| /src/libexec/telnetd/ |
| sys_term.c | 721 static const char *reject[] = { local 744 for(p = reject; *p; p++)
|
| /src/external/bsd/ppp/dist/pppd/plugins/pppol2tp/ |
| pppol2tp.c | 319 int reject; local 361 /* Look for Configure-Ack or Configure-Reject code */ 364 reject = (buf[0] == CONFREJ); 389 if (reject) {
|
| /src/bin/ksh/ |
| syn.c | 59 static int reject; /* token(cf) gets symbol again */ variable 62 #define REJECT (reject = 1) 63 #define ACCEPT (reject = 0) 65 ((reject) ? (ACCEPT, symbol) : (symbol = yylex(cf))) 67 ((reject) ? (symbol) : (REJECT, symbol = yylex(cf))) 100 REJECT; 118 REJECT; 157 REJECT; [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| cmp_client_test.c | 242 static int test_exec_CR_ses(int implicit_confirm, int granted, int reject) 250 reject ? OSSL_CMP_PKIBODY_CERTCONF : -1); 251 fixture->expected = reject ? OSSL_CMP_PKISTATUS_rejection 260 && test_exec_CR_ses(0, 0, 1 /* reject */); 327 int *reject = OSSL_CMP_CTX_get_certConf_cb_arg(ctx); local 329 if (*reject) { 336 static int test_exec_P10CR_ses(int reject) 343 fixture->expected = reject ? OSSL_CMP_PKISTATUS_rejection 349 || !TEST_true(OSSL_CMP_CTX_set_certConf_cb_arg(ctx, &reject))) {
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| cmp_client_test.c | 230 static int test_exec_CR_ses(int implicit_confirm, int granted, int reject) 238 reject ? OSSL_CMP_PKIBODY_CERTCONF : -1); 239 fixture->expected = reject ? OSSL_CMP_PKISTATUS_rejection 248 && test_exec_CR_ses(0, 0, 1 /* reject */); 313 int *reject = OSSL_CMP_CTX_get_certConf_cb_arg(ctx); local 315 if (*reject) { 322 static int test_exec_P10CR_ses(int reject) 329 fixture->expected = reject ? OSSL_CMP_PKISTATUS_rejection 335 || !TEST_true(OSSL_CMP_CTX_set_certConf_cb_arg(ctx, &reject))) {
|
| /src/external/bsd/wpa/dist/src/p2p/ |
| p2p_pd.c | 572 enum p2p_status_code reject = P2P_SC_FAIL_INCOMPATIBLE_PARAMS; local 644 "PD request for unknown P2P Group ID - reject"); 657 reject = P2P_SC_FAIL_INVALID_PARAMS; 684 * TODO: since we don't support multiple PD, reject PD request 719 reject = P2P_SC_SUCCESS; 736 reject = P2P_SC_FAIL_INCOMPATIBLE_PARAMS; 743 reject = P2P_SC_FAIL_INCOMPATIBLE_PARAMS; 768 reject = P2P_SC_FAIL_INCOMPATIBLE_PARAMS; 776 reject = P2P_SC_FAIL_INCOMPATIBLE_PARAMS; 779 reject = P2P_SC_FAIL_UNABLE_TO_ACCOMMODATE [all...] |
| /src/external/bsd/iscsi/dist/src/lib/ |
| target.c | 141 iscsi_reject_t reject; local 144 iscsi_err(__FILE__, __LINE__, "reject %x\n", reason); 145 reject.reason = reason; 146 reject.length = ISCSI_HEADER_LEN; 147 reject.StatSN = ++(sess->StatSN); 148 reject.ExpCmdSN = sess->ExpCmdSN; 149 reject.MaxCmdSN = sess->MaxCmdSN; 150 reject.DataSN = 0; /* SNACK not yet implemented */ 152 if (iscsi_reject_encap(rsp_header, &reject) != 0) { 780 "Reject", text_out, &len_out, 2048 [all...] |
| initiator.c | 2806 iscsi_reject_t reject; local 2812 if (iscsi_reject_decap(header, &reject) != 0) { 2816 if (reject.length != ISCSI_HEADER_LEN) { 2817 iscsi_err(__FILE__, __LINE__, "reject.length %u\n", 2818 reject.length); 2831 iscsi_err(__FILE__, __LINE__, "REJECT PDU: tag %#x (reason %#x)\n", tag, reject.reason);
|
| /src/external/gpl3/gcc/dist/gcc/lto/ |
| lto-partition.cc | 878 const char reject[] = "$"; local 881 const char reject[] = "."; 884 const char reject[] = ".$"; 891 size_t off = strcspn (match, reject);
|
| /src/external/gpl3/gcc/dist/gcc/ |
| recog.h | 57 unsigned int reject : 16; member in struct:operand_alternative
|
| reload.cc | 3054 /* REJECT is a count of how undesirable this alternative says it is 3056 then REJECT is ignored, but otherwise it gets this much 3060 int reject = 0; 3228 reject += 6; 3232 reject = 600; 3273 offsettable address was expected, then we must reject 3330 operand, we don't know how to do that. So reject this 3405 reject that case. */ 3618 /* If we can't reload this value at all, reject this 3628 reject = 600 3047 int reject = 0; local [all...] |
| /src/external/gpl3/gcc.old/dist/gcc/lto/ |
