/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iptables-1.4.12.1/iptables/ |
H A D | xtoptions.c | 29 #define XTOPT_MKPTR(cb) \ 30 ((void *)((char *)(cb)->data + (cb)->entry->ptroff)) 172 static void xtopt_parse_int(struct xt_option_call *cb) argument 174 const struct xt_option_entry *entry = cb->entry; 178 if (cb->entry->min != 0) 179 lmin = cb->entry->min; 180 if (cb->entry->max != 0) 181 lmax = cb->entry->max; 183 if (!xtables_strtoul(cb 211 xtopt_parse_float(struct xt_option_call *cb) argument 234 xtopt_mint_value_to_cb(struct xt_option_call *cb, uintmax_t value) argument 253 xtopt_mint_value_to_ptr(struct xt_option_call *cb, void **datap, uintmax_t value) argument 282 xtopt_parse_mint(struct xt_option_call *cb) argument 331 xtopt_parse_string(struct xt_option_call *cb) argument 373 tos_parse_numeric(const char *str, struct xt_option_call *cb, unsigned int max) argument 402 xtopt_parse_tosmask(struct xt_option_call *cb) argument 429 xtopt_parse_markmask(struct xt_option_call *cb) argument 462 xtopt_parse_sysloglevel(struct xt_option_call *cb) argument 514 xtopt_parse_host(struct xt_option_call *cb) argument 587 xtopt_parse_protocol(struct xt_option_call *cb) argument 598 xtopt_parse_port(struct xt_option_call *cb) argument 615 xtopt_parse_mport(struct xt_option_call *cb) argument 674 xtopt_parse_plen(struct xt_option_call *cb) argument 694 xtopt_parse_plenmask(struct xt_option_call *cb) argument 725 xtopt_parse_hostmask(struct xt_option_call *cb) argument 752 xtopt_parse_ethermac(struct xt_option_call *cb) argument 805 xtables_option_parse(struct xt_option_call *cb) argument 896 struct xt_option_call cb; local 932 struct xt_option_call cb; local 1034 struct xt_fcheck_call cb; local 1055 struct xt_fcheck_call cb; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/dh/ |
H A D | dh_depr.c | 70 BN_GENCB cb; local 76 BN_GENCB_set_old(&cb, callback, cb_arg); 78 if(DH_generate_parameters_ex(ret, prime_len, generator, &cb))
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/bn/ |
H A D | bn_depr.c | 72 BN_GENCB cb; local 76 BN_GENCB_set_old(&cb, callback, cb_arg); 84 if(!BN_generate_prime_ex(rnd, bits, safe, add, rem, &cb)) 97 BN_GENCB cb; local 98 BN_GENCB_set_old(&cb, callback, cb_arg); 99 return BN_is_prime_ex(a, checks, ctx_passed, &cb); 107 BN_GENCB cb; local 108 BN_GENCB_set_old(&cb, callback, cb_arg); 110 do_trial_division, &cb);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/iptables-1.4.12.1/extensions/ |
H A D | libxt_length.c | 23 static void length_parse(struct xt_option_call *cb) argument 25 struct xt_length_info *info = cb->data; 27 xtables_option_parse(cb); 28 info->min = cb->val.u16_range[0]; 29 info->max = cb->val.u16_range[0]; 30 if (cb->nvals >= 2) 31 info->max = cb->val.u16_range[1]; 32 if (cb->invert)
|
H A D | libxt_devgroup.c | 45 static void devgroup_parse(struct xt_option_call *cb) argument 47 struct xt_devgroup_info *info = cb->data; 51 xtables_option_parse(cb); 52 switch (cb->entry->id) { 54 info->src_group = strtoul(cb->arg, &end, 0); 55 if (end != cb->arg && (*end == '/' || *end == '\0')) { 60 if (*end != '\0' || end == cb->arg) 63 cb->arg); 65 id = xtables_lmap_name2id(devgroups, cb->arg); 69 cb 154 devgroup_check(struct xt_fcheck_call *cb) argument [all...] |
