/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | CA.sh | 141 $CA -policy policy_anything -infiles newreq.pem 156 $CA -policy policy_anything -out newcert.pem -infiles newreq.pem 162 $CA -policy policy_anything -out newcert.pem -extensions v3_ca -infiles newreq.pem 169 $CA -policy policy_anything -out newcert.pem -infiles tmp.pem
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | CA.sh | 141 $CA -policy policy_anything -infiles newreq.pem 156 $CA -policy policy_anything -out newcert.pem -infiles newreq.pem 162 $CA -policy policy_anything -out newcert.pem -extensions v3_ca -infiles newreq.pem 169 $CA -policy policy_anything -out newcert.pem -infiles tmp.pem
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/wimax/ |
H A D | op-state-get.c | 80 .policy = wimax_gnl_state_get_policy,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | shmem_fs.h | 18 struct shared_policy policy; /* NUMA memory alloc policy */ member in struct:shmem_inode_info 34 struct mempolicy *mpol; /* default memory policy for mappings */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/iptables/ |
H A D | iptables-restore.c | 246 char *policy, *chain; local 281 policy = strtok(NULL, " \t\n"); 282 DEBUGP("line %u, policy '%s'\n", line, policy); 283 if (!policy) { 285 "%s: line %u policy invalid\n", 290 if (strcmp(policy, "-") != 0) { 299 "invalid policy counters " 307 DEBUGP("Setting policy of chain %s to %s\n", 308 chain, policy); [all...] |
H A D | iptables-xml.c | 92 char *policy; member in struct:chain 236 openChain(char *chain, char *policy, struct ipt_counters *ctr, char close) argument 245 if (strcmp(policy, "-") != 0) 246 xmlAttrS("policy", policy); 281 openChain(chains[c].chain, chains[c].policy, 290 saveChain(char *chain, char *policy, struct ipt_counters *ctr) argument 299 chains[nextChain].policy = strdup(policy); 312 openChain(chains[c].chain, chains[c].policy, 696 char *policy, *chain; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/iptables/ |
H A D | ip6tables-restore.c | 247 char *policy, *chain; local 283 policy = strtok(NULL, " \t\n"); 284 DEBUGP("line %u, policy '%s'\n", line, policy); 285 if (!policy) { 287 "%s: line %u policy invalid\n", 293 if (strcmp(policy, "-") != 0) { 302 "invalid policy counters " 310 DEBUGP("Setting policy of chain %s to %s\n", 311 chain, policy); [all...] |
H A D | iptables-restore.c | 246 char *policy, *chain; local 281 policy = strtok(NULL, " \t\n"); 282 DEBUGP("line %u, policy '%s'\n", line, policy); 283 if (!policy) { 285 "%s: line %u policy invalid\n", 290 if (strcmp(policy, "-") != 0) { 299 "invalid policy counters " 307 DEBUGP("Setting policy of chain %s to %s\n", 308 chain, policy); [all...] |
H A D | iptables-xml.c | 92 char *policy; member in struct:chain 236 openChain(char *chain, char *policy, struct ipt_counters *ctr, char close) argument 245 if (strcmp(policy, "-") != 0) 246 xmlAttrS("policy", policy); 281 openChain(chains[c].chain, chains[c].policy, 290 saveChain(char *chain, char *policy, struct ipt_counters *ctr) argument 299 chains[nextChain].policy = strdup(policy); 312 openChain(chains[c].chain, chains[c].policy, 696 char *policy, *chain; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/bus/ |
H A D | system.conf | 44 <policy context="default"> 71 </policy> 74 holes in the above policy for specific services. -->
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/ |
H A D | winbindd_reconnect.c | 247 /* find the lockout policy of a domain */ 250 SAM_UNK_INFO_12 *policy) 254 result = msrpc_methods.lockout_policy(domain, mem_ctx, policy); 257 result = msrpc_methods.lockout_policy(domain, mem_ctx, policy); 262 /* find the password policy of a domain */ 265 SAM_UNK_INFO_1 *policy) 269 result = msrpc_methods.password_policy(domain, mem_ctx, policy); 272 result = msrpc_methods.password_policy(domain, mem_ctx, policy); 248 lockout_policy(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx, SAM_UNK_INFO_12 *policy) argument 263 password_policy(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx, SAM_UNK_INFO_1 *policy) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | CA.sh | 100 $CA -policy policy_anything -infiles newreq.pem 104 $CA -policy policy_anything -out newcert.pem -infiles newreq.pem 112 $CA -policy policy_anything -out newcert.pem -infiles tmp.pem
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/acpi/ |
H A D | processor_thermal.c | 104 struct cpufreq_policy policy; local 105 if (!acpi_thermal_cpufreq_is_init || cpufreq_get_policy(&policy, cpu)) 143 struct cpufreq_policy *policy = data; local 150 policy->cpuinfo.max_freq * 151 (100 - per_cpu(cpufreq_thermal_reduction_pctg, policy->cpu) * 20) 154 cpufreq_verify_within_limits(policy, 0, max_freq); 266 * Our default policy is to only use throttling at the lowest
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/arm-uclibc/target/etc/ |
H A D | system.conf | 44 <policy context="default"> 71 </policy> 74 holes in the above policy for specific services. -->
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.x/ |
