| /src/external/bsd/nvi/dist/ex/ |
| ex_stop.c | 44 int allowed; local 50 if (sp->gp->scr_suspend(sp, &allowed)) 52 if (!allowed)
|
| /src/external/mpl/bind/dist/bin/tests/system/mkeys/ns1/ |
| named.conf.j2 | 16 acl allowed { 32 allow-query { allowed; };
|
| named2.conf.j2 | 16 acl allowed { 32 allow-query { allowed; };
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/ |
| compress.h | 73 unsigned int allowed; /*%< Allowed methods. */ member in struct:dns_compress 88 DNS_DECOMPRESS_STRICT, /*%< Allowed compression */ 94 unsigned int allowed; /*%< Allowed methods. */ member in struct:dns_decompress 128 dns_compress_setmethods(dns_compress_t *cctx, unsigned int allowed); 131 * Sets allowed compression methods. 141 * Gets allowed compression methods. 147 *\li allowed compression bitmap. 263 dns_decompress_setmethods(dns_decompress_t *dctx, unsigned int allowed); [all...] |
| /src/tests/fs/vfs/ |
| t_link.c | 60 bool sysctl, bool allowed) 93 if (errno != EOPNOTSUPP && allowed) 96 if (!allowed) 141 ATF_TC_FSAPPLY(hardlink_sameuser, "hardlink same user allowed"); 142 ATF_TC_FSAPPLY(hardlink_sameuser_sysctl, "hardlink same user sysctl allowed"); 143 ATF_TC_FSAPPLY(hardlink_otheruser, "hardlink other user allowed"); 145 ATF_TC_FSAPPLY(hardlink_rootuser, "hardlink root user allowed"); 146 ATF_TC_FSAPPLY(hardlink_rootuser_sysctl, "hardlink root user sysctl allowed");
|
| /src/external/bsd/openldap/dist/contrib/slapd-modules/allowed/ |
| Makefile | 34 PROGRAMS = allowed.la 52 allowed.la: allowed.lo
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| compress.c | 135 cctx->allowed = DNS_COMPRESS_ENABLED; 168 cctx->allowed = 0; 173 dns_compress_setmethods(dns_compress_t *cctx, unsigned int allowed) { 176 cctx->allowed &= ~DNS_COMPRESS_ALL; 177 cctx->allowed |= (allowed & DNS_COMPRESS_ALL); 183 return (cctx->allowed & DNS_COMPRESS_ALL); 189 cctx->allowed &= ~DNS_COMPRESS_ENABLED; 197 cctx->allowed |= DNS_COMPRESS_CASESENSITIVE; 199 cctx->allowed &= ~DNS_COMPRESS_CASESENSITIVE [all...] |
| /src/sys/dev/dm/ |
| device-mapper.c | 116 * to function which I can call, and if the command is allowed for 131 int allowed; member in struct:cmd_function 133 { .cmd = "version", .fn = NULL, .allowed = 1 }, 134 { .cmd = "targets", .fn = dm_list_versions_ioctl, .allowed = 1 }, 135 { .cmd = "create", .fn = dm_dev_create_ioctl, .allowed = 0 }, 136 { .cmd = "info", .fn = dm_dev_status_ioctl, .allowed = 1 }, 137 { .cmd = "mknodes", .fn = dm_dev_status_ioctl, .allowed = 1 }, 138 { .cmd = "names", .fn = dm_dev_list_ioctl, .allowed = 1 }, 139 { .cmd = "suspend", .fn = dm_dev_suspend_ioctl, .allowed = 0 }, 140 { .cmd = "remove", .fn = dm_dev_remove_ioctl, .allowed = 0 } [all...] |
| /src/external/mpl/bind/dist/bin/tests/system/checkconf/ |
| bad-checkdstype-level.conf | 15 * checkds only allowed at zone level
|
| bad-inline-options.conf | 15 * inline-signing not allowed at options level.
