| /src/external/bsd/nvi/dist/ex/ |
| ex_stop.c | 44 int allowed; local 50 if (sp->gp->scr_suspend(sp, &allowed)) 52 if (!allowed)
|
| /src/bin/dd/ |
| args.c | 440 u_int allowed; member in struct:ioflag 488 if ((cp->allowed & flagtype) == 0) {
|
| /src/sys/external/bsd/drm2/drm/ |
| drm_vma_manager.c | 319 const bool allowed = 323 return allowed; 316 const bool allowed = local
|
| /src/crypto/external/bsd/openssh/dist/ |
| readpass.c | 205 int allowed = 0; local 220 allowed = 1; 224 return (allowed);
|
| auth-options.c | 80 char *command, *allowed; local 144 if ((r = sshbuf_get_cstring(data, &allowed, 153 free(allowed); 157 if (addr_match_cidr_list(NULL, allowed) == -1) { 160 free(allowed); 163 opts->required_from_host_cert = allowed;
|
| monitor_wrap.c | 513 u_int allowed = 0; local 536 if ((r = sshbuf_get_u32(m, &allowed)) != 0) 538 if (allowed && type == MM_USERKEY && 549 return allowed; 554 * privileged parent makes the decision if the key is allowed
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/ |
| compress.h | 73 unsigned int allowed; /*%< Allowed methods. */ member in struct:dns_compress 88 DNS_DECOMPRESS_STRICT, /*%< Allowed compression */ 94 unsigned int allowed; /*%< Allowed methods. */ member in struct:dns_decompress 128 dns_compress_setmethods(dns_compress_t *cctx, unsigned int allowed); 131 * Sets allowed compression methods. 141 * Gets allowed compression methods. 147 *\li allowed compression bitmap. 263 dns_decompress_setmethods(dns_decompress_t *dctx, unsigned int allowed); [all...] |
| /src/sys/dev/dm/ |
| device-mapper.c | 116 * to function which I can call, and if the command is allowed for 131 int allowed; member in struct:cmd_function 133 { .cmd = "version", .fn = NULL, .allowed = 1 }, 134 { .cmd = "targets", .fn = dm_list_versions_ioctl, .allowed = 1 }, 135 { .cmd = "create", .fn = dm_dev_create_ioctl, .allowed = 0 }, 136 { .cmd = "info", .fn = dm_dev_status_ioctl, .allowed = 1 }, 137 { .cmd = "mknodes", .fn = dm_dev_status_ioctl, .allowed = 1 }, 138 { .cmd = "names", .fn = dm_dev_list_ioctl, .allowed = 1 }, 139 { .cmd = "suspend", .fn = dm_dev_suspend_ioctl, .allowed = 0 }, 140 { .cmd = "remove", .fn = dm_dev_remove_ioctl, .allowed = 0 } [all...] |
| /src/external/bsd/wpa/dist/src/radius/ |
| radius_das.c | 41 u8 allowed[] = { local 67 attr = radius_msg_find_unlisted_attr(msg, allowed); 203 u8 allowed[] = { local 237 attr = radius_msg_find_unlisted_attr(msg, allowed);
|
| /src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/ |
| networkconfig.cpp | 167 QStringList allowed; local 168 allowed << "MSCHAPV2" << "MD5" << "GTC" << "TLS" << "OTP" << "SIM" 171 if (allowed.contains(eapSelect->itemText(i))) {
|
| /src/external/gpl3/gcc/dist/gcc/ |
| except.h | 142 /* A TREE_LIST of runtime type objects allowed to pass. */ 153 } GTY ((tag ("ERT_ALLOWED_EXCEPTIONS"))) allowed; member in union:eh_region_u
|
| /src/external/gpl3/gcc.old/dist/gcc/ |
| except.h | 142 /* A TREE_LIST of runtime type objects allowed to pass. */ 153 } GTY ((tag ("ERT_ALLOWED_EXCEPTIONS"))) allowed; member in union:eh_region_u
|
| /src/external/gpl3/gdb/dist/gdb/cli/ |
| cli-setshow.c | 238 enum tribool allowed = TRIBOOL_UNKNOWN; 246 allowed = TRIBOOL_TRUE; 251 allowed = TRIBOOL_FALSE; 254 if (allowed == TRIBOOL_UNKNOWN) 261 allowed = TRIBOOL_FALSE; 263 if (allowed == TRIBOOL_FALSE) 236 enum tribool allowed = TRIBOOL_UNKNOWN; local
|
| /src/external/gpl3/gdb.old/dist/gdb/cli/ |
| cli-setshow.c | 238 enum tribool allowed = TRIBOOL_UNKNOWN; 246 allowed = TRIBOOL_TRUE; 251 allowed = TRIBOOL_FALSE; 254 if (allowed == TRIBOOL_UNKNOWN) 261 allowed = TRIBOOL_FALSE; 263 if (allowed == TRIBOOL_FALSE) 236 enum tribool allowed = TRIBOOL_UNKNOWN; local
|
