Symbol: peek
lib/libcurses/base/lib_getch.c
212
int ch = (peek >= 0) ? sp->_fifo[peek] : ERR;
lib/libcurses/base/lib_getch.c
213
TR(TRACE_IEVENT, ("peeking at %d", peek));
lib/libcurses/base/lib_getch.c
226
if (peek == head) {
lib/libcurses/base/lib_getch.c
228
peek = head;
lib/libcurses/base/lib_getch.c
358
head = peek = tail;
lib/libcurses/base/lib_getch.c
375
tail = peek = 0;
lib/libcurses/base/lib_getch.c
736
peek = head; /* the keys stay uninterpreted */
lib/libcurses/base/lib_getch.c
741
peek = head; /* the keys stay uninterpreted */
lib/libcurses/base/lib_getch.c
753
peek = head;
lib/libcurses/base/lib_getch.c
772
if (peek == tail) {
lib/libcurses/base/lib_getch.c
775
head = peek;
lib/libcurses/base/lib_getch.c
791
peek = head; /* Restart interpreting later */
lib/libcurses/base/lib_getch.c
802
peek = head;
lib/libcurses/base/lib_ungetch.c
57
T(("head = %d, tail = %d, peek = %d", head, tail, peek));
lib/libcurses/base/lib_ungetch.c
74
peek = tail; /* no raw keys */
lib/libcurses/fifo_defs.h
80
(peek >= FIFO_SIZE-1) \
lib/libcurses/fifo_defs.h
81
? peek = 0 \
lib/libcurses/fifo_defs.h
82
: peek++; \
lib/libcurses/fifo_defs.h
85
#define cooked_key_in_fifo() ((head >= 0) && (peek != head))
lib/libcurses/fifo_defs.h
86
#define raw_key_in_fifo() ((head >= 0) && (peek != tail))
lib/libssl/d1_pkt.c
750
dtls1_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek)
lib/libssl/d1_pkt.c
776
if (peek && type != SSL3_RT_APPLICATION_DATA) {
lib/libssl/d1_pkt.c
881
if (peek) {
lib/libssl/dtls_local.h
190
int dtls1_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek);
lib/libssl/s3_lib.c
2468
ssl3_read_internal(SSL *s, void *buf, int len, int peek)
lib/libssl/s3_lib.c
2478
peek);
lib/libssl/s3_lib.c
2489
buf, len, peek);
lib/libssl/ssl_local.h
1291
int ssl3_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek);
lib/libssl/ssl_local.h
371
int peek);
lib/libssl/ssl_pkt.c
1019
if (peek && type != SSL3_RT_APPLICATION_DATA) {
lib/libssl/ssl_pkt.c
1108
if (peek) {
lib/libssl/ssl_pkt.c
993
ssl3_read_bytes(SSL *s, int type, unsigned char *buf, int len, int peek)
lib/libssl/tls13_internal.h
336
int peek);
lib/libssl/tls13_legacy.c
224
tls13_legacy_read_bytes(SSL *ssl, int type, unsigned char *buf, int len, int peek)
lib/libssl/tls13_legacy.c
249
if (peek)
lib/libssl/tls13_record_layer.c
1002
if (peek)
lib/libssl/tls13_record_layer.c
958
uint8_t content_type, uint8_t *buf, size_t n, int peek)
lib/libssl/tls_content.c
138
int peek)
lib/libssl/tls_content.c
146
if (!peek) {
sys/dev/pv/hyperv.c
1306
int peek)
sys/dev/pv/hyperv.c
1312
if (!peek) {
usr.bin/awk/lex.c
233
if (peek() == '\n') {
usr.bin/awk/lex.c
236
} else if (peek() == '\r') {
usr.bin/awk/lex.c
244
if (peek() == '&') {
usr.bin/awk/lex.c
249
if (peek() == '|') {
usr.bin/awk/lex.c
254
if (peek() == '=') {
usr.bin/awk/lex.c
256
} else if (peek() == '~') {
usr.bin/awk/lex.c
