/macosx-10.9.5/llvmCore-3425.0.33/bindings/python/llvm/ |
H A D | object.py | 58 # This is NOT OK. You perform a lookup after the object has expired. 61 print symbol.name # This raises because the object has expired. 188 self.expired = False 196 if self.expired: 197 raise Exception('Section instance has expired.') 204 if self.expired: 205 raise Exception('Section instance has expired.') 211 if self.expired: 212 raise Exception('Section instance has expired.') 219 if self.expired [all...] |
/macosx-10.9.5/ksh-20/ksh/src/cmd/ksh93/bltins/ |
H A D | sleep.c | 132 char *expired = (char*)handle; local 133 *expired = 1; 141 char expired = 0; local 143 tp = (void*)sh_timeradd(1000*sec, 0, completed, (void*)&expired); 155 if(expired) 156 expired = 0; 159 tp = (void*)sh_timeradd(1000*sec, 0, completed, (void*)&expired); 162 while(!expired && shp->lastsig==0); 163 if(!expired)
|
/macosx-10.9.5/sudo-72/src/ |
H A D | siglist.in | 33 VTALRM Virtual timer expired 34 PROF Profiling timer expired
|
/macosx-10.9.5/OpenSSH-186/openssh/openbsd-compat/ |
H A D | port-aix.c | 177 int authsuccess = 0, expired, reenter, result; local 200 * Check if the user's password is expired. 202 expired = passwdexpired(name, &msg); 207 debug3("AIX/passwdexpired returned %d msg %.100s", expired, msg); 209 switch (expired) { 210 case 0: /* password not expired */ 212 case 1: /* expired, password change required */
|
/macosx-10.9.5/ruby-104/ruby/lib/rinda/ |
H A D | tuplespace.rb | 25 # nil, or true to indicate when the tuple has expired. 43 # A TupleEntry is dead when it is canceled or expired. 46 !canceled? && !expired? 61 # Has this tuple expired? (true/false). 63 # A tuple has expired when its expiry timer based on the +sec+ argument to 66 def expired? 79 # +false+:: it has expired. 93 # +true+:: the expiry time is the start of 1970 (i.e. expired) 322 # +true+ if the TupleBag to see if it has any expired entries. 454 if entry.expired [all...] |
/macosx-10.9.5/Heimdal-323.92.1/tools/ |
H A D | kdc-log-analyze.pl | 421 } elsif (/TCP-connection from IPv[46]:([0-9\.:a-fA-F]+) expired after [0-9]+ bytes/) { 473 } elsif (/krb_rd_req: Ticket expired \(krb_rd_req\)/) { 474 } elsif (/Ticket expired \(.*\)/) { 490 } elsif (/Failed to verify AP-REQ: Ticket expired/) {
|
/macosx-10.9.5/ruby-104/ruby/test/rinda/ |
H A D | test_rinda.rb | 121 assert(!tuple.expired?) 416 assert(tuple.expired?) 421 assert(!tuple.expired?) 424 assert(tuple.expired?) 430 assert(!tuple.expired?) 434 assert(!tuple.expired?) 437 assert(tuple.expired?)
|
/macosx-10.9.5/Heimdal-323.92.1/kuser/ |
H A D | klist.c | 196 printf(N_(" (expired)", "")); 361 int expired; local 381 expired = time(NULL) > creds.times.endtime; 388 return expired; 548 int expired = 0; local 556 expired = check_for_tgt (context, id, principal, &t); 566 if (expired)
|
/macosx-10.9.5/bind9-45.100/bind9/ |
H A D | bind.keys | 19 # initialize correctly, it may have expired. In that event you should
|
/macosx-10.9.5/WebCore-7537.78.1/platform/blackberry/ |
H A D | CookieManager.cpp | 412 // If cookie does not exist and has expired, delete it 413 // If cookie exists and it has expired, so we must remove it from the map, if not update it 414 // If cookie expired and came from the BackingStore (therefore does not exist), we have to remove from database 418 // Special case for getBackingStoreCookies() to catch expired cookies 423 RefPtr<ParsedCookie> expired = curMap->removeCookie(candidateCookie, filter); local 426 if (expired && postToBackingStore != BackingStoreCookieEntry && !expired->isSession()) { 427 CookieLog("CookieManager - expired cookie is nonsession, deleting from db"); 428 m_cookieBackingStore->remove(expired);
|
/macosx-10.9.5/WebKit2-7537.78.2/Platform/efl/ |
H A D | WorkQueueEfl.cpp | 158 if (!timerWorkItems[i]->expired(current)) { 159 // If a timer work item does not expired, keep it to the m_timerWorkItems. 165 // If a timer work item expired, dispatch the function of the work item.
