/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/IGMP-PROXY/ |
H A D | config.status | 290 --header=FILE[:TEMPLATE] 291 instantiate the configuration header FILE 339 # Conflict between --help and --header 353 --header | --heade | --head | --hea )
|
H A D | configure | 827 --includedir=DIR C header files [PREFIX/include] 828 --oldincludedir=DIR C header files for non-gcc [/usr/include] 2020 # breaks some systems' header files. 2456 # Use a header file that comes with gcc, so configuring glibc 2563 # Use a header file that comes with gcc, so configuring glibc 2685 echo "$as_me:$LINENO: checking for ANSI C header files" >&5 2686 echo $ECHO_N "checking for ANSI C header files... $ECHO_C" >&6 3010 # Is the header compilable? 3054 # Is the header present? 3094 # So? What about this header [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/ |
H A D | configure | 1491 --includedir=DIR C header files [PREFIX/include] 1492 --oldincludedir=DIR C header files for non-gcc [/usr/include] 1626 Specify location of GSSAPI header 2201 # Is the header compilable? 2218 # Is the header present? 2234 # So? What about this header? 4728 # Use a header file that comes with gcc, so configuring glibc 4787 # Use a header file that comes with gcc, so configuring glibc 4975 { $as_echo "$as_me:${as_lineno-$LINENO}: checking for ANSI C header files" >&5 4976 $as_echo_n "checking for ANSI C header file [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/ |
H A D | cookie.h | 62 Set-Cookie header)" 75 * are only used if the header boolean is TRUE. 79 struct CookieInfo *, bool header, char *lineptr,
|
H A D | curl_ntlm.c | 65 const char *header) /* rest of the www-authenticate: 66 header */ 81 while(*header && ISSPACE(*header)) 82 header++; 84 if(checkprefix("NTLM", header)) { 85 header += strlen("NTLM"); 87 while(*header && ISSPACE(*header)) 88 header 63 Curl_input_ntlm(struct connectdata *conn, bool proxy, const char *header) argument [all...] |
H A D | curl_ntlm.h | 29 /* this is for ntlm header input */ 31 const char *header); 33 /* this is for creating ntlm header output */
|
H A D | curl_ntlm_msgs.c | 225 * header [in] - Pointer to the input buffer. 231 const char* header, 262 error = Curl_base64_decode(header, &buffer, &size); 295 fprintf(stderr, "**** TYPE2 header flags=0x%08.8lx ", ntlm->flags); 300 fprintf(stderr, "**** Header %s\n ", header); 538 fprintf(stderr, "* TYPE1 header flags=0x%02.2x%02.2x%02.2x%02.2x " 786 lmrespoff = 64; /* size of the message header */ 890 fprintf(stderr, "**** TYPE3 header lmresp="); 230 Curl_ntlm_decode_type2_message(struct SessionHandle *data, const char* header, struct ntlmdata* ntlm) argument
|
H A D | curl_ntlm_msgs.h | 46 const char* header,
|
H A D | formdata.c | 1025 part of the header! */ 1371 * request-header part (which is not part of the request-body like the rest of 1376 char *header; local 1382 header = form->data->line; 1387 return header;
|
H A D | http.c | 158 * particular header (prefix). 160 * Returns a pointer to the first matching header or NULL if none matched. 176 * given HTTP header line and return a strdupped copy. Returns NULL in 177 * case of allocation failure. Returns an empty string if the header value 189 /* Find the end of the header name */ 230 * http_output_basic() sets up an Authorization: header (or the proxy version) 506 * Output the correct authentication header depending on the auth type 654 /* Send proxy authentication header if needed */ 693 const char *header) /* the first non-space */ 705 start = header 691 Curl_http_input_auth(struct connectdata *conn, int httpcode, const char *header) argument 1249 Curl_compareheader(const char *headerline, const char *header, const char *content) argument [all...] |
