/netgear-R7000-V1.0.7.12_1.2.5/src/router/dhcp6/ |
H A D | dhcp6s.conf | 7 allow rapid-commit;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/bus/ |
H A D | policy.h | 52 unsigned int allow : 1; /**< #TRUE if this allows, #FALSE if it denies */ member in struct:BusPolicyRule 109 dbus_bool_t allow);
|
H A D | policy.c | 35 dbus_bool_t allow) 45 rule->allow = allow; 58 /* allow rules default to TRUE (only requested replies allowed) 61 rule->d.send.requested_reply = rule->allow; 65 /* allow rules default to TRUE (only requested replies allowed) 68 rule->d.receive.requested_reply = rule->allow; 430 allowed = rule->allow; 780 * <allow send_interface="foo.bar"/> 783 * (for example) the deny will always override the allow 34 bus_policy_rule_new(BusPolicyRuleType type, dbus_bool_t allow) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/dbus/ |
H A D | dbus-transport.c | 534 dbus_bool_t allow; local 553 allow = (* unix_user_function) (connection, 560 if (allow) 572 return allow; 579 dbus_bool_t allow; local 604 allow = (* windows_user_function) (connection, 611 if (allow) 622 return allow; 630 dbus_bool_t allow; local 662 allow 753 dbus_bool_t allow; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/apparmor/include/ |
H A D | context.h | 32 u16 allow; member in struct:aa_file_cxt
|
H A D | file.h | 80 * @allow: mask of permissions that are allowed 84 * @xindex: exec transition index if @allow contains MAY_EXEC 89 u32 allow; member in struct:file_perms 98 #define COMBINED_PERM_MASK(X) ((X).allow | (X).audit | (X).quiet | (X).kill)
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/nfsd/ |
H A D | nfs4acl.c | 148 /* Allocate for worst case: one (deny, allow) pair each: */ 279 /* In the case of groups, we apply allow ACEs first, then deny ACEs, 282 /* allow ACEs */ 393 u32 allow; member in struct:posix_ace_state 455 state->mask.allow |= astate->allow; 520 low_mode_from_nfs4(state->owner.allow, &pace->e_perm, flags); 529 low_mode_from_nfs4(state->users->aces[i].perms.allow, 540 low_mode_from_nfs4(state->group.allow, &pace->e_perm, flags); 550 low_mode_from_nfs4(state->groups->aces[i].perms.allow, [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/samples/calendar/ |
H A D | calendar.cpp | 251 // Create a new application object: this macro will allow wxWidgets to create 413 bool allow = GetMenuBar()->IsChecked(event.GetId()); local 415 m_panel->GetCal()->EnableMonthChange(allow); 420 bool allow = GetMenuBar()->IsChecked(event.GetId()); local 422 m_panel->GetCal()->EnableYearChange(allow); 427 bool allow = GetMenuBar()->IsChecked(event.GetId()); local 429 m_panel->ToggleCalStyle(allow, wxCAL_SEQUENTIAL_MONTH_SELECTION); 434 bool allow = GetMenuBar()->IsChecked(event.GetId()); local 436 m_panel->ToggleCalStyle(allow, wxCAL_SHOW_SURROUNDING_WEEKS);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/LDAP/ |
H A D | samba-schema-netscapeds5.x | 21 us, no acis"; allow (read, search, compare) userdn = "ldap:///anyone";) 22 aci: (targetattr = "*")(version 3.0; acl "Configuration Administrator"; allow 26 "; allow (all) groupdn = "ldap:///cn=Directory Administrators, dc=samba,dc=org";) 27 aci: (targetattr = "*")(version 3.0; acl "SIE Group"; allow (all)groupdn = "ld
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/unzip60/vms/ |
H A D | find_bzip2_lib.com | 16 $! Remove any trailing colon, to allow logical name translation.
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zip30/vms/ |
H A D | find_bzip2_lib.com | 16 $! Remove any trailing colon, to allow logical name translation.
