/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/lzo-2.06/src/ |
H A D | lzo1a.c | 144 register const lzo_bytep ip; local 152 ip = in; 153 while (ip < ip_end) 155 t = *ip++; /* get marker */ 160 t = *ip++; 177 MEMCPY8_DS(op,ip,t); 186 MEMCPY_DS(op,ip,t); 189 while (ip < ip_end) 191 t = *ip++; /* get R1 marker */ 198 m_pos -= t | (((lzo_uint) *ip 265 register const lzo_bytep ip; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/demos/tunala/ |
H A D | ip.c | 21 int ip_create_listener_split(const char *ip, unsigned short port) argument 36 memcpy(&in_addr.sin_addr.s_addr, ip, 4); 52 int ip_create_connection_split(const char *ip, unsigned short port) argument 66 memcpy(&in_addr.sin_addr.s_addr, ip, 4); 88 const char *ip = all_local_ip; local 113 ip = lookup->h_addr_list[0]; 119 *parsed_ip = ip; 126 const char *ip; local 129 if (!ip_parse_address(address, &ip, &port, 1)) 131 return ip_create_listener_split(ip, por 136 const char *ip; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/tunala/ |
H A D | ip.c | 21 int ip_create_listener_split(const char *ip, unsigned short port) argument 36 memcpy(&in_addr.sin_addr.s_addr, ip, 4); 51 int ip_create_connection_split(const char *ip, unsigned short port) argument 65 memcpy(&in_addr.sin_addr.s_addr, ip, 4); 88 const char *ip = all_local_ip; local 109 ip = lookup->h_addr_list[0]; 115 *parsed_ip = ip; 122 const char *ip; local 125 if(!ip_parse_address(address, &ip, &port, 1)) 127 return ip_create_listener_split(ip, por 132 const char *ip; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/demos/tunala/ |
H A D | ip.c | 21 int ip_create_listener_split(const char *ip, unsigned short port) argument 36 memcpy(&in_addr.sin_addr.s_addr, ip, 4); 52 int ip_create_connection_split(const char *ip, unsigned short port) argument 66 memcpy(&in_addr.sin_addr.s_addr, ip, 4); 88 const char *ip = all_local_ip; local 113 ip = lookup->h_addr_list[0]; 119 *parsed_ip = ip; 126 const char *ip; local 129 if (!ip_parse_address(address, &ip, &port, 1)) 131 return ip_create_listener_split(ip, por 136 const char *ip; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/arm/lib/ |
H A D | io-writesw-armv4.S | 25 .Loutsw_align: movs ip, r1, lsl #31 43 .Loutsw_8_lp: ldmia r1!, {r3, r4, r5, ip} 48 outword ip 54 ldmia r1!, {r3, ip} 56 outword ip 87 1: mov ip, r3, lsr #8 88 strh ip, [r0] 89 2: mov ip, r3, pull_hbyte0 92 orr ip, ip, r [all...] |
H A D | memmove.S | 32 subs ip, r0, r1 33 cmphi r2, ip 41 ands ip, r0, #3 44 ands ip, r1, #3 51 CALGN( ands ip, r0, #31 ) 52 CALGN( sbcnes r4, ip, r2 ) @ C is always set here 55 CALGN( subs r2, r2, ip ) @ C is set here 56 CALGN( rsb ip, ip, #32 ) 57 CALGN( add pc, r4, ip ) [all...] |
H A D | muldi3.S | 32 mov ip, xl, lsr #16 34 bic xl, xl, ip, lsl #16 36 mla xh, yh, ip, xh 39 mul ip, yl, ip 42 adds xl, xl, ip, lsl #16 43 adc xh, xh, ip, lsr #16
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/sound/oss/ |
H A D | vidc_fill.S | 20 mov ip, #0xff00 25 and r4, ip, r4, lsl #8 33 mov ip, #0xff00 37 and r5, r4, ip 38 and r4, ip, r4, lsl #8 47 mov ip, #0xff00 51 and r4, ip, r4, lsl #8 59 mov ip, #0xff00 63 and r5, r4, ip 64 and r4, ip, r [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/kademlia/net/ |
