Searched refs:rule_str (Results 1 - 9 of 9) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zebra/lib/ |
H A D | routemap.c | 46 char *rule_str; 219 printf (" match %s %s\n", rule->cmd->str, rule->rule_str); 221 printf (" set %s %s\n", rule->cmd->str, rule->rule_str); 434 if (rule->rule_str) 435 XFREE (MTYPE_ROUTE_MAP_RULE_STR, rule->rule_str); 512 rule->rule_str = XSTRDUP (MTYPE_ROUTE_MAP_RULE_STR, match_arg); 514 rule->rule_str = NULL; 543 (rulecmp (rule->rule_str, match_arg) == 0 || match_arg == NULL)) 599 rule->rule_str = XSTRDUP (MTYPE_ROUTE_MAP_RULE_STR, set_arg); 601 rule->rule_str 45 char *rule_str; member in struct:route_map_rule [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavfilter/ |
H A D | vsrc_life.c | 44 char *rule_str; member in struct:__anon3440 86 { "rule", "set rule", OFFSET(rule_str), AV_OPT_TYPE_STRING, {.str = "B3/S23"}, CHAR_MIN, CHAR_MAX, FLAGS }, 102 const char *rule_str, void *log_ctx) 105 const char *p = rule_str; 129 long int rule = strtol(rule_str, &tail, 10); 139 av_log(log_ctx, AV_LOG_ERROR, "Invalid rule code '%s' provided\n", rule_str); 228 if ((ret = parse_rule(&life->born_rule, &life->stay_rule, life->rule_str, ctx)) < 0) 264 life->rule_str, life->stay_rule, life->born_rule, life->stitch, 274 av_freep(&life->rule_str); 101 parse_rule(uint16_t *born_rule, uint16_t *stay_rule, const char *rule_str, void *log_ctx) argument
|
H A D | vsrc_cellauto.c | 43 char *rule_str; member in struct:__anon3438
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | ssl_ciph.c | 760 static int ssl_cipher_process_rulestr(const char *rule_str, argument 771 l = rule_str; 942 const char *rule_str) 955 if (rule_str == NULL || cipher_list == NULL || cipher_list_by_id == NULL) 989 * We also need cipher aliases for selecting based on the rule_str. 990 * There might be two types of entries in the rule_str: 1) names 1014 rule_p = rule_str; 1015 if (strncmp(rule_str,"DEFAULT",7) == 0)
|
H A D | ssl_locl.h | 729 const char *rule_str);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | ssl_ciph.c | 1152 static int ssl_cipher_process_rulestr(const char *rule_str, argument 1165 l = rule_str; 1470 const char *rule_str, CERT *c) 1483 if (rule_str == NULL || cipher_list == NULL || cipher_list_by_id == NULL) 1486 if (!check_suiteb_cipher_list(ssl_method, c, &rule_str)) 1580 * We also need cipher aliases for selecting based on the rule_str. 1581 * There might be two types of entries in the rule_str: 1) names 1604 rule_p = rule_str; 1605 if (strncmp(rule_str, "DEFAULT", 7) == 0) {
|
H A D | ssl_locl.h | 1081 const char *rule_str, CERT *c);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | ssl_ciph.c | 1152 static int ssl_cipher_process_rulestr(const char *rule_str, argument 1165 l = rule_str; 1470 const char *rule_str, CERT *c) 1483 if (rule_str == NULL || cipher_list == NULL || cipher_list_by_id == NULL) 1486 if (!check_suiteb_cipher_list(ssl_method, c, &rule_str)) 1580 * We also need cipher aliases for selecting based on the rule_str. 1581 * There might be two types of entries in the rule_str: 1) names 1604 rule_p = rule_str; 1605 if (strncmp(rule_str, "DEFAULT", 7) == 0) {
|
H A D | ssl_locl.h | 1081 const char *rule_str, CERT *c);
|
Completed in 109 milliseconds