/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/ |
H A D | pingpong.c | 332 enum protection_level prot = conn->data_prot; local 339 DEBUGASSERT(prot > PROT_NONE && prot < PROT_LAST); 340 conn->data_prot = prot;
|
H A D | transfer.c | 1607 char prot[16]; /* URL protocol string storage */ local 1610 return (2 == sscanf(url, "%15[^?&/:]://%c", prot, &letter)) ? TRUE : FALSE;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/dnsmasq-2.15/src/ |
H A D | cache.c | 332 struct crec *cache_find_by_name(struct crec *crecp, char *name, time_t now, unsigned short prot) argument 351 (crecp->flags & prot) && 401 (ans->flags & prot) && 409 time_t now, unsigned short prot) 413 int addrlen = (prot == F_IPV6) ? IN6ADDRSZ : INADDRSZ; 432 (crecp->flags & prot) && 463 (ans->flags & prot) && 408 cache_find_by_addr(struct crec *crecp, struct all_addr *addr, time_t now, unsigned short prot) argument
|
H A D | dnsmasq.h | 391 unsigned short prot); 393 char *name, time_t now, unsigned short prot);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iproute2/ip/ |
H A D | iproute.c | 832 __u32 prot; local 834 if (rtnl_rtprot_a2n(&prot, *argv)) 836 req.r.rtm_protocol = prot; 1035 __u32 prot = 0; local 1038 if (rtnl_rtprot_a2n(&prot, *argv)) { 1041 prot = 0; 1044 filter.protocol = prot;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iproute2/misc/ |
H A D | ss.c | 2050 int prot; local 2068 &type, &prot, &iface, &state, 2081 tst.local.data[0] = prot; 2093 if (prot == 3) { 2098 ll_proto_n2a(htons(prot), tb, sizeof(tb))); 2126 int prot, pid; local 2141 &prot, &pid, &groups, &rq, &wq, &cb, &rc); 2149 tst.local.data[0] = prot; 2160 if (resolve_services && prot == 0) 2162 else if (resolve_services && prot [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/ffmpeg-0.5.1/libavformat/ |
H A D | avio.c | 33 if(h->prot) return h->prot->name; 86 uc->prot = up; 148 ret = h->prot->url_read(h, buf, size); 160 ret = h->prot->url_write(h, buf, size); 168 if (!h->prot->url_seek) 170 ret = h->prot->url_seek(h, pos, whence); 179 if (h->prot->url_close) 180 ret = h->prot->url_close(h); 234 if (!h->prot [all...] |
H A D | avio.h | 48 struct URLProtocol *prot; member in struct:URLContext
|
H A D | aviobuf.c | 560 if(h->prot) { 561 (*s)->read_pause = (int (*)(void *, int))h->prot->url_read_pause; 562 (*s)->read_seek = (int64_t (*)(void *, int, int64_t, int))h->prot->url_read_seek;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/include/libavformat/ |
H A D | avio.h | 48 struct URLProtocol *prot; member in struct:URLContext
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/test/ |
H A D | testca.com | 15 $ set file/prot=(S:RWED,O:RWED,G:RWED,W:RWED) demoCA.dir;* 42 $ set file/prot=(S:RWED,O:RWED,G:RWED,W:RWED) demoCA.dir;* 68 $ set file/prot=(S:RWED,O:RWED,G:RWED,W:RWED) '_fp'
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ppp-2.4.4/pppd/ |
H A D | auth.c | 1014 const char *prot = ""; local 1019 prot = "CHAP"; 1038 prot = "PAP"; 1042 prot = "EAP"; 1049 notice("%s authentication succeeded", prot);
|
H A D | lcp.c | 557 u_short prot; local 565 GETSHORT(prot, inp); 576 pname = protocol_name(prot); 582 if (protp->protocol == prot && protp->enabled_flag) { 584 dbglog("Protocol-Reject for 0x%x received", prot); 587 prot); 593 warn("Protocol-Reject for unsupported protocol 0x%x", prot); 596 prot);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/include/ |
H A D | includes.h | 337 #include <prot.h> 373 * Check for AUTH_ERROR define conflict with rpc/rpc.h in prot.h.
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/ |
H A D | cliconnect.c | 28 int prot; member in struct:__anon1672 1035 prots[numprots].name && prots[numprots].prot<=cli->protocol; 1067 prots[numprots].name && prots[numprots].prot<=cli->protocol; 1075 prots[numprots].name && prots[numprots].prot<=cli->protocol; 1097 cli->protocol = prots[SVAL(cli->inbuf,smb_vwv0)].prot;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/smbd/ |
H A D | msdfs.c | 169 char* prot; local 176 prot = strtok(temp,":"); 178 if (!strequal(prot, "msdfs"))
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/db-4.7.25.NC/os/ |
H A D | os_map.c | 429 int flags, prot, ret; local 486 prot = PROT_READ | (is_rdonly ? 0 : PROT_WRITE); 511 len, prot, flags, fhp->fd, (off_t)0)) == (void *)MAP_FAILED) {
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/gettext-0.17/gettext-runtime/intl/ |
H A D | loadmsgcat.c | 471 # define mmap(addr, len, prot, flags, fd, offset) \ 472 __mmap (addr, len, prot, flags, fd, offset)
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/afpd/ |
H A D | main.c | 47 #include <prot.h>
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/etc/uams/uams_krb4/ |
H A D | kuam.c | 17 #include <prot.h>
|
H A D | send_to_kdc.c | 30 #include <prot.h>
|
H A D | uams_krb4.c | 47 #include <prot.h>
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/libatalk/adouble/ |
H A D | ad_mmap.c | 22 static void *ad_mmap(const size_t length, const int prot, argument 26 return mmap(0, length, prot, flags, fd, offset);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/afpd/ |
H A D | main.c | 47 #include <prot.h>
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/uams_krb4/ |
H A D | kuam.c | 17 #include <prot.h>
|