/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/IGMP-PROXY/ |
H A D | configure | 3929 or more and with at least one buffer not starting on a 4-byte boundary.
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/IGMP-PROXY/src/ |
H A D | igmpv3.c | 920 /* Allocate a buffer to build the query */ 1824 int emf_cfg_request_send_down(emf_cfg_request_t *buffer, int length) argument 1832 if ((buffer == NULL) || (length > MAX_DATA_SIZE)) 1834 fprintf(stderr, "Invalid parameters %p %d\n", buffer, length); 1865 fprintf(stderr, "Out of memory allocating cfg buffer\n"); 1878 memcpy(NLMSG_DATA(nlh), buffer, length); local 1910 /* Copy data to user buffer */ 1911 memcpy(buffer, NLMSG_DATA(nlh), length);
|
H A D | proxy.c | 21 char buffer[IP_MSFILTER_SIZE(MAX_ADDRS)]; variable 44 imsfp = (struct ip_msfilter *) &buffer;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/bftpd-1.6.6/ |
H A D | commands.c | 82 char buffer[256]; local 85 vsnprintf(buffer, sizeof(buffer), format, val); 92 fprintf(stderr, "%s\r\n", buffer); 94 strcat(buffer, "\r\n"); 95 fprintf(stderr, "%s", buffer); 97 replace(buffer, "\r", ""); 98 bftpd_statuslog(3, success, "%s", buffer); 130 /* because open 15 sessions to downlod that caused system crash, set smaller sending buffer */ 676 memset(filename, 0, MAXCMD); /* clear filename buffer */ 696 char *buffer; local 1098 char *buffer; local [all...] |
H A D | commands_admin.c | 39 char buffer[256]; local 56 while (fgets(buffer, sizeof(buffer), stdin)) { 57 admin_parsecmd(buffer); 71 char buffer[256]; local 76 while (fgets(buffer, sizeof(buffer), mystatuslog)) 78 fprintf(stderr, "%s", buffer); 84 if (!fgets(buffer, sizeof(buffer), stdi [all...] |
H A D | logging.c | 72 char buffer[1024]; local 74 vsnprintf(buffer, sizeof(buffer), format, val); 78 buffer); 92 char buffer[1024], timestr[40]; local 95 vsnprintf(buffer, sizeof(buffer), format, val); 103 (int) getpid(), buffer); 108 syslog(LOG_DAEMON | LOG_INFO, "%s", buffer);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/bzip2/ |
H A D | bzip2recover.c | 146 Int32 buffer; member in struct:__anon6 159 bs->buffer = 0; 172 bs->buffer = 0; 183 Int32 retVal = putc ( (UChar) bs->buffer, bs->handle ); 187 bs->buffer = bit & 0x1; 189 bs->buffer = ( (bs->buffer << 1) | (bit & 0x1) ); 203 return ( ((bs->buffer) >> (bs->buffLive)) & 0x1 ); 211 bs->buffer = retVal; 212 return ( ((bs->buffer) >> [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/CMake/ |
H A D | CurlTests.c | 128 char buffer[8192]; local 136 buffer, 8192, &h_errnop); 153 char buffer[8192]; local 161 buffer, 8192, &h_errnop); 177 char buffer[8192]; local 186 buffer, 8192, &hp, &h_errnop); 203 char buffer[8192]; local 212 buffer, 8192, &hp, &h_errnop); 688 char buffer[1024]; /* big enough to play with */ local 690 strerror_r(EACCES, buffer, sizeo 702 char buffer[1024]; /* big enough to play with */ local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/ |
H A D | configure | 7897 # (any single argument exceeding 2000 bytes causes a buffer overrun 34285 char buffer[1024]; 34287 buffer[0] = '\0'; 34288 string = strerror_r(EACCES, buffer, sizeof(buffer)); 34388 char buffer[1024]; 34390 buffer[0] = '\0'; 34391 error = strerror_r(EACCES, buffer, sizeof(buffer)); 34394 if(buffer[ [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/docs/examples/ |
H A D | fopen.c | 70 char *buffer; /* buffer to store cached data*/ member in struct:fcurl_data 72 size_t buffer_pos; /* end of data in buffer*/ 90 static size_t write_callback(char *buffer, argument 101 rembuff=url->buffer_len - url->buffer_pos; /* remaining space in buffer */ 104 /* not enough space in buffer */ 105 newbuff=realloc(url->buffer,url->buffer_len + (size - rembuff)); 107 fprintf(stderr,"callback buffer grow failed\n"); 111 /* realloc suceeded increase buffer size*/ 113 url->buffer 440 char buffer[256]; local [all...] |
H A D | ftpget.c | 38 static size_t my_fwrite(void *buffer, size_t size, size_t nmemb, void *stream) argument 47 return fwrite(buffer, size, nmemb, out->stream);
|
H A D | htmltitle.cc | 64 static std::string buffer; variable 101 fprintf(stderr, "Failed to set error buffer [%d]\n", code); 130 code = curl_easy_setopt(conn, CURLOPT_WRITEDATA, &buffer); 306 parseHtml(buffer, title);
|
H A D | sampleconv.c | 42 CURLcode my_conv_from_ascii_to_ebcdic(char *buffer, size_t length) argument 47 tempptrin = tempptrout = buffer; 56 CURLcode my_conv_from_ebcdic_to_ascii(char *buffer, size_t length) argument 61 tempptrin = tempptrout = buffer; 70 CURLcode my_conv_from_utf8_to_ebcdic(char *buffer, size_t length) argument 75 tempptrin = tempptrout = buffer;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/include/curl/ |
