get_gsm_triplets(void *priv, const u8 *identity, size_t identity_len, int max_chal, u8 *_rand, u8 *kc, u8 *sres, void *cb_session_ctx) argument
H A Deap_server_sim.c32 u8 sres[EAP_SIM_MAX_CHAL][EAP_SIM_SRES_LEN]; member in struct:eap_sim_data
473 (u8 *) data->rand, (u8 *) data->kc, (u8 *) data->sres, sm);
518 (u8 *) data->sres,
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/src/eap_peer/
H A Deap_sim.c32 u8 sres[3][EAP_SIM_SRES_LEN]; member in struct:eap_sim_data
155 data->sres[0], data->kc[0]) ||
157 data->sres[1], data->kc[1]) ||
160 data->sres[2], data->kc[2]))) {
193 data->sres[i], data->kc[i])) {
202 data->sres[i], EAP_SIM_SRES_LEN);
226 os_memcpy(data->sres[i], "\xd1\xd2\xd3\xd4",
232 os_memcpy(data->sres[i], "\xe1\xe2\xe3\xe4",
238 os_memcpy(data->sres[i], "\xf1\xf2\xf3\xf4",
414 return eap_sim_msg_finish(msg, data->k_aut, (u8 *) data->sres,
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/hostapd/
H A Dhlr_auc_gw.c61 u8 sres[4]; member in struct:gsm_triplet
194 if (strlen(pos) != 8 || hexstr2bin(pos, g->sres, 4)) {
419 u8 _rand[16], sres[4], kc[8]; local
423 gsm_milenage(m->opc, m->ki, _rand, sres, kc);
427 rpos += wpa_snprintf_hex(rpos, rend - rpos, sres, 4);
445 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->sres, 4);
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/servers/slapd/back-meta/
H A Dsearch.c683 int rc = 0, sres = LDAP_SUCCESS; local
1303 sres = slap_map_api2result( &candidates[ i ] );
1395 sres = slap_map_api2result( rs );
1413 switch ( sres ) {
1422 sres = LDAP_SUCCESS;
1644 if ( sres == LDAP_SUCCESS
1684 } else if ( sres == LDAP_NO_SUCH_OBJECT ) {
1693 if ( sres == LDAP_SUCCESS ) {
1695 sres = LDAP_REFERRAL;
1713 sres
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/wpa/dist/wpa_supplicant/
H A Deapol_test.c788 unsigned char sres[4]; local
828 if (scard_gsm_auth(scard, _rand, sres, kc))
832 if (scard_gsm_auth(scard, _rand, sres, kc))
893 unsigned char sres[4]; local
928 if (scard_gsm_auth(scard, _rand, sres, kc))
939 printf("%02X", sres[j]);
/netbsd-6-1-5-RELEASE/lib/libutil/
H A Dlogin_cap.c192 char *res = NULL, *sres; local
231 sres = res;
238 lc->lc_class, cap, sres);
240 free(sres);
270 free(sres);
/netbsd-6-1-5-RELEASE/external/bsd/openldap/dist/servers/slapd/back-sql/
H A Dsearch.c2011 int sres; local
2048 sres = backsql_get_db_conn( op, &dbh );
2049 if ( sres != LDAP_SUCCESS ) {
2053 rs->sr_err = sres;
2054 rs->sr_text = sres == LDAP_OTHER ? "SQL-backend error" : NULL;

Completed in 132 milliseconds