Searched refs:validated (Results 1 – 9 of 9) sorted by relevance
| /xnu-10063.141.1/osfmk/kdp/ |
| H A D | kdp_common.c | 283 uint64_t validated = 0, valid_from; in kdp_generic_copyin_string_slowpath() local 293 if (validated == 0) { in kdp_generic_copyin_string_slowpath() 300 validated = MIN(src_rem, dst_rem); in kdp_generic_copyin_string_slowpath() 301 if (validated) { in kdp_generic_copyin_string_slowpath() 303 validated--; in kdp_generic_copyin_string_slowpath() 312 validated--; in kdp_generic_copyin_string_slowpath()
|
| /xnu-10063.141.1/bsd/net/ |
| H A D | necp.c | 2217 bool validated = FALSE; in necp_policy_result_is_valid() local 2225 validated = TRUE; in necp_policy_result_is_valid() 2231 validated = TRUE; in necp_policy_result_is_valid() 2238 validated = TRUE; in necp_policy_result_is_valid() 2246 validated = TRUE; in necp_policy_result_is_valid() 2252 validated = TRUE; in necp_policy_result_is_valid() 2258 validated = TRUE; in necp_policy_result_is_valid() 2266 validated = TRUE; in necp_policy_result_is_valid() 2271 validated = FALSE; in necp_policy_result_is_valid() 2277 NECPLOG(LOG_DEBUG, "Policy result type %d, valid %d", type, validated); in necp_policy_result_is_valid() [all …]
|
| H A D | necp_client.c | 3245 const bool validated = necp_validate_resolver_answer(validatable->signable.client_id, in necp_client_parse_parameters() local 3249 if (!validated) { in necp_client_parse_parameters() 10442 …const bool validated = necp_validate_resolver_answer(validatable->signable.client_id, validatable-… in necp_client_validate() local 10445 if (!validated) { in necp_client_validate() 10578 const bool validated = necp_validate_application_id(client_id.client_id, in necp_client_set_signed_client_id() local 10581 if (!validated) { in necp_client_set_signed_client_id() 11068 const bool validated = necp_validate_resolver_answer(validatable->signable.client_id, in necp_socket_resolver_signature_matches_address() local 11072 if (validated) { in necp_socket_resolver_signature_matches_address()
|
| /xnu-10063.141.1/doc/allocators/ |
| H A D | read-only.md | 60 "back reference") that is validated when traversing from read/write to
|
| /xnu-10063.141.1/osfmk/vm/ |
| H A D | vm_fault.c | 7761 int validated, tainted, nx; in vm_page_validate_cs_mapped_slow() local 7785 validated = 0; in vm_page_validate_cs_mapped_slow() 7792 &validated, in vm_page_validate_cs_mapped_slow() 7796 page->vmp_cs_validated |= validated; in vm_page_validate_cs_mapped_slow() 7920 boolean_t validated; in vm_page_validate_cs_mapped_chunk() local 7958 validated = cs_validate_range(vnode, in vm_page_validate_cs_mapped_chunk() 7967 if (validated) { in vm_page_validate_cs_mapped_chunk()
|
| H A D | vm_page.h | 1623 boolean_t *validated,
|
| /xnu-10063.141.1/doc/mach_ipc/ |
| H A D | kmsg.md | 443 shape or form, the signature is being validated and the descriptor count
|
| /xnu-10063.141.1/bsd/kern/ |
| H A D | ubc_subr.c | 5746 boolean_t validated; in cs_validate_hash() local 5820 validated = FALSE; in cs_validate_hash() 5885 validated = TRUE; in cs_validate_hash() 5888 return validated; in cs_validate_hash()
|
| /xnu-10063.141.1/bsd/netinet6/ |
| H A D | icmp6.c | 1201 icmp6_mtudisc_update(struct ip6ctlparam *ip6cp, int validated) in icmp6_mtudisc_update() argument 1217 if (!validated) { in icmp6_mtudisc_update()
|