/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | s3_both.c | 127 /* send s->init_buf in records of type 'type' (SSL3_RT_HANDSHAKE or SSL3_RT_CHANGE_CIPHER_SPEC) */ 132 ret=ssl3_write_bytes(s,type,&s->init_buf->data[s->init_off], 138 ssl3_finish_mac(s,(unsigned char *)&s->init_buf->data[s->init_off],ret); 143 s->msg_callback(1, s->version, type, s->init_buf->data, (size_t)(s->init_off + s->init_num), s, s->msg_callback_arg); 159 d=(unsigned char *)s->init_buf->data; 255 p=(unsigned char *)s->init_buf->data; 284 buf=s->init_buf; 379 s->init_msg = s->init_buf->data + 4; 384 p=(unsigned char *)s->init_buf->data; 458 if (l && !BUF_MEM_grow_clean(s->init_buf,(in [all...] |
H A D | d1_both.c | 174 /* send s->init_buf in records of type 'type' (SSL3_RT_HANDSHAKE or SSL3_RT_CHANGE_CIPHER_SPEC) */ 265 dtls1_write_message_header(s, (unsigned char *)&s->init_buf->data[s->init_off]); 270 ret=dtls1_write_bytes(s,type,&s->init_buf->data[s->init_off], 298 (unsigned char *)&s->init_buf->data[s->init_off + 304 s->msg_callback(1, s->version, type, s->init_buf->data, 343 s->init_msg = s->init_buf->data + DTLS1_HM_HEADER_LENGTH; 382 s->init_msg = s->init_buf->data + DTLS1_HM_HEADER_LENGTH; 401 * (1) copy over the fragment to s->init_buf->data[] 424 memcpy(&s->init_buf->data[s->init_num], 451 memcpy(frag->fragment, &(s->init_buf [all...] |
H A D | s2_srvr.c | 191 buf=s->init_buf; 197 s->init_buf=buf; 325 BUF_MEM_free(s->init_buf); 327 s->init_buf=NULL; 373 p=(unsigned char *)s->init_buf->data; 417 p=(unsigned char *)s->init_buf->data; 418 if (s->init_buf->length < SSL2_MAX_RECORD_LENGTH_3_BYTE_HEADER) 538 p=(unsigned char *)s->init_buf->data; 573 p=(unsigned char *)s->init_buf->data; 702 p=(unsigned char *)s->init_buf [all...] |
H A D | s23_pkt.c | 71 buf=s->init_buf->data;
|
H A D | s23_srvr.c | 177 if (s->init_buf == NULL) 189 s->init_buf=buf; 418 d=(unsigned char *)s->init_buf->data; 462 i = (d-(unsigned char *)s->init_buf->data) - 4; 465 /* get the data reused from the init_buf */ 494 if (!BUF_MEM_grow_clean(s->init_buf,
|
H A D | s2_clnt.c | 183 buf=s->init_buf; 192 if (buf == s->init_buf) 197 s->init_buf=buf; 284 if (s->init_buf != NULL) 286 BUF_MEM_free(s->init_buf); 287 s->init_buf=NULL; 340 buf=(unsigned char *)s->init_buf->data; 550 buf=(unsigned char *)s->init_buf->data; 620 buf=(unsigned char *)s->init_buf->data; 729 p=(unsigned char *)s->init_buf [all...] |
H A D | s23_clnt.c | 131 if (s->init_buf == NULL) 143 s->init_buf=buf; 227 buf=(unsigned char *)s->init_buf->data; 407 s->msg_callback(1, SSL2_VERSION, 0, s->init_buf->data+2, ret-2, s, s->msg_callback_arg); 409 s->msg_callback(1, version, SSL3_RT_HANDSHAKE, s->init_buf->data+5, ret-5, s, s->msg_callback_arg); 468 if (!BUF_MEM_grow_clean(s->init_buf,
|
H A D | d1_srvr.c | 197 if (s->init_buf == NULL) 209 s->init_buf=buf; 522 BUF_MEM_free(s->init_buf); 523 s->init_buf=NULL; 597 p=(unsigned char *)s->init_buf->data; 620 buf = (unsigned char *)s->init_buf->data; 667 buf=(unsigned char *)s->init_buf->data; 742 p=(unsigned char *)s->init_buf->data; 789 buf=s->init_buf; 912 d=(unsigned char *)s->init_buf [all...] |
