/freebsd-9.3-release/contrib/gcclibs/libmudflap/ |
H A D | mf-hooks2.c | 1123 WRAPPER2(int , access, const char *path, int mode) 1128 MF_VALIDATE_EXTENT (path, CLAMPADD(n, 1), __MF_CHECK_READ, "access path"); 1129 return access (path, mode);
|
/freebsd-9.3-release/crypto/heimdal/appl/ftp/ftpd/ |
H A D | ftpd.c | 533 reply(530, "User %s access denied.", name); 569 reply(530, "User %s access denied.", name); 598 reply(530, "User %s access denied.", name); 664 * Determine whether a user has access, based on information in 784 reply(code, "Guest login ok, access restrictions apply."); 1019 access(name, R_OK) == 0){ 1031 if (access(ext, R_OK) == 0) {
|
/freebsd-9.3-release/sys/contrib/octeon-sdk/ |
H A D | cvmx-sriox-defs.h | 567 * General access control of the incoming BAR registers. 570 * This register controls write access to the BAR registers via SRIO Maintenance Operations. At 1880 * Allows access to maintenance registers. 1883 * This register allows write access to the local SRIOMAINT registers. A write to this register 1924 * Allows read access of maintenance registers. 1927 * This register allows read access of the local SRIOMAINT registers. A write to the SRIO(0..1)_MAINT_OP 2855 * Each SLI/DPI read or write access supplies a 64-bit address (MACADD[63:0]), 2-bit ADDRTYPE, and 3303 uint64_t access : 1; /**< SRIO and SRIOMAINT Register Access. member in struct:cvmx_sriox_status_reg::cvmx_sriox_status_reg_s 3311 uint64_t access : 1;
|
/freebsd-9.3-release/sys/geom/virstor/ |
H A D | g_virstor.c | 793 gp->access = (void *)invalid_call; /* compiler doesn't complain. */ 1109 gp->access = g_virstor_access; 1172 /* Replicate access permissions from first "live" consumer 1247 LOG_MSG(LVL_ERROR, "Cannot acquire read access for %s to " 1426 /* It seems that .access can be called with negative dr,dw,dx 1428 LOG_MSG(LVL_WARNING, "access(%d, %d, %d) for %s", 1433 ("%s: Positive access for %s", __func__, pp->name));
|
/freebsd-9.3-release/contrib/dialog/samples/copifuncs/ |
H A D | copi.funcs | 349 NNRPACCESS=~news/nnrp.access 354 ## nnrp.access - access file for on-campus NNTP sites 367 ## Default is no access, no way to authentication, and no groups.
|
/freebsd-9.3-release/contrib/libucl/src/ |
H A D | ucl_util.c | 48 static void *mmap(char *addr, size_t length, int prot, int access, int fd, off_t offset) argument
|
/freebsd-9.3-release/contrib/ncurses/progs/ |
H A D | tic.c | 656 if (access(termcap, F_OK) == 0) {
|
/freebsd-9.3-release/contrib/nvi/common/ |
H A D | exf.c | 369 * mounted readonly (access catches this one on a few systems), or 375 * write bits were set, or if an an access(2) call on the path 381 * a file, even if the access call would have succeeded. This makes 401 access(frp->name, W_OK)))
|
/freebsd-9.3-release/contrib/opie/ |
H A D | opielogin.c | 1252 quietlog = !access(QUIET_LOGIN_FILE, F_OK);
|
/freebsd-9.3-release/contrib/tcsh/ |
H A D | sh.exec.c | 61 * to show that a file has the wrong mode/no access when the file 906 /* save time by not calling access() in the hopeless case */ 908 access(strname, X_OK) == 0
|
/freebsd-9.3-release/crypto/heimdal/appl/rsh/ |
