Searched refs:validated (Results 1 - 22 of 22) sorted by relevance

/macosx-10.10.1/Heimdal-398.1.2/lib/hcrypto/
H A Dvalidate.c299 static int validated = 0;
303 if (validated)
305 validated++;
/macosx-10.10.1/sudo-73/src/
H A Dparse.c149 sudo_file_lookup(nss, validated, pwflag)
151 int validated;
161 return validated;
176 SET(validated, FLAG_NO_CHECK);
177 CLR(validated, FLAG_NO_USER);
178 CLR(validated, FLAG_NO_HOST);
200 SET(validated, VALIDATE_OK);
202 SET(validated, VALIDATE_NOT_OK);
204 SET(validated, FLAG_CHECK_USER);
207 return validated;
[all...]
H A Dcheck.c102 check_user(validated, mode)
103 int validated;
136 SET(validated, FLAG_CHECK_USER);
156 if (status != TS_CURRENT || ISSET(validated, FLAG_CHECK_USER)) {
159 validated |= FLAG_NON_INTERACTIVE;
160 log_auth_failure(validated, 0);
189 rval = verify_user(auth_pw, prompt, validated);
191 /* Only update timestamp if user was validated. */
192 if (rval == TRUE && ISSET(validated, VALIDATE_OK) &&
H A Dsudo.c180 int sources = 0, validated; local
371 validated = FLAG_NO_USER | FLAG_NO_HOST;
373 validated = nss->lookup(nss, validated, pwflag);
375 if (ISSET(validated, VALIDATE_OK)) {
446 rval = check_user(validated, sudo_mode);
448 if (!ISSET(validated, VALIDATE_OK))
449 log_denial(validated, FALSE);
471 if (!ISSET(validated, VALIDATE_OK)) {
472 log_failure(validated, cmnd_statu
[all...]
/macosx-10.10.1/sudo-73/src/auth/
H A Dsudo_auth.c158 verify_user(pw, prompt, validated)
161 int validated;
249 validated |= FLAG_BAD_PASSWORD;
250 log_auth_failure(validated, def_passwd_tries - counter);
255 log_auth_failure(validated | FLAG_AUTH_ERROR, 0);
/macosx-10.10.1/lsof-53/lsof/tests/
H A DCkTestDB55 # This dialect may never have been validated with the test suite.
64 echo "This suite has not been validated on:"
106 This dialect or its particular version may not have been validated
/macosx-10.10.1/Security-57031.1.35/Security/include/security_codesigning/
H A DStaticCode.h152 bool validated() const { return mValidated; } function in class:Security::CodeSigning::SecStaticCode
154 { assert(validated()); return mValidated && (mValidationResult == errSecSuccess); }
H A DStaticCode.cpp330 // If the CodeDirectory has already been validated, validate against that.
341 if (validated()) // if the directory has been validated...
347 if (validated()) // if directory has been validated...
420 if (!validated())
440 assert(validated());
460 case cdResourceDirSlot: // validated by validateResources
1551 if (CFRef<CFTypeRef> veto = reportEvent(CFSTR("validated"), NULL)) {
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/lib/
H A DStaticCode.h152 bool validated() const { return mValidated; } function in class:Security::CodeSigning::SecStaticCode
154 { assert(validated()); return mValidated && (mValidationResult == errSecSuccess); }
H A DStaticCode.cpp330 // If the CodeDirectory has already been validated, validate against that.
341 if (validated()) // if the directory has been validated...
347 if (validated()) // if directory has been validated...
420 if (!validated())
440 assert(validated());
460 case cdResourceDirSlot: // validated by validateResources
1551 if (CFRef<CFTypeRef> veto = reportEvent(CFSTR("validated"), NULL)) {
/macosx-10.10.1/CPANInternal-159.1/Tree-Simple-VisitorFactory-0.10/lib/Tree/Simple/Visitor/
H A DFromNestedArray.pm171 The tree is validated prior being accepted, if it fails validation an execption will be thrown. The rules are as follows;
181 The root node is validated against this in this function, but all subsequent nodes are checked as the tree is built. Any nodes found to be array references are rejected and an exception is thrown. If you desire your node values to be array references, you can use the node filtering mechanism to acheive this as the node is filtered I<after> it is validated.
H A DFromNestedHash.pm144 The tree is validated prior being accepted, if it fails validation an execption will be thrown. The rules are as follows;
/macosx-10.10.1/xnu-2782.1.97/bsd/net/
H A Dnecp.c1003 bool validated = FALSE; local
1008 validated = TRUE;
1013 validated = TRUE;
1018 validated = TRUE;
1023 validated = TRUE;
1029 validated = TRUE;
1035 validated = TRUE;
1041 validated = TRUE;
1050 validated = TRUE;
1055 validated
1114 bool validated = FALSE; local
[all...]
/macosx-10.10.1/bind9-45.101/bind9/bin/dig/include/dig/
H A Ddig.h272 extern isc_boolean_t validated;
/macosx-10.10.1/xnu-2782.1.97/bsd/kern/
H A Dubc_subr.c496 * been been validated by cs_validate_csblob() before calling
3427 boolean_t validated; local
3533 * Report that the page has not been validated and let the
3542 validated = FALSE;
3584 validated = TRUE;
3587 return validated;
/macosx-10.10.1/xnu-2782.1.97/bsd/netinet6/
H A Dicmp6.c1148 icmp6_mtudisc_update(ip6cp, validated)
1150 int validated;
1165 if (!validated)
/macosx-10.10.1/tcl-105/tcl_ext/tklib/tklib/modules/diagrams/include/
H A Dclassinstance_api.inc250 transformed and validated attribute value into
/macosx-10.10.1/xnu-2782.1.97/osfmk/vm/
H A Dvm_fault.c2495 * 4. the page has not been validated yet or has been mapped for write.
2639 * - writeable mapping of a validated page - the content of that page
2761 "(signed:%d validated:%d tainted:%d "
2792 * This page has not been validated, so it
5798 boolean_t validated, tainted; local
5860 validated = cs_validate_page(blobs,
5866 page->cs_validated = validated;
5867 if (validated) {
/macosx-10.10.1/bind9-45.101/bind9/bin/dig/
H A Ddig.c265 if (!validated)
267 "be validated");
H A Ddighost.c177 isc_boolean_t validated = ISC_TRUE; variable
3336 validated = ISC_FALSE;
5004 printf("\n;; chain of trust can't be validated:"
5161 " the NSEC RRset can't be validated:"
5383 * We continue even the DS couldn't be validated,
5436 " the NSEC RRset can't be validated: "
5516 printf(";; OK this DNSKEY (validated by the DS) validates"
/macosx-10.10.1/IOKitUser-1050.1.21/kext.subproj/
H A DOSKext.c193 unsigned int validated:1; // all possible checks done member in struct:__OSKext::__anon2261
194 unsigned int invalid:1; // at least 1 failure, or fully validated
4943 aKext->flags.validated = 0;
10523 aKext->flags.validated = 0;
11273 aKext->flags.validated = 0;
11443 aKext->flags.validated = true;
11648 if (!aKext->flags.validated) {
11667 if (!aKext->flags.validated) {
/macosx-10.10.1/bind9-45.101/bind9/lib/dns/
H A Dresolver.c460 static void validated(isc_task_t *task, isc_event_t *event);
496 valoptions, task, validated, valarg,
3988 validated(isc_task_t *task, isc_event_t *event) { function
4281 * be validated.
4291 * Cache any NS/NSEC records that happened to be validated.
4505 * records from a secure domain are only cached if validated
4514 * RRSIGs are validated as part of validating the

Completed in 221 milliseconds