H A D | libxt_AUDIT.c | 30 static void audit_parse(struct xt_option_call *cb) argument 32 struct xt_audit_info *einfo = cb->data; 34 xtables_option_parse(cb); 35 if (strcasecmp(cb->arg, "accept") == 0) 37 else if (strcasecmp(cb->arg, "drop") == 0) 39 else if (strcasecmp(cb->arg, "reject") == 0) 43 "Bad action type value \"%s\"", cb->arg);
|
H A D | libxt_tcpmss.c | 23 static void tcpmss_parse(struct xt_option_call *cb) argument 25 struct xt_tcpmss_match_info *mssinfo = cb->data; 27 xtables_option_parse(cb); 28 mssinfo->mss_min = cb->val.u16_range[0]; 30 if (cb->nvals == 2) 31 mssinfo->mss_max = cb->val.u16_range[1]; 32 if (cb->invert)
|
H A D | libxt_dscp.c | 53 static void dscp_parse(struct xt_option_call *cb) argument 55 struct xt_dscp_info *dinfo = cb->data; 57 xtables_option_parse(cb); 58 switch (cb->entry->id) { 60 if (cb->invert) 64 dinfo->dscp = class_to_dscp(cb->arg); 65 if (cb->invert) 71 static void dscp_check(struct xt_fcheck_call *cb) argument 73 if (cb->xflags == 0)
|
H A D | libipt_REJECT.c | 94 static void REJECT_parse(struct xt_option_call *cb) argument 96 struct ipt_reject_info *reject = cb->data; 99 xtables_option_parse(cb); 102 cb->arg, strlen(cb->arg)) == 0 || 104 cb->arg, strlen(cb->arg)) == 0) { 109 if (strncasecmp("echo-reply", cb->arg, strlen(cb->arg)) == 0 || 110 strncasecmp("echoreply", cb [all...] |
H A D | libxt_cluster.c | 52 static void cluster_parse(struct xt_option_call *cb) argument 54 struct xt_cluster_match_info *info = cb->data; 56 xtables_option_parse(cb); 57 switch (cb->entry->id) { 59 if (cb->invert) 61 info->node_mask = 1 << (cb->val.u32 - 1); 64 if (cb->invert) 70 static void cluster_check(struct xt_fcheck_call *cb) argument 72 const struct xt_cluster_match_info *info = cb->data; 76 if ((cb [all...] |
H A D | libxt_connmark.c | 50 static void connmark_mt_parse(struct xt_option_call *cb) argument 52 struct xt_connmark_mtinfo1 *info = cb->data; 54 xtables_option_parse(cb); 55 if (cb->invert) 57 info->mark = cb->val.mark; 58 info->mask = cb->val.mask; 61 static void connmark_parse(struct xt_option_call *cb) argument 63 struct xt_connmark_info *markinfo = cb->data; 65 xtables_option_parse(cb); 66 markinfo->mark = cb [all...] |
H A D | libxt_mark.c | 28 static void mark_mt_parse(struct xt_option_call *cb) argument 30 struct xt_mark_mtinfo1 *info = cb->data; 32 xtables_option_parse(cb); 33 if (cb->invert) 35 info->mark = cb->val.mark; 36 info->mask = cb->val.mask; 39 static void mark_parse(struct xt_option_call *cb) argument 41 struct xt_mark_info *markinfo = cb->data; 43 xtables_option_parse(cb); 44 if (cb [all...] |
H A D | libxt_MARK.c | 83 static void MARK_parse_v0(struct xt_option_call *cb) argument 85 struct xt_mark_target_info *markinfo = cb->data; 87 xtables_option_parse(cb); 88 switch (cb->entry->id) { 90 markinfo->mark = cb->val.mark; 95 cb->entry->name); 99 static void MARK_check(struct xt_fcheck_call *cb) argument 101 if (cb->xflags == 0) 107 static void MARK_parse_v1(struct xt_option_call *cb) argument 109 struct xt_mark_target_info_v1 *markinfo = cb 126 mark_tg_parse(struct xt_option_call *cb) argument 154 mark_tg_check(struct xt_fcheck_call *cb) argument [all...] |
