/macosx-10.10/Security-57031.1.35/Security/libsecurity_utilities/lib/ |
H A D | socks++4.cpp | 42 void Server::connect(SocksClientSocket &me, const IPSockAddress &peer) 53 void Server::connect(SocksClientSocket &me, const Host &host, IPPort port) 72 void Server::bind(SocksServerSocket &me, const IPAddress &peer, IPPort port) 83 void Server::receive(SocksServerSocket &me, SocksClientSocket &receiver)
|
H A D | socks++5.h | 42 class Server : public SocksServer { class in namespace:Security::IPPlusPlus::Socks5 44 Server(const IPSockAddress &s) : SocksServer(5, s) { } function in class:Security::IPPlusPlus::Socks5::Server
|
H A D | socks++.cpp | 65 return new Socks4::Server(addr); 67 return new Socks5::Server(addr);
|
H A D | socks++5.cpp | 40 void Server::open(Socket &s, Support &my) 56 void Server::connect(SocksClientSocket &me, const IPSockAddress &peer) 67 void Server::connect(SocksClientSocket &me, const Host &host, IPPort port) 96 void Server::bind(SocksServerSocket &me, const IPAddress &peer, IPPort port) 107 void Server::receive(SocksServerSocket &me, SocksClientSocket &receiver)
|
/macosx-10.10/ruby-106/ruby/sample/drb/ |
H A D | speeds.rb | 13 # server = ROMP::Server.new('tcpromp://localhost:4242', nil, true) 22 server = ROMP::Server.new(uri, nil, true)
|
H A D | dhasen.rb | 2 distributed Ruby --- dRuby Sample Server --- chasen server
|
H A D | drbs-acl.rb | 2 distributed Ruby --- dRuby Sample Server
|
/macosx-10.10/CPANInternal-159.1/SOAP-Lite-1.11/lib/SOAP/Transport/ |
H A D | IO.pm | 19 package SOAP::Transport::IO::Server; 24 @ISA = qw(SOAP::Server);
|
H A D | LOCAL.pm | 23 our @ISA = qw(SOAP::Client SOAP::Server);
|
/macosx-10.10/Security-57031.1.35/Security/include/security_utilities/ |
H A D | socks++5.h | 42 class Server : public SocksServer { class in namespace:Security::IPPlusPlus::Socks5 44 Server(const IPSockAddress &s) : SocksServer(5, s) { } function in class:Security::IPPlusPlus::Socks5::Server
|
H A D | socks++.cpp | 65 return new Socks4::Server(addr); 67 return new Socks5::Server(addr);
|
H A D | socks++5.cpp | 40 void Server::open(Socket &s, Support &my) 56 void Server::connect(SocksClientSocket &me, const IPSockAddress &peer) 67 void Server::connect(SocksClientSocket &me, const Host &host, IPPort port) 96 void Server::bind(SocksServerSocket &me, const IPAddress &peer, IPPort port) 107 void Server::receive(SocksServerSocket &me, SocksClientSocket &receiver)
|
/macosx-10.10/Security-57031.1.35/securityd/src/ |
H A D | tokenaccess.h | 51 { Server::active().longTermActivity(); } 54 { add(it); Server::active().longTermActivity(); }
|
H A D | session.cpp | 66 Session::Session(const AuditInfo &audit, Server &server) 69 // link to Server as the global nexus in the object mesh 93 Server &Session::server() const 95 return parent<Server>(); 105 return Server::session(); 206 keybagQuery.inferHints(Server::process()); 216 keybagQuery.inferHints(Server::process()); 237 service_context_t context = { sessionId(), originatorUid(), {} }; //*Server::connection().auditToken() 307 RootSession::RootSession(uint64_t attributes, Server &server) 319 : Session(audit, Server [all...] |
H A D | acl_keychain.cpp | 75 Process &process = Server::process(); 91 Server::active().longTermActivity(); 177 query.inferHints(Server::process()); 183 query.inferHints(Server::process()); 224 return Server::session().isRightAuthorized(rightString, Server::connection(), false/*no UI*/);
|
H A D | server.h | 65 // There is only one Server, and its name is Server::active(). 67 // Server also acts as the global-scope nexus of securityd's object mesh. 68 // Sessions have Server as their parent, and global-scope objects have it 69 // as their referent. The Server is never kill()ed; though kill(globalObject) 73 class Server : public PerGlobal, class in inherits:PerGlobal,MachPlusPlus::MachServer,UniformRandomBlobs 77 Server(Authority &myAuthority, CodeSignatures &signatures, const char *bootstrapName); 78 ~Server(); 84 // Retrieve pieces of the Server's object web. 85 // These are all static methods that use the active() Server o [all...] |
