Searched refs:authorized (Results 1 - 24 of 24) sorted by relevance

/macosx-10.9.5/RubyCocoa-80/RubyCocoa/sample/PassengerPane/test/
H A Dtest_helper.rb31 @authorized = !ref.nil?
34 def authorized method in class:OSX
35 @authorized ||= false
39 @authorized = false
42 def authorized?
43 @authorized
H A Dpref_pane_passenger_test.rb62 assigns(:authorized).should.be false
482 assigns(:authorized, true)
512 it "should not allow directories to be dropped if not authorized" do
513 assigns(:authorized, false)
577 it "should change the authorized state if a authorization request succeeds" do
587 it "should not change the authorized state if a authorization request fails" do
601 OSX::SecurityHelper.sharedInstance.should.be.authorized
602 assigns(:authorized).should.be true
605 OSX::SecurityHelper.sharedInstance.should.not.be.authorized
606 assigns(:authorized)
[all...]
/macosx-10.9.5/KerberosHelper-148/Source/
H A DLKDCHelper-main.h30 extern int authorized(audit_token_t token);
H A DLKDCHelper.c51 if (!authorized(token))
68 if (!authorized(token))
90 if (!authorized(token))
149 if (!authorized(token)) {
189 if (!authorized(token)) {
H A DLKDCHelper-main.c96 authorized(audit_token_t token) function
/macosx-10.9.5/ppp-727.90.1/Authenticators/DSAccessControl/
H A Dmain.c86 int authorized = 0; local
113 // check if user is member authorized
116 authorized = 1;
126 if (authorized)
127 notice("DSAccessControl plugin: User '%s' authorized for access\n", user_name);
129 notice("DSAccessControl plugin: User '%s' not authorized for access\n", user_name);
131 return authorized;
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/
H A Dopen_dir.c47 char *group_name, char *user_name, char *userGID, int *authorized);
58 int authorized = 0; local
98 recordName->fAttributeValueData.fBufferData, groupID->fAttributeValueData.fBufferData, &authorized);
101 authorized = 1; // no group required - user record found
114 if (authorized)
115 plog(ASL_LEVEL_NOTICE, "User '%s' authorized for access\n", user_name);
117 plog(ASL_LEVEL_NOTICE, "User '%s' not authorized for access\n", user_name);
122 return authorized;
312 char *group_name, char *user_name, char *userGID, int *authorized)
325 *authorized
311 open_dir_check_group_membership(tDirReference dirRef, tDirNodeReference searchNodeRef, char *group_name, char *user_name, char *userGID, int *authorized) argument
[all...]
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/build/
H A Dlib-shared.mk8 ## modification, are permitted only as authorized by the OpenLDAP
H A Dmkversion10 ## modification, are permitted only as authorized by the OpenLDAP
62 * modification, are permitted only as authorized by the OpenLDAP
H A Dman.mk8 ## modification, are permitted only as authorized by the OpenLDAP
H A Dmod.mk8 ## modification, are permitted only as authorized by the OpenLDAP
H A Dtop.mk8 ## modification, are permitted only as authorized by the OpenLDAP
/macosx-10.9.5/RubyCocoa-80/RubyCocoa/sample/PassengerPane/
H A DPassengerPref.rb31 kvc_accessor :applications, :authorized, :dirty_apps, :revertable_apps
124 return OSX::NSDragOperationNone unless @authorized
153 self.authorized = true
158 self.authorized = false
213 @authorized = false
/macosx-10.9.5/MITKerberosShim-62.1/test/
H A Dtest-gss-server.c309 printf ("'%s' is%s authorized for service '%s'\n",
362 int authorized = 0; local
377 connectionErr = Authorize (&gssContext, &authorized, &authorizationError);
387 * it was authorized.