H A D | libxt_connbytes.c | 31 static void connbytes_parse(struct xt_option_call *cb) argument 33 struct xt_connbytes_info *sinfo = cb->data; 36 xtables_option_parse(cb); 37 switch (cb->entry->id) { 39 sinfo->count.from = cb->val.u64_range[0]; 40 sinfo->count.to = cb->val.u64_range[0]; 41 if (cb->nvals == 2) 42 sinfo->count.to = cb->val.u64_range[1]; 43 if (cb->invert) { 50 if (strcmp(cb [all...] |
H A D | libipt_ecn.c | 39 static void ecn_parse(struct xt_option_call *cb) argument 41 struct ipt_ecn_info *einfo = cb->data; 43 xtables_option_parse(cb); 44 switch (cb->entry->id) { 47 if (cb->invert) 52 if (cb->invert) 56 if (cb->invert) 59 einfo->ip_ect = cb->val.u8; 64 static void ecn_check(struct xt_fcheck_call *cb) argument 66 if (cb [all...] |
H A D | libipt_realm.c | 42 static void realm_parse(struct xt_option_call *cb) argument 44 struct ipt_realm_info *realminfo = cb->data; 48 xtables_option_parse(cb); 49 realminfo->id = strtoul(cb->arg, &end, 0); 50 if (end != cb->arg && (*end == '/' || *end == '\0')) { 55 if (*end != '\0' || end == cb->arg) 57 "Bad realm value \"%s\"", cb->arg); 59 id = xtables_lmap_name2id(realms, cb->arg); 62 "Realm \"%s\" not found", cb->arg); 66 if (cb [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/pem/ |
H A D | pem_pk8.c | 72 pem_password_cb *cb, void *u); 76 pem_password_cb *cb, void *u); 86 pem_password_cb *cb, void *u) 88 return do_pk8pkey(bp, x, 0, nid, NULL, kstr, klen, cb, u); 93 pem_password_cb *cb, void *u) 95 return do_pk8pkey(bp, x, 0, -1, enc, kstr, klen, cb, u); 100 pem_password_cb *cb, void *u) 102 return do_pk8pkey(bp, x, 1, -1, enc, kstr, klen, cb, u); 107 pem_password_cb *cb, void *u) 109 return do_pk8pkey(bp, x, 1, nid, NULL, kstr, klen, cb, 84 PEM_write_bio_PKCS8PrivateKey_nid(BIO *bp, EVP_PKEY *x, int nid, char *kstr, int klen, pem_password_cb *cb, void *u) argument 91 PEM_write_bio_PKCS8PrivateKey(BIO *bp, EVP_PKEY *x, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument 98 i2d_PKCS8PrivateKey_bio(BIO *bp, EVP_PKEY *x, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument 105 i2d_PKCS8PrivateKey_nid_bio(BIO *bp, EVP_PKEY *x, int nid, char *kstr, int klen, pem_password_cb *cb, void *u) argument 112 do_pk8pkey(BIO *bp, EVP_PKEY *x, int isder, int nid, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument 153 d2i_PKCS8PrivateKey_bio(BIO *bp, EVP_PKEY **x, pem_password_cb *cb, void *u) argument 184 i2d_PKCS8PrivateKey_fp(FILE *fp, EVP_PKEY *x, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument 191 i2d_PKCS8PrivateKey_nid_fp(FILE *fp, EVP_PKEY *x, int nid, char *kstr, int klen, pem_password_cb *cb, void *u) argument 198 PEM_write_PKCS8PrivateKey_nid(FILE *fp, EVP_PKEY *x, int nid, char *kstr, int klen, pem_password_cb *cb, void *u) argument 205 PEM_write_PKCS8PrivateKey(FILE *fp, EVP_PKEY *x, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument 211 do_pk8pkey_fp(FILE *fp, EVP_PKEY *x, int isder, int nid, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument 226 d2i_PKCS8PrivateKey_fp(FILE *fp, EVP_PKEY **x, pem_password_cb *cb, void *u) argument [all...] |
