Searched refs:policy (Results 101 - 125 of 345) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A DCA.sh141 $CA -policy policy_anything -infiles newreq.pem
156 $CA -policy policy_anything -out newcert.pem -infiles newreq.pem
162 $CA -policy policy_anything -out newcert.pem -extensions v3_ca -infiles newreq.pem
169 $CA -policy policy_anything -out newcert.pem -infiles tmp.pem
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A DCA.sh141 $CA -policy policy_anything -infiles newreq.pem
156 $CA -policy policy_anything -out newcert.pem -infiles newreq.pem
162 $CA -policy policy_anything -out newcert.pem -extensions v3_ca -infiles newreq.pem
169 $CA -policy policy_anything -out newcert.pem -infiles tmp.pem
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/wimax/
H A Dop-state-get.c80 .policy = wimax_gnl_state_get_policy,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/
H A Dshmem_fs.h18 struct shared_policy policy; /* NUMA memory alloc policy */ member in struct:shmem_inode_info
34 struct mempolicy *mpol; /* default memory policy for mappings */
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/iptables/
H A Diptables-restore.c246 char *policy, *chain; local
281 policy = strtok(NULL, " \t\n");
282 DEBUGP("line %u, policy '%s'\n", line, policy);
283 if (!policy) {
285 "%s: line %u policy invalid\n",
290 if (strcmp(policy, "-") != 0) {
299 "invalid policy counters "
307 DEBUGP("Setting policy of chain %s to %s\n",
308 chain, policy);
[all...]
H A Diptables-xml.c92 char *policy; member in struct:chain
236 openChain(char *chain, char *policy, struct ipt_counters *ctr, char close) argument
245 if (strcmp(policy, "-") != 0)
246 xmlAttrS("policy", policy);
281 openChain(chains[c].chain, chains[c].policy,
290 saveChain(char *chain, char *policy, struct ipt_counters *ctr) argument
299 chains[nextChain].policy = strdup(policy);
312 openChain(chains[c].chain, chains[c].policy,
696 char *policy, *chain; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/iptables/
H A Dip6tables-restore.c247 char *policy, *chain; local
283 policy = strtok(NULL, " \t\n");
284 DEBUGP("line %u, policy '%s'\n", line, policy);
285 if (!policy) {
287 "%s: line %u policy invalid\n",
293 if (strcmp(policy, "-") != 0) {
302 "invalid policy counters "
310 DEBUGP("Setting policy of chain %s to %s\n",
311 chain, policy);
[all...]
H A Diptables-restore.c246 char *policy, *chain; local
281 policy = strtok(NULL, " \t\n");
282 DEBUGP("line %u, policy '%s'\n", line, policy);
283 if (!policy) {
285 "%s: line %u policy invalid\n",
290 if (strcmp(policy, "-") != 0) {
299 "invalid policy counters "
307 DEBUGP("Setting policy of chain %s to %s\n",
308 chain, policy);
[all...]
H A Diptables-xml.c92 char *policy; member in struct:chain
236 openChain(char *chain, char *policy, struct ipt_counters *ctr, char close) argument
245 if (strcmp(policy, "-") != 0)
246 xmlAttrS("policy", policy);
281 openChain(chains[c].chain, chains[c].policy,
290 saveChain(char *chain, char *policy, struct ipt_counters *ctr) argument
299 chains[nextChain].policy = strdup(policy);
312 openChain(chains[c].chain, chains[c].policy,
696 char *policy, *chain; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/bus/
H A Dsystem.conf44 <policy context="default">
71 </policy>
74 holes in the above policy for specific services. -->
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/
H A Dwinbindd_reconnect.c247 /* find the lockout policy of a domain */
250 SAM_UNK_INFO_12 *policy)
254 result = msrpc_methods.lockout_policy(domain, mem_ctx, policy);
257 result = msrpc_methods.lockout_policy(domain, mem_ctx, policy);
262 /* find the password policy of a domain */
265 SAM_UNK_INFO_1 *policy)
269 result = msrpc_methods.password_policy(domain, mem_ctx, policy);
272 result = msrpc_methods.password_policy(domain, mem_ctx, policy);
248 lockout_policy(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx, SAM_UNK_INFO_12 *policy) argument
263 password_policy(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx, SAM_UNK_INFO_1 *policy) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A DCA.sh100 $CA -policy policy_anything -infiles newreq.pem
104 $CA -policy policy_anything -out newcert.pem -infiles newreq.pem
112 $CA -policy policy_anything -out newcert.pem -infiles tmp.pem
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/acpi/
H A Dprocessor_thermal.c104 struct cpufreq_policy policy; local
105 if (!acpi_thermal_cpufreq_is_init || cpufreq_get_policy(&policy, cpu))
143 struct cpufreq_policy *policy = data; local
150 policy->cpuinfo.max_freq *
151 (100 - per_cpu(cpufreq_thermal_reduction_pctg, policy->cpu) * 20)
154 cpufreq_verify_within_limits(policy, 0, max_freq);
266 * Our default policy is to only use throttling at the lowest
/netgear-R7000-V1.0.7.12_1.2.5/src/router/arm-uclibc/target/etc/
H A Dsystem.conf44 <policy context="default">
71 </policy>
74 holes in the above policy for specific services. -->
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.x/
