Searched refs:ip (Results 101 - 125 of 1861) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/lzo-2.06/src/
H A Dlzo1a.c144 register const lzo_bytep ip; local
152 ip = in;
153 while (ip < ip_end)
155 t = *ip++; /* get marker */
160 t = *ip++;
177 MEMCPY8_DS(op,ip,t);
186 MEMCPY_DS(op,ip,t);
189 while (ip < ip_end)
191 t = *ip++; /* get R1 marker */
198 m_pos -= t | (((lzo_uint) *ip
265 register const lzo_bytep ip; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/tunala/
H A Dip.c21 int ip_create_listener_split(const char *ip, unsigned short port) argument
36 memcpy(&in_addr.sin_addr.s_addr, ip, 4);
52 int ip_create_connection_split(const char *ip, unsigned short port) argument
66 memcpy(&in_addr.sin_addr.s_addr, ip, 4);
88 const char *ip = all_local_ip; local
113 ip = lookup->h_addr_list[0];
119 *parsed_ip = ip;
126 const char *ip; local
129 if (!ip_parse_address(address, &ip, &port, 1))
131 return ip_create_listener_split(ip, por
136 const char *ip; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/tunala/
H A Dip.c21 int ip_create_listener_split(const char *ip, unsigned short port) argument
36 memcpy(&in_addr.sin_addr.s_addr, ip, 4);
51 int ip_create_connection_split(const char *ip, unsigned short port) argument
65 memcpy(&in_addr.sin_addr.s_addr, ip, 4);
88 const char *ip = all_local_ip; local
109 ip = lookup->h_addr_list[0];
115 *parsed_ip = ip;
122 const char *ip; local
125 if(!ip_parse_address(address, &ip, &port, 1))
127 return ip_create_listener_split(ip, por
132 const char *ip; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/tunala/
H A Dip.c21 int ip_create_listener_split(const char *ip, unsigned short port) argument
36 memcpy(&in_addr.sin_addr.s_addr, ip, 4);
52 int ip_create_connection_split(const char *ip, unsigned short port) argument
66 memcpy(&in_addr.sin_addr.s_addr, ip, 4);
88 const char *ip = all_local_ip; local
113 ip = lookup->h_addr_list[0];
119 *parsed_ip = ip;
126 const char *ip; local
129 if (!ip_parse_address(address, &ip, &port, 1))
131 return ip_create_listener_split(ip, por
136 const char *ip; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/arm/lib/
H A Dio-writesw-armv4.S25 .Loutsw_align: movs ip, r1, lsl #31
43 .Loutsw_8_lp: ldmia r1!, {r3, r4, r5, ip}
48 outword ip
54 ldmia r1!, {r3, ip}
56 outword ip
87 1: mov ip, r3, lsr #8
88 strh ip, [r0]
89 2: mov ip, r3, pull_hbyte0
92 orr ip, ip, r
[all...]
H A Dmemmove.S32 subs ip, r0, r1
33 cmphi r2, ip
41 ands ip, r0, #3
44 ands ip, r1, #3
51 CALGN( ands ip, r0, #31 )
52 CALGN( sbcnes r4, ip, r2 ) @ C is always set here
55 CALGN( subs r2, r2, ip ) @ C is set here
56 CALGN( rsb ip, ip, #32 )
57 CALGN( add pc, r4, ip )
[all...]
