Home
last modified time | relevance | path

Searched refs:access (Results 1 – 25 of 2736) sorted by relevance

12345678910>>...110

/netbsd-src/external/gpl3/gcc/dist/gcc/
H A Dtree-sra.cc131 struct access struct
151 struct access *next_grp; argument
155 struct access *group_representative; argument
159 struct access *parent; argument
163 struct access *first_child; argument
167 struct access *next_sibling; argument
178 struct access *next_rhs_queued, *next_lhs_queued; argument
268 typedef struct access *access_p; argument
272 static object_allocator<struct access> access_pool ("SRA accesses");
281 struct access *lacc, *racc;
[all …]
H A Dipa-sra.cc633 dump_gensum_access (FILE *f, gensum_param_access *access, unsigned indent) in dump_gensum_access() argument
639 access->offset); in dump_gensum_access()
640 fprintf (f, ", size: " HOST_WIDE_INT_PRINT_DEC, access->size); in dump_gensum_access()
642 print_generic_expr (f, access->type); in dump_gensum_access()
644 print_generic_expr (f, access->alias_ptr_type); in dump_gensum_access()
645 fprintf (f, ", nonarg: %u, reverse: %u\n", access->nonarg, access->reverse); in dump_gensum_access()
646 for (gensum_param_access *ch = access->first_child; in dump_gensum_access()
656 dump_isra_access (FILE *f, param_access *access) in dump_isra_access() argument
658 fprintf (f, " * Access to unit offset: %u", access->unit_offset); in dump_isra_access()
659 fprintf (f, ", unit size: %u", access->unit_size); in dump_isra_access()
[all …]
/netbsd-src/external/gpl3/gcc.old/dist/gcc/
H A Dtree-sra.c131 struct access struct
151 struct access *next_grp; argument
155 struct access *group_representative; argument
159 struct access *parent; argument
163 struct access *first_child; argument
167 struct access *next_sibling; argument
178 struct access *next_rhs_queued, *next_lhs_queued; argument
265 typedef struct access *access_p; argument
269 static object_allocator<struct access> access_pool ("SRA accesses");
278 struct access *lacc, *racc;
[all …]
H A Dipa-sra.c620 dump_gensum_access (FILE *f, gensum_param_access *access, unsigned indent) in dump_gensum_access() argument
626 access->offset); in dump_gensum_access()
627 fprintf (f, ", size: " HOST_WIDE_INT_PRINT_DEC, access->size); in dump_gensum_access()
629 print_generic_expr (f, access->type); in dump_gensum_access()
631 print_generic_expr (f, access->alias_ptr_type); in dump_gensum_access()
632 fprintf (f, ", nonarg: %u, reverse: %u\n", access->nonarg, access->reverse); in dump_gensum_access()
633 for (gensum_param_access *ch = access->first_child; in dump_gensum_access()
643 dump_isra_access (FILE *f, param_access *access) in dump_isra_access() argument
645 fprintf (f, " * Access to unit offset: %u", access->unit_offset); in dump_isra_access()
646 fprintf (f, ", unit size: %u", access->unit_size); in dump_isra_access()
[all …]
/netbsd-src/external/cddl/dtracetoolkit/dist/Examples/
H A Dtcl_syscolors_example.txt59  0 16624 24 syscall -> access
60  0 16624 10 syscall <- access
61  0 16624 7 syscall -> access
62  0 16624 10 syscall <- access
63  0 16624 7 syscall -> access
64  0 16624 11 syscall <- access
65  0 16624 7 syscall -> access
66  0 16624 13 syscall <- access
67  0 16624 7 syscall -> access
68  0 16624 14 syscall <- access
[all …]
/netbsd-src/external/cddl/dtracetoolkit/dist/Docs/Examples/
H A Dtcl_syscolors_example.txt59  0 16624 24 syscall -> access
60  0 16624 10 syscall <- access
61  0 16624 7 syscall -> access
62  0 16624 10 syscall <- access
63  0 16624 7 syscall -> access
64  0 16624 11 syscall <- access
65  0 16624 7 syscall -> access
66  0 16624 13 syscall <- access
67  0 16624 7 syscall -> access
68  0 16624 14 syscall <- access
[all …]
/netbsd-src/external/mit/isl/dist/
H A Disl_flow.c1504 isl_union_map *access[isl_access_end]; member
1513 __isl_take isl_union_access_info *access) in isl_union_access_info_free() argument
1517 if (!access) in isl_union_access_info_free()
