HomeSort by: relevance | last modified time | path
    Searched defs:allow (Results 1 - 19 of 19) sorted by relevancy

  /src/lib/libpam/modules/pam_ftpusers/
pam_ftpusers.c 67 int pam_err, found, allow; local
115 allow = (openpam_get_option(pamh, "disallow") == NULL);
117 pam_err = allow ? PAM_SUCCESS : PAM_AUTH_ERR;
119 pam_err = allow ? PAM_AUTH_ERR : PAM_SUCCESS;
  /src/sys/external/bsd/drm2/dist/drm/i915/selftests/
i915_selftest.c 255 bool allow = true; local
259 allow = false;
270 if (allow)
278 if (allow)
283 result = allow;
  /src/usr.sbin/mmcformat/
mmcformat.c 470 uint8_t *allow, uint32_t *blks, uint32_t *params)
477 bzero(allow, 255);
498 allow[format_tp] = 1; /* TODO = supported? */
694 uint8_t allow[256]; local
890 process_format_caps(caps, caps_len, inquiry, allow, blks, params);
981 if (!allow[format_type]) {
983 process_format_caps(caps, caps_len, 1, allow,
  /src/sys/kern/
kern_auth.c 976 int error, allow, fail; local
988 allow = 0;
996 allow = 1;
1005 if (allow)
1163 * listener denied it, so our only alternative is to supposedly-allow
  /src/crypto/external/bsd/heimdal/dist/lib/krb5/
context.c 1538 * Allow homedir accces
1547 krb5_boolean allow; local
1553 allow = allow_homedir;
1555 return allow;
1568 * @param allow allow if TRUE home directory
1575 krb5_set_home_dir_access(krb5_context context, krb5_boolean allow)
1580 if (allow)
1587 allow_homedir = allow;
  /src/external/mpl/bind/dist/bin/named/
controlconf.c 939 const cfg_obj_t *allow = NULL; local
1023 allow = cfg_tuple_get(control, "allow");
1024 result = cfg_acl_fromconfig(allow, config, named_g_lctx,
1068 const cfg_obj_t *allow = NULL; local
1097 allow = cfg_tuple_get(control, "allow");
1098 CHECK(cfg_acl_fromconfig(allow, config, named_g_lctx,
statschannel.c 3629 const cfg_obj_t *allow = NULL;
3639 allow = cfg_tuple_get(listen_params, "allow");
3640 if (allow != NULL && cfg_obj_islist(allow)) {
3641 result = cfg_acl_fromconfig(allow, config, named_g_lctx,
3748 const cfg_obj_t *allow = NULL; local
3768 allow = cfg_tuple_get(listen_params, "allow");
3769 if (allow != NULL && cfg_obj_islist(allow))
    [all...]
server.c 2747 * A non-empty 'catalog-zones' statement implies that 'allow-new-zones'
3134 * A non-empty 'catalog-zones' statement implies that 'allow-new-zones'
5381 * Set the "allow-query", "allow-query-cache", "allow-recursion",
5382 * "allow-recursion-on" and "allow-query-cache-on" ACLs if
5394 CHECK(configure_view_acl(vconfig, config, NULL, "allow-query", NULL,
5398 CHECK(configure_view_acl(vconfig, config, NULL, "allow-query-cache",
5401 CHECK(configure_view_acl(vconfig, config, NULL, "allow-query-cache-on"
7880 bool allow = false; local
15576 bool secure, maintain, allow; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
quicapitest.c 662 * List of ciphersuites we do and don't allow in QUIC.
1155 const int *allow = (int *)arg; local
1163 if (*allow == 0)
1180 int flags = 0, allow = 0; local
1189 SSL_CTX_set_cert_verify_callback(cctx, non_io_retry_cert_verify_cb, &allow);
1200 allow = 1;
  /src/crypto/external/bsd/openssl/dist/ssl/
t1_lib.c 948 * For a server we allow the certificate to not be in our list of supported
1307 * Some GOST ciphersuites allow more than one signature algorithms
1506 /* Only allow PSS for TLS 1.3 */
1574 /* Allow fallback to SHA1 if not strict mode */
1673 * For historical reasons we will allow ECHDE to be selected by a server
2098 /* We never allow GOST sig algs on the server with TLSv1.3 */
2108 * We're a client that could negotiate TLSv1.3. We only allow GOST
2208 const uint16_t *allow, size_t allowlen)
2219 for (j = 0, atmp = allow; j < allowlen; j++, atmp++) {
2234 const uint16_t *pref, *allow, *conf local
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/ssl/
t1_lib.c 572 * For a server we allow the certificate to not be in our list of supported
876 * Some GOST ciphersuites allow more than one signature algorithms
1044 /* Only allow PSS for TLS 1.3 */
1122 /* Allow fallback to SHA1 if not strict mode */
1224 * For historical reasons we will allow ECHDE to be selected by a server
1618 /* We never allow GOST sig algs on the server with TLSv1.3 */
1628 * We're a client that could negotiate TLSv1.3. We only allow GOST
1727 const uint16_t *allow, size_t allowlen)
1737 for (j = 0, atmp = allow; j < allowlen; j++, atmp++) {
1752 const uint16_t *pref, *allow, *conf local
    [all...]
