/freebsd/sys/sys/ |
H A D | capsicum.h | 73 /* Allows for openat(O_RDONLY), read(2), readv(2). */ 75 /* Allows for openat(O_WRONLY | O_APPEND), write(2), writev(2). */ 77 /* Allows for lseek(fd, 0, SEEK_CUR). */ 79 /* Allows for lseek(2). */ 81 /* Allows for aio_read(2), pread(2), preadv(2). */ 84 * Allows for aio_write(2), openat(O_WRONLY) (without O_APPEND), pwrite(2), 88 /* Allows for mmap(PROT_NONE). */ 90 /* Allows for mmap(PROT_READ). */ 92 /* Allows for mmap(PROT_WRITE). */ 94 /* Allows for mmap(PROT_EXEC). */ [all …]
|
/freebsd/sys/contrib/openzfs/man/man8/ |
H A D | zfs-unallow.8 | 205 diff subcommand Allows lookup of paths within a dataset given an object number, and the ability to create snapshots necessary to \fBzfs diff\fR. 206 hold subcommand Allows adding a user hold to a snapshot 207 load-key subcommand Allows loading and unloading of encryption key (see \fBzfs load-key\fR and \fBzfs unload-key\fR). 208 change-key subcommand Allows changing an encryption key via \fBzfs change-key\fR. 209 mount subcommand Allows mounting/unmounting ZFS datasets 212 release subcommand Allows releasing a user hold which might destroy the snapshot 216 share subcommand Allows sharing file systems over NFS or SMB protocols 220 groupquota other Allows accessing any \fBgroupquota@\fI…\fR property 221 groupobjquota other Allows accessing any \fBgroupobjquota@\fI…\fR property 222 groupused other Allows readin [all...] |
H A D | zfs-allow.8 | 205 diff subcommand Allows lookup of paths within a dataset given an object number, and the ability to … 206 hold subcommand Allows adding a user hold to a snapshot 207 load-key subcommand Allows loading and unloading of encryption key (see \fBzfs load-key\fR and \fBz… 208 change-key subcommand Allows changing an encryption key via \fBzfs change-key\fR. 209 mount subcommand Allows mounting/unmounting ZFS datasets 212 release subcommand Allows releasing a user hold which might destroy the snapshot 216 share subcommand Allows sharing file systems over NFS or SMB protocols 220 groupquota other Allows accessing any \fBgroupquota@\fI…\fR property 221 groupobjquota other Allows accessing any \fBgroupobjquota@\fI…\fR property 222 groupused other Allows reading any \fBgroupused@\fI…\fR property [all …]
|
/freebsd/share/man/man4/ |
H A D | sctp.4 | 143 The unordered service allows a message to be sent and delivered 161 This extension allows one to have message be skipped and 164 This extension allows addresses to be added and deleted 167 This extension allows the user to authenticate specific 176 This allows retransmissions without subsequent loss in bandwidth 179 This extension allows a user on either side to reset the 211 This option allows you to get or set the default sending 213 It allows you to change such things as the maximum number of 220 This option allows the user to specify a default number of idle 228 The dynamic address extension allows a peer to also request a [all …]
|
H A D | mac_ipacl.4 | 54 policy allows the root of the host to use the 125 It allows all IPv6 addresses since the policy is not enforced for IPv6. 131 It allows all IPv6 addresses in subnet fe80::/32 except 136 It allows IPv4 in subnet 198.51.100.0/24 for jail 2 and 138 It allows IPv6 addresses in subnet fc00::/7 but 139 denies subnet fc00::1111:2200/120, and allows individual IP
|
/freebsd/contrib/llvm-project/lldb/bindings/interface/ |
H A D | SBSymbolContextExtensions.i | 6 …module = property(GetModule, SetModule, doc='''A read/write property that allows the getting/setti… 7 …operty(GetCompileUnit, SetCompileUnit, doc='''A read/write property that allows the getting/settin… 8 …function = property(GetFunction, SetFunction, doc='''A read/write property that allows the getting… 9 …block = property(GetBlock, SetBlock, doc='''A read/write property that allows the getting/setting … 10 …symbol = property(GetSymbol, SetSymbol, doc='''A read/write property that allows the getting/setti… 11 …line_entry = property(GetLineEntry, SetLineEntry, doc='''A read/write property that allows the get…
|
H A D | SBTargetExtensions.i | 95 …'''An accessor function that returns a modules_access() object which allows lazy module access fro… 134 …'''An accessor function that returns a bkpts_access() object which allows lazy bkpt access from a … 168 …'''An accessor function that returns a watchpoints_access() object which allows lazy watchpoint ac… 179 …allows array access to any modules.\n target.module[<str>] allows access to modules by basename…
|
H A D | SBTypeCategoryExtensions.i | 42 '''An accessor function that returns an accessor object which allows lazy format access from a lldb.SBTypeCategory object.''' 53 '''An accessor function that returns an accessor object which allows lazy summary access from a lldb.SBTypeCategory object.''' 64 '''An accessor function that returns an accessor object which allows lazy synthetic children provider access from a lldb.SBTypeCategory object.''' 75 '''An accessor function that returns an accessor object which allows lazy filter access from a lldb.SBTypeCategory object.'''
