/freebsd-10.1-release/contrib/nvi/ex/ |
H A D | ex_stop.c | 39 int allowed; local 45 if (sp->gp->scr_suspend(sp, &allowed)) 47 if (!allowed)
|
/freebsd-10.1-release/crypto/openssh/ |
H A D | auth-rsa.c | 172 int allowed = 0, bits; local 256 /* break out, this key is allowed */ 257 allowed = 1; 264 /* return key if allowed */ 265 if (allowed && rkey != NULL) 270 return allowed; 275 * return key if login is allowed, NULL otherwise 282 u_int i, allowed = 0; local 286 for (i = 0; !allowed && i < options.num_authkeys_files; i++) { 291 allowed [all...] |
H A D | readpass.c | 174 int allowed = 0; local 188 allowed = 1; 192 return (allowed);
|
H A D | auth-options.c | 429 char *command, *allowed; local 491 if ((allowed = buffer_get_cstring_ret(&data, 500 free(allowed); 505 allowed); 506 free(allowed);
|
H A D | monitor.c | 311 /* Specifies if a certain message is allowed at the moment */ 608 /* allowed key state */ 612 /* make sure key is allowed */ 732 int allowed = 0; local 756 allowed = 1; 799 debug3("%s: sending MONITOR_ANS_PWNAM: %d", __func__, allowed); 1133 int allowed = 0; local 1153 allowed = options.pubkey_authentication && 1157 if (options.pubkey_authentication && allowed != 1) 1161 allowed 1569 int allowed = 0; local [all...] |
H A D | monitor_wrap.c | 395 int allowed = 0, have_forced = 0; local 415 allowed = buffer_get_int(&m); 424 return (allowed); 429 * privileged parent makes the decision if the key is allowed 1087 int allowed = 0, have_forced = 0; local 1097 allowed = buffer_get_int(&m); 1104 if (allowed && rkey != NULL) { 1113 return (allowed);
|
/freebsd-10.1-release/crypto/openssh/regress/ |
H A D | agent-ptrace.sh | 22 if $OBJ/setuid-allowed ${SSHAGENT} ; then
|
H A D | Makefile | 92 sftp-server.sh sftp-server.log sftp.log setuid-allowed \
|
/freebsd-10.1-release/contrib/atf/atf-sh/ |
H A D | libatf-sh.subr | 320 # Relative paths are not allowed because the test case cannot predict 613 "this is not allowed" 619 "returned a non-ok exit code, but this is not allowed"
|
/freebsd-10.1-release/sys/xen/interface/xsm/ |
H A D | flask_op.h | 56 uint32_t allowed; member in struct:xen_flask_access
|
/freebsd-10.1-release/usr.sbin/ppp/ |
H A D | systems.c | 230 int f, mode, allowed; local 232 allowed = 0; 238 allowed |= mode; 241 modeok = modereq & allowed ? 1 : 0;
|
/freebsd-10.1-release/contrib/subversion/subversion/libsvn_repos/ |
H A D | reporter.c | 747 check_auth(report_baton_t *b, svn_boolean_t *allowed, const char *path, argument 751 return svn_error_trace(b->authz_read_func(allowed, b->t_root, path, 753 *allowed = TRUE; 861 svn_boolean_t allowed; local 865 SVN_ERR(b->authz_read_func(&allowed, copyfrom_root, 868 if (! allowed) 921 svn_boolean_t allowed, related; local 1018 SVN_ERR(check_auth(b, &allowed, t_path, pool)); 1019 if (!allowed) 1343 svn_boolean_t allowed, info_is_set_pat local [all...] |
H A D | commit.c | 224 svn_boolean_t allowed; 226 SVN_ERR(editor_baton->authz_callback(required, &allowed, root, path, 228 if (!allowed) 958 svn_boolean_t allowed; 960 SVN_ERR(authz_callback(svn_authz_write, &allowed, NULL, NULL, 962 if (!allowed) 1025 svn_boolean_t allowed; 1037 &allowed, scratch_pool)); 1038 if (!allowed) 1384 /* Okay... some access is allowed 222 svn_boolean_t allowed; local 954 svn_boolean_t allowed; local [all...] |
H A D | delta.c | 189 svn_boolean_t allowed; 193 SVN_ERR(authz_read_func(&allowed, root, path, authz_read_baton, pool)); 195 if (! allowed) 804 svn_boolean_t allowed; 810 SVN_ERR(c->authz_read_func(&allowed, c->target_root, target_path, 812 if (!allowed) 860 svn_boolean_t allowed; 866 SVN_ERR(c->authz_read_func(&allowed, c->target_root, target_path, 868 if (!allowed) 184 svn_boolean_t allowed; local 794 svn_boolean_t allowed; local 850 svn_boolean_t allowed; local
