Searched refs:reply (Results 1 - 25 of 174) sorted by path

1234567

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/
H A Dsmtp.c724 char reply[MAX_CURL_USER_LENGTH + 32 /* 2 * size of MD5 digest */ + 1]; local
772 /* Prepare the reply. */
773 snprintf(reply, sizeof reply,
781 result = Curl_base64_encode(data, reply, 0, &rplyb64, &len);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/tests/
H A Dftpserver.pl400 'QUIT' => '221 bye bye baby', # just reply something
664 @data = getpart("reply", "data$testpart");
713 @data = getpart("reply", "data$testpart");
907 my @data = getpart("reply", "mdtm");
909 my $reply = $data[0];
910 chomp $reply if($reply);
912 if($reply && ($reply =~ /^[+-]?\d+$/) && ($reply <
[all...]
H A Druntests.pl2879 # extract the reply data
2880 my @reply = getpart("reply", "data");
2881 my @replycheck = getpart("reply", "datacheck");
2886 my %hash = getpartattr("reply", "datacheck");
2893 @reply=@replycheck;
2910 my @ftpservercmd = getpart("reply", "servercmd");
3344 my %replyattr = getpartattr("reply", "data");
3345 if(!$replyattr{'nocheck'} && (@reply || $replyattr{'sendzero'})) {
3348 my %hash = getpartattr("reply", "dat
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iproute2/doc/
H A Dapi-ip6-flowlabels.tex108 namely, we are not allowed to use received address for reply directly
H A Dip-cref.tex2668 reply. If the source is selected incorrectly, in the best case,
2671 are administratively scoped, the reply may be lost entirely.
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/l2tpd-0.69/
H A Daaa.h42 unsigned char reply[MD_SIG_SIZE]; /* What the peer sent */ member in struct:challenge
H A Davp.c1167 bcopy (&raw[3], t->chal_them.reply, MD_SIG_SIZE);
1170 log (LOG_DEBUG, "%s: Challenge reply found\n", __FUNCTION__);
H A Dcontrol.c499 * We have a reply. If everything is okay, send
556 (t->chal_them.reply, t->chal_them.response, MD_SIG_SIZE))
628 (t->chal_them.reply, t->chal_them.response, MD_SIG_SIZE))
H A Dl2tpd.c1037 memset (tmp->chal_us.reply, 0, MD_SIG_SIZE);
1040 memset (tmp->chal_them.reply, 0, MD_SIG_SIZE);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/ffmpeg-0.5.1/libavformat/
H A Drtsp.c573 static void rtsp_parse_transport(RTSPMessageHeader *reply, const char *p) argument
582 reply->nb_transports = 0;
589 th = &reply->transports[reply->nb_transports];
671 reply->nb_transports++;
675 void rtsp_parse_line(RTSPMessageHeader *reply, const char *buf) argument
682 get_word_sep(reply->session_id, sizeof(reply->session_id), ";", &p);
684 reply->content_length = strtol(p, NULL, 10);
686 rtsp_parse_transport(reply,
740 rtsp_send_cmd(AVFormatContext *s, const char *cmd, RTSPMessageHeader *reply, unsigned char **content_ptr) argument
891 RTSPMessageHeader reply1, *reply = &reply1; local
1067 RTSPMessageHeader reply1, *reply = &reply1; local
1316 RTSPMessageHeader reply1, *reply = &reply1; local
1424 RTSPMessageHeader reply1, *reply = &reply1; local
1454 RTSPMessageHeader reply1, *reply = &reply1; local
1498 RTSPMessageHeader reply1, *reply = &reply1; local
[all...]
H A Drtsp.h205 /** The last reply of the server to a RTSP command */
271 void rtsp_parse_line(RTSPMessageHeader *reply, const char *buf);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/mtools-4.0.10/
H A Ddevices.c619 (int)raw_cmd->reply[i] );
621 code = (raw_cmd->reply[0] <<16) +
622 (raw_cmd->reply[1] << 8) +
623 raw_cmd->reply[2];
642 fprintf(stderr,"Short reply from FDC\n");
680 if (raw_cmd->reply[3] != raw_cmd->cmd[2]) {
684 end = raw_cmd->reply[5];
693 switch(raw_cmd->reply[0] & 0xc0){
695 if ((raw_cmd->reply[0] & 0x38) == 0 &&
696 (raw_cmd->reply[
[all...]
H A Dfloppyd.c403 Packet reply = newPacket(); local
405 make_new(reply, 4);
408 put_dword(reply, 0, AUTH_PACKETOVERSIZE);
409 send_packet(reply, sock);
410 destroyPacket(reply);
419 put_dword(reply, 0, AUTH_WRONGVERSION);
420 send_packet(reply, sock);
421 destroyPacket(reply);
427 put_dword(reply, 0, AUTH_SUCCESS);
429 make_new(reply, 1
999 Packet reply = newPacket(); local
[all...]
H A Dfloppyd_installtest.c248 int reply; local
281 reply = authenticate_to_floppyd(fullauth, sock, display,
285 if(reply == AUTH_WRONGVERSION) {
293 if (reply != 0) {
296 "%s\n", AuthErrors[reply]);
H A Dfloppyd_io.c580 int reply; local
602 reply = authenticate_to_floppyd(floppyd, sock, display);
605 if(reply == AUTH_WRONGVERSION) {
613 if (reply != 0) {
