HomeSort by: relevance | last modified time | path
    Searched refs:role (Results 1 - 25 of 113) sorted by relevancy

1 2 3 4 5

  /src/external/bsd/ipf/dist/tools/
ippool.c 81 fprintf(stderr, "\t-a [-dnv] [-m <name>] [-o <role>] [-t type] [-T ttl] -i <ipaddr>[/netmask]\n");
82 fprintf(stderr, "\t-A [-dnv] [-m <name>] [-o <role>] [-S <seed>] [-t <type>]\n");
84 fprintf(stderr, "\t-F [-dv] [-o <role>] [-t <type>]\n");
86 fprintf(stderr, "\t-r [-dnv] [-m <name>] [-o <role>] [-t type] -i <ipaddr>[/netmask]\n");
87 fprintf(stderr, "\t-R [-dnv] [-m <name>] [-o <role>] [-t <type>]\n");
152 int err = 0, c, ipset, role, type = IPLT_POOL, ttl = 0; local
159 role = IPL_LOGIPF;
171 if (setnodeaddr(type, role, ptr, optarg) == 0)
183 "cannot set role after ip address\n");
186 role = getrole(optarg)
267 int type, role, c, err; local
412 int c, type, role; local
527 int c, role, type, arg; local
593 int role; local
651 int c, role, type, live_kernel; local
    [all...]
  /src/external/bsd/wpa/dist/wpa_supplicant/wpa_gui-qt4/
eventhistory.h 26 QVariant data(const QModelIndex &index, int role) const;
28 int role = Qt::DisplayRole) const;
eventhistory.cpp 27 QVariant EventListModel::data(const QModelIndex &index, int role) const
32 if (role == Qt::DisplayRole)
48 int role) const
50 if (role != Qt::DisplayRole)
  /src/external/bsd/ntp/dist/sntp/unity/auto/
colour_prompt.rb 92 def colour_puts(role,str) ColourCommandLine.new.out_c(:puts, role, str) end
93 def colour_print(role,str) ColourCommandLine.new.out_c(:print, role, str) end
  /src/external/bsd/ipf/dist/lib/
load_dstlistnode.c 19 load_dstlistnode(role, name, node, iocfunc)
20 int role;
37 op.iplo_unit = role;
load_poolnode.c 19 load_poolnode(role, name, node, ttl, iocfunc)
20 int role;
34 op.iplo_unit = role;
  /src/external/mpl/dhcp/bind/dist/lib/isccfg/
kaspconf.c 89 key->role |= DNS_KASP_KEY_ROLE_KSK | DNS_KASP_KEY_ROLE_ZSK;
98 rolestr = cfg_obj_asstring(cfg_tuple_get(config, "role"));
100 key->role |= DNS_KASP_KEY_ROLE_KSK;
102 key->role |= DNS_KASP_KEY_ROLE_ZSK;
104 key->role |= DNS_KASP_KEY_ROLE_KSK;
105 key->role |= DNS_KASP_KEY_ROLE_ZSK;
328 char role[256] = { 0 }; local
346 INSIST(keyalg < ARRAY_SIZE(role));
349 role[keyalg] |= DNS_KASP_KEY_ROLE_ZSK;
353 role[keyalg] |= DNS_KASP_KEY_ROLE_KSK
    [all...]
  /src/crypto/external/apache2/openssl/dist/ssl/statem/
extensions_cust.c 75 * Find a custom extension from the list. The |role| param is there to
82 ENDPOINT role, unsigned int ext_type,
90 && (role == ENDPOINT_BOTH || role == meth->role
91 || meth->role == ENDPOINT_BOTH)) {
121 ENDPOINT role = ENDPOINT_BOTH; local
124 role = s->server ? ENDPOINT_SERVER : ENDPOINT_CLIENT;
126 meth = custom_ext_find(exts, role, ext_type, NULL);
263 custom_ext_method *methdst = custom_ext_find(dst, methsrc->role,
    [all...]
