/macosx-10.9.5/Security-55471.14.18/include/security_utilities/ |
H A D | mach++.cpp | 75 void Error::check(kern_return_t status) function in class:Security::MachPlusPlus::Error 93 check(vm_allocate(mach_task_self(), &address, size, true)); 99 check(vm_deallocate(mach_task_self(), address, size)); 109 check(::mach_port_get_refs(self(), mPort, right, &count)); 113 mach_port_t Port::requestNotify(mach_port_t notify, mach_msg_id_t type, mach_port_mscount_t sync) argument 116 check(mach_port_request_notification(self(), mPort, type, sync, notify, 121 switch (type) { 138 mach_port_t Port::cancelNotify(mach_msg_id_t type) argument 144 return requestNotify(MACH_PORT_NULL, type); 362 bool Message::check(kern_return_t status) function in class:Security::MachPlusPlus::Message 426 mach_port_type_t type; local [all...] |
H A D | sqlite++.cpp | 46 void Error::check(int err) function in class:Security::SQLite3::Error 111 check(rc); 112 check(::sqlite3_extended_result_codes(mDb, true)); 128 check(::sqlite3_close(mDb)); 138 check(rc); 147 check(::sqlite3_busy_timeout(mDb, ms)); 151 void Database::check(int err) function in class:Security::SQLite3::Database 215 Transaction::Transaction(Database &db, Type type, const char *name) argument 218 switch (type) { 264 check( [all...] |
H A D | mach++.h | 52 // actually, kern_return_t can be just about any subsystem type return code 62 static void check(kern_return_t err); 67 inline void check(kern_return_t status) function in namespace:Security::MachPlusPlus 68 { Error::check(status); } 92 // devolve to Mach primitive type 100 mach_port_type_t type() const function in class:Security::MachPlusPlus::Port 101 { mach_port_type_t typ; check(mach_port_type(self(), mPort, &typ)); return typ; } 103 bool isType(mach_port_type_t typ) const { return type() & typ; } 108 { check(mach_port_allocate(self(), right, &mPort)); } 109 void deallocate() { check(mach_port_deallocat 112 insertRight(mach_msg_type_name_t type) argument [all...] |
H A D | threading.cpp | 75 check(pthread_mutex_init(&me, NULL)); 78 Mutex::Mutex(Type type) argument 80 switch (type) { 82 check(pthread_mutex_init(&me, IFELSEDEBUG(&mutexAttrs().checking, NULL))); 85 check(pthread_mutex_init(&me, &mutexAttrs().recursive)); 94 check(result); 100 check(pthread_mutex_lock(&me)); 119 check(result); 128 check(pthread_cond_init(&me, NULL)); 133 check(pthread_cond_destro [all...] |
H A D | iodevices.cpp | 46 Error::check(::IOMasterPort(MACH_PORT_NULL, &port())); 61 Error::check(::IORegistryEntryGetName(mService, tName)); 68 Error::check(::IORegistryEntryGetNameInPlane(mService, plane, tName)); 75 Error::check(::IORegistryEntryGetPath(mService, plane, tPath)); 82 Error::check(::IORegistryEntryCreateCFProperties(mService, &dict, NULL, 0)); 117 CFError::check(*this); 123 CFError::check(*this); 129 CFError::check(*this); 154 CFError::check(mPortRef = ::IONotificationPortCreate(MasterPort())); 159 CFError::check(mPortRe 183 add(const DeviceMatch &match, Receiver &receiver, const char *type) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_utilities/lib/ |
H A D | mach++.cpp | 75 void Error::check(kern_return_t status) function in class:Security::MachPlusPlus::Error 93 check(vm_allocate(mach_task_self(), &address, size, true)); 99 check(vm_deallocate(mach_task_self(), address, size)); 109 check(::mach_port_get_refs(self(), mPort, right, &count)); 113 mach_port_t Port::requestNotify(mach_port_t notify, mach_msg_id_t type, mach_port_mscount_t sync) argument 116 check(mach_port_request_notification(self(), mPort, type, sync, notify, 121 switch (type) { 138 mach_port_t Port::cancelNotify(mach_msg_id_t type) argument 144 return requestNotify(MACH_PORT_NULL, type); 362 bool Message::check(kern_return_t status) function in class:Security::MachPlusPlus::Message 426 mach_port_type_t type; local [all...] |
