Searched refs:rstate (Results 1 – 18 of 18) sorted by relevance
135 static struct radius_state rstate; variable163 memset(&rstate, 0, sizeof(rstate)); in plugin_init()165 strlcpy(rstate.config_file, "/etc/radiusclient/radiusclient.conf", in plugin_init()166 sizeof(rstate.config_file)); in plugin_init()223 if (rstate.choose_ip) { in radius_choose_ip()224 *addrp = rstate.ip_addr; in radius_choose_ip()264 radius_pre_auth_hook(rstate.user, in radius_pap_auth()265 &rstate.authserver, in radius_pap_auth()266 &rstate.acctserver); in radius_pap_auth()274 rstate.client_port = get_client_port(portnummap ? devnam : ifname); in radius_pap_auth()[all …]
189 bool Sample(const RandState<A> &rstate) { in Sample() argument191 if ((fst_.NumArcs(rstate.state_id) == 0 && in Sample()192 fst_.Final(rstate.state_id) == Weight::Zero()) || in Sample()193 rstate.length == max_length_) { in Sample()198 for (size_t i = 0; i < rstate.nsamples; ++i) in Sample()199 ++sample_map_[arc_selector_(fst_, rstate.state_id)]; in Sample()268 bool Sample(const RandState<A> &rstate) { in Sample() argument270 if ((fst_.NumArcs(rstate.state_id) == 0 && in Sample()271 fst_.Final(rstate.state_id) == Weight::Zero()) || in Sample()272 rstate.length == max_length_) { in Sample()[all …]
164 s->rstate=SSL_ST_READ_HEADER; in ssl2_read_internal()175 if (s->rstate == SSL_ST_READ_HEADER) in ssl2_read_internal()198 s->rstate=SSL_ST_READ_BODY; in ssl2_read_internal()219 if (s->rstate == SSL_ST_READ_BODY) in ssl2_read_internal()230 s->rstate=SSL_ST_READ_HEADER; in ssl2_read_internal()
242 switch (s->rstate) in SSL_rstate_string_long()559 switch (s->rstate) in SSL_rstate_string()
557 if ( (s->rstate != SSL_ST_READ_BODY) || in dtls1_get_record()571 s->rstate=SSL_ST_READ_BODY; in dtls1_get_record()658 s->rstate=SSL_ST_READ_HEADER; /* set state for later operations */ in dtls1_get_record()837 if ((rr->length == 0) || (s->rstate == SSL_ST_READ_BODY)) in dtls1_read_bytes()903 s->rstate=SSL_ST_READ_HEADER; in dtls1_read_bytes()1009 s->rstate=SSL_ST_READ_HEADER; in dtls1_read_bytes()
322 if ( (s->rstate != SSL_ST_READ_BODY) || in ssl3_get_record()327 s->rstate=SSL_ST_READ_BODY; in ssl3_get_record()398 s->rstate=SSL_ST_READ_HEADER; /* set state for later operations */ in ssl3_get_record()1037 if ((rr->length == 0) || (s->rstate == SSL_ST_READ_BODY)) in ssl3_read_bytes()1090 s->rstate=SSL_ST_READ_HEADER; in ssl3_read_bytes()
574 s->rstate=SSL_ST_READ_HEADER; in ssl23_get_client_hello()599 s->rstate=SSL_ST_READ_HEADER; in ssl23_get_client_hello()
659 s->rstate=SSL_ST_READ_HEADER; in ssl23_get_server_hello()752 s->rstate=SSL_ST_READ_HEADER; in ssl23_get_server_hello()
224 s->rstate=SSL_ST_READ_HEADER; in SSL_clear()2760 ret->rstate=s->rstate; in SSL_dup()
1159 int rstate; /* where we are when reading */ member
2934 if (s->rstate == SSL_ST_READ_BODY) in ssl3_pending()
136 struct cstate rstate[MAX_VJ_STATES]; /* receive connection states */ member
446 cs = &comp->rstate[comp->last_recv = ip->ip_p]; in sl_uncompress_tcp()500 cs = &comp->rstate[comp->last_recv]; in sl_uncompress_tcp()
135 struct cstate rstate[MAX_STATES]; /* receive connection states */ member
127 struct cstate rstate[MAX_STATES]; /* receive connection states */ member
25 /* now s->rstate == SSL_ST_READ_BODY */
183 /* The following 2 states are kept in ssl->rstate when reads fail,