  /src/crypto/external/bsd/openssl/dist/ssl/statem/
extensions_cust.c 75 * Find a custom extension from the list. The |role| param is there to
82 ENDPOINT role, unsigned int ext_type,
90 && (role == ENDPOINT_BOTH || role == meth->role
91 || meth->role == ENDPOINT_BOTH)) {
120 ENDPOINT role = ENDPOINT_BOTH; local
123 role = s->server ? ENDPOINT_SERVER : ENDPOINT_CLIENT;
125 meth = custom_ext_find(exts, role, ext_type, NULL);
260 custom_ext_method *methdst = custom_ext_find(dst, methsrc->role,
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/ssl/statem/
extensions_cust.c 75 * Find a custom extension from the list. The |role| param is there to
82 ENDPOINT role, unsigned int ext_type,
90 && (role == ENDPOINT_BOTH || role == meth->role
91 || meth->role == ENDPOINT_BOTH)) {
120 ENDPOINT role = ENDPOINT_BOTH; local
123 role = s->server ? ENDPOINT_SERVER : ENDPOINT_CLIENT;
125 meth = custom_ext_find(exts, role, ext_type, NULL);
258 custom_ext_method *methdst = custom_ext_find(dst, methsrc->role,
    [all...]
  /src/external/gpl3/gcc/dist/gcc/cp/
contracts.h 69 /* Assertion role info. */
83 contract_role* role; member in struct:contract_configuration
94 contract_mode (contract_level level, contract_role *role = NULL)
99 cc.role = role;
116 return u.config.role;
152 /* Returns the default role. */
223 is the role. */
233 literal semantic or a TREE_LIST containing the level and role. */
241 /* The identifier denoting the role of the contract *
    [all...]
contracts.cc 162 validate_contract_role (contract_role *role)
164 gcc_assert (role);
165 if (!unchecked_contract_p (role->axiom_semantic))
168 if (!valid_configs[role->default_semantic][role->audit_semantic] )
191 /* Compare role and name up to either the NUL terminator or the first
195 role_name_equal (const char *role, const char *name)
197 size_t role_len = strcspn (role, ":");
201 return strncmp (role, name, role_len) == 0;
205 role_name_equal (contract_role *role, const char *name
442 contract_role *role = add_contract_role (name, dess, auss, axss); local
470 contract_role *role = get_contract_role ("default"); local
504 contract_role *role = NULL; local
542 contract_role *role = mode.get_role (); local
1675 const char *role = get_contract_role_name (contract); local
    [all...]
  /src/external/mpl/bind/dist/lib/isccfg/
kaspconf.c 133 key->role |= DNS_KASP_KEY_ROLE_KSK | DNS_KASP_KEY_ROLE_ZSK;
150 rolestr = cfg_obj_asstring(cfg_tuple_get(config, "role"));
152 key->role |= DNS_KASP_KEY_ROLE_KSK;
154 key->role |= DNS_KASP_KEY_ROLE_ZSK;
168 key->role |= DNS_KASP_KEY_ROLE_KSK;
169 key->role |= DNS_KASP_KEY_ROLE_ZSK;
216 if ((key->role & DNS_KASP_KEY_ROLE_KSK) != 0 &&
221 if ((key->role & DNS_KASP_KEY_ROLE_ZSK) != 0 &&
739 char role[256] = { 0 }; local
766 INSIST(keyalg < ARRAY_SIZE(role));
    [all...]
  /src/external/bsd/openldap/dist/contrib/slapd-modules/rbac/
rbacreq.c 54 /* add/drop role */
55 BER_BVZERO( &reqp->role );
rbacsess.c 236 // convert the role name to lower case:
237 rbac_to_lower( &reqp->role );
240 ber_dupbv( &vals[0], &reqp->role );
271 "role already activated in session\n" );
306 // convert the role name to lower case:
307 rbac_to_lower( &reqp->role );
309 ber_dupbv( &m->sml_values[0], &reqp->role );
314 ber_dupbv( &m->sml_nvalues[0], &reqp->role );
318 //ber_dupbv( &m->sml_nvalues[0], &reqp->role);
968 /* no role requested, assign all roles from the user to the session. *
974 struct berval role; local
993 struct berval role; local
    [all...]
util.c 92 /* assume well-formed role/user-constraints, for the moment */
96 "rbac role/user constraint not well-formed: %s\n",
509 rbac_role2constraint( struct berval *role, rbac_constraint_t *role_constraints )
513 if ( !role_constraints || !role ) goto done;
517 if ( ber_bvstrcasecmp( role, &cp->name ) == 0 ) {
518 /* found the role constraint */
  /src/external/mpl/bind/dist/bin/tests/system/checkconf/
kasp-warning.conf 17 // role, this should trigger a warning.
