/macosx-10.9.5/RubyCocoa-80/RubyCocoa/sample/PassengerPane/test/ |
H A D | test_helper.rb | 31 @authorized = !ref.nil? 34 def authorized method in class:OSX 35 @authorized ||= false 39 @authorized = false 42 def authorized? 43 @authorized
|
H A D | pref_pane_passenger_test.rb | 62 assigns(:authorized).should.be false 482 assigns(:authorized, true) 512 it "should not allow directories to be dropped if not authorized" do 513 assigns(:authorized, false) 577 it "should change the authorized state if a authorization request succeeds" do 587 it "should not change the authorized state if a authorization request fails" do 601 OSX::SecurityHelper.sharedInstance.should.be.authorized 602 assigns(:authorized).should.be true 605 OSX::SecurityHelper.sharedInstance.should.not.be.authorized 606 assigns(:authorized) [all...] |
/macosx-10.9.5/KerberosHelper-148/Source/ |
H A D | LKDCHelper-main.h | 30 extern int authorized(audit_token_t token);
|
H A D | LKDCHelper.c | 51 if (!authorized(token)) 68 if (!authorized(token)) 90 if (!authorized(token)) 149 if (!authorized(token)) { 189 if (!authorized(token)) {
|
H A D | LKDCHelper-main.c | 96 authorized(audit_token_t token) function
|
/macosx-10.9.5/ppp-727.90.1/Authenticators/DSAccessControl/ |
H A D | main.c | 86 int authorized = 0; local 113 // check if user is member authorized 116 authorized = 1; 126 if (authorized) 127 notice("DSAccessControl plugin: User '%s' authorized for access\n", user_name); 129 notice("DSAccessControl plugin: User '%s' not authorized for access\n", user_name); 131 return authorized;
|
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/ |
H A D | open_dir.c | 47 char *group_name, char *user_name, char *userGID, int *authorized); 58 int authorized = 0; local 98 recordName->fAttributeValueData.fBufferData, groupID->fAttributeValueData.fBufferData, &authorized); 101 authorized = 1; // no group required - user record found 114 if (authorized) 115 plog(ASL_LEVEL_NOTICE, "User '%s' authorized for access\n", user_name); 117 plog(ASL_LEVEL_NOTICE, "User '%s' not authorized for access\n", user_name); 122 return authorized; 312 char *group_name, char *user_name, char *userGID, int *authorized) 325 *authorized 311 open_dir_check_group_membership(tDirReference dirRef, tDirNodeReference searchNodeRef, char *group_name, char *user_name, char *userGID, int *authorized) argument [all...] |
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/build/ |
H A D | lib-shared.mk | 8 ## modification, are permitted only as authorized by the OpenLDAP
|
H A D | mkversion | 10 ## modification, are permitted only as authorized by the OpenLDAP 62 * modification, are permitted only as authorized by the OpenLDAP
|
H A D | man.mk | 8 ## modification, are permitted only as authorized by the OpenLDAP
|
H A D | mod.mk | 8 ## modification, are permitted only as authorized by the OpenLDAP
|
H A D | top.mk | 8 ## modification, are permitted only as authorized by the OpenLDAP
|
/macosx-10.9.5/RubyCocoa-80/RubyCocoa/sample/PassengerPane/ |
H A D | PassengerPref.rb | 31 kvc_accessor :applications, :authorized, :dirty_apps, :revertable_apps 124 return OSX::NSDragOperationNone unless @authorized 153 self.authorized = true 158 self.authorized = false 213 @authorized = false
|
/macosx-10.9.5/MITKerberosShim-62.1/test/ |
H A D | test-gss-server.c | 309 printf ("'%s' is%s authorized for service '%s'\n", 362 int authorized = 0; local 377 connectionErr = Authorize (&gssContext, &authorized, &authorizationError); 387 * it was authorized. 389 if (authorized) {
|
/macosx-10.9.5/tcl-102/tcl_ext/memchan/memchan/htdocs/raw/ |
H A D | disclaimer.exp | 29 authorized uses. Modifications to this software may be copyrighted by
|
/macosx-10.9.5/tcl-102/tcl_ext/trf/trf/htdocs/raw/ |
H A D | disclaimer.exp | 29 authorized uses. Modifications to this software may be copyrighted by
|
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSMacOSX/ |
H A D | helper.c | 103 authorized(audit_token_t *token) function 123 if (!authorized(&token)) 135 if (!authorized(&token)) return KERN_SUCCESS; 154 if (!authorized(&token)) { *err = kmDNSHelperNotAuthorized; goto fin; } 215 if (!authorized(&token)) { *err = kmDNSHelperNotAuthorized; goto fin; } 333 if (!authorized(&token)) return KERN_SUCCESS; 564 if (!authorized(&token)) goto fin; 898 if (!authorized(&token)) 1561 if (!authorized(&token)) goto fin; 2041 if (!authorized( [all...] |
/macosx-10.9.5/vim-53/runtime/keymap/ |
H A D | kana.vim | 19 " arranged in such a way that it complies with an authorized Japanese 43 " the authorized transliteration. This kmap contains some of them for
|
/macosx-10.9.5/CPANInternal-140/Crypt-SSLeay/certs/ |
H A D | ca-bundle.crt | 3718 Issuer: C=US, O=VeriSign, Inc., OU=Class 1 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network 3722 Subject: C=US, O=VeriSign, Inc., OU=Class 1 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network 3781 Issuer: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 1 Public Primary Certification Authority - G3 3785 Subject: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 1 Public Primary Certification Authority - G3 3908 Issuer: C=US, O=VeriSign, Inc., OU=Class 2 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network 3912 Subject: C=US, O=VeriSign, Inc., OU=Class 2 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network 3971 Issuer: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 2 Public Primary Certification Authority - G3 3975 Subject: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 2 Public Primary Certification Authority - G3 4098 Issuer: C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network 4102 Subject: C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized us [all...] |
/macosx-10.9.5/CPANInternal-140/Crypt-SSLeay-0.64/certs/ |
H A D | ca-bundle.crt | 3718 Issuer: C=US, O=VeriSign, Inc., OU=Class 1 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network 3722 Subject: C=US, O=VeriSign, Inc., OU=Class 1 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network 3781 Issuer: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 1 Public Primary Certification Authority - G3 3785 Subject: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 1 Public Primary Certification Authority - G3 3908 Issuer: C=US, O=VeriSign, Inc., OU=Class 2 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network 3912 Subject: C=US, O=VeriSign, Inc., OU=Class 2 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network 3971 Issuer: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 2 Public Primary Certification Authority - G3 3975 Subject: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 2 Public Primary Certification Authority - G3 4098 Issuer: C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network 4102 Subject: C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized us [all...] |
/macosx-10.9.5/CPANInternal-140/PlRPC/lib/RPC/ |
H A D | PlServer.pm | 91 # Result: TRUE, if the client has successfully authorized, FALSE 667 has authorized, you should switch to a user based key. See the
|
/macosx-10.9.5/CPANInternal-140/PlRPC-0.2020/lib/RPC/ |
H A D | PlServer.pm | 91 # Result: TRUE, if the client has successfully authorized, FALSE 667 has authorized, you should switch to a user based key. See the
|
/macosx-10.9.5/xnu-2422.115.4/bsd/nfs/ |
H A D | nfs4_vnops.c | 2475 int error = 0, ismember, readtoo = 0, authorized = 0; local 2516 authorized = 1; 2519 if (!authorized) { 2527 authorized = 1; 2530 if (!authorized) {
|
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/ |
H A D | configure | [all...] |