/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/ |
H A D | smtp.c | 724 char reply[MAX_CURL_USER_LENGTH + 32 /* 2 * size of MD5 digest */ + 1]; local 772 /* Prepare the reply. */ 773 snprintf(reply, sizeof reply, 781 result = Curl_base64_encode(data, reply, 0, &rplyb64, &len);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/tests/ |
H A D | ftpserver.pl | 400 'QUIT' => '221 bye bye baby', # just reply something 664 @data = getpart("reply", "data$testpart"); 713 @data = getpart("reply", "data$testpart"); 907 my @data = getpart("reply", "mdtm"); 909 my $reply = $data[0]; 910 chomp $reply if($reply); 912 if($reply && ($reply =~ /^[+-]?\d+$/) && ($reply < [all...] |
H A D | runtests.pl | 2879 # extract the reply data 2880 my @reply = getpart("reply", "data"); 2881 my @replycheck = getpart("reply", "datacheck"); 2886 my %hash = getpartattr("reply", "datacheck"); 2893 @reply=@replycheck; 2910 my @ftpservercmd = getpart("reply", "servercmd"); 3344 my %replyattr = getpartattr("reply", "data"); 3345 if(!$replyattr{'nocheck'} && (@reply || $replyattr{'sendzero'})) { 3348 my %hash = getpartattr("reply", "dat [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iproute2/doc/ |
H A D | api-ip6-flowlabels.tex | 108 namely, we are not allowed to use received address for reply directly
|
H A D | ip-cref.tex | 2668 reply. If the source is selected incorrectly, in the best case, 2671 are administratively scoped, the reply may be lost entirely.
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/l2tpd-0.69/ |
H A D | aaa.h | 42 unsigned char reply[MD_SIG_SIZE]; /* What the peer sent */ member in struct:challenge
|
H A D | avp.c | 1167 bcopy (&raw[3], t->chal_them.reply, MD_SIG_SIZE); 1170 log (LOG_DEBUG, "%s: Challenge reply found\n", __FUNCTION__);
|
H A D | control.c | 499 * We have a reply. If everything is okay, send 556 (t->chal_them.reply, t->chal_them.response, MD_SIG_SIZE)) 628 (t->chal_them.reply, t->chal_them.response, MD_SIG_SIZE))
|
H A D | l2tpd.c | 1037 memset (tmp->chal_us.reply, 0, MD_SIG_SIZE); 1040 memset (tmp->chal_them.reply, 0, MD_SIG_SIZE);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/ffmpeg-0.5.1/libavformat/ |
H A D | rtsp.c | 573 static void rtsp_parse_transport(RTSPMessageHeader *reply, const char *p) argument 582 reply->nb_transports = 0; 589 th = &reply->transports[reply->nb_transports]; 671 reply->nb_transports++; 675 void rtsp_parse_line(RTSPMessageHeader *reply, const char *buf) argument 682 get_word_sep(reply->session_id, sizeof(reply->session_id), ";", &p); 684 reply->content_length = strtol(p, NULL, 10); 686 rtsp_parse_transport(reply, 740 rtsp_send_cmd(AVFormatContext *s, const char *cmd, RTSPMessageHeader *reply, unsigned char **content_ptr) argument 891 RTSPMessageHeader reply1, *reply = &reply1; local 1067 RTSPMessageHeader reply1, *reply = &reply1; local 1316 RTSPMessageHeader reply1, *reply = &reply1; local 1424 RTSPMessageHeader reply1, *reply = &reply1; local 1454 RTSPMessageHeader reply1, *reply = &reply1; local 1498 RTSPMessageHeader reply1, *reply = &reply1; local [all...] |
H A D | rtsp.h | 205 /** The last reply of the server to a RTSP command */ 271 void rtsp_parse_line(RTSPMessageHeader *reply, const char *buf);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/mtools-4.0.10/ |
H A D | devices.c | 619 (int)raw_cmd->reply[i] ); 621 code = (raw_cmd->reply[0] <<16) + 622 (raw_cmd->reply[1] << 8) + 623 raw_cmd->reply[2]; 642 fprintf(stderr,"Short reply from FDC\n"); 680 if (raw_cmd->reply[3] != raw_cmd->cmd[2]) { 684 end = raw_cmd->reply[5]; 693 switch(raw_cmd->reply[0] & 0xc0){ 695 if ((raw_cmd->reply[0] & 0x38) == 0 && 696 (raw_cmd->reply[ [all...] |
H A D | floppyd.c | 403 Packet reply = newPacket(); local 405 make_new(reply, 4); 408 put_dword(reply, 0, AUTH_PACKETOVERSIZE); 409 send_packet(reply, sock); 410 destroyPacket(reply); 419 put_dword(reply, 0, AUTH_WRONGVERSION); 420 send_packet(reply, sock); 421 destroyPacket(reply); 427 put_dword(reply, 0, AUTH_SUCCESS); 429 make_new(reply, 1 999 Packet reply = newPacket(); local [all...] |
H A D | floppyd_installtest.c | 248 int reply; local 281 reply = authenticate_to_floppyd(fullauth, sock, display, 285 if(reply == AUTH_WRONGVERSION) { 293 if (reply != 0) { 296 "%s\n", AuthErrors[reply]);
|
H A D | floppyd_io.c | 580 int reply; local 602 reply = authenticate_to_floppyd(floppyd, sock, display); 605 if(reply == AUTH_WRONGVERSION) { 613 if (reply != 0) { 616 "%s\n", AuthErrors[reply]);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/modules/ |