|
/freebsd/crypto/krb5/src/man/ |
H A D | kadm5.acl.man | 88 [Dis]allows the addition of principals or policies 94 [Dis]allows the changing of passwords for principals 100 [Dis]allows the deletion of principals or policies 106 [Dis]allows the extraction of principal keys 112 [Dis]allows inquiries about principals or policies 118 [Dis]allows the listing of all principals or policies 124 [Dis]allows the modification of principals or policies 130 [Dis]allows the propagation of the principal database (used in incr_db_prop) 136 [Dis]allows the explicit setting of the key for a principal 159 allows the user to extract keys from the database, and must be
|
/freebsd/crypto/krb5/doc/html/_sources/admin/conf_files/ |
H A D | kadm5_acl.rst.txt | 47 a [Dis]allows the addition of principals or policies 48 c [Dis]allows the changing of passwords for principals 49 d [Dis]allows the deletion of principals or policies 50 e [Dis]allows the extraction of principal keys 51 i [Dis]allows inquiries about principals or policies 52 l [Dis]allows the listing of all principals or policies 53 m [Dis]allows the modification of principals or policies 54 p [Dis]allows the propagation of the principal database (used in :ref:`incr_db_prop`) 55 s [Dis]allows the explicit setting of the key for a principal 64 allows the user to extract keys from the database, and must be
|
/freebsd/crypto/krb5/doc/admin/conf_files/ |
H A D | kadm5_acl.rst | 47 a [Dis]allows the addition of principals or policies 48 c [Dis]allows the changing of passwords for principals 49 d [Dis]allows the deletion of principals or policies 50 e [Dis]allows the extraction of principal keys 51 i [Dis]allows inquiries about principals or policies 52 l [Dis]allows the listing of all principals or policies 53 m [Dis]allows the modification of principals or policies 54 p [Dis]allows the propagation of the principal database (used in :ref:`incr_db_prop`) 55 s [Dis]allows the explicit setting of the key for a principal 64 allows the user to extract keys from the database, and must be
|
/freebsd/sys/contrib/device-tree/Bindings/input/touchscreen/ |
H A D | hycon,hy46xx.yaml | 50 description: Allows setting the sensitivity in the range from 0 to 255. 57 description: Allows enabling glove setting. 60 description: Allows setting the report speed in Hertz. 66 description: Allows enabling power noise filter. 69 description: Allows setting how many samples throw before reporting touch 76 description: Allows setting the sensitivity distance in the range from 0 to 5. 82 description: Allows setting the edge compensation in the range from 0 to 16.
|
H A D | edt-ft5x06.yaml | 66 description: Allows setting the sensitivity in the range from 0 to 31. 73 description: Allows setting the edge compensation in the range from 0 to 31. 94 Allows setting the scan rate in Hertz. 101 description: Allows setting the "click"-threshold in the range from 0 to 255.
