Searched refs:header (Results 1 - 25 of 841) sorted by path

1234567891011>>

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/IGMP-PROXY/
H A Dconfig.status290 --header=FILE[:TEMPLATE]
291 instantiate the configuration header FILE
339 # Conflict between --help and --header
353 --header | --heade | --head | --hea )
H A Dconfigure827 --includedir=DIR C header files [PREFIX/include]
828 --oldincludedir=DIR C header files for non-gcc [/usr/include]
2020 # breaks some systems' header files.
2456 # Use a header file that comes with gcc, so configuring glibc
2563 # Use a header file that comes with gcc, so configuring glibc
2685 echo "$as_me:$LINENO: checking for ANSI C header files" >&5
2686 echo $ECHO_N "checking for ANSI C header files... $ECHO_C" >&6
3010 # Is the header compilable?
3054 # Is the header present?
3094 # So? What about this header
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/
H A Dconfigure1491 --includedir=DIR C header files [PREFIX/include]
1492 --oldincludedir=DIR C header files for non-gcc [/usr/include]
1626 Specify location of GSSAPI header
2201 # Is the header compilable?
2218 # Is the header present?
2234 # So? What about this header?
4728 # Use a header file that comes with gcc, so configuring glibc
4787 # Use a header file that comes with gcc, so configuring glibc
4975 { $as_echo "$as_me:${as_lineno-$LINENO}: checking for ANSI C header files" >&5
4976 $as_echo_n "checking for ANSI C header file
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/
H A Dcookie.h62 Set-Cookie header)"
75 * are only used if the header boolean is TRUE.
79 struct CookieInfo *, bool header, char *lineptr,
H A Dcurl_ntlm.c65 const char *header) /* rest of the www-authenticate:
66 header */
81 while(*header && ISSPACE(*header))
82 header++;
84 if(checkprefix("NTLM", header)) {
85 header += strlen("NTLM");
87 while(*header && ISSPACE(*header))
88 header
63 Curl_input_ntlm(struct connectdata *conn, bool proxy, const char *header) argument
[all...]
H A Dcurl_ntlm.h29 /* this is for ntlm header input */
31 const char *header);
33 /* this is for creating ntlm header output */
H A Dcurl_ntlm_msgs.c225 * header [in] - Pointer to the input buffer.
231 const char* header,
262 error = Curl_base64_decode(header, &buffer, &size);
295 fprintf(stderr, "**** TYPE2 header flags=0x%08.8lx ", ntlm->flags);
300 fprintf(stderr, "**** Header %s\n ", header);
538 fprintf(stderr, "* TYPE1 header flags=0x%02.2x%02.2x%02.2x%02.2x "
786 lmrespoff = 64; /* size of the message header */
890 fprintf(stderr, "**** TYPE3 header lmresp=");
230 Curl_ntlm_decode_type2_message(struct SessionHandle *data, const char* header, struct ntlmdata* ntlm) argument
H A Dcurl_ntlm_msgs.h46 const char* header,
H A Dformdata.c1025 part of the header! */
1371 * request-header part (which is not part of the request-body like the rest of
1376 char *header; local
1382 header = form->data->line;
1387 return header;
H A Dhttp.c158 * particular header (prefix).
160 * Returns a pointer to the first matching header or NULL if none matched.
176 * given HTTP header line and return a strdupped copy. Returns NULL in
177 * case of allocation failure. Returns an empty string if the header value
189 /* Find the end of the header name */
230 * http_output_basic() sets up an Authorization: header (or the proxy version)
506 * Output the correct authentication header depending on the auth type
654 /* Send proxy authentication header if needed */
693 const char *header) /* the first non-space */
705 start = header
691 Curl_http_input_auth(struct connectdata *conn, int httpcode, const char *header) argument
1249 Curl_compareheader(const char *headerline, const char *header, const char *content) argument
[all...]