H A D | d1_clnt.c | 194 if (s->init_buf == NULL) 206 s->init_buf=buf; 460 if (s->init_buf != NULL) 462 BUF_MEM_free(s->init_buf); 463 s->init_buf=NULL; 534 buf=(unsigned char *)s->init_buf->data; 698 d=(unsigned char *)s->init_buf->data; 998 d=(unsigned char *)s->init_buf->data;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | s3_both.c | 128 * send s->init_buf in records of type 'type' (SSL3_RT_HANDSHAKE or 135 ret = ssl3_write_bytes(s, type, &s->init_buf->data[s->init_off], 144 ssl3_finish_mac(s, (unsigned char *)&s->init_buf->data[s->init_off], 149 s->msg_callback(1, s->version, type, s->init_buf->data, 310 p = (unsigned char *)s->init_buf->data; 359 s->init_msg = s->init_buf->data + 4; 364 p = (unsigned char *)s->init_buf->data; 423 if (l && !BUF_MEM_grow_clean(s->init_buf, (int)l + 4)) { 430 s->init_msg = s->init_buf->data + 4; 454 if (*s->init_buf [all...] |
H A D | s2_srvr.c | 190 if (s->init_buf == NULL) { 201 s->init_buf = buf; 334 BUF_MEM_free(s->init_buf); 336 s->init_buf = NULL; 386 p = (unsigned char *)s->init_buf->data; 428 p = (unsigned char *)s->init_buf->data; 429 if (s->init_buf->length < SSL2_MAX_RECORD_LENGTH_3_BYTE_HEADER) { 579 p = (unsigned char *)s->init_buf->data; 618 p = (unsigned char *)s->init_buf->data; 747 p = (unsigned char *)s->init_buf [all...] |
H A D | s23_pkt.c | 71 buf = s->init_buf->data;
|
H A D | s2_clnt.c | 182 buf = s->init_buf; 188 if (buf == s->init_buf) 193 s->init_buf = buf; 285 if (s->init_buf != NULL) { 286 BUF_MEM_free(s->init_buf); 287 s->init_buf = NULL; 342 buf = (unsigned char *)s->init_buf->data; 542 buf = (unsigned char *)s->init_buf->data; 606 buf = (unsigned char *)s->init_buf->data; 709 p = (unsigned char *)s->init_buf [all...] |
H A D | s23_srvr.c | 185 if (s->init_buf == NULL) { 195 s->init_buf = buf; 473 d = (unsigned char *)s->init_buf->data; 532 i = (d - (unsigned char *)s->init_buf->data) - 4; 535 /* get the data reused from the init_buf */ 564 if (!BUF_MEM_grow_clean(s->init_buf,
|
H A D | s23_clnt.c | 189 if (s->init_buf == NULL) { 198 s->init_buf = buf; 376 buf = (unsigned char *)s->init_buf->data; 603 s->msg_callback(1, SSL2_VERSION, 0, s->init_buf->data + 2, 606 s->msg_callback(1, version, SSL3_RT_HEADER, s->init_buf->data, 5, 609 s->init_buf->data + 5, ret - 5, s, 674 if (!BUF_MEM_grow_clean(s->init_buf,
|
H A D | d1_both.c | 261 * send s->init_buf in records of type 'type' (SSL3_RT_HANDSHAKE or 388 (unsigned char *)&s->init_buf-> 392 ret = dtls1_write_bytes(s, type, &s->init_buf->data[s->init_off], 427 (unsigned char *)&s->init_buf->data[s->init_off]; 453 s->msg_callback(1, s->version, type, s->init_buf->data, 503 s->init_msg = s->init_buf->data + DTLS1_HM_HEADER_LENGTH; 526 p = (unsigned char *)s->init_buf->data; 551 s->init_msg = s->init_buf->data + DTLS1_HM_HEADER_LENGTH; 586 (s->init_buf, msg_len + DTLS1_HM_HEADER_LENGTH)) { 613 * (1) copy over the fragment to s->init_buf [all...] |