H A D | KademliaUDPListener.cpp | 86 if (!IsOnOutTrackList(ip, OPCODE)) \ 103 void CKademliaUDPListener::Bootstrap(uint32_t ip, uint16_t port, uint8_t kadVersion, const CUInt128* cryptTargetID) argument 105 wxASSERT(ip); 107 DebugSend(Kad2BootstrapReq, ip, port); 110 SendPacket(bio, KADEMLIA2_BOOTSTRAP_REQ, ip, port, 0, cryptTargetID); 112 SendPacket(bio, KADEMLIA2_BOOTSTRAP_REQ, ip, port, 0, NULL); 117 void CKademliaUDPListener::SendMyDetails(uint8_t opcode, uint32_t ip, uint16_t port, uint8_t kadVersion, const CKadUDPKey& targetKey, const CUInt128* cryptTargetID, bool requestAckPacket) argument 151 AddDebugLogLineN(logClientKadUDP, CFormat(wxT("Sending hello response to crypt enabled Kad Node which provided an empty NodeID: %s (%u)")) % KadIPToString(ip) % kadVersion); 152 SendPacket(packetdata, opcode, ip, port, targetKey, NULL); 154 SendPacket(packetdata, opcode, ip, por 166 FirewalledCheck(uint32_t ip, uint16_t port, const CKadUDPKey& senderKey, uint8_t kadVersion) argument 185 SendNullPacket(uint8_t opcode, uint32_t ip, uint16_t port, const CKadUDPKey& targetKey, const CUInt128* cryptTargetID) argument 217 ProcessPacket(const uint8_t* data, uint32_t lenData, uint32_t ip, uint16_t port, bool validReceiverKey, const CKadUDPKey& senderKey) argument 376 AddContact2(const uint8_t *data, uint32_t lenData, uint32_t ip, uint16_t& port, uint8_t *outVersion, const CKadUDPKey& udpKey, bool& ipVerified, bool update, bool fromHelloReq, bool* outRequestsACK, CUInt128* outContactID) argument 454 Process2BootstrapRequest(uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument 488 Process2BootstrapResponse(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey, bool validReceiverKey) argument 524 Process2HelloRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey, bool validReceiverKey) argument 575 Process2HelloResponseAck(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, bool validReceiverKey) argument 597 Process2HelloResponse(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey, bool validReceiverKey) argument 642 ProcessKademlia2Request(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument 689 ProcessKademlia2Response(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& WXUNUSED(senderKey)) argument 920 Process2SearchKeyRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument 942 Process2SearchSourceRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument 1001 Process2PublishKeyRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument 1099 Process2PublishSourceRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument 1216 ProcessPublishResponse(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip) argument 1237 Process2PublishResponse(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument 1259 Process2SearchNotesRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument 1269 ProcessSearchNotesResponse(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip) argument 1282 Process2PublishNotesRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument 1351 ProcessFirewalledRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument 1374 ProcessFirewalled2Request(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument 1399 ProcessFirewalledResponse(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, const CKadUDPKey& WXUNUSED(senderKey)) argument 1434 ProcessFindBuddyRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument 1472 ProcessFindBuddyResponse(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t port, const CKadUDPKey& WXUNUSED(senderKey)) argument 1498 ProcessCallbackRequest(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip, uint16_t WXUNUSED(port), const CKadUDPKey& WXUNUSED(senderKey)) argument 1529 Process2Ping(uint32_t ip, uint16_t port, const CKadUDPKey& senderKey) argument 1539 Process2Pong(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip) argument 1561 CKademlia::GetPrefs()->SetExternKadPort(PeekUInt16(packetData), ip); local 1571 Process2FirewallUDP(const uint8_t *packetData, uint32_t lenPacket, uint32_t ip) argument 1610 FindNodeIDByIP(CKadClientSearcher* requester, uint32_t ip, uint16_t tcpPort, uint16_t udpPort) argument 1636 SendLegacyChallenge(uint32_t ip, uint16_t port, const CUInt128& contactID) argument 1678 uint32 ip = wxUINT32_SWAP_ALWAYS(kad_ip); local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/gfs2/ |
