Searched refs:requested (Results 1 - 25 of 227) sorted by relevance

12345678910

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/curl-7.21.7/tests/
H A Dftp.pm89 my @requested;
96 # Make 'requested' hold the non-duplicate pids from 'pidlist'.
97 @requested = split(' ', $pidlist);
98 return if(not @requested);
99 if(scalar(@requested) > 2) {
100 @requested = sort({$a <=> $b} @requested);
102 for(my $i = scalar(@requested) - 2; $i >= 0; $i--) {
103 if($requested[$i] == $requested[
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/curl-7.21.7/tests/
H A Dftp.pm89 my @requested;
96 # Make 'requested' hold the non-duplicate pids from 'pidlist'.
97 @requested = split(' ', $pidlist);
98 return if(not @requested);
99 if(scalar(@requested) > 2) {
100 @requested = sort({$a <=> $b} @requested);
102 for(my $i = scalar(@requested) - 2; $i >= 0; $i--) {
103 if($requested[$i] == $requested[
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/curl-7.21.7/tests/
H A Dftp.pm89 my @requested;
96 # Make 'requested' hold the non-duplicate pids from 'pidlist'.
97 @requested = split(' ', $pidlist);
98 return if(not @requested);
99 if(scalar(@requested) > 2) {
100 @requested = sort({$a <=> $b} @requested);
102 for(my $i = scalar(@requested) - 2; $i >= 0; $i--) {
103 if($requested[$i] == $requested[
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/minidlna/
H A Dupnpsoap.h41 int requested; member in struct:Response
49 * this method executes the requested Soap Action */
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/minidlna/
H A Dupnpsoap.h41 int requested; member in struct:Response
49 * this method executes the requested Soap Action */
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/minidlna/
H A Dupnpsoap.h41 int requested; member in struct:Response
49 * this method executes the requested Soap Action */
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/security/selinux/include/
H A Davc.h59 u16 tclass, u32 requested,
66 u16 tclass, u32 requested,
71 u16 tclass, u32 requested,
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/security/selinux/include/
H A Davc.h59 u16 tclass, u32 requested,
66 u16 tclass, u32 requested,
71 u16 tclass, u32 requested,
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/arch/powerpc/include/asm/
H A Dfsl_gtm.h27 bool requested; member in struct:gtm_timer
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/arch/powerpc/include/asm/
H A Dfsl_gtm.h27 bool requested; member in struct:gtm_timer
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/registry/
H A Dreg_dispatcher.c160 bool regkey_access_check(struct registry_key_handle *key, uint32 requested, argument
172 return key->ops->reg_access_check(key->name, requested,
182 se_map_generic( &requested, &reg_generic_map );
184 status =se_access_check(sec_desc, token, requested, granted);
H A Dreg_backend_smbconf.c58 static bool smbconf_reg_access_check(const char *keyname, uint32 requested, argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source3/registry/
H A Dreg_dispatcher.c160 bool regkey_access_check(struct registry_key_handle *key, uint32 requested, argument
172 return key->ops->reg_access_check(key->name, requested,
182 se_map_generic( &requested, &reg_generic_map );
184 status =se_access_check(sec_desc, token, requested, granted);
H A Dreg_backend_smbconf.c58 static bool smbconf_reg_access_check(const char *keyname, uint32 requested, argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source3/registry/
H A Dreg_dispatcher.c160 bool regkey_access_check(struct registry_key_handle *key, uint32 requested, argument
172 return key->ops->reg_access_check(key->name, requested,
182 se_map_generic( &requested, &reg_generic_map );
184 status =se_access_check(sec_desc, token, requested, granted);
H A Dreg_backend_smbconf.c58 static bool smbconf_reg_access_check(const char *keyname, uint32 requested, argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/security/selinux/
H A Davc.c470 * @requested: requested permissions
485 u16 tclass, u32 requested,
490 denied = requested & ~avd->allowed;
514 audited = denied = requested;
516 audited = requested & avd->auditallow;
524 a->selinux_audit_data.requested = requested;
726 * @requested: requested permission
484 avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, int result, struct common_audit_data *a) argument
741 avc_has_perm_noaudit(u32 ssid, u32 tsid, u16 tclass, u32 requested, unsigned flags, struct av_decision *in_avd) argument
805 avc_has_perm(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct common_audit_data *auditdata) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/security/selinux/
H A Davc.c470 * @requested: requested permissions
485 u16 tclass, u32 requested,
490 denied = requested & ~avd->allowed;
514 audited = denied = requested;
516 audited = requested & avd->auditallow;