| /src/sys/external/bsd/drm2/dist/drm/radeon/ |
| radeon_object.c | 569 u32 allowed = lobj->allowed_domains; local 581 if ((allowed & current_domain) != 0 && 591 radeon_uvd_force_into_uvd_segment(bo, allowed);
|
| /src/external/bsd/cron/dist/ |
| crontab.c | 67 static int allowed(const char *, const char *, const char *); 106 if (!allowed(RealUser, CRON_ALLOW, CRON_DENY)) { 108 "You `%s' are not allowed to use this program `%s'\n", 111 log_it(RealUser, Pid, "AUTH", "crontab command not allowed"); 830 /* int allowed(const char *username, const char *allow_file, const char *deny_file) 833 * root is always allowed. 836 allowed(const char *username, const char *allow_file, const char *deny_file) { function
|
| /src/external/bsd/wpa/dist/src/common/ |
| hw_features_common.c | 116 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 140, local 132 wpa_printf(MSG_ERROR, "Channel %d is not allowed as primary", 141 /* Verify that HT40 secondary channel is an allowed 20 MHz 146 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed", 152 * Verify that HT40 primary,secondary channel pair is allowed per 155 * the list of allowed channels (already checked above). 163 for (k = 0; k < ARRAY_SIZE(allowed); k++) { 164 if (first == allowed[k]) { 170 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed", 963 /* check if channel is allowed to be used as primary * [all...] |
| /src/external/gpl3/gcc/dist/libstdc++-v3/src/c++11/ |
| codecvt.cc | 540 enum class surrogates { allowed, disallowed }; member in class:__anon14821::surrogates 571 surrogates s = surrogates::allowed)
|
| /src/external/gpl3/gcc.old/dist/libstdc++-v3/src/c++11/ |
| codecvt.cc | 534 enum class surrogates { allowed, disallowed }; member in class:__anon17217::surrogates 565 surrogates s = surrogates::allowed)
|
| /src/external/gpl3/gdb/dist/gdb/python/ |
| py-param.c | 292 enum tribool allowed = TRIBOOL_UNKNOWN; 312 if (allowed == TRIBOOL_UNKNOWN 317 allowed = TRIBOOL_TRUE; 322 if (allowed == TRIBOOL_UNKNOWN) 350 allowed = TRIBOOL_TRUE; 355 allowed = TRIBOOL_FALSE; 359 if (allowed == TRIBOOL_UNKNOWN) 366 allowed = TRIBOOL_FALSE; 368 if (allowed == TRIBOOL_FALSE) 291 enum tribool allowed = TRIBOOL_UNKNOWN; local
|
| /src/external/gpl3/gdb.old/dist/gdb/python/ |
| py-param.c | 292 enum tribool allowed = TRIBOOL_UNKNOWN; 312 if (allowed == TRIBOOL_UNKNOWN 317 allowed = TRIBOOL_TRUE; 322 if (allowed == TRIBOOL_UNKNOWN) 350 allowed = TRIBOOL_TRUE; 355 allowed = TRIBOOL_FALSE; 359 if (allowed == TRIBOOL_UNKNOWN) 366 allowed = TRIBOOL_FALSE; 368 if (allowed == TRIBOOL_FALSE) 291 enum tribool allowed = TRIBOOL_UNKNOWN; local
|
| /src/sys/external/mit/xen-include-public/dist/xen/include/public/xsm/ |
| flask_op.h | 58 uint32_t allowed; member in struct:xen_flask_access
|
| /src/external/bsd/wpa/dist/src/ap/ |
| dfs.c | 128 int *allowed = allowed_40; local 133 allowed = allowed_40; 137 allowed = allowed_80; 141 allowed = allowed_160; 150 if (chan->chan == allowed[i]) 189 * If it's not allowed to use the first channel as primary, decline the 192 wpa_printf(MSG_DEBUG, "DFS: primary channel not allowed"); 208 wpa_printf(MSG_DEBUG, "DFS: bw now allowed for %d",
|
| /src/crypto/external/bsd/netpgp/dist/src/libverify/ |
| verify.h | 209 const char *allowed; /* the types of packet that are allowed */ member in struct:pgpv_mem_t
|
| /src/external/gpl3/gdb/dist/gdb/guile/ |
| scm-param.c | 793 enum tribool allowed = TRIBOOL_UNKNOWN; 810 && allowed == TRIBOOL_UNKNOWN 815 allowed = TRIBOOL_TRUE; 819 if (allowed == TRIBOOL_UNKNOWN) 844 allowed = TRIBOOL_TRUE; 849 allowed = TRIBOOL_FALSE; 853 if (allowed == TRIBOOL_UNKNOWN) 860 allowed = TRIBOOL_FALSE; 862 if (allowed == TRIBOOL_FALSE) 791 enum tribool allowed = TRIBOOL_UNKNOWN; local
|