/illumos-gate/usr/src/cmd/svc/startd/ |
H A D | fork.c | 850 if (access(EMI_MFST, F_OK)) { 973 if (access(SVCCFG_PATH, F_OK)) {
|
/illumos-gate/usr/src/cmd/svr4pkg/libinst/ |
H A D | dryrun.c | 686 if (access(targ_file, W_OK) == 0) { 754 if (access(continue_bin, W_OK) != 0) {
|
H A D | pkgops.c | 488 if ((access(savePath, F_OK) == 0) && remove(savePath)) { 681 if ((access(savePath, F_OK) == 0) && remove(savePath)) {
|
/illumos-gate/usr/src/uts/intel/io/dktp/controller/ata/ |
H A D | capacity.notes.txt | 34 case that a drive supports LBA access and therefore the BIOS's geometry
|
/illumos-gate/usr/src/lib/libshell/common/sh/ |
H A D | expand.c | 56 # define sh_access access
|
H A D | suid_exec.c | 172 if(access(p,X_OK) < 0) 177 /* have to check access on each component */ 290 * This version of access checks against effective uid and effective gid
|
/illumos-gate/usr/src/lib/libbsm/common/ |
H A D | audit_cron.c | 462 if (access(anc_name, F_OK) != 0) {
|
/illumos-gate/usr/src/head/rpcsvc/ |
H A D | nfs_prot.x | 102 * File access handle 132 nfstime atime; /* time of last access */ 145 nfstime atime; /* time of last access */ 445 * File access handle 649 * ACCESS: Check access permission 660 uint32 access; 665 uint32 access;
|
/illumos-gate/usr/src/cmd/picl/plugins/sun4u/lw8/fruaccess/ |
H A D | libfruaccess.c | 97 if ((frufd = open(FRU_PSEUDO_DEV, O_RDWR, access)) == -1) {
|
/illumos-gate/usr/src/cmd/rmformat/ |
H A D | rmf_misc.c | 620 * need to access the backup slice. 1342 * safe to try to open the file without checking access. 1459 if ((access(tmpstr, F_OK) == 0) && vol_running) 1468 if (access(tmpstr, F_OK) < 0) { 1476 if ((access(tmpstr, F_OK) == 0) && vol_running) 1578 if (access(found, F_OK) >= 0)
|
/illumos-gate/usr/src/cmd/mail/ |
H A D | printmail.c | 99 if (access(mailfile, A_EXIST) == A_OK) { 117 * stat succeeded, but we cannot access the mailfile 127 * using an alternate mailfile, but we failed on access 134 * we failed to access OR the file is empty
|
/illumos-gate/usr/src/cmd/backup/dump/ |
H A D | dumpitime.c | 110 if (uflag && access(increm, W_OK) < 0) { 111 msg(gettext("Cannot access dump record file `%s' for update\n"),
|
/illumos-gate/usr/src/cmd/cmd-crypto/kmfcfg/ |
H A D | create.c | 462 if (access(filename, R_OK) == 0) {
|
/illumos-gate/usr/src/cmd/sh/ |
H A D | hashserv.c | 471 if(access((char *)name, 010|(mode>>6)) == 0) {
|
/illumos-gate/usr/src/cmd/lms/ |
H A D | Protocol.cpp | 1411 PRINT("Remote access is disabled - AMT is not configured [%x]\n", status); 1440 bool access = false; local 1446 access = true; 1455 if (access) { 1476 AMT_STATUS status = _cfg.SendEnterpriseAccess(access, localIp); 1482 PRINT("Remote access is allowed.\n"); 1485 PRINT("Remote access is denied because AMT is directly connected " 1489 PRINT("Remote access is disabled.\n"); 1492 PRINT("Remote access is disabled.\n");
|
/illumos-gate/usr/src/cmd/ttymon/ |
H A D | sttydefs.c | 394 if (access(tname, 0) != -1) {
|
/illumos-gate/usr/src/lib/krb5/plugins/kdb/db2/ |
H A D | adb_openclose.c | 169 * and access it via different handles. If the handles use 317 /* write access to */ 336 if (access(db->lock->filename, F_OK) < 0) {
|
/illumos-gate/usr/src/cmd/lp/filter/postscript/postprint/ |
H A D | postprint.c | 303 if (access(tmp, R_OK) == 0)
|
/illumos-gate/usr/src/uts/common/klm/ |
H A D | nlm_client.c | 1517 args->access = fsa_NONE; 1520 args->access = fsa_R; 1523 args->access = fsa_W; 1526 args->access = fsa_RW;
|
/illumos-gate/usr/src/boot/include/ |
H A D | unistd.h | 322 int access(const char *, int);
|
/illumos-gate/usr/src/cmd/passmgmt/ |
H A D | passmgmt.c | 1308 if (unlink(OPASSWD) && access(OPASSWD, 0) == 0) 1324 if (unlink(OSHADOW) && access(OSHADOW, 0) == 0) { 1352 access(OUSERATTR_FILENAME, 0) == 0) {
|
/illumos-gate/usr/src/cmd/geniconvtbl/ |
H A D | itmcomp.c | 164 if (0 != access(file, R_OK)) { 167 gettext("%1$s: can not access %2$s: "), 572 if (0 == access(base_name, X_OK)) { 590 if (0 == access(path, X_OK)) {
|
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs3_srv.c | 221 * right access checking. So, we'll fail the request. 263 * the file, then the normal access checking done in 266 * around this, we do the access checking for ourselves 267 * and then use VOP_SPACE which doesn't do the access 613 * We need the mode so that we can correctly determine access 625 resp->resok.access = 0; 646 if (args->access & ACCESS3_READ) { 654 resp->resok.access |= ACCESS3_READ; 656 if ((args->access & ACCESS3_LOOKUP) && vp->v_type == VDIR) { 663 resp->resok.access | [all...] |
/illumos-gate/usr/src/cmd/lp/filter/postscript/dpost/ |
H A D | dpost.c | 2022 if ( access(temp, 04) == 0 ) 2705 if ( access(temp, 04) == 0 && doglobal(temp) == TRUE ) { 2716 if ( access(temp, 04) == 0 && tf == stdout )
|
/illumos-gate/usr/src/cmd/mandoc/ |
H A D | main.c | 641 if (access(file, R_OK) != -1) 647 if (access(file, R_OK) != -1) { 656 if (access(file, R_OK) != -1)
|