/freebsd-10.0-release/usr.bin/kdump/ |
H A D | kdump.c | 1374 if (psig->action == SIG_DFL) { 1380 (u_long)psig->action, psig->mask.__bits[0]);
|
/freebsd-10.0-release/usr.bin/rctl/ |
H A D | rctl.c | 148 const char *subject, *subject_id, *resource, *action, *amount, *per; local 158 action = strsep(©, "=/"); 170 assert(action != NULL); 177 resource, action, (uintmax_t)num); 180 resource, action, (uintmax_t)num, per); 246 const char *subject, *subject_id, *resource, *action, *amount, *per; local 256 action = strsep(©, "=/"); 269 assert(action != NULL); 277 resource, action, buf); 280 resource, action, bu [all...] |
/freebsd-10.0-release/usr.bin/usbhidaction/ |
H A D | usbhidaction.c | 65 char *action; member in struct:command 282 char buf[SIZE], name[SIZE], value[SIZE], debounce[SIZE], action[SIZE]; local 308 name, value, debounce, action) != 4) { 449 cmd->action = strdup(action); 459 cmd->value, cmd->action); 472 for (p = cmd->action, q = cmdbuf; *p && q < &cmdbuf[SIZE-1]; ) {
|
/freebsd-10.0-release/usr.bin/grep/ |
H A D | file.c | 126 lzma_action action = LZMA_RUN; local 146 action = LZMA_FINISH; 149 ret = lzma_code(&lstrm, action);
|
/freebsd-10.0-release/usr.bin/tail/ |
H A D | forward.c | 70 static int action = USE_SLEEP; variable 274 action = USE_KQUEUE; 281 action = USE_SLEEP; 297 action = USE_SLEEP; 395 switch (action) {
|
/freebsd-10.0-release/usr.bin/xlint/llib/ |
H A D | llib-lposix | 287 int (tcflow)(int fildes, int action);
|
/freebsd-10.0-release/usr.bin/gzip/ |
H A D | unxz.c | 46 lzma_action action = LZMA_RUN; local 83 action = LZMA_FINISH; 91 ret = lzma_code(&strm, action);
|
/freebsd-10.0-release/release/picobsd/tinyware/view/ |
H A D | view.c | 53 struct action { struct 82 struct action a; 192 struct action *e)
|
/freebsd-10.0-release/crypto/heimdal/kcm/ |
H A D | events.c | 52 if (event->action == KCM_EVENT_NONE) { 81 "backoff_time %d action %s cache %s", 83 event->backoff_time, action_strings[event->action], 93 if (event->action == KCM_EVENT_NONE) 110 (*e)->action = event->action; 221 event->action = KCM_EVENT_ACQUIRE_CREDS; 224 event->action = KCM_EVENT_RENEW_CREDS; 228 event->action = KCM_EVENT_ACQUIRE_CREDS; 230 event->action [all...] |
H A D | kcm_locl.h | 131 } action; member in struct:kcm_event
|
H A D | protocol.c | 194 event.action = KCM_EVENT_DESTROY_EMPTY_CACHE;
|
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | send_to_kdc.c | 586 int action; local 611 action = KRB5_SENDTO_DONE; 629 ret = (*ctx->func)(context, ctx, ctx->data, receive, &action); 633 if (action != KRB5_SENDTO_CONTINUE) { 637 } while (action != KRB5_SENDTO_DONE); 653 const krb5_data *reply, int *action) 669 *action = KRB5_SENDTO_RESTART; 673 *action = KRB5_SENDTO_CONTINUE; 652 _krb5_kdc_retry(krb5_context context, krb5_sendto_ctx ctx, void *data, const krb5_data *reply, int *action) argument
|
/freebsd-10.0-release/crypto/heimdal/lib/sqlite/ |
H A D | sqlite3.c | 2260 ** called in response to a user action such as pressing "Cancel" 2728 ** return [SQLITE_OK] to allow the action, [SQLITE_IGNORE] to disallow the 2729 ** specific action but allow the SQL statement to continue to be 2744 ** to the callback is an integer [SQLITE_COPY | action code] that specifies 2745 ** the particular action to be authorized. ^The third through sixth parameters 2747 ** details about the action to be authorized. 2749 ** ^If the action code is [SQLITE_READ] 2756 ** ^If the action code is [SQLITE_DELETE] and the callback returns 2808 ** to signal SQLite whether or not the action is permitted. See the 2824 ** what action i 23333 ULONG action; local 86636 int action; /* One of OE_None, OE_Cascade etc. */ local 90208 actionName(u8 action) argument [all...] |
