/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | strciphr.h | 9 Here's an explanation of these classes. The word "policy" is used here to mean a class with a 12 either AdditiveCipherTemplate or CFB_CipherTemplate using the policy. So for example, an 20 to take a policy class as a template parameter (although this is allowed), so that 22 get a reference to an abstract policy interface by calling AccessPolicy() on itself, so 23 AccessPolicy() must be overriden to return the actual policy reference. This is done 153 unsigned int GetBufferByteSize(const PolicyInterface &policy) const {return policy.GetBytesPerIteration() * policy.GetIterationsToBuffer();}
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/kernel/ |
H A D | sched.c | 136 static inline int rt_policy(int policy) argument 138 if (unlikely(policy == SCHED_FIFO || policy == SCHED_RR)) 145 return rt_policy(p->policy); 1718 * same underlying policy as the spinlock_t on this architecture, which 1880 if (p->policy == SCHED_IDLE) { 2542 * Revert to default priority/policy on fork if requested. 2545 if (p->policy == SCHED_FIFO || p->policy == SCHED_RR) { 2546 p->policy 4693 __setscheduler(struct rq *rq, struct task_struct *p, int policy, int prio) argument 4725 __sched_setscheduler(struct task_struct *p, int policy, struct sched_param *param, bool user) argument 4871 sched_setscheduler(struct task_struct *p, int policy, struct sched_param *param) argument 4889 sched_setscheduler_nocheck(struct task_struct *p, int policy, struct sched_param *param) argument 4896 do_sched_setscheduler(pid_t pid, int policy, struct sched_param __user *param) argument [all...] |
H A D | tsacct.c | 57 stats->ac_sched = tsk->policy;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/include/linux/ |
H A D | xfrm.h | 30 /* Selector, used as selector both on policy rules (SPD) and SAs. */ 226 #define XFRM_POLICY_LOCALOK 1 /* Allow user to override global policy */ 240 struct xfrm_userpolicy_info policy; member in struct:xfrm_user_acquire
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ts/ |
H A D | ts.h | 150 policy TSAPolicyId, 376 int TS_REQ_set_policy_id(TS_REQ *a, ASN1_OBJECT *policy); 544 * Adds a new acceptable policy, only the default policy is accepted by 547 int TS_RESP_CTX_add_policy(TS_RESP_CTX *ctx, ASN1_OBJECT *policy); 621 /* Verify if the policy supplied by the user matches the policy of the TSA. */ 664 ASN1_OBJECT *policy; member in struct:TS_verify_ctx 700 * policy = policy fro [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/hostap/ |
H A D | hostap_ap.h | 143 enum { MAC_POLICY_OPEN = 0, MAC_POLICY_ALLOW, MAC_POLICY_DENY } policy; member in struct:mac_restrictions
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ts/ |
H A D | ts.h | 150 policy TSAPolicyId, 376 int TS_REQ_set_policy_id(TS_REQ *a, ASN1_OBJECT *policy); 544 * Adds a new acceptable policy, only the default policy is accepted by 547 int TS_RESP_CTX_add_policy(TS_RESP_CTX *ctx, ASN1_OBJECT *policy); 621 /* Verify if the policy supplied by the user matches the policy of the TSA. */ 664 ASN1_OBJECT *policy; member in struct:TS_verify_ctx 700 * policy = policy fro [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netlabel/ |
H A D | netlabel_cipso_v4.c | 71 /* NetLabel Netlink attribute policy */ 747 .policy = netlbl_cipsov4_genl_policy, 754 .policy = netlbl_cipsov4_genl_policy, 761 .policy = netlbl_cipsov4_genl_policy, 768 .policy = netlbl_cipsov4_genl_policy,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/ |
H A D | genetlink.h | 85 * @policy: attribute validation policy 94 const struct nla_policy *policy; member in struct:genl_ops
|
H A D | xfrm.h | 61 - policy rule, struct xfrm_policy (=SPD entry) 75 policy entry has list of up to XFRM_MAX_DEPTH transformations, 725 static inline void xfrm_pol_hold(struct xfrm_policy *policy) argument 727 if (likely(policy != NULL)) 728 atomic_inc(&policy->refcnt); 731 extern void xfrm_policy_destroy(struct xfrm_policy *policy); 733 static inline void xfrm_pol_put(struct xfrm_policy *policy) argument 735 if (atomic_dec_and_test(&policy->refcnt)) 736 xfrm_policy_destroy(policy); 866 * policy rul [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | init_task.h | 119 .policy = SCHED_NORMAL, \
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/bus/ |
H A D | connection.c | 27 #include "policy.h" 92 BusClientPolicy *policy; member in struct:__anon1625 402 if (d->policy) 403 bus_client_policy_unref (d->policy); 913 _dbus_assert (d->policy != NULL); 915 return d->policy; 1365 _dbus_assert (d->policy == NULL); 1379 d->policy = bus_context_create_client_policy (d->connections->context, 1383 /* we may have a NULL policy on OOM or error getting list of 1388 if (d->policy [all...] |
H A D | Makefile | 95 driver.h expirelist.c expirelist.h policy.c policy.h selinux.h \ 110 policy.$(OBJEXT) selinux.$(OBJEXT) services.$(OBJEXT) \ 162 driver.h expirelist.c expirelist.h policy.c policy.h selinux.h \ 537 policy.c \ 538 policy.h \ 921 include ./$(DEPDIR)/policy.Po
