/xnu-2422.115.4/libkern/c++/ |
H A D | OSCollectionIterator.cpp | 57 valid = false; 94 valid = false; 107 valid = true; 118 valid = true; 120 else if (!valid || collection->updateStamp != initialUpdateStamp)
|
/xnu-2422.115.4/libkern/libkern/c++/ |
H A D | OSCollectionIterator.h | 100 bool valid; member in class:OSCollectionIterator 172 * <code>true</code> if the iterator is valid for continued use, 188 * or if the iterator is no longer valid.
|
/xnu-2422.115.4/bsd/net/ |
H A D | if_utun_crypto.c | 71 * - ensure that the crypto context is *not* already valid (don't recreate already valid context). 112 if (crypto_ctx->valid) { 120 crypto_ctx->valid = 1; 144 * - ensure that the crypto context *is* already valid (don't release invalid context). 204 * - ensure that the crypto context is already valid (don't add crypto material to invalid context). 234 if (!crypto_ctx->valid) { 267 crypto_keys->valid = 1; 290 * - ensure that the crypto context is already valid (don't add crypto material to invalid context). 320 if (!crypto_ctx->valid) { [all...] |
H A D | if_utun_crypto.h | 321 int valid; // is valid? member in struct:utun_crypto_keys 374 int valid; // is valid? member in struct:utun_crypto_framer 396 int valid; member in struct:utun_crypto_ctx
|
H A D | if_utun_crypto_dtls.c | 354 if (crypto_ctx->valid) { 362 if (!crypto_ctx->valid) { 370 // crypto_ctx->valid will be set in utun_ctl_enable_crypto 388 if (crypto_ctx->valid && 394 if (!crypto_ctx->valid || 707 framer->valid = 1;
|
H A D | if_utun_crypto_ipsec.c | 589 if (!crypto_ctx->valid || 600 if (!cur_crypto_keys->valid) {
|
/xnu-2422.115.4/iokit/Tests/ |
H A D | TestCollections.cpp | 760 TEST_ASSERT('I', "1h", iter1->valid()); 761 TEST_ASSERT('I', "1i", iter2->valid()); 768 TEST_ASSERT('I', "1k", !iter1->valid()); 786 TEST_ASSERT('I', "1n", iter1->valid()); 823 TEST_ASSERT('I', "2h", iter1->valid()); 824 TEST_ASSERT('I', "2i", iter2->valid()); 842 TEST_ASSERT('I', "2n", iter1->valid()); 850 TEST_ASSERT('I', "2k", !iter1->valid()); 887 TEST_ASSERT('I', "3h", iter1->valid()); 888 TEST_ASSERT('I', "3i", iter2->valid()); [all...] |
/xnu-2422.115.4/bsd/miscfs/devfs/ |
H A D | devfs_vfsops.c | 345 fsap->f_capabilities.valid[VOL_CAPABILITIES_FORMAT] = 362 fsap->f_capabilities.valid[VOL_CAPABILITIES_INTERFACES] = 378 fsap->f_capabilities.valid[VOL_CAPABILITIES_RESERVED1] = 0; 379 fsap->f_capabilities.valid[VOL_CAPABILITIES_RESERVED2] = 0;
|
/xnu-2422.115.4/osfmk/i386/ |
H A D | mtrr.c | 82 uint64_t length, uint32_t type, int valid); 628 uint64_t length, uint32_t type, int valid) 634 (valid ? IA32_MTRR_PHYMASK_VALID : 0); 627 var_range_encode(mtrr_var_range_t * range, addr64_t address, uint64_t length, uint32_t type, int valid) argument
|
/xnu-2422.115.4/bsd/vfs/ |
H A D | vfs_attrlist.c | 81 attribute_set_t valid; member in struct:_attrlist_buf 298 * Table-driven setup for all valid common/volume attributes. 459 * Table-driven setup for all valid common/dir/file/fork attributes against files. 818 /* Generate a valid mask for post processing */ 819 bcopy(&alp->commonattr, &ab.valid, sizeof (attribute_set_t)); 913 vs.f_capabilities.valid[VOL_CAPABILITIES_FORMAT] = 0; 914 vs.f_capabilities.valid[VOL_CAPABILITIES_INTERFACES] = VOL_CAP_INT_ATTRLIST; 915 vs.f_capabilities.valid[VOL_CAPABILITIES_RESERVED1] = 0; 916 vs.f_capabilities.valid[VOL_CAPABILITIES_RESERVED2] = 0; 922 vs.f_capabilities.valid[VOL_CAPABILITIES_INTERFACE [all...] |
H A D | vfs_vnops.c | 1507 (vfa.f_capabilities.valid[VOL_CAPABILITIES_INTERFACES] & VOL_CAP_INT_EXTENDED_ATTR)) {
|
H A D | vfs_subr.c | 1100 (vfsattr.f_capabilities.valid[VOL_CAPABILITIES_INTERFACES] & VOL_CAP_INT_EXTENDED_ATTR)) { 1105 (vfsattr.f_capabilities.valid[VOL_CAPABILITIES_INTERFACES] & VOL_CAP_INT_NAMEDSTREAMS)) { 1110 (vfsattr.f_capabilities.valid[VOL_CAPABILITIES_FORMAT] & VOL_CAP_FMT_PATH_FROM_ID)) { 1537 panic("vnode_ref_ext: vp %p has no valid reference %d, %d", vp, vp->v_iocount, vp->v_usecount);
|
H A D | vfs_syscalls.c | 921 (vfsattr.f_capabilities.valid[VOL_CAPABILITIES_INTERFACES] & VOL_CAP_INT_EXTENDED_ATTR)) { 926 (vfsattr.f_capabilities.valid[VOL_CAPABILITIES_INTERFACES] & VOL_CAP_INT_NAMEDSTREAMS)) { 932 (vfsattr.f_capabilities.valid[VOL_CAPABILITIES_FORMAT] & VOL_CAP_FMT_PATH_FROM_ID)) { 4144 // instance of the link is no longer valid. this will 4406 * see, the valid values for the offset ad_name_offset will be 4437 * Validate parameters; if valid, copy the descriptor array and string 4498 * It is also an error for any valid entry to point 4513 /* This is not valid for the first entry */ 4549 * at least appear to contain valid data. 5932 /* Check that the flags are valid [all...] |
/xnu-2422.115.4/tools/tests/memorystatus/ |
H A D | memorystatus.c | 1390 boolean_t valid = false; local 1431 valid = true; 1436 printTestResult("List validation test", valid, NULL); 1444 boolean_t valid = false; local 1483 valid = true; 1488 printTestResult("Idle exit test", valid, NULL);
|
/xnu-2422.115.4/bsd/sys/ |
H A D | attr.h | 49 /* The following option only valid when requesting ATTR_CMN_RETURNED_ATTRS */ 56 /* we currently aren't anywhere near this amount for a valid 122 vol_capabilities_set_t valid; member in struct:vol_capabilities_attr 355 * ATTR_CMN_RETURNED_ATTRS is only valid with getattrlist(2).