H A Dhttp.h34 const char *header, /* header keyword _with_ colon */
79 int httpcode, const char *header);
86 public curl/curl.h header. */
H A Dhttp_digest.c126 const char *header) /* rest of the *-authenticate:
127 header */
145 while(*header && ISSPACE(*header))
146 header++;
148 if(checkprefix("Digest", header)) {
149 header += strlen("Digest");
162 while(*header && ISSPACE(*header))
163 header
124 Curl_input_digest(struct connectdata *conn, bool proxy, const char *header) argument
[all...]
H A Dhttp_digest.h41 /* this is for digest header input */
43 bool proxy, const char *header);
45 /* this is for creating digest header output */
H A Dhttp_negotiate.c133 const char *header)
148 while(*header && ISSPACE(*header))
149 header++;
150 if(checkprefix("GSS-Negotiate", header)) {
154 else if(checkprefix("Negotiate", header)) {
183 header += strlen(neg_ctx->protocol);
184 while(*header && ISSPACE(*header))
185 header
132 Curl_input_negotiate(struct connectdata *conn, bool proxy, const char *header) argument
[all...]
H A Dhttp_negotiate.h27 /* this is for Negotiate header input */
29 const char *header);
31 /* this is for creating Negotiate header output */
H A Dhttp_negotiate_sspi.c81 const char *header)
99 while(*header && ISSPACE(*header))
100 header++;
102 if(checkprefix("GSS-Negotiate", header)) {
106 else if(checkprefix("Negotiate", header)) {
152 header += strlen(neg_ctx->protocol);
153 while(*header && ISSPACE(*header))
154 header
80 Curl_input_negotiate(struct connectdata *conn, bool proxy, const char *header) argument
[all...]
H A Drtsp.c357 "Refusing to issue an RTSP SETUP without a Transport: header.");
370 /* Accept-Encoding header */
385 it might have been used in the proxy connect, but if we have got a header
427 failf(data, "CSeq cannot be set as a custom header.");
431 failf(data, "Session ID cannot be set as a custom header.");
624 /* Parse the header */
638 * Write out the header including the leading '$' */
664 /* Need more - incomplete header */
743 char *header)
748 if(checkprefix("CSeq:", header)) {
742 Curl_rtsp_parseheader(struct connectdata *conn, char *header) argument
[all...]
H A Drtsp.h30 CURLcode Curl_rtsp_parseheader(struct connectdata *conn, char *header);
H A Dtransfer.c398 if(k->size != -1 && !k->header) {
462 if(k->header) {
463 /* we are in parse-the-header-mode */
504 /* This is not an 'else if' since it may be a rest from the header
507 if(k->str && !k->header && (nread > 0 || is_empty_data)) {
622 /* Account for body content stored in the header buffer */
672 /* we parsed a piece of data wrongly assuming it was a header
700 Content-Encoding header. See Curl_readwrite_init; the
744 } /* if(! header and data to read ) */
824 go into the Expect: 100 state and await such a header */
[all...]
H A Durl.c894 * Set to include the header in the general data output stream.
1023 * curl/curl.h header file.
1052 * String to use at the value of Accept-Encoding header.
1054 * If the encoding is set to "" we use an Accept-Encoding header that
1056 * If the encoding is set to NULL we don't send an Accept-Encoding header
1057 * and ignore an received Content-Encoding header.
1072 * Follow Location: header hints on a HTTP-server.
1252 * Set a list of aliases for HTTP 200 in response header
1538 * Custom pointer to pass the header write callback function
1830 * Set header writ
[all...]
