Searched refs:allowed (Results 1 - 25 of 54) sorted by relevance

123

/freebsd-10.0-release/contrib/nvi/ex/
H A Dex_stop.c39 int allowed; local
45 if (sp->gp->scr_suspend(sp, &allowed))
47 if (!allowed)
/freebsd-10.0-release/crypto/openssh/
H A Dauth-rsa.c168 int allowed = 0, bits; local
252 /* break out, this key is allowed */
253 allowed = 1;
260 /* return key if allowed */
261 if (allowed && rkey != NULL)
266 return allowed;
271 * return key if login is allowed, NULL otherwise
278 u_int i, allowed = 0; local
282 for (i = 0; !allowed && i < options.num_authkeys_files; i++) {
287 allowed
[all...]
H A Dreadpass.c174 int allowed = 0; local
188 allowed = 1;
192 return (allowed);
H A Dauth-options.c433 char *command, *allowed; local
495 if ((allowed = buffer_get_cstring_ret(&data,
504 free(allowed);
509 allowed)) {
512 free(allowed);
525 free(allowed);
530 free(allowed);
H A Dmonitor.c324 /* Specifies if a certain message is allowed at the moment */
630 /* allowed key state */
634 /* make sure key is allowed */
754 int allowed = 0; local
778 allowed = 1;
821 debug3("%s: sending MONITOR_ANS_PWNAM: %d", __func__, allowed);
1155 int allowed = 0; local
1175 allowed = options.pubkey_authentication &&
1179 if (options.pubkey_authentication && allowed != 1)
1183 allowed
1591 int allowed = 0; local
[all...]
H A Dmonitor_wrap.c397 int allowed = 0, have_forced = 0; local
417 allowed = buffer_get_int(&m);
426 return (allowed);
431 * privileged parent makes the decision if the key is allowed
1090 int allowed = 0, have_forced = 0; local
1100 allowed = buffer_get_int(&m);
1107 if (allowed && rkey != NULL) {
1116 return (allowed);
/freebsd-10.0-release/contrib/atf/atf-sh/
H A Dlibatf-sh.subr320 # Relative paths are not allowed because the test case cannot predict
613 "this is not allowed"
619 "returned a non-ok exit code, but this is not allowed"
/freebsd-10.0-release/sys/xen/interface/xsm/
H A Dflask_op.h56 uint32_t allowed; member in struct:xen_flask_access
/freebsd-10.0-release/usr.sbin/ppp/
H A Dsystems.c230 int f, mode, allowed; local
232 allowed = 0;
238 allowed |= mode;
241 modeok = modereq & allowed ? 1 : 0;
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_repos/
H A Dreporter.c747 check_auth(report_baton_t *b, svn_boolean_t *allowed, const char *path, argument
751 return svn_error_trace(b->authz_read_func(allowed, b->t_root, path,
753 *allowed = TRUE;
861 svn_boolean_t allowed; local
865 SVN_ERR(b->authz_read_func(&allowed, copyfrom_root,
868 if (! allowed)
921 svn_boolean_t allowed, related; local
1018 SVN_ERR(check_auth(b, &allowed, t_path, pool));
1019 if (!allowed)
1336 svn_boolean_t allowed, info_is_set_pat local
[all...]
H A Dcommit.c224 svn_boolean_t allowed;
226 SVN_ERR(editor_baton->authz_callback(required, &allowed, root, path,
228 if (!allowed)
947 svn_boolean_t allowed;
949 SVN_ERR(authz_callback(svn_authz_write, &allowed, NULL, NULL,
951 if (!allowed)
1014 svn_boolean_t allowed;
1026 &allowed, scratch_pool));
1027 if (!allowed)
1373 /* Okay... some access is allowed
222 svn_boolean_t allowed; local
943 svn_boolean_t allowed; local
[all...]
H A Ddelta.c189 svn_boolean_t allowed;
193 SVN_ERR(authz_read_func(&allowed, root, path, authz_read_baton, pool));
195 if (! allowed)
804 svn_boolean_t allowed;
810 SVN_ERR(c->authz_read_func(&allowed, c->target_root, target_path,
812 if (!allowed)
860 svn_boolean_t allowed;
866 SVN_ERR(c->authz_read_func(&allowed, c->target_root, target_path,
868 if (!allowed)
184 svn_boolean_t allowed; local
794 svn_boolean_t allowed; local
850 svn_boolean_t allowed; local
H A Dfs-wrap.c799 svn_boolean_t allowed = TRUE;
806 SVN_ERR(authz_read_func(&allowed, root, parent_path,
808 if (allowed)
796 svn_boolean_t allowed = TRUE; local
