/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/platform/x86/ |
H A D | acer-wmi.c | 219 .matches = { 226 .matches = { 238 .matches = { 247 .matches = { 256 .matches = { 265 .matches = { 274 .matches = { 283 .matches = { 292 .matches = { 301 .matches [all...] |
H A D | msi-laptop.c | 443 .matches = { 454 .matches = { 464 .matches = { 474 .matches = { 489 .matches = { 500 .matches = { 511 .matches = { 520 .matches = {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/hv/ |
H A D | hv_timesource.c | 67 .matches = {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | of_device.h | 13 const struct of_device_id *matches, const struct device *dev); 17 * of_driver_match_device - Tell if a driver's of_match_table matches a device.
|
H A D | of_platform.h | 71 /* pseudo "matches" value to not do deep probe */ 75 const struct of_device_id *matches,
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/iptables/ |
H A D | xshared.h | 58 struct xtables_rule_match *matches; member in struct:iptables_command_state
|
H A D | ip6tables.c | 207 exit_printhelp(const struct xtables_rule_match *matches) argument 282 print_extension_helps(xtables_targets, matches); 759 make_delete_mask(const struct xtables_rule_match *matches, argument 768 for (matchp = matches; matchp; matchp = matchp->next) 778 for (matchp = matches; matchp; matchp = matchp->next) { 803 struct xtables_rule_match *matches, 810 mask = make_delete_mask(matches, target); 833 struct xtables_rule_match *matches, 840 mask = make_delete_mask(matches, target); 1045 /* some matches do 793 delete_entry(const ip6t_chainlabel chain, struct ip6t_entry *fw, unsigned int nsaddrs, const struct in6_addr saddrs[], const struct in6_addr smasks[], unsigned int ndaddrs, const struct in6_addr daddrs[], const struct in6_addr dmasks[], int verbose, struct ip6tc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument 828 check_entry(const ip6t_chainlabel chain, struct ip6t_entry *fw, unsigned int nsaddrs, const struct in6_addr *saddrs, const struct in6_addr *smasks, unsigned int ndaddrs, const struct in6_addr *daddrs, const struct in6_addr *dmasks, bool verbose, struct ip6tc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument 1218 generate_entry(const struct ip6t_entry *fw, struct xtables_rule_match *matches, struct ip6t_entry_target *target) argument 1245 clear_rule_matches(struct xtables_rule_match **matches) argument [all...] |
H A D | iptables.c | 209 exit_printhelp(const struct xtables_rule_match *matches) argument 284 print_extension_helps(xtables_targets, matches); 753 make_delete_mask(const struct xtables_rule_match *matches, argument 762 for (matchp = matches; matchp; matchp = matchp->next) 772 for (matchp = matches; matchp; matchp = matchp->next) { 797 struct xtables_rule_match *matches, 804 mask = make_delete_mask(matches, target); 827 struct xtables_rule_match *matches, 834 mask = make_delete_mask(matches, target); 1045 /* some matches do 787 delete_entry(const ipt_chainlabel chain, struct ipt_entry *fw, unsigned int nsaddrs, const struct in_addr saddrs[], const struct in_addr smasks[], unsigned int ndaddrs, const struct in_addr daddrs[], const struct in_addr dmasks[], int verbose, struct iptc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument 822 check_entry(const ipt_chainlabel chain, struct ipt_entry *fw, unsigned int nsaddrs, const struct in_addr *saddrs, const struct in_addr *smasks, unsigned int ndaddrs, const struct in_addr *daddrs, const struct in_addr *dmasks, bool verbose, struct iptc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument 1225 generate_entry(const struct ipt_entry *fw, struct xtables_rule_match *matches, struct ipt_entry_target *target) argument 1252 clear_rule_matches(struct xtables_rule_match **matches) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/ata/ |
H A D | ata_piix.c | 1001 .matches = { 1008 .matches = { 1015 .matches = { 1022 .matches = { 1029 .matches = { 1036 .matches = { 1043 .matches = { 1050 .matches = { 1057 .matches = { 1064 .matches [all...] |
H A D | ahci.c | 728 .matches = { 763 .matches = { 788 .matches = { 830 .matches = { 839 .matches = { 878 .matches = { 887 .matches = { 896 .matches = { 905 .matches = { 923 .matches [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/ip/ |
H A D | iptunnel.c | 289 matches(*argv, "dsfield") == 0) { 302 if (matches(*argv, "help") == 0) 568 if (matches(*argv, "add") == 0) 570 if (matches(*argv, "change") == 0) 572 if (matches(*argv, "del") == 0) 574 if (matches(*argv, "show") == 0 || 575 matches(*argv, "lst") == 0 || 576 matches(*argv, "list") == 0) 578 if (matches(*argv, "help") == 0)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/test/ |
H A D | igetest.c | 287 unsigned matches; local 370 matches = 0; 373 ++matches; 375 if (matches > sizeof checktext / 2 + sizeof checktext / 100) { 376 printf("More than 51%% matches after garbling\n"); 380 if (matches < sizeof checktext / 2) { 425 matches = 0; 428 ++matches; 430 if (matches > sizeof checktext / 100) { 431 printf("More than 1%% matches afte [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | igetest.c | 279 unsigned matches; local 368 matches=0; 371 ++matches; 373 if(matches > sizeof checktext/2+sizeof checktext/100) 375 printf("More than 51%% matches after garbling\n"); 379 if(matches < sizeof checktext/2) 424 matches=0; 427 ++matches; 429 if(matches > sizeof checktext/100) 431 printf("More than 1%% matches afte [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/test/ |
