/freebsd-11-stable/usr.sbin/bsnmpd/tools/bsnmptools/ |
H A D | bsnmpget.c | 1055 if (obj->info->access < SNMP_ACCESS_SET) {
|
/freebsd-11-stable/sys/geom/eli/ |
H A D | g_eli_ctl.c | 244 sc->sc_geom->access = g_eli_access;
|
/freebsd-11-stable/usr.bin/rpcgen/ |
H A D | rpc_main.c | 369 if (access(temp, F_OK) != -1)
|
/freebsd-11-stable/contrib/tcsh/ |
H A D | sh.exec.c | 57 * to show that a file has the wrong mode/no access when the file 903 /* save time by not calling access() in the hopeless case */ 905 access(strname, X_OK) == 0
|
/freebsd-11-stable/sys/geom/ |
H A D | geom_disk.c | 85 .access = g_disk_access, 110 * Allow decreasing access count even if disk is not
|
/freebsd-11-stable/sys/geom/uzip/ |
H A D | g_uzip.c | 904 .access = g_uzip_access,
|
/freebsd-11-stable/sys/geom/gate/ |
H A D | g_gate.c | 434 sbuf_printf(sb, "%s<access>%s</access>\n", indent, "read-only"); 436 sbuf_printf(sb, "%s<access>%s</access>\n", indent, 439 sbuf_printf(sb, "%s<access>%s</access>\n", indent, 570 gp->access = g_gate_access; 585 G_GATE_DEBUG(1, "Unable to access %s.", ropp->name); 684 G_GATE_DEBUG(1, "Unable to access %s.",
|
/freebsd-11-stable/contrib/llvm-project/libunwind/src/ |
H A D | UnwindRegistersSave.S | 844 @ want the compiler to generate instructions that access those) but this is
|
/freebsd-11-stable/usr.sbin/tzsetup/ |
H A D | tzsetup.c | 807 if (access(zoneinfo_file, R_OK) != 0) { 810 "Cannot access %s: %s", zoneinfo_file,
|
/freebsd-11-stable/contrib/gcc/cp/ |
H A D | semantics.c | 65 Most C++ expressions and declarations require access checking 69 For member declarations, access checking has to be deferred 85 Furthermore, some contexts require that access checking is 89 Typical use of access checking functions is described here: 91 1. When we enter a context that requires certain access checking 103 to check access. 108 called to restore the previous access checking mode. 116 checking access controls. We cannot check the accessibility of 130 /* The current mode of access checks. */ 137 /* Data for deferred access checkin 2404 finish_base_specifier(tree base, tree access, bool virtual_p) argument [all...] |
H A D | cp-tree.h | 311 /* Polymorphic access to FUNCTION and CHAIN. */ 377 /* Macros for access to language-specific slots in an identifier. */ 645 /* Node to indicate default access. This must be distinct from the 646 access nodes in tree.h. */ 697 /* When parsing a class definition, the access specifier most recently 698 given by the user, or, if no access specifier was given, the 723 /* A list of private types mentioned, for deferred access checking. */ 1563 tree GTY ((tag ("0"))) access; 2732 each node is a type; the TREE_VALUE is the access granted for this 2733 DECL in that type. The DECL_ACCESS is set by access declaration 1556 tree GTY ((tag ("0"))) access; member in union:lang_decl_u2 [all...] |
/freebsd-11-stable/contrib/gcc/ |
H A D | sys-protos.h | 90 extern int access(const char *, int);
|
/freebsd-11-stable/sys/contrib/octeon-sdk/ |
H A D | cvmx-sriox-defs.h | 624 * General access control of the incoming BAR registers. 627 * This register controls write access to the BAR registers via SRIO Maintenance Operations. At 2073 * Allows access to maintenance registers. 2076 * This register allows write access to the local SRIOMAINT registers. A write to this register 2116 * Allows read access of maintenance registers. 2119 * This register allows read access of the local SRIOMAINT registers. A write to the SRIO(0,2..3)_MAINT_OP 3049 * Each SLI/DPI read or write access supplies a 64-bit address (MACADD[63:0]), 2-bit ADDRTYPE, and 3496 uint64_t access : 1; /**< SRIO and SRIOMAINT Register Access. member in struct:cvmx_sriox_status_reg::cvmx_sriox_status_reg_s 3504 uint64_t access : 1;
|
/freebsd-11-stable/contrib/amd/libamu/ |
H A D | xdr_func.c | 1499 if (!xdr_u_int(xdrs, &objp->access)) 1512 if (!xdr_u_int(xdrs, &objp->access))
|
/freebsd-11-stable/contrib/tzcode/zic/ |
H A D | zic.c | 653 access(fromname, F_OK) == 0 && 703 accres = access(myname, F_OK);
|
/freebsd-11-stable/sys/dev/cxgbe/iw_cxgbe/ |
H A D | qp.c | 221 /* Compute BAR2 DB/WC virtual address to access in kernel. */ 684 V_FW_RI_TPTE_PERM(c4iw_ib_to_tpt_access(wr->access)) | 717 wqe->fr.mem_perms = c4iw_ib_to_tpt_access(wr->access);
|
/freebsd-11-stable/contrib/libreadline/ |
H A D | complete.c | 519 if (access (filename, X_OK) == 0)
|
/freebsd-11-stable/gnu/usr.bin/rcs/lib/ |
H A D | rcsedit.c | 1397 * Root-over-the-wire NFS access is rare for security reasons. 1804 * file, the access list is empty, or caller is on the access list. 1808 register struct access const *next; 1819 rcserror("user %s not on the access list", getcaller());
|
/freebsd-11-stable/sys/geom/sched/ |
H A D | g_sched.c | 117 #include <sys/proc.h> /* we access curthread */ 1020 gp->access = g_sched_access; 1274 * being redirected) or not (see the access check
|
/freebsd-11-stable/crypto/openssl/crypto/sha/asm/ |
H A D | sha512-ppc.pl | 251 ; upon unaligned access which crosses page boundary. "Better safe
|
/freebsd-11-stable/lib/ncurses/ncurses/ |
H A D | Makefile | 176 access.c \
|
/freebsd-11-stable/contrib/wpa/hostapd/ |
H A D | hostapd_cli.c | 124 access(client_socket_dir, F_OK) < 0) {
|
/freebsd-11-stable/contrib/llvm-project/llvm/lib/Support/ |
H A D | Path.cpp | 197 EC = sys::fs::access(ResultPath.begin(), sys::fs::AccessMode::Exist);
|
/freebsd-11-stable/contrib/llvm-project/llvm/lib/DebugInfo/PDB/DIA/ |
H A D | DIARawSymbol.cpp | 225 RAW_METHOD_DUMP(OS, access);
|
/freebsd-11-stable/sbin/init/ |
H A D | init.c | 1063 error = access(script, X_OK); 1068 warning("can't access %s: %m", script);
|