| /openbsd-src/etc/rpki/ |
| H A D | lacnic.constraints | 4 allow 2001:1200::/23 5 allow 2800::/12 8 allow 27648 - 28671 9 allow 52224 - 53247 10 allow 61440 - 61951 11 allow 64099 - 64197 12 allow 262144 - 274844 15 allow 278 16 allow 676 17 allow 1251 [all …]
|
| H A D | afrinic.constraints | 4 allow 41.0.0.0/8 5 allow 102.0.0.0/8 6 allow 105.0.0.0/8 8 allow 154.0.0.0/16 9 allow 154.16.0.0/16 10 allow 154.65.0.0 - 154.255.255.255 11 allow 196.0.0.0 - 196.1.0.255 12 allow 196.1.4.0/24 13 allow 196.1.7.0 - 196.1.63.255 14 allow 196.1.71.0/24 [all …]
|
| H A D | ripe.constraints | 4 allow 2001:600::/23 5 allow 2001:800::/22 6 allow 2001:1400::/22 7 allow 2001:1a00::/23 8 allow 2001:1c00::/22 9 allow 2001:2000::/19 10 allow 2001:4000::/23 11 allow 2001:4600::/23 12 allow 2001:4a00::/23 13 allow 2001:4c00::/23 [all …]
|
| /openbsd-src/regress/sys/net/pf_fragment/ |
| H A D | pf.conf | 3 pass to { $PF_IN/24 $PF_IN6/64 } allow-opts 4 pass to { $RT_IN/24 $RT_IN6/64 } allow-opts 5 pass to { $ECO_IN/24 $ECO_IN6/64 } allow-opts 6 pass to { $RDR_IN/24 $RDR_IN6/64 } allow-opts 8 pass in to $RDR_IN/24 rdr-to $ECO_IN allow-opts tag rdr 9 pass out nat-to $PF_OUT allow-opts tagged rdr 10 pass in to $RDR_IN6/64 rdr-to $ECO_IN6 allow-opts tag rdr 11 pass out nat-to $PF_OUT6 allow-opts tagged rdr 13 pass in to $RTT_IN/24 allow-opts tag rtt 14 pass out route-to $RT_IN allow-opts tagged rtt [all …]
|
| /openbsd-src/usr.sbin/ypserv/ypserv/ |
| H A D | acl.c | 97 return(p->allow); in acl_check_host() 104 acl_add_net(int allow, struct in_addr *addr, struct in_addr *mask) in acl_add_net() argument 110 acl->allow = allow; in acl_add_net() 125 acl_add_host(int allow, struct in_addr *addr) in acl_add_host() argument 130 acl_add_net(allow, addr, &mask); in acl_add_host() 138 int allow = TRUE, error_cnt = 0; in acl_init() local 172 allow = TRUE; in acl_init() 177 allow = FALSE; in acl_init() 220 acl_add_net(allow, &addr, &mask); in acl_init() 244 acl_add_host(allow, &addr); in acl_init() [all …]
|
| H A D | ypserv.acl | 10 # allow host <hostname|ip-address> 16 allow host localhost 22 # allow net <netnumber> [netmask <netnumber>] 31 # allow any of my computers to talk with the server I need the following line 33 allow net mojathome netmask 255.255.255.0 38 # allow all
|
| /openbsd-src/regress/usr.sbin/bgpd/config/ |
| H A D | bgpd.conf.3.ok | 23 allow from 2001:db8::1 prefix 2001:db8:300::/64 24 allow from 2001:db8::1 prefix 2001:db8:200::/64 25 allow from 2001:db8::1 prefix 2001:db8:100::/64 26 allow from 2001:db8::1 prefix 2001:db8:300::/64 27 allow from 2001:db8::1 prefix 2001:db8:200::/64 28 allow from 2001:db8::1 prefix 2001:db8:100::/64 29 allow from 2001:db8::1 prefix 2001:db8:500::/64 30 allow from 2001:db8::1 prefix 2001:db8:400::/64
|
| H A D | bgpd.conf.2.in | 6 allow from any community local-as:neighbor-as 7 allow from any ext-community rt 1:2 8 allow from any ext-community l2vid 192.0.2.1:2 9 allow from any ext-community ovs valid 10 allow from any ext-community ovs invalid 11 allow from any ext-community ovs not-found 12 allow from any large-community local-as:neighbor-as:*
|
| H A D | bgpd.conf.2.ok | 11 allow from any community local-as:neighbor-as 12 allow from any ext-community rt 1:2 13 allow from any ext-community l2vid 192.0.2.1:2 14 allow from any ext-community ovs valid 15 allow from any ext-community ovs invalid 16 allow from any ext-community ovs not-found 17 allow from any large-community local-as:neighbor-as:*
|
| H A D | bgpd.conf.printconf | 79 allow to ebgp prefix-set "mynetworks" large-community 65001:1:1 81 allow from ibgp 82 allow to ibgp 85 allow from any prefix 0.0.0.0/0 prefixlen 8 - 24 86 allow from any prefix ::/0 prefixlen 16 - 48
|
| /openbsd-src/gnu/usr.bin/perl/cpan/Params-Check/t/ |
