Searched refs:policy (Results 201 - 225 of 345) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/
H A Dstrciphr.h9 Here's an explanation of these classes. The word "policy" is used here to mean a class with a
12 either AdditiveCipherTemplate or CFB_CipherTemplate using the policy. So for example, an
20 to take a policy class as a template parameter (although this is allowed), so that
22 get a reference to an abstract policy interface by calling AccessPolicy() on itself, so
23 AccessPolicy() must be overriden to return the actual policy reference. This is done
153 unsigned int GetBufferByteSize(const PolicyInterface &policy) const {return policy.GetBytesPerIteration() * policy.GetIterationsToBuffer();}
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/kernel/
H A Dsched.c136 static inline int rt_policy(int policy) argument
138 if (unlikely(policy == SCHED_FIFO || policy == SCHED_RR))
145 return rt_policy(p->policy);
1718 * same underlying policy as the spinlock_t on this architecture, which
1880 if (p->policy == SCHED_IDLE) {
2542 * Revert to default priority/policy on fork if requested.
2545 if (p->policy == SCHED_FIFO || p->policy == SCHED_RR) {
2546 p->policy
4693 __setscheduler(struct rq *rq, struct task_struct *p, int policy, int prio) argument
4725 __sched_setscheduler(struct task_struct *p, int policy, struct sched_param *param, bool user) argument
4871 sched_setscheduler(struct task_struct *p, int policy, struct sched_param *param) argument
4889 sched_setscheduler_nocheck(struct task_struct *p, int policy, struct sched_param *param) argument
4896 do_sched_setscheduler(pid_t pid, int policy, struct sched_param __user *param) argument
[all...]
H A Dtsacct.c57 stats->ac_sched = tsk->policy;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/include/linux/
H A Dxfrm.h30 /* Selector, used as selector both on policy rules (SPD) and SAs. */
226 #define XFRM_POLICY_LOCALOK 1 /* Allow user to override global policy */
240 struct xfrm_userpolicy_info policy; member in struct:xfrm_user_acquire
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/
H A Dts.h150 policy TSAPolicyId,
376 int TS_REQ_set_policy_id(TS_REQ *a, ASN1_OBJECT *policy);
544 * Adds a new acceptable policy, only the default policy is accepted by
547 int TS_RESP_CTX_add_policy(TS_RESP_CTX *ctx, ASN1_OBJECT *policy);
621 /* Verify if the policy supplied by the user matches the policy of the TSA. */
664 ASN1_OBJECT *policy; member in struct:TS_verify_ctx
700 * policy = policy fro
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/hostap/
H A Dhostap_ap.h143 enum { MAC_POLICY_OPEN = 0, MAC_POLICY_ALLOW, MAC_POLICY_DENY } policy; member in struct:mac_restrictions
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ts/
H A Dts.h150 policy TSAPolicyId,
376 int TS_REQ_set_policy_id(TS_REQ *a, ASN1_OBJECT *policy);
544 * Adds a new acceptable policy, only the default policy is accepted by
547 int TS_RESP_CTX_add_policy(TS_RESP_CTX *ctx, ASN1_OBJECT *policy);
621 /* Verify if the policy supplied by the user matches the policy of the TSA. */
664 ASN1_OBJECT *policy; member in struct:TS_verify_ctx
700 * policy = policy fro
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netlabel/
H A Dnetlabel_cipso_v4.c71 /* NetLabel Netlink attribute policy */
747 .policy = netlbl_cipsov4_genl_policy,
754 .policy = netlbl_cipsov4_genl_policy,
761 .policy = netlbl_cipsov4_genl_policy,
768 .policy = netlbl_cipsov4_genl_policy,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/
H A Dgenetlink.h85 * @policy: attribute validation policy
94 const struct nla_policy *policy; member in struct:genl_ops
H A Dxfrm.h61 - policy rule, struct xfrm_policy (=SPD entry)
75 policy entry has list of up to XFRM_MAX_DEPTH transformations,
725 static inline void xfrm_pol_hold(struct xfrm_policy *policy) argument
727 if (likely(policy != NULL))
728 atomic_inc(&policy->refcnt);
731 extern void xfrm_policy_destroy(struct xfrm_policy *policy);
733 static inline void xfrm_pol_put(struct xfrm_policy *policy) argument
735 if (atomic_dec_and_test(&policy->refcnt))
736 xfrm_policy_destroy(policy);
866 * policy rul
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/
H A Dinit_task.h119 .policy = SCHED_NORMAL, \
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/bus/
H A Dconnection.c27 #include "policy.h"
92 BusClientPolicy *policy; member in struct:__anon1625
402 if (d->policy)
403 bus_client_policy_unref (d->policy);
913 _dbus_assert (d->policy != NULL);
915 return d->policy;
1365 _dbus_assert (d->policy == NULL);
1379 d->policy = bus_context_create_client_policy (d->connections->context,
1383 /* we may have a NULL policy on OOM or error getting list of
1388 if (d->policy
[all...]
