/freebsd-10.0-release/contrib/nvi/ex/ |
H A D | ex_stop.c | 39 int allowed; local 45 if (sp->gp->scr_suspend(sp, &allowed)) 47 if (!allowed)
|
/freebsd-10.0-release/crypto/openssh/ |
H A D | auth-rsa.c | 168 int allowed = 0, bits; local 252 /* break out, this key is allowed */ 253 allowed = 1; 260 /* return key if allowed */ 261 if (allowed && rkey != NULL) 266 return allowed; 271 * return key if login is allowed, NULL otherwise 278 u_int i, allowed = 0; local 282 for (i = 0; !allowed && i < options.num_authkeys_files; i++) { 287 allowed [all...] |
H A D | readpass.c | 174 int allowed = 0; local 188 allowed = 1; 192 return (allowed);
|
H A D | auth-options.c | 433 char *command, *allowed; local 495 if ((allowed = buffer_get_cstring_ret(&data, 504 free(allowed); 509 allowed)) { 512 free(allowed); 525 free(allowed); 530 free(allowed);
|
H A D | monitor.c | 324 /* Specifies if a certain message is allowed at the moment */ 630 /* allowed key state */ 634 /* make sure key is allowed */ 754 int allowed = 0; local 778 allowed = 1; 821 debug3("%s: sending MONITOR_ANS_PWNAM: %d", __func__, allowed); 1155 int allowed = 0; local 1175 allowed = options.pubkey_authentication && 1179 if (options.pubkey_authentication && allowed != 1) 1183 allowed 1591 int allowed = 0; local [all...] |
H A D | monitor_wrap.c | 397 int allowed = 0, have_forced = 0; local 417 allowed = buffer_get_int(&m); 426 return (allowed); 431 * privileged parent makes the decision if the key is allowed 1090 int allowed = 0, have_forced = 0; local 1100 allowed = buffer_get_int(&m); 1107 if (allowed && rkey != NULL) { 1116 return (allowed);
|
/freebsd-10.0-release/contrib/atf/atf-sh/ |
H A D | libatf-sh.subr | 320 # Relative paths are not allowed because the test case cannot predict 613 "this is not allowed" 619 "returned a non-ok exit code, but this is not allowed"
|
/freebsd-10.0-release/sys/xen/interface/xsm/ |
H A D | flask_op.h | 56 uint32_t allowed; member in struct:xen_flask_access
|
/freebsd-10.0-release/usr.sbin/ppp/ |
H A D | systems.c | 230 int f, mode, allowed; local 232 allowed = 0; 238 allowed |= mode; 241 modeok = modereq & allowed ? 1 : 0;
|
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_repos/ |
H A D | reporter.c | 747 check_auth(report_baton_t *b, svn_boolean_t *allowed, const char *path, argument 751 return svn_error_trace(b->authz_read_func(allowed, b->t_root, path, 753 *allowed = TRUE; 861 svn_boolean_t allowed; local 865 SVN_ERR(b->authz_read_func(&allowed, copyfrom_root, 868 if (! allowed) 921 svn_boolean_t allowed, related; local 1018 SVN_ERR(check_auth(b, &allowed, t_path, pool)); 1019 if (!allowed) 1336 svn_boolean_t allowed, info_is_set_pat local [all...] |
H A D | commit.c | 224 svn_boolean_t allowed; 226 SVN_ERR(editor_baton->authz_callback(required, &allowed, root, path, 228 if (!allowed) 947 svn_boolean_t allowed; 949 SVN_ERR(authz_callback(svn_authz_write, &allowed, NULL, NULL, 951 if (!allowed) 1014 svn_boolean_t allowed; 1026 &allowed, scratch_pool)); 1027 if (!allowed) 1373 /* Okay... some access is allowed 222 svn_boolean_t allowed; local 943 svn_boolean_t allowed; local [all...] |
H A D | delta.c | 189 svn_boolean_t allowed; 193 SVN_ERR(authz_read_func(&allowed, root, path, authz_read_baton, pool)); 195 if (! allowed) 804 svn_boolean_t allowed; 810 SVN_ERR(c->authz_read_func(&allowed, c->target_root, target_path, 812 if (!allowed) 860 svn_boolean_t allowed; 866 SVN_ERR(c->authz_read_func(&allowed, c->target_root, target_path, 868 if (!allowed) 184 svn_boolean_t allowed; local 794 svn_boolean_t allowed; local 850 svn_boolean_t allowed; local
|
H A D | fs-wrap.c | 799 svn_boolean_t allowed = TRUE; 806 SVN_ERR(authz_read_func(&allowed, root, parent_path, 808 if (allowed) 796 svn_boolean_t allowed = TRUE; local
|