H A D | http.h | 34 const char *header, /* header keyword _with_ colon */ 79 int httpcode, const char *header); 86 public curl/curl.h header. */
|
H A D | http_digest.c | 126 const char *header) /* rest of the *-authenticate: 127 header */ 145 while(*header && ISSPACE(*header)) 146 header++; 148 if(checkprefix("Digest", header)) { 149 header += strlen("Digest"); 162 while(*header && ISSPACE(*header)) 163 header 124 Curl_input_digest(struct connectdata *conn, bool proxy, const char *header) argument [all...] |
H A D | http_digest.h | 41 /* this is for digest header input */ 43 bool proxy, const char *header); 45 /* this is for creating digest header output */
|
H A D | http_negotiate.c | 133 const char *header) 148 while(*header && ISSPACE(*header)) 149 header++; 150 if(checkprefix("GSS-Negotiate", header)) { 154 else if(checkprefix("Negotiate", header)) { 183 header += strlen(neg_ctx->protocol); 184 while(*header && ISSPACE(*header)) 185 header 132 Curl_input_negotiate(struct connectdata *conn, bool proxy, const char *header) argument [all...] |
H A D | http_negotiate.h | 27 /* this is for Negotiate header input */ 29 const char *header); 31 /* this is for creating Negotiate header output */
|
H A D | http_negotiate_sspi.c | 81 const char *header) 99 while(*header && ISSPACE(*header)) 100 header++; 102 if(checkprefix("GSS-Negotiate", header)) { 106 else if(checkprefix("Negotiate", header)) { 152 header += strlen(neg_ctx->protocol); 153 while(*header && ISSPACE(*header)) 154 header 80 Curl_input_negotiate(struct connectdata *conn, bool proxy, const char *header) argument [all...] |
H A D | rtsp.c | 357 "Refusing to issue an RTSP SETUP without a Transport: header."); 370 /* Accept-Encoding header */ 385 it might have been used in the proxy connect, but if we have got a header 427 failf(data, "CSeq cannot be set as a custom header."); 431 failf(data, "Session ID cannot be set as a custom header."); 624 /* Parse the header */ 638 * Write out the header including the leading '$' */ 664 /* Need more - incomplete header */ 743 char *header) 748 if(checkprefix("CSeq:", header)) { 742 Curl_rtsp_parseheader(struct connectdata *conn, char *header) argument [all...] |
H A D | rtsp.h | 30 CURLcode Curl_rtsp_parseheader(struct connectdata *conn, char *header);
|
H A D | transfer.c | 398 if(k->size != -1 && !k->header) { 462 if(k->header) { 463 /* we are in parse-the-header-mode */ 504 /* This is not an 'else if' since it may be a rest from the header 507 if(k->str && !k->header && (nread > 0 || is_empty_data)) { 622 /* Account for body content stored in the header buffer */ 672 /* we parsed a piece of data wrongly assuming it was a header 700 Content-Encoding header. See Curl_readwrite_init; the 744 } /* if(! header and data to read ) */ 824 go into the Expect: 100 state and await such a header */ [all...] |
H A D | url.c | 894 * Set to include the header in the general data output stream. 1023 * curl/curl.h header file. 1052 * String to use at the value of Accept-Encoding header. 1054 * If the encoding is set to "" we use an Accept-Encoding header that 1056 * If the encoding is set to NULL we don't send an Accept-Encoding header 1057 * and ignore an received Content-Encoding header. 1072 * Follow Location: header hints on a HTTP-server. 1252 * Set a list of aliases for HTTP 200 in response header 1538 * Custom pointer to pass the header write callback function 1830 * Set header writ [all...] |
H A D | urldata.h | 374 need to send our header */ 429 that we are creating a request with an auth header, 490 ZLIB_GZIP_HEADER, /* reading gzip header */ 519 EXP100_AWAITING_CONTINUE, /* waiting for the 100 Continue header */ 521 the 100 header once done with the request */ 552 bool header; /* incoming data has HTTP header */ member in struct:SingleRequest 554 HEADER_NORMAL, /* no bad header at all */ 555 HEADER_PARTHEADER, /* part of the chunk is a bad header, the rest 557 HEADER_ALLBAD /* all was believed to be header */ [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/dnsmasq-2.15/src/ |
