| /netbsd-src/external/gpl3/gcc/dist/gcc/ |
| H A D | tree-sra.cc | 131 struct access struct 151 struct access *next_grp; argument 155 struct access *group_representative; argument 159 struct access *parent; argument 163 struct access *first_child; argument 167 struct access *next_sibling; argument 178 struct access *next_rhs_queued, *next_lhs_queued; argument 268 typedef struct access *access_p; argument 272 static object_allocator<struct access> access_pool ("SRA accesses"); 281 struct access *lacc, *racc; [all …]
|
| H A D | ipa-sra.cc | 633 dump_gensum_access (FILE *f, gensum_param_access *access, unsigned indent) in dump_gensum_access() argument 639 access->offset); in dump_gensum_access() 640 fprintf (f, ", size: " HOST_WIDE_INT_PRINT_DEC, access->size); in dump_gensum_access() 642 print_generic_expr (f, access->type); in dump_gensum_access() 644 print_generic_expr (f, access->alias_ptr_type); in dump_gensum_access() 645 fprintf (f, ", nonarg: %u, reverse: %u\n", access->nonarg, access->reverse); in dump_gensum_access() 646 for (gensum_param_access *ch = access->first_child; in dump_gensum_access() 656 dump_isra_access (FILE *f, param_access *access) in dump_isra_access() argument 658 fprintf (f, " * Access to unit offset: %u", access->unit_offset); in dump_isra_access() 659 fprintf (f, ", unit size: %u", access->unit_size); in dump_isra_access() [all …]
|
| /netbsd-src/external/gpl3/gcc.old/dist/gcc/ |
| H A D | tree-sra.c | 131 struct access struct 151 struct access *next_grp; argument 155 struct access *group_representative; argument 159 struct access *parent; argument 163 struct access *first_child; argument 167 struct access *next_sibling; argument 178 struct access *next_rhs_queued, *next_lhs_queued; argument 265 typedef struct access *access_p; argument 269 static object_allocator<struct access> access_pool ("SRA accesses"); 278 struct access *lacc, *racc; [all …]
|
| H A D | ipa-sra.c | 620 dump_gensum_access (FILE *f, gensum_param_access *access, unsigned indent) in dump_gensum_access() argument 626 access->offset); in dump_gensum_access() 627 fprintf (f, ", size: " HOST_WIDE_INT_PRINT_DEC, access->size); in dump_gensum_access() 629 print_generic_expr (f, access->type); in dump_gensum_access() 631 print_generic_expr (f, access->alias_ptr_type); in dump_gensum_access() 632 fprintf (f, ", nonarg: %u, reverse: %u\n", access->nonarg, access->reverse); in dump_gensum_access() 633 for (gensum_param_access *ch = access->first_child; in dump_gensum_access() 643 dump_isra_access (FILE *f, param_access *access) in dump_isra_access() argument 645 fprintf (f, " * Access to unit offset: %u", access->unit_offset); in dump_isra_access() 646 fprintf (f, ", unit size: %u", access->unit_size); in dump_isra_access() [all …]
|
| /netbsd-src/external/cddl/dtracetoolkit/dist/Examples/ |
| H A D | tcl_syscolors_example.txt | 59 [2;32m 0 16624 24 syscall -> access[0m 60 [2;32m 0 16624 10 syscall <- access[0m 61 [2;32m 0 16624 7 syscall -> access[0m 62 [2;32m 0 16624 10 syscall <- access[0m 63 [2;32m 0 16624 7 syscall -> access[0m 64 [2;32m 0 16624 11 syscall <- access[0m 65 [2;32m 0 16624 7 syscall -> access[0m 66 [2;32m 0 16624 13 syscall <- access[0m 67 [2;32m 0 16624 7 syscall -> access[0m 68 [2;32m 0 16624 14 syscall <- access[0m [all …]