|
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/dnssec/ |
H A D | clean.sh | 35 rm -f ns3/expired.example.db ns3/update-nsec3.example.db
|
/macosx-10.9.5/libstdcxx-60/include/c++/4.2.1/tr1/ |
H A D | boost_shared_ptr.h | 569 * @throw bad_weak_ptr when __r.expired(), 848 if (expired()) 865 return expired() ? __shared_ptr<element_type, _Lp>() 876 expired() const // never throws function in class:std::__weak_ptr 1085 if (this->expired()) 1097 return this->expired() ? shared_ptr<_Tp>()
|
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/dnssec/ns3/ |
H A D | sign.sh | 265 # A zone with the expired signatures 267 zone=expired.example. 268 infile=expired.example.db.in 269 zonefile=expired.example.db
|
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/dnssec/ns2/ |
H A D | sign.sh | 35 auto-nsec auto-nsec3 secure.below-cname ttlpatch expired
|
/macosx-10.9.5/WebKit2-7537.78.2/Platform/ |
H A D | WorkQueue.h | 175 bool expired(double currentTime) const { return currentTime >= m_expireTime; } function in class:WorkQueue::TimerWorkItem
|
/macosx-10.9.5/ruby-104/ruby/lib/webrick/httpauth/ |
H A D | digestauth.rb | 338 error("%s: nonce is expired.", username)
|
/macosx-10.9.5/Heimdal-323.92.1/lib/sqlite/ |
H A D | sqlite3ext.h | 91 int (*expired)(sqlite3_stmt*); member in struct:sqlite3_api_routines 292 #define sqlite3_expired sqlite3_api->expired
|
/macosx-10.9.5/gssd-62/ |
H A D | gssd.c | 2014 krb5_find_cache_name(krb5_context kcontext, krb5_principal sprinc, int *expired) argument 2025 *expired = 0; 2066 *expired = 0; 2081 *expired = 1; 2118 int error, expired; local 2134 cname = krb5_find_cache_name(kctx, sprinc, &expired); 2137 Debug("Using ccache <%s> expired = %d\n", cname ? cname : "Default", expired); 2138 if (expired)
|
/macosx-10.9.5/xnu-2422.115.4/bsd/kern/ |
H A D | kern_credential.c | 1252 /* have to drop lock before freeing expired entry (it may be in use) */ 1257 /* free the expired entry */ 1478 * Notes: This is called even if the entry has expired; typically an 1479 * expired entry that's been looked up is about to be revalidated, 1502 * 0 Not expired 1531 * 0 Not expired 1559 * 0 Not expired 1667 * Note: The association may be expired, in which case the caller 1740 * Note: The association may be expired, in which case the caller 2483 int (* expired)(struc [all...] |
/macosx-10.9.5/bind9-45.100/bind9/bin/dnssec/ |
H A D | dnssec-signzone.c | 455 isc_boolean_t expired, future; local 468 expired = isc_serial_gt(now + cycle, rrsig.timeexpire); 470 expired = isc_serial_gt(now, rrsig.timeexpire); 485 expired ? "retained" : "dropped", sigstr); 486 if (!expired) 489 if (!expired && rrsig.originalttl == set->ttl && 497 sigstr, expired ? "expired" : 504 if (!expired && rrsig.originalttl == set->ttl && 512 sigstr, expired [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_x509_tp/lib/ |
H A D | TPCertInfo.cpp | 1210 bool expired = false; local 1219 /* check for expired, not valid yet */ 1230 expired = true; 1237 if(expired && !allowExpired) { 1423 * Temporal validity check: if we're not already holding an expired 1428 tpDebug("findIssuerForCertOrCrl: holding expired cert %p", 1456 /* OK, we'll use this one (preferred over an expired issuer) */ 1463 tpDbDebug("findIssuerForCertOrCrl: using expired cert %p", expiredIssuer); 1475 * we always try to find a valid cert to replace an expired or 1564 /* possible expired roo [all...] |
/macosx-10.9.5/CPANInternal-140/Log-Log4perl-1.40/lib/Log/Log4perl/Config/ |
H A D | Watch.pm | 293 regardless if C<check_interval> has expired or not, call
|
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/ |
H A D | isakmp_inf.c | 572 int expired = oakley_find_status_in_certchain(iph1->cert, CERT_STATUS_EXPIRED); 577 } else if (expired) { 579 plog(ASL_LEVEL_NOTICE, ">>> Server reports client's certificate is expired\n"); 590 int expired = oakley_find_status_in_certchain(iph1->cert_p, CERT_STATUS_EXPIRED); 597 } else if (expired) { 599 plog(ASL_LEVEL_NOTICE, ">>> Server's certificate is expired\n"); 571 int expired = oakley_find_status_in_certchain(iph1->cert, CERT_STATUS_EXPIRED); local 589 int expired = oakley_find_status_in_certchain(iph1->cert_p, CERT_STATUS_EXPIRED); local
|
/macosx-10.9.5/emacs-92/emacs/lisp/gnus/ |
H A D | mml2015.el | 433 (let* ((expired (re-search-forward 455 (when expired 456 (format "\nWARNING: Signature from expired key (%s)"
|