| /src/external/bsd/unbound/dist/testdata/local_norec.tdir/ |
| local_norec.conf | 15 access-control: 0.0.0.0/0 allow_snoop 16 access-control: 127.0.0.0/8 allow_snoop 17 access-control: ::0/0 allow_snoop 18 access-control: ::1 allow_snoop 19 access-control: ::ffff:127.0.0.1 allow_snoop
|
| /src/external/bsd/unbound/dist/testdata/local_nosnoop.tdir/ |
| local_nosnoop.conf | 15 access-control: 0.0.0.0/0 allow 16 access-control: 127.0.0.0/8 allow 17 access-control: ::0/0 allow 18 access-control: ::1 allow 19 access-control: ::ffff:127.0.0.1 allow
|
| /src/external/gpl3/gdb/dist/sim/testsuite/cris/c/ |
| access1.c | 1 /* Check access(2) trivially. Newlib doesn't have it. 10 if (access (argv[0], R_OK|W_OK|X_OK) == 0 11 && access ("/dev/null", R_OK|W_OK) == 0 12 && access ("/dev/null", X_OK) == -1
|
| /src/external/gpl3/gdb.old/dist/sim/testsuite/cris/c/ |
| access1.c | 1 /* Check access(2) trivially. Newlib doesn't have it. 10 if (access (argv[0], R_OK|W_OK|X_OK) == 0 11 && access ("/dev/null", R_OK|W_OK) == 0 12 && access ("/dev/null", X_OK) == -1
|
| /src/external/bsd/openldap/dist/tests/data/ |
| slapd-acl.conf | 29 access to dn.exact="" attrs=objectClass 31 access to * 50 #access to attrs=objectclass dn.subtree="dc=example,dc=com" 51 access to attrs=objectclass 55 #access to filter="(objectclass=person)" attrs=userpassword dn.subtree="dc=example,dc=com" 56 access to filter="(objectclass=person)" attrs=userpassword 60 access to dn.exact="cn=Mark Elliot,ou=Alumni Association,ou=People,dc=example,dc=com" 65 access to dn.exact="cn=Mark Elliot,ou=Alumni Association,ou=People,dc=example,dc=com" 70 access to dn.exact="cn=Mark Elliot,ou=Alumni Association,ou=People,dc=example,dc=com" 74 access to dn.exact="cn=John Doe,ou=Information Technology Division,ou=People,dc=example,dc=com [all...] |
| slapd-emptydn.conf | 26 access to dn.exact="" 29 access to dn.exact="cn=Subschema" 47 access to attrs=userPassword 52 access to dn.subtree="dc=example,dc=com" 57 access to dn.subtree="cn=Monitor" 68 access to attrs=userPassword 72 access to dn.subtree=""
|
| slapd-valregex.conf | 29 access to dn.exact="" attrs=objectClass 31 access to * 51 access to attrs=userPassword 55 access to attrs=sn val.regex="^(.*)$" 59 access to attrs=sn val.regex="." 62 access to attrs=sn
|
| slapd-repl-consumer-remote.conf | 41 access to dn.base="" attrs=children 45 access to * 66 access to dn.subtree="dc=example,dc=com" attrs=hasSubordinates 70 access to dn.subtree="dc=example,dc=com"
|
| slapd-aci.conf | 36 access to dn="" 39 access to dn="cn=Subschema" 50 access to dn.subtree="dc=example,dc=com"
|
| slapd-dds.conf | 54 access to attrs=userPassword 58 access to dn.base="ou=Groups,dc=example,dc=com" 62 access to dn.onelevel="ou=Groups,dc=example,dc=com" 67 access to dn.onelevel="ou=Groups,dc=example,dc=com" 71 access to dn.onelevel="ou=Groups,dc=example,dc=com" 75 access to dn.onelevel="ou=Groups,dc=example,dc=com" 80 access to *
|
| /src/external/mpl/dhcp/bind/dist/lib/isc/ |
| fsaccess.c | 37 isc_fsaccess_add(int trustee, int permission, isc_fsaccess_t *access) { 42 *access |= permission; 46 *access |= (permission << GROUP); 50 *access |= (permission << OTHER); 55 isc_fsaccess_remove(int trustee, int permission, isc_fsaccess_t *access) { 60 *access &= ~permission; 64 *access &= ~(permission << GROUP); 68 *access &= ~(permission << OTHER); 73 check_bad_bits(isc_fsaccess_t access, bool is_dir) { 96 if ((access & bits) != 0) [all...] |
| /src/lib/libpam/modules/pam_login_access/ |
| Makefile | 30 MAN= pam_login_access.8 login.access.5
|
| /src/external/bsd/unbound/dist/testdata/fwd_ancil.tdir/ |
| fwd_ancil.conf | 12 access-control: 0.0.0.0/0 allow 13 access-control: ::0/0 allow
|
| /src/external/gpl3/gcc/dist/gcc/ |
| tree-sra.cc | 41 candidate bitmap. More importantly, for every access into an aggregate, 42 an access structure (struct access) is created by create_access() and 44 information, the aggregate declaration, the offset and size of the access 54 an access disqualifies the whole aggregate from being scalarized. 56 If there is no such inhibiting overlap, a representative access structure 59 of an access are within their parent (in terms of offset and size). 