/macosx-10.10.1/Heimdal-398.1.2/lib/hcrypto/ |
H A D | validate.c | 299 static int validated = 0; 303 if (validated) 305 validated++;
|
/macosx-10.10.1/sudo-73/src/ |
H A D | parse.c | 149 sudo_file_lookup(nss, validated, pwflag) 151 int validated; 161 return validated; 176 SET(validated, FLAG_NO_CHECK); 177 CLR(validated, FLAG_NO_USER); 178 CLR(validated, FLAG_NO_HOST); 200 SET(validated, VALIDATE_OK); 202 SET(validated, VALIDATE_NOT_OK); 204 SET(validated, FLAG_CHECK_USER); 207 return validated; [all...] |
H A D | check.c | 102 check_user(validated, mode) 103 int validated; 136 SET(validated, FLAG_CHECK_USER); 156 if (status != TS_CURRENT || ISSET(validated, FLAG_CHECK_USER)) { 159 validated |= FLAG_NON_INTERACTIVE; 160 log_auth_failure(validated, 0); 189 rval = verify_user(auth_pw, prompt, validated); 191 /* Only update timestamp if user was validated. */ 192 if (rval == TRUE && ISSET(validated, VALIDATE_OK) &&
|
H A D | sudo.c | 180 int sources = 0, validated; local 371 validated = FLAG_NO_USER | FLAG_NO_HOST; 373 validated = nss->lookup(nss, validated, pwflag); 375 if (ISSET(validated, VALIDATE_OK)) { 446 rval = check_user(validated, sudo_mode); 448 if (!ISSET(validated, VALIDATE_OK)) 449 log_denial(validated, FALSE); 471 if (!ISSET(validated, VALIDATE_OK)) { 472 log_failure(validated, cmnd_statu [all...] |
/macosx-10.10.1/sudo-73/src/auth/ |
H A D | sudo_auth.c | 158 verify_user(pw, prompt, validated) 161 int validated; 249 validated |= FLAG_BAD_PASSWORD; 250 log_auth_failure(validated, def_passwd_tries - counter); 255 log_auth_failure(validated | FLAG_AUTH_ERROR, 0);
|
/macosx-10.10.1/lsof-53/lsof/tests/ |
H A D | CkTestDB | 55 # This dialect may never have been validated with the test suite. 64 echo "This suite has not been validated on:" 106 This dialect or its particular version may not have been validated
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | StaticCode.h | 152 bool validated() const { return mValidated; } function in class:Security::CodeSigning::SecStaticCode 154 { assert(validated()); return mValidated && (mValidationResult == errSecSuccess); }
|
H A D | StaticCode.cpp | 330 // If the CodeDirectory has already been validated, validate against that. 341 if (validated()) // if the directory has been validated... 347 if (validated()) // if directory has been validated... 420 if (!validated()) 440 assert(validated()); 460 case cdResourceDirSlot: // validated by validateResources 1551 if (CFRef<CFTypeRef> veto = reportEvent(CFSTR("validated"), NULL)) {
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | StaticCode.h | 152 bool validated() const { return mValidated; } function in class:Security::CodeSigning::SecStaticCode 154 { assert(validated()); return mValidated && (mValidationResult == errSecSuccess); }
|
H A D | StaticCode.cpp | 330 // If the CodeDirectory has already been validated, validate against that. 341 if (validated()) // if the directory has been validated... 347 if (validated()) // if directory has been validated... 420 if (!validated()) 440 assert(validated()); 460 case cdResourceDirSlot: // validated by validateResources 1551 if (CFRef<CFTypeRef> veto = reportEvent(CFSTR("validated"), NULL)) {
|
/macosx-10.10.1/CPANInternal-159.1/Tree-Simple-VisitorFactory-0.10/lib/Tree/Simple/Visitor/ |
H A D | FromNestedArray.pm | 171 The tree is validated prior being accepted, if it fails validation an execption will be thrown. The rules are as follows; 181 The root node is validated against this in this function, but all subsequent nodes are checked as the tree is built. Any nodes found to be array references are rejected and an exception is thrown. If you desire your node values to be array references, you can use the node filtering mechanism to acheive this as the node is filtered I<after> it is validated.