|
H A D | fs-wrap.c | 810 svn_boolean_t allowed = TRUE; 817 SVN_ERR(authz_read_func(&allowed, root, parent_path, 819 if (allowed) 807 svn_boolean_t allowed = TRUE; local
|
H A D | replay.c | 894 svn_boolean_t allowed = TRUE; 901 SVN_ERR(authz_read_func(&allowed, root, path, authz_read_baton, 904 if (allowed) 1527 svn_boolean_t allowed = TRUE; 1534 SVN_ERR(authz_read_func(&allowed, root, path, authz_read_baton, 1537 if (allowed) 890 svn_boolean_t allowed = TRUE; local 1522 svn_boolean_t allowed = TRUE; local
|
/freebsd-10.1-release/contrib/llvm/lib/CodeGen/ |
H A D | RegAllocPBQP.cpp | 185 assert(option <= allowedSet.size() && "Option outside allowed set."); 220 // Compute an initial allowed set for the current vreg. 252 // Record the mapping and allowed set in the problem. 359 const PBQPRAProblem::AllowedSet &allowed = p->getAllowedSet(src); local 361 while (pregOpt < allowed.size() && allowed[pregOpt] != dst) { 364 if (pregOpt < allowed.size()) {
|
/freebsd-10.1-release/contrib/wpa/src/ap/ |
H A D | hw_features.c | 187 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, 157, local 199 /* Verify that HT40 secondary channel is an allowed 20 MHz 212 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed", 218 * Verify that HT40 primary,secondary channel pair is allowed per 221 * the list of allowed channels (already checked above). 232 for (k = 0; k < sizeof(allowed) / sizeof(allowed[0]); k++) { 233 if (first == allowed[k]) { 239 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed", 423 * allowed pe [all...] |
/freebsd-10.1-release/contrib/wpa/src/radius/ |
H A D | radius_das.c | 42 u8 allowed[] = { local 62 attr = radius_msg_find_unlisted_attr(msg, allowed);
|
/freebsd-10.1-release/sys/cddl/contrib/opensolaris/common/acl/ |
H A D | acl_common.c | 133 uint32_t allowed; member in struct:acevals 776 vals->allowed = ACE_MASK_UNDEFINED; 1055 if (vals->allowed != (vals->denied ^ flips)) { 1064 error = ace_allow_to_mode(vals->allowed, &dest->a_perm, isdir); 1187 error = ace_mask_to_mode(list->group_obj.allowed, 1404 /* no more than one allowed per aclent_t */ 1405 if (vals->allowed != ACE_MASK_UNDEFINED) { 1409 vals->allowed = acep->a_access_mask;
|
/freebsd-10.1-release/contrib/subversion/subversion/libsvn_wc/ |
H A D | wc-checks.sql | 31 SELECT RAISE(FAIL, 'Updates to REPOSITORY are not allowed.');
|
/freebsd-10.1-release/usr.sbin/cron/cron/ |
H A D | cron.h | 234 allowed(char *),
|
/freebsd-10.1-release/contrib/gcc/ |
H A D | except.c | 166 /* A tree_list of allowed types. */ 170 } GTY ((tag ("ERT_ALLOWED_EXCEPTIONS"))) allowed; 529 gen_eh_region_allowed (struct eh_region *outer, tree allowed) 532 region->u.allowed.type_list = allowed; 534 for (; allowed ; allowed = TREE_CHAIN (allowed)) 535 add_type_for_runtime (TREE_VALUE (allowed)); 1373 r->u.allowed 169 } GTY ((tag ("ERT_ALLOWED_EXCEPTIONS"))) allowed; member in union:eh_region_u 524 gen_eh_region_allowed(struct eh_region *outer, tree allowed) argument [all...] |
/freebsd-10.1-release/sys/cam/ctl/ |
H A D | README.ctl.txt | 184 - Fixed some LUN selection issues in ctlstat(8) and allowed for selection 205 writes are only allowed for ZFS, but multiple readers are allowed for
|
/freebsd-10.1-release/usr.sbin/cron/lib/ |
H A D | misc.c | 343 /* int allowed(char *username) 349 allowed(username) function
|