/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/base/ |
H A D | transport_class.c | 36 * @tclass: a pointer to the transport class structure to be initialised 47 int transport_class_register(struct transport_class *tclass) argument 49 return class_register(&tclass->class); 56 * @tclass: The transport class to unregister 61 void transport_class_unregister(struct transport_class *tclass) argument 63 class_unregister(&tclass->class); 90 atc->container.class = &atc->tclass.class; 95 atc->tclass.setup = anon_transport_dummy_function; 96 atc->tclass.remove = anon_transport_dummy_function; 119 struct transport_class *tclass local 187 struct transport_class *tclass = class_to_transport_class(cont->class); local 220 struct transport_class *tclass = class_to_transport_class(cont->class); local 257 struct transport_class *tclass = class_to_transport_class(cont->class); local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/busybox-1.x/editors/ |
H A D | awk.c | 1160 /* one should be very careful with switch on tclass - 1377 uint32_t tclass; local 1384 while ((tclass = next_token(TC_EOF | TC_OPSEQ | TC_GRPSTART | 1387 if (tclass & TC_OPTERM) 1391 if (tclass & TC_BEGIN) { 1395 } else if (tclass & TC_END) { 1399 } else if (tclass & TC_FUNCDECL) { 1416 } else if (tclass & TC_OPSEQ) { 1428 } else /* if (tclass & TC_GRPSTART) */ {
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/include/linux/ |
H A D | transport_class.h | 39 struct transport_class tclass; member in struct:anon_transport_class 45 .tclass = { \
|
H A D | ipv6.h | 330 __u8 tclass; member in struct:ipv6_pinfo 344 int tclass; member in struct:ipv6_pinfo::__anon9944
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/include/net/ |
H A D | ipv6.h | 459 int tclass,
|
H A D | transp_v6.h | 42 int *hlimit, int *tclass);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/ipv6/ |
H A D | datagram.c | 408 int tclass = (ntohl(*(__be32 *)ipv6_hdr(skb)) >> 20) & 0xff; local 409 put_cmsg(msg, SOL_IPV6, IPV6_TCLASS, sizeof(tclass), &tclass); 501 int *hlimit, int *tclass) 721 *tclass = tc; 499 datagram_send_ctl(struct msghdr *msg, struct flowi *fl, struct ipv6_txoptions *opt, int *hlimit, int *tclass) argument
|
H A D | fib6_rules.c | 29 u8 tclass; member in struct:fib6_rule 154 if (r->tclass && r->tclass != ((ntohl(fl->fl6_flowlabel) >> 20) & 0xff)) 191 rule6->tclass = frh->tos; 209 if (frh->tos && (rule6->tclass != frh->tos)) 231 frh->tos = rule6->tclass;
|
H A D | icmp.c | 312 int hlimit, tclass; local 426 tclass = np->tclass; 427 if (tclass < 0) 428 tclass = 0; 446 hlimit, tclass, NULL, &fl, (struct rt6_info*)dst, 482 int tclass; local 533 tclass = np->tclass; 534 if (tclass < [all...] |
H A D | ip6_output.c | 170 int hlimit, tclass; local 218 tclass = -1; 220 tclass = np->tclass; 221 if (tclass < 0) 222 tclass = 0; 224 *(__be32 *)hdr = htonl(0x60000000 | (tclass << 20)) | fl->fl6_flowlabel; 1048 int hlimit, int tclass, struct ipv6_txoptions *opt, struct flowi *fl, 1087 np->cork.tclass = tclass; 1045 ip6_append_data(struct sock *sk, int getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb), void *from, int length, int transhdrlen, int hlimit, int tclass, struct ipv6_txoptions *opt, struct flowi *fl, struct rt6_info *rt, unsigned int flags) argument [all...] |
H A D | ipv6_sockglue.c | 362 np->tclass = val; 982 val = np->tclass;
|
H A D | raw.c | 683 int tclass = -1; local 769 err = datagram_send_ctl(msg, &fl, opt, &hlimit, &tclass); 833 if (tclass < 0) { 834 tclass = np->tclass; 835 if (tclass < 0) 836 tclass = 0; 848 len, 0, hlimit, tclass, opt, &fl, (struct rt6_info*)dst,
|
H A D | udp.c | 577 int tclass = -1; local 703 err = datagram_send_ctl(msg, &fl, opt, &hlimit, &tclass); 769 if (tclass < 0) { 770 tclass = np->tclass; 771 if (tclass < 0) 772 tclass = 0; 796 sizeof(struct udphdr), hlimit, tclass, opt, &fl,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/security/selinux/ |
H A D | avc.c | 87 u16 tclass; member in struct:avc_entry 108 u16 tclass, u32 perms, 113 u16 tclass; member in struct:avc_callback_node 129 static inline int avc_hash(u32 ssid, u32 tsid, u16 tclass) argument 131 return (ssid ^ (tsid<<2) ^ (tclass<<4)) & (AVC_CACHE_SLOTS - 1); 136 * @tclass: target security class 139 static void avc_dump_av(struct audit_buffer *ab, u16 tclass, u32 av) argument 151 if (av_inherit[i].tclass == tclass) { 173 if ((av_perm_to_string[i2].tclass 199 avc_dump_query(struct audit_buffer *ab, u32 ssid, u32 tsid, u16 tclass) argument 353 avc_node_populate(struct avc_node *node, u32 ssid, u32 tsid, u16 tclass, struct avc_entry *ae) argument 361 avc_search_node(u32 ssid, u32 tsid, u16 tclass) argument 402 avc_lookup(u32 