H A D | ppp.c | 1090 mblk_t *reply, *np; local 1107 if ((reply = allocb(sizeof(dl_info_ack_t), BPRI_HI)) == 0) 1109 reply->b_datap->db_type = M_PCPROTO; 1110 info = (dl_info_ack_t *) reply->b_wptr; 1111 reply->b_wptr += sizeof(dl_info_ack_t); 1125 qreply(q, reply); 1212 if ((reply = allocb(sizeof(dl_bind_ack_t) + sizeof(uint), 1215 ackp = (dl_bind_ack_t *) reply->b_wptr; 1216 reply->b_wptr += sizeof(dl_bind_ack_t) + sizeof(uint); 1217 reply 1448 mblk_t *reply; local 1471 mblk_t *reply; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/ |
H A D | auth.c | 583 * incoming events (reply, timeout, etc.). 1507 struct pam_response *reply = NULL; local 1511 reply = malloc(sizeof(struct pam_response) * num_msg); 1512 if (!reply) return PAM_CONV_ERR; 1517 reply[replies].resp_retcode = PAM_SUCCESS; 1518 reply[replies].resp = COPY_STRING(PAM_username); 1522 reply[replies].resp_retcode = PAM_SUCCESS; 1523 reply[replies].resp = COPY_STRING(PAM_password); 1530 reply[replies].resp_retcode = PAM_SUCCESS; 1531 reply[replie [all...] |
H A D | sys-solaris.c | 585 } reply; local 723 dlpi_get_reply(ifd, &reply.prim, DL_OK_ACK, sizeof(reply)) < 0) { 2230 } reply; local 2252 || dlpi_get_reply(iffd, &reply.prim, DL_OK_ACK, sizeof(reply)) < 0 2254 || dlpi_get_reply(iffd, &reply.prim, DL_INFO_ACK, sizeof(reply)) < 0) { 2259 adrlen = reply.prim.info_ack.dl_addr_length; 2260 adrp = (unsigned char *)&reply [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/solaris/ |
H A D | ppp.c | 1098 mblk_t *reply, *np; local 1115 if ((reply = allocb(sizeof(dl_info_ack_t), BPRI_HI)) == 0) 1117 reply->b_datap->db_type = M_PCPROTO; 1118 info = (dl_info_ack_t *) reply->b_wptr; 1119 reply->b_wptr += sizeof(dl_info_ack_t); 1133 qreply(q, reply); 1220 if ((reply = allocb(sizeof(dl_bind_ack_t) + sizeof(uint), 1223 ackp = (dl_bind_ack_t *) reply->b_wptr; 1224 reply->b_wptr += sizeof(dl_bind_ack_t) + sizeof(uint); 1225 reply 1458 mblk_t *reply; local 1481 mblk_t *reply; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/pptp/ |
H A D | pptp_ctrl.c | 434 pptp_reset_timer(); /* wait 60 seconds for reply */ 704 struct pptp_start_ctrl_conn reply = { local 715 if ((rc = pptp_fixups[idx].start_ctrl_conn(&reply))) 721 reply.version = packet->version; 723 reply.result_code = hton8(5); 724 pptp_send_ctrl_packet(conn, &reply, sizeof(reply)); 727 if (pptp_send_ctrl_packet(conn, &reply, sizeof(reply))) { 757 log("Negative reply receive 785 struct pptp_stop_ctrl_conn reply = { local 826 struct pptp_echo_rply reply = { local 841 struct pptp_out_call_rply reply = { local 909 struct pptp_call_clear_ntfy reply = { local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/examples/auth/crackcheck/ |
H A D | crackcheck.c | 29 char *reply; local 53 reply = FascistCheck(password, dictionary); 54 if (reply != NULL) { 55 fprintf(stderr, "ERR - %s\n\n", reply);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/auth/ |
H A D | auth_ntlmssp.c | 185 const DATA_BLOB request, DATA_BLOB *reply) 187 return ntlmssp_update(auth_ntlmssp_state->ntlmssp_state, request, reply); 184 auth_ntlmssp_update(AUTH_NTLMSSP_STATE *auth_ntlmssp_state, const DATA_BLOB request, DATA_BLOB *reply) argument
|
H A D | pampass.c | 115 struct pam_response *reply = NULL; local 133 reply = malloc(sizeof(struct pam_response) * num_msg); 134 if (!reply) 137 memset(reply, '\0', sizeof(struct pam_response) * num_msg); 142 reply[replies].resp_retcode = PAM_SUCCESS; 143 reply[replies].resp = COPY_STRING(udp->PAM_username); 148 reply[replies].resp_retcode = PAM_SUCCESS; 149 reply[replies].resp = COPY_STRING(udp->PAM_password); 158 reply[replies].resp_retcode = PAM_SUCCESS; 159 reply[replie 198 fstring reply; member in struct:chat_struct 208 fstring reply; local 265 struct pam_response *reply = NULL; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/lib/ |
H A D | tallocmsg.c | 36 char *reply; local 43 reply = talloc_describe_all(reply_pool); 46 reply, strlen(reply)+1, True);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libads/ |
H A D | kerberos.c | 44 memset(prompts[0].reply->data, '\0', prompts[0].reply->length); 45 if (prompts[0].reply->length > 0) { 47 strncpy(prompts[0].reply->data, data, prompts[0].reply->length-1); 48 prompts[0].reply->length = strlen(prompts[0].reply->data); 50 prompts[0].reply->length = 0;
|