Searched refs:valid (Results 1 - 23 of 23) sorted by relevance

/xnu-2422.115.4/libkern/c++/
H A DOSCollectionIterator.cpp57 valid = false;
94 valid = false;
107 valid = true;
118 valid = true;
120 else if (!valid || collection->updateStamp != initialUpdateStamp)
/xnu-2422.115.4/libkern/libkern/c++/
H A DOSCollectionIterator.h100 bool valid; member in class:OSCollectionIterator
172 * <code>true</code> if the iterator is valid for continued use,
188 * or if the iterator is no longer valid.
/xnu-2422.115.4/bsd/net/
H A Dif_utun_crypto.c71 * - ensure that the crypto context is *not* already valid (don't recreate already valid context).
112 if (crypto_ctx->valid) {
120 crypto_ctx->valid = 1;
144 * - ensure that the crypto context *is* already valid (don't release invalid context).
204 * - ensure that the crypto context is already valid (don't add crypto material to invalid context).
234 if (!crypto_ctx->valid) {
267 crypto_keys->valid = 1;
290 * - ensure that the crypto context is already valid (don't add crypto material to invalid context).
320 if (!crypto_ctx->valid) {
[all...]
H A Dif_utun_crypto.h321 int valid; // is valid? member in struct:utun_crypto_keys
374 int valid; // is valid? member in struct:utun_crypto_framer
396 int valid; member in struct:utun_crypto_ctx
H A Dif_utun_crypto_dtls.c354 if (crypto_ctx->valid) {
362 if (!crypto_ctx->valid) {
370 // crypto_ctx->valid will be set in utun_ctl_enable_crypto
388 if (crypto_ctx->valid &&
394 if (!crypto_ctx->valid ||
707 framer->valid = 1;
H A Dif_utun_crypto_ipsec.c589 if (!crypto_ctx->valid ||
600 if (!cur_crypto_keys->valid) {
/xnu-2422.115.4/iokit/Tests/
H A DTestCollections.cpp760 TEST_ASSERT('I', "1h", iter1->valid());
761 TEST_ASSERT('I', "1i", iter2->valid());
768 TEST_ASSERT('I', "1k", !iter1->valid());
786 TEST_ASSERT('I', "1n", iter1->valid());
823 TEST_ASSERT('I', "2h", iter1->valid());
824 TEST_ASSERT('I', "2i", iter2->valid());
842 TEST_ASSERT('I', "2n", iter1->valid());
850 TEST_ASSERT('I', "2k", !iter1->valid());
887 TEST_ASSERT('I', "3h", iter1->valid());
888 TEST_ASSERT('I', "3i", iter2->valid());
[all...]
/xnu-2422.115.4/bsd/miscfs/devfs/
H A Ddevfs_vfsops.c345 fsap->f_capabilities.valid[VOL_CAPABILITIES_FORMAT] =
362 fsap->f_capabilities.valid[VOL_CAPABILITIES_INTERFACES] =
378 fsap->f_capabilities.valid[VOL_CAPABILITIES_RESERVED1] = 0;
379 fsap->f_capabilities.valid[VOL_CAPABILITIES_RESERVED2] = 0;
/xnu-2422.115.4/osfmk/i386/
H A Dmtrr.c82 uint64_t length, uint32_t type, int valid);
628 uint64_t length, uint32_t type, int valid)
634 (valid ? IA32_MTRR_PHYMASK_VALID : 0);
627 var_range_encode(mtrr_var_range_t * range, addr64_t address, uint64_t length, uint32_t type, int valid) argument
/xnu-2422.115.4/bsd/vfs/
H A Dvfs_attrlist.c81 attribute_set_t valid; member in struct:_attrlist_buf
298 * Table-driven setup for all valid common/volume attributes.
459 * Table-driven setup for all valid common/dir/file/fork attributes against files.
818 /* Generate a valid mask for post processing */
819 bcopy(&alp->commonattr, &ab.valid, sizeof (attribute_set_t));
913 vs.f_capabilities.valid[VOL_CAPABILITIES_FORMAT] = 0;
914 vs.f_capabilities.valid[VOL_CAPABILITIES_INTERFACES] = VOL_CAP_INT_ATTRLIST;
915 vs.f_capabilities.valid[VOL_CAPABILITIES_RESERVED1] = 0;
916 vs.f_capabilities.valid[VOL_CAPABILITIES_RESERVED2] = 0;
922 vs.f_capabilities.valid[VOL_CAPABILITIES_INTERFACE
[all...]
H A Dvfs_vnops.c1507 (vfa.f_capabilities.valid[VOL_CAPABILITIES_INTERFACES] & VOL_CAP_INT_EXTENDED_ATTR)) {
H A Dvfs_subr.c1100 (vfsattr.f_capabilities.valid[VOL_CAPABILITIES_INTERFACES] & VOL_CAP_INT_EXTENDED_ATTR)) {
1105 (vfsattr.f_capabilities.valid[VOL_CAPABILITIES_INTERFACES] & VOL_CAP_INT_NAMEDSTREAMS)) {
1110 (vfsattr.f_capabilities.valid[VOL_CAPABILITIES_FORMAT] & VOL_CAP_FMT_PATH_FROM_ID)) {
1537 panic("vnode_ref_ext: vp %p has no valid reference %d, %d", vp, vp->v_iocount, vp->v_usecount);
H A Dvfs_syscalls.c921 (vfsattr.f_capabilities.valid[VOL_CAPABILITIES_INTERFACES] & VOL_CAP_INT_EXTENDED_ATTR)) {
926 (vfsattr.f_capabilities.valid[VOL_CAPABILITIES_INTERFACES] & VOL_CAP_INT_NAMEDSTREAMS)) {
932 (vfsattr.f_capabilities.valid[VOL_CAPABILITIES_FORMAT] & VOL_CAP_FMT_PATH_FROM_ID)) {
4144 // instance of the link is no longer valid. this will
4406 * see, the valid values for the offset ad_name_offset will be
4437 * Validate parameters; if valid, copy the descriptor array and string
4498 * It is also an error for any valid entry to point
4513 /* This is not valid for the first entry */
4549 * at least appear to contain valid data.