H A Dmuldi3.S32 mov ip, xl, lsr #16
34 bic xl, xl, ip, lsl #16
36 mla xh, yh, ip, xh
39 mul ip, yl, ip
42 adds xl, xl, ip, lsl #16
43 adc xh, xh, ip, lsr #16
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/sound/oss/
H A Dvidc_fill.S20 mov ip, #0xff00
25 and r4, ip, r4, lsl #8
33 mov ip, #0xff00
37 and r5, r4, ip
38 and r4, ip, r4, lsl #8
47 mov ip, #0xff00
51 and r4, ip, r4, lsl #8
59 mov ip, #0xff00
63 and r5, r4, ip
64 and r4, ip, r
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/kademlia/net/
H A DKademliaUDPListener.cpp86 if (!IsOnOutTrackList(ip, OPCODE)) \
103 void CKademliaUDPListener::Bootstrap(uint32_t ip, uint16_t port, uint8_t kadVersion, const CUInt128* cryptTargetID) argument
105 wxASSERT(ip);
107 DebugSend(Kad2BootstrapReq, ip, port);
110 SendPacket(bio, KADEMLIA2_BOOTSTRAP_REQ, ip, port, 0, cryptTargetID);
112 SendPacket(bio, KADEMLIA2_BOOTSTRAP_REQ, ip, port, 0, NULL);
117 void CKademliaUDPListener::SendMyDetails(uint8_t opcode, uint32_t ip, uint16_t port, uint8_t kadVersion, const CKadUDPKey& targetKey, const CUInt128* cryptTargetID, bool requestAckPacket) argument
151 AddDebugLogLineN(logClientKadUDP, CFormat(wxT("Sending hello response to crypt enabled Kad Node which provided an empty NodeID: %s (%u)")) % KadIPToString(ip) % kadVersion);
152 SendPacket(packetdata, opcode, ip, port, targetKey, NULL);
154 SendPacket(packetdata, opcode, ip, por
166 FirewalledCheck(uint32_t ip, uint16_t port, const CKadUDPKey& senderKey, uint8_t kadVersion) argument
185 SendNullPacket(uint8_t opcode, uint32_t ip, uint16_t port, const CKadUDPKey& targetKey, const CUInt128* cryptTargetID) argument
217 ProcessPacket(const uint8_t* data, uint32_t lenData, uint32_t ip, uint16_t port, bool validReceiverKey, const CKadUDPKey& senderKey) argument
376 AddContact2(const uint8_t *data, uint32_t lenData, uint32_t ip, uint16_t& port, uint8_t *outVersion, const CKadUDPKey& udpKey, bool& ipVerified, bool update, bool fromHelloReq, bool* outRequestsACK, CUInt128* outContactID) argument
454 Process2BootstrapRequest(uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument
488 Process2BootstrapResponse(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey, bool validReceiverKey) argument
524 Process2HelloRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey, bool validReceiverKey) argument
575 Process2HelloResponseAck(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, bool validReceiverKey) argument
597 Process2HelloResponse(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey, bool validReceiverKey) argument
642 ProcessKademlia2Request(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument
689 ProcessKademlia2Response(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& WXUNUSED(senderKey)) argument
920 Process2SearchKeyRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument
942 Process2SearchSourceRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument
1001 Process2PublishKeyRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument
1099 Process2PublishSourceRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument
1216 ProcessPublishResponse(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip) argument
1237 Process2PublishResponse(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument
1259 Process2SearchNotesRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument
1269 ProcessSearchNotesResponse(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip) argument
1282 Process2PublishNotesRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument
1351 ProcessFirewalledRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument
1374 ProcessFirewalled2Request(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument
1399 ProcessFirewalledResponse(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, const CKadUDPKey& WXUNUSED(senderKey)) argument
1434 ProcessFindBuddyRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument
1472 ProcessFindBuddyResponse(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& WXUNUSED(senderKey)) argument
1498 ProcessCallbackRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t WXUNUSED(port), const CKadUDPKey& WXUNUSED(senderKey)) argument
1529 Process2Ping(uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument
1539 Process2Pong(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip) argument
1561 CKademlia::GetPrefs()->SetExternKadPort(PeekUInt16(packetData), ip); local
1571 Process2FirewallUDP(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip) argument
1610 FindNodeIDByIP(CKadClientSearcher* requester, uint32_t ip, uint16_t tcpPort, uint16_t udpPort) argument
1636 SendLegacyChallenge(uint32_t ip, uint16_t port, const CUInt128& contactID) argument
1678 uint32 ip = wxUINT32_SWAP_ALWAYS(kad_ip); local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/gfs2/
H A Dglops.c135 struct gfs2_inode *ip = gl->gl_object; local
139 if (ip && !S_ISREG(ip->i_inode.i_mode))
140 ip = NULL;
141 if (ip && test_and_clear_bit(GIF_SW_PAGED, &ip->i_flags))
142 unmap_shared_mapping_range(ip->i_inode.i_mapping, 0, 0);
150 if (ip) {
151 struct address_space *mapping = ip->i_inode.i_mapping;
180 struct gfs2_inode *ip local
226 struct gfs2_inode *ip = gl->gl_object; local
262 const struct gfs2_inode *ip = gl->gl_object; local
344 struct gfs2_inode *ip = GFS2_I(sdp->sd_jdesc->jd_inode); local
387 struct gfs2_inode *ip = (struct gfs2_inode *)gl->gl_object; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/jfs/
H A Dinode.c195 int jfs_get_block(struct inode *ip, sector_t lblock, argument
203 s32 xlen = bh_result->b_size >> ip->i_blkbits;
209 IWRITE_LOCK(ip, RDWRLOCK_NORMAL);
211 IREAD_LOCK(ip, RDWRLOCK_NORMAL);
213 if (((lblock64 << ip->i_sb->s_blocksize_bits) < ip->i_size) &&
214 (!xtLookup(ip, lblock64, xlen, &xflag, &xaddr, &xlen, 0)) &&
235 rc = extRecord(ip, &xad);
241 map_bh(bh_result, ip->i_sb, xaddr);
242 bh_result->b_size = xlen << ip
366 jfs_truncate_nolock(struct inode *ip, loff_t length) argument
406 jfs_truncate(struct inode *ip) argument
[all...]