| lto-partition.cc | 878 const char reject[] = "$"; local 881 const char reject[] = "."; 884 const char reject[] = ".$"; 891 size_t off = strcspn (match, reject);
|
| /src/external/gpl3/gcc.old/dist/gcc/ |
| recog.h | 53 unsigned int reject : 16; member in struct:operand_alternative
|
| reload.cc | 3053 /* REJECT is a count of how undesirable this alternative says it is 3055 then REJECT is ignored, but otherwise it gets this much 3059 int reject = 0; 3233 reject += 6; 3237 reject = 600; 3278 offsettable address was expected, then we must reject 3335 operand, we don't know how to do that. So reject this 3410 reject that case. */ 3623 /* If we can't reload this value at all, reject this 3633 reject = 600 3046 int reject = 0; local [all...] |
| /src/crypto/external/apache2/openssl/dist/include/crypto/ |
| x509.h | 154 STACK_OF(ASN1_OBJECT) *reject; /* rejected uses */ member in struct:x509_cert_aux_st
|
| /src/crypto/external/bsd/openssl/dist/include/crypto/ |
| x509.h | 154 STACK_OF(ASN1_OBJECT) *reject; /* rejected uses */ member in struct:x509_cert_aux_st
|
| /src/crypto/external/bsd/openssl.old/dist/include/crypto/ |
| x509.h | 140 STACK_OF(ASN1_OBJECT) *reject; /* rejected uses */ member in struct:x509_cert_aux_st
|
| /src/external/bsd/dhcpcd/dist/src/ |
| if-options.c | 165 {"reject", required_argument, NULL, O_REJECT}, 518 uint8_t *request[], uint8_t *require[], uint8_t *no[], uint8_t *reject[]) 534 *reject = ifo->rejectmasknd; 547 *reject = ifo->rejectmask6; 569 *reject = ifo->rejectmask; 657 uint8_t *request, *require, *no, *reject; local 822 &request, &require, &no, &reject); 825 make_option_mask(d, dl, od, odl, reject, arg, -1) != 0) 836 &request, &require, &no, &reject); 837 if (make_option_mask(d, dl, od, odl, reject, arg, 1) != 0 | [all...] |
| /src/sys/dev/iscsi/ |
| iscsi_pdu.h | 350 /* Reject */ 433 reject_pdu_t reject; member in union:pdu_header_s::__anon3151
|
| /src/external/apache2/mDNSResponder/dist/mDNSPosix/ |
| mDNSPosix.c | 431 mDNSBool reject; local 477 reject = mDNSfalse; 485 if (packetInfo.ipi_ifname[0] != 0) reject = (strcmp(packetInfo.ipi_ifname, intf->intfName) != 0); 486 else if (packetInfo.ipi_ifindex != -1) reject = (packetInfo.ipi_ifindex != intf->index); 492 if (reject && !mDNSAddrIsDNSMulticast(&destAddr)) 508 reject = mDNSfalse; 511 if (reject)
|
| /src/external/bsd/flex/dist/src/ |
| main.c | 62 int yymore_used, reject, real_reject, continued_action, in_rule; 185 if (spprdflt && !reject && rule_useful[default_rule]) 562 "REJECT", 959 do_yylineno = yytext_is_array = in_rule = reject = do_stdinit = 1525 reject = true; 1527 reject = false; 1557 if (reject) 1560 ("REJECT entails a large performance penalty\n")); 1568 if (reject) 1572 reject = true 61 int yymore_used, reject, real_reject, continued_action, in_rule; variable [all...] |
| /src/external/gpl2/gmake/dist/ |
| read.c | 1225 int reject = 0; 1249 reject = 1; 1259 reject = 1; 1264 if (reject) 1268 if (!reject) 1221 int reject = 0; local
|
| /src/external/bsd/nsd/dist/ |
| server.c | 5531 int reject = 0; local 5547 reject = data->nsd->options->tcp_reject_overflow; 5548 if (!reject) { 5594 if (reject) { 5703 * If tcp-reject-overflow is enabled, however, then we do not
|
| /src/sys/dev/ic/ |
| aic79xx.c | 2281 printf("Expected QAS Reject Busfree\n"); 4164 int reject; local 4170 reject = FALSE; 4217 reject = TRUE; 4261 reject = TRUE; 4292 reject = TRUE; 4323 * request, reject it. 4326 reject = TRUE; 4366 if (sending_reply == FALSE && reject == FALSE) { 4391 reject = TRUE [all...] |
| /src/external/gpl3/gcc/dist/gcc/config/aarch64/ |
| aarch64-early-ra.cc | 682 int reject = 0; local 684 reject += op_alt[opno].reject; 685 return reject; 1807 auto reject = count_rejects (op_alt); local 1814 if (reject == 0 && op_alt[opno].matched >= 0) 1838 if (reject == 0) 2501 // Reject combinations that are impossible to allocate. 3133 // Return -1 on failure, otherwise return a ?/!-style reject count. 3134 // The reject count doesn't model the moves, just the internal alternativ [all...] |