H A DMakefile95 driver.h expirelist.c expirelist.h policy.c policy.h selinux.h \
110 policy.$(OBJEXT) selinux.$(OBJEXT) services.$(OBJEXT) \
162 driver.h expirelist.c expirelist.h policy.c policy.h selinux.h \
537 policy.c \
538 policy.h \
921 include ./$(DEPDIR)/policy.Po
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/conntrack-tools/conntrack-tools-1.4.0/src/helpers/
H A Drpc.c459 .policy = {
473 .policy = {
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/mac80211/
H A Dagg-rx.c124 u8 dialog_token, u16 status, u16 policy,
159 capab = (u16)(policy << 1); /* bit 1 aggregation policy */
202 * check if configuration can support the BA policy
211 "%pM on tid %u. policy %d, buffer size %d\n",
123 ieee80211_send_addba_resp(struct ieee80211_sub_if_data *sdata, u8 *da, u16 tid, u8 dialog_token, u16 status, u16 policy, u16 buf_size, u16 timeout) argument
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netfilter/
H A Dxt_osf.c149 .policy = xt_osf_policy,
154 .policy = xt_osf_policy,
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.x/extensions/
H A DMakefile8 PF_EXT_SLIB:=ah addrtype comment connmark conntrack dscp ecn esp hashlimit helper icmp iprange length limit mac mark multiport owner physdev pkttype policy realm sctp standard state tcp tcpmss tos ttl udp unclean CLASSIFY CONNMARK DNAT DSCP ECN LOG MARK MASQUERADE MIRROR NETMAP NFQUEUE NOTRACK REDIRECT REJECT SAME SNAT TCPMSS TOS TTL ULOG
9 PF6_EXT_SLIB:=connmark eui64 hl icmp6 length limit mac mark multiport owner physdev policy standard state tcp udp CONNMARK HL LOG NFQUEUE MARK TCPMSS
H A Dlibipt_policy.c1 /* Shared library add-on to iptables to add policy support. */
27 "policy v%s options:\n"
28 " --dir in|out match policy applied during decapsulation/\n"
29 " policy to be applied during encapsulation\n"
30 " --pol none|ipsec match policy\n"
31 " --strict match entire policy instead of single element\n"
39 " --next begin next element in policy\n",
116 exit_error(PARAMETER_PROBLEM, "policy match: invalid policy `%s'", s);
125 exit_error(PARAMETER_PROBLEM, "policy matc
419 struct iptables_match policy = { variable in typeref:struct:iptables_match
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/
H A Dpam_winbind.c646 /* now check for the global password policy */
649 if (response->data.auth.policy.expire <= 0) {
654 response->data.auth.policy.expire;
955 if (response->data.auth.policy.min_length_password > 0) {
958 response->data.auth.policy.min_length_password);
965 if (response->data.auth.policy.password_history > 0) {
968 response->data.auth.policy.password_history);
975 if (response->data.auth.policy.password_properties & DOMAIN_PASSWORD_COMPLEX) {
1115 "(Password was last set: %lld, the policy says "
1119 response.data.auth.policy
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/src/unix/
H A Dthreadpsx.cpp1106 int policy; local
1107 if ( pthread_attr_getschedpolicy(&attr, &policy) != 0 )
1109 wxLogError(_("Cannot retrieve thread scheduling policy."));
1122 int max_prio = sched_get_priority_max(policy),
1123 min_prio = sched_get_priority_min(policy),
1128 wxLogError(_("Cannot get priority range for scheduling policy %d."),
1129 policy);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/dream/qdsp5/
H A Daudio_out.c587 static inline int rt_policy(int policy) argument
589 if (unlikely(policy == SCHED_FIFO) || unlikely(policy == SCHED_RR))
596 return rt_policy(p->policy);
609 int old_policy = current->policy;
661 /* restore scheduling policy and priority */
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/block/
H A Dgenhd.c1229 bdev->bd_part->policy = flag;
1239 if (disk->part0.policy != flag) {
1241 disk->part0.policy = flag;
1246 part->policy = flag;
1256 return bdev->bd_part->policy;
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/acpi/
H A Dprocessor_perflib.c57 * _PPC support is implemented as a CPUfreq policy notifier:
59 * the ACPI core is asked to change the speed policy, the maximum
63 * policy is adjusted accordingly.
85 struct cpufreq_policy *policy = data; local
102 pr = per_cpu(processors, policy->cpu);
111 cpufreq_verify_within_limits(policy, 0,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netfilter/ipvs/
H A Dip_vs_ctl.c3189 .policy = ip_vs_cmd_policy,
3195 .policy = ip_vs_cmd_policy,
3201 .policy = ip_vs_cmd_policy,
3209 .policy = ip_vs_cmd_policy,
3214 .policy = ip_vs_cmd_policy,
3220 .policy = ip_vs_cmd_policy,
3226 .policy = ip_vs_cmd_policy,
3232 .policy = ip_vs_cmd_policy,
3238 .policy = ip_vs_cmd_policy,
3244 .policy
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/libipsec/
H A Dkey_debug.c443 printf("kdebug_sadb_x_policy: wrong policy struct.\n");
448 printf("invalid ipsec policy length\n");
459 panic("kdebug_sadb_x_policy: wrong policy struct.\n");
475 printf("secpolicy{ refcnt=%u state=%u policy=%u\n",
476 sp->refcnt, sp->state, sp->policy);
480 switch (sp->policy) {
508 printf("kdebug_secpolicy: Invalid policy found. %d\n",
509 sp->policy);

Completed in 377 milliseconds

1234567891011>>