/netgear-R7000-V1.0.7.12_1.2.5/src/router/squashfs-4.2/ |
H A D | pseudo.c | 91 static char *get_component(char *target, char *targname) argument 97 *targname ++ = *target ++; 99 *targname = '\0'; 112 char targname[1024]; local 115 target = get_component(target, targname); 127 if(strcmp(pseudo->name[i].name, targname) == 0) 137 pseudo->name[i].name = strdup(targname); 166 targname, alltarget); 185 targname, alltarget);
|
H A D | unsquashfs.c | 1037 char *get_component(char *target, char *targname) argument 1043 *targname ++ = *target ++; 1045 *targname = '\0'; 1071 char targname[1024]; local 1076 target = get_component(target, targname); 1088 if(strcmp(paths->name[i].name, targname) == 0) 1100 paths->name[i].name = strdup(targname); 1106 error = regcomp(paths->name[i].preg, targname, 1113 "because %s\n", targname, alltarget,
|
H A D | mksquashfs.c | 4159 char *get_component(char *target, char *targname) argument 4165 *targname ++ = *target ++; 4167 *targname = '\0'; 4193 char targname[1024]; local 4196 target = get_component(target, targname); 4208 if(strcmp(paths->name[i].name, targname) == 0) 4218 paths->name[i].name = strdup(targname); 4224 error = regcomp(paths->name[i].preg, targname, 4231 "because %s\n", targname, alltarget,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/iptables/ |
H A D | ip6tables.c | 545 const char *targname, 554 if (!ip6tc_is_chain(targname, handle)) 555 target = xtables_find_target(targname, XTF_TRY_LOAD); 571 printf(FMT("%-9s ", "%s "), targname); 544 print_firewall(const struct ip6t_entry *fw, const char *targname, unsigned int num, unsigned int format, struct ip6tc_handle *const handle) argument
|
H A D | iptables.c | 550 const char *targname, 560 if (!iptc_is_chain(targname, handle)) 561 target = xtables_find_target(targname, XTF_TRY_LOAD); 578 printf(FMT("%-9s ", "%s "), targname); 549 print_firewall(const struct ipt_entry *fw, const char *targname, unsigned int num, unsigned int format, struct iptc_handle *const handle) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/iptables/ |
H A D | ip6tables.c | 545 const char *targname, 554 if (!ip6tc_is_chain(targname, handle)) 555 target = xtables_find_target(targname, XTF_TRY_LOAD); 571 printf(FMT("%-9s ", "%s "), targname); 544 print_firewall(const struct ip6t_entry *fw, const char *targname, unsigned int num, unsigned int format, struct ip6tc_handle *const handle) argument
|
H A D | iptables.c | 539 const char *targname, 549 if (!iptc_is_chain(targname, handle)) 550 target = xtables_find_target(targname, XTF_TRY_LOAD); 567 printf(FMT("%-9s ", "%s "), targname); 538 print_firewall(const struct ipt_entry *fw, const char *targname, unsigned int num, unsigned int format, struct iptc_handle *const handle) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.x/ |
H A D | ip6tables.c | 1330 const char *targname, 1340 if (!ip6tc_is_chain(targname, handle)) 1341 target = find_target(targname, TRY_LOAD); 1357 printf(FMT("%-9s ", "%s "), targname); 1329 print_firewall(const struct ip6t_entry *fw, const char *targname, unsigned int num, unsigned int format, const ip6tc_handle_t handle) argument
|
H A D | iptables.c | 1391 const char *targname, 1401 if (!iptc_is_chain(targname, handle)) 1402 target = find_target(targname, TRY_LOAD); 1418 printf(FMT("%-9s ", "%s "), targname); 1390 print_firewall(const struct ipt_entry *fw, const char *targname, unsigned int num, unsigned int format, const iptc_handle_t handle) argument
|