28 // role, this should trigger a warning.
  /src/sys/dev/ic/
isp_ioctl.h 59 * role that was passed in (the old role will be returned). It almost
72 * Get the current adapter role
120 role : 2, member in struct:isp_fc_device
  /src/external/bsd/wpa/dist/wpa_supplicant/
p2p_supplicant_sd.c 482 u8 role; local
496 "Role");
504 role = *pos++;
505 wpa_printf(MSG_DEBUG, "P2P: WSD for device role 0x%x", role);
507 /* TODO: role specific handling */
1033 static void wfd_add_sd_req_role(struct wpabuf *tlvs, u8 id, u8 role,
1045 wpabuf_put_u8(tlvs, role);
1067 const u8 *dst, const char *role)
1074 subelems = os_strchr(role, ' ');
    [all...]
  /src/external/mpl/bind/dist/lib/dns/
kasp.c 519 return key->role & DNS_KASP_KEY_ROLE_KSK;
526 return key->role & DNS_KASP_KEY_ROLE_ZSK;
544 bool role = false; local
557 /* Matching role? */
558 ret = dst_key_getbool(dkey->key, DST_BOOL_KSK, &role);
559 if (ret != ISC_R_SUCCESS || role != dns_kasp_key_ksk(key)) {
562 ret = dst_key_getbool(dkey->key, DST_BOOL_ZSK, &role);
563 if (ret != ISC_R_SUCCESS || role != dns_kasp_key_zsk(key)) {
  /src/crypto/external/apache2/openssl/dist/crypto/hpke/
hpke.c 57 int role; /* sender(0) or receiver(1) */ member in struct:ossl_hpke_ctx_st
809 OSSL_HPKE_CTX *OSSL_HPKE_CTX_new(int mode, OSSL_HPKE_SUITE suite, int role,
825 if (role != OSSL_HPKE_ROLE_SENDER && role != OSSL_HPKE_ROLE_RECEIVER) {
845 ctx->role = role;
937 if (ctx->role != OSSL_HPKE_ROLE_SENDER) {
960 if (ctx->role != OSSL_HPKE_ROLE_SENDER) {
989 if (ctx->role != OSSL_HPKE_ROLE_RECEIVER) {
1059 if (ctx->role == OSSL_HPKE_ROLE_SENDER)
    [all...]
  /src/external/bsd/wpa/dist/wpa_supplicant/dbus/
dbus_new_handlers_wps.c 25 int role; /* 0 - not set, 1 - enrollee, 2 - registrar */ member in struct:wps_start_params
45 "dbus: WPS.Start - Wrong Role type, string required");
47 "Role must be a string");
52 params->role = 1;
54 params->role = 2;
56 wpa_printf(MSG_DEBUG, "dbus: WPS.Start - Unknown role %s", val);
186 if (os_strcmp(key, "Role") == 0)
217 * information about role (enrollee or registrar), authorization method
254 "dbus: WPS.Start - Pin required for registrar role");
256 message, "Pin required for registrar role.")
    [all...]
  /src/crypto/external/apache2/openssl/dist/include/internal/
recordmethod.h 82 * set by |vers|. |role| is 0 for client and 1 for server. |direction|
115 int role, int direction,
  /src/external/bsd/nsd/dist/
util.h 50 * Set the name of the role for the process (for debugging purposes)
52 void log_set_process_role(const char* role);
54 #define log_set_process_role(role) /* empty */
  /src/external/bsd/wpa/dist/src/common/
dpp_auth.c 846 "DPP: Local policy does not allow Configurator role");
855 "DPP: Local policy does not allow Enrollee role");
870 "DPP: Local policy does not allow Configurator/Enrollee role");
875 wpa_printf(MSG_DEBUG, "DPP: Unexpected role in I-capabilities");
877 DPP_EVENT_FAIL "Invalid role in I-capabilities 0x%02x",
1382 u8 role = auth->r_capab & DPP_CAPAB_ROLE_MASK; local
1384 if ((auth->configurator && role != DPP_CAPAB_ENROLLEE) ||
1385 (!auth->configurator && role != DPP_CAPAB_CONFIGURATOR)) {
1387 DPP_EVENT_FAIL "Unexpected role in R-capabilities 0x%02x",
1388 role);
1418 u8 role; local
    [all...]

Completed in 64 milliseconds

1 2 3 4 5