Searched refs:matches (Results 76 - 100 of 263) sorted by relevance

1234567891011

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/platform/x86/
H A Dacer-wmi.c219 .matches = {
226 .matches = {
238 .matches = {
247 .matches = {
256 .matches = {
265 .matches = {
274 .matches = {
283 .matches = {
292 .matches = {
301 .matches
[all...]
H A Dmsi-laptop.c443 .matches = {
454 .matches = {
464 .matches = {
474 .matches = {
489 .matches = {
500 .matches = {
511 .matches = {
520 .matches = {
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/hv/
H A Dhv_timesource.c67 .matches = {
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/
H A Dof_device.h13 const struct of_device_id *matches, const struct device *dev);
17 * of_driver_match_device - Tell if a driver's of_match_table matches a device.
H A Dof_platform.h71 /* pseudo "matches" value to not do deep probe */
75 const struct of_device_id *matches,
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/iptables/
H A Dxshared.h58 struct xtables_rule_match *matches; member in struct:iptables_command_state
H A Dip6tables.c207 exit_printhelp(const struct xtables_rule_match *matches) argument
282 print_extension_helps(xtables_targets, matches);
759 make_delete_mask(const struct xtables_rule_match *matches, argument
768 for (matchp = matches; matchp; matchp = matchp->next)
778 for (matchp = matches; matchp; matchp = matchp->next) {
803 struct xtables_rule_match *matches,
810 mask = make_delete_mask(matches, target);
833 struct xtables_rule_match *matches,
840 mask = make_delete_mask(matches, target);
1045 /* some matches do
793 delete_entry(const ip6t_chainlabel chain, struct ip6t_entry *fw, unsigned int nsaddrs, const struct in6_addr saddrs[], const struct in6_addr smasks[], unsigned int ndaddrs, const struct in6_addr daddrs[], const struct in6_addr dmasks[], int verbose, struct ip6tc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument
828 check_entry(const ip6t_chainlabel chain, struct ip6t_entry *fw, unsigned int nsaddrs, const struct in6_addr *saddrs, const struct in6_addr *smasks, unsigned int ndaddrs, const struct in6_addr *daddrs, const struct in6_addr *dmasks, bool verbose, struct ip6tc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument
1218 generate_entry(const struct ip6t_entry *fw, struct xtables_rule_match *matches, struct ip6t_entry_target *target) argument
1245 clear_rule_matches(struct xtables_rule_match **matches) argument
[all...]
H A Diptables.c209 exit_printhelp(const struct xtables_rule_match *matches) argument
284 print_extension_helps(xtables_targets, matches);
753 make_delete_mask(const struct xtables_rule_match *matches, argument
762 for (matchp = matches; matchp; matchp = matchp->next)
772 for (matchp = matches; matchp; matchp = matchp->next) {
797 struct xtables_rule_match *matches,
804 mask = make_delete_mask(matches, target);
827 struct xtables_rule_match *matches,
834 mask = make_delete_mask(matches, target);
1045 /* some matches do
787 delete_entry(const ipt_chainlabel chain, struct ipt_entry *fw, unsigned int nsaddrs, const struct in_addr saddrs[], const struct in_addr smasks[], unsigned int ndaddrs, const struct in_addr daddrs[], const struct in_addr dmasks[], int verbose, struct iptc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument
822 check_entry(const ipt_chainlabel chain, struct ipt_entry *fw, unsigned int nsaddrs, const struct in_addr *saddrs, const struct in_addr *smasks, unsigned int ndaddrs, const struct in_addr *daddrs, const struct in_addr *dmasks, bool verbose, struct iptc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument
1225 generate_entry(const struct ipt_entry *fw, struct xtables_rule_match *matches, struct ipt_entry_target *target) argument
1252 clear_rule_matches(struct xtables_rule_match **matches) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/ata/
H A Data_piix.c1001 .matches = {
1008 .matches = {
1015 .matches = {
1022 .matches = {
1029 .matches = {
1036 .matches = {
1043 .matches = {
1050 .matches = {
1057 .matches = {
1064 .matches
[all...]
H A Dahci.c728 .matches = {
763 .matches = {
788 .matches = {
830 .matches = {
839 .matches = {
878 .matches = {
887 .matches = {
896 .matches = {
905 .matches = {
923 .matches
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/ip/
H A Diptunnel.c289 matches(*argv, "dsfield") == 0) {
302 if (matches(*argv, "help") == 0)
568 if (matches(*argv, "add") == 0)
570 if (matches(*argv, "change") == 0)
572 if (matches(*argv, "del") == 0)
574 if (matches(*argv, "show") == 0 ||
575 matches(*argv, "lst") == 0 ||
576 matches(*argv, "list") == 0)
578 if (matches(*argv, "help") == 0)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/test/
H A Digetest.c287 unsigned matches; local
370 matches = 0;
373 ++matches;
375 if (matches > sizeof checktext / 2 + sizeof checktext / 100) {
376 printf("More than 51%% matches after garbling\n");
380 if (matches < sizeof checktext / 2) {
425 matches = 0;
428 ++matches;
430 if (matches > sizeof checktext / 100) {
431 printf("More than 1%% matches afte
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/
H A Digetest.c279 unsigned matches; local
368 matches=0;
371 ++matches;
373 if(matches > sizeof checktext/2+sizeof checktext/100)
375 printf("More than 51%% matches after garbling\n");
379 if(matches < sizeof checktext/2)
424 matches=0;
427 ++matches;
429 if(matches > sizeof checktext/100)
431 printf("More than 1%% matches afte
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/test/