389 if (authorized) {
/macosx-10.9.5/tcl-102/tcl_ext/memchan/memchan/htdocs/raw/
H A Ddisclaimer.exp29 authorized uses. Modifications to this software may be copyrighted by
/macosx-10.9.5/tcl-102/tcl_ext/trf/trf/htdocs/raw/
H A Ddisclaimer.exp29 authorized uses. Modifications to this software may be copyrighted by
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSMacOSX/
H A Dhelper.c103 authorized(audit_token_t *token) function
123 if (!authorized(&token))
135 if (!authorized(&token)) return KERN_SUCCESS;
154 if (!authorized(&token)) { *err = kmDNSHelperNotAuthorized; goto fin; }
215 if (!authorized(&token)) { *err = kmDNSHelperNotAuthorized; goto fin; }
333 if (!authorized(&token)) return KERN_SUCCESS;
564 if (!authorized(&token)) goto fin;
898 if (!authorized(&token))
1561 if (!authorized(&token)) goto fin;
2041 if (!authorized(
[all...]
/macosx-10.9.5/vim-53/runtime/keymap/
H A Dkana.vim19 " arranged in such a way that it complies with an authorized Japanese
43 " the authorized transliteration. This kmap contains some of them for
/macosx-10.9.5/CPANInternal-140/Crypt-SSLeay/certs/
H A Dca-bundle.crt3718 Issuer: C=US, O=VeriSign, Inc., OU=Class 1 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network
3722 Subject: C=US, O=VeriSign, Inc., OU=Class 1 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network
3781 Issuer: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 1 Public Primary Certification Authority - G3
3785 Subject: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 1 Public Primary Certification Authority - G3
3908 Issuer: C=US, O=VeriSign, Inc., OU=Class 2 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network
3912 Subject: C=US, O=VeriSign, Inc., OU=Class 2 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network
3971 Issuer: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 2 Public Primary Certification Authority - G3
3975 Subject: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 2 Public Primary Certification Authority - G3
4098 Issuer: C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network
4102 Subject: C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized us
[all...]
/macosx-10.9.5/CPANInternal-140/Crypt-SSLeay-0.64/certs/
H A Dca-bundle.crt3718 Issuer: C=US, O=VeriSign, Inc., OU=Class 1 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network
3722 Subject: C=US, O=VeriSign, Inc., OU=Class 1 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network
3781 Issuer: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 1 Public Primary Certification Authority - G3
3785 Subject: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 1 Public Primary Certification Authority - G3
3908 Issuer: C=US, O=VeriSign, Inc., OU=Class 2 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network
3912 Subject: C=US, O=VeriSign, Inc., OU=Class 2 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network
3971 Issuer: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 2 Public Primary Certification Authority - G3
3975 Subject: C=US, O=VeriSign, Inc., OU=VeriSign Trust Network, OU=(c) 1999 VeriSign, Inc. - For authorized use only, CN=VeriSign Class 2 Public Primary Certification Authority - G3
4098 Issuer: C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized use only, OU=VeriSign Trust Network
4102 Subject: C=US, O=VeriSign, Inc., OU=Class 3 Public Primary Certification Authority - G2, OU=(c) 1998 VeriSign, Inc. - For authorized us
[all...]
/macosx-10.9.5/CPANInternal-140/PlRPC/lib/RPC/
H A DPlServer.pm91 # Result: TRUE, if the client has successfully authorized, FALSE
667 has authorized, you should switch to a user based key. See the
/macosx-10.9.5/CPANInternal-140/PlRPC-0.2020/lib/RPC/
H A DPlServer.pm91 # Result: TRUE, if the client has successfully authorized, FALSE
667 has authorized, you should switch to a user based key. See the
/macosx-10.9.5/xnu-2422.115.4/bsd/nfs/
H A Dnfs4_vnops.c2475 int error = 0, ismember, readtoo = 0, authorized = 0; local
2516 authorized = 1;
2519 if (!authorized) {
2527 authorized = 1;
2530 if (!authorized) {
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/
H A Dconfigure[all...]

Completed in 524 milliseconds