/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/xfrm/ |
H A D | xfrm_policy.c | 669 struct hlist_head *chain; local 674 chain = policy_hash_bysel(&policy->selector, policy->family, dir); 677 hlist_for_each_entry(pol, entry, chain, bydst) { 699 hlist_add_head(&policy->bydst, chain); 759 struct hlist_head *chain; local 764 chain = policy_hash_bysel(sel, sel->family, dir); 766 hlist_for_each_entry(pol, entry, chain, bydst) { 799 struct hlist_head *chain; local 808 chain = xfrm_policy_byidx + idx_hash(id); 810 hlist_for_each_entry(pol, entry, chain, byid 1040 struct hlist_head *chain; local 1162 struct hlist_head *chain = policy_hash_bysel(&pol->selector, local 2441 struct hlist_head *chain; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/ocfs2/ |
H A D | suballoc.c | 98 u16 chain); 172 ocfs2_error(sb, "Group descriptor # %llu has bad chain %u", 441 ocfs2_error(alloc_inode->i_sb, "Invalid chain allocator %llu", 823 u16 chain) 849 mlog(0, "Suballoc %llu, chain %u, move group %llu to top, prev = %llu\n", 850 (unsigned long long)le64_to_cpu(fe->i_blkno), chain, 854 fe_ptr = le64_to_cpu(fe->id2.i_chain.cl_recs[chain].c_blkno); 880 bg->bg_next_group = fe->id2.i_chain.cl_recs[chain].c_blkno; 895 fe->id2.i_chain.cl_recs[chain].c_blkno = bg->bg_blkno; 906 fe->id2.i_chain.cl_recs[chain] 818 ocfs2_relink_block_group(handle_t *handle, struct inode *alloc_inode, struct buffer_head *fe_bh, struct buffer_head *bg_bh, struct buffer_head *prev_bg_bh, u16 chain) argument 997 ocfs2_alloc_dinode_update_counts(struct inode *inode, handle_t *handle, struct buffer_head *di_bh, u32 num_bits, u16 chain) argument 1097 u16 chain, tmp_bits; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/decnet/ |
H A D | dn_route.c | 94 struct dn_route *chain; member in struct:dn_rt_hash_bucket 165 rtp = &dn_rt_hash_table[i].chain; 197 rtp = &dn_rt_hash_table[i].chain; 284 rthp = &dn_rt_hash_table[hash].chain; 292 dn_rt_hash_table[hash].chain); 293 rcu_assign_pointer(dn_rt_hash_table[hash].chain, rth); 307 rcu_assign_pointer(rt->u.dst.dn_next, dn_rt_hash_table[hash].chain); 308 rcu_assign_pointer(dn_rt_hash_table[hash].chain, rt); 326 if ((rt = xchg(&dn_rt_hash_table[i].chain, NULL)) == NULL) 1174 for(rt = rcu_dereference(dn_rt_hash_table[hash].chain); r [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/flac-1.2.1/src/metaflac/ |
H A D | utils.c | 128 void print_error_with_chain_status(FLAC__Metadata_Chain *chain, const char *format, ...) argument 130 const FLAC__Metadata_ChainStatus status = FLAC__metadata_chain_status(chain);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/kernel/ |
H A D | lockdep.c | 152 #define __chainhashfn(chain) \ 153 (((chain >> CHAINHASH_BITS) + chain) & CHAINHASH_MASK) 154 #define chainhashentry(chain) (chainhash_table + __chainhashfn((chain))) 520 * Print a dependency chain entry (this is only done when a deadlock 565 printk("\nthe existing dependency chain (in reverse order) is:\n"); 874 * There was a chain-cache miss, and we are about to add a new dependency 969 * (this may occur even though this is a new chain: consider 972 * L2 added to its dependency list, due to the first chain 1310 struct lock_chain *chain; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | pkcs12.c | 82 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain); 107 int chain = 0; local 149 else if (!strcmp (*args, "-chain")) chain = 1; 288 BIO_printf (bio_err, "-chain add certificate chain\n"); 434 chain = 0; 512 CRYPTO_push_info("building chain"); 515 /* If chaining get chain from user cert */ 516 if (chain) { 813 get_cert_chain(X509 *cert, X509_STORE *store, STACK_OF(X509) **chain) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/mtd/ |
