| /src/lib/libpam/modules/pam_ftpusers/ |
| pam_ftpusers.c | 67 int pam_err, found, allow; local 115 allow = (openpam_get_option(pamh, "disallow") == NULL); 117 pam_err = allow ? PAM_SUCCESS : PAM_AUTH_ERR; 119 pam_err = allow ? PAM_AUTH_ERR : PAM_SUCCESS;
|
| /src/sys/external/bsd/drm2/dist/drm/i915/selftests/ |
| i915_selftest.c | 255 bool allow = true; local 259 allow = false; 270 if (allow) 278 if (allow) 283 result = allow;
|
| /src/usr.sbin/mmcformat/ |
| mmcformat.c | 470 uint8_t *allow, uint32_t *blks, uint32_t *params) 477 bzero(allow, 255); 498 allow[format_tp] = 1; /* TODO = supported? */ 694 uint8_t allow[256]; local 890 process_format_caps(caps, caps_len, inquiry, allow, blks, params); 981 if (!allow[format_type]) { 983 process_format_caps(caps, caps_len, 1, allow,
|
| /src/sys/kern/ |
| kern_auth.c | 976 int error, allow, fail; local 988 allow = 0; 996 allow = 1; 1005 if (allow) 1163 * listener denied it, so our only alternative is to supposedly-allow
|
| /src/crypto/external/bsd/heimdal/dist/lib/krb5/ |
| context.c | 1538 * Allow homedir accces 1547 krb5_boolean allow; local 1553 allow = allow_homedir; 1555 return allow; 1568 * @param allow allow if TRUE home directory 1575 krb5_set_home_dir_access(krb5_context context, krb5_boolean allow) 1580 if (allow) 1587 allow_homedir = allow;
|
| /src/external/mpl/bind/dist/bin/named/ |
| controlconf.c | 939 const cfg_obj_t *allow = NULL; local 1023 allow = cfg_tuple_get(control, "allow"); 1024 result = cfg_acl_fromconfig(allow, config, named_g_lctx, 1068 const cfg_obj_t *allow = NULL; local 1097 allow = cfg_tuple_get(control, "allow"); 1098 CHECK(cfg_acl_fromconfig(allow, config, named_g_lctx,
|
| statschannel.c | 3629 const cfg_obj_t *allow = NULL; 3639 allow = cfg_tuple_get(listen_params, "allow"); 3640 if (allow != NULL && cfg_obj_islist(allow)) { 3641 result = cfg_acl_fromconfig(allow, config, named_g_lctx, 3748 const cfg_obj_t *allow = NULL; local 3768 allow = cfg_tuple_get(listen_params, "allow"); 3769 if (allow != NULL && cfg_obj_islist(allow)) [all...] |
| server.c | 2747 * A non-empty 'catalog-zones' statement implies that 'allow-new-zones' 3134 * A non-empty 'catalog-zones' statement implies that 'allow-new-zones' 5381 * Set the "allow-query", "allow-query-cache", "allow-recursion", 5382 * "allow-recursion-on" and "allow-query-cache-on" ACLs if 5394 CHECK(configure_view_acl(vconfig, config, NULL, "allow-query", NULL, 5398 CHECK(configure_view_acl(vconfig, config, NULL, "allow-query-cache", 5401 CHECK(configure_view_acl(vconfig, config, NULL, "allow-query-cache-on" 7880 bool allow = false; local 15576 bool secure, maintain, allow; local [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| quicapitest.c | 662 * List of ciphersuites we do and don't allow in QUIC. 1155 const int *allow = (int *)arg; local 1163 if (*allow == 0) 1180 int flags = 0, allow = 0; local 1189 SSL_CTX_set_cert_verify_callback(cctx, non_io_retry_cert_verify_cb, &allow); 1200 allow = 1;
|
| /src/crypto/external/bsd/openssl/dist/ssl/ |
| t1_lib.c | 948 * For a server we allow the certificate to not be in our list of supported 1307 * Some GOST ciphersuites allow more than one signature algorithms 1506 /* Only allow PSS for TLS 1.3 */ 1574 /* Allow fallback to SHA1 if not strict mode */ 1673 * For historical reasons we will allow ECHDE to be selected by a server 2098 /* We never allow GOST sig algs on the server with TLSv1.3 */ 2108 * We're a client that could negotiate TLSv1.3. We only allow GOST 2208 const uint16_t *allow, size_t allowlen) 2219 for (j = 0, atmp = allow; j < allowlen; j++, atmp++) { 2234 const uint16_t *pref, *allow, *conf local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/ssl/ |
| t1_lib.c | 572 * For a server we allow the certificate to not be in our list of supported 876 * Some GOST ciphersuites allow more than one signature algorithms 1044 /* Only allow PSS for TLS 1.3 */ 1122 /* Allow fallback to SHA1 if not strict mode */ 1224 * For historical reasons we will allow ECHDE to be selected by a server 1618 /* We never allow GOST sig algs on the server with TLSv1.3 */ 1628 * We're a client that could negotiate TLSv1.3. We only allow GOST 1727 const uint16_t *allow, size_t allowlen) 1737 for (j = 0, atmp = allow; j < allowlen; j++, atmp++) { 1752 const uint16_t *pref, *allow, *conf local [all...] |
| /src/external/bsd/ntp/dist/ntpd/ |
