/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | d1_pkt.c | 125 int len, int peek); 655 int dtls1_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek) argument 669 (peek && (type != SSL3_RT_APPLICATION_DATA))) 676 if ( (ret = have_handshake_fragment(s, type, buf, len, peek))) 729 * (even in 'peek' mode) */ 758 if (!peek) 1185 int len, int peek) 1195 /* peek == 0 */ 1184 have_handshake_fragment(SSL *s, int type, unsigned char *buf, int len, int peek) argument
|
H A D | s2_pkt.c | 127 static int ssl2_read_internal(SSL *s, void *buf, int len, int peek) argument 159 if (!peek)
|
H A D | s3_pkt.c | 790 int ssl3_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek) argument 802 (peek && (type != SSL3_RT_APPLICATION_DATA))) 815 /* peek == 0 */ 870 * (even in 'peek' mode) */ 899 if (!peek)
|
H A D | s3_lib.c | 2335 static int ssl3_read_internal(SSL *s, void *buf, int len, int peek) argument 2342 ret=s->method->ssl_read_bytes(s,SSL3_RT_APPLICATION_DATA,buf,len,peek); 2351 ret=s->method->ssl_read_bytes(s,SSL3_RT_APPLICATION_DATA,buf,len,peek);
|
H A D | ssl_locl.h | 795 int ssl3_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek); 838 int dtls1_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek);
|
H A D | ssl.h | 387 int peek); 735 /* callback that allows applications to peek at protocol messages */ 890 /* callback that allows applications to peek at protocol messages */ 1447 #define SSL_get0_session SSL_get_session /* just peek at pointer */
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/ |
H A D | s2_pkt.c | 127 static int ssl2_read_internal(SSL *s, void *buf, int len, int peek) argument 159 if (!peek)
|
H A D | s3_lib.c | 1728 static int ssl3_read_internal(SSL *s, void *buf, int len, int peek) argument 1735 ret=ssl3_read_bytes(s,SSL3_RT_APPLICATION_DATA,buf,len,peek); 1744 ret=ssl3_read_bytes(s,SSL3_RT_APPLICATION_DATA,buf,len,peek);
|
H A D | s3_pkt.c | 789 int ssl3_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek) argument 801 (peek && (type != SSL3_RT_APPLICATION_DATA))) 814 /* peek == 0 */ 869 * (even in 'peek' mode) */ 898 if (!peek)
|
H A D | ssl_locl.h | 562 int ssl3_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/gettext-0.17/gettext-tools/gnulib-lib/libcroco/ |
H A D | cr-tknzr.c | 151 *@param a_offset the offset of the byte to peek, the 1750 *To "peek a char" means reads the next char without consuming it.
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/gettext-0.17/gnulib-local/lib/libcroco/ |
H A D | cr-tknzr.c | 151 *@param a_offset the offset of the byte to peek, the 1750 *To "peek a char" means reads the next char without consuming it.
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/busybox-1.x/shell/ |
H A D | hush.c | 322 int (*peek) (struct in_str *); member in struct:in_str 325 #define b_peek(input) ((input)->peek(input)) 1214 i->peek = file_peek; 1226 i->peek = static_peek; 2748 /* the src parameter allows us to peek forward to a possible &n syntax 3031 /* peek ahead in the in_str to find out if we have a "&n" construct,
|
H A D | msh.c | 2354 *cp++ = c; /* c is the given "peek" char */ 2360 unget(*--cp); /* String is not a shell multiline, put peek char back */
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | ssl.h | 387 int peek); 735 /* callback that allows applications to peek at protocol messages */ 890 /* callback that allows applications to peek at protocol messages */ 1447 #define SSL_get0_session SSL_get_session /* just peek at pointer */
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/sparc/kernel/ |
H A D | head.S | 468 * will peek into our elf header and load us where 586 lda [%g0] ASI_M_MMUREGS, %g3 ! peek in the control reg
|