H A Diptables-xml.c101 char *policy; member in struct:chain
245 openChain(char *chain, char *policy, struct ipt_counters *ctr, char close) argument
254 if (strcmp(policy, "-") != 0)
255 xmlAttrS("policy", policy);
290 openChain(chains[c].chain, chains[c].policy,
299 saveChain(char *chain, char *policy, struct ipt_counters *ctr) argument
308 chains[nextChain].policy = strdup(policy);
321 openChain(chains[c].chain, chains[c].policy,
693 char *policy, *chain; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/powerpc/platforms/powermac/
H A Dcpufreq_64.c319 static int g5_cpufreq_verify(struct cpufreq_policy *policy) argument
321 return cpufreq_frequency_table_verify(policy, g5_cpu_freqs);
324 static int g5_cpufreq_target(struct cpufreq_policy *policy, argument
331 if (cpufreq_frequency_table_target(policy, g5_cpu_freqs,
358 static int g5_cpufreq_cpu_init(struct cpufreq_policy *policy) argument
360 policy->cpuinfo.transition_latency = transition_latency;
361 policy->cur = g5_cpu_freqs[g5_query_freq()].frequency;
363 * cpufreq core if in the secondary policy we tell it that
364 * it actually must be one policy together with all others. */
365 cpumask_copy(policy
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/
H A Dnetlink.h162 * Standard attribute types to specify validation policy
183 * struct nla_policy - attribute validation policy
229 const struct nla_policy *policy);
232 const struct nla_policy *policy);
364 * @policy: validation policy
370 const struct nla_policy *policy)
376 nlmsg_attrlen(nlh, hdrlen), policy);
399 * @policy: validation policy
368 nlmsg_parse(const struct nlmsghdr *nlh, int hdrlen, struct nlattr *tb[], int maxtype, const struct nla_policy *policy) argument
401 nlmsg_validate(struct nlmsghdr *nlh, int hdrlen, int maxtype, const struct nla_policy *policy) argument
710 nla_parse_nested(struct nlattr *tb[], int maxtype, const struct nlattr *nla, const struct nla_policy *policy) argument
1001 nla_validate_nested(struct nlattr *start, int maxtype, const struct nla_policy *policy) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/repmgr/
H A Drepmgr_method.c165 __repmgr_set_ack_policy(dbenv, policy)
167 int policy;
173 switch (policy) {
180 env->rep_handle->perm_policy = policy;
193 __repmgr_get_ack_policy(dbenv, policy)
195 int *policy;
200 *policy = env->rep_handle->perm_policy;
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/lib/
H A Dnlattr.c27 const struct nla_policy *policy)
35 pt = &policy[type];
110 * @policy: validation policy
113 * specified policy. Attributes with a type exceeding maxtype will be
119 const struct nla_policy *policy)
125 err = validate_nla(nla, maxtype, policy);
136 * nla_policy_len - Determin the max. length of a policy
137 * @policy: policy t
26 validate_nla(struct nlattr *nla, int maxtype, const struct nla_policy *policy) argument
118 nla_validate(struct nlattr *head, int len, int maxtype, const struct nla_policy *policy) argument
176 nla_parse(struct nlattr *tb[], int maxtype, struct nlattr *head, int len, const struct nla_policy *policy) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/zebra/
H A Dzebra_snmp.c292 int policy;
308 policy = 0;
331 policy = objid[v->namelen + 5];
349 if (policy) /* Not supported (yet?) */
386 if ((policy < policy2)
387 || ((policy == policy2) && (proto < proto2))
388 || ((policy == policy2) && (proto == proto2)
400 policy = 0;
409 objid[v->namelen + 5] = policy;
289 int policy; local
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_server/
H A Dsrv_lsa_hnd.c44 Initialise a policy handle list on a pipe. Handle list is shared between all
99 find first available policy slot. creates a policy handle for you.
108 struct policy *pol;
116 pol = SMB_MALLOC_P(struct policy);
148 DEBUG(4,("Opened policy hnd[%d] ", (int)p->pipe_handles->count));
155 find policy by handle - internal version.
158 static struct policy *find_policy_by_hnd_internal(pipes_struct *p, POLICY_HND *hnd, void **data_p)
160 struct policy *pol;
168 DEBUG(4,("Found policy hn
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/
H A Dntdomain.h121 struct policy { struct
122 struct policy *next, *prev;
131 struct policy *Policy; /* List of policies. */
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/
H A Dts_req_utils.c128 int TS_REQ_set_policy_id(TS_REQ *a, ASN1_OBJECT *policy) argument
132 if (a->policy_id == policy)
134 new_policy = OBJ_dup(policy);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509v3/
H A Dpcy_cache.c82 POLICYINFO *policy; local
89 policy = sk_POLICYINFO_value(policies, i);
90 data = policy_data_new(policy, NULL, crit);
94 * Duplicate policy OIDs are illegal: reject if matches found.
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509v3/
H A Dpcy_cache.c80 POLICYINFO *policy; local
88 policy = sk_POLICYINFO_value(policies, i);
89 data = policy_data_new(policy, NULL, crit);
92 /* Duplicate policy OIDs are illegal: reject if matches

Completed in 410 milliseconds

1234567891011>>