1521 isl_union_map_free(access->access[i]); in isl_union_access_info_free()
1522 isl_schedule_free(access->schedule); in isl_union_access_info_free()
1523 isl_union_map_free(access->schedule_map); in isl_union_access_info_free()
1524 free(access); in isl_union_access_info_free()
1531 isl_ctx *isl_union_access_info_get_ctx(__isl_keep isl_union_access_info *access) in isl_union_access_info_get_ctx() argument
1533 if (!access) in isl_union_access_info_get_ctx()
1535 return isl_union_map_get_ctx(access->access[isl_access_sink]); in isl_union_access_info_get_ctx()
[all …]
/netbsd-src/external/bsd/openldap/dist/tests/data/
H A Dslapd-acl.conf29 access to dn.exact="" attrs=objectClass
31 access to *
53 access to attrs=objectclass
58 access to filter="(objectclass=person)" attrs=userpassword
62 access to dn.exact="cn=Mark Elliot,ou=Alumni Association,ou=People,dc=example,dc=com"
67 access to dn.exact="cn=Mark Elliot,ou=Alumni Association,ou=People,dc=example,dc=com"
72 access to dn.exact="cn=Mark Elliot,ou=Alumni Association,ou=People,dc=example,dc=com"
76 access to dn.exact="cn=John Doe,ou=Information Technology Division,ou=People,dc=example,dc=com"
81 access to dn.exact="cn=John Doe,ou=Information Technology Division,ou=People,dc=example,dc=com"
86 access to dn.exact="cn=John Doe,ou=Information Technology Division,ou=People,dc=example,dc=com"
[all …]
H A Dslapd-emptydn.conf26 access to dn.exact=""
29 access to dn.exact="cn=Subschema"
49 access to attrs=userPassword
54 access to dn.subtree="dc=example,dc=com"
59 access to dn.subtree="cn=Monitor"
72 access to attrs=userPassword
76 access to dn.subtree=""
H A Dslapd-dds.conf56 access to attrs=userPassword
60 access to dn.base="ou=Groups,dc=example,dc=com"
64 access to dn.onelevel="ou=Groups,dc=example,dc=com"
69 access to dn.onelevel="ou=Groups,dc=example,dc=com"
73 access to dn.onelevel="ou=Groups,dc=example,dc=com"
77 access to dn.onelevel="ou=Groups,dc=example,dc=com"
82 access to *
H A Dslapd-valregex.conf29 access to dn.exact="" attrs=objectClass
31 access to *
53 access to attrs=userPassword
57 access to attrs=sn val.regex="^(.*)$"
61 access to attrs=sn val.regex="."
64 access to attrs=sn
/netbsd-src/external/bsd/openldap/dist/doc/guide/admin/
H A Daccess-control.sdf10 controlling the kinds of access granted to the directory becomes more and more
13 to control access to other services, inappropriate access to the directory may
21 The default access control policy is allow read by all clients. Regardless of
22 what access control policy is defined, the {{rootdn}} is always allowed full
29 follow with some examples and recommendations. See {{slapd.access}}(5) for
35 access configuration file directive. The general form of an
36 access line is:
38 > <access directive> ::= access to <what>
39 > [by <who> [<access>] [<control>] ]+
57 > <access> ::= [self]{<level>|<priv>}
[all …]
/netbsd-src/external/gpl3/gcc/dist/gcc/rtl-ssa/
H A Daccess-utils.h100 set_with_nondebug_insn_uses (const access_info *access) in set_with_nondebug_insn_uses() argument
102 if (access->is_set_with_nondebug_insn_uses ()) in set_with_nondebug_insn_uses()
104 return static_cast<const set_info *> (access); in set_with_nondebug_insn_uses()
110 set_with_nondebug_insn_uses (access_info *access) in set_with_nondebug_insn_uses() argument
112 if (access->is_set_with_nondebug_insn_uses ()) in set_with_nondebug_insn_uses()
113 return static_cast<set_info *> (access); in set_with_nondebug_insn_uses()
138 access_insn (const access_info *access) in access_insn() argument
141 if (auto *def = dyn_cast<const def_info *> (access)) in access_insn()
143 return as_a<const use_info *> (access)->insn (); in access_insn()
149 access_value (const access_info *access) in access_value() argument
[all …]
/netbsd-src/external/bsd/kyua-cli/dist/utils/fs/
H A Dauto_cleaners_test.cpp53 ATF_REQUIRE(::access("root", X_OK) == 0); in ATF_TEST_CASE_BODY()
