HomeSort by: relevance | last modified time | path
    Searched refs:allowed (Results 1 - 25 of 126) sorted by relevancy

1 2 3 4 5 6

  /src/external/bsd/nvi/dist/ex/
ex_stop.c 44 int allowed; local
50 if (sp->gp->scr_suspend(sp, &allowed))
52 if (!allowed)
  /src/tests/fs/vfs/
t_link.c 60 bool sysctl, bool allowed)
93 if (errno != EOPNOTSUPP && allowed)
96 if (!allowed)
141 ATF_TC_FSAPPLY(hardlink_sameuser, "hardlink same user allowed");
142 ATF_TC_FSAPPLY(hardlink_sameuser_sysctl, "hardlink same user sysctl allowed");
143 ATF_TC_FSAPPLY(hardlink_otheruser, "hardlink other user allowed");
145 ATF_TC_FSAPPLY(hardlink_rootuser, "hardlink root user allowed");
146 ATF_TC_FSAPPLY(hardlink_rootuser_sysctl, "hardlink root user sysctl allowed");
  /src/external/bsd/openldap/dist/contrib/slapd-modules/allowed/
Makefile 34 PROGRAMS = allowed.la
52 allowed.la: allowed.lo
  /src/sys/dev/dm/
device-mapper.c 116 * to function which I can call, and if the command is allowed for
131 int allowed; member in struct:cmd_function
133 { .cmd = "version", .fn = NULL, .allowed = 1 },
134 { .cmd = "targets", .fn = dm_list_versions_ioctl, .allowed = 1 },
135 { .cmd = "create", .fn = dm_dev_create_ioctl, .allowed = 0 },
136 { .cmd = "info", .fn = dm_dev_status_ioctl, .allowed = 1 },
137 { .cmd = "mknodes", .fn = dm_dev_status_ioctl, .allowed = 1 },
138 { .cmd = "names", .fn = dm_dev_list_ioctl, .allowed = 1 },
139 { .cmd = "suspend", .fn = dm_dev_suspend_ioctl, .allowed = 0 },
140 { .cmd = "remove", .fn = dm_dev_remove_ioctl, .allowed = 0 }
    [all...]
  /src/external/apache2/llvm/dist/llvm/utils/vim/syntax/
mir.vim 18 " The first document of a file is allowed to contain an LLVM IR module inside
21 " FIXME: This should only be allowed for the first document of the file
  /src/games/gomoku/
bdisp.c 269 get_key(const char *allowed)
274 if (allowed == NULL || ch == '\0' ||
275 strchr(allowed, ch) != NULL)
  /src/sys/external/mit/xen-include-public/dist/xen/include/public/xsm/
flask_op.h 58 uint32_t allowed; member in struct:xen_flask_access
  /src/external/bsd/wpa/dist/src/radius/
radius_das.c 41 u8 allowed[] = { local
67 attr = radius_msg_find_unlisted_attr(msg, allowed);
203 u8 allowed[] = { local
237 attr = radius_msg_find_unlisted_attr(msg, allowed);
  /src/sys/external/bsd/drm2/drm/
drm_vma_manager.c 319 const bool allowed =
323 return allowed;
316 const bool allowed = local
  /src/external/gpl3/gcc.old/dist/libphobos/src/std/
variant.d 167 * and with the list of allowed types (`AllowedTypes`). If
177 The list of allowed types. If empty, any type is allowed.
194 public template allowed(T)
196 enum bool allowed
654 static assert(allowed!(T), "Cannot store a " ~ T.stringof
661 if (!is(T : VariantN) && Types.length > 0 && allSatisfy!(allowed, Types))
695 static assert(allowed!(T), "Cannot store a " ~ T.stringof
738 if (!is(T : VariantN) && Types.length > 0 && allSatisfy!(allowed, Types))
793 static assert(allowed!(T), "Cannot store a " ~ T.stringo
    [all...]
  /src/external/gpl3/gcc.old/dist/gcc/
except.cc 445 gen_eh_region_allowed (eh_region outer, tree allowed)
448 region->u.allowed.type_list = allowed;
450 for (; allowed ; allowed = TREE_CHAIN (allowed))
451 add_type_for_runtime (TREE_VALUE (allowed));
573 new_r->u.allowed.type_list = old_r->u.allowed.type_list;
574 if (old_r->u.allowed.label
    [all...]
except.h 142 /* A TREE_LIST of runtime type objects allowed to pass. */
153 } GTY ((tag ("ERT_ALLOWED_EXCEPTIONS"))) allowed; member in union:eh_region_u
  /src/external/bsd/openresolv/dist/
resolvconf.in 709 allowed=
730 allowed="$allowed${allowed:+ }$i"
