allowed
int allowed;
allowed = is_memory_range(XKPHYS_TO_PHYS(v),
allowed = is_memory_range(CKSEG0_TO_PHYS(v),
allowed = is_memory_range(CKSEG1_TO_PHYS(v),
allowed = uvm_kernacc((caddr_t)v, c,
if (allowed) {
int allowed;
allowed = 1;
for (i = 0; allowed && i < PGT_QUEUE_COUNT; i++) {
allowed = pgt_queue_frags_pending(sc, i) == 0;
allowed = pgt_queue_frags_pending(sc, i) >=
allowed = 0;
sc->sc_dev.dv_xname, allowed));
if (allowed && sc->sc_ic.ic_flags & IEEE80211_F_PMGTON) {
data->smu_features[i].allowed =
if (data->smu_features[i].allowed)
bool allowed;
data->smu_features[i].allowed =
if (data->smu_features[i].allowed)
if (data->smu_features[i].allowed && !enabled)
else if (!data->smu_features[i].allowed && enabled)
bool allowed;
bitmap_zero(smu->smu_feature.allowed, SMU_FEATURE_MAX);
bitmap_fill(feature->allowed, SMU_FEATURE_MAX);
bitmap_zero(feature->allowed, SMU_FEATURE_MAX);
bitmap_or(feature->allowed, feature->allowed,
DECLARE_BITMAP(allowed, SMU_FEATURE_MAX);
if (bitmap_empty(feature->allowed, SMU_FEATURE_MAX) || feature->feature_num < 64) {
bitmap_to_arr32(feature_mask, feature->allowed, 64);
if (bitmap_empty(feature->allowed, SMU_FEATURE_MAX) ||
bitmap_to_arr32(feature_mask, feature->allowed, 64);
if (bitmap_empty(feature->allowed, SMU_FEATURE_MAX) ||
bitmap_to_arr32(feature_mask, feature->allowed, 64);
u32 allowed = lobj->allowed_domains;
if ((allowed & current_domain) != 0 &&
radeon_uvd_force_into_uvd_segment(bo, allowed);
if (!allowed(pw->pw_name, _PATH_AT_ALLOW, _PATH_AT_DENY)) {
allowed = RCS_TYPE_REVISION;
return (allowed);
rcsparse_string(RCSFILE *rfp, int allowed)
if (!(allowed & RCS_TYPE_STRING)) {
rcsparse_token(RCSFILE *rfp, int allowed)
ret = rcsparse_string(rfp, allowed);
if (type & allowed)
if (type & allowed)
if (type & allowed)
allowed &= ~(RCS_TOK_COLON|RCS_TOK_SCOLON|RCS_TOK_COMMA);
switch (allowed) {
if ((cctx->allowed & DNS_COMPRESS_CASESENSITIVE) != 0) {
dctx->allowed = DNS_COMPRESS_NONE;
dns_decompress_setmethods(dns_decompress_t *dctx, unsigned int allowed) {
dctx->allowed = DNS_COMPRESS_ALL;
dctx->allowed = DNS_COMPRESS_NONE;
dctx->allowed = allowed;
cctx->allowed = 0;
cctx->allowed = 0;
dns_compress_setmethods(dns_compress_t *cctx, unsigned int allowed) {
cctx->allowed &= ~DNS_COMPRESS_ALL;
cctx->allowed |= (allowed & DNS_COMPRESS_ALL);
return (cctx->allowed & DNS_COMPRESS_ALL);
dns_decompress_setmethods(dns_decompress_t *dctx, unsigned int allowed);
unsigned int allowed; /*%< Allowed methods. */
unsigned int allowed; /*%< Allowed methods. */
dns_compress_setmethods(dns_compress_t *cctx, unsigned int allowed);
if ((dctx->allowed & DNS_COMPRESS_GLOBAL14) ==
allowed = RCS_TYPE_REVISION;
return (allowed);
rcsparse_string(RCSFILE *rfp, int allowed)
if (!(allowed & RCS_TYPE_STRING)) {
rcsparse_token(RCSFILE *rfp, int allowed)
ret = rcsparse_string(rfp, allowed);
if (type & allowed)
if (type & allowed)
if (type & allowed)
allowed &= ~(RCS_TOK_COLON|RCS_TOK_SCOLON|RCS_TOK_COMMA);
switch (allowed) {
if ((r = sshbuf_get_cstring(data, &allowed,
free(allowed);
if (addr_match_cidr_list(NULL, allowed) == -1) {
free(allowed);
opts->required_from_host_cert = allowed;
char *command, *allowed;
int r, allowed = 0;
allowed = user_key_allowed(ssh, authctxt->pw, key,
allowed = hostbased_key_allowed(ssh, authctxt->pw,
allowed ? "allowed" : "not allowed");
if (allowed) {
if ((r = sshbuf_put_u32(m, allowed)) != 0)
if (!allowed)
int r, allowed = 0;
allowed = 1;
debug3_f("sending MONITOR_ANS_PWNAM: %d", allowed);
int r, allowed = 0;
if ((r = sshbuf_get_u32(m, &allowed)) != 0)
if (allowed && type == MM_USERKEY &&
return allowed;
int allowed = 0;
allowed = 1;
return (allowed);
char *allowed, *oallowed, *cp, *tmp, *alg = NULL;
oallowed = allowed = xstrdup(options.pubkey_accepted_algos);
while ((cp = strsep(&allowed, ",")) != NULL) {
sshkey_check_cert_sigtype(const struct sshkey *key, const char *allowed)
if (key == NULL || allowed == NULL)
if (match_pattern_list(key->cert->signature_type, allowed, 0) != 1)
int allowed;
if (sp->gp->scr_suspend(sp, &allowed))
if (!allowed)
if (!allowed(RealUser, _PATH_CRON_ALLOW, _PATH_CRON_DENY)) {
allowed(const char *, const char *, const char *),