| ntp_proto.c | 1018 * NOTRUST (RES_DONTTRUST) do not allow access unless 1842 deadband -= 3; /* allow greater fuzz after volley */ 2104 /* We allow 0org for: */ 2106 action = "Allow"; 3530 int allow; local 3752 * Here, nlist is the number of candidates and allow is the 3759 for (allow = 0; 2 * allow < nlist; allow++) { 3769 if (n >= nlist - allow) [all...] |
| /src/external/bsd/tmux/dist/ |
| input.c | 50 * - Special handling for ESC inside a DCS to allow arbitrary byte sequences to 2580 allow_passthrough = options_get_number(oo, "allow-passthrough"); 2633 options_get_number(wp->options, "allow-set-title") && 2712 options_get_number(wp->options, "allow-set-title") && 2744 if (!options_get_number(ictx->wp->options, "allow-rename")) 3086 const char* allow = "cpqs01234567"; local 3104 if (strchr(allow, p[i]) != NULL && strchr(flags, p[i]) == NULL)
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| t1_lib.c | 1857 * For a server we allow the certificate to not be in our list of supported 2456 * Some GOST ciphersuites allow more than one signature algorithms 2701 /* Only allow PSS for TLS 1.3 */ 2795 /* Allow fallback to SHA1 if not strict mode */ 2903 /* For QUIC, only allow these ciphersuites. */ 2914 * For historical reasons we will allow ECHDE to be selected by a server 3352 /* We never allow GOST sig algs on the server with TLSv1.3 */ 3362 * We're a client that could negotiate TLSv1.3. We only allow GOST 3460 const uint16_t *allow, size_t allowlen) 3471 for (j = 0, atmp = allow; j < allowlen; j++, atmp++) 3486 const uint16_t *pref, *allow, *conf; local [all...] |
| /src/external/mpl/bind/dist/lib/isccfg/ |
| check.c | 558 if (strcasecmp(aclname, "allow-transfer") == 0 && 609 static const char *acls[] = { "allow-proxy", 610 "allow-proxy-on", 611 "allow-query", 612 "allow-query-on", 613 "allow-query-cache", 614 "allow-query-cache-on", 943 * Check allow-recursion and allow-recursion-on acls, and also log a 957 static const char *acls[] = { "allow-recursion", "allow-recursion-on" 6254 const cfg_obj_t *allow; local [all...] |
| /src/external/gpl3/gcc/dist/gcc/cp/ |
| cp-tree.h | 853 explicit ovl_iterator (tree o, bool allow = false) 854 : ovl (o), allow_inner (allow) 949 bool allow; 951 explicit ovl_range (tree t, bool allow = false): t(t), allow(allow) { } 952 ovl_iterator begin() { return ovl_iterator (t, allow); } 953 ovl_iterator end() { return ovl_iterator (NULL_TREE, allow); } 4702 /* True if this is a designated initializer (when we allow initializer-clauses 5714 tf_tst_ok = 1 << 12, /* Allow a typename-specifier to nam 946 bool allow; member in class:ovl_range [all...] |
| /src/external/gpl3/gcc.old/dist/gcc/cp/ |
| cp-tree.h | 828 explicit ovl_iterator (tree o, bool allow = false) 829 : ovl (o), allow_inner (allow) 924 bool allow; 926 explicit ovl_range (tree t, bool allow = false): t(t), allow(allow) { } 927 ovl_iterator begin() { return ovl_iterator (t, allow); } 928 ovl_iterator end() { return ovl_iterator (NULL_TREE, allow); } 2851 // change). We need a module_attachment_p flag, and this will allow 4596 /* True if this is a designated initializer (when we allow initializer-clause 921 bool allow; member in class:ovl_range [all...] |
| /src/external/mpl/bind/dist/lib/dns/ |
| zone.c | 1913 * and zones that allow dynamic updates either by having an update 1914 * policy ("ssutable") or an "allow-update" ACL with a value other than 7255 *inception = now - 3600; /* Allow for clock skew. */ 9502 /* Refuse to allow NSEC3 with NSEC-only keys */ 15153 * We have now canceled everything set the flag to allow exit_check() 16708 * Allow DNSKEY, CDNSKEY, CDS because users should be able to 16995 * Filter out keys we manage but still allow TTL changes. 17595 * Allow DNSKEY, CDNSKEY, CDS because users should be able to 20852 inception = now - 3600; /* Allow for clock skew. */ 22815 bool allow = false local [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| zone.c | 1855 * and zones that allow dynamic updates either by having an update 1856 * policy ("ssutable") or an "allow-update" ACL with a value other than 7381 inception = now - 3600; /* Allow for clock skew. */ 8582 inception = now - 3600; /* Allow for clock skew. */ 9573 inception = now - 3600; /* Allow for clock skew. */ 15035 * We have now canceled everything set the flag to allow exit_check() 20453 inception = now - 3600; /* Allow for clock skew. */ 20553 /* Refuse to allow NSEC3 with NSEC-only keys */ 21666 bool allow = false; local 21676 allow = true [all...] |