/asus-wl-520gu-7.0.1.45/src/linux/linux/drivers/isdn/divert/ |
H A D | isdn_divert.c | 36 divert_rule rule; /* used rule */ member in struct:deflect_struc 275 /* insert a new rule before idx */ 285 ds->rule = *newrule; /* set rule */ 321 /* delete the rule at position idx */ 372 /* get a pointer to a specific rule number */ 380 { return(&ds->rule); 402 if (((dv->rule.callopt == 1) && (ic->command == ISDN_STAT_ICALLW)) || 403 ((dv->rule [all...] |
H A D | isdn_divert.h | 22 #define IIOCGETRULE _IO('I', 4) /* read one rule */ 23 #define IIOCMODRULE _IO('I', 5) /* modify/replace a rule */ 24 #define IIOCINSRULE _IO('I', 6) /* insert/append one rule */ 25 #define IIOCDELRULE _IO('I', 7) /* delete a rule */ 75 { int ruleidx; /* index of rule */ 76 divert_rule rule; /* rule parms */ member in struct:__anon1459::__anon1461 85 data from rule used if empty */
|
H A D | divert_procfs.c | 219 dioctl.getsetrule.rule = *rulep; /* copy data */ 227 *rulep = dioctl.getsetrule.rule; /* copy data */ 233 return (insertrule(dioctl.getsetrule.ruleidx, &dioctl.getsetrule.rule));
|
/asus-wl-520gu-7.0.1.45/src/tools/upnp/igd/ |
H A D | mapmgr.c | 244 /* Add port forward and a matching ACCEPT rule to the FORWARD table */ 328 netconf_nat_t *rule = NULL; local 333 for ( rulenum = 0; rulenum < nrules; rulenum++, rule = NULL ) { 334 rule = &nat_list[rulenum]; 337 if (rule->target != NETCONF_DNAT) { 342 if (nat_equal(e, rule)) { 345 *result = *rule;
|
/asus-wl-520gu-7.0.1.45/src/linux/linux/drivers/acpi/executer/ |
H A D | exutils.c | 189 * PARAMETERS: Rule - Lock rule: Always_lock, Never_lock 201 u32 rule) 212 if (rule == (u32) GLOCK_ALWAYS_LOCK) { 200 acpi_ex_acquire_global_lock( u32 rule) argument
|
/asus-wl-520gu-7.0.1.45/src/linux/linux/net/ipv4/netfilter/ |
H A D | ipchains_core.c | 220 * rule doesn't match */ 222 * current rule matches */ 230 struct ip_fwkernel *prevrule; /* Pointer to referencing rule */ 238 struct ip_fwkernel *chain; /* Pointer to first rule in block */ 240 int policy; /* Default rule for chain. Only * 280 /* Returns whether matches rule or not. */ 334 /* If we have a fragment rule but the packet is not a fragment 337 dprintf("Fragment rule but not fragment.%s\n", 464 *answer = FW_SKIP; /* => pass-through rule */ 598 * rule i 868 append_to_chain(struct ip_chain *chainptr, struct ip_fwkernel *rule) argument 1510 dump_rule(char *buffer, const char *chainlabel, const struct ip_fwkernel *rule) argument [all...] |
H A D | ipfwadm_core.c | 258 char *chain, char *rule, char *devname) 264 printk(KERN_INFO "IP %s %s%s", chain, rule, devname); 256 print_packet(struct iphdr *ip, u16 src_port, u16 dst_port, u16 icmp_type, char *chain, char *rule, char *devname) argument
|
/asus-wl-520gu-7.0.1.45/src/linux/linux/net/ipv4/netfilter.noQoS/ |
H A D | ipchains_core.c | 220 * rule doesn't match */ 222 * current rule matches */ 230 struct ip_fwkernel *prevrule; /* Pointer to referencing rule */ 238 struct ip_fwkernel *chain; /* Pointer to first rule in block */ 240 int policy; /* Default rule for chain. Only * 280 /* Returns whether matches rule or not. */ 334 /* If we have a fragment rule but the packet is not a fragment 337 dprintf("Fragment rule but not fragment.%s\n", 464 *answer = FW_SKIP; /* => pass-through rule */ 598 * rule i 868 append_to_chain(struct ip_chain *chainptr, struct ip_fwkernel *rule) argument 1510 dump_rule(char *buffer, const char *chainlabel, const struct ip_fwkernel *rule) argument [all...] |
H A D | ipfwadm_core.c | 258 char *chain, char *rule, char *devname) 264 printk(KERN_INFO "IP %s %s%s", chain, rule, devname); 256 print_packet(struct iphdr *ip, u16 src_port, u16 dst_port, u16 icmp_type, char *chain, char *rule, char *devname) argument
|
/asus-wl-520gu-7.0.1.45/src/router/iproute2/reference/net/ |