| H A D | 01_Params-Check.t | 7 Params::Check->import(qw|check last_error allow|); 13 ### basic things first, allow function ### 18 ### allow tests ### 19 { ok( allow( 42, qr/^\d+$/ ), "Allow based on regex" ); 20 ok( allow( $0, $0), " Allow based on string" ); 21 ok( allow( 42, [0,42] ), " Allow based on list" ); 22 ok( allow( 42, [50,sub{1}])," Allow based on list containing sub"); 23 ok( allow( 42, TRUE ), " Allow based on constant sub" ); 24 ok(!allow( $0, qr/^\d+$/ ), "Disallowing based on regex" ); 25 ok(!allow( 42, $0 ), " Disallowing based on string" ); [all …]
|
| /openbsd-src/regress/sbin/pfctl/ |
| H A D | pf39.ok | 12 o_allowopts = "allow-opts " 16 … inet proto tcp all user = 3 group = 32767 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah" 17 … lo0 inet proto tcp all user = 3 group = 0 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah" 18 … inet proto tcp all user = 0 group = 32767 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah" 19 … lo0 inet proto tcp all user = 0 group = 0 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah" 24 pass in log quick on lo0 inet proto tcp all flags S/SA allow-opts
|
| H A D | pf39.loaded | 5 … inet proto tcp all user = 3 group = 32767 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah" 9 … lo0 inet proto tcp all user = 3 group = 0 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah" 13 … inet proto tcp all user = 0 group = 32767 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah" 17 … lo0 inet proto tcp all user = 0 group = 0 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah" 37 @9 pass in log quick on lo0 inet proto tcp all flags S/SA allow-opts
|
| H A D | pf39.optimized | 5 … inet proto tcp all user = 3 group = 32767 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah" 9 … lo0 inet proto tcp all user = 3 group = 0 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah" 13 … inet proto tcp all user = 0 group = 32767 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah" 17 … lo0 inet proto tcp all user = 0 group = 0 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah" 37 @9 pass in log quick on lo0 inet proto tcp all flags S/SA allow-opts
|
| /openbsd-src/regress/usr.sbin/bgpd/integrationtests/ |
| H A D | bgpd.ixp.rdomain1.conf | 302 allow quick from group clients max-as-len 6 set { 326 allow quick from group clients prefix-set global_black_list_pref set { 350 allow quick from group clients prefix-set bogons set { 387 allow quick from 192.0.2.11 community NO_ADVERTISE set { 411 allow quick from 192.0.2.11 AS 23456 set { 433 allow quick from 192.0.2.11 AS 64496 - 131071 set { 455 allow quick from 192.0.2.11 AS 4200000000 - 4294967295 set { 479 allow quick from 192.0.2.11 AS { 3, 174 } set { 503 allow quick from 192.0.2.11 AS as-set neverviarouteserver set { 576 allow quick from 192.0.2.11 ext-community $INTCOMM_IRR_REJECT ext-community $INTCOMM_ORIGIN_KO set { [all …]
|
| H A D | bgpd.lladdr.rdomain2.conf | 20 allow from any 22 allow to fe80::c0fe:1%pair12 community 0:1 23 allow to fe80::beef:1%gif12 community 0:11
|
| H A D | bgpd.lladdr.rdomain1.conf | 26 allow from any 28 allow to group pair11 community 0:1 29 allow to group gif11 community 0:11
|
| H A D | bgpd.med.conf | 9 allow from any 10 allow to any
|
| H A D | bgpd.attr.conf | 7 allow from any 8 allow to any
|
| H A D | bgpd.as0.conf | 7 allow from any 8 allow to any
|
| H A D | bgpd.ixp.rdomain2_1.conf | 12 allow from any 13 allow to any
|
| H A D | bgpd.ixp.rdomain2_4.conf | 13 allow from any 14 allow to any
|
| H A D | bgpd.capa.client.conf | 19 allow from any 20 allow to any
|
| H A D | bgpd.op.client.conf | 20 allow from any 21 allow to any
|
| /openbsd-src/regress/usr.bin/ssh/ |
| H A D | allow-deny-users.sh | 18 allow="$2" 24 test -z "$allow" || echo AllowUsers="$allow" >> $OBJ/sshd_proxy
|