H A D | pem_all.c | 112 RSA *PEM_read_bio_RSAPrivateKey(BIO *bp, RSA **rsa, pem_password_cb *cb, argument 116 pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, u); 122 RSA *PEM_read_RSAPrivateKey(FILE *fp, RSA **rsa, pem_password_cb *cb, argument 126 pktmp = PEM_read_PrivateKey(fp, NULL, cb, u); 136 pem_password_cb *cb, void *u) 145 ret = PEM_write_bio_PrivateKey(bp, k, enc, kstr, klen, cb, u); 153 pem_password_cb *cb, void *u) 163 ret = PEM_write_PrivateKey(fp, k, enc, kstr, klen, cb, u); 196 DSA *PEM_read_bio_DSAPrivateKey(BIO *bp, DSA **dsa, pem_password_cb *cb, argument 200 pktmp = PEM_read_bio_PrivateKey(bp, NULL, cb, 134 PEM_write_bio_RSAPrivateKey(BIO *bp, RSA *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb, void *u) argument 151 PEM_write_RSAPrivateKey(FILE *fp, RSA *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb, void *u) argument 207 PEM_write_bio_DSAPrivateKey(BIO *bp, DSA *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb, void *u) argument 224 PEM_write_DSAPrivateKey(FILE *fp, DSA *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb, void *u) argument 294 PEM_write_PrivateKey(FILE *fp, EVP_PKEY *x, const EVP_CIPHER *enc, unsigned char *kstr, int klen, pem_password_cb *cb, void *u) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pem/ |
H A D | pem_pk8.c | 72 pem_password_cb *cb, void *u); 76 pem_password_cb *cb, void *u); 86 pem_password_cb *cb, void *u) 88 return do_pk8pkey(bp, x, 0, nid, NULL, kstr, klen, cb, u); 93 pem_password_cb *cb, void *u) 95 return do_pk8pkey(bp, x, 0, -1, enc, kstr, klen, cb, u); 100 pem_password_cb *cb, void *u) 102 return do_pk8pkey(bp, x, 1, -1, enc, kstr, klen, cb, u); 107 pem_password_cb *cb, void *u) 109 return do_pk8pkey(bp, x, 1, nid, NULL, kstr, klen, cb, 84 PEM_write_bio_PKCS8PrivateKey_nid(BIO *bp, EVP_PKEY *x, int nid, char *kstr, int klen, pem_password_cb *cb, void *u) argument 91 PEM_write_bio_PKCS8PrivateKey(BIO *bp, EVP_PKEY *x, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument 98 i2d_PKCS8PrivateKey_bio(BIO *bp, EVP_PKEY *x, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument 105 i2d_PKCS8PrivateKey_nid_bio(BIO *bp, EVP_PKEY *x, int nid, char *kstr, int klen, pem_password_cb *cb, void *u) argument 112 do_pk8pkey(BIO *bp, EVP_PKEY *x, int isder, int nid, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument 152 d2i_PKCS8PrivateKey_bio(BIO *bp, EVP_PKEY **x, pem_password_cb *cb, void *u) argument 183 i2d_PKCS8PrivateKey_fp(FILE *fp, EVP_PKEY *x, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument 190 i2d_PKCS8PrivateKey_nid_fp(FILE *fp, EVP_PKEY *x, int nid, char *kstr, int klen, pem_password_cb *cb, void *u) argument 197 PEM_write_PKCS8PrivateKey_nid(FILE *fp, EVP_PKEY *x, int nid, char *kstr, int klen, pem_password_cb *cb, void *u) argument 204 PEM_write_PKCS8PrivateKey(FILE *fp, EVP_PKEY *x, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument 210 do_pk8pkey_fp(FILE *fp, EVP_PKEY *x, int isder, int nid, const EVP_CIPHER *enc, char *kstr, int klen, pem_password_cb *cb, void *u) argument 225 d2i_PKCS8PrivateKey_fp(FILE *fp, EVP_PKEY **x, pem_password_cb *cb, void *u) argument [all...] |
