Searched refs:response (Results 1 – 5 of 5) sorted by relevance
| /lib/liblwip/src/netif/ppp/ |
| D | chpms.c | 128 u_char *response /* OUT 24 octets */ 135 MS_ChapResponse *response 145 u_char *response /* OUT 24 octets */) in ChallengeResponse() argument 156 DesEncrypt(challenge, ZPasswordHash + 0, response + 0); in ChallengeResponse() 157 DesEncrypt(challenge, ZPasswordHash + 7, response + 8); in ChallengeResponse() 158 DesEncrypt(challenge, ZPasswordHash + 14, response + 16); in ChallengeResponse() 161 log_packet(response, 24, "ChallengeResponse - response", LOG_DEBUG); in ChallengeResponse() 309 MS_ChapResponse *response) in ChapMS_NT() argument 337 ChallengeResponse((u_char*)rchallenge, (u_char*)md4Context.buffer, response->NTResp); in ChapMS_NT() 348 MS_ChapResponse *response) in ChapMS_LANMan() argument [all …]
|
| D | chap.h | 114 u_char response[MAX_RESPONSE_LENGTH]; /* Response to send */ member
|
| D | chap.c | 497 BCOPY(hash, cstate->response, MD5_SIGNATURE_SIZE); in ChapReceiveChallenge() 828 BCOPY(cstate->response, outp, md_len); /* copy MD to buffer */ in ChapSendResponse()
|
| /lib/liblwip/src/core/ |
| D | dns.c | 493 dns_compare_name(unsigned char *query, unsigned char *response) in dns_compare_name() argument 498 n = *response++; in dns_compare_name() 506 if ((*query) != (*response)) { in dns_compare_name() 509 ++response; in dns_compare_name() 515 } while (*response != 0); in dns_compare_name()
|
| /lib/liblwip/ |
| D | CHANGELOG | 125 * msg_in.c, msg_out.c: fixed bug #35536 SNMP: error too big response is malformed 1168 * icmp.c, opt.h: patch #6539: (configurable) response to broadcast- and multicast 1615 copy dns payload to parse the response), return an error if there is no place 2393 echo response packet if the echo request pbuf isn't big enough.
|