264
if (peek() == '=') {
usr.bin/awk/lex.c
270
if (peek() == '=') {
usr.bin/awk/lex.c
276
if (peek() == '=') {
usr.bin/awk/lex.c
278
} else if (peek() == '>') {
usr.bin/awk/lex.c
284
if (peek() == '+') {
usr.bin/awk/lex.c
286
} else if (peek() == '=') {
usr.bin/awk/lex.c
291
if (peek() == '-') {
usr.bin/awk/lex.c
293
} else if (peek() == '=') {
usr.bin/awk/lex.c
298
if (peek() == '=') { /* *= */
usr.bin/awk/lex.c
300
} else if (peek() == '*') { /* ** or **= */
usr.bin/awk/lex.c
302
if (peek() == '=') {
usr.bin/awk/lex.c
312
if (peek() == '=') {
usr.bin/awk/lex.c
317
if (peek() == '=') {
usr.bin/awk/lex.c
330
c = peek();
usr.bin/awk/lex.c
416
if ((c = peek()) >= '0' && c < '8') {
usr.bin/awk/lex.c
418
if ((c = peek()) >= '0' && c < '8')
usr.bin/awk/lex.c
428
if (!isxdigit(peek())) {
usr.bin/awk/lex.c
541
c = peek(); /* look for '(' */
usr.bin/awk/lex.c
589
int nextc = peek();
usr.bin/rpcgen/rpc_parse.c
130
peek(&tok);
usr.bin/rpcgen/rpc_parse.c
216
peek(&tok);
usr.bin/rpcgen/rpc_parse.c
479
peek(&tok);
usr.bin/rpcgen/rpc_parse.c
605
peek(&tok);
usr.bin/rpcgen/rpc_scan.c
140
peek(tokp);
usr.bin/rpcgen/rpc_scan.h
105
void peek(token *);
usr.bin/usbhidaction/usbhidaction.c
253
while (p && isspace(peek(f))) {
usr.sbin/btrace/bt_parse.y
848
if ((c == '/' && peek() == '/') ||
usr.sbin/btrace/bt_parse.y
850
peek() == '!')) {
usr.sbin/btrace/bt_parse.y
861
if (c == '/' && peek() == '*') {
usr.sbin/btrace/bt_parse.y
892
if (peek() == '=') {
usr.sbin/btrace/bt_parse.y
898
if (peek() == '=') {
usr.sbin/btrace/bt_parse.y
904
if (peek() == '=') {
usr.sbin/btrace/bt_parse.y
910
if (peek() == '&') {
usr.sbin/btrace/bt_parse.y
916
if (peek() == '|') {
usr.sbin/btrace/bt_parse.y
922
while (isspace(peek())) {
usr.sbin/btrace/bt_parse.y
928
if (peek() == '{' || peek() == '/' || peek() == '\n')
usr.sbin/nsd/remote.c
1273
do_stats(RES* ssl, xfrd_state_type* xfrd, int peek)
usr.sbin/nsd/remote.c
1276
process_stats(ssl, NULL, xfrd, peek);
usr.sbin/nsd/remote.c
1278
(void)xfrd; (void)peek;
usr.sbin/nsd/remote.c
3295
int peek)
usr.sbin/nsd/remote.c
3299
if(peek) {
usr.sbin/nsd/remote.c
3342
process_stats(RES* ssl, struct evbuffer *evbuf, struct xfrd_state* xfrd, int peek)
usr.sbin/nsd/remote.c
3354
process_stats_manage_clear(xfrd, stats, peek);
usr.sbin/nsd/remote.c
3357
print_stats(ssl, xfrd, &stattime, !peek, &total, zonestats);
usr.sbin/nsd/remote.c
3364
metrics_print_stats(evbuf, xfrd, &stattime, !peek, &total, zonestats,
usr.sbin/nsd/remote.c
3367
metrics_print_stats(evbuf, xfrd, &stattime, !peek, &total, zonestats,
usr.sbin/nsd/remote.c
3374
if(!peek) {
usr.sbin/nsd/remote.h
153
int peek);
usr.sbin/nsd/remote.h
175
int peek);
usr.sbin/unbound/testcode/delayer.c
812
struct timeval* peek = ring_peek_time(ring);
usr.sbin/unbound/testcode/delayer.c
829
if(peek) {
usr.sbin/unbound/testcode/delayer.c
832
memmove(wait, peek, sizeof(*wait));