H A Durldata.h374 need to send our header */
429 that we are creating a request with an auth header,
490 ZLIB_GZIP_HEADER, /* reading gzip header */
519 EXP100_AWAITING_CONTINUE, /* waiting for the 100 Continue header */
521 the 100 header once done with the request */
552 bool header; /* incoming data has HTTP header */ member in struct:SingleRequest
554 HEADER_NORMAL, /* no bad header at all */
555 HEADER_PARTHEADER, /* part of the chunk is a bad header, the rest
557 HEADER_ALLBAD /* all was believed to be header */
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/dnsmasq-2.15/src/
H A Ddhcp.c344 struct ether_header header; local
346 header.ether_type = htons(ETHERTYPE_IP);
347 memcpy(header.ether_shost, iface_hwaddr, ETHER_ADDR_LEN);
348 memcpy(header.ether_dhost, hwdest, ETHER_ADDR_LEN);
352 iov[0].iov_base = (char *)&header;
H A Ddnsmasq.h405 unsigned short extract_request(HEADER *header, unsigned int qlen,
407 int setup_reply(HEADER *header, unsigned int qlen,
410 void extract_addresses(HEADER *header, unsigned int qlen, char *namebuff,
412 void extract_neg_addrs(HEADER *header, unsigned int qlen, char *namebuff, time_t now, unsigned short flags);
413 int answer_request(HEADER *header, char *limit, unsigned int qlen, struct daemon *daemon, time_t now);
414 int check_for_bogus_wildcard(HEADER *header, unsigned int qlen, char *name,
416 unsigned char *find_pseudoheader(HEADER *header, unsigned int plen,
419 int resize_packet(HEADER *header, unsigned int plen,
H A Dforward.c146 static void private_domain_check(HEADER *header, int n, char *namebuff)
151 extract_set_addr(header, n);
156 static void private_domain_check(HEADER *header, int n, char *namebuff) argument
162 if ( NULL == header )
164 p= (char *)header + sizeof(HEADER);
181 extract_set_addr(header, n);
372 static int add_device_id(struct daemon *daemon, HEADER *header, size_t plen, unsigned char *pheader, argument
381 unsigned char *p = (unsigned char *)header;
393 header->arcount = htons(ntohs(header
426 forward_query(struct daemon *daemon, int udpfd, union mysockaddr *udpaddr, struct all_addr *dst_addr, unsigned int dst_iface, HEADER *header, size_t plen, time_t now, struct frec *forward) argument
766 process_reply(struct daemon *daemon, HEADER *header, time_t now, union mysockaddr *serveraddr, unsigned int n, int discard_pseudoheader) argument
873 HEADER *header; local
988 HEADER *header = (HEADER *)daemon->packet; local
1195 HEADER *header; local
[all...]
H A Drfc1035.c15 static int extract_name(HEADER *header, unsigned int plen, unsigned char **pp, argument
27 if (p - (unsigned char *)header + 1u >= plen)
43 p = l + (unsigned char *)header;
65 if (p - (unsigned char *)header + ((count-1)>>3) + 1u >= plen)
89 if (p - (unsigned char *)header + 1u >= plen)
125 if ((unsigned int)(p - (unsigned char *)header) >= plen)
247 static unsigned char *skip_name(unsigned char *ansp, HEADER *header, unsigned int plen) argument
253 if ((unsigned int)(ansp - (unsigned char *)header) >= plen)
292 static unsigned char *skip_questions(HEADER *header, unsigned int plen) argument
294 int q, qdcount = ntohs(header
309 resize_packet(HEADER *header, unsigned int plen, unsigned char *pheader, unsigned int hlen) argument
343 find_pseudoheader(HEADER *header, unsigned int plen, unsigned int *len, unsigned char **p) argument
441 extract_neg_addrs(HEADER *header, unsigned int qlen, char *name, time_t now, unsigned short flags) argument
531 dns_doctor(HEADER *header, struct doctor *doctor, struct in_addr *addr) argument
545 extract_addresses(HEADER *header, unsigned int qlen, char *name, time_t now, struct doctor *doctors) argument
690 extract_request(HEADER *header,unsigned int qlen, char *name, unsigned short *typep) argument
724 setup_reply(HEADER *header, unsigned int qlen, struct all_addr *addrp, unsigned short flags, unsigned long ttl) argument
795 check_for_bogus_wildcard(HEADER *header, unsigned int qlen, char *name, struct bogus_addr *baddr, time_t now) argument
843 answer_request(HEADER *header, char *limit, unsigned int qlen, struct daemon *daemon, time_t now) argument
1180 extract_set_addr(HEADER *header, unsigned int qlen) argument
[all...]

Completed in 237 milliseconds

1234567891011>>