/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/parasiticKeys/ |
H A D | parasiteEnableLargeKeys.scr | 4 # run it like this as root: 17 root = ssRootCert.der 24 root = shroot.pem 33 root = shroot.pem 42 root = shroot.pem 48 test = "test2a, bad pkint8k.pem CA, wrong root" 51 root = root.pem 59 root = shroot.pem 65 test = "test2b, bad pkint16k.pem CA, wrong root" [all...] |
H A D | parasiteErrDetect.scr | 14 root = ssRootCert.der 23 root = shroot.pem 32 root = shroot.pem 41 root = shroot.pem 47 test = "test2a, bad pkint8k.pem CA, wrong root" 50 root = root.pem 58 root = shroot.pem 64 test = "test2b, bad pkint16k.pem CA, wrong root" 67 root [all...] |
/macosx-10.10.1/bash-94.1.2/bash-3.2/lib/intl/ |
H A D | os2compat.c | 51 char *root = getenv ("UNIXROOT"); local 57 if (root) 59 size_t sl = strlen (root); 61 memcpy (_nlos2_libdir, root, sl); 71 if (root) 73 size_t sl = strlen (root); 75 memcpy (_nlos2_localealiaspath, root, sl); 85 if (root) 87 size_t sl = strlen (root); 89 memcpy (_nlos2_localedir, root, s [all...] |
/macosx-10.10.1/ksh-23/ksh/src/lib/libast/hash/ |
H A D | hashfree.c | 36 * root info freed when last reference freed 58 if (tab->root->local->free) 60 if (tab->root->flags & HASH_BUCKET) freebucket = tab->root->local->free; 61 else freevalue = tab->root->local->free; 63 if (region = tab->root->local->region) 64 handle = tab->root->local->handle; 101 if (tab->root) 109 if ((tp = tab->root->references) != tab) 118 else if (!(tab->root [all...] |
/macosx-10.10.1/ruby-106/ruby/test/rexml/ |
H A D | test_elements.rb | 8 assert_equal 'b', doc.root.elements[1].name 9 assert_equal '1', doc.root.elements['c'].attributes['id'] 10 assert_equal '2', doc.root.elements[2,'c'].attributes['id'] 15 doc.root.elements[10] = Element.new('b') 16 assert_equal 'b', doc.root.elements[1].name 17 doc.root.elements[1] = Element.new('c') 18 assert_equal 'c', doc.root.elements[1].name 19 doc.root.elements['c'] = Element.new('d') 20 assert_equal 'd', doc.root.elements[1].name 30 b = doc.root [all...] |
/macosx-10.10.1/libxml2-26/libxml2/python/tests/ |
H A D | tst.py | 12 root = doc.children variable 13 if root.name != "doc": 14 print("root.name failed") 16 child = root.children
|
H A D | resolver.py | 20 root = doc.children variable 21 if root.name != "foo": 22 print("root element name error") 29 root = doc.children 30 if root.name != "foo": 31 print("root element name error")
|
/macosx-10.10.1/msdosfs-209.1.1/ |
H A D | copy_kext.sh | 22 # Also note that this script assumes it can SSH as root to the target 23 # machine. In a default install, root has no password, and no SSH keys, 24 # so SSH to root fails unless you give root a password or SSH keys. I prefer 25 # to set up root's SSH authorized keys to be my user's keys, so my user 26 # can SSH to root without any prompt. Here's how I do it: 30 # ~ # cd ~root 31 # ~root # mkdir .ssh 32 # ~root # cp ~mark/.ssh/authorized_keys* .ssh 33 # ~root # exi [all...] |
/macosx-10.10.1/pyobjc-45/2.6/pyobjc/pyobjc-core/libxml2-src/python/tests/ |
H A D | tst.py | 12 root = doc.children variable 13 if root.name != "doc": 14 print "root.name failed" 16 child = root.children
|
H A D | resolver.py | 15 root = doc.children variable 16 if root.name != "foo": 17 print "root element name error" 24 root = doc.children 25 if root.name != "foo": 26 print "root element name error"
|