H A D | sqlite++.cpp | 46 void Error::check(int err) function in class:Security::SQLite3::Error 111 check(rc); 112 check(::sqlite3_extended_result_codes(mDb, true)); 128 check(::sqlite3_close(mDb)); 138 check(rc); 147 check(::sqlite3_busy_timeout(mDb, ms)); 151 void Database::check(int err) function in class:Security::SQLite3::Database 215 Transaction::Transaction(Database &db, Type type, const char *name) argument 218 switch (type) { 264 check( [all...] |
H A D | mach++.h | 52 // actually, kern_return_t can be just about any subsystem type return code 62 static void check(kern_return_t err); 67 inline void check(kern_return_t status) function in namespace:Security::MachPlusPlus 68 { Error::check(status); } 92 // devolve to Mach primitive type 100 mach_port_type_t type() const function in class:Security::MachPlusPlus::Port 101 { mach_port_type_t typ; check(mach_port_type(self(), mPort, &typ)); return typ; } 103 bool isType(mach_port_type_t typ) const { return type() & typ; } 108 { check(mach_port_allocate(self(), right, &mPort)); } 109 void deallocate() { check(mach_port_deallocat 112 insertRight(mach_msg_type_name_t type) argument [all...] |
H A D | threading.cpp | 75 check(pthread_mutex_init(&me, NULL)); 78 Mutex::Mutex(Type type) argument 80 switch (type) { 82 check(pthread_mutex_init(&me, IFELSEDEBUG(&mutexAttrs().checking, NULL))); 85 check(pthread_mutex_init(&me, &mutexAttrs().recursive)); 94 check(result); 100 check(pthread_mutex_lock(&me)); 119 check(result); 128 check(pthread_cond_init(&me, NULL)); 133 check(pthread_cond_destro [all...] |
H A D | iodevices.cpp | 46 Error::check(::IOMasterPort(MACH_PORT_NULL, &port())); 61 Error::check(::IORegistryEntryGetName(mService, tName)); 68 Error::check(::IORegistryEntryGetNameInPlane(mService, plane, tName)); 75 Error::check(::IORegistryEntryGetPath(mService, plane, tPath)); 82 Error::check(::IORegistryEntryCreateCFProperties(mService, &dict, NULL, 0)); 117 CFError::check(*this); 123 CFError::check(*this); 129 CFError::check(*this); 154 CFError::check(mPortRef = ::IONotificationPortCreate(MasterPort())); 159 CFError::check(mPortRe 183 add(const DeviceMatch &match, Receiver &receiver, const char *type) argument [all...] |
/macosx-10.9.5/cups-372.4/cups/vcnet/regex/ |
H A D | main.ih | 9 int options(int type, char *s); 12 char *check(char *str, regmatch_t sub, char *should);
|
/macosx-10.9.5/xnu-2422.115.4/libkern/kxld/ |
H A D | kxld_sym.c | 71 check(sym); 72 check(strtab); 73 check(src); 77 sym->type = src->n_type; 106 check(sym); 107 check(strtab); 108 check(src); 112 sym->type = src->n_type; 138 check(sym); 139 check(nam 215 u_char type = n_type & N_TYPE; local [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_codesigning/ |
