Searched defs:valid (Results 1 - 25 of 46) sorted by relevance

12

/osnet-11/usr/src/lib/libast/common/comp/
H A Dre_comp.c32 #undef valid macro
38 int valid; member in struct:__anon1126
48 if (state.valid)
54 if (state.valid)
56 state.valid = 0;
61 state.valid = 1;
72 if (state.valid && subject)
/osnet-11/usr/src/lib/libadm/common/
H A Dckkeywd.c68 int valid, i, n; local
108 valid = 1;
110 valid = !match(input, keyword);
112 if (!valid) {
H A Dckgid.c102 int valid; local
105 valid = (getgrnam(grpnm) ? 0 : 1);
107 return (valid);
H A Dckrange.c90 int valid, n; local
142 valid = ((value >= lower) && (value <= upper));
144 valid = 0;
145 if (!valid) {
H A Dckuid.c102 int valid; local
105 valid = (getpwnam(usrnm) ? 0 : 1);
107 return (valid);
H A Dckstr.c87 int i, valid; local
89 valid = 1;
95 valid = 0;
96 for (i = 0; !valid && regexp[i]; ++i) {
99 valid = __step(input, expbuf);
101 if (!valid)
105 valid = 0;
107 return (valid == 0);
H A Dcktime.c133 int valid = 1; /* time of day string is valid for format */ local
141 while (*fmt && valid) {
147 valid = 0;
153 valid = 0;
159 valid = 0;
165 valid = 0;
171 valid = 0;
176 valid = 0;
181 valid
[all...]
H A Dckdate.c57 * All digits are valid for a YY year format
303 int valid = 1; /* time of day string is valid for format */ local
311 while (*fmt && valid) {
318 valid = 0;
324 valid = 0;
330 valid = 0;
336 valid = 0;
342 valid = 0;
348 valid
[all...]
/osnet-11/usr/src/lib/libnsl/rpc/
H A Dclnt_simple.c60 int valid; /* Is this entry valid ? */ member in struct:rpc_call_private
120 if (!(rcp->valid &&
128 rcp->valid = 0;
155 rcp->valid = 1;
157 rcp->valid = 0;
168 rcp->valid = 0;
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/
H A Dk5_md5des.c152 krb5_boolean *valid)
248 *valid = (memcmp(plaintext+CONFLENGTH, digest, sizeof(digest)) == 0);
250 *valid = (memcmp(plaintext, digest, sizeof(digest)) == 0);
146 k5_md5des_verify(krb5_context context, krb5_const krb5_keyblock *key, krb5_keyusage usage, krb5_const krb5_data *ivec, krb5_const krb5_data *input, krb5_const krb5_data *hash, krb5_boolean *valid) argument
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Drd_safe.c67 krb5_boolean valid; local
139 scratch, his_cksum, &valid);
144 if (!valid) {
151 &safe_body, his_cksum, &valid);
152 if (!valid) {
H A Dcopy_auth.c366 krb5_boolean valid = FALSE; local
397 data2, &ad_kdci->ad_checksum, &valid);
406 if (valid == FALSE) {
H A Dfast.c573 krb5_boolean valid; local
590 request, checksum, &valid);
591 if (retval == 0 &&valid == 0)
H A Ds4u_creds.c346 krb5_boolean valid; local
403 &rep_s4u_user->cksum, &valid);
406 if (valid == FALSE) {
/osnet-11/usr/src/lib/libprtdiag/inc/
H A Dlibprtdiag.h166 ushort_t valid; member in struct:memory_bank
/osnet-11/usr/src/lib/libsmbns/common/
H A Dsmbns_kpasswd.c457 boolean_t valid; local
485 &valid)) != 0) {
495 if (valid)
H A Dsmbns_krb.c330 * If the existing krb5.conf is valid then update the kpasswd/admin server and
890 boolean_t valid; local
931 valid = (strcasecmp(cached_principal, principal) == 0);
937 return (valid);
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dold_api_glue.c255 krb5_boolean valid; local
269 &valid)))
272 if (!valid)
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/keytab/
H A Dkt_solaris.c392 * uint_t flags, boolean_t *valid)
395 * it has a valid set of encryption types for said principal.
400 * that the function considers valid
406 * valid)
408 * where valid is a boolean that is set if the sprinc_str is correctly
409 * populated in the keytab file based on the flags set else valid is unset.
420 boolean_t *valid)
432 assert(ctx != NULL && sprinc_str != NULL && valid != NULL);
434 *valid = FALSE;
493 *valid
419 k5_kt_ad_validate(krb5_context ctx, char *sprinc_str, uint_t flags, boolean_t *valid) argument
[all...]
/osnet-11/usr/src/cmd/sendmail/db/lock/
H A Dlock_deadlock.c46 int valid; member in struct:__anon131
299 id_array[lockerp->dd_id].valid = 1;
325 id_array[lockerp->dd_id].valid = 1;
351 if (!id_array[id].valid)
400 if (!idmap[i].valid)
487 if (!idmap[i].valid)
/osnet-11/usr/src/cmd/hal/utils/
H A Dfsutils.c125 boolean_t valid; local
144 valid = B_TRUE;
150 valid = B_FALSE;
153 if (valid && f(arg, ipart[i].systid, relsect,
/osnet-11/usr/src/lib/libnisdb/
H A Ddb_mindex3.cc642 bool_t valid; local
651 dbie = mindex->satisfy_query_dbonly(qin, &count, FALSE, &valid);
652 if (dbie != 0 && valid && count > 0) {
H A Ddb_mindex.cc151 * Return in 'valid' FALSE if query is not well formed.
154 db_mindex::satisfy_query(db_query *q, long *count, bool_t *valid) { argument
155 return (satisfy_query(q, count, valid, FALSE));
159 db_mindex::satisfy_query(db_query *q, long *count, bool_t *valid, argument
165 /* Make sure we have somewhere to store the "request valid" status */
166 if (valid == NULL)
167 valid = &validRequest;
171 *valid = FALSE;
213 ret = satisfy_query_dbonly(q, count, fromLDAP ? TRUE : FALSE, valid);
219 } else if (ret == NULL && !(*valid)) {
262 satisfy_query_dbonly(db_query *q, long *count, bool_t checkExpire, bool_t *valid) argument
922 bool_t valid; local
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Daccept_sec_context.c532 /* make sure the supplied credentials are valid for accept */
673 * the supplied cred isn't valid.
681 /* make sure the supplied credentials are valid for accept */
817 krb5_boolean valid; local
835 &valid);
837 if (code || !valid) {
860 one or more options are specified. Currently, the only valid
/osnet-11/usr/src/grub/grub2/grub-core/loader/sparc64/ieee1275/
H A Dlinux.c64 int len, valid; member in struct:linux_bootstr_info
107 if (!bp->valid)
114 bp->valid = 1;

Completed in 186 milliseconds

12