H A D | rshd.c | 794 if (pwd->pw_uid != 0 && access (_PATH_NOLOGIN, F_OK) == 0)
|
/freebsd-9.3-release/crypto/heimdal/appl/telnet/telnetd/ |
H A D | sys_term.c | 496 if (access(line, 6) == 0) 1343 syslog(LOG_INFO, "unauthenticated access from %s (%s)",
|
/freebsd-9.3-release/gnu/usr.bin/rcs/rlog/ |
H A D | rlog.c | 103 * Check for memory exhaustion; don't access freed storage. 231 struct access const *curaccess; 420 aputs(accessListString, out); /* print access list */
|
/freebsd-9.3-release/lib/libfetch/ |
H A D | common.c | 703 access(LOCAL_CERT_FILE, R_OK) == 0)
|
/freebsd-9.3-release/sbin/geom/core/ |
H A D | geom.c | 534 ret = access(path, F_OK); 544 err(EXIT_FAILURE, "Cannot access library");
|
/freebsd-9.3-release/sys/geom/eli/ |
H A D | g_eli_ctl.c | 218 sc->sc_geom->access = g_eli_access;
|
/freebsd-9.3-release/sys/geom/gate/ |
H A D | g_gate.c | 403 sbuf_printf(sb, "%s<access>%s</access>\n", indent, "read-only"); 405 sbuf_printf(sb, "%s<access>%s</access>\n", indent, 408 sbuf_printf(sb, "%s<access>%s</access>\n", indent, 538 gp->access = g_gate_access; 552 G_GATE_DEBUG(1, "Unable to access %s.", ropp->name); 646 G_GATE_DEBUG(1, "Unable to access %s.",
|
/freebsd-9.3-release/sys/geom/ |
H A D | geom_disk.c | 80 .access = g_disk_access, 121 * Allow decreasing access count even if disk is not
|
/freebsd-9.3-release/sys/geom/linux_lvm/ |
H A D | g_linux_lvm.c | 105 /* It seems that .access can be called with negative dr,dw,dx 107 G_LLVM_DEBUG(0, "access(%d, %d, %d) for %s", 113 ("%s: Positive access for %s", __func__, pp->name)); 438 /* Replicate access permissions from first "live" 557 gp->access = g_llvm_access;
|
/freebsd-9.3-release/sys/geom/vinum/ |
H A D | geom_vinum.c | 172 gp->access = gv_access; 805 G_VINUM_DEBUG(0, "unable to access " 835 G_VINUM_DEBUG(0, "unable to access "
|
/freebsd-9.3-release/usr.bin/rpcgen/ |
H A D | rpc_main.c | 390 if (access(temp, F_OK) != -1)
|
/freebsd-9.3-release/usr.sbin/bsnmpd/tools/bsnmptools/ |
H A D | bsnmpget.c | 1033 if (obj->info->access < SNMP_ACCESS_SET) {
|
/freebsd-9.3-release/usr.sbin/tzsetup/ |
H A D | tzsetup.c | 777 if (access(zoneinfo_file, R_OK) != 0) { 780 "Cannot access %s: %s", zoneinfo_file,
|
/freebsd-9.3-release/contrib/cvs/src/ |
H A D | sanity.sh | 2413 "${PROG}: cannot access cvs root ${TESTDIR}/nonexist: .*" 2505 access list: 3597 access list: 3614 access list: 3633 access list: 3650 access list: 3669 access list: 3686 access list: 5923 access list: 5935 access lis [all...] |
/freebsd-9.3-release/contrib/gcc/cp/ |
H A D | semantics.c | 65 Most C++ expressions and declarations require access checking 69 For member declarations, access checking has to be deferred 85 Furthermore, some contexts require that access checking is 89 Typical use of access checking functions is described here: 91 1. When we enter a context that requires certain access checking 103 to check access. 108 called to restore the previous access checking mode. 116 checking access controls. We cannot check the accessibility of 130 /* The current mode of access checks. */ 137 /* Data for deferred access checkin 2392 finish_base_specifier(tree base, tree access, bool virtual_p) argument [all...] |