616 "%s\n", AuthErrors[reply]);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/modules/
H A Dppp.c1090 mblk_t *reply, *np; local
1107 if ((reply = allocb(sizeof(dl_info_ack_t), BPRI_HI)) == 0)
1109 reply->b_datap->db_type = M_PCPROTO;
1110 info = (dl_info_ack_t *) reply->b_wptr;
1111 reply->b_wptr += sizeof(dl_info_ack_t);
1125 qreply(q, reply);
1212 if ((reply = allocb(sizeof(dl_bind_ack_t) + sizeof(uint),
1215 ackp = (dl_bind_ack_t *) reply->b_wptr;
1216 reply->b_wptr += sizeof(dl_bind_ack_t) + sizeof(uint);
1217 reply
1448 mblk_t *reply; local
1471 mblk_t *reply; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/
H A Dauth.c583 * incoming events (reply, timeout, etc.).
1507 struct pam_response *reply = NULL; local
1511 reply = malloc(sizeof(struct pam_response) * num_msg);
1512 if (!reply) return PAM_CONV_ERR;
1517 reply[replies].resp_retcode = PAM_SUCCESS;
1518 reply[replies].resp = COPY_STRING(PAM_username);
1522 reply[replies].resp_retcode = PAM_SUCCESS;
1523 reply[replies].resp = COPY_STRING(PAM_password);
1530 reply[replies].resp_retcode = PAM_SUCCESS;
1531 reply[replie
[all...]
H A Dsys-solaris.c585 } reply; local
723 dlpi_get_reply(ifd, &reply.prim, DL_OK_ACK, sizeof(reply)) < 0) {
2230 } reply; local
2252 || dlpi_get_reply(iffd, &reply.prim, DL_OK_ACK, sizeof(reply)) < 0
2254 || dlpi_get_reply(iffd, &reply.prim, DL_INFO_ACK, sizeof(reply)) < 0) {
2259 adrlen = reply.prim.info_ack.dl_addr_length;
2260 adrp = (unsigned char *)&reply
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/solaris/
H A Dppp.c1098 mblk_t *reply, *np; local
1115 if ((reply = allocb(sizeof(dl_info_ack_t), BPRI_HI)) == 0)
1117 reply->b_datap->db_type = M_PCPROTO;
1118 info = (dl_info_ack_t *) reply->b_wptr;
1119 reply->b_wptr += sizeof(dl_info_ack_t);
1133 qreply(q, reply);
1220 if ((reply = allocb(sizeof(dl_bind_ack_t) + sizeof(uint),
1223 ackp = (dl_bind_ack_t *) reply->b_wptr;
1224 reply->b_wptr += sizeof(dl_bind_ack_t) + sizeof(uint);
1225 reply
1458 mblk_t *reply; local
1481 mblk_t *reply; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/pptp/
H A Dpptp_ctrl.c434 pptp_reset_timer(); /* wait 60 seconds for reply */
704 struct pptp_start_ctrl_conn reply = { local
715 if ((rc = pptp_fixups[idx].start_ctrl_conn(&reply)))
721 reply.version = packet->version;
723 reply.result_code = hton8(5);
724 pptp_send_ctrl_packet(conn, &reply, sizeof(reply));
727 if (pptp_send_ctrl_packet(conn, &reply, sizeof(reply))) {
757 log("Negative reply receive
785 struct pptp_stop_ctrl_conn reply = { local
826 struct pptp_echo_rply reply = { local
841 struct pptp_out_call_rply reply = { local
909 struct pptp_call_clear_ntfy reply = { local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/examples/auth/crackcheck/
H A Dcrackcheck.c29 char *reply; local
53 reply = FascistCheck(password, dictionary);
54 if (reply != NULL) {
55 fprintf(stderr, "ERR - %s\n\n", reply);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/auth/
H A Dauth_ntlmssp.c185 const DATA_BLOB request, DATA_BLOB *reply)
187 return ntlmssp_update(auth_ntlmssp_state->ntlmssp_state, request, reply);
184 auth_ntlmssp_update(AUTH_NTLMSSP_STATE *auth_ntlmssp_state, const DATA_BLOB request, DATA_BLOB *reply) argument
H A Dpampass.c115 struct pam_response *reply = NULL; local
133 reply = malloc(sizeof(struct pam_response) * num_msg);
134 if (!reply)
137 memset(reply, '\0', sizeof(struct pam_response) * num_msg);
142 reply[replies].resp_retcode = PAM_SUCCESS;
143 reply[replies].resp = COPY_STRING(udp->PAM_username);
148 reply[replies].resp_retcode = PAM_SUCCESS;
149 reply[replies].resp = COPY_STRING(udp->PAM_password);
158 reply[replies].resp_retcode = PAM_SUCCESS;
159 reply[replie
198 fstring reply; member in struct:chat_struct
208 fstring reply; local
265 struct pam_response *reply = NULL; local
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/lib/
H A Dtallocmsg.c36 char *reply; local
43 reply = talloc_describe_all(reply_pool);
46 reply, strlen(reply)+1, True);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libads/
H A Dkerberos.c44 memset(prompts[0].reply->data, '\0', prompts[0].reply->length);
45 if (prompts[0].reply->length > 0) {
47 strncpy(prompts[0].reply->data, data, prompts[0].reply->length-1);
48 prompts[0].reply->length = strlen(prompts[0].reply->data);
50 prompts[0].reply->length = 0;

Completed in 398 milliseconds

1234567