H A D | policyengine.cpp | 45 #undef check // Macro! Yech. macro 85 void PolicyEngine::evaluate(CFURLRef path, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context, CFMutableDictionaryRef result) argument 90 switch (type) { 107 static std::string createWhitelistScreen(char type, SHA1 &hash) argument 111 char buffer[2*SHA1::digestLength + 2] = { type }; 118 void PolicyEngine::evaluateCodeItem(SecStaticCodeRef code, CFURLRef path, AuthorityType type, SecAssessmentFlags flags, bool nested, CFMutableDictionaryRef result) argument 123 " WHERE type = :type" 125 query.bind(":type").integer(type); 234 temporarySigning(SecStaticCodeRef code, AuthorityType type, CFURLRef path, SecAssessmentFlags matchFlags) argument 311 evaluateCode(CFURLRef path, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context, CFMutableDictionaryRef result, bool handleUnsigned) argument 420 const AuthorityType type = kAuthorityInstall; local 653 add(CFTypeRef inTarget, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context) argument 757 remove(CFTypeRef target, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context) argument 773 enable(CFTypeRef target, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context) argument 778 disable(CFTypeRef target, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context) argument 783 find(CFTypeRef target, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context) argument 792 int type = int(query[1]); local 831 AuthorityType type = typeFor(context, kAuthorityInvalid); local 856 selectRules(SQLite::Statement &action, std::string phrase, std::string table, CFTypeRef inTarget, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context, std::string suffix ) argument 904 manipulateRules(const std::string &stanza, CFTypeRef inTarget, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context) argument 944 recordOutcome(SecStaticCodeRef code, bool allow, AuthorityType type, double expires, SQLite::int64 authority) argument 1013 normalizeTarget(CFRef<CFTypeRef> &target, AuthorityType type, CFDictionary &context, std::string *signUnsigned) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_codesigning/lib/ |
H A D | policyengine.cpp | 45 #undef check // Macro! Yech. macro 85 void PolicyEngine::evaluate(CFURLRef path, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context, CFMutableDictionaryRef result) argument 90 switch (type) { 107 static std::string createWhitelistScreen(char type, SHA1 &hash) argument 111 char buffer[2*SHA1::digestLength + 2] = { type }; 118 void PolicyEngine::evaluateCodeItem(SecStaticCodeRef code, CFURLRef path, AuthorityType type, SecAssessmentFlags flags, bool nested, CFMutableDictionaryRef result) argument 123 " WHERE type = :type" 125 query.bind(":type").integer(type); 234 temporarySigning(SecStaticCodeRef code, AuthorityType type, CFURLRef path, SecAssessmentFlags matchFlags) argument 311 evaluateCode(CFURLRef path, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context, CFMutableDictionaryRef result, bool handleUnsigned) argument 420 const AuthorityType type = kAuthorityInstall; local 653 add(CFTypeRef inTarget, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context) argument 757 remove(CFTypeRef target, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context) argument 773 enable(CFTypeRef target, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context) argument 778 disable(CFTypeRef target, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context) argument 783 find(CFTypeRef target, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context) argument 792 int type = int(query[1]); local 831 AuthorityType type = typeFor(context, kAuthorityInvalid); local 856 selectRules(SQLite::Statement &action, std::string phrase, std::string table, CFTypeRef inTarget, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context, std::string suffix ) argument 904 manipulateRules(const std::string &stanza, CFTypeRef inTarget, AuthorityType type, SecAssessmentFlags flags, CFDictionaryRef context) argument 944 recordOutcome(SecStaticCodeRef code, bool allow, AuthorityType type, double expires, SQLite::int64 authority) argument 1013 normalizeTarget(CFRef<CFTypeRef> &target, AuthorityType type, CFDictionary &context, std::string *signUnsigned) argument [all...] |
