Searched refs:table (Results 1 - 25 of 788) sorted by path

1234567891011>>

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/
H A Dhash.c73 h->table = malloc(slots * sizeof(struct curl_llist *));
74 if(h->table) {
76 h->table[i] = Curl_llist_alloc((curl_llist_dtor) hash_element_dtor);
77 if(!h->table[i]) {
79 Curl_llist_destroy(h->table[i], NULL);
80 h->table[i] = NULL;
82 free(h->table);
83 h->table = NULL;
146 #define FETCH_LIST(x,y,z) x->table[x->hash_func(y, z, x->slots)]
232 for(le = (h->table[
[all...]
H A Dhash.h47 struct curl_llist **table; member in struct:curl_hash
49 /* Hash function to be used for this hash table */
H A Dssluse.c713 /* Free OpenSSL ex_data table */
2021 struct curl_slist **table; local
2026 table = calloc((size_t)num, sizeof(struct curl_slist *));
2027 if(!table)
2030 ci->certinfo = table;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iproute2/doc/
H A Dip-cref.tex115 \item \verb|route| --- routing table entry
837 Neighbour entries are organized into tables. The IPv4 neighbour table
838 is known by another name --- the ARP table.
1010 may remove the entry from the neighbour table.
1054 of rounds made to flush the neighbour table. If the option is given
1070 \section{{\tt ip route} --- routing table management}
1131 in this sequence. Instead, the routing table in the kernel is kept
1137 the route in the routing table.
1171 in this table is terminated pretending that no route was found.
1173 table
[all...]
H A Dip-tunnels.tex53 to 10.0.0.0 via \verb|tunl0| in routing table.
143 listed in the following table:
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iproute2/include/
H A Dip6tables.h121 extern int do_command6(int argc, char *argv[], char **table,
H A Diptables.h156 extern int do_command(int argc, char *argv[], char **table,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iproute2/ip/
H A Droutel17 ip route list table "$@" |
26 table=""
40 echo "$network $via $src $proto $scope $dev $table"
57 table=$7;
58 printf(format,network,mask,via,src,proto,scope,dev,table);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iproute2/netem/
H A Dmaketable.c2 * Experimental data distribution table generator
7 * From this, create the inverse distribution table used to approximate
73 /* Create a (normalized) distribution table from a set of observed
74 * values. The table is fixed to run from (as it happens) -4 to +4,
95 int *table; local
99 table = calloc(DISTTABLESIZE, sizeof(int));
100 if (!table) {
101 perror("table alloc");
112 ++table[index];
118 return table;
123 cumulativedist(int *table, int limit, int *total) argument
135 inverttable(int *table, int inversesize, int tablesize, int cumulative) argument
160 interpolatetable(short *table, int limit) argument
183 printtable(const short *table, int limit) argument
202 int *table; local
[all...]
H A Dnormal.c2 * Normal distribution table generator
29 double table[TABLESIZE+1]; local
33 table[i] = x;
37 printf("# This is the distribution table for the normal distribution.\n");
39 int value = (int) rint(table[i]*TABLEFACTOR);
H A Dparetonormal.c2 * Paretoormal distribution table generator
54 double table[TABLESIZE+1]; local
58 table[i] = x;
61 "# This is the distribution table for the paretonormal distribution.\n"
67 normvalue = (int) rint(table[i]*TABLEFACTOR);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iproute2/tc/
H A Demp_ematch.y10 %token-table
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iptables-1.4.12.1/include/
H A Dip6tables.h10 extern int do_command6(int argc, char *argv[], char **table,
H A Diptables.h10 extern int do_command4(int argc, char *argv[], char **table,
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iptables-1.4.12.1/iptables/