H A D | glops.c | 135 struct gfs2_inode *ip = gl->gl_object; local 139 if (ip && !S_ISREG(ip->i_inode.i_mode)) 140 ip = NULL; 141 if (ip && test_and_clear_bit(GIF_SW_PAGED, &ip->i_flags)) 142 unmap_shared_mapping_range(ip->i_inode.i_mapping, 0, 0); 150 if (ip) { 151 struct address_space *mapping = ip->i_inode.i_mapping; 180 struct gfs2_inode *ip local 226 struct gfs2_inode *ip = gl->gl_object; local 262 const struct gfs2_inode *ip = gl->gl_object; local 344 struct gfs2_inode *ip = GFS2_I(sdp->sd_jdesc->jd_inode); local 387 struct gfs2_inode *ip = (struct gfs2_inode *)gl->gl_object; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/jfs/ |
H A D | inode.c | 195 int jfs_get_block(struct inode *ip, sector_t lblock, argument 203 s32 xlen = bh_result->b_size >> ip->i_blkbits; 209 IWRITE_LOCK(ip, RDWRLOCK_NORMAL); 211 IREAD_LOCK(ip, RDWRLOCK_NORMAL); 213 if (((lblock64 << ip->i_sb->s_blocksize_bits) < ip->i_size) && 214 (!xtLookup(ip, lblock64, xlen, &xflag, &xaddr, &xlen, 0)) && 235 rc = extRecord(ip, &xad); 241 map_bh(bh_result, ip->i_sb, xaddr); 242 bh_result->b_size = xlen << ip 366 jfs_truncate_nolock(struct inode *ip, loff_t length) argument 406 jfs_truncate(struct inode *ip) argument [all...] |
H A D | jfs_incore.h | 106 #define IREAD_LOCK(ip, subclass) \ 107 down_read_nested(&JFS_IP(ip)->rdwrlock, subclass) 108 #define IREAD_UNLOCK(ip) up_read(&JFS_IP(ip)->rdwrlock) 109 #define IWRITE_LOCK(ip, subclass) \ 110 down_write_nested(&JFS_IP(ip)->rdwrlock, subclass) 111 #define IWRITE_UNLOCK(ip) up_write(&JFS_IP(ip)->rdwrlock) 149 #define set_cflag(flag, ip) set_bit(flag, &(JFS_IP(ip) [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/lib/ |
H A D | wins_srv.c | 97 see if an ip is on the dead list 175 struct in_addr ip; member in struct:tagged_ip 181 and the ip in in_addr format. If there is no tag then 184 static void parse_ip(struct tagged_ip *ip, const char *str) argument 188 fstrcpy(ip->tag, "*"); 189 ip->ip = *interpret_addr2(str); 193 ip->ip = *interpret_addr2(s+1); 194 fstrcpy(ip 293 struct in_addr ip; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/mips/kernel/ |
H A D | ftrace.c | 21 static inline int in_module(unsigned long ip) argument 23 return ip & 0x40000000; 28 #define JAL 0x0c000000 /* jump & link: ip --> ra, jump to target */ 63 static int ftrace_modify_code(unsigned long ip, unsigned int new_code) argument 67 /* *(unsigned int *)ip = new_code; */ 68 safe_store_code(new_code, ip, faulted); 73 flush_icache_range(ip, ip + 8); 82 unsigned long ip = rec->ip; local 124 unsigned long ip = rec->ip; local 189 unsigned long sp, ip, ra; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/xfs/ |
H A D | xfs_bmap.h | 119 struct xfs_inode *ip; /* incore inode pointer */ member in struct:xfs_bmalloca 162 struct xfs_inode *ip, /* incore inode pointer */ 166 #define XFS_BMAP_TRACE_EXLIST(ip,c,w) \ 167 xfs_bmap_trace_exlist(ip,c,w, _THIS_IP_) 169 #define XFS_BMAP_TRACE_EXLIST(ip,c,w) 174 * Must not be in a transaction, ip must not be locked. 178 struct xfs_inode *ip, /* incore inode pointer */ 218 struct xfs_inode *ip, /* incore inode */ 232 struct xfs_inode *ip, /* incore inode */ 244 struct xfs_inode *ip, /* incor [all...] |
H A D | xfs_vnodeops.h | 17 int xfs_setattr(struct xfs_inode *ip, struct iattr *vap, int flags); 23 int xfs_readlink(struct xfs_inode *ip, char *link); 24 int xfs_release(struct xfs_inode *ip); 25 int xfs_inactive(struct xfs_inode *ip); 31 struct xfs_inode *ip); 39 int xfs_set_dmattrs(struct xfs_inode *ip, u_int evmask, u_int16_t state); 40 int xfs_change_file_space(struct xfs_inode *ip, int cmd, 45 int xfs_attr_get(struct xfs_inode *ip, const unsigned char *name, 52 int xfs_bmap(struct xfs_inode *ip, xfs_off_t offset, ssize_t count, 56 int xfs_flushinval_pages(struct xfs_inode *ip, xfs_off_ [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/s390/kernel/ |
