/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/bzip2/ |
H A D | unzcrash.c | 42 uchar zbuf[M_BLOCK + 600 + (M_BLOCK / 100)]; variable 71 zbuf[byteno] ^= mask; 97 zbuf, &nZ, inbuf, nIn, 9, 0, 30 ); 107 outbuf, &nOut, zbuf, nZ, 0, 0 );
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/pkcs12/ |
H A D | p12_decr.c | 110 * if zbuf set zero buffer after use. 114 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) 139 if (zbuf) OPENSSL_cleanse(out, outlen); 146 * if zbuf set zero encoding. 151 void *obj, int zbuf) 171 if (zbuf) OPENSSL_cleanse(in, inlen); 113 PKCS12_item_decrypt_d2i(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) argument 149 PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf) argument
|
H A D | pkcs12.h | 215 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); 218 void *obj, int zbuf);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | p12_decr.c | 110 * if zbuf set zero buffer after use. 114 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) 140 if (zbuf) OPENSSL_cleanse(out, outlen); 147 * if zbuf set zero encoding. 152 void *obj, int zbuf) 172 if (zbuf) OPENSSL_cleanse(in, inlen); 113 PKCS12_item_decrypt_d2i(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf) argument 150 PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf) argument
|
H A D | pkcs12.h | 215 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); 218 void *obj, int zbuf);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/minidlna.03.14/ |
H A D | tivo_utils.c | 127 unsigned char *zbuf = pbuf; local 130 *(zbuf++) = seedRandomByte(seed);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/ffmpeg-0.5.1/libavcodec/ |
H A D | tiffenc.c | 320 uint8_t *zbuf; local 325 zbuf = av_malloc(zlen); 331 memcpy(zbuf + zn, yuv_line, bytes_per_row); 335 memcpy(zbuf + j * bytes_per_row, 339 n = encode_strip(s, zbuf, ptr, zn, s->compr); 340 av_free(zbuf);
|
H A D | tiff.c | 82 uint8_t *zbuf; unsigned long outlen; local 86 zbuf = av_malloc(outlen); 87 if(uncompress(zbuf, &outlen, src, size) != Z_OK){ 89 av_free(zbuf); 92 src = zbuf; 98 av_free(zbuf);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/ |
H A D | pkcs12.h | 215 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); 218 void *obj, int zbuf);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | pkcs12.h | 215 const char *pass, int passlen, ASN1_OCTET_STRING *oct, int zbuf); 218 void *obj, int zbuf);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/apps/ |
H A D | s_client.c | 819 { char zbuf[10240]; local 820 printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240));
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | s_client.c | 1043 { char zbuf[10240]; local 1044 printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240));
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/net/ |
H A D | bnx2.c | 2525 bnx2_gunzip(struct bnx2 *bp, u8 *zbuf, int len, void **outbuf, int *outlen) argument 2530 if ((zbuf[0] != 0x1f) || (zbuf[1] != 0x8b) || (zbuf[2] != Z_DEFLATED)) 2536 if (zbuf[3] & FNAME) 2537 while ((zbuf[n++] != 0) && (n < len)); 2539 bp->strm->next_in = zbuf + n;
|