|
| /netbsd-src/external/cddl/dtracetoolkit/dist/Docs/Examples/ |
| H A D | tcl_syscolors_example.txt | 59 [2;32m 0 16624 24 syscall -> access[0m 60 [2;32m 0 16624 10 syscall <- access[0m 61 [2;32m 0 16624 7 syscall -> access[0m 62 [2;32m 0 16624 10 syscall <- access[0m 63 [2;32m 0 16624 7 syscall -> access[0m 64 [2;32m 0 16624 11 syscall <- access[0m 65 [2;32m 0 16624 7 syscall -> access[0m 66 [2;32m 0 16624 13 syscall <- access[0m 67 [2;32m 0 16624 7 syscall -> access[0m 68 [2;32m 0 16624 14 syscall <- access[0m [all …]
|
| /netbsd-src/external/mit/isl/dist/ |
| H A D | isl_flow.c | 1504 isl_union_map *access[isl_access_end]; member 1513 __isl_take isl_union_access_info *access) in isl_union_access_info_free() argument 1517 if (!access) in isl_union_access_info_free() 1521 isl_union_map_free(access->access[i]); in isl_union_access_info_free() 1522 isl_schedule_free(access->schedule); in isl_union_access_info_free() 1523 isl_union_map_free(access->schedule_map); in isl_union_access_info_free() 1524 free(access); in isl_union_access_info_free() 1531 isl_ctx *isl_union_access_info_get_ctx(__isl_keep isl_union_access_info *access) in isl_union_access_info_get_ctx() argument 1533 if (!access) in isl_union_access_info_get_ctx() 1535 return isl_union_map_get_ctx(access->access[isl_access_sink]); in isl_union_access_info_get_ctx() [all …]
|
| /netbsd-src/external/bsd/openldap/dist/tests/data/ |
| H A D | slapd-acl.conf | 29 access to dn.exact="" attrs=objectClass 31 access to * 53 access to attrs=objectclass 58 access to filter="(objectclass=person)" attrs=userpassword 62 access to dn.exact="cn=Mark Elliot,ou=Alumni Association,ou=People,dc=example,dc=com" 67 access to dn.exact="cn=Mark Elliot,ou=Alumni Association,ou=People,dc=example,dc=com" 72 access to dn.exact="cn=Mark Elliot,ou=Alumni Association,ou=People,dc=example,dc=com" 76 access to dn.exact="cn=John Doe,ou=Information Technology Division,ou=People,dc=example,dc=com" 81 access to dn.exact="cn=John Doe,ou=Information Technology Division,ou=People,dc=example,dc=com" 86 access to dn.exact="cn=John Doe,ou=Information Technology Division,ou=People,dc=example,dc=com" [all …]
|
| H A D | slapd-emptydn.conf | 26 access to dn.exact="" 29 access to dn.exact="cn=Subschema" 49 access to attrs=userPassword 54 access to dn.subtree="dc=example,dc=com" 59 access to dn.subtree="cn=Monitor" 72 access to attrs=userPassword 76 access to dn.subtree=""
|
| H A D | slapd-dds.conf | 56 access to attrs=userPassword 60 access to dn.base="ou=Groups,dc=example,dc=com" 64 access to dn.onelevel="ou=Groups,dc=example,dc=com" 69 access to dn.onelevel="ou=Groups,dc=example,dc=com" 73 access to dn.onelevel="ou=Groups,dc=example,dc=com" 77 access to dn.onelevel="ou=Groups,dc=example,dc=com" 82 access to *
|
| H A D | slapd-valregex.conf | 29 access to dn.exact="" attrs=objectClass 31 access to * 53 access to attrs=userPassword 57 access to attrs=sn val.regex="^(.*)$" 61 access to attrs=sn val.regex="." 64 access to attrs=sn
|
| /netbsd-src/external/bsd/openldap/dist/doc/guide/admin/ |
