Lines Matching +defs:val +defs:values

652 			/* Null values should have been weeded out by caller */
1611 validate_user_type(const char *name, const char *val,
1621 if (!is_a_number(val)) {
1632 name, val, sa_strerror(rc));
1636 pwd_rc = getpwnam_r(val, &pwd, pwd_bufp, pwd_buflen, &pwdp);
1643 name, val, sa_strerror(rc));
1648 intval = strtoull(val, NULL, 0);
1653 name, val, sa_strerror(rc));
1665 * This will only check multi-entry values.
1666 * Cannot have '*' with other values
1696 "%s: cannot mix \"*\" with other values: %s=%s"),
1716 * Validate access list values. Should eventually validate that all
1717 * the values make sense. Also, ro and rw may have cross value conflicts.
1766 const char *values;
1770 values = dgettext(TEXT_DOMAIN, "<string>");
1773 values = dgettext(TEXT_DOMAIN, "<string>");
1776 values = NULL;
1779 values = dgettext(TEXT_DOMAIN, "<number>");
1782 values = dgettext(TEXT_DOMAIN, "<range>");
1785 values = dgettext(TEXT_DOMAIN, "<uid>");
1788 values = dgettext(TEXT_DOMAIN, "<access list>");
1791 values = dgettext(TEXT_DOMAIN, "deprecated");
1794 values = dgettext(TEXT_DOMAIN, "<security mode list>");
1797 values = dgettext(TEXT_DOMAIN, "<path>");
1800 values = dgettext(TEXT_DOMAIN, "<file>");
1803 values = dgettext(TEXT_DOMAIN, "<tag>");
1806 values = dgettext(TEXT_DOMAIN, "<stringset>");
1809 values = dgettext(TEXT_DOMAIN, "<domain>");
1812 values = NULL;
1815 values = dgettext(TEXT_DOMAIN, "<protocol>");
1818 values = dgettext(TEXT_DOMAIN, "<string>");
1821 return (values);
2704 int val;
2806 val = strtoul(value, NULL, 0);
2825 val = UID_NOBODY;
2827 val = pwdp->pw_uid;
2830 secinfo->s_rootid = val;
2921 uint32_t val;
3029 val = strtoul(value, NULL, 0);
3044 val = UID_NOBODY;
3046 val = pwdp->pw_uid;
3050 export->ex_anon = val;
4089 * values are in the correct range. E.g. setting server_versmin
4217 * order to use the new property values. Some properties affect
4312 int val;
4319 val = strtoul(propval, NULL, 0);
4321 ret = value <= val ? B_TRUE : B_FALSE;
4323 ret = value >= val ? B_TRUE : B_FALSE;
4381 * value. This is a sanity check to prevent bad values getting into
4382 * the default files. All values need to be checked against what is
4403 int val;
4404 val = strtoul(value, NULL, 0);
4405 if (val < proto_options[index].minval ||
4406 val > proto_options[index].maxval)
4415 if (!nfs_minmax_check(index, val))
4559 * Add the default values for any property not defined in the parsing
4610 * Read NFS SMF properties and add the defined values to the
4611 * proplist. Note that default values are known from the built in
4614 * values.
4645 * values it takes are "on/off" and boolean
4647 * to on/off values here
4721 char *val;
4730 if (nvlist_lookup_string(nfs_proto_proplist, propname, &val) == 0) {
4731 if ((*propval = strdup(val)) != NULL)