/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/ |
H A D | strerror.c | 621 wchar_t wbuf[256]; local 622 wbuf[0] = L'\0'; 625 LANG_NEUTRAL, wbuf, sizeof(wbuf)/sizeof(wchar_t), NULL); 626 wcstombs(buf,wbuf,max);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/l2tpd-0.69/ |
H A D | control.c | 1611 static unsigned char wbuf[MAX_RECV_SIZE]; local 1691 wbuf[pos++] = e; 1699 wbuf[pos++] = PPP_ESCAPE; 1701 wbuf[pos++] = e; 1704 wbuf[pos++] = PPP_FLAG; 1705 x = write (c->fd, wbuf, pos);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/apps/ |
H A D | s_server.c | 365 EBCDIC_OUTBUFF *wbuf; local 367 wbuf = (EBCDIC_OUTBUFF *)OPENSSL_malloc(sizeof(EBCDIC_OUTBUFF) + 1024); 368 wbuf->alloced = 1024; 369 wbuf->buff[0] = '\0'; 371 bi->ptr=(char *)wbuf; 403 EBCDIC_OUTBUFF *wbuf; local 411 wbuf=(EBCDIC_OUTBUFF *)b->ptr; 413 if (inl > (num = wbuf->alloced)) 418 OPENSSL_free(wbuf); 419 wbuf [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/ |
H A D | ssl2.h | 179 unsigned char *wbuf; member in struct:ssl2_state_st
|
H A D | ssl3.h | 335 SSL3_BUFFER wbuf; /* write IO goes into here */ member in struct:ssl3_state_st
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/ |
H A D | s2_lib.c | 284 /* wbuf needs one byte more because when using two-byte headers, 286 if ((s2->wbuf=OPENSSL_malloc( 295 if (s2->wbuf != NULL) OPENSSL_free(s2->wbuf); 311 if (s2->wbuf != NULL) OPENSSL_free(s2->wbuf); 320 unsigned char *rbuf,*wbuf; local 325 wbuf=s2->wbuf; 330 s2->wbuf [all...] |
H A D | s2_pkt.c | 601 s->s2->mac_data= &(s->s2->wbuf[3]); 602 s->s2->wact_data= &(s->s2->wbuf[3+mac_size]); 603 /* we copy the data into s->s2->wbuf */
|
H A D | s3_both.c | 621 if (s->s3->wbuf.buf == NULL) 627 s->s3->wbuf.buf = p; 628 s->s3->wbuf.len = len;
|
H A D | s3_lib.c | 1093 if (s->s3->wbuf.buf != NULL) 1094 OPENSSL_free(s->s3->wbuf.buf); 1130 wp = s->s3->wbuf.buf; 1132 wlen = s->s3->wbuf.len; 1139 s->s3->wbuf.buf = wp; 1141 s->s3->wbuf.len = wlen; 1782 (s->s3->wbuf.left == 0) &&
|
H A D | s3_pkt.c | 577 if (s->s3->wbuf.left != 0) 593 wb= &(s->s3->wbuf); 622 if (s->s3->wbuf.len < (size_t)prefix_len + SSL3_RT_MAX_PACKET_SIZE) 718 /* if s->s3->wbuf.left != 0, we need to call this */ 741 (char *)&(s->s3->wbuf.buf[s->s3->wbuf.offset]), 742 (unsigned int)s->s3->wbuf.left); 749 if (i == s->s3->wbuf.left) 751 s->s3->wbuf.left=0; 757 s->s3->wbuf [all...] |
H A D | ssl2.h | 179 unsigned char *wbuf; member in struct:ssl2_state_st
|
H A D | ssl3.h | 335 SSL3_BUFFER wbuf; /* write IO goes into here */ member in struct:ssl3_state_st
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libiconv-1.11/srclib/ |
H A D | error.c | 144 wchar_t *wbuf = (len < ALLOCA_LIMIT local 145 ? alloca (len * sizeof *wbuf) 146 : len <= SIZE_MAX / sizeof *wbuf 147 ? malloc (len * sizeof *wbuf) 150 if (wbuf) 156 res = mbsrtowcs (wbuf, &tmp, len, &st); 157 wmessage = res == (size_t) -1 ? L"???" : wbuf; 162 free (wbuf);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | s_server.c | 415 EBCDIC_OUTBUFF *wbuf; local 417 wbuf = (EBCDIC_OUTBUFF *)OPENSSL_malloc(sizeof(EBCDIC_OUTBUFF) + 1024); 418 wbuf->alloced = 1024; 419 wbuf->buff[0] = '\0'; 421 bi->ptr=(char *)wbuf; 453 EBCDIC_OUTBUFF *wbuf; local 461 wbuf=(EBCDIC_OUTBUFF *)b->ptr; 463 if (inl > (num = wbuf->alloced)) 468 OPENSSL_free(wbuf); 469 wbuf [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | ssl2.h | 179 unsigned char *wbuf; member in struct:ssl2_state_st
|
H A D | ssl3.h | 352 SSL3_BUFFER wbuf; /* write IO goes into here */ member in struct:ssl3_state_st
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | d1_pkt.c | 1273 if (s->s3->wbuf.left != 0) 1292 wb= &(s->s3->wbuf); 1325 if (s->s3->wbuf.len < (size_t)prefix_len + SSL3_RT_MAX_PACKET_SIZE)
|
H A D | s2_lib.c | 255 /* wbuf needs one byte more because when using two-byte headers, 257 if ((s2->wbuf=OPENSSL_malloc( 266 if (s2->wbuf != NULL) OPENSSL_free(s2->wbuf); 282 if (s2->wbuf != NULL) OPENSSL_free(s2->wbuf); 291 unsigned char *rbuf,*wbuf; local 296 wbuf=s2->wbuf; 301 s2->wbuf [all...] |
H A D | s2_pkt.c | 601 s->s2->mac_data= &(s->s2->wbuf[3]); 602 s->s2->wact_data= &(s->s2->wbuf[3+mac_size]); 603 /* we copy the data into s->s2->wbuf */
|
H A D | s3_both.c | 608 if (s->s3->wbuf.buf == NULL) 614 s->s3->wbuf.buf = p; 615 s->s3->wbuf.len = len;
|
H A D | s3_lib.c | 1598 if (s->s3->wbuf.buf != NULL) 1599 OPENSSL_free(s->s3->wbuf.buf); 1647 wp = s->s3->wbuf.buf; 1649 wlen = s->s3->wbuf.len; 1656 s->s3->wbuf.buf = wp; 1658 s->s3->wbuf.len = wlen; 2389 (s->s3->wbuf.left == 0) &&
|
H A D | s3_pkt.c | 578 if (s->s3->wbuf.left != 0) 594 wb= &(s->s3->wbuf); 623 if (s->s3->wbuf.len < (size_t)prefix_len + SSL3_RT_MAX_PACKET_SIZE) 719 /* if s->s3->wbuf.left != 0, we need to call this */ 742 (char *)&(s->s3->wbuf.buf[s->s3->wbuf.offset]), 743 (unsigned int)s->s3->wbuf.left); 750 if (i == s->s3->wbuf.left) 752 s->s3->wbuf.left=0; 758 s->s3->wbuf [all...] |
H A D | ssl2.h | 179 unsigned char *wbuf; member in struct:ssl2_state_st
|
H A D | ssl3.h | 352 SSL3_BUFFER wbuf; /* write IO goes into here */ member in struct:ssl3_state_st
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/include/ |
H A D | bcmutils.h | 398 extern ulong wchar2ascii(char *abuf, ushort *wbuf, ushort wbuflen, ulong abuflen);
|