| /src/external/bsd/nvi/dist/ex/ |
| ex_stop.c | 44 int allowed; local 50 if (sp->gp->scr_suspend(sp, &allowed)) 52 if (!allowed)
|
| /src/tests/fs/vfs/ |
| t_link.c | 60 bool sysctl, bool allowed) 93 if (errno != EOPNOTSUPP && allowed) 96 if (!allowed) 141 ATF_TC_FSAPPLY(hardlink_sameuser, "hardlink same user allowed"); 142 ATF_TC_FSAPPLY(hardlink_sameuser_sysctl, "hardlink same user sysctl allowed"); 143 ATF_TC_FSAPPLY(hardlink_otheruser, "hardlink other user allowed"); 145 ATF_TC_FSAPPLY(hardlink_rootuser, "hardlink root user allowed"); 146 ATF_TC_FSAPPLY(hardlink_rootuser_sysctl, "hardlink root user sysctl allowed");
|
| /src/external/bsd/openldap/dist/contrib/slapd-modules/allowed/ |
| Makefile | 34 PROGRAMS = allowed.la 52 allowed.la: allowed.lo
|
| /src/sys/dev/dm/ |
| device-mapper.c | 116 * to function which I can call, and if the command is allowed for 131 int allowed; member in struct:cmd_function 133 { .cmd = "version", .fn = NULL, .allowed = 1 }, 134 { .cmd = "targets", .fn = dm_list_versions_ioctl, .allowed = 1 }, 135 { .cmd = "create", .fn = dm_dev_create_ioctl, .allowed = 0 }, 136 { .cmd = "info", .fn = dm_dev_status_ioctl, .allowed = 1 }, 137 { .cmd = "mknodes", .fn = dm_dev_status_ioctl, .allowed = 1 }, 138 { .cmd = "names", .fn = dm_dev_list_ioctl, .allowed = 1 }, 139 { .cmd = "suspend", .fn = dm_dev_suspend_ioctl, .allowed = 0 }, 140 { .cmd = "remove", .fn = dm_dev_remove_ioctl, .allowed = 0 } [all...] |
| /src/external/apache2/llvm/dist/llvm/utils/vim/syntax/ |
| mir.vim | 18 " The first document of a file is allowed to contain an LLVM IR module inside 21 " FIXME: This should only be allowed for the first document of the file
|
| /src/games/gomoku/ |
| bdisp.c | 269 get_key(const char *allowed) 274 if (allowed == NULL || ch == '\0' || 275 strchr(allowed, ch) != NULL)
|
| /src/sys/external/mit/xen-include-public/dist/xen/include/public/xsm/ |
| flask_op.h | 58 uint32_t allowed; member in struct:xen_flask_access
|
| /src/external/bsd/wpa/dist/src/radius/ |
| radius_das.c | 41 u8 allowed[] = { local 67 attr = radius_msg_find_unlisted_attr(msg, allowed); 203 u8 allowed[] = { local 237 attr = radius_msg_find_unlisted_attr(msg, allowed);
|
| /src/sys/external/bsd/drm2/drm/ |
| drm_vma_manager.c | 319 const bool allowed = 323 return allowed; 316 const bool allowed = local
|
| /src/external/gpl3/gcc.old/dist/libphobos/src/std/ |
| variant.d | 167 * and with the list of allowed types (`AllowedTypes`). If 177 The list of allowed types. If empty, any type is allowed. 194 public template allowed(T) 196 enum bool allowed 654 static assert(allowed!(T), "Cannot store a " ~ T.stringof 661 if (!is(T : VariantN) && Types.length > 0 && allSatisfy!(allowed, Types)) 695 static assert(allowed!(T), "Cannot store a " ~ T.stringof 738 if (!is(T : VariantN) && Types.length > 0 && allSatisfy!(allowed, Types)) 793 static assert(allowed!(T), "Cannot store a " ~ T.stringo [all...] |
| /src/external/gpl3/gcc.old/dist/gcc/ |
| except.cc | 445 gen_eh_region_allowed (eh_region outer, tree allowed) 448 region->u.allowed.type_list = allowed; 450 for (; allowed ; allowed = TREE_CHAIN (allowed)) 451 add_type_for_runtime (TREE_VALUE (allowed)); 573 new_r->u.allowed.type_list = old_r->u.allowed.type_list; 574 if (old_r->u.allowed.label [all...] |
| except.h | 142 /* A TREE_LIST of runtime type objects allowed to pass. */ 153 } GTY ((tag ("ERT_ALLOWED_EXCEPTIONS"))) allowed; member in union:eh_region_u
|
| /src/external/bsd/openresolv/dist/ |
| resolvconf.in | 709 allowed= 730 allowed="$allowed${allowed:+ }$i" 735 for ii in $allowed; do 742 [ -z "$allowed" ] || echo "$allowed" 1171 "$x"|"$x"*|*"$x"|*"$x"*) error_exit "$x not allowed in key name";; 1177 "$x not allowed at start of key name";;
|
| /src/tests/net/if_wg/ |
| common.sh | 165 --allowed-ips=$allowedips $pskopt 166 atf_check -s exit:0 -o match:"allowed-ips: $allowedips" \
|
| /src/usr.bin/make/unit-tests/ |
| cond-op.mk | 55 # Surprisingly, the ampersand and pipe are allowed in bare strings. 69 # operators, TOK_AND, TOK_OR or TOK_RPAREN are allowed.