H A D | pem.h | 221 type *PEM_read_##name(FILE *fp, type **x, pem_password_cb *cb, void *u)\ 226 cb, u); \ 249 unsigned char *kstr, int klen, pem_password_cb *cb, \ 255 enc, kstr, klen, cb, u); \ 260 unsigned char *kstr, int klen, pem_password_cb *cb, \ 266 enc, kstr, klen, cb, u); \ 272 type *PEM_read_bio_##name(BIO *bp, type **x, pem_password_cb *cb, void *u)\ 277 cb, u); \ 300 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) \ 305 enc, kstr, klen, cb, [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/include/linux/ |
H A D | if_ec.h | 18 unsigned char cb; /* Control/flag byte. */ member in struct:sockaddr_ec 46 unsigned char cb; member in struct:ec_framehdr 53 unsigned char cb; member in struct:econet_sock
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/s390/net/ |
H A D | smsgiucv.c | 67 struct smsg_callback *cb; local 90 list_for_each_entry(cb, &smsg_list, list) 91 if (strncmp(buffer + 8, cb->prefix, cb->len) == 0) { 92 cb->callback(sender, buffer + 8); 103 struct smsg_callback *cb; local 105 cb = kmalloc(sizeof(struct smsg_callback), GFP_KERNEL); 106 if (!cb) 108 cb->prefix = prefix; 109 cb 120 struct smsg_callback *cb, *tmp; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/ntfs-3g-2009.3.8/libntfs-3g/ |
H A D | compress.c | 86 * Pointers into the compressed data, i.e. the compression block (cb), 89 u8 *cb_end = cb_start + cb_size; /* End of cb. */ 90 u8 *cb = cb_start; /* Current position in cb. */ local 91 u8 *cb_sb_start = cb; /* Beginning of the current sb in the cb. */ 103 ntfs_log_debug("Beginning sub-block at offset = %d in the cb.\n", 104 (int)(cb - cb_start)); 111 if (cb == cb_end || !le16_to_cpup((u16*)cb) || des 332 u8 *dest, *cb, *cb_pos, *cb_end; local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/net/decnet/ |
H A D | dn_nsp_in.c | 85 struct dn_skb_cb *cb = DN_SKB_CB(skb); local 86 printk(KERN_INFO "DECnet: Martian packet (%s) dev=%s src=0x%04hx dst=0x%04hx srcport=0x%04hx dstport=0x%04hx\n", msg, devname, dn_ntohs(cb->src), dn_ntohs(cb->dst), dn_ntohs(cb->src_port), dn_ntohs(cb->dst_port)); 218 struct dn_skb_cb *cb = DN_SKB_CB(skb); local 236 cb->src_port = msg->srcaddr; 237 cb->dst_port = msg->dstaddr; 238 cb->services = msg->services; 239 cb 337 struct dn_skb_cb *cb = DN_SKB_CB(skb); local 393 struct dn_skb_cb *cb = DN_SKB_CB(skb); local 617 struct dn_skb_cb *cb = DN_SKB_CB(skb); local 645 struct dn_skb_cb *cb = DN_SKB_CB(skb); local 693 struct dn_skb_cb *cb = DN_SKB_CB(skb); local 721 struct dn_skb_cb *cb = DN_SKB_CB(skb); local 830 struct dn_skb_cb *cb = DN_SKB_CB(skb); local [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | pem.h | 221 type *PEM_read_##name(FILE *fp, type **x, pem_password_cb *cb, void *u)\ 226 cb, u); \ 249 unsigned char *kstr, int klen, pem_password_cb *cb, \ 255 enc, kstr, klen, cb, u); \ 260 unsigned char *kstr, int klen, pem_password_cb *cb, \ 266 enc, kstr, klen, cb, u); \ 272 type *PEM_read_bio_##name(BIO *bp, type **x, pem_password_cb *cb, void *u)\ 277 cb, u); \ 300 unsigned char *kstr, int klen, pem_password_cb *cb, void *u) \ 305 enc, kstr, klen, cb, [all...] |