ssid, u32 tsid, u16 tclass, u32 requested) argument 459 avc_insert(u32 ssid, u32 tsid, u16 tclass, struct avc_entry *ae) argument 528 avc_audit(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd, int result, struct avc_audit_data *a) argument 689 avc_add_callback(int (*callback)(u32 event, u32 ssid, u32 tsid, u16 tclass, u32 perms, u32 *out_retained), u32 events, u32 ssid, u32 tsid, u16 tclass, u32 perms) argument 731 avc_update_node(u32 event, u32 perms, u32 ssid, u32 tsid, u16 tclass) argument 848 avc_has_perm_noaudit(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd) argument 906 avc_has_perm(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct avc_audit_data *auditdata) argument [all...] |
H A D | hooks.c | 797 u16 tclass, 823 rc = security_genfs_sid("proc", path, tclass, sid); 829 u16 tclass, 1153 u16 tclass) 1178 rc = security_transition_sid(tsec->sid, dsec->sid, tclass, 1184 rc = avc_has_perm(tsec->sid, newsid, tclass, FILE__CREATE, &ad); 1428 static int selinux_sysctl_get_sid(ctl_table *table, u16 tclass, u32 *sid) argument 1462 rc = security_genfs_sid("proc", path, tclass, sid); 796 selinux_proc_get_sid(struct proc_dir_entry *de, u16 tclass, u32 *sid) argument 828 selinux_proc_get_sid(struct proc_dir_entry *de, u16 tclass, u32 *sid) argument 1151 may_create(struct inode *dir, struct dentry *dentry, u16 tclass) argument
|
H A D | selinuxfs.c | 492 u16 tclass; local 511 if (sscanf(buf, "%s %s %hu %x", scon, tcon, &tclass, &req) != 4) 521 length = security_compute_av(ssid, tsid, tclass, req, &avd); 541 u16 tclass; local 560 if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3) 570 length = security_transition_sid(ssid, tsid, tclass, &newsid); 600 u16 tclass; local 619 if (sscanf(buf, "%s %s %hu", scon, tcon, &tclass) != 3) 629 length = security_change_sid(ssid, tsid, tclass, &newsid); 718 u16 tclass; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/security/selinux/include/ |
H A D | avc.h | 102 u16 tclass, u32 requested, 106 u16 tclass, u32 requested, 110 u16 tclass, u32 requested, 123 u16 tclass, u32 perms, 126 u16 tclass, u32 perms);
|
H A D | avc_ss.h | 15 u16 tclass; member in struct:av_perm_to_string 22 u16 tclass; member in struct:av_inherit
|
H A D | security.h | 53 u16 tclass, u32 requested, 57 u16 tclass, u32 *out_sid); 60 u16 tclass, u32 *out_sid); 63 u16 tclass, u32 *out_sid); 86 u16 tclass);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/security/selinux/ss/ |
H A D | mls.c | 510 u16 tclass, 525 rtr->target_class == tclass) { 533 if (tclass == SECCLASS_PROCESS) 508 mls_compute_sid(struct context *scontext, struct context *tcontext, u16 tclass, u32 specified, struct context *newcontext) argument
|
H A D | mls.h | 45 u16 tclass,
|
H A D | services.c | 284 u16 tclass, 304 if (tclass >= SECCLASS_NETLINK_ROUTE_SOCKET && 305 tclass <= SECCLASS_NETLINK_DNRT_SOCKET) 306 tclass = SECCLASS_NETLINK_SOCKET; 308 if (!tclass || tclass > policydb.p_classes.nprim) { 310 tclass); 313 tclass_datum = policydb.class_val_to_struct[tclass - 1]; 328 avkey.target_class = tclass; 376 if (tclass 282 context_struct_compute_av(struct context *scontext, struct context *tcontext, u16 tclass, u32 requested, struct av_decision *avd) argument 392 security_validtrans_handle_fail(struct context *ocontext, struct context *ncontext, struct context *tcontext, u16 tclass) argument 420 security_validate_transition(u32 oldsid, u32 newsid, u32 tasksid, u16 tclass) argument 507 security_compute_av(u32 ssid, u32 tsid, u16 tclass, u32 requested, struct av_decision *avd) argument 811 compute_sid_handle_invalid_context( struct context *scontext, struct context *tcontext, u16 tclass, struct context *newcontext) argument 841 security_compute_sid(u32 ssid, u32 tsid, u16 tclass, u32 specified, u32 *out_sid) argument 992 security_transition_sid(u32 ssid, u32 tsid, u16 tclass, u32 *out_sid) argument 1013 security_member_sid(u32 ssid, u32 tsid, u16 tclass, u32 *out_sid) argument 1034 security_change_sid(u32 ssid, u32 tsid, u16 tclass, u32 *out_sid) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | tasn_enc.c | 273 int i, ret, flags, ttag, tclass, ndef; local 289 tclass = flags & ASN1_TFLG_TAG_CLASS; 295 tclass = iclass & ASN1_TFLG_TAG_CLASS; 300 tclass = 0; 308 * 'tclass' is the class and iclass is any flags passed 343 skaclass = tclass; 374 ASN1_put_object(out, ndef, sklen, ttag, tclass); 403 ASN1_put_object(out, ndef, i, ttag, tclass); 414 ttag, tclass | iclass);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libxml2-2.7.2/python/ |
H A D | generator.py | 1177 tclass = classes_type[ret[0]][2] 1178 if reference_keepers.has_key(tclass): 1179 list = reference_keepers[tclass]
|