|
| varmod-loop-varname.mk | 14 # Since var.c 1.907 from 2021-04-04, a '$' is no longer allowed in the 84 # Since var.c 1.907 from 2021-04-04, a '$' is no longer allowed in the
|
| cond-token-plain.mk | 50 # TODO: Does this mean that more syntactic variants are allowed here? 126 # In bare words, even undefined variables are allowed. Without the bare 127 # words, undefined variables are not allowed. That feels inconsistent. 209 # modifier ':?:' allowed unquoted string literals for the rest of the
|
| deptgt.mk | 42 # An expression based on an undefined variable is allowed on both sides of
|
| /src/bin/dd/ |
| args.c | 440 u_int allowed; member in struct:ioflag 488 if ((cp->allowed & flagtype) == 0) {
|
| /src/external/bsd/wpa/dist/hs20/client/ |
| Android.mk | 19 # build (e.g., "mm -B" failed to build, but following that with "mm" allowed
|
| /src/external/gpl3/gcc.old/dist/libgfortran/io/ |
| format.c | 763 "descriptor not allowed"); 771 "descriptor not allowed"); 964 /* Look for optional exponent, not allowed for FMT_D */ 1004 allowed if -std=legacy, otherwise an error occurs. */ 1488 allowed if we've seen a data descriptor since the
|
| /src/external/cddl/osnet/dist/common/acl/ |
| acl_common.c | 133 uint32_t allowed; member in struct:acevals 776 vals->allowed = ACE_MASK_UNDEFINED; 1055 if (vals->allowed != (vals->denied ^ flips)) { 1064 error = ace_allow_to_mode(vals->allowed, &dest->a_perm, isdir); 1187 error = ace_mask_to_mode(list->group_obj.allowed, 1404 /* no more than one allowed per aclent_t */ 1405 if (vals->allowed != ACE_MASK_UNDEFINED) { 1409 vals->allowed = acep->a_access_mask;
|
| /src/external/bsd/cron/dist/ |
| crontab.c | 67 static int allowed(const char *, const char *, const char *); 106 if (!allowed(RealUser, CRON_ALLOW, CRON_DENY)) { 108 "You `%s' are not allowed to use this program `%s'\n", 111 log_it(RealUser, Pid, "AUTH", "crontab command not allowed"); 830 /* int allowed(const char *username, const char *allow_file, const char *deny_file) 833 * root is always allowed. 836 allowed(const char *username, const char *allow_file, const char *deny_file) { function
|
| /src/external/bsd/wpa/dist/src/common/ |
| hw_features_common.c | 116 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 140, local 132 wpa_printf(MSG_ERROR, "Channel %d is not allowed as primary", 141 /* Verify that HT40 secondary channel is an allowed 20 MHz 146 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed", 152 * Verify that HT40 primary,secondary channel pair is allowed per 155 * the list of allowed channels (already checked above). 163 for (k = 0; k < ARRAY_SIZE(allowed); k++) { 164 if (first == allowed[k]) { 170 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed", 963 /* check if channel is allowed to be used as primary * [all...] |
| /src/external/gpl3/autoconf/dist/bin/ |
| autom4te.in | 526 # Load the forbidden/allowed patterns. 535 my $allowed = join ('|', map { /^allow:([^:]+)/ } @patterns) || "^\$"; 540 verb "allowed tokens: $allowed"; 581 if !/^$/ && /$forbidden/o && !/$allowed/o && ! exists $prohibited{$_};
|