| /src/contrib/tcp_wrappers/ |
| H A D | miscd.c | 84 refuse(&request); in main() 106 refuse(&request); in main()
|
| H A D | tcpd.c | 98 refuse(&request); in main() 120 refuse(&request); in main()
|
| H A D | refuse.c | 27 void refuse(struct request_info *request) in refuse() function
|
| H A D | tcpd.h | 89 void refuse(struct request_info *); /* clean up and exit */
|
| H A D | CHANGES | 22 - Optionally refuse source-routed TCP connections requests altogether. 68 - The access control routines now refuse to execute "dangerous" actions
|
| /src/crypto/openssl/doc/man7/ |
| H A D | ossl_store-file.pod | 39 appropriate. Some may refuse non-PEM content for the sake of
|
| H A D | provider-encoder.pod | 265 implementation should refuse to perform the encoding, i.e.
|
| /src/contrib/sendmail/contrib/ |
| H A D | mh.patch | 30 to return "I refuse to talk to myself". You could do this under
|
| /src/crypto/openssl/doc/man3/ |
| H A D | RAND_bytes.pod | 66 error state and refuse to generate random bytes. For that reason, it is important
|
| H A D | SCT_new.pod | 188 SCT_set_source() will not refuse unknown values.
|
| H A D | BIO_s_accept.pod | 229 /* Close accept BIO to refuse further connections */
|
| /src/crypto/openssh/ |
| H A D | PROTOCOL.certkeys | 191 must refuse to authorise a key that has an unrecognised option. 241 a option, then the validating party should refuse to accept the
|
| H A D | PROTOCOL.krl | 197 refuse to load KRLs that contain signatures. We recommend the use
|
| H A D | PROTOCOL.mux | 57 The current version of the mux protocol is 4. A client should refuse
|
| H A D | PROTOCOL | 243 On receipt of such a message, an OpenSSH server will refuse to open 279 server that is not willing to open a client-specified unit should refuse
|
| /src/contrib/smbfs/ |
| H A D | HISTORY | 2 - Some iconv libraries may refuse to recode some characters. This
|
| /src/contrib/libcbor/doc/source/ |
| H A D | getting_started.rst | 48 ``SANE_MALLOC`` Assume ``malloc`` will refuse unreasonable allocations ``OFF`` …
|
| /src/contrib/unbound/doc/ |
| H A D | example.conf.in | 343 # Choose deny (drop message), refuse (polite error reply), 362 # access-control-tag-action: 192.0.2.0/24 tag3 refuse 404 # interface-tag-action: eth0@5003 tag3 refuse 733 # Ignore the CD flag in incoming queries and refuse them bogus data. 880 # o refuse serves local data (if any), else, replies with error. 926 # local-zone-override: "example.com" 192.0.2.0/24 refuse 1278 # local-zone: "example.com" refuse
|
| H A D | unbound.conf.rst | 1273 :ref:`refuse<unbound.conf.access-control.action.refuse>` is used. 1277 :ref:`refuse<unbound.conf.access-control.action.refuse>`, 1289 @@UAHL@unbound.conf.access-control.action@refuse@@ 1413 :ref:`refuse<unbound.conf.access-control.action.refuse>`. 2244 Instruct Unbound to ignore the CD flag from clients and refuse to return 2468 :ref:`refuse<unbound.conf.local-zone.type.refuse>`, 2516 @@UAHL@unbound.conf.local-zone.type@refuse@@ 2602 Like :ref:`refuse<unbound.conf.local-zone.type.refuse>`, but ignores 2848 simplified as follows: The *static*, *refuse*, *transparent*,
|
| /src/crypto/openssh/contrib/redhat/ |
| H A D | openssh.spec | 536 - refuse to do X11 forwarding if xauth isn't there, handy if you enable 581 - refuse to do X11 forwarding if xauth isn't there, handy if you enable
|
| /src/contrib/sendmail/libmilter/ |
| H A D | README | 27 it runs as root and refuse to start in that case. libmilter will
|
| /src/sys/contrib/zstd/programs/ |
| H A D | zstd.1.md | 43 `zstd` will refuse to write compressed data to standard output 45 Similarly, `zstd` will refuse to read compressed data from standard input
|
| /src/contrib/unbound/daemon/ |
| H A D | worker.c | 1203 enum acl_access deny, enum acl_access refuse, in deny_refuse() argument 1218 } else if(acl == refuse) { in deny_refuse()
|
| /src/contrib/sqlite3/autosetup/teaish/ |
| H A D | core.tcl | 247 => {Writes stub files for creating an extension. Will refuse to overwrite
|
| /src/crypto/heimdal/appl/telnet/ |
| H A D | ChangeLog | 79 client to turn it on, if failes, refuse the connection.
|