H A D | d1_clnt.c | 240 if (s->init_buf == NULL) { 251 s->init_buf = buf; 739 if (s->init_buf != NULL) { 740 BUF_MEM_free(s->init_buf); 741 s->init_buf = NULL;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | s3_both.c | 128 * send s->init_buf in records of type 'type' (SSL3_RT_HANDSHAKE or 135 ret = ssl3_write_bytes(s, type, &s->init_buf->data[s->init_off], 144 ssl3_finish_mac(s, (unsigned char *)&s->init_buf->data[s->init_off], 149 s->msg_callback(1, s->version, type, s->init_buf->data, 310 p = (unsigned char *)s->init_buf->data; 359 s->init_msg = s->init_buf->data + 4; 364 p = (unsigned char *)s->init_buf->data; 423 if (l && !BUF_MEM_grow_clean(s->init_buf, (int)l + 4)) { 430 s->init_msg = s->init_buf->data + 4; 454 if (*s->init_buf [all...] |
H A D | s2_srvr.c | 190 if (s->init_buf == NULL) { 201 s->init_buf = buf; 334 BUF_MEM_free(s->init_buf); 336 s->init_buf = NULL; 386 p = (unsigned char *)s->init_buf->data; 428 p = (unsigned char *)s->init_buf->data; 429 if (s->init_buf->length < SSL2_MAX_RECORD_LENGTH_3_BYTE_HEADER) { 579 p = (unsigned char *)s->init_buf->data; 618 p = (unsigned char *)s->init_buf->data; 747 p = (unsigned char *)s->init_buf [all...] |
H A D | s23_pkt.c | 71 buf = s->init_buf->data;
|
H A D | s2_clnt.c | 182 buf = s->init_buf; 188 if (buf == s->init_buf) 193 s->init_buf = buf; 285 if (s->init_buf != NULL) { 286 BUF_MEM_free(s->init_buf); 287 s->init_buf = NULL; 342 buf = (unsigned char *)s->init_buf->data; 542 buf = (unsigned char *)s->init_buf->data; 606 buf = (unsigned char *)s->init_buf->data; 709 p = (unsigned char *)s->init_buf [all...] |
H A D | s23_srvr.c | 185 if (s->init_buf == NULL) { 195 s->init_buf = buf; 473 d = (unsigned char *)s->init_buf->data; 532 i = (d - (unsigned char *)s->init_buf->data) - 4; 535 /* get the data reused from the init_buf */ 564 if (!BUF_MEM_grow_clean(s->init_buf,
|
H A D | s23_clnt.c | 189 if (s->init_buf == NULL) { 198 s->init_buf = buf; 376 buf = (unsigned char *)s->init_buf->data; 603 s->msg_callback(1, SSL2_VERSION, 0, s->init_buf->data + 2, 606 s->msg_callback(1, version, SSL3_RT_HEADER, s->init_buf->data, 5, 609 s->init_buf->data + 5, ret - 5, s, 674 if (!BUF_MEM_grow_clean(s->init_buf,
|
H A D | d1_both.c | 261 * send s->init_buf in records of type 'type' (SSL3_RT_HANDSHAKE or 388 (unsigned char *)&s->init_buf-> 392 ret = dtls1_write_bytes(s, type, &s->init_buf->data[s->init_off], 427 (unsigned char *)&s->init_buf->data[s->init_off]; 453 s->msg_callback(1, s->version, type, s->init_buf->data, 503 s->init_msg = s->init_buf->data + DTLS1_HM_HEADER_LENGTH; 526 p = (unsigned char *)s->init_buf->data; 551 s->init_msg = s->init_buf->data + DTLS1_HM_HEADER_LENGTH; 586 (s->init_buf, msg_len + DTLS1_HM_HEADER_LENGTH)) { 613 * (1) copy over the fragment to s->init_buf [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/media/dvb/dvb-usb/ |
H A D | digitv.c | 100 static u8 init_buf[] = { 0x68, 0xa0, 0x8e, 0x40, 0x53, 0x50, local 111 for (i = 0; i < ARRAY_SIZE(init_buf); i += 2) 112 mt352_write(fe, &init_buf[i], 2);
|