| /freebsd/usr.bin/chpass/ |
| H A D | edit.c | 137 else if ((!list[E_SHELL].restricted && ok_shell(pw->pw_shell)) || in display() 147 list[E_SHELL].restricted = 1; in display() 158 if (!list[E_NAME].restricted || master_mode) in display() 164 if (!list[E_LOCATE].restricted || master_mode) in display() 170 if (!list[E_BPHONE].restricted || master_mode) in display() 176 if (!list[E_HPHONE].restricted || master_mode) in display() 181 if (!list[E_OTHER].restricted || master_mode) in display() 232 if (ep->restricted && !master_mode) { in verify()
|
| H A D | chpass.h | 48 int restricted; member
|
| /freebsd/bin/ed/test/ |
| H A D | TODO | 8 4) red .. - error: restricted 9 5) red / - error: restricted 10 5) red !xx - error: restricted
|
| /freebsd/sys/contrib/openzfs/lib/libzfs/ |
| H A D | libzfs_config.c | 311 static const char *restricted = NULL; in zpool_skip_pool() local 320 restricted = getenv("__ZFS_POOL_RESTRICT"); in zpool_skip_pool() 334 if (NULL == restricted) in zpool_skip_pool() 337 cur = restricted; in zpool_skip_pool()
|
| /freebsd/crypto/openssh/ |
| H A D | auth.c | 775 struct sshauthopt *restricted; in auth_restrict_session() local 780 if ((restricted = sshauthopt_new()) == NULL) in auth_restrict_session() 782 restricted->permit_pty_flag = 1; in auth_restrict_session() 783 restricted->restricted = 1; in auth_restrict_session() 785 if (auth_activate_options(ssh, restricted) != 0) in auth_restrict_session() 787 sshauthopt_free(restricted); in auth_restrict_session()
|
| H A D | auth-options.h | 44 int restricted; member
|
| H A D | auth-options.c | 344 ret->restricted = 1; in sshauthopt_parse() 674 OPTSCALAR(restricted); in sshauthopt_copy() 809 (r = sshbuf_put_u8(m, opts->restricted)) != 0 || in sshauthopt_serialise() 872 OPT_FLAG(restricted); in sshauthopt_deserialise()
|
| /freebsd/usr.sbin/bhyve/slirp/ |
| H A D | slirp-helper.c | 464 bool restricted; in main() local 526 restricted = !get_config_bool_node_default(config, "open", false); in main() 531 .restricted = restricted, in main() 567 if (restricted && caph_enter() != 0) in main()
|
| H A D | libslirp.h | 144 int restricted; member 231 Slirp *slirp_init(int restricted, bool in_enabled, struct in_addr vnetwork,
|
| /freebsd/usr.sbin/bsnmpd/bsnmpd/ |
| H A D | snmpd.config | 251 # vacmViewTreeFamilyStatus."restricted".$(internetoidlen).$(internetoid) = 4 279 #Read-write-notify access to restricted for SNMPv3 USM users with authPriv 282 # vacmAccessReadViewName.$(write)."".$(securityModelUSM).$(authPriv) = "restricted" 283 # vacmAccessWriteViewName.$(write)."".$(securityModelUSM).$(authPriv) = "restricted" 284 # vacmAccessNotifyViewName.$(write)."".$(securityModelUSM).$(authPriv) = "restricted"
|
| /freebsd/contrib/file/magic/Magdir/ |
| H A D | rpmsg | 4 # rpmsg: file(1) magic for restricted-permission messages (or "rights-protected" messages)
|
| /freebsd/contrib/llvm-project/llvm/lib/Target/PowerPC/ |
| H A D | P9InstrResources.td | 453 // These operations can be done in parallel. The DP is restricted so we need a 469 // These operations must be done sequentially.The DP is restricted so we need a 805 // Consecutive Store and ALU instructions. The store is restricted and requires 828 // Full 6 dispatches are required as this is both cracked and restricted. 849 // Full 6 dispatches are required as this is a restricted instruction. 892 // Single slice Restricted store operation. The restricted operation requires 1023 // Cracked, restricted, ALU operations. 1050 // One of the ALU ops is restricted the other is not so we have a total of 1087 // One of the ALU ops is restricted and takes 3 dispatches. 1102 // Both of the ALU ops are restricted and take 3 dispatches. [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_PKEY_CTX_set_rsa_pss_keygen_md.pod | 48 set the digest to anything other than the restricted value. Otherwise these are 59 parameters are restricted. For example, setting a minimum salt length also
|
| /freebsd/contrib/sendmail/smrsh/ |
| H A D | README | 2 README smrsh - sendmail restricted shell. 15 smrsh is a restricted shell utility that provides the ability to 114 sendmail to use the restricted shell. Save the current sendmail.cf
|
| /freebsd/sys/contrib/device-tree/Bindings/mmc/ |
| H A D | brcm,sdhci-iproc.txt | 17 restricted to 32bit host accesses to SDHCI registers.
|
| /freebsd/release/packages/ucl/ |
| H A D | libcasper-all.ucl | 25 helper process to allow restricted access to system and network resources.
|
| H A D | tcpd-all.ucl | 22 TCP Wrappers allows connections to local network services to be restricted
|
| H A D | jail-all.ucl | 22 The FreeBSD jail facility allow a set of processes to be run inside a restricted
|
| /freebsd/stand/common/ |
| H A D | commands.c | 314 const char *restricted[] = { in is_restricted_var() local 329 for (cp = restricted; *cp; cp++) { in is_restricted_var()
|
| /freebsd/sys/contrib/openzfs/tests/zfs-tests/tests/functional/delegate/ |
| H A D | delegate.cfg | 46 # filesystem which is restricted to root for older versions of mount(8).
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | RSA-PSS.pod | 9 The B<RSA-PSS> EVP_PKEY implementation is a restricted version of the RSA
|
| /freebsd/usr.sbin/bsdconfig/security/include/ |
| H A D | securelevel.hlp | 27 In addition, kernel time changes are restricted to less than
|
| /freebsd/crypto/openssh/regress/unittests/authopt/ |
| H A D | tests.c | 64 ret->restricted = 1; in default_authkey_restrict_opts() 104 FLAG_EQ(restricted); in compare_opts()
|
| /freebsd/crypto/openssl/doc/man1/ |
| H A D | openssl-rand.pod.in | 30 this is restricted to 2^61 bytes as per NIST SP 800-90C.
|
| /freebsd/usr.sbin/lpr/common_source/ |
| H A D | lp.h | 74 long restricted; /* RS: restricted to those with local accts */ member
|