Searched refs:response (Results 1 – 12 of 12) sorted by relevance
| /net/rxrpc/ |
| A D | rxkad.c | 711 u8 *p = (u8 *) response; in rxkad_calc_response_checksum() 866 struct sk_buff *response; in rxkad_respond_to_challenge() local 885 if (!response) in rxkad_respond_to_challenge() 888 response->len = len; in rxkad_respond_to_challenge() 889 response->data_len = len; in rxkad_respond_to_challenge() 911 response = NULL; in rxkad_respond_to_challenge() 1143 if (!response) in rxkad_verify_response() 1147 response, sizeof(*response)) < 0) { in rxkad_verify_response() 1264 kfree(response); in rxkad_verify_response() 1271 kfree(response); in rxkad_verify_response() [all …]
|
| A D | rxgk.c | 830 struct sk_buff *response, in rxgk_construct_authenticator() argument 887 struct sk_buff *response, in rxgk_encrypt_authenticator() argument 919 struct sk_buff *response; in rxgk_construct_response() local 935 if (!response) in rxgk_construct_response() 938 response->len = len; in rxgk_construct_response() 939 response->data_len = len; in rxgk_construct_response() 979 if (len != response->len) { in rxgk_construct_response() 980 response->len = len; in rxgk_construct_response() 981 response->data_len = len; in rxgk_construct_response() 985 rsp = rxrpc_skb(response); in rxgk_construct_response() [all …]
|
| A D | output.c | 927 void rxrpc_send_response(struct rxrpc_connection *conn, struct sk_buff *response) in rxrpc_send_response() argument 929 struct rxrpc_skb_priv *sp = rxrpc_skb(response); in rxrpc_send_response() 941 ret = skb_to_sgvec(response, sg, 0, len); in rxrpc_send_response() 965 ret = skb_store_bits(response, offsetof(struct rxrpc_wire_header, serial), in rxrpc_send_response()
|
| /net/ipv4/netfilter/ |
| A D | nf_nat_snmp_basic.asn1 | 104 response
|
| A D | Kconfig | 202 error should be issued in response to an incoming packet, rather
|
| /net/bluetooth/ |
| A D | l2cap_core.c | 4011 goto response; in l2cap_connect() 4022 goto response; in l2cap_connect() 4030 goto response; in l2cap_connect() 4036 goto response; in l2cap_connect() 4041 goto response; in l2cap_connect() 4088 response: in l2cap_connect() 4880 goto response; in l2cap_le_connect_req() 4889 goto response; in l2cap_le_connect_req() 4963 response: in l2cap_le_connect_req() 5046 goto response; in l2cap_ecred_conn_req() [all …]
|
| /net/netfilter/ |
| A D | nf_conntrack_h323_main.c | 507 if (mscm->response.choice == in process_h245() 511 &mscm->response. in process_h245() 515 mscm->response.choice); in process_h245()
|
| A D | nf_conntrack_sip.c | 1441 if (handler->response == NULL) in process_sip_response() 1446 return handler->response(skb, protoff, dataoff, dptr, datalen, in process_sip_response()
|
| A D | Kconfig | 950 response to particular packets passing through your machine. 953 which only flashes in response to FTP transfers, for example. Or
|
| A D | nf_conntrack_h323_types.c | 1475 offsetof(MultimediaSystemControlMessage, response),
|
| /net/ipv6/netfilter/ |
| A D | Kconfig | 216 error should be issued in response to an incoming packet, rather
|
| /net/ipv4/ |
| A D | Kconfig | 599 type. TCP Veno cuts down less congestion window in response to random
|
Completed in 45 milliseconds