|
/freebsd/contrib/llvm-project/llvm/lib/Target/Mips/MCTargetDesc/ |
H A D | MipsELFStreamer.h | 9 // This is a custom MCELFStreamer which allows us to insert some hooks before 40 /// Overriding this function allows us to add arbitrary behaviour before the 42 /// gather sufficient information that allows us to reason about the register 46 /// Overriding this function allows us to record all labels that should be 51 /// Overriding this function allows us to dismiss all labels that are 55 /// Overriding these functions allows us to dismiss all labels that are 61 // Overriding these functions allows us to avoid recording of these labels
|
/freebsd/crypto/krb5/doc/html/_sources/plugindev/ |
H A D | hostrealm.rst.txt | 7 allows modules to control the local mapping of hostnames to realm 24 The optional **host_realm** method allows a module to determine 29 The optional **fallback_realm** method allows a module to determine 34 The optional **default_realm** method allows a module to determine the
|
/freebsd/crypto/krb5/doc/plugindev/ |
H A D | hostrealm.rst | 7 allows modules to control the local mapping of hostnames to realm 24 The optional **host_realm** method allows a module to determine 29 The optional **fallback_realm** method allows a module to determine 34 The optional **default_realm** method allows a module to determine the
|
/freebsd/sys/dev/isci/scil/ |
H A D | scic_user_callback.h | 232 * IO request object. It is a cookie that allows the user to 300 * IO request object. It is a cookie that allows the user to 315 * IO request object. It is a cookie that allows the user to 332 * IO request object. It is a cookie that allows the user to 367 * IO request object. It is a cookie that allows the user to 388 * IO request object. It is a cookie that allows the user to 406 * IO request object. It is a cookie that allows the user to 424 * IO request object. It is a cookie that allows the user to 438 * IO request object. It is a cookie that allows the user to 457 * IO request object. It is a cookie that allows the user to [all …]
|
H A D | scif_user_callback.h | 285 * IO request object. It is a cookie that allows the user to 307 * IO request object. It is a cookie that allows the user to 377 * IO request object. It is a cookie that allows the user to 392 * IO request object. It is a cookie that allows the user to 418 * IO request object. It is a cookie that allows the user to 439 * IO request object. It is a cookie that allows the user to 457 * IO request object. It is a cookie that allows the user to 475 * IO request object. It is a cookie that allows the user to 489 * IO request object. It is a cookie that allows the user to 508 * IO request object. It is a cookie that allows the user to [all …]
|
/freebsd/cddl/contrib/opensolaris/lib/pyzfs/common/ |
H A D | allow.py | 217 mount=_("Allows mount/umount of ZFS datasets"), 218 share=_("Allows sharing file systems over NFS or SMB\n\t\t\t\tprotocols"), 220 hold=_("Allows adding a user hold to a snapshot"), 221 release=_("Allows releasing a user hold which\n\t\t\t\tmight destroy the snapshot"), 222 …diff=_("Allows lookup of paths within a dataset,\n\t\t\t\tgiven an object number. Ordinary users n… 227 userprop=_("Allows changing any user property"), 228 userquota=_("Allows accessing any userquota@... property"), 229 groupquota=_("Allows accessing any groupquota@... property"), 230 userused=_("Allows reading any userused@... property"), 231 groupused=_("Allows reading any groupused@... property"),
|
/freebsd/sys/contrib/openzfs/man/man7/ |
H A D | zpool-features.7 | 390 Block cloning allows to create multiple references to a single block. 451 This approach allows full redundancy to be restored to the pool 552 This feature allows us to create each bpobj on-demand, 580 This feature allows more advanced deduplication features to be enabled on new 594 This feature allows more flexible use of internal ZFS data structures, 682 This feature allows the record size on a dataset to be set larger than 128 KiB. 693 This feature allows the size of dnodes in a dataset to be set larger than 512 B. 710 This feature allows "micro" ZAPs to grow larger than 128 KiB without being 728 This feature allows clones to be deleted faster than the traditional method 745 This feature allows creating files and directories with name up to 1023 bytes [all …]
|
/freebsd/contrib/googletest/googlemock/include/gmock/ |
H A D | gmock-cardinalities.h | 135 // Creates a cardinality that allows at least n calls. 138 // Creates a cardinality that allows at most n calls. 141 // Creates a cardinality that allows any number of calls. 144 // Creates a cardinality that allows between min and max calls. 147 // Creates a cardinality that allows exactly n calls.
|
/freebsd/contrib/googletest/googlemock/src/ |
H A D | gmock-cardinalities.cc | 138 // Creates a cardinality that allows at least n calls. 141 // Creates a cardinality that allows at most n calls. 144 // Creates a cardinality that allows any number of calls. 147 // Creates a cardinality that allows between min and max calls. 152 // Creates a cardinality that allows exactly n calls.
|
/freebsd/contrib/libpcap/ |
H A D | mkdep | 25 # -c allows you to specify the C compiler 30 # -f allows you to select a makefile name 35 # -m allows you to specify the dependency-generation flag 46 # -s allows you to specify the source directory
|
/freebsd/contrib/tcpdump/ |
H A D | mkdep | 25 # -c allows you to specify the C compiler 30 # -f allows you to select a makefile name 35 # -m allows you to specify the dependency-generation flag 46 # -s allows you to specify the source directory
|
/freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/cli_user/misc/ |
H A D | zfs_allow_001_neg.ksh | 43 # 1. Verify that trying to show allows works as a user 44 # 2. Verify that trying to set allows fails as a user 54 # checking for any allow output. ( if no allows are granted,
|