Home
last modified time | relevance | path

Searched refs:allow (Results 1 – 25 of 1105) sorted by relevance

12345678910>>...45

/openbsd-src/etc/rpki/
H A Dlacnic.constraints4 allow 2001:1200::/23
5 allow 2800::/12
8 allow 27648 - 28671
9 allow 52224 - 53247
10 allow 61440 - 61951
11 allow 64099 - 64197
12 allow 262144 - 274844
15 allow 278
16 allow 676
17 allow 1251
[all …]
H A Dafrinic.constraints4 allow 41.0.0.0/8
5 allow 102.0.0.0/8
6 allow 105.0.0.0/8
8 allow 154.0.0.0/16
9 allow 154.16.0.0/16
10 allow 154.65.0.0 - 154.255.255.255
11 allow 196.0.0.0 - 196.1.0.255
12 allow 196.1.4.0/24
13 allow 196.1.7.0 - 196.1.63.255
14 allow 196.1.71.0/24
[all …]
H A Dripe.constraints4 allow 2001:600::/23
5 allow 2001:800::/22
6 allow 2001:1400::/22
7 allow 2001:1a00::/23
8 allow 2001:1c00::/22
9 allow 2001:2000::/19
10 allow 2001:4000::/23
11 allow 2001:4600::/23
12 allow 2001:4a00::/23
13 allow 2001:4c00::/23
[all …]
/openbsd-src/regress/sys/net/pf_fragment/
H A Dpf.conf3 pass to { $PF_IN/24 $PF_IN6/64 } allow-opts
4 pass to { $RT_IN/24 $RT_IN6/64 } allow-opts
5 pass to { $ECO_IN/24 $ECO_IN6/64 } allow-opts
6 pass to { $RDR_IN/24 $RDR_IN6/64 } allow-opts
8 pass in to $RDR_IN/24 rdr-to $ECO_IN allow-opts tag rdr
9 pass out nat-to $PF_OUT allow-opts tagged rdr
10 pass in to $RDR_IN6/64 rdr-to $ECO_IN6 allow-opts tag rdr
11 pass out nat-to $PF_OUT6 allow-opts tagged rdr
13 pass in to $RTT_IN/24 allow-opts tag rtt
14 pass out route-to $RT_IN allow-opts tagged rtt
[all …]
/openbsd-src/usr.sbin/ypserv/ypserv/
H A Dacl.c97 return(p->allow); in acl_check_host()
104 acl_add_net(int allow, struct in_addr *addr, struct in_addr *mask) in acl_add_net() argument
110 acl->allow = allow; in acl_add_net()
125 acl_add_host(int allow, struct in_addr *addr) in acl_add_host() argument
130 acl_add_net(allow, addr, &mask); in acl_add_host()
138 int allow = TRUE, error_cnt = 0; in acl_init() local
172 allow = TRUE; in acl_init()
177 allow = FALSE; in acl_init()
220 acl_add_net(allow, &addr, &mask); in acl_init()
244 acl_add_host(allow, &addr); in acl_init()
[all …]
H A Dypserv.acl10 # allow host <hostname|ip-address>
16 allow host localhost
22 # allow net <netnumber> [netmask <netnumber>]
31 # allow any of my computers to talk with the server I need the following line
33 allow net mojathome netmask 255.255.255.0
38 # allow all
/openbsd-src/regress/usr.sbin/bgpd/config/
H A Dbgpd.conf.3.ok23 allow from 2001:db8::1 prefix 2001:db8:300::/64
24 allow from 2001:db8::1 prefix 2001:db8:200::/64
25 allow from 2001:db8::1 prefix 2001:db8:100::/64
26 allow from 2001:db8::1 prefix 2001:db8:300::/64
27 allow from 2001:db8::1 prefix 2001:db8:200::/64
28 allow from 2001:db8::1 prefix 2001:db8:100::/64
29 allow from 2001:db8::1 prefix 2001:db8:500::/64
30 allow from 2001:db8::1 prefix 2001:db8:400::/64
H A Dbgpd.conf.2.in6 allow from any community local-as:neighbor-as
7 allow from any ext-community rt 1:2
8 allow from any ext-community l2vid 192.0.2.1:2
9 allow from any ext-community ovs valid
10 allow from any ext-community ovs invalid
11 allow from any ext-community ovs not-found
12 allow from any large-community local-as:neighbor-as:*
H A Dbgpd.conf.2.ok11 allow from any community local-as:neighbor-as
12 allow from any ext-community rt 1:2
13 allow from any ext-community l2vid 192.0.2.1:2
14 allow from any ext-community ovs valid
15 allow from any ext-community ovs invalid
16 allow from any ext-community ovs not-found
17 allow from any large-community local-as:neighbor-as:*
H A Dbgpd.conf.printconf79 allow to ebgp prefix-set "mynetworks" large-community 65001:1:1
81 allow from ibgp
82 allow to ibgp
85 allow from any prefix 0.0.0.0/0 prefixlen 8 - 24
86 allow from any prefix ::/0 prefixlen 16 - 48