/freebsd-10.0-release/crypto/heimdal/lib/roken/ |
H A D | tsearch.c | 77 trecurse(const node_t *root, void (*action)(const void *, VISIT, int), 82 (*action)(root, leaf, level); 84 (*action)(root, preorder, level); 86 trecurse(root->llink, action, level + 1); 87 (*action)(root, postorder, level); 89 trecurse(root->rlink, action, level + 1); 90 (*action)(root, endorder, level); 102 void (*action)(const void *, VISIT, int)) 104 if (vroot != NULL && action != NULL) 105 trecurse(vroot, action, [all...] |
/freebsd-10.0-release/crypto/openssh/ |
H A D | clientloop.c | 181 enum confirm_action action; member in struct:channel_reply_ctx 781 if (cr->action == CONFIRM_TTY && 784 cr->action = CONFIRM_CLOSE; 803 if (cr->action == CONFIRM_CLOSE && c->self == session_ident) 814 if (cr->action == CONFIRM_TTY) { 823 } else if (cr->action == CONFIRM_CLOSE) { 839 enum confirm_action action) 844 cr->action = action; 838 client_expect_confirm(int id, const char *request, enum confirm_action action) argument
|
H A D | sandbox-systrace.c | 48 int action; member in struct:sandbox_policy 169 allowed_syscalls[j].action : SYSTR_POLICY_KILL;
|
/freebsd-10.0-release/sys/contrib/ipfilter/netinet/ |
H A D | ip_scan.h | 38 struct action { struct 64 struct action ipsc_act;
|
/freebsd-10.0-release/sys/netpfil/ipfw/ |
H A D | ip_fw_log.c | 244 char *action; local 284 action = "Refuse"; 285 } else { /* O_LOG is the first action, find the real one */ 294 cmd += F_LEN(cmd); /* point to first action */ 306 action = action2; 309 action = "Deny"; 314 action = "Reset"; 316 action = "Reject"; 324 action = "Reset"; 331 action [all...] |
/freebsd-10.0-release/sys/netpfil/pf/ |
H A D | if_pflog.c | 214 hdr.action = rm->action;
|
H A D | if_pfsync.c | 144 u_int8_t action; member in struct:pfsync_q 641 if (subh.action >= PFSYNC_ACT_MAX) { 648 V_pfsyncstats.pfsyncs_iacts[subh.action] += count; 649 rv = (*pfsync_acts[subh.action])(&pkt, m, offset, count); 1564 subh->action = pfsync_qs[q].action; 1566 V_pfsyncstats.pfsyncs_oacts[pfsync_qs[q].action] += count; 1585 subh->action = PFSYNC_ACT_UPD_REQ; 1602 subh->action = PFSYNC_ACT_EOF; 1952 r.subh.action [all...] |
H A D | pf.c | 660 (*sn)->ruletype = rule->action; 3284 if ((r->action == PF_DROP) && 3352 if (r->action == PF_DROP) 3364 int action; local 3365 action = pf_create_state(r, nr, a, pd, nsn, nk, sk, m, off, 3368 if (action != PF_PASS) 3369 return (action); 3704 if (r->action != PF_PASS) 5628 u_short action, reason = 0, log = 0; local 5668 action 5994 u_short action, reason = 0, log = 0; local [all...] |
H A D | pf_ioctl.c | 220 V_pf_default_rule.action = PF_DROP; 222 V_pf_default_rule.action = PF_PASS; 811 PF_MD5_UPD(rule, action); 1061 if (((struct pfioc_rule *)addr)->action == 1158 rs_num = pf_get_ruleset_number(pr->rule.action); 1239 if (((((rule->action == PF_NAT) || (rule->action == PF_RDR) || 1240 (rule->action == PF_BINAT)) && rule->anchor == NULL) || 1283 rs_num = pf_get_ruleset_number(pr->rule.action); 1314 rs_num = pf_get_ruleset_number(pr->rule.action); [all...] |
H A D | pf_lb.c | 139 if (r->action == PF_BINAT && direction == PF_IN) { 204 if (rm != NULL && (rm->action == PF_NONAT || 205 rm->action == PF_NORDR || rm->action == PF_NOBINAT)) 534 switch (r->action) { 555 switch (r->action) { 655 panic("%s: unknown action %u", __func__, r->action);
|
H A D | pf_norm.c | 908 if (r == NULL || r->action == PF_NOSCRUB) 1154 if (r == NULL || r->action == PF_NOSCRUB) 1335 if (rm == NULL || rm->action == PF_NOSCRUB)
|
H A D | pf_ruleset.c | 115 pf_get_ruleset_number(u_int8_t action) argument 117 switch (action) {
|