/macosx-10.9.5/tcpdump-56/tcpdump/ |
H A D | print-mpcp.c | 139 const struct mpcp_grant_t *grant; member in union:__anon14018 148 u_int8_t grant_numbers, grant; local 183 for (grant = 1; grant <= grant_numbers; grant++) { 186 mpcp.grant = (const struct mpcp_grant_t *)tptr; 188 grant, 189 EXTRACT_32BITS(mpcp.grant->starttime), 190 EXTRACT_16BITS(mpcp.grant->duration));
|
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/tsiggss/ns1/ |
H A D | named.conf | 49 grant Administrator@EXAMPLE.NIL wildcard * A AAAA SRV CNAME; 50 grant testdenied@EXAMPLE.NIL wildcard * TXT; 51 grant "local:auth.sock" external * CNAME;
|
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/include/dns/ |
H A D | ssu.h | 101 dns_ssutable_addrule(dns_ssutable_t *table, isc_boolean_t grant,
|
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/ |
H A D | ssu.c | 49 isc_boolean_t grant; /*%< is this a grant or a deny? */ member in struct:dns_ssurule 160 dns_ssutable_addrule(dns_ssutable_t *table, isc_boolean_t grant, argument 187 rule->grant = grant; 521 return (rule->grant); 530 return (rule->grant); 603 rule->grant = ISC_TRUE;
|
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/servers/slapd/ |
H A D | aci.c | 115 BER_BVC("grant"), 316 slap_access_t *grant, 330 ACL_INIT(*grant); 339 mask = grant; 438 slap_access_t *grant, 450 ACL_INIT( *grant ); 525 if ( aci_list_get_rights( &perms, &desc->ad_cname, val, grant, deny ) == 0 ) { 817 slap_access_t tgrant, tdeny, grant, deny; local 843 nmatch, matches, &grant, &deny, 846 tgrant |= grant; 312 aci_list_get_rights( struct berval *list, struct berval *attr, struct berval *val, slap_access_t *grant, slap_access_t *deny ) argument 430 aci_mask( Operation *op, Entry *e, AttributeDescription *desc, struct berval *val, struct berval *aci, int nmatch, regmatch_t *matches, slap_access_t *grant, slap_access_t *deny, slap_aci_scope_t asserted_scope ) argument [all...] |
H A D | acl.c | 171 /* grant database root access */ 1786 slap_access_t grant, local 1789 ACL_INVALIDATE(grant); 1802 &grant, &deny ); 1804 tgrant |= grant; 1818 * by clauses that return grant/deny pairs. Right now, it does either 1820 * we need to combine the grant/deny pair into a single rights mask in 1821 * a smart way: if either grant or deny is "empty", then we use the 1822 * opposite as is, otherwise we remove any denied rights from the grant
|
H A D | idattracl.c | 1034 slap_access_t *grant, 1150 ACL_LVL_ASSIGN_WRITE( *grant ); 1026 idattr_dynacl_mask( void *priv, Operation *op, Entry *target, AttributeDescription *desc, struct berval *val, int nmatch, regmatch_t *matches, slap_access_t *grant, slap_access_t *deny ) argument
|
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/contrib/slapd-modules/acl/ |
H A D | gssacl.c | 145 slap_access_t *grant, 233 ACL_LVL_ASSIGN_WRITE( *grant ); 137 gssattr_dynacl_mask( void *priv, Operation *op, Entry *target, AttributeDescription *desc, struct berval *val, int nmatch, regmatch_t *matches, slap_access_t *grant, slap_access_t *deny ) argument
|
H A D | posixgroup.c | 173 slap_access_t *grant, 280 ACL_LVL_ASSIGN_WRITE( *grant ); 165 pg_dynacl_mask( void *priv, Operation *op, Entry *target, AttributeDescription *desc, struct berval *val, int nmatch, regmatch_t *matches, slap_access_t *grant, slap_access_t *deny ) argument
|
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/nsupdate/ns1/ |
H A D | named.conf | 51 grant ddns-key.example.nil subdomain example.nil ANY;
|
/macosx-10.9.5/tcl-102/tcl_ext/memchan/memchan/htdocs/raw/ |
H A D | disclaimer.exp | 24 The author hereby grant permission to use, copy, modify, distribute,
|
/macosx-10.9.5/tcl-102/tcl_ext/trf/trf/htdocs/raw/ |
H A D | disclaimer.exp | 24 The author hereby grant permission to use, copy, modify, distribute,
|
/macosx-10.9.5/vim-53/runtime/syntax/ |
H A D | esqlc.vim | 50 syntax keyword esqlcStatement delete drop explain grant insert lock noaudit
|
H A D | sqlj.vim | 53 syn keyword sqljStatement delete drop explain grant insert lock noaudit
|
H A D | sqloracle.vim | 40 syn keyword sqlStatement delete drop execute explain grant insert lock noaudit
|
H A D | ant.vim | 63 syn keyword antElement display from ftp generic genkey get gjdoc grant group gunzip gzip header headfilter http
|
H A D | chill.vim | 92 syn keyword chillScope GRANT grant SEIZE seize
|
H A D | sqlforms.vim | 116 syntax keyword sqlStatement delete drop explain grant insert lock noaudit
|
H A D | sqlinformix.vim | 49 syn keyword sqlStatement execute fetch flush free get grant info insert
|
H A D | stp.vim | 22 syn keyword stpKeyword execute from function go grant
|
H A D | named.vim | 86 syn keyword namedIntKeyword contained grant nextgroup=namedString skipwhite
|
/macosx-10.9.5/bind9-45.100/bind9/bin/named/ |
H A D | zoneconf.c | 221 isc_boolean_t grant = ISC_FALSE; local 230 if (strcasecmp(str, "grant") == 0) 231 grant = ISC_TRUE; 233 grant = ISC_FALSE; 343 result = dns_ssutable_addrule(table, grant, 358 * update-policy { grant <session-keyname> zonesub any; };
|
/macosx-10.9.5/CPAN-52/ |
H A D | genOSS.pl | 269 * Thou shalt grant the indemnity of the provider of materials.
|
/macosx-10.9.5/PostgreSQL-97/ |
H A D | uninstall | 174 rm -rf man/man7/grant.7.gz
|
/macosx-10.9.5/emacs-92/emacs/lisp/progmodes/ |
H A D | sql.el | 985 "function" "general" "get" "global" "go" "goto" "grant" "group" 1092 "globally" "grant" "group" "grouping" "groups" "guard" "hash" 1287 "full" "function" "grant" "group" "gtcmp" "handler" "hashes" "having" 1370 "grant" "group" "having" "identified" "in" "index" "inner" "insert" 1425 "freetexttable" "from" "full" "goto" "grant" "group" "having"
|