H A D | curl.h | 139 char *buffer; /* pointer to allocated buffer contents */ member in struct:curl_httppost 140 long bufferlength; /* length of buffer field */ 153 #define HTTPPOST_BUFFER (1<<4) /* upload file from buffer */ 174 /* Tests have proven that 20K is a very bad buffer size for uploads on 178 400 bytes since libcurl uses a buffer of this size as a scratch area 194 typedef size_t (*curl_write_callback)(char *buffer, 306 typedef size_t (*curl_read_callback)(char *buffer, 574 typedef CURLcode (*curl_conv_callback)(char *buffer, size_t length); 1093 /* Instruct libcurl to use a smaller receive buffer */ [all...] |
H A D | easy.h | 84 CURL_EXTERN CURLcode curl_easy_recv(CURL *curl, void *buffer, size_t buflen, 95 CURL_EXTERN CURLcode curl_easy_send(CURL *curl, const void *buffer,
|
H A D | mprintf.h | 36 CURL_EXTERN int curl_msprintf(char *buffer, const char *format, ...); 37 CURL_EXTERN int curl_msnprintf(char *buffer, size_t maxlength, 41 CURL_EXTERN int curl_mvsprintf(char *buffer, const char *format, va_list args); 42 CURL_EXTERN int curl_mvsnprintf(char *buffer, size_t maxlength,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/ |
H A D | axtls.c | 391 char buf[120]; /* We will use this for the OpenSSL error buffer, so it has 492 size_t Curl_axtls_version(char *buffer, size_t size) argument 494 return snprintf(buffer, size, "axTLS/%s", ssl_version());
|
H A D | axtls.h | 42 size_t Curl_axtls_version(char *buffer, size_t size);
|
H A D | config-win32ce.h | 438 extern int stat(const char *path,struct stat *buffer );
|
H A D | curl_ntlm_msgs.c | 189 * Argument is a pointer to a 4 byte buffer. 205 A 'security buffer' represents a triplet used to point to a buffer, 208 1. A 'short' containing the length of the buffer content in bytes. 209 2. A 'short' containing the allocated space for the buffer in bytes. 210 3. A 'long' containing the offset to the start of the buffer in bytes, 225 * header [in] - Pointer to the input buffer. 244 12 Target Name security buffer 248 (40) Target Information security buffer (*) 255 unsigned char *buffer local [all...] |
H A D | cyassl.c | 395 size_t Curl_cyassl_version(char *buffer, size_t size) argument 398 return snprintf(buffer, size, "CyaSSL/%s", CYASSL_VERSION); 400 return snprintf(buffer, size, "CyaSSL/%s", "<1.8.8");
|
H A D | cyassl.h | 40 size_t Curl_cyassl_version(char *buffer, size_t size);
|
H A D | easy.c | 608 * the likeliness of us forgetting to init a buffer here in the future. 751 /* we have a buffer for sending that we now seem to be able to deliver 770 have more data than that in our buffer here, we must loop sending the 774 A tricky part is that the function we call will "buffer" the data 775 itself when it pauses on a particular buffer, so we may need to do some 855 CURLcode curl_easy_recv(CURL *curl, void *buffer, size_t buflen, size_t *n) argument 868 ret = Curl_read(c, sfd, buffer, buflen, &n1); 882 CURLcode curl_easy_send(CURL *curl, const void *buffer, size_t buflen, argument 896 ret = Curl_write(c, sfd, buffer, buflen, &n1);
|
H A D | file.c | 316 char *buf = data->state.buffer; 452 char *buf = data->state.buffer; 489 snprintf(buf, sizeof(data->state.buffer), 502 struct tm buffer; local 503 const struct tm *tm = &buffer; 504 result = Curl_gmtime(filetime, &buffer); 571 /* Don't fill a whole buffer if we want less than all data */
|
H A D | formdata.c | 58 static size_t readfromfile(struct Form *form, char *buffer, size_t size); 80 char *buffer, size_t bufferlength, 96 post->buffer = buffer; 223 * Copies the 'source' data to a newly allocated buffer buffer (that is 225 * the length of the buffer to be copied 234 char *buffer; local 246 buffer = malloc(length+add); 247 if(!buffer) 78 AddHttpPost(char *name, size_t namelength, char *value, size_t contentslength, char *buffer, size_t bufferlength, char *contenttype, long flags, struct curl_slist* contentHeader, char *showfilename, char *userp, struct curl_httppost *parent_post, struct curl_httppost **httppost, struct curl_httppost **last_post) argument 492 char *buffer = local 850 char buffer[8192]; local 1181 char buffer[512]; local 1280 readfromfile(struct Form *form, char *buffer, size_t size) argument 1317 Curl_FormReader(char *buffer, size_t size, size_t nitems, FILE *mydata) argument [all...] |