524 a->selinux_audit_data.requested = requested;
726 * @requested: requested permission
484 avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, int result, struct common_audit_data *a) argument
741 avc_has_perm_noaudit(u32 ssid, u32 tsid, u16 tclass, u32 requested, unsigned flags, struct av_decision *in_avd) argument
805 avc_has_perm(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct common_audit_data *auditdata) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/heimdal/lib/krb5/
H A Dticket.c307 krb5_const_principal requested,
341 "realm"), requested->realm);
366 if (strcmp(requested->realm, returned->realm) != 0) {
370 "requested realm %s got back %s", ""),
371 requested->realm, returned->realm);
388 } else if (krb5_principal_compare(context, returned, requested) == 0) {
397 requested,
403 "as requested", ""));
417 if (krb5_principal_compare(context, requested, returned) == FALSE) {
420 "as requested", ""));
304 check_server_referral(krb5_context context, krb5_kdc_rep *rep, unsigned flags, krb5_const_principal requested, krb5_const_principal returned, krb5_keyblock * key) argument
433 check_client_referral(krb5_context context, krb5_kdc_rep *rep, krb5_const_principal requested, krb5_const_principal mapped, krb5_keyblock const * key) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/libusb-0.1.12/
H A Dlinux.c166 int bytesdone = 0, requested; local
196 requested = size - bytesdone;
197 if (requested > MAX_READ_WRITE)
198 requested = MAX_READ_WRITE;
204 urb.buffer_length = requested;
252 } while ((ret == 0 || urb.usercontext) && bytesdone < size && urb.actual_length == requested);
285 int bytesdone = 0, requested; local
315 requested = size - bytesdone;
316 if (requested > max_rw)
317 requested
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/heimdal/lib/krb5/
H A Dticket.c307 krb5_const_principal requested,
341 "realm"), requested->realm);
366 if (strcmp(requested->realm, returned->realm) != 0) {
370 "requested realm %s got back %s", ""),
371 requested->realm, returned->realm);
388 } else if (krb5_principal_compare(context, returned, requested) == 0) {
397 requested,
403 "as requested", ""));
417 if (krb5_principal_compare(context, requested, returned) == FALSE) {
420 "as requested", ""));
304 check_server_referral(krb5_context context, krb5_kdc_rep *rep, unsigned flags, krb5_const_principal requested, krb5_const_principal returned, krb5_keyblock * key) argument
433 check_client_referral(krb5_context context, krb5_kdc_rep *rep, krb5_const_principal requested, krb5_const_principal mapped, krb5_keyblock const * key) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/libusb-0.1.12/
H A Dlinux.c166 int bytesdone = 0, requested; local
196 requested = size - bytesdone;
197 if (requested > MAX_READ_WRITE)
198 requested = MAX_READ_WRITE;
204 urb.buffer_length = requested;
252 } while ((ret == 0 || urb.usercontext) && bytesdone < size && urb.actual_length == requested);
285 int bytesdone = 0, requested; local
315 requested = size - bytesdone;
316 if (requested > max_rw)
317 requested
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/libusb-0.1.12/
H A Dlinux.c166 int bytesdone = 0, requested; local
196 requested = size - bytesdone;
197 if (requested > MAX_READ_WRITE)
198 requested = MAX_READ_WRITE;
204 urb.buffer_length = requested;
252 } while ((ret == 0 || urb.usercontext) && bytesdone < size && urb.actual_length == requested);
285 int bytesdone = 0, requested; local
315 requested = size - bytesdone;
316 if (requested > max_rw)
317 requested
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/heimdal/lib/krb5/
H A Dticket.c307 krb5_const_principal requested,
341 "realm"), requested->realm);
366 if (strcmp(requested->realm, returned->realm) != 0) {
370 "requested realm %s got back %s", ""),
371 requested->realm, returned->realm);
388 } else if (krb5_principal_compare(context, returned, requested) == 0) {
397 requested,
403 "as requested", ""));
417 if (krb5_principal_compare(context, requested, returned) == FALSE) {
420 "as requested", ""));
304 check_server_referral(krb5_context context, krb5_kdc_rep *rep, unsigned flags, krb5_const_principal requested, krb5_const_principal returned, krb5_keyblock * key) argument
433 check_client_referral(krb5_context context, krb5_kdc_rep *rep, krb5_const_principal requested, krb5_const_principal mapped, krb5_keyblock const * key) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/arch/powerpc/sysdev/
H A Dfsl_gtm.c97 if (!gtm->timers[i].requested) {
98 gtm->timers[i].requested = true;
133 if (gtm->timers[timer].requested)
137 ret->requested = true;
157 tmr->requested = false;
239 * This function (re)sets the GTM timer so that it counts up to the requested
242 * requested timeout to fit in a 16-bit register.
271 * This function (re)sets GTM timer so that it counts up to the requested

Completed in 161 milliseconds

12345678910