H A D | dhcp.c | 344 struct ether_header header; local 346 header.ether_type = htons(ETHERTYPE_IP); 347 memcpy(header.ether_shost, iface_hwaddr, ETHER_ADDR_LEN); 348 memcpy(header.ether_dhost, hwdest, ETHER_ADDR_LEN); 352 iov[0].iov_base = (char *)&header;
|
H A D | dnsmasq.h | 405 unsigned short extract_request(HEADER *header, unsigned int qlen, 407 int setup_reply(HEADER *header, unsigned int qlen, 410 void extract_addresses(HEADER *header, unsigned int qlen, char *namebuff, 412 void extract_neg_addrs(HEADER *header, unsigned int qlen, char *namebuff, time_t now, unsigned short flags); 413 int answer_request(HEADER *header, char *limit, unsigned int qlen, struct daemon *daemon, time_t now); 414 int check_for_bogus_wildcard(HEADER *header, unsigned int qlen, char *name, 416 unsigned char *find_pseudoheader(HEADER *header, unsigned int plen, 419 int resize_packet(HEADER *header, unsigned int plen,
|
H A D | forward.c | 146 static void private_domain_check(HEADER *header, int n, char *namebuff) 151 extract_set_addr(header, n); 156 static void private_domain_check(HEADER *header, int n, char *namebuff) argument 162 if ( NULL == header ) 164 p= (char *)header + sizeof(HEADER); 181 extract_set_addr(header, n); 372 static int add_device_id(struct daemon *daemon, HEADER *header, size_t plen, unsigned char *pheader, argument 381 unsigned char *p = (unsigned char *)header; 393 header->arcount = htons(ntohs(header 426 forward_query(struct daemon *daemon, int udpfd, union mysockaddr *udpaddr, struct all_addr *dst_addr, unsigned int dst_iface, HEADER *header, size_t plen, time_t now, struct frec *forward) argument 766 process_reply(struct daemon *daemon, HEADER *header, time_t now, union mysockaddr *serveraddr, unsigned int n, int discard_pseudoheader) argument 873 HEADER *header; local 988 HEADER *header = (HEADER *)daemon->packet; local 1195 HEADER *header; local [all...] |
H A D | rfc1035.c | 15 static int extract_name(HEADER *header, unsigned int plen, unsigned char **pp, argument 27 if (p - (unsigned char *)header + 1u >= plen) 43 p = l + (unsigned char *)header; 65 if (p - (unsigned char *)header + ((count-1)>>3) + 1u >= plen) 89 if (p - (unsigned char *)header + 1u >= plen) 125 if ((unsigned int)(p - (unsigned char *)header) >= plen) 247 static unsigned char *skip_name(unsigned char *ansp, HEADER *header, unsigned int plen) argument 253 if ((unsigned int)(ansp - (unsigned char *)header) >= plen) 292 static unsigned char *skip_questions(HEADER *header, unsigned int plen) argument 294 int q, qdcount = ntohs(header 309 resize_packet(HEADER *header, unsigned int plen, unsigned char *pheader, unsigned int hlen) argument 343 find_pseudoheader(HEADER *header, unsigned int plen, unsigned int *len, unsigned char **p) argument 441 extract_neg_addrs(HEADER *header, unsigned int qlen, char *name, time_t now, unsigned short flags) argument 531 dns_doctor(HEADER *header, struct doctor *doctor, struct in_addr *addr) argument 545 extract_addresses(HEADER *header, unsigned int qlen, char *name, time_t now, struct doctor *doctors) argument 690 extract_request(HEADER *header,unsigned int qlen, char *name, unsigned short *typep) argument 724 setup_reply(HEADER *header, unsigned int qlen, struct all_addr *addrp, unsigned short flags, unsigned long ttl) argument 795 check_for_bogus_wildcard(HEADER *header, unsigned int qlen, char *name, struct bogus_addr *baddr, time_t now) argument 843 answer_request(HEADER *header, char *limit, unsigned int qlen, struct daemon *daemon, time_t now) argument 1180 extract_set_addr(HEADER *header, unsigned int qlen) argument [all...] |