H A D | inftlcore.c | 328 DEBUG(MTD_DEBUG_LEVEL1, "INFTL: folding chain %d into unit %d\n", 372 * Newest unit in chain now contains data from _all_ older units. 373 * So go through and erase each unit in chain, oldest first. (This 377 DEBUG(MTD_DEBUG_LEVEL1, "INFTL: want to erase virtual chain %d\n", 381 /* Find oldest unit in chain. */ 421 u16 chain, EUN; local 426 for (chain = 0; chain < inftl->nb_blocks; chain++) { 427 EUN = inftl->VUtable[chain]; [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/affs/ |
H A D | inode.c | 382 __be32 chain; local 383 chain = AFFS_TAIL(sb, inode_bh)->link_chain; 385 AFFS_TAIL(sb, bh)->link_chain = chain; 387 affs_adjust_checksum(inode_bh, block - be32_to_cpu(chain));
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/sctp/ |
H A D | input.c | 661 epp = &head->chain; 721 for (epb = head->chain; epb; epb = epb->next) { 745 /* Calculate which chain this entry will belong to. */ 751 epp = &head->chain; 825 for (epb = head->chain; epb; epb = epb->next) {
|
H A D | proc.c | 236 for (epb = head->chain; epb; epb = epb->next) { 339 for (epb = head->chain; epb; epb = epb->next) {
|
H A D | protocol.c | 1088 sctp_assoc_hashtable[i].chain = NULL; 1102 sctp_ep_hashtable[i].chain = NULL; 1121 sctp_port_hashtable[i].chain = NULL;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/x509/ |
H A D | x509_vfy.h | 111 certificate chain. 159 * validation. Once we have a certificate chain, the 'verify' 160 * function is then called to actually check the cert chain. */ 182 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */ 210 * gathering of the cert chain can take some time (and have to be 219 STACK_OF(X509) *untrusted; /* chain of X509s - untrusted - passed in */ 231 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */ 239 int valid; /* if 0, rebuild chain */ 241 STACK_OF(X509) *chain; /* chain o member in struct:x509_store_ctx_st [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/ |
H A D | x509_vfy.h | 111 certificate chain. 159 * validation. Once we have a certificate chain, the 'verify' 160 * function is then called to actually check the cert chain. */ 182 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */ 210 * gathering of the cert chain can take some time (and have to be 219 STACK_OF(X509) *untrusted; /* chain of X509s - untrusted - passed in */ 231 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */ 239 int valid; /* if 0, rebuild chain */ 241 STACK_OF(X509) *chain; /* chain o member in struct:x509_store_ctx_st [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/kernel/power/ |
H A D | snapshot.c | 146 * a linked list of pages called 'the chain'. 148 * The chain grows each time when there is no room for a new object in 151 * chain. 153 * NOTE: The chain allocator may be inefficient if the allocated objects 158 struct linked_page *chain; /* the chain */ member in struct:chain_allocator 169 ca->chain = NULL; 186 lp->next = ca->chain; 187 ca->chain = lp; 190 ret = ca->chain [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/apps/ |
H A D | pkcs12.c | 81 int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain); 106 int chain = 0; local 155 else if (!strcmp (*args, "-chain")) chain = 1; 281 BIO_printf (bio_err, "-chain add certificate chain\n"); 503 CRYPTO_push_info("building chain"); 506 /* If chaining get chain from user cert */ 507 if (chain) { 530 BIO_printf (bio_err, "Error %s getting chain 847 get_cert_chain(X509 *cert, X509_STORE *store, STACK_OF(X509) **chain) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/ipv4/ |
