/osnet-11/usr/src/lib/libast/common/comp/ |
H A D | re_comp.c | 32 #undef valid macro 38 int valid; member in struct:__anon1126 48 if (state.valid) 54 if (state.valid) 56 state.valid = 0; 61 state.valid = 1; 72 if (state.valid && subject)
|
/osnet-11/usr/src/lib/libadm/common/ |
H A D | ckkeywd.c | 68 int valid, i, n; local 108 valid = 1; 110 valid = !match(input, keyword); 112 if (!valid) {
|
H A D | ckgid.c | 102 int valid; local 105 valid = (getgrnam(grpnm) ? 0 : 1); 107 return (valid);
|
H A D | ckrange.c | 90 int valid, n; local 142 valid = ((value >= lower) && (value <= upper)); 144 valid = 0; 145 if (!valid) {
|
H A D | ckuid.c | 102 int valid; local 105 valid = (getpwnam(usrnm) ? 0 : 1); 107 return (valid);
|
H A D | ckstr.c | 87 int i, valid; local 89 valid = 1; 95 valid = 0; 96 for (i = 0; !valid && regexp[i]; ++i) { 99 valid = __step(input, expbuf); 101 if (!valid) 105 valid = 0; 107 return (valid == 0);
|
H A D | cktime.c | 133 int valid = 1; /* time of day string is valid for format */ local 141 while (*fmt && valid) { 147 valid = 0; 153 valid = 0; 159 valid = 0; 165 valid = 0; 171 valid = 0; 176 valid = 0; 181 valid [all...] |
H A D | ckdate.c | 57 * All digits are valid for a YY year format 303 int valid = 1; /* time of day string is valid for format */ local 311 while (*fmt && valid) { 318 valid = 0; 324 valid = 0; 330 valid = 0; 336 valid = 0; 342 valid = 0; 348 valid [all...] |
/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | clnt_simple.c | 60 int valid; /* Is this entry valid ? */ member in struct:rpc_call_private 120 if (!(rcp->valid && 128 rcp->valid = 0; 155 rcp->valid = 1; 157 rcp->valid = 0; 168 rcp->valid = 0;
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/ |
H A D | k5_md5des.c | 152 krb5_boolean *valid) 248 *valid = (memcmp(plaintext+CONFLENGTH, digest, sizeof(digest)) == 0); 250 *valid = (memcmp(plaintext, digest, sizeof(digest)) == 0); 146 k5_md5des_verify(krb5_context context, krb5_const krb5_keyblock *key, krb5_keyusage usage, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_const krb5_data *hash, krb5_boolean *valid) argument
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | rd_safe.c | 67 krb5_boolean valid; local 139 scratch, his_cksum, &valid); 144 if (!valid) { 151 &safe_body, his_cksum, &valid); 152 if (!valid) {
|
H A D | copy_auth.c | 366 krb5_boolean valid = FALSE; local 397 data2, &ad_kdci->ad_checksum, &valid); 406 if (valid == FALSE) {
|
H A D | fast.c | 573 krb5_boolean valid; local 590 request, checksum, &valid); 591 if (retval == 0 &&valid == 0)
|
H A D | s4u_creds.c | 346 krb5_boolean valid; local 403 &rep_s4u_user->cksum, &valid); 406 if (valid == FALSE) {
|
/osnet-11/usr/src/lib/libprtdiag/inc/ |
H A D | libprtdiag.h | 166 ushort_t valid; member in struct:memory_bank
|
/osnet-11/usr/src/lib/libsmbns/common/ |
H A D | smbns_kpasswd.c | 457 boolean_t valid; local 485 &valid)) != 0) { 495 if (valid)
|
H A D | smbns_krb.c | 330 * If the existing krb5.conf is valid then update the kpasswd/admin server and 890 boolean_t valid; local 931 valid = (strcasecmp(cached_principal, principal) == 0); 937 return (valid);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | old_api_glue.c | 255 krb5_boolean valid; local 269 &valid))) 272 if (!valid)
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/ |
H A D | kt_solaris.c | 392 * uint_t flags, boolean_t *valid) 395 * it has a valid set of encryption types for said principal. 400 * that the function considers valid 406 * valid) 408 * where valid is a boolean that is set if the sprinc_str is correctly 409 * populated in the keytab file based on the flags set else valid is unset. 420 boolean_t *valid) 432 assert(ctx != NULL && sprinc_str != NULL && valid != NULL); 434 *valid = FALSE; 493 *valid 419 k5_kt_ad_validate(krb5_context ctx, char *sprinc_str, uint_t flags, boolean_t *valid) argument [all...] |
/osnet-11/usr/src/cmd/sendmail/db/lock/ |
H A D | lock_deadlock.c | 46 int valid; member in struct:__anon131 299 id_array[lockerp->dd_id].valid = 1; 325 id_array[lockerp->dd_id].valid = 1; 351 if (!id_array[id].valid) 400 if (!idmap[i].valid) 487 if (!idmap[i].valid)
|
/osnet-11/usr/src/cmd/hal/utils/ |
H A D | fsutils.c | 125 boolean_t valid; local 144 valid = B_TRUE; 150 valid = B_FALSE; 153 if (valid && f(arg, ipart[i].systid, relsect,
|
/osnet-11/usr/src/lib/libnisdb/ |
H A D | db_mindex3.cc | 642 bool_t valid; local 651 dbie = mindex->satisfy_query_dbonly(qin, &count, FALSE, &valid); 652 if (dbie != 0 && valid && count > 0) {
|
H A D | db_mindex.cc | 151 * Return in 'valid' FALSE if query is not well formed. 154 db_mindex::satisfy_query(db_query *q, long *count, bool_t *valid) { argument 155 return (satisfy_query(q, count, valid, FALSE)); 159 db_mindex::satisfy_query(db_query *q, long *count, bool_t *valid, argument 165 /* Make sure we have somewhere to store the "request valid" status */ 166 if (valid == NULL) 167 valid = &validRequest; 171 *valid = FALSE; 213 ret = satisfy_query_dbonly(q, count, fromLDAP ? TRUE : FALSE, valid); 219 } else if (ret == NULL && !(*valid)) { 262 satisfy_query_dbonly(db_query *q, long *count, bool_t checkExpire, bool_t *valid) argument 922 bool_t valid; local [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | accept_sec_context.c | 532 /* make sure the supplied credentials are valid for accept */ 673 * the supplied cred isn't valid. 681 /* make sure the supplied credentials are valid for accept */ 817 krb5_boolean valid; local 835 &valid); 837 if (code || !valid) { 860 one or more options are specified. Currently, the only valid
|
/osnet-11/usr/src/grub/grub2/grub-core/loader/sparc64/ieee1275/ |
H A D | linux.c | 64 int len, valid; member in struct:linux_bootstr_info 107 if (!bp->valid) 114 bp->valid = 1;
|