Searched refs:policy (Results 326 - 345 of 345) sorted by relevance

<<11121314

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/
H A Dssltest.c740 fprintf(stderr, " -proxy_auth <val> - set proxy policy rights\n");
742 " -proxy_cond <val> - expression to test proxy policy rights\n");
2518 pci->proxyPolicy->policy->data;
2519 i = pci->proxyPolicy->policy->length;
2528 * the current policy. That way, all elements that are
2529 * set by the current policy and were already set by
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/docs/latex/wx/
H A Dtstring.tex254 98\% for the default allocation policy, if it is less than 90\% you should
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/video/
H A Dpxafb.c1631 struct cpufreq_policy *policy = data; local
1638 policy->max);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/
H A Dssltest.c740 fprintf(stderr, " -proxy_auth <val> - set proxy policy rights\n");
742 " -proxy_cond <val> - expression to test proxy policy rights\n");
2518 pci->proxyPolicy->policy->data;
2519 i = pci->proxyPolicy->policy->length;
2528 * the current policy. That way, all elements that are
2529 * set by the current policy and were already set by
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/
H A Dlibata.h482 * host pm policy: If you alter this, you also need to alter libata-scsi.c
836 int (*enable_pm)(struct ata_port *ap, enum link_pm policy);
H A Dsched.h1188 unsigned int policy; member in struct:task_struct
1221 /* Revert to default priority/policy when forking */
1678 #define PF_MCE_PROCESS 0x00000080 /* process policy on mce errors */
1698 #define PF_MCE_EARLY 0x08000000 /* Early kill for mce process policy */
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/hostap/
H A Dhostap_ap.c32 MODULE_PARM_DESC(other_ap_policy, "Other AP beacon monitoring policy (0-3)");
339 switch (ap->mac_restrictions.policy) {
353 p += sprintf(p, "MAC policy: %s\n", policy_txt);
419 if (mac_restrictions->policy == MAC_POLICY_OPEN)
431 if (mac_restrictions->policy == MAC_POLICY_ALLOW)
H A Dhostap_ioctl.c2982 local->ap->mac_restrictions.policy = MAC_POLICY_OPEN;
2985 local->ap->mac_restrictions.policy = MAC_POLICY_ALLOW;
2988 local->ap->mac_restrictions.policy = MAC_POLICY_DENY;
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/xfrm/
H A Dxfrm_user.c1127 * the policy itself. Now that we will have ipv4-in-ipv6
1780 WARN(1, "Dont know what to do with soft policy expire\n");
1845 err = verify_newpolicy_info(&ua->policy);
1850 xp = xfrm_policy_construct(net, &ua->policy, attrs, &err);
1880 WARN(1, "BAD policy passed\n");
2417 copy_to_user_policy(xp, &ua->policy, dir);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/kernel/trace/
H A Dtrace.c635 max_data->policy = tsk->policy;
1811 "(uid:%d nice:%ld policy:%ld rt_prio:%ld)\n",
1813 data->policy, data->rt_priority);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/core/
H A Drtnetlink.c1493 ops->policy);
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/racoon/
H A Disakmp_quick.c77 #include "policy.h"
1052 /* generate a policy template from peer's proposal */
1619 * set policies into SPD if the policy is generated
1620 * from peer's policy.
1630 /* make inbound policy */
1641 /* make outbound policy */
1823 * Then get remote's policy from SPD copied from kernel.
1871 /* get a destination address of a policy */
1882 * a destination address to search for a inbound policy entry
1907 * of the key to search the SPD because the direction of policy
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/Micromax/Linux/lib/
H A Dcommons-httpclient-3.1.jarMETA-INF/ META-INF/MANIFEST.MF org/ org/apache/ org/apache/commons/ org/apache/commons/httpclient/ ...
H A Dquaqua.jarMETA-INF/ META-INF/MANIFEST.MF ch/ ch/randelshofer/ ch/randelshofer/quaqua/ ch/randelshofer/quaqua/border/ ...
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv4/
H A Dipmr.c230 .policy = ipmr_rule_policy,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv6/
H A Dip6mr.c217 .policy = ip6mr_rule_policy,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/selinux/
H A Dhooks.c411 inodes created prior to initial policy load or inodes created
572 after the initial policy is loaded and the security
1009 /* before policy load we may get EINVAL, don't show anything */
1185 after the initial policy is loaded and the security
1213 * before the policy is loaded. When we load policy we
2829 * value even if it is not defined by current policy; otherwise,
2830 * use the in-core value under current policy.
3157 * Save inode label and policy sequence number
3166 * Since the inode label or policy seqn
3360 selinux_task_setscheduler(struct task_struct *p, int policy, struct sched_param *lp) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/block/drbd/
H A Ddrbd_receiver.c4446 current->policy = SCHED_RR; /* Make this a realtime task! */
/netgear-R7000-V1.0.7.12_1.2.5/src/include/
H A Dwlioctl.h5146 uint8 policy; member in struct:wl_bsstrans_resp
6163 * For the discussion related to versions update policy refer to
6165 * For now the policy is to increment WLC_VERSION_MAJOR each time
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/libdb_java/
H A Ddb_java_wrap.c3326 SWIGINTERN db_ret_t DbEnv_repmgr_set_ack_policy(struct DbEnv *self,int policy){ argument
3327 return self->repmgr_set_ack_policy(self, policy);

Completed in 336 milliseconds

<<11121314