/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/wget/testenv/conf/ |
H A D | rule_sample.py | 1 from conf import rule namespace 4 @rule(alias='SampleRuleAlias') 6 def __init__(self, rule): 7 # do rule initialization here 9 # class in server/protocol/protocol_server.py to apply this rule. 10 self.rule = rule
|
H A D | expect_header.py | 1 from conf import rule namespace 4 This rule defines a dictionary of headers and their value which the server 5 should expect in each request for the file to which the rule was applied. 9 @rule()
|
H A D | reject_header.py | 1 from conf import rule namespace 4 This is a server side rule which expects a dictionary object of Headers and 10 @rule()
|
H A D | response.py | 1 from conf import rule namespace 4 When this rule is set against a certain file, the server will unconditionally 8 @rule()
|
H A D | send_header.py | 1 from conf import rule namespace 5 this rule is applied to. The header_obj object is expected to be dictionary 9 @rule()
|
H A D | authentication.py | 1 from conf import rule namespace 4 This file defines an authentication rule which when applied to any file will 17 @rule()
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/wget/testenv/conf/ |
H A D | rule_sample.py | 1 from conf import rule namespace 4 @rule(alias='SampleRuleAlias') 6 def __init__(self, rule): 7 # do rule initialization here 9 # class in server/protocol/protocol_server.py to apply this rule. 10 self.rule = rule
|
H A D | expect_header.py | 1 from conf import rule namespace 4 This rule defines a dictionary of headers and their value which the server 5 should expect in each request for the file to which the rule was applied. 9 @rule()
|
H A D | reject_header.py | 1 from conf import rule namespace 4 This is a server side rule which expects a dictionary object of Headers and 10 @rule()
|
H A D | response.py | 1 from conf import rule namespace 4 When this rule is set against a certain file, the server will unconditionally 8 @rule()
|
H A D | send_header.py | 1 from conf import rule namespace 5 this rule is applied to. The header_obj object is expected to be dictionary 9 @rule()
|
H A D | authentication.py | 1 from conf import rule namespace 4 This file defines an authentication rule which when applied to any file will 17 @rule()
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/wget/testenv/conf/ |
H A D | rule_sample.py | 1 from conf import rule namespace 4 @rule(alias='SampleRuleAlias') 6 def __init__(self, rule): 7 # do rule initialization here 9 # class in server/protocol/protocol_server.py to apply this rule. 10 self.rule = rule
|
H A D | expect_header.py | 1 from conf import rule namespace 4 This rule defines a dictionary of headers and their value which the server 5 should expect in each request for the file to which the rule was applied. 9 @rule()
|
H A D | reject_header.py | 1 from conf import rule namespace 4 This is a server side rule which expects a dictionary object of Headers and 10 @rule()
|
H A D | response.py | 1 from conf import rule namespace 4 When this rule is set against a certain file, the server will unconditionally 8 @rule()
|
H A D | send_header.py | 1 from conf import rule namespace 5 this rule is applied to. The header_obj object is expected to be dictionary 9 @rule()
|
H A D | authentication.py | 1 from conf import rule namespace 4 This file defines an authentication rule which when applied to any file will 17 @rule()
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/miniupnpd/netfilter_nft/scripts/ |
H A D | nft_removeall.sh | 3 delete rule nat miniupnpd 4 delete rule nat miniupnpd-pcp-peer 5 delete rule filter miniupnpd
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/miniupnpd/netfilter_nft/scripts/ |
H A D | nft_removeall.sh | 3 delete rule nat miniupnpd 4 delete rule nat miniupnpd-pcp-peer 5 delete rule filter miniupnpd
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/miniupnpd/netfilter_nft/scripts/ |
H A D | nft_removeall.sh | 3 delete rule nat miniupnpd 4 delete rule nat miniupnpd-pcp-peer 5 delete rule filter miniupnpd
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/security/selinux/include/ |
H A D | audit.h | 22 * selinux_audit_rule_init - alloc/init an selinux audit rule structure. 23 * @field: the field this rule refers to 24 * @op: the operater the rule uses 25 * @rulestr: the text "target" of the rule 26 * @rule: pointer to the new rule structure returned via this 28 * Returns 0 if successful, -errno if not. On success, the rule structure 32 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule); 35 * selinux_audit_rule_free - free an selinux audit rule structure. 36 * @rule [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/security/selinux/include/ |
H A D | audit.h | 22 * selinux_audit_rule_init - alloc/init an selinux audit rule structure. 23 * @field: the field this rule refers to 24 * @op: the operater the rule uses 25 * @rulestr: the text "target" of the rule 26 * @rule: pointer to the new rule structure returned via this 28 * Returns 0 if successful, -errno if not. On success, the rule structure 32 int selinux_audit_rule_init(u32 field, u32 op, char *rulestr, void **rule); 35 * selinux_audit_rule_free - free an selinux audit rule structure. 36 * @rule [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/gdb/sim/ppc/ |
H A D | ld-cache.c | 92 dump_cache_rule(cache_table* rule, argument 95 dumpf(indent, "((cache_table*)0x%x\n", rule); 96 dumpf(indent, " (type %s)\n", i2name(rule->type, cache_type_map)); 97 dumpf(indent, " (field_name \"%s\")\n", rule->field_name); 98 dumpf(indent, " (derived_name \"%s\")\n", rule->derived_name); 99 dumpf(indent, " (type-def \"%s\")\n", rule->type_def); 100 dumpf(indent, " (expression \"%s\")\n", rule->expression); 101 dumpf(indent, " (next 0x%x)\n", rule->next); 107 dump_cache_rules(cache_table* rule, argument 110 while (rule) { [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/gdb/sim/ppc/ |
H A D | ld-cache.c | 92 dump_cache_rule(cache_table* rule, argument 95 dumpf(indent, "((cache_table*)0x%x\n", rule); 96 dumpf(indent, " (type %s)\n", i2name(rule->type, cache_type_map)); 97 dumpf(indent, " (field_name \"%s\")\n", rule->field_name); 98 dumpf(indent, " (derived_name \"%s\")\n", rule->derived_name); 99 dumpf(indent, " (type-def \"%s\")\n", rule->type_def); 100 dumpf(indent, " (expression \"%s\")\n", rule->expression); 101 dumpf(indent, " (next 0x%x)\n", rule->next); 107 dump_cache_rules(cache_table* rule, argument 110 while (rule) { [all...] |