| H A D | access-control.sdf | 10 controlling the kinds of access granted to the directory becomes more and more 13 to control access to other services, inappropriate access to the directory may 21 The default access control policy is allow read by all clients. Regardless of 22 what access control policy is defined, the {{rootdn}} is always allowed full 29 follow with some examples and recommendations. See {{slapd.access}}(5) for 35 access configuration file directive. The general form of an 36 access line is: 38 > <access directive> ::= access to <what> 39 > [by <who> [<access>] [<control>] ]+ 57 > <access> ::= [self]{<level>|<priv>} [all …]
|
| /netbsd-src/external/gpl3/gcc/dist/gcc/rtl-ssa/ |
| H A D | access-utils.h | 100 set_with_nondebug_insn_uses (const access_info *access) in set_with_nondebug_insn_uses() argument 102 if (access->is_set_with_nondebug_insn_uses ()) in set_with_nondebug_insn_uses() 104 return static_cast<const set_info *> (access); in set_with_nondebug_insn_uses() 110 set_with_nondebug_insn_uses (access_info *access) in set_with_nondebug_insn_uses() argument 112 if (access->is_set_with_nondebug_insn_uses ()) in set_with_nondebug_insn_uses() 113 return static_cast<set_info *> (access); in set_with_nondebug_insn_uses() 138 access_insn (const access_info *access) in access_insn() argument 141 if (auto *def = dyn_cast<const def_info *> (access)) in access_insn() 143 return as_a<const use_info *> (access)->insn (); in access_insn() 149 access_value (const access_info *access) in access_value() argument [all …]
|
| /netbsd-src/external/bsd/kyua-cli/dist/utils/fs/ |
| H A D | auto_cleaners_test.cpp | 53 ATF_REQUIRE(::access("root", X_OK) == 0); in ATF_TEST_CASE_BODY() 59 ATF_REQUIRE(::access("root", X_OK) == 0); in ATF_TEST_CASE_BODY() 61 ATF_REQUIRE(::access("root", X_OK) == -1); in ATF_TEST_CASE_BODY() 74 ATF_REQUIRE(::access("root", X_OK) == 0); in ATF_TEST_CASE_BODY() 77 ATF_REQUIRE(::access("root", X_OK) == -1); in ATF_TEST_CASE_BODY() 91 ATF_REQUIRE(::access((fs::path("tmp") / path_template).c_str(), in ATF_TEST_CASE_BODY() 95 ATF_REQUIRE(::access(auto_directory.directory().c_str(), X_OK) == 0); in ATF_TEST_CASE_BODY() 110 ATF_REQUIRE(::access(file.c_str(), R_OK) == 0); in ATF_TEST_CASE_BODY() 116 ATF_REQUIRE(::access(file.c_str(), R_OK) == 0); in ATF_TEST_CASE_BODY() 118 ATF_REQUIRE(::access(file.c_str(), R_OK) == -1); in ATF_TEST_CASE_BODY() [all …]
|
| /netbsd-src/external/mpl/dhcp/bind/dist/lib/isc/ |
| H A D | fsaccess.c | 37 isc_fsaccess_add(int trustee, int permission, isc_fsaccess_t *access) { in isc_fsaccess_add() argument 42 *access |= permission; in isc_fsaccess_add() 46 *access |= (permission << GROUP); in isc_fsaccess_add() 50 *access |= (permission << OTHER); in isc_fsaccess_add() 55 isc_fsaccess_remove(int trustee, int permission, isc_fsaccess_t *access) { in isc_fsaccess_remove() argument 60 *access &= ~permission; in isc_fsaccess_remove() 64 *access &= ~(permission << GROUP); in isc_fsaccess_remove() 68 *access &= ~(permission << OTHER); in isc_fsaccess_remove() 73 check_bad_bits(isc_fsaccess_t access, bool is_dir) { in check_bad_bits() argument 96 if ((access & bits) != 0) { in check_bad_bits()
|
| /netbsd-src/sys/arch/ews4800mips/stand/common/ |