H A Digetest.c287 unsigned matches; local
370 matches = 0;
373 ++matches;
375 if (matches > sizeof checktext / 2 + sizeof checktext / 100) {
376 printf("More than 51%% matches after garbling\n");
380 if (matches < sizeof checktext / 2) {
425 matches = 0;
428 ++matches;
430 if (matches > sizeof checktext / 100) {
431 printf("More than 1%% matches afte
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/tc/
H A Df_rsvp.c196 if (matches(*argv, "session") == 0) {
207 } else if (matches(*argv, "sender") == 0 ||
208 matches(*argv, "flowspec") == 0) {
219 } else if (matches("ipproto", *argv) == 0) {
229 } else if (matches(*argv, "classid") == 0 ||
265 } else if (matches(*argv, "police") == 0) {
H A Dp_ip.c52 if (strcmp(*argv, "tos") == 0 || matches(*argv, "dsfield") == 0) {
71 if (matches(*argv, "precedence") == 0) {
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/iptables/
H A Dip6tables.c207 exit_printhelp(const struct xtables_rule_match *matches) argument
282 print_extension_helps(xtables_targets, matches);
759 make_delete_mask(const struct xtables_rule_match *matches, argument
768 for (matchp = matches; matchp; matchp = matchp->next)
778 for (matchp = matches; matchp; matchp = matchp->next) {
803 struct xtables_rule_match *matches,
810 mask = make_delete_mask(matches, target);
833 struct xtables_rule_match *matches,
840 mask = make_delete_mask(matches, target);
1045 /* some matches do
793 delete_entry(const ip6t_chainlabel chain, struct ip6t_entry *fw, unsigned int nsaddrs, const struct in6_addr saddrs[], const struct in6_addr smasks[], unsigned int ndaddrs, const struct in6_addr daddrs[], const struct in6_addr dmasks[], int verbose, struct ip6tc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument
828 check_entry(const ip6t_chainlabel chain, struct ip6t_entry *fw, unsigned int nsaddrs, const struct in6_addr *saddrs, const struct in6_addr *smasks, unsigned int ndaddrs, const struct in6_addr *daddrs, const struct in6_addr *dmasks, bool verbose, struct ip6tc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument
1225 generate_entry(const struct ip6t_entry *fw, struct xtables_rule_match *matches, struct ip6t_entry_target *target) argument
1252 clear_rule_matches(struct xtables_rule_match **matches) argument
[all...]
H A Diptables.c220 exit_printhelp(const struct xtables_rule_match *matches) argument
295 print_extension_helps(xtables_targets, matches);
764 make_delete_mask(const struct xtables_rule_match *matches, argument
773 for (matchp = matches; matchp; matchp = matchp->next)
783 for (matchp = matches; matchp; matchp = matchp->next) {
808 struct xtables_rule_match *matches,
815 mask = make_delete_mask(matches, target);
838 struct xtables_rule_match *matches,
845 mask = make_delete_mask(matches, target);
1056 /* some matches do
798 delete_entry(const ipt_chainlabel chain, struct ipt_entry *fw, unsigned int nsaddrs, const struct in_addr saddrs[], const struct in_addr smasks[], unsigned int ndaddrs, const struct in_addr daddrs[], const struct in_addr dmasks[], int verbose, struct iptc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument
833 check_entry(const ipt_chainlabel chain, struct ipt_entry *fw, unsigned int nsaddrs, const struct in_addr *saddrs, const struct in_addr *smasks, unsigned int ndaddrs, const struct in_addr *daddrs, const struct in_addr *dmasks, bool verbose, struct iptc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument
1236 generate_entry(const struct ipt_entry *fw, struct xtables_rule_match *matches, struct ipt_entry_target *target) argument
1263 clear_rule_matches(struct xtables_rule_match **matches) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/src/common/
H A Dregex.cpp81 // the array of offsets for the matches, the usual POSIX regmatch_t array.
112 // the array of offsets for the matches, the struct used by the GNU lib
314 // don't allocate the matches array now, but do it later if necessary
371 re_registers *matches,
380 int ret = re_search(pattern, text, len, 0, len, matches);
402 // allocate matches array if needed
409 wxRegExMatches::match_type matches = m_Matches ? m_Matches->get() : NULL; local
413 int rc = wx_re_exec(&self->m_RegEx, str, len, NULL, m_nMatches, matches, flagsRE);
415 int rc = str ? ReSearch(&self->m_RegEx, str, len, matches, flagsRE) : REG_BADPAT;
417 int rc = str ? regexec(&self->m_RegEx, str, m_nMatches, matches, flagsR
368 ReSearch(const regex_t *preg, const char *text, size_t len, re_registers *matches, int eflags) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/acpi/
H A Dsleep.c376 .matches = {
384 .matches = {
392 .matches = {
400 .matches = {
409 .matches = {
417 .matches = {
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/input/keyboard/
H A Datkbd.c1581 .matches = {
1589 .matches = {
1597 .matches = {
1605 .matches = {
1613 .matches = {
1621 .matches = {
1629 .matches = {
1638 .matches = {
1647 .matches = {
1656 .matches
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/x86/pci/
H A Dfixup.c250 * Check if the DID of pdev matches one of the six root ports. This
350 .matches = {
407 .matches = {
414 .matches = {
421 .matches = {
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netfilter/
H A Dxt_connlimit.c108 int matches = 0; local
156 ++matches;
169 ++matches;
172 return matches;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/lzo-2.06/src/
H A Dlzo1b_cc.c140 lzo_stats->matches =
H A Dlzo1c_cc.c140 lzo_stats->matches =

Completed in 153 milliseconds

1234567891011