H A Dreplay.c894 svn_boolean_t allowed = TRUE;
901 SVN_ERR(authz_read_func(&allowed, root, path, authz_read_baton,
904 if (allowed)
1527 svn_boolean_t allowed = TRUE;
1534 SVN_ERR(authz_read_func(&allowed, root, path, authz_read_baton,
1537 if (allowed)
890 svn_boolean_t allowed = TRUE; local
1522 svn_boolean_t allowed = TRUE; local
/freebsd-10.0-release/contrib/llvm/lib/CodeGen/
H A DRegAllocPBQP.cpp186 assert(option <= allowedSet.size() && "Option outside allowed set.");
221 // Compute an initial allowed set for the current vreg.
253 // Record the mapping and allowed set in the problem.
360 const PBQPRAProblem::AllowedSet &allowed = p->getAllowedSet(src); local
362 while (pregOpt < allowed.size() && allowed[pregOpt] != dst) {
365 if (pregOpt < allowed.size()) {
/freebsd-10.0-release/contrib/wpa/src/ap/
H A Dhw_features.c187 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, 157, local
199 /* Verify that HT40 secondary channel is an allowed 20 MHz
212 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed",
218 * Verify that HT40 primary,secondary channel pair is allowed per
221 * the list of allowed channels (already checked above).
232 for (k = 0; k < sizeof(allowed) / sizeof(allowed[0]); k++) {
233 if (first == allowed[k]) {
239 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
423 * allowed pe
[all...]
/freebsd-10.0-release/contrib/wpa/src/radius/
H A Dradius_das.c42 u8 allowed[] = { local
62 attr = radius_msg_find_unlisted_attr(msg, allowed);
/freebsd-10.0-release/sys/cddl/contrib/opensolaris/common/acl/
H A Dacl_common.c133 uint32_t allowed; member in struct:acevals
776 vals->allowed = ACE_MASK_UNDEFINED;
1055 if (vals->allowed != (vals->denied ^ flips)) {
1064 error = ace_allow_to_mode(vals->allowed, &dest->a_perm, isdir);
1187 error = ace_mask_to_mode(list->group_obj.allowed,
1404 /* no more than one allowed per aclent_t */
1405 if (vals->allowed != ACE_MASK_UNDEFINED) {
1409 vals->allowed = acep->a_access_mask;
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_wc/
H A Dwc-checks.sql31 SELECT RAISE(FAIL, 'Updates to REPOSITORY are not allowed.');
/freebsd-10.0-release/usr.sbin/cron/cron/
H A Dcron.h234 allowed(char *),
/freebsd-10.0-release/contrib/gcc/
H A Dexcept.c166 /* A tree_list of allowed types. */
170 } GTY ((tag ("ERT_ALLOWED_EXCEPTIONS"))) allowed;
529 gen_eh_region_allowed (struct eh_region *outer, tree allowed)
532 region->u.allowed.type_list = allowed;
534 for (; allowed ; allowed = TREE_CHAIN (allowed))
535 add_type_for_runtime (TREE_VALUE (allowed));
1373 r->u.allowed
169 } GTY ((tag ("ERT_ALLOWED_EXCEPTIONS"))) allowed; member in union:eh_region_u
524 gen_eh_region_allowed(struct eh_region *outer, tree allowed) argument
[all...]
/freebsd-10.0-release/sys/cam/ctl/
H A DREADME.ctl.txt184 - Fixed some LUN selection issues in ctlstat(8) and allowed for selection
205 writes are only allowed for ZFS, but multiple readers are allowed for
/freebsd-10.0-release/usr.sbin/cron/lib/
H A Dmisc.c343 /* int allowed(char *username)
349 allowed(username) function
/freebsd-10.0-release/crypto/heimdal/appl/ftp/ftpd/
H A Dftpd.c227 { "good-chars", 0, arg_string, &good_chars, "allowed anonymous upload filename chars" },
493 reply(530, "No login allowed without authorization.");
537 reply(530, "Only authorized and anonymous login allowed.");
604 "login allowed.");
653 * file he was denied, otherwise he was allowed.
655 * Return 1 if the user is denied, or 0 if he is allowed. */
669 int allowed = ALLOWED; local
676 return allowed;
686 allowed = ALLOWED;
688 allowed
[all...]
/freebsd-10.0-release/contrib/atf/atf-report/
H A Dintegration_test.sh431 atf-report: ERROR: No arguments allowed

Completed in 218 milliseconds

123