H A D | replay.c | 894 svn_boolean_t allowed = TRUE; 901 SVN_ERR(authz_read_func(&allowed, root, path, authz_read_baton, 904 if (allowed) 1527 svn_boolean_t allowed = TRUE; 1534 SVN_ERR(authz_read_func(&allowed, root, path, authz_read_baton, 1537 if (allowed) 890 svn_boolean_t allowed = TRUE; local 1522 svn_boolean_t allowed = TRUE; local
|
/freebsd-10.0-release/contrib/llvm/lib/CodeGen/ |
H A D | RegAllocPBQP.cpp | 186 assert(option <= allowedSet.size() && "Option outside allowed set."); 221 // Compute an initial allowed set for the current vreg. 253 // Record the mapping and allowed set in the problem. 360 const PBQPRAProblem::AllowedSet &allowed = p->getAllowedSet(src); local 362 while (pregOpt < allowed.size() && allowed[pregOpt] != dst) { 365 if (pregOpt < allowed.size()) {
|
/freebsd-10.0-release/contrib/wpa/src/ap/ |
H A D | hw_features.c | 187 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, 157, local 199 /* Verify that HT40 secondary channel is an allowed 20 MHz 212 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed", 218 * Verify that HT40 primary,secondary channel pair is allowed per 221 * the list of allowed channels (already checked above). 232 for (k = 0; k < sizeof(allowed) / sizeof(allowed[0]); k++) { 233 if (first == allowed[k]) { 239 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed", 423 * allowed pe [all...] |
/freebsd-10.0-release/contrib/wpa/src/radius/ |
H A D | radius_das.c | 42 u8 allowed[] = { local 62 attr = radius_msg_find_unlisted_attr(msg, allowed);
|
/freebsd-10.0-release/sys/cddl/contrib/opensolaris/common/acl/ |
H A D | acl_common.c | 133 uint32_t allowed; member in struct:acevals 776 vals->allowed = ACE_MASK_UNDEFINED; 1055 if (vals->allowed != (vals->denied ^ flips)) { 1064 error = ace_allow_to_mode(vals->allowed, &dest->a_perm, isdir); 1187 error = ace_mask_to_mode(list->group_obj.allowed, 1404 /* no more than one allowed per aclent_t */ 1405 if (vals->allowed != ACE_MASK_UNDEFINED) { 1409 vals->allowed = acep->a_access_mask;
|
/freebsd-10.0-release/contrib/subversion/subversion/libsvn_wc/ |
H A D | wc-checks.sql | 31 SELECT RAISE(FAIL, 'Updates to REPOSITORY are not allowed.');
|
/freebsd-10.0-release/usr.sbin/cron/cron/ |
H A D | cron.h | 234 allowed(char *),
|
/freebsd-10.0-release/contrib/gcc/ |
H A D | except.c | 166 /* A tree_list of allowed types. */ 170 } GTY ((tag ("ERT_ALLOWED_EXCEPTIONS"))) allowed; 529 gen_eh_region_allowed (struct eh_region *outer, tree allowed) 532 region->u.allowed.type_list = allowed; 534 for (; allowed ; allowed = TREE_CHAIN (allowed)) 535 add_type_for_runtime (TREE_VALUE (allowed)); 1373 r->u.allowed 169 } GTY ((tag ("ERT_ALLOWED_EXCEPTIONS"))) allowed; member in union:eh_region_u 524 gen_eh_region_allowed(struct eh_region *outer, tree allowed) argument [all...] |
/freebsd-10.0-release/sys/cam/ctl/ |
H A D | README.ctl.txt | 184 - Fixed some LUN selection issues in ctlstat(8) and allowed for selection 205 writes are only allowed for ZFS, but multiple readers are allowed for
|
/freebsd-10.0-release/usr.sbin/cron/lib/ |
H A D | misc.c | 343 /* int allowed(char *username) 349 allowed(username) function
|
/freebsd-10.0-release/crypto/heimdal/appl/ftp/ftpd/ |
H A D | ftpd.c | 227 { "good-chars", 0, arg_string, &good_chars, "allowed anonymous upload filename chars" }, 493 reply(530, "No login allowed without authorization."); 537 reply(530, "Only authorized and anonymous login allowed."); 604 "login allowed."); 653 * file he was denied, otherwise he was allowed. 655 * Return 1 if the user is denied, or 0 if he is allowed. */ 669 int allowed = ALLOWED; local 676 return allowed; 686 allowed = ALLOWED; 688 allowed [all...] |
/freebsd-10.0-release/contrib/atf/atf-report/ |
H A D | integration_test.sh | 431 atf-report: ERROR: No arguments allowed
|