| /src/external/bsd/ipf/dist/tools/ |
| ippool.c | 81 fprintf(stderr, "\t-a [-dnv] [-m <name>] [-o <role>] [-t type] [-T ttl] -i <ipaddr>[/netmask]\n"); 82 fprintf(stderr, "\t-A [-dnv] [-m <name>] [-o <role>] [-S <seed>] [-t <type>]\n"); 84 fprintf(stderr, "\t-F [-dv] [-o <role>] [-t <type>]\n"); 86 fprintf(stderr, "\t-r [-dnv] [-m <name>] [-o <role>] [-t type] -i <ipaddr>[/netmask]\n"); 87 fprintf(stderr, "\t-R [-dnv] [-m <name>] [-o <role>] [-t <type>]\n"); 152 int err = 0, c, ipset, role, type = IPLT_POOL, ttl = 0; local 159 role = IPL_LOGIPF; 171 if (setnodeaddr(type, role, ptr, optarg) == 0) 183 "cannot set role after ip address\n"); 186 role = getrole(optarg) 267 int type, role, c, err; local 412 int c, type, role; local 527 int c, role, type, arg; local 593 int role; local 651 int c, role, type, live_kernel; local [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/ |
| eventhistory.h | 26 QVariant data(const QModelIndex &index, int role) const; 28 int role = Qt::DisplayRole) const;
|
| eventhistory.cpp | 27 QVariant EventListModel::data(const QModelIndex &index, int role) const 32 if (role == Qt::DisplayRole) 48 int role) const 50 if (role != Qt::DisplayRole)
|
| /src/external/bsd/ntp/dist/sntp/unity/auto/ |
| colour_prompt.rb | 92 def colour_puts(role,str) ColourCommandLine.new.out_c(:puts, role, str) end 93 def colour_print(role,str) ColourCommandLine.new.out_c(:print, role, str) end
|
| /src/external/bsd/ipf/dist/lib/ |
| load_dstlistnode.c | 19 load_dstlistnode(role, name, node, iocfunc) 20 int role; 37 op.iplo_unit = role;
|
| load_poolnode.c | 19 load_poolnode(role, name, node, ttl, iocfunc) 20 int role; 34 op.iplo_unit = role;
|
| /src/external/mpl/dhcp/bind/dist/lib/isccfg/ |
| kaspconf.c | 89 key->role |= DNS_KASP_KEY_ROLE_KSK | DNS_KASP_KEY_ROLE_ZSK; 98 rolestr = cfg_obj_asstring(cfg_tuple_get(config, "role")); 100 key->role |= DNS_KASP_KEY_ROLE_KSK; 102 key->role |= DNS_KASP_KEY_ROLE_ZSK; 104 key->role |= DNS_KASP_KEY_ROLE_KSK; 105 key->role |= DNS_KASP_KEY_ROLE_ZSK; 328 char role[256] = { 0 }; local 346 INSIST(keyalg < ARRAY_SIZE(role)); 349 role[keyalg] |= DNS_KASP_KEY_ROLE_ZSK; 353 role[keyalg] |= DNS_KASP_KEY_ROLE_KSK [all...] |
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| extensions_cust.c | 75 * Find a custom extension from the list. The |role| param is there to 82 ENDPOINT role, unsigned int ext_type, 90 && (role == ENDPOINT_BOTH || role == meth->role 91 || meth->role == ENDPOINT_BOTH)) { 121 ENDPOINT role = ENDPOINT_BOTH; local 124 role = s->server ? ENDPOINT_SERVER : ENDPOINT_CLIENT; 126 meth = custom_ext_find(exts, role, ext_type, NULL); 263 custom_ext_method *methdst = custom_ext_find(dst, methsrc->role, [all...] |
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| extensions_cust.c | 75 * Find a custom extension from the list. The |role| param is there to 82 ENDPOINT role, unsigned int ext_type, 90 && (role == ENDPOINT_BOTH || role == meth->role 91 || meth->role == ENDPOINT_BOTH)) { 120 ENDPOINT role = ENDPOINT_BOTH; local 123 role = s->server ? ENDPOINT_SERVER : ENDPOINT_CLIENT; 125 meth = custom_ext_find(exts, role, ext_type, NULL); 260 custom_ext_method *methdst = custom_ext_find(dst, methsrc->role, [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| extensions_cust.c | 75 * Find a custom extension from the list. The |role| param is there to 82 ENDPOINT role, unsigned int ext_type, 90 && (role == ENDPOINT_BOTH || role == meth->role 91 || meth->role == ENDPOINT_BOTH)) { 120 ENDPOINT role = ENDPOINT_BOTH; local 123 role = s->server ? ENDPOINT_SERVER : ENDPOINT_CLIENT; 125 meth = custom_ext_find(exts, role, ext_type, NULL); 258 custom_ext_method *methdst = custom_ext_find(dst, methsrc->role, [all...] |
