Home
last modified time | relevance | path

Searched refs:response (Results 1 – 5 of 5) sorted by relevance

/lib/liblwip/src/netif/ppp/
Dchpms.c128 u_char *response /* OUT 24 octets */
135 MS_ChapResponse *response
145 u_char *response /* OUT 24 octets */) in ChallengeResponse() argument
156 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); in ChallengeResponse()
157 DesEncrypt(challenge, ZPasswordHash + 7, response + 8); in ChallengeResponse()
158 DesEncrypt(challenge, ZPasswordHash + 14, response + 16); in ChallengeResponse()
161 log_packet(response, 24, "ChallengeResponse - response", LOG_DEBUG); in ChallengeResponse()
309 MS_ChapResponse *response) in ChapMS_NT() argument
337 ChallengeResponse((u_char*)rchallenge, (u_char*)md4Context.buffer, response->NTResp); in ChapMS_NT()
348 MS_ChapResponse *response) in ChapMS_LANMan() argument
[all …]
Dchap.h114 u_char response[MAX_RESPONSE_LENGTH]; /* Response to send */ member
Dchap.c497 BCOPY(hash, cstate->response, MD5_SIGNATURE_SIZE); in ChapReceiveChallenge()
828 BCOPY(cstate->response, outp, md_len); /* copy MD to buffer */ in ChapSendResponse()
/lib/liblwip/src/core/
Ddns.c493 dns_compare_name(unsigned char *query, unsigned char *response) in dns_compare_name() argument
498 n = *response++; in dns_compare_name()
506 if ((*query) != (*response)) { in dns_compare_name()
509 ++response; in dns_compare_name()
515 } while (*response != 0); in dns_compare_name()
/lib/liblwip/
DCHANGELOG125 * msg_in.c, msg_out.c: fixed bug #35536 SNMP: error too big response is malformed
1168 * icmp.c, opt.h: patch #6539: (configurable) response to broadcast- and multicast
1615 copy dns payload to parse the response), return an error if there is no place
2393 echo response packet if the echo request pbuf isn't big enough.