| H A D | mem.c | 147 mem_write(uint32_t dst_addr, uint32_t access, uint32_t stride, in mem_write() argument 153 (void *)dst_addr, access, stride, count); in mem_write() 158 switch (access) { in mem_write() 160 printf("invalid %dbyte access.\n", access); in mem_write() 190 mem_read(uint32_t src_addr, uint32_t access, uint32_t stride, in mem_read() argument 197 (void *)src_addr, access, stride, count); in mem_read() 204 switch (access) { in mem_read() 206 printf("invalid %dbyte access.\n", access); in mem_read() 222 switch (access) { in mem_read() 224 printf("invalid %dbyte access.\n", access); in mem_read()
|
| /netbsd-src/external/bsd/unbound/dist/testdata/ |
| H A D | local_acl_taglist_action.rpl | 9 access-control: 10.10.10.0/24 allow 10 access-control-tag: 10.10.10.10/32 "tag1" 11 access-control-tag: 10.10.10.20/32 "tag2 tag3" 12 access-control-tag: 10.10.10.30/32 "tag3" 13 access-control-tag: 10.10.10.40/32 "tag3" 14 access-control-tag: 10.10.10.50/32 "tag3" 16 access-control-tag-action: 10.10.10.10/32 tag1 always_refuse 17 access-control-tag-action: 10.10.10.20/32 tag2 always_nxdomain 18 access-control-tag-action: 10.10.10.30/32 tag3 always_refuse 19 access-control-tag-action: 10.10.10.50/32 tag3 always_transparent
|
| /netbsd-src/external/mit/isl/dist/include/isl/ |
| H A D | flow.h | 80 __isl_take isl_union_access_info *access, 84 __isl_take isl_union_access_info *access, 88 __isl_take isl_union_access_info *access, 92 __isl_take isl_union_access_info *access, 96 __isl_take isl_union_access_info *access, 99 __isl_keep isl_union_access_info *access); 101 __isl_take isl_union_access_info *access); 104 __isl_keep isl_union_access_info *access); 109 __isl_take isl_printer *p, __isl_keep isl_union_access_info *access); 111 __isl_keep isl_union_access_info *access); [all …]
|
| /netbsd-src/external/ibm-public/postfix/dist/src/util/ |
| H A D | surrogate.ref | 1 ./dict_open: error: cidr:/xx map requires O_RDONLY access mode 4 ./dict_open: warning: cidr:/xx is unavailable. cidr:/xx map requires O_RDONLY access mode 11 ./dict_open: error: pcre:/xx map requires O_RDONLY access mode 14 ./dict_open: warning: pcre:/xx is unavailable. pcre:/xx map requires O_RDONLY access mode 21 ./dict_open: error: regexp:/xx map requires O_RDONLY access mode 24 ./dict_open: warning: regexp:/xx is unavailable. regexp:/xx map requires O_RDONLY access mode 31 ./dict_open: error: unix:xx map requires O_RDONLY access mode 34 ./dict_open: warning: unix:xx is unavailable. unix:xx map requires O_RDONLY access mode 41 ./dict_open: error: texthash:/xx map requires O_RDONLY access mode 44 ./dict_open: warning: texthash:/xx is unavailable. texthash:/xx map requires O_RDONLY access mode
|
| /netbsd-src/external/ibm-public/postfix/dist/src/smtpd/ |
| H A D | smtpd_dnswl.ref | 40 … from spike.porcupine.org[168.100.3.2]: 554 5.7.1 <rname@rdomain>: Relay access denied; to=<rname@… 41 554 5.7.1 <rname@rdomain>: Relay access denied 71 … from spike.porcupine.org[168.100.3.2]: 554 5.7.1 <rname@rdomain>: Relay access denied; to=<rname@… 72 554 5.7.1 <rname@rdomain>: Relay access denied 81 …ct: RCPT from example.tld[168.100.3.2]: 554 5.7.1 <rname@rdomain>: Relay access denied; to=<rname@… 82 554 5.7.1 <rname@rdomain>: Relay access denied 88 …ect: RCPT from example.tld[168.100.3.2]: 554 5.7.1 <wietse@12345>: Relay access denied; to=<wietse… 89 554 5.7.1 <wietse@12345>: Relay access denied 93 …from example.tld[168.100.3.2]: 554 5.7.1 <wietse@porcupine.12345>: Relay access denied; to=<wietse… 94 554 5.7.1 <wietse@porcupine.12345>: Relay access denied