| /src/external/gpl3/gcc/dist/gcc/cp/ |
| contracts.h | 69 /* Assertion role info. */ 83 contract_role* role; member in struct:contract_configuration 94 contract_mode (contract_level level, contract_role *role = NULL) 99 cc.role = role; 116 return u.config.role; 152 /* Returns the default role. */ 223 is the role. */ 233 literal semantic or a TREE_LIST containing the level and role. */ 241 /* The identifier denoting the role of the contract * [all...] |
| contracts.cc | 162 validate_contract_role (contract_role *role) 164 gcc_assert (role); 165 if (!unchecked_contract_p (role->axiom_semantic)) 168 if (!valid_configs[role->default_semantic][role->audit_semantic] ) 191 /* Compare role and name up to either the NUL terminator or the first 195 role_name_equal (const char *role, const char *name) 197 size_t role_len = strcspn (role, ":"); 201 return strncmp (role, name, role_len) == 0; 205 role_name_equal (contract_role *role, const char *name 442 contract_role *role = add_contract_role (name, dess, auss, axss); local 470 contract_role *role = get_contract_role ("default"); local 504 contract_role *role = NULL; local 542 contract_role *role = mode.get_role (); local 1675 const char *role = get_contract_role_name (contract); local [all...] |
| /src/external/mpl/bind/dist/lib/isccfg/ |
| kaspconf.c | 133 key->role |= DNS_KASP_KEY_ROLE_KSK | DNS_KASP_KEY_ROLE_ZSK; 150 rolestr = cfg_obj_asstring(cfg_tuple_get(config, "role")); 152 key->role |= DNS_KASP_KEY_ROLE_KSK; 154 key->role |= DNS_KASP_KEY_ROLE_ZSK; 168 key->role |= DNS_KASP_KEY_ROLE_KSK; 169 key->role |= DNS_KASP_KEY_ROLE_ZSK; 216 if ((key->role & DNS_KASP_KEY_ROLE_KSK) != 0 && 221 if ((key->role & DNS_KASP_KEY_ROLE_ZSK) != 0 && 739 char role[256] = { 0 }; local 766 INSIST(keyalg < ARRAY_SIZE(role)); [all...] |
| /src/external/bsd/openldap/dist/contrib/slapd-modules/rbac/ |
| rbacreq.c | 54 /* add/drop role */ 55 BER_BVZERO( &reqp->role );
|
| rbacsess.c | 236 // convert the role name to lower case: 237 rbac_to_lower( &reqp->role ); 240 ber_dupbv( &vals[0], &reqp->role ); 271 "role already activated in session\n" ); 306 // convert the role name to lower case: 307 rbac_to_lower( &reqp->role ); 309 ber_dupbv( &m->sml_values[0], &reqp->role ); 314 ber_dupbv( &m->sml_nvalues[0], &reqp->role ); 318 //ber_dupbv( &m->sml_nvalues[0], &reqp->role); 968 /* no role requested, assign all roles from the user to the session. * 974 struct berval role; local 993 struct berval role; local [all...] |
| util.c | 92 /* assume well-formed role/user-constraints, for the moment */ 96 "rbac role/user constraint not well-formed: %s\n", 509 rbac_role2constraint( struct berval *role, rbac_constraint_t *role_constraints ) 513 if ( !role_constraints || !role ) goto done; 517 if ( ber_bvstrcasecmp( role, &cp->name ) == 0 ) { 518 /* found the role constraint */
|
| /src/external/mpl/bind/dist/bin/tests/system/checkconf/ |
| kasp-warning.conf | 17 // role, this should trigger a warning. 28 // role, this should trigger a warning.