/macosx-10.10.1/tcl-105/tcl_ext/tcllib/tcllib/modules/page/ |
H A D | analysis_peg_reachable.tcl | 46 if {[$t keyexists root page::analysis::peg::reachable]} return 49 # root node of the start expression. This is a simple topdown walk 56 # Initialize walking state: 2 arrays, all nodes (except root) are 63 unset unreach(root) 69 page::util::flow [list [$t get root start]] flow n { 95 $t set root page::analysis::peg::reachable [array names reach] 96 $t set root page::analysis::peg::unreachable [array names unreach] 102 # Determine which nonterminal symbols are reachable from the root 109 set unreach [$t get root page::analysis::peg::unreachable] 120 foreach {sym def} [$t get root definition [all...] |
/macosx-10.10.1/IOHIDFamily-606.1.7/IOHIDSystem/ |
H A D | IOFixed64.cpp | 98 UInt64 root = 0; local 102 root <<= 1; 106 root++; 108 if (root <= rem) { 109 rem -= root; 110 root++; 112 root--; 116 return(UInt32)(root >> 1); 122 UInt32 root = 0; local 126 root << [all...] |
/macosx-10.10.1/Libnotify-133.1.1/notifyd/xcodescripts/ |
H A D | mk_notify_conf.sh | 3 install -d -o root -g wheel -m 0755 "$ETCDIR" 4 install -c -o root -g wheel -m 0644 \
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/miscPolicies/ |
H A D | miscPolicies.scr | 14 root = miscPoliciesRoot.cer 20 root = miscPoliciesRoot.cer
|
/macosx-10.10.1/bootstrap_cmds-91/xcodescripts/ |
H A D | install-mig.sh | 5 install -d -o root -g wheel -m 0755 "$BINDIR" 6 install -c -o root -g wheel -m 0755 \
|
/macosx-10.10.1/cxxfilt-11/cxxfilt/bfd/ |
H A D | i386linux.c | 153 struct aout_link_hash_entry root; 158 struct aout_link_hash_table root; 233 if (!NAME(aout,link_hash_table_init) (&ret->root, abfd, 246 return &ret->root.root; 253 aout_link_hash_lookup (&(table)->root, (string), (create), (copy),\ 260 (&(table)->root, \ 373 && (h->root.root.type == bfd_link_hash_defined 374 || h->root 152 struct aout_link_hash_entry root; member in struct:linux_link_hash_entry 157 struct aout_link_hash_table root; member in struct:linux_link_hash_table [all...] |
H A D | m68klinux.c | 154 struct aout_link_hash_entry root; 159 struct aout_link_hash_table root; 237 if (!NAME(aout,link_hash_table_init) (&ret->root, abfd, 250 return &ret->root.root; 257 aout_link_hash_lookup (&(table)->root, (string), (create), (copy),\ 264 (&(table)->root, \ 377 && (h->root.root.type == bfd_link_hash_defined 378 || h->root 153 struct aout_link_hash_entry root; member in struct:linux_link_hash_entry 158 struct aout_link_hash_table root; member in struct:linux_link_hash_table [all...] |
H A D | sparclinux.c | 153 struct aout_link_hash_entry root; member in struct:linux_link_hash_entry 158 struct aout_link_hash_table root; member in struct:linux_link_hash_table 233 if (!NAME(aout,link_hash_table_init) (&ret->root, abfd, 246 return &ret->root.root; 253 aout_link_hash_lookup (&(table)->root, (string), (create), (copy),\ 260 (&(table)->root, \ 373 && (h->root.root.type == bfd_link_hash_defined 374 || h->root [all...] |
/macosx-10.10.1/gnudiff-19/xcodescripts/ |