H A D | igetest.c | 287 unsigned matches; local 370 matches = 0; 373 ++matches; 375 if (matches > sizeof checktext / 2 + sizeof checktext / 100) { 376 printf("More than 51%% matches after garbling\n"); 380 if (matches < sizeof checktext / 2) { 425 matches = 0; 428 ++matches; 430 if (matches > sizeof checktext / 100) { 431 printf("More than 1%% matches afte [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/tc/ |
H A D | f_rsvp.c | 196 if (matches(*argv, "session") == 0) { 207 } else if (matches(*argv, "sender") == 0 || 208 matches(*argv, "flowspec") == 0) { 219 } else if (matches("ipproto", *argv) == 0) { 229 } else if (matches(*argv, "classid") == 0 || 265 } else if (matches(*argv, "police") == 0) {
|
H A D | p_ip.c | 52 if (strcmp(*argv, "tos") == 0 || matches(*argv, "dsfield") == 0) { 71 if (matches(*argv, "precedence") == 0) {
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/iptables/ |
H A D | ip6tables.c | 207 exit_printhelp(const struct xtables_rule_match *matches) argument 282 print_extension_helps(xtables_targets, matches); 759 make_delete_mask(const struct xtables_rule_match *matches, argument 768 for (matchp = matches; matchp; matchp = matchp->next) 778 for (matchp = matches; matchp; matchp = matchp->next) { 803 struct xtables_rule_match *matches, 810 mask = make_delete_mask(matches, target); 833 struct xtables_rule_match *matches, 840 mask = make_delete_mask(matches, target); 1045 /* some matches do 793 delete_entry(const ip6t_chainlabel chain, struct ip6t_entry *fw, unsigned int nsaddrs, const struct in6_addr saddrs[], const struct in6_addr smasks[], unsigned int ndaddrs, const struct in6_addr daddrs[], const struct in6_addr dmasks[], int verbose, struct ip6tc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument 828 check_entry(const ip6t_chainlabel chain, struct ip6t_entry *fw, unsigned int nsaddrs, const struct in6_addr *saddrs, const struct in6_addr *smasks, unsigned int ndaddrs, const struct in6_addr *daddrs, const struct in6_addr *dmasks, bool verbose, struct ip6tc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument 1225 generate_entry(const struct ip6t_entry *fw, struct xtables_rule_match *matches, struct ip6t_entry_target *target) argument 1252 clear_rule_matches(struct xtables_rule_match **matches) argument [all...] |
H A D | iptables.c | 220 exit_printhelp(const struct xtables_rule_match *matches) argument 295 print_extension_helps(xtables_targets, matches); 764 make_delete_mask(const struct xtables_rule_match *matches, argument 773 for (matchp = matches; matchp; matchp = matchp->next) 783 for (matchp = matches; matchp; matchp = matchp->next) { 808 struct xtables_rule_match *matches, 815 mask = make_delete_mask(matches, target); 838 struct xtables_rule_match *matches, 845 mask = make_delete_mask(matches, target); 1056 /* some matches do 798 delete_entry(const ipt_chainlabel chain, struct ipt_entry *fw, unsigned int nsaddrs, const struct in_addr saddrs[], const struct in_addr smasks[], unsigned int ndaddrs, const struct in_addr daddrs[], const struct in_addr dmasks[], int verbose, struct iptc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument 833 check_entry(const ipt_chainlabel chain, struct ipt_entry *fw, unsigned int nsaddrs, const struct in_addr *saddrs, const struct in_addr *smasks, unsigned int ndaddrs, const struct in_addr *daddrs, const struct in_addr *dmasks, bool verbose, struct iptc_handle *handle, struct xtables_rule_match *matches, const struct xtables_target *target) argument 1236 generate_entry(const struct ipt_entry *fw, struct xtables_rule_match *matches, struct ipt_entry_target *target) argument 1263 clear_rule_matches(struct xtables_rule_match **matches) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/src/common/ |
H A D | regex.cpp | 81 // the array of offsets for the matches, the usual POSIX regmatch_t array. 112 // the array of offsets for the matches, the struct used by the GNU lib 314 // don't allocate the matches array now, but do it later if necessary 371 re_registers *matches, 380 int ret = re_search(pattern, text, len, 0, len, matches); 402 // allocate matches array if needed 409 wxRegExMatches::match_type matches = m_Matches ? m_Matches->get() : NULL; local 413 int rc = wx_re_exec(&self->m_RegEx, str, len, NULL, m_nMatches, matches, flagsRE); 415 int rc = str ? ReSearch(&self->m_RegEx, str, len, matches, flagsRE) : REG_BADPAT; 417 int rc = str ? regexec(&self->m_RegEx, str, m_nMatches, matches, flagsR 368 ReSearch(const regex_t *preg, const char *text, size_t len, re_registers *matches, int eflags) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/acpi/ |
H A D | sleep.c | 376 .matches = { 384 .matches = { 392 .matches = { 400 .matches = { 409 .matches = { 417 .matches = {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/input/keyboard/ |
H A D | atkbd.c | 1581 .matches = { 1589 .matches = { 1597 .matches = { 1605 .matches = { 1613 .matches = { 1621 .matches = { 1629 .matches = { 1638 .matches = { 1647 .matches = { 1656 .matches [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/x86/pci/ |
H A D | fixup.c | 250 * Check if the DID of pdev matches one of the six root ports. This 350 .matches = { 407 .matches = { 414 .matches = { 421 .matches = {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netfilter/ |
H A D | xt_connlimit.c | 108 int matches = 0; local 156 ++matches; 169 ++matches; 172 return matches;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/lzo-2.06/src/ |
H A D | lzo1b_cc.c | 140 lzo_stats->matches =
|
H A D | lzo1c_cc.c | 140 lzo_stats->matches =
|