/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/ |
H A D | hash.c | 73 h->table = malloc(slots * sizeof(struct curl_llist *)); 74 if(h->table) { 76 h->table[i] = Curl_llist_alloc((curl_llist_dtor) hash_element_dtor); 77 if(!h->table[i]) { 79 Curl_llist_destroy(h->table[i], NULL); 80 h->table[i] = NULL; 82 free(h->table); 83 h->table = NULL; 146 #define FETCH_LIST(x,y,z) x->table[x->hash_func(y, z, x->slots)] 232 for(le = (h->table[ [all...] |
H A D | hash.h | 47 struct curl_llist **table; member in struct:curl_hash 49 /* Hash function to be used for this hash table */
|
H A D | ssluse.c | 713 /* Free OpenSSL ex_data table */ 2021 struct curl_slist **table; local 2026 table = calloc((size_t)num, sizeof(struct curl_slist *)); 2027 if(!table) 2030 ci->certinfo = table;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iproute2/doc/ |
H A D | ip-cref.tex | 115 \item \verb|route| --- routing table entry 837 Neighbour entries are organized into tables. The IPv4 neighbour table 838 is known by another name --- the ARP table. 1010 may remove the entry from the neighbour table. 1054 of rounds made to flush the neighbour table. If the option is given 1070 \section{{\tt ip route} --- routing table management} 1131 in this sequence. Instead, the routing table in the kernel is kept 1137 the route in the routing table. 1171 in this table is terminated pretending that no route was found. 1173 table [all...] |
H A D | ip-tunnels.tex | 53 to 10.0.0.0 via \verb|tunl0| in routing table. 143 listed in the following table:
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iproute2/include/ |
H A D | ip6tables.h | 121 extern int do_command6(int argc, char *argv[], char **table,
|
H A D | iptables.h | 156 extern int do_command(int argc, char *argv[], char **table,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iproute2/ip/ |
H A D | routel | 17 ip route list table "$@" | 26 table="" 40 echo "$network $via $src $proto $scope $dev $table" 57 table=$7; 58 printf(format,network,mask,via,src,proto,scope,dev,table);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iproute2/netem/ |
H A D | maketable.c | 2 * Experimental data distribution table generator 7 * From this, create the inverse distribution table used to approximate 73 /* Create a (normalized) distribution table from a set of observed 74 * values. The table is fixed to run from (as it happens) -4 to +4, 95 int *table; local 99 table = calloc(DISTTABLESIZE, sizeof(int)); 100 if (!table) { 101 perror("table alloc"); 112 ++table[index]; 118 return table; 123 cumulativedist(int *table, int limit, int *total) argument 135 inverttable(int *table, int inversesize, int tablesize, int cumulative) argument 160 interpolatetable(short *table, int limit) argument 183 printtable(const short *table, int limit) argument 202 int *table; local [all...] |
H A D | normal.c | 2 * Normal distribution table generator 29 double table[TABLESIZE+1]; local 33 table[i] = x; 37 printf("# This is the distribution table for the normal distribution.\n"); 39 int value = (int) rint(table[i]*TABLEFACTOR);
|
H A D | paretonormal.c | 2 * Paretoormal distribution table generator 54 double table[TABLESIZE+1]; local 58 table[i] = x; 61 "# This is the distribution table for the paretonormal distribution.\n" 67 normvalue = (int) rint(table[i]*TABLEFACTOR);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iproute2/tc/ |
H A D | emp_ematch.y | 10 %token-table
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iptables-1.4.12.1/include/ |
H A D | ip6tables.h | 10 extern int do_command6(int argc, char *argv[], char **table,
|
H A D | iptables.h | 10 extern int do_command4(int argc, char *argv[], char **table,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iptables-1.4.12.1/iptables/ |