59 ATF_REQUIRE(::access("root", X_OK) == 0); in ATF_TEST_CASE_BODY()
61 ATF_REQUIRE(::access("root", X_OK) == -1); in ATF_TEST_CASE_BODY()
74 ATF_REQUIRE(::access("root", X_OK) == 0); in ATF_TEST_CASE_BODY()
77 ATF_REQUIRE(::access("root", X_OK) == -1); in ATF_TEST_CASE_BODY()
91 ATF_REQUIRE(::access((fs::path("tmp") / path_template).c_str(), in ATF_TEST_CASE_BODY()
95 ATF_REQUIRE(::access(auto_directory.directory().c_str(), X_OK) == 0); in ATF_TEST_CASE_BODY()
110 ATF_REQUIRE(::access(file.c_str(), R_OK) == 0); in ATF_TEST_CASE_BODY()
116 ATF_REQUIRE(::access(file.c_str(), R_OK) == 0); in ATF_TEST_CASE_BODY()
118 ATF_REQUIRE(::access(file.c_str(), R_OK) == -1); in ATF_TEST_CASE_BODY()
[all …]
/netbsd-src/external/mpl/dhcp/bind/dist/lib/isc/
H A Dfsaccess.c37 isc_fsaccess_add(int trustee, int permission, isc_fsaccess_t *access) { in isc_fsaccess_add() argument
42 *access |= permission; in isc_fsaccess_add()
46 *access |= (permission << GROUP); in isc_fsaccess_add()
50 *access |= (permission << OTHER); in isc_fsaccess_add()
55 isc_fsaccess_remove(int trustee, int permission, isc_fsaccess_t *access) { in isc_fsaccess_remove() argument
60 *access &= ~permission; in isc_fsaccess_remove()
64 *access &= ~(permission << GROUP); in isc_fsaccess_remove()
68 *access &= ~(permission << OTHER); in isc_fsaccess_remove()
73 check_bad_bits(isc_fsaccess_t access, bool is_dir) { in check_bad_bits() argument
96 if ((access & bits) != 0) { in check_bad_bits()
/netbsd-src/sys/arch/ews4800mips/stand/common/
H A Dmem.c147 mem_write(uint32_t dst_addr, uint32_t access, uint32_t stride, in mem_write() argument
153 (void *)dst_addr, access, stride, count); in mem_write()
158 switch (access) { in mem_write()
160 printf("invalid %dbyte access.\n", access); in mem_write()
190 mem_read(uint32_t src_addr, uint32_t access, uint32_t stride, in mem_read() argument
197 (void *)src_addr, access, stride, count); in mem_read()
204 switch (access) { in mem_read()
206 printf("invalid %dbyte access.\n", access); in mem_read()
222 switch (access) { in mem_read()
224 printf("invalid %dbyte access.\n", access); in mem_read()
/netbsd-src/external/bsd/unbound/dist/testdata/
H A Dlocal_acl_taglist_action.rpl9 access-control: 10.10.10.0/24 allow
10 access-control-tag: 10.10.10.10/32 "tag1"
11 access-control-tag: 10.10.10.20/32 "tag2 tag3"
12 access-control-tag: 10.10.10.30/32 "tag3"
13 access-control-tag: 10.10.10.40/32 "tag3"
14 access-control-tag: 10.10.10.50/32 "tag3"
16 access-control-tag-action: 10.10.10.10/32 tag1 always_refuse
17 access-control-tag-action: 10.10.10.20/32 tag2 always_nxdomain
18 access-control-tag-action: 10.10.10.30/32 tag3 always_refuse
19 access-control-tag-action: 10.10.10.50/32 tag3 always_transparent
/netbsd-src/external/mit/isl/dist/include/isl/
H A Dflow.h80 __isl_take isl_union_access_info *access,
84 __isl_take isl_union_access_info *access,
88 __isl_take isl_union_access_info *access,
92 __isl_take isl_union_access_info *access,
96 __isl_take isl_union_access_info *access,
99 __isl_keep isl_union_access_info *access);
101 __isl_take isl_union_access_info *access);
104 __isl_keep isl_union_access_info *access);
109 __isl_take isl_printer *p, __isl_keep isl_union_access_info *access);
111 __isl_keep isl_union_access_info *access);
[all …]
/netbsd-src/external/ibm-public/postfix/dist/src/util/
H A Dsurrogate.ref1 ./dict_open: error: cidr:/xx map requires O_RDONLY access mode
4 ./dict_open: warning: cidr:/xx is unavailable. cidr:/xx map requires O_RDONLY access mode
11 ./dict_open: error: pcre:/xx map requires O_RDONLY access mode
14 ./dict_open: warning: pcre:/xx is unavailable. pcre:/xx map requires O_RDONLY access mode
21 ./dict_open: error: regexp:/xx map requires O_RDONLY access mode
24 ./dict_open: warning: regexp:/xx is unavailable. regexp:/xx map requires O_RDONLY access mode
31 ./dict_open: error: unix:xx map requires O_RDONLY access mode
34 ./dict_open: warning: unix:xx is unavailable. unix:xx map requires O_RDONLY access mode