H A Dip6tables-restore.c72 "table '%s'\n", ip6tables_globals.program_name,
204 /* New table */
205 char *table; local
207 table = strtok(buffer+1, " \t\n");
208 DEBUGP("line %u, table '%s'\n", line, table);
209 if (!table) {
211 "%s: line %u table name invalid\n",
216 strncpy(curtable, table, IP6T_TABLE_MAXNAMELEN);
222 handle = create_handle(table);
[all...]
H A Dip6tables-standalone.c14 * firewall table (aimed for the 2.3 kernels)
44 char *table = "filter"; local
61 ret = do_command6(argc, argv, &table, &handle);
H A Dip6tables.c115 {.name = "table", .has_arg = 1, .val = 't'},
273 " --table -t table table to manipulate (default: `filter')\n"
1331 int do_command6(int argc, char *argv[], char **table, struct ip6tc_handle **handle) argument
1632 "unexpected ! flag before --table");
1633 *table = optarg;
1773 *handle = ip6tc_init(*table);
1777 *handle = ip6tc_init(*table);
1781 "can't initialize ip6tables table `
[all...]
H A Diptables-restore.c36 {.name = "table", .has_arg = true, .val = 'T'},
53 " [ --table=<TABLE> ]\n"
73 "table '%s'\n", prog_name, tablename);
209 /* New table */
210 char *table; local
212 table = strtok(buffer+1, " \t\n");
213 DEBUGP("line %u, table '%s'\n", line, table);
214 if (!table) {
216 "%s: line %u table nam
[all...]
H A Diptables-standalone.c14 * firewall table (aimed for the 2.3 kernels)
45 char *table = "filter"; local
61 ret = do_command4(argc, argv, &table, &handle);
H A Diptables-xml.c97 #define maxChains 10240 /* max chains per table */
284 an empty chain at table-end time */
326 printf(" </table>\n");
331 openTable(char *table) argument
335 strncpy(curTable, table, IPT_TABLE_MAXNAMELEN);
338 printf(" <table ");
354 // (or I guess -j SNAT in nat table, but we don't check for that yet
587 //xmlAttrS("table",curTable); // not needed in full mode
680 /* New table */
681 char *table; local
[all...]
H A Diptables.c113 {.name = "table", .has_arg = 1, .val = 't'},
286 " --table -t table table to manipulate (default: `filter')\n"
1361 int do_command4(int argc, char *argv[], char **table, struct iptc_handle **handle) argument
1660 "unexpected ! flag before --table");
1661 *table = optarg;
1748 if (strcmp(*table, "nat") == 0 &&
1752 "\nThe \"nat\" table is not intended for filtering, "
1804 *handle = iptc_init(*table);
[all...]
H A Dxtoptions.c991 * @entry: extension's option table
997 const struct xt_option_entry *table)
1002 for (entry = table; entry->name != NULL; ++entry) {
1019 other = xtables_option_lookup(table, i);
996 xtables_options_fcheck(const char *name, unsigned int xflags, const struct xt_option_entry *table) argument
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iptables-1.4.12.1/libiptc/
H A Dlibiptc.c948 DEBUGP_C("%u:%u: end of table:\n", *num, offset);
2704 } table [] = local
2719 { TC_INSERT_ENTRY, ELOOP, "Loop found in table" },
2736 for (i = 0; i < sizeof(table)/sizeof(struct table_struct); i++) {
2737 if ((!table[i].fn || table[i].fn == iptc_fn)
2738 && table[i].err == err)
2739 return table[i].message;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/ffmpeg-0.5.1/doc/
H A Dtexi2pod.pl154 } elsif ($ended =~ /^(?:itemize|enumerate|[fv]?table)$/) {
264 /^\@([fv]?table)\s+(\@[a-z]+)/ and do {
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/ffmpeg-0.5.1/libavcodec/
H A D4xm.c107 // this is simply the scaled down elementwise product of the standard jpeg quantizer table and the AAN premul table
304 int code= get_vlc2(&f->gb, block_type_vlc[1-(f->version>1)][index].table, BLOCK_TYPE_VLC_BITS, 1);
415 val = get_vlc2(&f->pre_gb, f->pre_vlc.table, ACDC_VLC_BITS, 3);
429 code = get_vlc2(&f->pre_gb, f->pre_vlc.table, ACDC_VLC_BITS, 3);
672 if(get_vlc2(&f->pre_gb, f->pre_vlc.table, ACDC_VLC_BITS, 3) != 256)

Completed in 160 milliseconds

1234567891011>>