H A D | ip6tables-restore.c | 72 "table '%s'\n", ip6tables_globals.program_name, 204 /* New table */ 205 char *table; local 207 table = strtok(buffer+1, " \t\n"); 208 DEBUGP("line %u, table '%s'\n", line, table); 209 if (!table) { 211 "%s: line %u table name invalid\n", 216 strncpy(curtable, table, IP6T_TABLE_MAXNAMELEN); 222 handle = create_handle(table); [all...] |
H A D | ip6tables-standalone.c | 14 * firewall table (aimed for the 2.3 kernels) 44 char *table = "filter"; local 61 ret = do_command6(argc, argv, &table, &handle);
|
H A D | ip6tables.c | 115 {.name = "table", .has_arg = 1, .val = 't'}, 273 " --table -t table table to manipulate (default: `filter')\n" 1331 int do_command6(int argc, char *argv[], char **table, struct ip6tc_handle **handle) argument 1632 "unexpected ! flag before --table"); 1633 *table = optarg; 1773 *handle = ip6tc_init(*table); 1777 *handle = ip6tc_init(*table); 1781 "can't initialize ip6tables table ` [all...] |
H A D | iptables-restore.c | 36 {.name = "table", .has_arg = true, .val = 'T'}, 53 " [ --table=<TABLE> ]\n" 73 "table '%s'\n", prog_name, tablename); 209 /* New table */ 210 char *table; local 212 table = strtok(buffer+1, " \t\n"); 213 DEBUGP("line %u, table '%s'\n", line, table); 214 if (!table) { 216 "%s: line %u table nam [all...] |
H A D | iptables-standalone.c | 14 * firewall table (aimed for the 2.3 kernels) 45 char *table = "filter"; local 61 ret = do_command4(argc, argv, &table, &handle);
|
H A D | iptables-xml.c | 97 #define maxChains 10240 /* max chains per table */ 284 an empty chain at table-end time */ 326 printf(" </table>\n"); 331 openTable(char *table) argument 335 strncpy(curTable, table, IPT_TABLE_MAXNAMELEN); 338 printf(" <table "); 354 // (or I guess -j SNAT in nat table, but we don't check for that yet 587 //xmlAttrS("table",curTable); // not needed in full mode 680 /* New table */ 681 char *table; local [all...] |
H A D | iptables.c | 113 {.name = "table", .has_arg = 1, .val = 't'}, 286 " --table -t table table to manipulate (default: `filter')\n" 1361 int do_command4(int argc, char *argv[], char **table, struct iptc_handle **handle) argument 1660 "unexpected ! flag before --table"); 1661 *table = optarg; 1748 if (strcmp(*table, "nat") == 0 && 1752 "\nThe \"nat\" table is not intended for filtering, " 1804 *handle = iptc_init(*table); [all...] |
H A D | xtoptions.c | 991 * @entry: extension's option table 997 const struct xt_option_entry *table) 1002 for (entry = table; entry->name != NULL; ++entry) { 1019 other = xtables_option_lookup(table, i); 996 xtables_options_fcheck(const char *name, unsigned int xflags, const struct xt_option_entry *table) argument
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iptables-1.4.12.1/libiptc/ |
H A D | libiptc.c | 948 DEBUGP_C("%u:%u: end of table:\n", *num, offset); 2704 } table [] = local 2719 { TC_INSERT_ENTRY, ELOOP, "Loop found in table" }, 2736 for (i = 0; i < sizeof(table)/sizeof(struct table_struct); i++) { 2737 if ((!table[i].fn || table[i].fn == iptc_fn) 2738 && table[i].err == err) 2739 return table[i].message;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/ffmpeg-0.5.1/doc/ |
H A D | texi2pod.pl | 154 } elsif ($ended =~ /^(?:itemize|enumerate|[fv]?table)$/) { 264 /^\@([fv]?table)\s+(\@[a-z]+)/ and do {
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/ffmpeg-0.5.1/libavcodec/ |
H A D | 4xm.c | 107 // this is simply the scaled down elementwise product of the standard jpeg quantizer table and the AAN premul table 304 int code= get_vlc2(&f->gb, block_type_vlc[1-(f->version>1)][index].table, BLOCK_TYPE_VLC_BITS, 1); 415 val = get_vlc2(&f->pre_gb, f->pre_vlc.table, ACDC_VLC_BITS, 3); 429 code = get_vlc2(&f->pre_gb, f->pre_vlc.table, ACDC_VLC_BITS, 3); 672 if(get_vlc2(&f->pre_gb, f->pre_vlc.table, ACDC_VLC_BITS, 3) != 256)
|