/macosx-10.9.5/pyobjc-42/2.5/pyobjc/pyobjc-core/Examples/NonFunctional/RemotePyInterpreter/ |
H A D | remote_console.py | 36 def excepthook(self, type, value, traceback): 37 return self.pipe.expect('RemoteConsole.excepthook', type, value, traceback) 97 check = [ 105 check = filter(lambda s:s.lower().startswith(wordlower), dir(obj)) 108 check = sets.Set(dir(__builtins__)) 109 check.update(keyword.kwlist) 110 check.update(self.locals) 112 check = filter(lambda s:s.lower().startswith(wordlower), check) 113 check [all...] |
/macosx-10.9.5/pyobjc-42/pyobjc/pyobjc-core/Examples/NonFunctional/RemotePyInterpreter/ |
H A D | remote_console.py | 36 def excepthook(self, type, value, traceback): 37 return self.pipe.expect('RemoteConsole.excepthook', type, value, traceback) 97 check = [ 105 check = filter(lambda s:s.lower().startswith(wordlower), dir(obj)) 108 check = sets.Set(dir(__builtins__)) 109 check.update(keyword.kwlist) 110 check.update(self.locals) 112 check = filter(lambda s:s.lower().startswith(wordlower), check) 113 check [all...] |
/macosx-10.9.5/objc4-551.1/runtime/ |
H A D | objc-layout.mm | 133 // couldn't fit full type in bitmap 146 // couldn't fit full type in bitmap 279 layout_bitmap check = layout_bitmap_create(result, bits.bitCount*sizeof(id), 282 compress_layout(check.bits, check.bitCount, check.weak); 285 layout_bitmap_print(check); 289 layout_bitmap_free(check); 297 layout_bitmap_set_ivar(layout_bitmap bits, const char *type, size_t offset) 302 if (!type) retur [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/ |
H A D | ssl3RecordCallouts.c | 80 check(0); 83 check(rec.contents.length <= 16384); 85 sslLogRecordIo("type = %02x, ver = %04x, len = %ld, seq = %016llx", 120 check(0); 178 check(ctx->sslTslCalls != NULL); 219 check(0); 222 check(0); 251 uint8_t type, 274 check(0); 300 if ((err = SSLVerifyMac(type, 250 ssl3DecryptRecord( uint8_t type, SSLBuffer *payload, struct SSLRecordInternalContext *ctx) argument 354 ssl3ComputeMac( uint8_t type, SSLBuffer data, SSLBuffer mac, CipherContext *cipherCtx, sslUint64 seqNo, struct SSLRecordInternalContext *ctx) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/ |
H A D | ssl3RecordCallouts.c | 80 check(0); 83 check(rec.contents.length <= 16384); 85 sslLogRecordIo("type = %02x, ver = %04x, len = %ld, seq = %016llx", 120 check(0); 178 check(ctx->sslTslCalls != NULL); 219 check(0); 222 check(0); 251 uint8_t type, 274 check(0); 300 if ((err = SSLVerifyMac(type, 250 ssl3DecryptRecord( uint8_t type, SSLBuffer *payload, struct SSLRecordInternalContext *ctx) argument 354 ssl3ComputeMac( uint8_t type, SSLBuffer data, SSLBuffer mac, CipherContext *cipherCtx, sslUint64 seqNo, struct SSLRecordInternalContext *ctx) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/ |
H A D | ssl3RecordCallouts.c | 80 check(0); 83 check(rec.contents.length <= 16384); 85 sslLogRecordIo("type = %02x, ver = %04x, len = %ld, seq = %016llx", 120 check(0); 178 check(ctx->sslTslCalls != NULL); 219 check(0); 222 check(0); 251 uint8_t type, 274 check(0); 300 if ((err = SSLVerifyMac(type, 250 ssl3DecryptRecord( uint8_t type, SSLBuffer *payload, struct SSLRecordInternalContext *ctx) argument 354 ssl3ComputeMac( uint8_t type, SSLBuffer data, SSLBuffer mac, CipherContext *cipherCtx, sslUint64 seqNo, struct SSLRecordInternalContext *ctx) argument [all...] |