|
| bad-inline-view.conf | 15 * inline-signing not allowed at view level.
|
| bad-kasp-define-default.conf | 14 // 'default' is a built-in policy, redefinition not allowed.
|
| bad-kasp-define-insecure.conf | 14 // 'insecure' is a built-in policy, redefinition not allowed.
|
| bad-kasp-define-none.conf | 14 // 'none' is a built-in policy, redefinition not allowed.
|
| bad-master-request-ixfr.conf | 15 * request-ixfr clause is not allowed in zone of type primary.
|
| bad-kasp-jitter.conf | 16 * which is not allowed.
|
| /src/external/mpl/bind/dist/bin/tests/system/redirect/conf/ |
| bad1.conf | 23 /* option 'forwarders' is not allowed in 'redirect' zone '.' */
|
| bad2.conf | 23 /* option 'also-notify' is not allowed in 'redirect' zone '.' */
|
| /src/external/apache2/llvm/dist/llvm/utils/vim/syntax/ |
| mir.vim | 18 " The first document of a file is allowed to contain an LLVM IR module inside 21 " FIXME: This should only be allowed for the first document of the file
|
| /src/external/gpl3/gdb/dist/gdb/python/ |
| py-param.c | 292 enum tribool allowed = TRIBOOL_UNKNOWN; 312 if (allowed == TRIBOOL_UNKNOWN 317 allowed = TRIBOOL_TRUE; 322 if (allowed == TRIBOOL_UNKNOWN) 350 allowed = TRIBOOL_TRUE; 355 allowed = TRIBOOL_FALSE; 359 if (allowed == TRIBOOL_UNKNOWN) 366 allowed = TRIBOOL_FALSE; 368 if (allowed == TRIBOOL_FALSE) 291 enum tribool allowed = TRIBOOL_UNKNOWN; local
|
| /src/external/gpl3/gdb.old/dist/gdb/python/ |
| py-param.c | 292 enum tribool allowed = TRIBOOL_UNKNOWN; 312 if (allowed == TRIBOOL_UNKNOWN 317 allowed = TRIBOOL_TRUE; 322 if (allowed == TRIBOOL_UNKNOWN) 350 allowed = TRIBOOL_TRUE; 355 allowed = TRIBOOL_FALSE; 359 if (allowed == TRIBOOL_UNKNOWN) 366 allowed = TRIBOOL_FALSE; 368 if (allowed == TRIBOOL_FALSE) 291 enum tribool allowed = TRIBOOL_UNKNOWN; local
|
| /src/games/gomoku/ |
| bdisp.c | 269 get_key(const char *allowed) 274 if (allowed == NULL || ch == '\0' || 275 strchr(allowed, ch) != NULL)
|
| /src/crypto/external/bsd/openssh/dist/ |
| readpass.c | 205 int allowed = 0; local 220 allowed = 1; 224 return (allowed);
|
| /src/external/gpl3/gdb/dist/gdb/cli/ |
| cli-setshow.c | 238 enum tribool allowed = TRIBOOL_UNKNOWN; 246 allowed = TRIBOOL_TRUE; 251 allowed = TRIBOOL_FALSE; 254 if (allowed == TRIBOOL_UNKNOWN) 261 allowed = TRIBOOL_FALSE; 263 if (allowed == TRIBOOL_FALSE) 236 enum tribool allowed = TRIBOOL_UNKNOWN; local
|
| /src/external/gpl3/gdb.old/dist/gdb/cli/ |
| cli-setshow.c | 238 enum tribool allowed = TRIBOOL_UNKNOWN; 246 allowed = TRIBOOL_TRUE; 251 allowed = TRIBOOL_FALSE; 254 if (allowed == TRIBOOL_UNKNOWN) 261 allowed = TRIBOOL_FALSE; 263 if (allowed == TRIBOOL_FALSE) 236 enum tribool allowed = TRIBOOL_UNKNOWN; local
|