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/src/ |
H A D | tool_paramhlp.c | 288 enum e_action { allow, deny, set } action = allow; enumerator in enum:e_action 302 action = allow; 316 case allow:
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/docs/latex/wx/ |
H A D | screendc.tex | 36 some window systems (such as X) only allow drawing to take place underneath 55 allow drawing directly on the screen now. However, the fact that this
|
H A D | module.tex | 3 The module system is a very simple mechanism to allow applications (and parts 20 // A module to allow DDE initialization/cleanup
|
H A D | debugrptpvw.tex | 55 Present the report to the user and allow him to modify it by removing some or
|
H A D | fdrepdlg.tex | 129 // don't allow changing the search direction 132 // don't allow case sensitive searching 135 // don't allow whole word searching 186 wxFindReplaceDialog is a standard modeless dialog which is used to allow the
|
H A D | stopwtch.tex | 3 The wxStopWatch class allow you to measure time intervals. For example, you may
|
H A D | wxgtk.tex | 19 allow compiling wxWidgets applications with a latest version of
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/apparmor/ |
H A D | capability.c | 115 return cap_raised(profile->caps.allow, cap) ? 0 : -EPERM;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/arm/plat-samsung/ |
H A D | pm.c | 235 #define any_allowed(mask, allow) (((mask) & (allow)) != (allow))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openvpn-2.3.1/src/openvpn/ |
H A D | pf.c | 354 const bool allow, 361 cn, drop_accept (allow), 368 cn, drop_accept (allow)); 377 const bool allow, 388 drop_accept (allow), 400 drop_accept (allow)); 350 pf_cn_test_print(const char *prefix, const int type, const char *prefix2, const char *cn, const bool allow, const struct pf_cn *rule) argument 373 pf_addr_test_print(const char *prefix, const char *prefix2, const struct context *src, const struct mroute_addr *dest, const bool allow, const struct ipv4_subnet *rule) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/ |
H A D | Makefile | 67 $(top_srcdir)/test/data/valid-config-files-system/debug-allow-all-fail.conf.in \ 68 $(top_srcdir)/test/data/valid-config-files-system/debug-allow-all-pass.conf.in \ 69 $(top_srcdir)/test/data/valid-config-files/debug-allow-all-sha1.conf.in \ 70 $(top_srcdir)/test/data/valid-config-files/debug-allow-all.conf.in \ 99 test/data/valid-config-files/debug-allow-all.conf \ 100 test/data/valid-config-files/debug-allow-all-sha1.conf \ 101 test/data/valid-config-files-system/debug-allow-all-pass.conf \ 102 test/data/valid-config-files-system/debug-allow-all-fail.conf \ 486 test/data/valid-config-files/debug-allow-all.conf: $(top_builddir)/config.status $(top_srcdir)/test/data/valid-config-files/debug-allow [all...] |
H A D | Makefile.in | 67 $(top_srcdir)/test/data/valid-config-files-system/debug-allow-all-fail.conf.in \ 68 $(top_srcdir)/test/data/valid-config-files-system/debug-allow-all-pass.conf.in \ 69 $(top_srcdir)/test/data/valid-config-files/debug-allow-all-sha1.conf.in \ 70 $(top_srcdir)/test/data/valid-config-files/debug-allow-all.conf.in \ 99 test/data/valid-config-files/debug-allow-all.conf \ 100 test/data/valid-config-files/debug-allow-all-sha1.conf \ 101 test/data/valid-config-files-system/debug-allow-all-pass.conf \ 102 test/data/valid-config-files-system/debug-allow-all-fail.conf \ 492 test/data/valid-config-files/debug-allow-all.conf: $(top_builddir)/config.status $(top_srcdir)/test/data/valid-config-files/debug-allow [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/l2tpd-0.69/ |
H A D | aaa.c | 301 int allow, checkdefault = 0; local 304 allow = 0; 323 (ipr->sense ? "allow" : "deny"), IPADDY (t->addr)); 325 allow = ipr->sense; 329 if (allow)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/tests/ |
H A D | ffserver.conf | 62 ACL allow localhost
|