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/conntrack-tools/conntrack-tools-1.4.0/src/helpers/ |
H A D | rpc.c | 459 .policy = { 473 .policy = {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/mac80211/ |
H A D | agg-rx.c | 124 u8 dialog_token, u16 status, u16 policy, 159 capab = (u16)(policy << 1); /* bit 1 aggregation policy */ 202 * check if configuration can support the BA policy 211 "%pM on tid %u. policy %d, buffer size %d\n", 123 ieee80211_send_addba_resp(struct ieee80211_sub_if_data *sdata, u8 *da, u16 tid, u8 dialog_token, u16 status, u16 policy, u16 buf_size, u16 timeout) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netfilter/ |
H A D | xt_osf.c | 149 .policy = xt_osf_policy, 154 .policy = xt_osf_policy,
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.x/extensions/ |
H A D | Makefile | 8 PF_EXT_SLIB:=ah addrtype comment connmark conntrack dscp ecn esp hashlimit helper icmp iprange length limit mac mark multiport owner physdev pkttype policy realm sctp standard state tcp tcpmss tos ttl udp unclean CLASSIFY CONNMARK DNAT DSCP ECN LOG MARK MASQUERADE MIRROR NETMAP NFQUEUE NOTRACK REDIRECT REJECT SAME SNAT TCPMSS TOS TTL ULOG 9 PF6_EXT_SLIB:=connmark eui64 hl icmp6 length limit mac mark multiport owner physdev policy standard state tcp udp CONNMARK HL LOG NFQUEUE MARK TCPMSS
|
H A D | libipt_policy.c | 1 /* Shared library add-on to iptables to add policy support. */ 27 "policy v%s options:\n" 28 " --dir in|out match policy applied during decapsulation/\n" 29 " policy to be applied during encapsulation\n" 30 " --pol none|ipsec match policy\n" 31 " --strict match entire policy instead of single element\n" 39 " --next begin next element in policy\n", 116 exit_error(PARAMETER_PROBLEM, "policy match: invalid policy `%s'", s); 125 exit_error(PARAMETER_PROBLEM, "policy matc 419 struct iptables_match policy = { variable in typeref:struct:iptables_match [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/ |
H A D | pam_winbind.c | 646 /* now check for the global password policy */ 649 if (response->data.auth.policy.expire <= 0) { 654 response->data.auth.policy.expire; 955 if (response->data.auth.policy.min_length_password > 0) { 958 response->data.auth.policy.min_length_password); 965 if (response->data.auth.policy.password_history > 0) { 968 response->data.auth.policy.password_history); 975 if (response->data.auth.policy.password_properties & DOMAIN_PASSWORD_COMPLEX) { 1115 "(Password was last set: %lld, the policy says " 1119 response.data.auth.policy [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/src/unix/ |
H A D | threadpsx.cpp | 1106 int policy; local 1107 if ( pthread_attr_getschedpolicy(&attr, &policy) != 0 ) 1109 wxLogError(_("Cannot retrieve thread scheduling policy.")); 1122 int max_prio = sched_get_priority_max(policy), 1123 min_prio = sched_get_priority_min(policy), 1128 wxLogError(_("Cannot get priority range for scheduling policy %d."), 1129 policy);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/dream/qdsp5/ |
H A D | audio_out.c | 587 static inline int rt_policy(int policy) argument 589 if (unlikely(policy == SCHED_FIFO) || unlikely(policy == SCHED_RR)) 596 return rt_policy(p->policy); 609 int old_policy = current->policy; 661 /* restore scheduling policy and priority */
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/block/ |
H A D | genhd.c | 1229 bdev->bd_part->policy = flag; 1239 if (disk->part0.policy != flag) { 1241 disk->part0.policy = flag; 1246 part->policy = flag; 1256 return bdev->bd_part->policy;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/acpi/ |
H A D | processor_perflib.c | 57 * _PPC support is implemented as a CPUfreq policy notifier: 59 * the ACPI core is asked to change the speed policy, the maximum 63 * policy is adjusted accordingly. 85 struct cpufreq_policy *policy = data; local 102 pr = per_cpu(processors, policy->cpu); 111 cpufreq_verify_within_limits(policy, 0,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netfilter/ipvs/ |
H A D | ip_vs_ctl.c | 3189 .policy = ip_vs_cmd_policy, 3195 .policy = ip_vs_cmd_policy, 3201 .policy = ip_vs_cmd_policy, 3209 .policy = ip_vs_cmd_policy, 3214 .policy = ip_vs_cmd_policy, 3220 .policy = ip_vs_cmd_policy, 3226 .policy = ip_vs_cmd_policy, 3232 .policy = ip_vs_cmd_policy, 3238 .policy = ip_vs_cmd_policy, 3244 .policy [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/libipsec/ |
H A D | key_debug.c | 443 printf("kdebug_sadb_x_policy: wrong policy struct.\n"); 448 printf("invalid ipsec policy length\n"); 459 panic("kdebug_sadb_x_policy: wrong policy struct.\n"); 475 printf("secpolicy{ refcnt=%u state=%u policy=%u\n", 476 sp->refcnt, sp->state, sp->policy); 480 switch (sp->policy) { 508 printf("kdebug_secpolicy: Invalid policy found. %d\n", 509 sp->policy);
|