/openbsd-src/gnu/usr.bin/perl/cpan/Params-Check/t/
H A D01_Params-Check.t7 Params::Check->import(qw|check last_error allow|);
13 ### basic things first, allow function ###
18 ### allow tests ###
19 { ok( allow( 42, qr/^\d+$/ ), "Allow based on regex" );
20 ok( allow( $0, $0), " Allow based on string" );
21 ok( allow( 42, [0,42] ), " Allow based on list" );
22 ok( allow( 42, [50,sub{1}])," Allow based on list containing sub");
23 ok( allow( 42, TRUE ), " Allow based on constant sub" );
24 ok(!allow( $0, qr/^\d+$/ ), "Disallowing based on regex" );
25 ok(!allow( 42, $0 ), " Disallowing based on string" );
[all …]
/openbsd-src/regress/sbin/pfctl/
H A Dpf39.ok12 o_allowopts = "allow-opts "
16 … inet proto tcp all user = 3 group = 32767 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah"
17 … lo0 inet proto tcp all user = 3 group = 0 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah"
18 … inet proto tcp all user = 0 group = 32767 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah"
19 … lo0 inet proto tcp all user = 0 group = 0 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah"
24 pass in log quick on lo0 inet proto tcp all flags S/SA allow-opts
H A Dpf39.loaded5 … inet proto tcp all user = 3 group = 32767 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah"
9 … lo0 inet proto tcp all user = 3 group = 0 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah"
13 … inet proto tcp all user = 0 group = 32767 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah"
17 … lo0 inet proto tcp all user = 0 group = 0 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah"
37 @9 pass in log quick on lo0 inet proto tcp all flags S/SA allow-opts
H A Dpf39.optimized5 … inet proto tcp all user = 3 group = 32767 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah"
9 … lo0 inet proto tcp all user = 3 group = 0 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah"
13 … inet proto tcp all user = 0 group = 32767 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah"
17 … lo0 inet proto tcp all user = 0 group = 0 flags S/SA tos 0x08 set (prio 2) allow-opts label "blah"
37 @9 pass in log quick on lo0 inet proto tcp all flags S/SA allow-opts
/openbsd-src/regress/usr.sbin/bgpd/integrationtests/
H A Dbgpd.ixp.rdomain1.conf302 allow quick from group clients max-as-len 6 set {
326 allow quick from group clients prefix-set global_black_list_pref set {
350 allow quick from group clients prefix-set bogons set {
387 allow quick from 192.0.2.11 community NO_ADVERTISE set {
411 allow quick from 192.0.2.11 AS 23456 set {
433 allow quick from 192.0.2.11 AS 64496 - 131071 set {
455 allow quick from 192.0.2.11 AS 4200000000 - 4294967295 set {
479 allow quick from 192.0.2.11 AS { 3, 174 } set {
503 allow quick from 192.0.2.11 AS as-set neverviarouteserver set {
576 allow quick from 192.0.2.11 ext-community $INTCOMM_IRR_REJECT ext-community $INTCOMM_ORIGIN_KO set {
[all …]
H A Dbgpd.lladdr.rdomain2.conf20 allow from any
22 allow to fe80::c0fe:1%pair12 community 0:1
23 allow to fe80::beef:1%gif12 community 0:11
H A Dbgpd.lladdr.rdomain1.conf26 allow from any
28 allow to group pair11 community 0:1
29 allow to group gif11 community 0:11
H A Dbgpd.med.conf9 allow from any
10 allow to any
H A Dbgpd.attr.conf7 allow from any
8 allow to any
H A Dbgpd.as0.conf7 allow from any
8 allow to any
H A Dbgpd.ixp.rdomain2_1.conf12 allow from any
13 allow to any
H A Dbgpd.ixp.rdomain2_4.conf13 allow from any
14 allow to any
H A Dbgpd.capa.client.conf19 allow from any
20 allow to any
H A Dbgpd.op.client.conf20 allow from any
21 allow to any
/openbsd-src/regress/usr.bin/ssh/
H A Dallow-deny-users.sh18 allow="$2"
24 test -z "$allow" || echo AllowUsers="$allow" >> $OBJ/sshd_proxy

12345678910>>...45