|
| /netbsd-src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/engine/dma/ |
| H A D | nouveau_nvkm_engine_dma_user.c | 97 args->v0.version, args->v0.target, args->v0.access, in nvkm_dmaobj_ctor() 100 dmaobj->access = args->v0.access; in nvkm_dmaobj_ctor() 140 switch (dmaobj->access) { in nvkm_dmaobj_ctor() 142 dmaobj->access = NV_MEM_ACCESS_VM; in nvkm_dmaobj_ctor() 145 dmaobj->access = NV_MEM_ACCESS_RO; in nvkm_dmaobj_ctor() 148 dmaobj->access = NV_MEM_ACCESS_WO; in nvkm_dmaobj_ctor() 151 dmaobj->access = NV_MEM_ACCESS_RW; in nvkm_dmaobj_ctor()
|
| /netbsd-src/external/bsd/openldap/dist/doc/drafts/ |
| H A D | draft-legg-ldap-acm-admin-xx.txt | 42 pertains to access control administration, for use by the Lightweight 45 administration, e.g., subschema, access control and collective 47 support access control administration, but does not define a 48 particular access control scheme. 78 as it pertains to access control administration, for use by the 83 e.g., subschema, access control and collective attributes. The parts 86 describes the administrative framework for access control. 88 An access control scheme describes the means by which access to 89 directory information, and potentially to access rights themselves, 91 employing access control schemes but does not define a particular [all …]
|
| /netbsd-src/external/ibm-public/postfix/dist/src/global/ |
| H A D | surrogate.ref | 1 ./mail_dict: error: ldap:/xx map requires O_RDONLY access mode 3 ./mail_dict: warning: ldap:/xx is unavailable. ldap:/xx map requires O_RDONLY access mode 9 ./mail_dict: error: mysql:/xx map requires O_RDONLY access mode 11 ./mail_dict: warning: mysql:/xx is unavailable. mysql:/xx map requires O_RDONLY access mode 17 ./mail_dict: error: pgsql:/xx map requires O_RDONLY access mode 19 ./mail_dict: warning: pgsql:/xx is unavailable. pgsql:/xx map requires O_RDONLY access mode 25 ./mail_dict: error: sqlite:/xx map requires O_RDONLY access mode 27 ./mail_dict: warning: sqlite:/xx is unavailable. sqlite:/xx map requires O_RDONLY access mode
|
| /netbsd-src/external/gpl3/gcc.old/dist/gcc/d/dmd/ |
| H A D | access.c | 59 Prot access = getAccess(b->sym, smember); in getAccess() local 60 switch (access.kind) in getAccess() 74 if (PROTpublic < access.kind) in getAccess() 75 access = Prot(PROTpublic); in getAccess() 78 if (access_ret.isMoreRestrictiveThan(access)) in getAccess() 79 access_ret = access; in getAccess() 116 Prot access = getAccess(b->sym, smember); in isAccessible() local 117 if (access.kind >= PROTprotected || in isAccessible() 163 Prot access; in checkAccess() local 166 access = smember->prot(); in checkAccess() [all …]
|
| /netbsd-src/external/bsd/unbound/dist/testdata/local_nosnoop.tdir/ |
| H A D | local_nosnoop.conf | 15 access-control: 0.0.0.0/0 allow 16 access-control: 127.0.0.0/8 allow 17 access-control: ::0/0 allow 18 access-control: ::1 allow 19 access-control: ::ffff:127.0.0.1 allow
|