H A D | flow.h | 48 #define FLOWR_NODECISION 0 /* rule not appliable to flow */ 49 #define FLOWR_SELECT 1 /* flow must follow this rule */ 96 struct rt6_info *rule,
|
/asus-wl-520gu-7.0.1.45/src/linux/linux/include/net/ |
H A D | flow.h | 48 #define FLOWR_NODECISION 0 /* rule not appliable to flow */ 49 #define FLOWR_SELECT 1 /* flow must follow this rule */ 96 struct rt6_info *rule,
|
/asus-wl-520gu-7.0.1.45/src/router/rc/ |
H A D | firewall_ex.c | 813 // for rebuild the rule of wanduck 1538 netconf_filter_t *rule; local 1570 rule = &entry; // 2009.06 James. 1571 memset(rule, 0x0, sizeof(netconf_filter_t)); 1573 rule->match.days[0] = days[0]; 1574 rule->match.days[1] = days[1]; 1579 rule->match.secs[0] = activeTimeStart; 1580 rule->match.secs[1] = activeTimeEnd; 1585 strcpy(rule->match.module_name, "webstr"); 1586 strncpy(rule [all...] |
/asus-wl-520gu-7.0.1.45/src/router/rc.orig/ |
H A D | firewall_ex.c | 813 // for rebuild the rule of wanduck 1538 netconf_filter_t *rule; local 1570 rule = &entry; // 2009.06 James. 1571 memset(rule, 0x0, sizeof(netconf_filter_t)); 1573 rule->match.days[0] = days[0]; 1574 rule->match.days[1] = days[1]; 1579 rule->match.secs[0] = activeTimeStart; 1580 rule->match.secs[1] = activeTimeEnd; 1585 strcpy(rule->match.module_name, "webstr"); 1586 strncpy(rule [all...] |
/asus-wl-520gu-7.0.1.45/src/router/iproute2/doc/ |
H A D | ip-cref.tex | 62 As a rule, the information is statistics or some time values. 116 \item \verb|rule| --- rule in routing policy database 128 As a rule, it is possible to \verb|add|, \verb|delete| and 165 and exits. As a rule, the error message will contain information 195 syntax errors). However, as a rule, their meaning is clear 215 \verb|ip| \verb|rule| command will fail, f.e. 217 kuznet@kaiser $ ip rule list 434 involved. As a rule, it indicates that the device needs no address 511 in dropped packets. As a rule, i [all...] |
H A D | ip-tunnels.tex | 55 A: Yes, in 2.2 the rule that {\em normal} gateway must reside on directly
|
/asus-wl-520gu-7.0.1.45/src/router/netconf/ |
H A D | netconf_linux.c | 738 const struct ipt_entry *rule; local 757 for (i = 0, rule = iptc_first_rule(chain, handle); rule; i++, rule = iptc_next_rule(rule, handle)) { 758 if ((strcmp(iptc_get_target(rule, handle), "DROP") && 759 strcmp(iptc_get_target(rule, handle), "logdrop")) || 760 (rule->target_offset == sizeof(struct ipt_entry) && 761 !memcmp(&rule->ip, &blank, sizeof(struct ipt_ip))))
|
/asus-wl-520gu-7.0.1.45/src/linux/linux/drivers/acpi/include/ |
H A D | acinterp.h | 614 u32 rule);
|
/asus-wl-520gu-7.0.1.45/src/cfe/cfe/main/ |
H A D | cfe.mk | 321 # This rule constructs "libcfe.a" which contains most of the object
|
/asus-wl-520gu-7.0.1.45/src/router/iptables/ |
H A D | iptables.c | 337 "Usage: %s -[AD] chain rule-specification [options]\n" 338 " %s -[RI] chain rulenum rule-specification [options]\n" 353 " --delete -D chain Delete matching rule from chain\n" 355 " Delete rule rulenum (1 = first) from chain\n" 359 " Replace rule rulenum (1 = first) in chain\n" 381 " target for rule (may load target extension)\n" 780 parse_rulenumber(const char *rule) argument 784 if (string_to_number(rule, 1, INT_MAX, &rulenum) == -1) 786 "Invalid rule number `%s'", rule); [all...] |
H A D | ip6tables.c | 285 "Usage: %s -[AD] chain rule-specification [options]\n" 286 " %s -[RI] chain rulenum rule-specification [options]\n" 301 " --delete -D chain Delete matching rule from chain\n" 303 " Delete rule rulenum (1 = first) from chain\n" 307 " Replace rule rulenum (1 = first) in chain\n" 329 " target for rule (may load target extension)\n" 839 parse_rulenumber(const char *rule) argument 843 if (string_to_number(rule, 1, INT_MAX, &rulenum) == -1) 845 "Invalid rule number `%s'", rule); [all...] |
/asus-wl-520gu-7.0.1.45/src/router/e2fsprogs-1.40.8/lib/et/ |
H A D | texinfo.tex | 95 %worked out a simple rule that can be stated here, but we will often permit
|