H A D | AuthorizationEngine.cpp | 168 StLock<Mutex> _(Server::process()); 169 if (SecCodeRef code = Server::process().currentGuest()) { 177 if (sandbox_check(Server::process().pid(), "authorization-right-obtain", SANDBOX_FILTER_RIGHT_NAME, (*it)->name())) { 178 Syslog::error("Sandbox denied authorizing right '%s' by client '%s' [%d]", (*it)->name(), processName.c_str(), Server::process().pid()); 196 Syslog::info("Succeeded authorizing right '%s' by client '%s' [%d] for authorization created by '%s' [%d] (%X,%d)", (*it)->name(), processName.c_str(), Server::process().pid(), authCreatorName.c_str(), auth.creatorPid(), uint32_t(flags), auth.operatesAsLeastPrivileged()); 202 secdebug("autheval", "Failed to authorize right '%s' by client '%s' [%d] for authorization created by '%s' [%d] (%X,%d)", (*it)->name(), processName.c_str(), Server::process().pid(), authCreatorName.c_str(), auth.creatorPid(), uint32_t(flags), auth.operatesAsLeastPrivileged());
|
H A D | tempdatabase.cpp | 115 agentQuery.inferHints(Server::process()); 141 CssmClient::UnwrapKey unwrap(Server::csp(), CSSM_ALGID_NONE);
|
/macosx-10.10/libdispatch-442.1.4/src/ |
H A D | Makefile.am | 73 %User.c %.h %Server.c %Server.h: $(abs_srcdir)/%.defs 75 -server $*Server.c -sheader $*Server.h $<
|
/macosx-10.10/CPANInternal-159.1/JSON-RPC-0.96/lib/JSON/RPC/ |
H A D | Server.pm | 16 package JSON::RPC::Server; 28 $JSON::RPC::Server::VERSION = '0.92'; 324 if ( my $code = 'JSON::RPC::Server::system'->can($method) ) { 445 package JSON::RPC::Server::system; 464 JSON::RPC::Server - Perl implementation of JSON-RPC sever 470 use JSON::RPC::Server::CGI; 472 my $server = JSON::RPC::Server::CGI->new; 486 PerlResponseHandler JSON::RPC::Server::Apache 494 use JSON::RPC::Server::Daemon; 496 JSON::RPC::Server [all...] |
/macosx-10.10/SecurityTokend-55108/lib/ |
H A D | SecTokend.cpp | 103 server = new Server();
|
/macosx-10.10/SecurityTokend-55108/security_tokend_client/ |
H A D | SecTokend.cpp | 103 server = new Server();
|
/macosx-10.10/ruby-106/ruby/test/rubygems/ |
H A D | test_gem_server.rb | 5 class Gem::Server 16 @server = Gem::Server.new Gem.dir, process_based_port, false 45 server = Gem::Server.new Gem.dir, 0, false 50 server = Gem::Server.new Gem.dir, 0, false 56 server = Gem::Server.new Gem.dir, 0, false 63 s = Gem::Server.new Gem.dir, process_based_port, false 67 s = Gem::Server.new [Gem.dir, Gem.dir], process_based_port, false 101 server = Gem::Server.new dir, process_based_port, false 151 server = Gem::Server.new dir, process_based_port, false 261 server = Gem::Server [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/xdr_rpc/ |
H A D | securityd_data_saver.cpp | 112 Server::database(db)->findFirst(*query, inAttributes, inAttributesLength, 148 RefPointer<Key> key = Server::key(keyh); 163 Server::aclBearer(kind, key).getAcl(haveTag ? tag : NULL, count, aclList); 188 Server::releaseWhenDone(aclsOut.keep()); 201 Server::aclBearer(kind, key).changeAcl(AclEdit(mode, handle, acl), cred);
|
/macosx-10.10/smb-759.0/lib/smb/ |
H A D | parse_url.c | 248 DebugLogCFString(ctx->serverNameRef, "Server", __FUNCTION__, __LINE__); 769 CFStringRef Server = NULL; local 801 error = NetFSCopyHostAndPort(url, &Server, &Port); 802 if ((Server == NULL) || (error != noErr)) { 806 goto ErrorOut; /* Server name is required */ 809 LogCFString(Server, "Server String", __FUNCTION__, __LINE__); 810 CFDictionarySetValue (mutableDict, kNetFSHostKey, Server); 811 CFRelease(Server); 812 Server 948 CFStringRef Server = NULL; local [all...] |