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/png/ |
H A D | png.tcl | 37 binary scan $r Ia4 len type 43 if {($num == 0) && ($type != "IHDR")} { close $fh; return NOHDR } 44 if {$type == "IDAT"} { set idat 1 } 45 if {[::crc::crc32 $type$r] != $crc} { close $fh; return CKSUM } 46 set last $type 57 binary scan [read $fh 8] Ia4 len type 59 if {![eof $fh] && $type == "IHDR"} { 61 binary scan [read $fh 4] I check 62 if {$check < 0} {set check [forma [all...] |
/macosx-10.9.5/emacs-92/emacs/lisp/ |
H A D | pcvs-info.el | 49 :type '(boolean)) 58 :type '(boolean)) 159 (:constructor -cvs-create-fileinfo (type dir file full-log 166 type ;; See below 190 ;; The meaning of the type field: 215 (defun cvs-create-fileinfo (type dir file msg &rest keys) 216 (cvs-check-fileinfo (apply #'-cvs-create-fileinfo type dir file msg keys))) 223 (if (eq (cvs-fileinfo->type fileinfo) 'DIRCHANGE) 253 ;; (memq (cvs-fileinfo->type fileinf [all...] |
/macosx-10.9.5/PowerManagement-420.90.1/pmconfigd/ |
H A D | RepeatingAutoWake.c | 180 int check = today_cf_day_of_week % 7; local 187 // Therefore, since we're tossing the CF day of week into a variable (check) 188 // that we're checking the bitmask with, "check" effectively refers 190 while(!(days_mask & (1<<check))) 192 check = (check + 1) % 7; 194 check -= today_cf_day_of_week; 195 check++; // adjust for CF day of week (1-7) vs. bitmask day of week (0-6) 198 // check will be negative. Mod of negative is bogus, so we add an extra 201 check 245 copyNextRepeatingEvent(CFStringRef type) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_cdsa_client/ |
H A D | cssmclient.cpp | 51 ObjectImpl::check(CSSM_RETURN status) function in class:ObjectImpl 211 check(rc); 229 check(CSSM_Terminate()); 345 uint32 subService, CSSM_SERVICE_TYPE type, CSSM_MODULE_EVENT event) 348 reinterpret_cast<RawModuleEvents *>(context)->notify(subService, type, event); 359 // ModuleEvents enhance RawModuleEvents by splitting the callback up by type 362 CSSM_SERVICE_TYPE type, CSSM_MODULE_EVENT event) 366 insertion(subService, type); 369 removal(subService, type); 372 fault(subService, type); 344 sendNotify(const CSSM_GUID *, void *context, uint32 subService, CSSM_SERVICE_TYPE type, CSSM_MODULE_EVENT event) argument 361 notify(uint32 subService, CSSM_SERVICE_TYPE type, CSSM_MODULE_EVENT event) argument 378 insertion(uint32 subService, CSSM_SERVICE_TYPE type) argument 379 removal(uint32 subService, CSSM_SERVICE_TYPE type) argument 380 fault(uint32 subService, CSSM_SERVICE_TYPE type) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_cdsa_client/lib/ |
H A D | cssmclient.cpp | 51 ObjectImpl::check(CSSM_RETURN status) function in class:ObjectImpl 211 check(rc); 229 check(CSSM_Terminate()); 345 uint32 subService, CSSM_SERVICE_TYPE type, CSSM_MODULE_EVENT event) 348 reinterpret_cast<RawModuleEvents *>(context)->notify(subService, type, event); 359 // ModuleEvents enhance RawModuleEvents by splitting the callback up by type 362 CSSM_SERVICE_TYPE type, CSSM_MODULE_EVENT event) 366 insertion(subService, type); 369 removal(subService, type); 372 fault(subService, type); 344 sendNotify(const CSSM_GUID *, void *context, uint32 subService, CSSM_SERVICE_TYPE type, CSSM_MODULE_EVENT event) argument 361 notify(uint32 subService, CSSM_SERVICE_TYPE type, CSSM_MODULE_EVENT event) argument 378 insertion(uint32 subService, CSSM_SERVICE_TYPE type) argument 379 removal(uint32 subService, CSSM_SERVICE_TYPE type) argument 380 fault(uint32 subService, CSSM_SERVICE_TYPE type) argument [all...] |