5932 /* Check that the flags are valid
[all...]
/xnu-2422.115.4/tools/tests/memorystatus/
H A Dmemorystatus.c1390 boolean_t valid = false; local
1431 valid = true;
1436 printTestResult("List validation test", valid, NULL);
1444 boolean_t valid = false; local
1483 valid = true;
1488 printTestResult("Idle exit test", valid, NULL);
/xnu-2422.115.4/bsd/sys/
H A Dattr.h49 /* The following option only valid when requesting ATTR_CMN_RETURNED_ATTRS */
56 /* we currently aren't anywhere near this amount for a valid
122 vol_capabilities_set_t valid; member in struct:vol_capabilities_attr
355 * ATTR_CMN_RETURNED_ATTRS is only valid with getattrlist(2).
H A Dkdebug.h60 KD_CALLBACK_TYPEFILTER_CHANGED, // Typefilter is enabled. A read-only pointer to the typefilter is provided, but is only valid while in the callback.
816 int valid; member in struct:__anon468
/xnu-2422.115.4/bsd/netinet6/
H A Dah_input.c1063 * M and OFF are valid.
1081 int valid = 0; local
1084 * Check to see if we have a valid SA corresponding to
1096 valid++;
1103 * Depending on the value of "valid" and routing table
1109 icmp6_mtudisc_update((struct ip6ctlparam *)d, valid);
H A Desp_input.c581 /* Clear the csum flags, they can't be valid for the inner headers */
628 * Set the csum valid flag, if we authenticated the
1243 * M and OFF are valid.
1261 int valid = 0; local
1264 * Check to see if we have a valid SA corresponding to
1276 valid++;
1283 * Depending on the value of "valid" and routing table
1289 icmp6_mtudisc_update((struct ip6ctlparam *)d, valid);
/xnu-2422.115.4/bsd/nfs/
H A Dnfs_vfsops.c570 u_int32_t caps, valid; local
581 * The valid[] array defines which bits this code understands
587 caps = valid = 0;
589 valid |= VOL_CAP_FMT_SYMBOLICLINKS;
594 valid |= VOL_CAP_FMT_HARDLINKS;
599 valid |= VOL_CAP_FMT_CASE_SENSITIVE;
604 valid |= VOL_CAP_FMT_CASE_PRESERVING;
622 valid |= VOL_CAP_FMT_HIDDEN_FILES;
625 // valid |= VOL_CAP_FMT_OPENDENYMODES;
643 fsap->f_capabilities.valid[VOL_CAPABILITIES_FORMA
[all...]
H A Dnfs_subs.c943 /* we need valid attributes in order to call nfs_nget() */
1662 * If the cache is valid, copy contents to *nvaper and return 0
1673 /* Check if the attributes are valid. */
3247 int i, valid; local
3280 for (i = 0, valid = 0; i < nxo->nxo_sec.count; i++) {
3282 valid = 1;
3286 if (!valid) {
3296 valid = 1;
3299 valid = 1;
3301 if (!valid)
[all...]
/xnu-2422.115.4/bsd/kern/
H A Dkdebug.c530 * If the list is valid, it is sorted, newest -> oldest. Each iop entry
1390 * We still need to mark the entry as valid.
1393 mapptr->valid = t->atts->pid;
1395 mapptr->valid = 1;
1548 * with a valid process
H A Dkern_credential.c210 * cached state and go to userland. Before then if the valid bit is
241 static int kauth_identity_find_nam(char *name, int valid, struct kauth_identity *kir);
524 KAUTH_DEBUG("RESOLVER - completed request has no valid queue");
827 * valid; we only attempt to get the buffer address if we have request
948 printf("kauth_resolver: memberd is not setting valid result codes (assuming always successful)\n");
1228 /* a valid ki_name field overwrites the previous name field */
1282 * ever bit-tested for valid lookup information we are willing
1290 * XXX: This codes performance could be improved for multiple valid
1697 * valid KI_VALID_PWNAM or KI_VALID_GRNAM
1707 kauth_identity_find_nam(char *name, int valid, struc argument
[all...]
/xnu-2422.115.4/bsd/hfs/
H A Dhfs_vfsops.c515 /* After hfs_mountfs succeeds, we should have valid hfsmp */
2621 * - check that the cnode id is valid
3223 * since build_path needs a valid parent. The same is true
3347 * We need a valid name and parent for reverse lookups.
4183 * After extending the file system, those bits can represent valid
4511 /* Make sure new size is valid. */
5516 * extent entry in this record is valid, it will be shifted
6560 /* Deallocate the old block once the new one has the new valid content */
7575 cap->valid[VOL_CAPABILITIES_FORMAT] =
7598 * Bits in the "valid" fiel
[all...]

Completed in 216 milliseconds