H A D | iptables-xml.c | 101 char *policy; member in struct:chain 245 openChain(char *chain, char *policy, struct ipt_counters *ctr, char close) argument 254 if (strcmp(policy, "-") != 0) 255 xmlAttrS("policy", policy); 290 openChain(chains[c].chain, chains[c].policy, 299 saveChain(char *chain, char *policy, struct ipt_counters *ctr) argument 308 chains[nextChain].policy = strdup(policy); 321 openChain(chains[c].chain, chains[c].policy, 693 char *policy, *chain; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/powerpc/platforms/powermac/ |
H A D | cpufreq_64.c | 319 static int g5_cpufreq_verify(struct cpufreq_policy *policy) argument 321 return cpufreq_frequency_table_verify(policy, g5_cpu_freqs); 324 static int g5_cpufreq_target(struct cpufreq_policy *policy, argument 331 if (cpufreq_frequency_table_target(policy, g5_cpu_freqs, 358 static int g5_cpufreq_cpu_init(struct cpufreq_policy *policy) argument 360 policy->cpuinfo.transition_latency = transition_latency; 361 policy->cur = g5_cpu_freqs[g5_query_freq()].frequency; 363 * cpufreq core if in the secondary policy we tell it that 364 * it actually must be one policy together with all others. */ 365 cpumask_copy(policy [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/ |
H A D | netlink.h | 162 * Standard attribute types to specify validation policy 183 * struct nla_policy - attribute validation policy 229 const struct nla_policy *policy); 232 const struct nla_policy *policy); 364 * @policy: validation policy 370 const struct nla_policy *policy) 376 nlmsg_attrlen(nlh, hdrlen), policy); 399 * @policy: validation policy 368 nlmsg_parse(const struct nlmsghdr *nlh, int hdrlen, struct nlattr *tb[], int maxtype, const struct nla_policy *policy) argument 401 nlmsg_validate(struct nlmsghdr *nlh, int hdrlen, int maxtype, const struct nla_policy *policy) argument 710 nla_parse_nested(struct nlattr *tb[], int maxtype, const struct nlattr *nla, const struct nla_policy *policy) argument 1001 nla_validate_nested(struct nlattr *start, int maxtype, const struct nla_policy *policy) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/repmgr/ |
H A D | repmgr_method.c | 165 __repmgr_set_ack_policy(dbenv, policy) 167 int policy; 173 switch (policy) { 180 env->rep_handle->perm_policy = policy; 193 __repmgr_get_ack_policy(dbenv, policy) 195 int *policy; 200 *policy = env->rep_handle->perm_policy;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/lib/ |
H A D | nlattr.c | 27 const struct nla_policy *policy) 35 pt = &policy[type]; 110 * @policy: validation policy 113 * specified policy. Attributes with a type exceeding maxtype will be 119 const struct nla_policy *policy) 125 err = validate_nla(nla, maxtype, policy); 136 * nla_policy_len - Determin the max. length of a policy 137 * @policy: policy t 26 validate_nla(struct nlattr *nla, int maxtype, const struct nla_policy *policy) argument 118 nla_validate(struct nlattr *head, int len, int maxtype, const struct nla_policy *policy) argument 176 nla_parse(struct nlattr *tb[], int maxtype, struct nlattr *head, int len, const struct nla_policy *policy) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/zebra/ |
H A D | zebra_snmp.c | 292 int policy; 308 policy = 0; 331 policy = objid[v->namelen + 5]; 349 if (policy) /* Not supported (yet?) */ 386 if ((policy < policy2) 387 || ((policy == policy2) && (proto < proto2)) 388 || ((policy == policy2) && (proto == proto2) 400 policy = 0; 409 objid[v->namelen + 5] = policy; 289 int policy; local
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/rpc_server/ |
H A D | srv_lsa_hnd.c | 44 Initialise a policy handle list on a pipe. Handle list is shared between all 99 find first available policy slot. creates a policy handle for you. 108 struct policy *pol; 116 pol = SMB_MALLOC_P(struct policy); 148 DEBUG(4,("Opened policy hnd[%d] ", (int)p->pipe_handles->count)); 155 find policy by handle - internal version. 158 static struct policy *find_policy_by_hnd_internal(pipes_struct *p, POLICY_HND *hnd, void **data_p) 160 struct policy *pol; 168 DEBUG(4,("Found policy hn [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | ntdomain.h | 121 struct policy { struct 122 struct policy *next, *prev; 131 struct policy *Policy; /* List of policies. */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/ |
H A D | ts_req_utils.c | 128 int TS_REQ_set_policy_id(TS_REQ *a, ASN1_OBJECT *policy) argument 132 if (a->policy_id == policy) 134 new_policy = OBJ_dup(policy);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509v3/ |
H A D | pcy_cache.c | 82 POLICYINFO *policy; local 89 policy = sk_POLICYINFO_value(policies, i); 90 data = policy_data_new(policy, NULL, crit); 94 * Duplicate policy OIDs are illegal: reject if matches found.
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509v3/ |
H A D | pcy_cache.c | 80 POLICYINFO *policy; local 88 policy = sk_POLICYINFO_value(policies, i); 89 data = policy_data_new(policy, NULL, crit); 92 /* Duplicate policy OIDs are illegal: reject if matches
|