H A Djfs_incore.h106 #define IREAD_LOCK(ip, subclass) \
107 down_read_nested(&JFS_IP(ip)->rdwrlock, subclass)
108 #define IREAD_UNLOCK(ip) up_read(&JFS_IP(ip)->rdwrlock)
109 #define IWRITE_LOCK(ip, subclass) \
110 down_write_nested(&JFS_IP(ip)->rdwrlock, subclass)
111 #define IWRITE_UNLOCK(ip) up_write(&JFS_IP(ip)->rdwrlock)
149 #define set_cflag(flag, ip) set_bit(flag, &(JFS_IP(ip)
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/
H A Dwins_srv.c97 see if an ip is on the dead list
175 struct in_addr ip; member in struct:tagged_ip
181 and the ip in in_addr format. If there is no tag then
184 static void parse_ip(struct tagged_ip *ip, const char *str) argument
188 fstrcpy(ip->tag, "*");
189 ip->ip = *interpret_addr2(str);
193 ip->ip = *interpret_addr2(s+1);
194 fstrcpy(ip
293 struct in_addr ip; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/mips/kernel/
H A Dftrace.c21 static inline int in_module(unsigned long ip) argument
23 return ip & 0x40000000;
28 #define JAL 0x0c000000 /* jump & link: ip --> ra, jump to target */
63 static int ftrace_modify_code(unsigned long ip, unsigned int new_code) argument
67 /* *(unsigned int *)ip = new_code; */
68 safe_store_code(new_code, ip, faulted);
73 flush_icache_range(ip, ip + 8);
82 unsigned long ip = rec->ip; local
124 unsigned long ip = rec->ip; local
189 unsigned long sp, ip, ra; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/xfs/
H A Dxfs_bmap.h119 struct xfs_inode *ip; /* incore inode pointer */ member in struct:xfs_bmalloca
162 struct xfs_inode *ip, /* incore inode pointer */
166 #define XFS_BMAP_TRACE_EXLIST(ip,c,w) \
167 xfs_bmap_trace_exlist(ip,c,w, _THIS_IP_)
169 #define XFS_BMAP_TRACE_EXLIST(ip,c,w)
174 * Must not be in a transaction, ip must not be locked.
178 struct xfs_inode *ip, /* incore inode pointer */
218 struct xfs_inode *ip, /* incore inode */
232 struct xfs_inode *ip, /* incore inode */
244 struct xfs_inode *ip, /* incor
[all...]