735 for ii in $allowed; do
742 [ -z "$allowed" ] || echo "$allowed"
1171 "$x"|"$x"*|*"$x"|*"$x"*) error_exit "$x not allowed in key name";;
1177 "$x not allowed at start of key name";;
  /src/tests/net/if_wg/
common.sh 165 --allowed-ips=$allowedips $pskopt
166 atf_check -s exit:0 -o match:"allowed-ips: $allowedips" \
  /src/usr.bin/make/unit-tests/
cond-op.mk 55 # Surprisingly, the ampersand and pipe are allowed in bare strings.
69 # operators, TOK_AND, TOK_OR or TOK_RPAREN are allowed.
varmod-loop-varname.mk 14 # Since var.c 1.907 from 2021-04-04, a '$' is no longer allowed in the
84 # Since var.c 1.907 from 2021-04-04, a '$' is no longer allowed in the
cond-token-plain.mk 50 # TODO: Does this mean that more syntactic variants are allowed here?
126 # In bare words, even undefined variables are allowed. Without the bare
127 # words, undefined variables are not allowed. That feels inconsistent.
209 # modifier ':?:' allowed unquoted string literals for the rest of the
deptgt.mk 42 # An expression based on an undefined variable is allowed on both sides of
  /src/bin/dd/
args.c 440 u_int allowed; member in struct:ioflag
488 if ((cp->allowed & flagtype) == 0) {
  /src/external/bsd/wpa/dist/hs20/client/
Android.mk 19 # build (e.g., "mm -B" failed to build, but following that with "mm" allowed
  /src/external/gpl3/gcc.old/dist/libgfortran/io/
format.c 763 "descriptor not allowed");
771 "descriptor not allowed");
964 /* Look for optional exponent, not allowed for FMT_D */
1004 allowed if -std=legacy, otherwise an error occurs. */
1488 allowed if we've seen a data descriptor since the
  /src/external/cddl/osnet/dist/common/acl/
acl_common.c 133 uint32_t allowed; member in struct:acevals
776 vals->allowed = ACE_MASK_UNDEFINED;
1055 if (vals->allowed != (vals->denied ^ flips)) {
1064 error = ace_allow_to_mode(vals->allowed, &dest->a_perm, isdir);
1187 error = ace_mask_to_mode(list->group_obj.allowed,
1404 /* no more than one allowed per aclent_t */
1405 if (vals->allowed != ACE_MASK_UNDEFINED) {
1409 vals->allowed = acep->a_access_mask;
  /src/external/bsd/cron/dist/
crontab.c 67 static int allowed(const char *, const char *, const char *);
106 if (!allowed(RealUser, CRON_ALLOW, CRON_DENY)) {
108 "You `%s' are not allowed to use this program `%s'\n",
111 log_it(RealUser, Pid, "AUTH", "crontab command not allowed");
830 /* int allowed(const char *username, const char *allow_file, const char *deny_file)
833 * root is always allowed.
836 allowed(const char *username, const char *allow_file, const char *deny_file) { function
  /src/external/bsd/wpa/dist/src/common/
hw_features_common.c 116 int allowed[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 140, local
132 wpa_printf(MSG_ERROR, "Channel %d is not allowed as primary",
141 /* Verify that HT40 secondary channel is an allowed 20 MHz
146 wpa_printf(MSG_ERROR, "HT40 secondary channel %d not allowed",
152 * Verify that HT40 primary,secondary channel pair is allowed per
155 * the list of allowed channels (already checked above).
163 for (k = 0; k < ARRAY_SIZE(allowed); k++) {
164 if (first == allowed[k]) {
170 wpa_printf(MSG_ERROR, "HT40 channel pair (%d, %d) not allowed",
963 /* check if channel is allowed to be used as primary *
    [all...]
  /src/external/gpl3/autoconf/dist/bin/
autom4te.in 526 # Load the forbidden/allowed patterns.
535 my $allowed = join ('|', map { /^allow:([^:]+)/ } @patterns) || "^\$";
540 verb "allowed tokens: $allowed";
581 if !/^$/ && /$forbidden/o && !/$allowed/o && ! exists $prohibited{$_};

Completed in 85 milliseconds

1 2 3 4 5 6