|
H A D | FromNestedHash.pm | 144 The tree is validated prior being accepted, if it fails validation an execption will be thrown. The rules are as follows;
|
/macosx-10.10.1/xnu-2782.1.97/bsd/net/ |
H A D | necp.c | 1003 bool validated = FALSE; local 1008 validated = TRUE; 1013 validated = TRUE; 1018 validated = TRUE; 1023 validated = TRUE; 1029 validated = TRUE; 1035 validated = TRUE; 1041 validated = TRUE; 1050 validated = TRUE; 1055 validated 1114 bool validated = FALSE; local [all...] |
/macosx-10.10.1/bind9-45.101/bind9/bin/dig/include/dig/ |
H A D | dig.h | 272 extern isc_boolean_t validated;
|
/macosx-10.10.1/xnu-2782.1.97/bsd/kern/ |
H A D | ubc_subr.c | 496 * been been validated by cs_validate_csblob() before calling 3427 boolean_t validated; local 3533 * Report that the page has not been validated and let the 3542 validated = FALSE; 3584 validated = TRUE; 3587 return validated;
|
/macosx-10.10.1/xnu-2782.1.97/bsd/netinet6/ |
H A D | icmp6.c | 1148 icmp6_mtudisc_update(ip6cp, validated) 1150 int validated; 1165 if (!validated)
|
/macosx-10.10.1/tcl-105/tcl_ext/tklib/tklib/modules/diagrams/include/ |
H A D | classinstance_api.inc | 250 transformed and validated attribute value into
|
/macosx-10.10.1/xnu-2782.1.97/osfmk/vm/ |
H A D | vm_fault.c | 2495 * 4. the page has not been validated yet or has been mapped for write. 2639 * - writeable mapping of a validated page - the content of that page 2761 "(signed:%d validated:%d tainted:%d " 2792 * This page has not been validated, so it 5798 boolean_t validated, tainted; local 5860 validated = cs_validate_page(blobs, 5866 page->cs_validated = validated; 5867 if (validated) {
|
/macosx-10.10.1/bind9-45.101/bind9/bin/dig/ |
H A D | dig.c | 265 if (!validated) 267 "be validated");
|
H A D | dighost.c | 177 isc_boolean_t validated = ISC_TRUE; variable 3336 validated = ISC_FALSE; 5004 printf("\n;; chain of trust can't be validated:" 5161 " the NSEC RRset can't be validated:" 5383 * We continue even the DS couldn't be validated, 5436 " the NSEC RRset can't be validated: " 5516 printf(";; OK this DNSKEY (validated by the DS) validates"
|
/macosx-10.10.1/IOKitUser-1050.1.21/kext.subproj/ |
H A D | OSKext.c | 193 unsigned int validated:1; // all possible checks done member in struct:__OSKext::__anon2261 194 unsigned int invalid:1; // at least 1 failure, or fully validated 4943 aKext->flags.validated = 0; 10523 aKext->flags.validated = 0; 11273 aKext->flags.validated = 0; 11443 aKext->flags.validated = true; 11648 if (!aKext->flags.validated) { 11667 if (!aKext->flags.validated) {
|
/macosx-10.10.1/bind9-45.101/bind9/lib/dns/ |
H A D | resolver.c | 460 static void validated(isc_task_t *task, isc_event_t *event); 496 valoptions, task, validated, valarg, 3988 validated(isc_task_t *task, isc_event_t *event) { function 4281 * be validated. 4291 * Cache any NS/NSEC records that happened to be validated. 4505 * records from a secure domain are only cached if validated 4514 * RRSIGs are validated as part of validating the
|