62 does not create a partially overlapping access) across assign_links from 116 /* ACCESS represents each access to an aggregate variable (as a whole or 132 struct access struct 551 struct access *access; local 691 struct access *access = rhs_work_queue_head; local 705 struct access *access = lhs_work_queue_head; local 884 struct access *access = access_pool.allocate (); local 905 struct access *access; local 1347 struct access *access; local 2382 struct access *access = (*access_vec)[i]; local 2699 struct access *access = root; local 2769 struct access *access = get_first_repr_for_decl (var); local 3019 struct access *access = access_pool.allocate (); local 3386 struct access *access = root; local 3428 struct access *access = access_pool.allocate (); local 3770 struct access *access; local 3847 struct access *access = get_first_repr_for_decl (var); local 4098 struct access *access; local 4264 struct access *access = get_access_for_expr (base); local 4917 struct access *access = get_first_repr_for_decl (var); local 5083 struct access *access; local [all...] |
| /src/external/gpl3/gcc.old/dist/gcc/ |
| tree-sra.cc | 41 candidate bitmap. More importantly, for every access into an aggregate, 42 an access structure (struct access) is created by create_access() and 44 information, the aggregate declaration, the offset and size of the access 54 an access disqualifies the whole aggregate from being scalarized. 56 If there is no such inhibiting overlap, a representative access structure 59 of an access are within their parent (in terms of offset and size). 62 does not create a partially overlapping access) across assign_links from 115 /* ACCESS represents each access to an aggregate variable (as a whole or 131 struct access struct 547 struct access *access; local 687 struct access *access = rhs_work_queue_head; local 701 struct access *access = lhs_work_queue_head; local 878 struct access *access = access_pool.allocate (); local 899 struct access *access; local 1194 struct access *access; local 2100 struct access *access = (*access_vec)[i]; local 2398 struct access *access = root; local 2468 struct access *access = get_first_repr_for_decl (var); local 2713 struct access *access = access_pool.allocate (); local 3080 struct access *access = root; local 3122 struct access *access = access_pool.allocate (); local 3456 struct access *access; local 3547 struct access *access = get_first_repr_for_decl (var); local 3792 struct access *access; local 4544 struct access *access = get_first_repr_for_decl (var); local 4699 struct access *access; local [all...] |
| /src/external/bsd/unbound/dist/testdata/proxy_protocol.tdir/ |
| proxy_protocol.conf | 26 access-control: @CLIENT_ADDR_ALLOW@/32 allow 27 access-control: @CLIENT_ADDR_REFUSE@/32 refuse 28 access-control: @CLIENT_ADDR_ALLOW6@/128 allow 29 access-control: @CLIENT_ADDR_REFUSE6@/128 refuse 30 access-control: @INTERFACE_ALLOW_ADDR@/32 allow
|
| /src/external/mpl/dhcp/bind/dist/lib/isc/include/isc/ |
| fsaccess.h | 20 * \brief The ISC filesystem access module encapsulates the setting of file 21 * and directory access permissions into one API that is meant to be 25 * are POSIX and Windows NT 4.0 and later. The Windows NT access model is 56 * unless the directory path disallows complete access somewhere along 89 * The Windows standard access right "DELETE" doesn't have a direct 113 * \li What NT access right controls the ability to rename a file? 124 * granting or denying access. Because this functionality is 166 isc_fsaccess_add(int trustee, int permission, isc_fsaccess_t *access); 169 isc_fsaccess_remove(int trustee, int permission, isc_fsaccess_t *access); 172 isc_fsaccess_set(const char *path, isc_fsaccess_t access); [all...] |
| /src/external/bsd/unbound/dist/pythonmod/ |
| test-calc.conf | 6 access-control: 0.0.0.0/0 allow
|
| test-dict.conf | 6 access-control: 0.0.0.0/0 allow
|
| test-edns.conf | 6 access-control: 0.0.0.0/0 allow
|
| test-inplace_callbacks.conf | 6 access-control: 0.0.0.0/0 allow
|
| test-log.conf | 6 access-control: 0.0.0.0/0 allow
|
| test-resgen.conf | 6 access-control: 0.0.0.0/0 allow
|
| test-resmod.conf | 6 access-control: 0.0.0.0/0 allow
|
| /src/external/bsd/kyua-cli/dist/utils/fs/ |
| auto_cleaners_test.cpp | 53 ATF_REQUIRE(::access("root", X_OK) == 0); 59 ATF_REQUIRE(::access("root", X_OK) == 0); 61 ATF_REQUIRE(::access("root", X_OK) == -1); 74 ATF_REQUIRE(::access("root", X_OK) == 0); 77 ATF_REQUIRE(::access("root", X_OK) == -1); 91 ATF_REQUIRE(::access((fs::path("tmp") / path_template).c_str(), 95 ATF_REQUIRE(::access(auto_directory.directory().c_str(), X_OK) == 0); 110 ATF_REQUIRE(::access(file.c_str(), R_OK) == 0); 116 ATF_REQUIRE(::access(file.c_str(), R_OK) == 0); 118 ATF_REQUIRE(::access(file.c_str(), R_OK) == -1) [all...] |