HomeSort by: relevance | last modified time | path
    Searched refs:access (Results 1 - 25 of 956) sorted by relevancy

1 2 3 4 5 6 7 8 91011>>

  /src/external/bsd/unbound/dist/testdata/local_norec.tdir/
local_norec.conf 15 access-control: 0.0.0.0/0 allow_snoop
16 access-control: 127.0.0.0/8 allow_snoop
17 access-control: ::0/0 allow_snoop
18 access-control: ::1 allow_snoop
19 access-control: ::ffff:127.0.0.1 allow_snoop
  /src/external/bsd/unbound/dist/testdata/local_nosnoop.tdir/
local_nosnoop.conf 15 access-control: 0.0.0.0/0 allow
16 access-control: 127.0.0.0/8 allow
17 access-control: ::0/0 allow
18 access-control: ::1 allow
19 access-control: ::ffff:127.0.0.1 allow
  /src/external/gpl3/gdb/dist/sim/testsuite/cris/c/
access1.c 1 /* Check access(2) trivially. Newlib doesn't have it.
10 if (access (argv[0], R_OK|W_OK|X_OK) == 0
11 && access ("/dev/null", R_OK|W_OK) == 0
12 && access ("/dev/null", X_OK) == -1
  /src/external/gpl3/gdb.old/dist/sim/testsuite/cris/c/
access1.c 1 /* Check access(2) trivially. Newlib doesn't have it.
10 if (access (argv[0], R_OK|W_OK|X_OK) == 0
11 && access ("/dev/null", R_OK|W_OK) == 0
12 && access ("/dev/null", X_OK) == -1
  /src/external/bsd/openldap/dist/tests/data/
slapd-acl.conf 29 access to dn.exact="" attrs=objectClass
31 access to *
50 #access to attrs=objectclass dn.subtree="dc=example,dc=com"
51 access to attrs=objectclass
55 #access to filter="(objectclass=person)" attrs=userpassword dn.subtree="dc=example,dc=com"
56 access to filter="(objectclass=person)" attrs=userpassword
60 access to dn.exact="cn=Mark Elliot,ou=Alumni Association,ou=People,dc=example,dc=com"
65 access to dn.exact="cn=Mark Elliot,ou=Alumni Association,ou=People,dc=example,dc=com"
70 access to dn.exact="cn=Mark Elliot,ou=Alumni Association,ou=People,dc=example,dc=com"
74 access to dn.exact="cn=John Doe,ou=Information Technology Division,ou=People,dc=example,dc=com
    [all...]
slapd-emptydn.conf 26 access to dn.exact=""
29 access to dn.exact="cn=Subschema"
47 access to attrs=userPassword
52 access to dn.subtree="dc=example,dc=com"
57 access to dn.subtree="cn=Monitor"
68 access to attrs=userPassword
72 access to dn.subtree=""
slapd-valregex.conf 29 access to dn.exact="" attrs=objectClass
31 access to *
51 access to attrs=userPassword
55 access to attrs=sn val.regex="^(.*)$"
59 access to attrs=sn val.regex="."
62 access to attrs=sn
slapd-repl-consumer-remote.conf 41 access to dn.base="" attrs=children
45 access to *
66 access to dn.subtree="dc=example,dc=com" attrs=hasSubordinates
70 access to dn.subtree="dc=example,dc=com"
slapd-aci.conf 36 access to dn=""
39 access to dn="cn=Subschema"
50 access to dn.subtree="dc=example,dc=com"
slapd-dds.conf 54 access to attrs=userPassword
58 access to dn.base="ou=Groups,dc=example,dc=com"
62 access to dn.onelevel="ou=Groups,dc=example,dc=com"
67 access to dn.onelevel="ou=Groups,dc=example,dc=com"
71 access to dn.onelevel="ou=Groups,dc=example,dc=com"
75 access to dn.onelevel="ou=Groups,dc=example,dc=com"
80 access to *
  /src/external/mpl/dhcp/bind/dist/lib/isc/
fsaccess.c 37 isc_fsaccess_add(int trustee, int permission, isc_fsaccess_t *access) {
42 *access |= permission;
46 *access |= (permission << GROUP);
50 *access |= (permission << OTHER);
55 isc_fsaccess_remove(int trustee, int permission, isc_fsaccess_t *access) {
60 *access &= ~permission;
64 *access &= ~(permission << GROUP);
68 *access &= ~(permission << OTHER);
73 check_bad_bits(isc_fsaccess_t access, bool is_dir) {
96 if ((access & bits) != 0)
    [all...]
  /src/lib/libpam/modules/pam_login_access/
Makefile 30 MAN= pam_login_access.8 login.access.5
  /src/external/bsd/unbound/dist/testdata/fwd_ancil.tdir/
fwd_ancil.conf 12 access-control: 0.0.0.0/0 allow
13 access-control: ::0/0 allow
  /src/external/gpl3/gcc/dist/gcc/
tree-sra.cc 41 candidate bitmap. More importantly, for every access into an aggregate,
42 an access structure (struct access) is created by create_access() and
44 information, the aggregate declaration, the offset and size of the access
54 an access disqualifies the whole aggregate from being scalarized.
56 If there is no such inhibiting overlap, a representative access structure
59 of an access are within their parent (in terms of offset and size).
62 does not create a partially overlapping access) across assign_links from
116 /* ACCESS represents each access to an aggregate variable (as a whole or
132 struct access struct
551 struct access *access; local
691 struct access *access = rhs_work_queue_head; local
