/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ntfs/ |
H A D | index.h | 42 * @actx: attribute search context if @is_in_root and NULL otherwise 54 * by the attribute search context @actx and the base inode @base_ni. @ia and 59 * is in, respectively. @ir, @actx and @base_ni are NULL in this case. 82 ntfs_attr_search_ctx *actx; member in struct:__anon16805 114 flush_dcache_mft_record_page(ictx->actx->ntfs_ino); 140 mark_mft_record_dirty(ictx->actx->ntfs_ino);
|
H A D | index.c | 61 if (ictx->actx) 62 ntfs_attr_put_search_ctx(ictx->actx); 132 ntfs_attr_search_ctx *actx; local 158 actx = ntfs_attr_get_search_ctx(base_ni, m); 159 if (unlikely(!actx)) { 165 CASE_SENSITIVE, 0, NULL, 0, actx); 175 ir = (INDEX_ROOT*)((u8*)actx->attr + 176 le16_to_cpu(actx->attr->data.resident.value_offset)); 187 if ((u8*)ie < (u8*)actx->mrec || (u8*)ie + 211 ictx->actx [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/selinux/include/ |
H A D | audit.h | 49 * @actx: the audit context (can be NULL) associated with the check 55 struct audit_context *actx);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ntfs-3g-2009.3.8/include/ntfs-3g/ |
H A D | index.h | 48 * @actx: attribute search context if in root or NULL otherwise 66 * by the attribute search context @actx and inode @ni. @ia and 71 * respectively. @ir and @actx are NULL in this case. @ia_na is opened 94 ntfs_attr_search_ctx *actx; member in struct:__anon4169
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ntfs-3g-2009.3.8/libntfs-3g/ |
H A D | dir.c | 1388 ntfs_attr_search_ctx *actx = NULL; local 1411 actx = ntfs_attr_get_search_ctx(ni, NULL); 1412 if (!actx) 1416 0, NULL, 0, actx)) { 1421 fn = (FILE_NAME_ATTR*)((u8*)actx->attr + 1422 le16_to_cpu(actx->attr->value_offset)); 1460 ntfs_attr_reinit_search_ctx(actx); 1475 ntfs_attr_reinit_search_ctx(actx); 1484 if (ntfs_index_remove(dir_ni, fn, le32_to_cpu(actx->attr->value_length))) 1487 if (ntfs_attr_record_rm(actx)) [all...] |
H A D | index.c | 66 ntfs_inode_mark_dirty(ictx->actx->ntfs_ino); 147 if (icx->actx) 148 ntfs_attr_put_search_ctx(icx->actx); 679 ir = ntfs_ir_lookup(ni, icx->name, icx->name_len, &icx->actx); 1469 ntfs_inode_mark_dirty(icx->actx->ntfs_ino); 1545 ntfs_inode_mark_dirty(icx->actx->ntfs_ino); 1839 ntfs_inode_mark_dirty(icx->actx->ntfs_ino); 1843 ntfs_inode_mark_dirty(icx->actx->ntfs_ino);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/ntfs-3g-2009.3.8/src/ |
H A D | ntfs-3g.c | 1376 ntfs_attr_search_ctx *actx = NULL; local 1386 actx = ntfs_attr_get_search_ctx(ni, NULL); 1387 if (!actx) { 1393 0, NULL, 0, actx)) { 1397 if (!actx->attr->name_length) 1399 tmp_name_len = ntfs_ucstombs((ntfschar *)((u8*)actx->attr + 1400 le16_to_cpu(actx->attr->name_offset)), 1401 actx->attr->name_length, &tmp_name, 0); 1426 if (actx) 1427 ntfs_attr_put_search_ctx(actx); 1436 ntfs_attr_search_ctx *actx = NULL; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/cms/ |
H A D | cms_env.c | 684 AES_KEY actx; local 698 if (AES_set_encrypt_key(kekri->key, kekri->keylen << 3, &actx)) { 711 wkeylen = AES_wrap_key(&actx, NULL, wkey, ec->key, ec->keylen); 726 OPENSSL_cleanse(&actx, sizeof(actx)); 739 AES_KEY actx; local 768 if (AES_set_decrypt_key(kekri->key, kekri->keylen << 3, &actx)) { 781 ukeylen = AES_unwrap_key(&actx, NULL, ukey, 799 OPENSSL_cleanse(&actx, sizeof(actx)); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/cms/ |
H A D | cms_env.c | 684 AES_KEY actx; local 698 if (AES_set_encrypt_key(kekri->key, kekri->keylen << 3, &actx)) { 711 wkeylen = AES_wrap_key(&actx, NULL, wkey, ec->key, ec->keylen); 726 OPENSSL_cleanse(&actx, sizeof(actx)); 739 AES_KEY actx; local 768 if (AES_set_decrypt_key(kekri->key, kekri->keylen << 3, &actx)) { 781 ukeylen = AES_unwrap_key(&actx, NULL, ukey, 799 OPENSSL_cleanse(&actx, sizeof(actx)); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/integrity/ima/ |
H A D | ima.h | 158 struct audit_context *actx) 156 security_filter_rule_match(u32 secid, u32 field, u32 op, void *lsmrule, struct audit_context *actx) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | security.h | 1318 * @actx points to the audit context associated with the check. 1635 struct audit_context *actx); 2931 struct audit_context *actx); 2948 void *lsmrule, struct audit_context *actx) 2947 security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule, struct audit_context *actx) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/selinux/ss/ |
H A D | services.c | 2840 struct audit_context *actx) 2848 audit_log(actx, GFP_ATOMIC, AUDIT_SELINUX_ERR, 2856 audit_log(actx, GFP_ATOMIC, AUDIT_SELINUX_ERR, 2864 audit_log(actx, GFP_ATOMIC, AUDIT_SELINUX_ERR, 2839 selinux_audit_rule_match(u32 sid, u32 field, u32 op, void *vrule, struct audit_context *actx) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/ |
H A D | security.c | 1292 struct audit_context *actx) 1294 return security_ops->audit_rule_match(secid, field, op, lsmrule, actx); 1291 security_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule, struct audit_context *actx) argument
|
H A D | capability.c | 838 struct audit_context *actx) 837 cap_audit_rule_match(u32 secid, u32 field, u32 op, void *lsmrule, struct audit_context *actx) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/smack/ |
H A D | smack_lsm.c | 2948 * @actx: audit context associated with the check 2954 struct audit_context *actx) 2960 audit_log(actx, GFP_KERNEL, AUDIT_SELINUX_ERR, 2953 smack_audit_rule_match(u32 secid, u32 field, u32 op, void *vrule, struct audit_context *actx) argument
|