H A D | install_files.sh | 10 install -d -o root -g wheel -m 0755 "$DSTROOT"/"$MANDIR"/man1 11 install -c -o root -g wheel -m 0644 "$PROJECT_DIR"/diffutils/man/cmp.1 "$DSTROOT"/"$MANDIR"/man1 12 install -c -o root -g wheel -m 0644 "$PROJECT_DIR"/diffutils/man/diff.1 "$DSTROOT"/"$MANDIR"/man1 13 install -c -o root -g wheel -m 0644 "$PROJECT_DIR"/diffutils/man/diff3.1 "$DSTROOT"/"$MANDIR"/man1 14 install -c -o root -g wheel -m 0644 "$PROJECT_DIR"/diffutils/man/sdiff.1 "$DSTROOT"/"$MANDIR"/man1 16 install -d -o root -g wheel -m 0755 "$DSTROOT"/"$INFODIR" 17 install -c -o root -g wheel -m 0644 "$PROJECT_DIR"/diffutils/doc/diff.info "$DSTROOT"/"$INFODIR" 24 install -d -o root -g wheel -m 0755 "$DSTROOT"/"$OSV" 25 install -c -o root -g wheel -m 0444 "$PROJECT_DIR"/gnudiff.plist "$DSTROOT"/"$OSV" 26 install -d -o root [all...] |
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/ixfr/ |
H A D | tests.sh | 34 nil. 300 SOA ns.nil. root.nil. 1 300 300 604800 300 36 nil. 300 SOA ns.nil. root.nil. 1 300 300 604800 300 43 nil. 300 SOA ns.nil. root.nil. 1 300 300 604800 300 81 nil. 300 SOA ns.nil. root.nil. 3 300 300 604800 300 83 nil. 300 SOA ns.nil. root.nil. 3 300 300 604800 300 84 nil. 300 SOA ns.nil. root.nil. 1 300 300 604800 300 87 nil. 300 SOA ns.nil. root.nil. 2 300 300 604800 300 90 nil. 300 SOA ns.nil. root.nil. 2 300 300 604800 300 91 nil. 300 SOA ns.nil. root.nil. 3 300 300 604800 300 92 nil. 300 SOA ns.nil. root [all...] |
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/libraries/liblutil/ |
H A D | testtavl.c | 42 static void ravl_print LDAP_P(( Avlnode *root, int depth, int thread )); 43 static void myprint LDAP_P(( Avlnode *root )); 118 static void ravl_print( Avlnode *root, int depth, int thread ) argument 122 if ( root && !thread ) 123 ravl_print( root->avl_link[1], depth+1, root->avl_bits[1] == AVL_THREAD ); 129 else if ( root ) 130 printf( "%c", bfcs[root->avl_bf] ); 133 if ( !root) { 137 printf( "%s\n", (char *) root [all...] |
H A D | testavl.c | 42 static void ravl_print LDAP_P(( Avlnode *root, int depth )); 43 static void myprint LDAP_P(( Avlnode *root )); 119 static void ravl_print( Avlnode *root, int depth ) argument 123 if ( root == 0 ) 126 ravl_print( root->avl_right, depth+1 ); 130 printf( "%s %d\n", (char *) root->avl_data, root->avl_bf ); 132 ravl_print( root->avl_left, depth+1 ); 135 static void myprint( Avlnode *root ) 139 if ( root [all...] |
/macosx-10.10.1/cups-408/cups/packaging/ |
H A D | cups.list.in | 262 f 0555 root sys $SBINDIR/cupsd scheduler/cupsd 264 d 0755 root sys $SERVERBIN - 266 d 0755 root sys $SERVERBIN/apple - 267 f 0555 root sys $SERVERBIN/apple/ipp backend/ipp 268 l 0755 root sys $SERVERBIN/apple/http ipp 269 l 0755 root sys $SERVERBIN/apple/https ipp 270 l 0755 root sys $SERVERBIN/apple/ipps ipp 272 d 0755 root sys $SERVERBIN/backend - 273 f 0500 root sys $SERVERBIN/backend/ipp backend/ipp 274 l 0700 root sy [all...] |
/macosx-10.10.1/ruby-106/ruby/ext/tk/sample/demos-jp/ |
H A D | rolodex-j | 37 $root.frame.entry[1].insert(0, "������ ������") 38 $root.frame.entry[2].insert(0, "923-1292 ���������") 39 $root.frame.entry[3].insert(0, "��������� ������ 1-1") 40 $root.frame.entry[4].insert(0, "���������������������������������������") 41 $root.frame.entry[5].insert(0,"private") 42 $root.frame.entry[6].insert(0,"***-***-****") 43 $root.frame.entry[7].insert(0,"***-***-****") 50 $root.frame.entry[i].value) 56 $root.frame.entry[i].delete(0,"end") 140 "command" => proc{$root [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/implicitAnchor/ |
H A D | implicitAnchor.scr | 11 test = "Standard verification with root in anchors" 16 root = root.cer 19 test = "Standard verification with root in input, expect fail" 22 cert = root.cer 31 cert = root.cer
|