H A D | ftrace.c | 82 static int ftrace_modify_code(unsigned long ip, argument 95 if (probe_kernel_read(replaced, (void *)ip, old_size)) 99 if (probe_kernel_write((void *)ip, new_code, new_size)) 107 return ftrace_modify_code(rec->ip, 117 return ftrace_modify_code(rec->ip, 124 return ftrace_modify_code(rec->ip, 184 unsigned long prepare_ftrace_return(unsigned long ip, unsigned long parent) argument 190 if (ftrace_push_return_trace(parent, ip, &trace.depth, 0) == -EBUSY) 192 trace.func = ftrace_mcount_call_adjust(ip) & PSW_ADDR_INSN;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/tcpdump-4.4.0/ |
H A D | print-ip.c | 24 "@(#) $Header: /tcpdump/master/tcpdump/print-ip.c,v 1.159 2007-09-14 01:29:28 guy Exp $ (LBL)"; 41 #include "ip.h" 91 ip_finddst(const struct ip *ip) argument 98 cp = (const u_char *)(ip + 1); 99 length = (IP_HL(ip) << 2) - sizeof(struct ip); 128 memcpy(&retval, &ip->ip_dst.s_addr, sizeof(u_int32_t)); 136 nextproto4_cksum(const struct ip *ip, cons argument 314 const struct ip *ip; member in struct:ip_print_demux_state 675 struct ip *ip, hdr; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/pcap2nbench/ |
H A D | ip.hpp | 28 struct ip { struct 29 ip(const uint8_t *data, size_t length); 45 std::ostream &operator<<(std::ostream &lhs, const ip &rhs);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/x86/mm/ |
H A D | extable.c | 24 fixup = search_exception_tables(regs->ip); 29 regs->ip += fixup->fixup; 32 regs->ip = fixup->fixup;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libav-0.8.8/libavcodec/arm/ |
H A D | simple_idct_armv5te.S | 58 mov ip, #16384 59 sub ip, ip, #1 /* ip = W4 */ 60 smlabb v1, ip, a3, v1 /* v1 = W4*row[0]+(1<<(RS-1)) */ 61 ldr ip, w26 /* ip = W2 | (W6 << 16) */ 62 smultb a2, ip, a4 63 smulbb lr, ip, a4 69 ldr ip, w1 [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavcodec/arm/ |
H A D | simple_idct_armv5te.S | 52 mov ip, #16384 53 sub ip, ip, #1 /* ip = W4 */ 54 smlabb v1, ip, a3, v1 /* v1 = W4*row[0]+(1<<(RS-1)) */ 55 ldr ip, =W26 /* ip = W2 | (W6 << 16) */ 56 smultb a2, ip, a4 57 smulbb lr, ip, a4 63 ldr ip, [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/scsi/ |
H A D | scsicam.c | 59 * @ip: return value: ip[0]=heads, ip[1]=sectors, ip[2]=cylinders 62 * SCSI-CAM system, storing the results in ip as required 68 int scsicam_bios_param(struct block_device *bdev, sector_t capacity, int *ip) argument 79 ret = scsi_partsize(p, (unsigned long)capacity, (unsigned int *)ip + 2, 80 (unsigned int *)ip + 0, (unsigned int *)ip + 1); 87 ret = setsize((unsigned long)capacity, (unsigned int *)ip [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/video/ |
H A D | pmag-aa-fb.c | 229 struct aafb_info *ip = (struct aafb_info *)info; local 233 fix->smem_start = ip->fb_start; 234 fix->smem_len = ip->fb_size; 307 struct aafb_info *ip = (struct aafb_info *)info; local 308 struct display *old = (currcon < 0) ? &ip->disp : (fb_display + currcon); 309 struct display *new = (con < 0) ? &ip->disp : (fb_display + con); 316 aafb_set_disp(new, con, ip); 380 struct aafb_info *ip = (struct aafb_info *)info; local 381 struct display *disp = (con < 0) ? &ip->disp : (fb_display + con); 384 aafbcon_cursor(disp, CM_ERASE, ip 393 struct aafb_info *ip = (struct aafb_info *)info; local 413 struct aafb_info *ip = &my_fb_info[slot]; local 469 struct aafb_info *ip = &my_fb_info[slot]; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/ip/ |
H A D | Makefile | 4 IPOBJ=ip.o ipaddress.o iproute.o iprule.o \ 14 #TARGETS=ip rtmon 15 TARGETS=ip 20 ip: $(IPOBJ) $(LIBNETLINK) $(LIBUTIL) 26 $(STRIP) $(DESTDIR)$(SBINDIR)/ip
|