41 ./dict_open: error: texthash:/xx map requires O_RDONLY access mode
44 ./dict_open: warning: texthash:/xx is unavailable. texthash:/xx map requires O_RDONLY access mode
/netbsd-src/external/ibm-public/postfix/dist/src/smtpd/
H A Dsmtpd_dnswl.ref40 … from spike.porcupine.org[168.100.3.2]: 554 5.7.1 <rname@rdomain>: Relay access denied; to=<rname@…
41 554 5.7.1 <rname@rdomain>: Relay access denied
71 … from spike.porcupine.org[168.100.3.2]: 554 5.7.1 <rname@rdomain>: Relay access denied; to=<rname@…
72 554 5.7.1 <rname@rdomain>: Relay access denied
81 …ct: RCPT from example.tld[168.100.3.2]: 554 5.7.1 <rname@rdomain>: Relay access denied; to=<rname@…
82 554 5.7.1 <rname@rdomain>: Relay access denied
88 …ect: RCPT from example.tld[168.100.3.2]: 554 5.7.1 <wietse@12345>: Relay access denied; to=<wietse…
89 554 5.7.1 <wietse@12345>: Relay access denied
93 …from example.tld[168.100.3.2]: 554 5.7.1 <wietse@porcupine.12345>: Relay access denied; to=<wietse…
94 554 5.7.1 <wietse@porcupine.12345>: Relay access denied
/netbsd-src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/engine/dma/
H A Dnouveau_nvkm_engine_dma_user.c97 args->v0.version, args->v0.target, args->v0.access, in nvkm_dmaobj_ctor()
100 dmaobj->access = args->v0.access; in nvkm_dmaobj_ctor()
140 switch (dmaobj->access) { in nvkm_dmaobj_ctor()
142 dmaobj->access = NV_MEM_ACCESS_VM; in nvkm_dmaobj_ctor()
145 dmaobj->access = NV_MEM_ACCESS_RO; in nvkm_dmaobj_ctor()
148 dmaobj->access = NV_MEM_ACCESS_WO; in nvkm_dmaobj_ctor()
151 dmaobj->access = NV_MEM_ACCESS_RW; in nvkm_dmaobj_ctor()
/netbsd-src/external/bsd/openldap/dist/doc/drafts/
H A Ddraft-legg-ldap-acm-admin-xx.txt42 pertains to access control administration, for use by the Lightweight
45 administration, e.g., subschema, access control and collective
47 support access control administration, but does not define a
48 particular access control scheme.
78 as it pertains to access control administration, for use by the
83 e.g., subschema, access control and collective attributes. The parts
86 describes the administrative framework for access control.
88 An access control scheme describes the means by which access to
89 directory information, and potentially to access rights themselves,
91 employing access control schemes but does not define a particular
[all …]
/netbsd-src/external/ibm-public/postfix/dist/src/global/
H A Dsurrogate.ref1 ./mail_dict: error: ldap:/xx map requires O_RDONLY access mode
3 ./mail_dict: warning: ldap:/xx is unavailable. ldap:/xx map requires O_RDONLY access mode
9 ./mail_dict: error: mysql:/xx map requires O_RDONLY access mode
11 ./mail_dict: warning: mysql:/xx is unavailable. mysql:/xx map requires O_RDONLY access mode
17 ./mail_dict: error: pgsql:/xx map requires O_RDONLY access mode
19 ./mail_dict: warning: pgsql:/xx is unavailable. pgsql:/xx map requires O_RDONLY access mode
25 ./mail_dict: error: sqlite:/xx map requires O_RDONLY access mode
27 ./mail_dict: warning: sqlite:/xx is unavailable. sqlite:/xx map requires O_RDONLY access mode
/netbsd-src/external/gpl3/gcc.old/dist/gcc/d/dmd/
H A Daccess.c59 Prot access = getAccess(b->sym, smember); in getAccess() local
60 switch (access.kind) in getAccess()
74 if (PROTpublic < access.kind) in getAccess()
75 access = Prot(PROTpublic); in getAccess()
78 if (access_ret.isMoreRestrictiveThan(access)) in getAccess()
79 access_ret = access; in getAccess()
116 Prot access = getAccess(b->sym, smember); in isAccessible() local
117 if (access.kind >= PROTprotected || in isAccessible()
163 Prot access; in checkAccess() local
166 access = smember->prot(); in checkAccess()
[all …]
/netbsd-src/external/bsd/unbound/dist/testdata/local_nosnoop.tdir/
H A Dlocal_nosnoop.conf15 access-control: 0.0.0.0/0 allow
16 access-control: 127.0.0.0/8 allow
17 access-control: ::0/0 allow
18 access-control: ::1 allow
19 access-control: ::ffff:127.0.0.1 allow

12345678910>>...110