|
H A D | kdebug.h | 60 KD_CALLBACK_TYPEFILTER_CHANGED, // Typefilter is enabled. A read-only pointer to the typefilter is provided, but is only valid while in the callback. 816 int valid; member in struct:__anon468
|
/xnu-2422.115.4/bsd/netinet6/ |
H A D | ah_input.c | 1063 * M and OFF are valid. 1081 int valid = 0; local 1084 * Check to see if we have a valid SA corresponding to 1096 valid++; 1103 * Depending on the value of "valid" and routing table 1109 icmp6_mtudisc_update((struct ip6ctlparam *)d, valid);
|
H A D | esp_input.c | 581 /* Clear the csum flags, they can't be valid for the inner headers */ 628 * Set the csum valid flag, if we authenticated the 1243 * M and OFF are valid. 1261 int valid = 0; local 1264 * Check to see if we have a valid SA corresponding to 1276 valid++; 1283 * Depending on the value of "valid" and routing table 1289 icmp6_mtudisc_update((struct ip6ctlparam *)d, valid);
|
/xnu-2422.115.4/bsd/nfs/ |
H A D | nfs_vfsops.c | 570 u_int32_t caps, valid; local 581 * The valid[] array defines which bits this code understands 587 caps = valid = 0; 589 valid |= VOL_CAP_FMT_SYMBOLICLINKS; 594 valid |= VOL_CAP_FMT_HARDLINKS; 599 valid |= VOL_CAP_FMT_CASE_SENSITIVE; 604 valid |= VOL_CAP_FMT_CASE_PRESERVING; 622 valid |= VOL_CAP_FMT_HIDDEN_FILES; 625 // valid |= VOL_CAP_FMT_OPENDENYMODES; 643 fsap->f_capabilities.valid[VOL_CAPABILITIES_FORMA [all...] |
H A D | nfs_subs.c | 943 /* we need valid attributes in order to call nfs_nget() */ 1662 * If the cache is valid, copy contents to *nvaper and return 0 1673 /* Check if the attributes are valid. */ 3247 int i, valid; local 3280 for (i = 0, valid = 0; i < nxo->nxo_sec.count; i++) { 3282 valid = 1; 3286 if (!valid) { 3296 valid = 1; 3299 valid = 1; 3301 if (!valid) [all...] |
/xnu-2422.115.4/bsd/kern/ |
H A D | kdebug.c | 530 * If the list is valid, it is sorted, newest -> oldest. Each iop entry 1390 * We still need to mark the entry as valid. 1393 mapptr->valid = t->atts->pid; 1395 mapptr->valid = 1; 1548 * with a valid process
|
H A D | kern_credential.c | 210 * cached state and go to userland. Before then if the valid bit is 241 static int kauth_identity_find_nam(char *name, int valid, struct kauth_identity *kir); 524 KAUTH_DEBUG("RESOLVER - completed request has no valid queue"); 827 * valid; we only attempt to get the buffer address if we have request 948 printf("kauth_resolver: memberd is not setting valid result codes (assuming always successful)\n"); 1228 /* a valid ki_name field overwrites the previous name field */ 1282 * ever bit-tested for valid lookup information we are willing 1290 * XXX: This codes performance could be improved for multiple valid 1697 * valid KI_VALID_PWNAM or KI_VALID_GRNAM 1707 kauth_identity_find_nam(char *name, int valid, struc argument [all...] |
/xnu-2422.115.4/bsd/hfs/ |
H A D | hfs_vfsops.c | 515 /* After hfs_mountfs succeeds, we should have valid hfsmp */ 2621 * - check that the cnode id is valid 3223 * since build_path needs a valid parent. The same is true 3347 * We need a valid name and parent for reverse lookups. 4183 * After extending the file system, those bits can represent valid 4511 /* Make sure new size is valid. */ 5516 * extent entry in this record is valid, it will be shifted 6560 /* Deallocate the old block once the new one has the new valid content */ 7575 cap->valid[VOL_CAPABILITIES_FORMAT] = 7598 * Bits in the "valid" fiel [all...] |