  /src/external/bsd/ntp/dist/ntpd/
ntp_proto.c 1018 * NOTRUST (RES_DONTTRUST) do not allow access unless
1842 deadband -= 3; /* allow greater fuzz after volley */
2104 /* We allow 0org for: */
2106 action = "Allow";
3530 int allow; local
3752 * Here, nlist is the number of candidates and allow is the
3759 for (allow = 0; 2 * allow < nlist; allow++) {
3769 if (n >= nlist - allow)
    [all...]
  /src/external/bsd/tmux/dist/
input.c 50 * - Special handling for ESC inside a DCS to allow arbitrary byte sequences to
2580 allow_passthrough = options_get_number(oo, "allow-passthrough");
2633 options_get_number(wp->options, "allow-set-title") &&
2712 options_get_number(wp->options, "allow-set-title") &&
2744 if (!options_get_number(ictx->wp->options, "allow-rename"))
3086 const char* allow = "cpqs01234567"; local
3104 if (strchr(allow, p[i]) != NULL && strchr(flags, p[i]) == NULL)
  /src/crypto/external/apache2/openssl/dist/ssl/
t1_lib.c 1857 * For a server we allow the certificate to not be in our list of supported
2456 * Some GOST ciphersuites allow more than one signature algorithms
2701 /* Only allow PSS for TLS 1.3 */
2795 /* Allow fallback to SHA1 if not strict mode */
2903 /* For QUIC, only allow these ciphersuites. */
2914 * For historical reasons we will allow ECHDE to be selected by a server
3352 /* We never allow GOST sig algs on the server with TLSv1.3 */
3362 * We're a client that could negotiate TLSv1.3. We only allow GOST
3460 const uint16_t *allow, size_t allowlen)
3471 for (j = 0, atmp = allow; j < allowlen; j++, atmp++)
3486 const uint16_t *pref, *allow, *conf; local
    [all...]
  /src/external/mpl/bind/dist/lib/isccfg/
check.c 558 if (strcasecmp(aclname, "allow-transfer") == 0 &&
609 static const char *acls[] = { "allow-proxy",
610 "allow-proxy-on",
611 "allow-query",
612 "allow-query-on",
613 "allow-query-cache",
614 "allow-query-cache-on",
943 * Check allow-recursion and allow-recursion-on acls, and also log a
957 static const char *acls[] = { "allow-recursion", "allow-recursion-on"
6254 const cfg_obj_t *allow; local
    [all...]
  /src/external/gpl3/gcc/dist/gcc/cp/
cp-tree.h 853 explicit ovl_iterator (tree o, bool allow = false)
854 : ovl (o), allow_inner (allow)
949 bool allow;
951 explicit ovl_range (tree t, bool allow = false): t(t), allow(allow) { }
952 ovl_iterator begin() { return ovl_iterator (t, allow); }
953 ovl_iterator end() { return ovl_iterator (NULL_TREE, allow); }
4702 /* True if this is a designated initializer (when we allow initializer-clauses
5714 tf_tst_ok = 1 << 12, /* Allow a typename-specifier to nam
946 bool allow; member in class:ovl_range
    [all...]
  /src/external/gpl3/gcc.old/dist/gcc/cp/
cp-tree.h 828 explicit ovl_iterator (tree o, bool allow = false)
829 : ovl (o), allow_inner (allow)
924 bool allow;
926 explicit ovl_range (tree t, bool allow = false): t(t), allow(allow) { }
927 ovl_iterator begin() { return ovl_iterator (t, allow); }
928 ovl_iterator end() { return ovl_iterator (NULL_TREE, allow); }
2851 // change). We need a module_attachment_p flag, and this will allow
4596 /* True if this is a designated initializer (when we allow initializer-clause
921 bool allow; member in class:ovl_range
    [all...]
  /src/external/mpl/bind/dist/lib/dns/
zone.c 1913 * and zones that allow dynamic updates either by having an update
1914 * policy ("ssutable") or an "allow-update" ACL with a value other than
7255 *inception = now - 3600; /* Allow for clock skew. */
9502 /* Refuse to allow NSEC3 with NSEC-only keys */
15153 * We have now canceled everything set the flag to allow exit_check()
16708 * Allow DNSKEY, CDNSKEY, CDS because users should be able to
16995 * Filter out keys we manage but still allow TTL changes.
17595 * Allow DNSKEY, CDNSKEY, CDS because users should be able to
20852 inception = now - 3600; /* Allow for clock skew. */
22815 bool allow = false local
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/dns/
zone.c 1855 * and zones that allow dynamic updates either by having an update
1856 * policy ("ssutable") or an "allow-update" ACL with a value other than
7381 inception = now - 3600; /* Allow for clock skew. */
8582 inception = now - 3600; /* Allow for clock skew. */
9573 inception = now - 3600; /* Allow for clock skew. */
15035 * We have now canceled everything set the flag to allow exit_check()
20453 inception = now - 3600; /* Allow for clock skew. */
20553 /* Refuse to allow NSEC3 with NSEC-only keys */
21666 bool allow = false; local
21676 allow = true
    [all...]

Completed in 113 milliseconds