|
| /src/sys/dev/ic/ |
| isp_ioctl.h | 59 * role that was passed in (the old role will be returned). It almost 72 * Get the current adapter role 120 role : 2, member in struct:isp_fc_device
|
| /src/external/bsd/wpa/dist/wpa_supplicant/ |
| p2p_supplicant_sd.c | 482 u8 role; local 496 "Role"); 504 role = *pos++; 505 wpa_printf(MSG_DEBUG, "P2P: WSD for device role 0x%x", role); 507 /* TODO: role specific handling */ 1033 static void wfd_add_sd_req_role(struct wpabuf *tlvs, u8 id, u8 role, 1045 wpabuf_put_u8(tlvs, role); 1067 const u8 *dst, const char *role) 1074 subelems = os_strchr(role, ' '); [all...] |
| /src/external/mpl/bind/dist/lib/dns/ |
| kasp.c | 519 return key->role & DNS_KASP_KEY_ROLE_KSK; 526 return key->role & DNS_KASP_KEY_ROLE_ZSK; 544 bool role = false; local 557 /* Matching role? */ 558 ret = dst_key_getbool(dkey->key, DST_BOOL_KSK, &role); 559 if (ret != ISC_R_SUCCESS || role != dns_kasp_key_ksk(key)) { 562 ret = dst_key_getbool(dkey->key, DST_BOOL_ZSK, &role); 563 if (ret != ISC_R_SUCCESS || role != dns_kasp_key_zsk(key)) {
|
| /src/crypto/external/apache2/openssl/dist/crypto/hpke/ |
| hpke.c | 57 int role; /* sender(0) or receiver(1) */ member in struct:ossl_hpke_ctx_st 809 OSSL_HPKE_CTX *OSSL_HPKE_CTX_new(int mode, OSSL_HPKE_SUITE suite, int role, 825 if (role != OSSL_HPKE_ROLE_SENDER && role != OSSL_HPKE_ROLE_RECEIVER) { 845 ctx->role = role; 937 if (ctx->role != OSSL_HPKE_ROLE_SENDER) { 960 if (ctx->role != OSSL_HPKE_ROLE_SENDER) { 989 if (ctx->role != OSSL_HPKE_ROLE_RECEIVER) { 1059 if (ctx->role == OSSL_HPKE_ROLE_SENDER) [all...] |
| /src/external/bsd/wpa/dist/wpa_supplicant/dbus/ |
| dbus_new_handlers_wps.c | 25 int role; /* 0 - not set, 1 - enrollee, 2 - registrar */ member in struct:wps_start_params 45 "dbus: WPS.Start - Wrong Role type, string required"); 47 "Role must be a string"); 52 params->role = 1; 54 params->role = 2; 56 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown role %s", val); 186 if (os_strcmp(key, "Role") == 0) 217 * information about role (enrollee or registrar), authorization method 254 "dbus: WPS.Start - Pin required for registrar role"); 256 message, "Pin required for registrar role.") [all...] |
| /src/crypto/external/apache2/openssl/dist/include/internal/ |
| recordmethod.h | 82 * set by |vers|. |role| is 0 for client and 1 for server. |direction| 115 int role, int direction,
|
| /src/external/bsd/nsd/dist/ |
| util.h | 50 * Set the name of the role for the process (for debugging purposes) 52 void log_set_process_role(const char* role); 54 #define log_set_process_role(role) /* empty */
|
| /src/external/bsd/wpa/dist/src/common/ |
| dpp_auth.c | 846 "DPP: Local policy does not allow Configurator role"); 855 "DPP: Local policy does not allow Enrollee role"); 870 "DPP: Local policy does not allow Configurator/Enrollee role"); 875 wpa_printf(MSG_DEBUG, "DPP: Unexpected role in I-capabilities"); 877 DPP_EVENT_FAIL "Invalid role in I-capabilities 0x%02x", 1382 u8 role = auth->r_capab & DPP_CAPAB_ROLE_MASK; local 1384 if ((auth->configurator && role != DPP_CAPAB_ENROLLEE) || 1385 (!auth->configurator && role != DPP_CAPAB_CONFIGURATOR)) { 1387 DPP_EVENT_FAIL "Unexpected role in R-capabilities 0x%02x", 1388 role); 1418 u8 role; local [all...] |