H A Dxfs_vnodeops.h17 int xfs_setattr(struct xfs_inode *ip, struct iattr *vap, int flags);
23 int xfs_readlink(struct xfs_inode *ip, char *link);
24 int xfs_release(struct xfs_inode *ip);
25 int xfs_inactive(struct xfs_inode *ip);
31 struct xfs_inode *ip);
39 int xfs_set_dmattrs(struct xfs_inode *ip, u_int evmask, u_int16_t state);
40 int xfs_change_file_space(struct xfs_inode *ip, int cmd,
45 int xfs_attr_get(struct xfs_inode *ip, const unsigned char *name,
52 int xfs_bmap(struct xfs_inode *ip, xfs_off_t offset, ssize_t count,
56 int xfs_flushinval_pages(struct xfs_inode *ip, xfs_off_
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/s390/kernel/
H A Dftrace.c82 static int ftrace_modify_code(unsigned long ip, argument
95 if (probe_kernel_read(replaced, (void *)ip, old_size))
99 if (probe_kernel_write((void *)ip, new_code, new_size))
107 return ftrace_modify_code(rec->ip,
117 return ftrace_modify_code(rec->ip,
124 return ftrace_modify_code(rec->ip,
184 unsigned long prepare_ftrace_return(unsigned long ip, unsigned long parent) argument
190 if (ftrace_push_return_trace(parent, ip, &trace.depth, 0) == -EBUSY)
192 trace.func = ftrace_mcount_call_adjust(ip) & PSW_ADDR_INSN;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/tcpdump-4.4.0/
H A Dprint-ip.c24 "@(#) $Header: /tcpdump/master/tcpdump/print-ip.c,v 1.159 2007-09-14 01:29:28 guy Exp $ (LBL)";
41 #include "ip.h"
91 ip_finddst(const struct ip *ip) argument
98 cp = (const u_char *)(ip + 1);
99 length = (IP_HL(ip) << 2) - sizeof(struct ip);
128 memcpy(&retval, &ip->ip_dst.s_addr, sizeof(u_int32_t));
136 nextproto4_cksum(const struct ip *ip, cons argument
314 const struct ip *ip; member in struct:ip_print_demux_state
675 struct ip *ip, hdr; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/pcap2nbench/
H A Dip.hpp28 struct ip { struct
29 ip(const uint8_t *data, size_t length);
45 std::ostream &operator<<(std::ostream &lhs, const ip &rhs);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/x86/mm/
H A Dextable.c24 fixup = search_exception_tables(regs->ip);
29 regs->ip += fixup->fixup;
32 regs->ip = fixup->fixup;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libav-0.8.8/libavcodec/arm/
H A Dsimple_idct_armv5te.S58 mov ip, #16384
59 sub ip, ip, #1 /* ip = W4 */
60 smlabb v1, ip, a3, v1 /* v1 = W4*row[0]+(1<<(RS-1)) */
61 ldr ip, w26 /* ip = W2 | (W6 << 16) */
62 smultb a2, ip, a4
63 smulbb lr, ip, a4
69 ldr ip, w1
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavcodec/arm/
H A Dsimple_idct_armv5te.S52 mov ip, #16384
53 sub ip, ip, #1 /* ip = W4 */
54 smlabb v1, ip, a3, v1 /* v1 = W4*row[0]+(1<<(RS-1)) */
55 ldr ip, =W26 /* ip = W2 | (W6 << 16) */
56 smultb a2, ip, a4
57 smulbb lr, ip, a4
63 ldr ip,
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/scsi/
H A Dscsicam.c59 * @ip: return value: ip[0]=heads, ip[1]=sectors, ip[2]=cylinders
62 * SCSI-CAM system, storing the results in ip as required
68 int scsicam_bios_param(struct block_device *bdev, sector_t capacity, int *ip) argument
79 ret = scsi_partsize(p, (unsigned long)capacity, (unsigned int *)ip + 2,
80 (unsigned int *)ip + 0, (unsigned int *)ip + 1);
87 ret = setsize((unsigned long)capacity, (unsigned int *)ip
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/video/
H A Dpmag-aa-fb.c229 struct aafb_info *ip = (struct aafb_info *)info; local
233 fix->smem_start = ip->fb_start;
234 fix->smem_len = ip->fb_size;
307 struct aafb_info *ip = (struct aafb_info *)info; local
308 struct display *old = (currcon < 0) ? &ip->disp : (fb_display + currcon);
309 struct display *new = (con < 0) ? &ip->disp : (fb_display + con);
316 aafb_set_disp(new, con, ip);
380 struct aafb_info *ip = (struct aafb_info *)info; local
381 struct display *disp = (con < 0) ? &ip->disp : (fb_display + con);
384 aafbcon_cursor(disp, CM_ERASE, ip
393 struct aafb_info *ip = (struct aafb_info *)info; local
413 struct aafb_info *ip = &my_fb_info[slot]; local
469 struct aafb_info *ip = &my_fb_info[slot]; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/ip/
H A DMakefile4 IPOBJ=ip.o ipaddress.o iproute.o iprule.o \
14 #TARGETS=ip rtmon
15 TARGETS=ip
20 ip: $(IPOBJ) $(LIBNETLINK) $(LIBUTIL)
26 $(STRIP) $(DESTDIR)$(SBINDIR)/ip

Completed in 229 milliseconds

1234567891011>>