705 struct access *access = lhs_work_queue_head; local
884 struct access *access = access_pool.allocate (); local
905 struct access *access; local
1347 struct access *access; local
2382 struct access *access = (*access_vec)[i]; local
2699 struct access *access = root; local
2769 struct access *access = get_first_repr_for_decl (var); local
3019 struct access *access = access_pool.allocate (); local
3386 struct access *access = root; local
3428 struct access *access = access_pool.allocate (); local
3770 struct access *access; local
3847 struct access *access = get_first_repr_for_decl (var); local
4098 struct access *access; local
4264 struct access *access = get_access_for_expr (base); local
4917 struct access *access = get_first_repr_for_decl (var); local
5083 struct access *access; local
    [all...]
  /src/external/gpl3/gcc.old/dist/gcc/
tree-sra.cc 41 candidate bitmap. More importantly, for every access into an aggregate,
42 an access structure (struct access) is created by create_access() and
44 information, the aggregate declaration, the offset and size of the access
54 an access disqualifies the whole aggregate from being scalarized.
56 If there is no such inhibiting overlap, a representative access structure
59 of an access are within their parent (in terms of offset and size).
62 does not create a partially overlapping access) across assign_links from
115 /* ACCESS represents each access to an aggregate variable (as a whole or
131 struct access struct
547 struct access *access; local
687 struct access *access = rhs_work_queue_head; local
701 struct access *access = lhs_work_queue_head; local
878 struct access *access = access_pool.allocate (); local
899 struct access *access; local
1194 struct access *access; local
2100 struct access *access = (*access_vec)[i]; local
2398 struct access *access = root; local
2468 struct access *access = get_first_repr_for_decl (var); local
2713 struct access *access = access_pool.allocate (); local
3080 struct access *access = root; local
3122 struct access *access = access_pool.allocate (); local
3456 struct access *access; local
3547 struct access *access = get_first_repr_for_decl (var); local
3792 struct access *access; local
4544 struct access *access = get_first_repr_for_decl (var); local
4699 struct access *access; local
    [all...]
  /src/external/bsd/unbound/dist/testdata/proxy_protocol.tdir/
proxy_protocol.conf 26 access-control: @CLIENT_ADDR_ALLOW@/32 allow
27 access-control: @CLIENT_ADDR_REFUSE@/32 refuse
28 access-control: @CLIENT_ADDR_ALLOW6@/128 allow
29 access-control: @CLIENT_ADDR_REFUSE6@/128 refuse
30 access-control: @INTERFACE_ALLOW_ADDR@/32 allow
  /src/external/mpl/dhcp/bind/dist/lib/isc/include/isc/
fsaccess.h 20 * \brief The ISC filesystem access module encapsulates the setting of file
21 * and directory access permissions into one API that is meant to be
25 * are POSIX and Windows NT 4.0 and later. The Windows NT access model is
56 * unless the directory path disallows complete access somewhere along
89 * The Windows standard access right "DELETE" doesn't have a direct
113 * \li What NT access right controls the ability to rename a file?
124 * granting or denying access. Because this functionality is
166 isc_fsaccess_add(int trustee, int permission, isc_fsaccess_t *access);
169 isc_fsaccess_remove(int trustee, int permission, isc_fsaccess_t *access);
172 isc_fsaccess_set(const char *path, isc_fsaccess_t access);
    [all...]
  /src/external/bsd/unbound/dist/pythonmod/
test-calc.conf 6 access-control: 0.0.0.0/0 allow
test-dict.conf 6 access-control: 0.0.0.0/0 allow
test-edns.conf 6 access-control: 0.0.0.0/0 allow
test-inplace_callbacks.conf 6 access-control: 0.0.0.0/0 allow
test-log.conf 6 access-control: 0.0.0.0/0 allow
test-resgen.conf 6 access-control: 0.0.0.0/0 allow
test-resmod.conf 6 access-control: 0.0.0.0/0 allow
  /src/external/bsd/kyua-cli/dist/utils/fs/
auto_cleaners_test.cpp 53 ATF_REQUIRE(::access("root", X_OK) == 0);
59 ATF_REQUIRE(::access("root", X_OK) == 0);
61 ATF_REQUIRE(::access("root", X_OK) == -1);
74 ATF_REQUIRE(::access("root", X_OK) == 0);
77 ATF_REQUIRE(::access("root", X_OK) == -1);
91 ATF_REQUIRE(::access((fs::path("tmp") / path_template).c_str(),
95 ATF_REQUIRE(::access(auto_directory.directory().c_str(), X_OK) == 0);
110 ATF_REQUIRE(::access(file.c_str(), R_OK) == 0);
116 ATF_REQUIRE(::access(file.c_str(), R_OK) == 0);
118 ATF_REQUIRE(::access(file.c_str(), R_OK) == -1)
    [all...]

Completed in 78 milliseconds

1 2 3 4 5 6 7 8 91011>>