H A D | route.c | 206 struct rtable *chain; member in struct:rt_hash_bucket 279 r = rt_hash_table[st->bucket].chain; 297 r = rt_hash_table[st->bucket].chain; 641 rthp = &rt_hash_table[i].chain; 665 &rt_hash_table[i].chain, 702 rth = rt_hash_table[i].chain; 704 rt_hash_table[i].chain = NULL; 837 rthp = &rt_hash_table[k].chain; 853 &rt_hash_table[k].chain, 938 rthp = &rt_hash_table[hash].chain; [all...] |
H A D | inet_connection_sock.c | 88 inet_bind_bucket_for_each(tb, node, &head->chain) 115 inet_bind_bucket_for_each(tb, node, &head->chain)
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509/ |
H A D | x509_vfy.h | 112 certificate chain. 179 * validation. Once we have a certificate chain, the 'verify' 180 * function is then called to actually check the cert chain. */ 197 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */ 224 * gathering of the cert chain can take some time (and have to be 233 STACK_OF(X509) *untrusted; /* chain of X509s - untrusted - passed in */ 244 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */ 252 int valid; /* if 0, rebuild chain */ 254 STACK_OF(X509) *chain; /* chain o member in struct:x509_store_ctx_st [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | x509_vfy.h | 112 certificate chain. 179 * validation. Once we have a certificate chain, the 'verify' 180 * function is then called to actually check the cert chain. */ 197 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */ 224 * gathering of the cert chain can take some time (and have to be 233 STACK_OF(X509) *untrusted; /* chain of X509s - untrusted - passed in */ 244 int (*check_revocation)(X509_STORE_CTX *ctx); /* Check revocation status of chain */ 252 int valid; /* if 0, rebuild chain */ 254 STACK_OF(X509) *chain; /* chain o member in struct:x509_store_ctx_st [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/powerpc/kernel/vdso64/ |
H A D | sigtramp.S | 285 # we ever have some call chain that returns somewhere past the addi?
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/s390/kernel/ |
H A D | entry.S | 160 st %r12,__SF_BACKCHAIN(%r15) # clear back chain 568 xc __SF_BACKCHAIN(4,%r1),__SF_BACKCHAIN(%r1) # clear back chain 589 xc __SF_BACKCHAIN(4,%r1),__SF_BACKCHAIN(%r1) # clear back chain 733 xc __SF_BACKCHAIN(4,%r1),__SF_BACKCHAIN(%r1) # clear back chain 814 xc __SF_BACKCHAIN(4,%r15),__SF_BACKCHAIN(%r15) # clear back chain
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/core/ |
H A D | neighbour.c | 2063 int chain; local 2066 for (chain = 0; chain <= tbl->hash_mask; chain++) { 2069 for (n = tbl->hash_buckets[chain]; n; n = n->next) 2080 int chain; local 2082 for (chain = 0; chain <= tbl->hash_mask; chain++) { 2085 np = &tbl->hash_buckets[chain]; [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/bridge/netfilter/ |
H A D | ebtables.c | 171 /* base for chain jumps */ 210 BUGPRINT("RETURN on base chain"); 243 BUGPRINT("jump to non-chain\n"); 450 /* check if all valid hooks have a chain */ 454 BUGPRINT("Valid hook without chain\n"); 477 /* beginning of a new chain 478 if i == NF_BR_NUMHOOKS it must be a user defined chain */ 480 /* this checks if the previous chain has as many entries 484 "in the chain\n"); 496 if (i == NF_BR_NUMHOOKS) /* it's a user defined chain */ 707 check_chainloops(struct ebt_entries *chain, struct ebt_cl_stack *cl_s, unsigned int udc_cnt, unsigned int hooknr, char *base) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/flac-1.2.1/src/libFLAC++/ |
H A D | metadata.cpp | 1512 void Iterator::init(Chain &chain) 1515 FLAC__ASSERT(chain.is_valid()); 1516 ::FLAC__metadata_iterator_init(iterator_, chain.chain_);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/scsi/ |
H A D | aha1542.c | 688 struct chain *cptr; 696 cptr = (struct chain *) SCpnt->host_scribble; 724 any2scsi(ccb[mbo].datalen, SCpnt->use_sg * sizeof(struct chain));
|