/macosx-10.10/swig-12/Lib/ruby/ |
H A D | director.swg | 332 mutable ownership_map owner; 343 owner[vptr] = new GCArray_T<Type>(vptr); 352 owner[vptr] = new GCItem_T<Type>(vptr); 360 owner[vptr] = new GCItem_Object(own); 369 ownership_map::iterator iter = owner.find(vptr); 370 if (iter != owner.end()) { 372 owner.erase(iter);
|
/macosx-10.10/apache-793/httpd/modules/aaa/ |
H A D | mod_authz_owner.c | 49 reason = "'Require file-owner' is not supported on this platform."; 55 char *owner = NULL; 81 reason = "no file owner information available"; 88 status = apr_uid_name_get(&owner, finfo.user, r->pool); 89 if (status != APR_SUCCESS || !owner) { 90 reason = "could not get name of file owner"; 97 if (strcmp(owner, r->user)) { 98 reason = apr_psprintf(r->pool, "file owner %s does not match.", 99 owner); 175 ap_register_auth_provider(p, AUTHZ_PROVIDER_GROUP, "file-owner", [all...] |
/macosx-10.10/tcl-105/tk/tk/macosx/ |
H A D | tkMacOSXClipboard.c | 163 Window owner, /* Window to be the owner. */ 169 clipboardOwner = owner ? Tk_IdToWindow(display, owner) : NULL; 172 changeCount = [pb declareTypes:[NSArray array] owner:NSApp]; 230 owner:NSApp]; 158 XSetSelectionOwner( Display *display, Atom selection, Window owner, Time time) argument
|
/macosx-10.10/Security-57031.1.35/Security/include/securityd_client/ |
H A D | ssclient.h | 181 const AccessCredentials *cred, const AclEntryInput *owner, 238 const AccessCredentials *cred, const AclEntryInput *owner, 242 const AccessCredentials *cred, const AclEntryInput *owner, CssmData &data, 245 cred, owner, data, newKey, newKeyHeader, returnAllocator); } 249 const AccessCredentials *cred, const AclEntryInput *owner, 254 const AccessCredentials *cred, const AclEntryInput *owner, 259 const AccessCredentials *cred, const AclEntryInput *owner, 263 const AccessCredentials *cred, const AclEntryInput *owner, 265 { return deriveKey(db, context, baseKey, keyUsage, keyAttr, param, cred, owner, newKey, newHeader, returnAllocator); } 309 void getKeyOwner(KeyHandle key, AclOwnerPrototype &owner, Allocato 240 unwrapKey(DbHandle db, const Security::Context &context, KeyHandle key, KeyHandle publicKey, const CssmWrappedKey &wrappedKey, uint32 keyUsage, uint32 keyAttr, const AccessCredentials *cred, const AclEntryInput *owner, CssmData &data, KeyHandle &newKey, CssmKey::Header &newKeyHeader) argument 261 deriveKey(DbHandle db, const Security::Context &context, KeyHandle baseKey, uint32 keyUsage, uint32 keyAttr, CssmData ¶m, const AccessCredentials *cred, const AclEntryInput *owner, KeyHandle &newKey, CssmKey::Header &newHeader) argument 310 getKeyOwner(KeyHandle key, AclOwnerPrototype &owner) argument 323 getDbOwner(DbHandle db, AclOwnerPrototype &owner) argument 333 extractMasterKey(DbHandle db, const Context &context, DbHandle sourceDb, uint32 keyUsage, uint32 keyAttr, const AccessCredentials *cred, const AclEntryInput *owner, KeyHandle &newKey, CssmKey::Header &newHeader) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurityd/lib/ |
H A D | ssclient.h | 181 const AccessCredentials *cred, const AclEntryInput *owner, 238 const AccessCredentials *cred, const AclEntryInput *owner, 242 const AccessCredentials *cred, const AclEntryInput *owner, CssmData &data, 245 cred, owner, data, newKey, newKeyHeader, returnAllocator); } 249 const AccessCredentials *cred, const AclEntryInput *owner, 254 const AccessCredentials *cred, const AclEntryInput *owner, 259 const AccessCredentials *cred, const AclEntryInput *owner, 263 const AccessCredentials *cred, const AclEntryInput *owner, 265 { return deriveKey(db, context, baseKey, keyUsage, keyAttr, param, cred, owner, newKey, newHeader, returnAllocator); } 309 void getKeyOwner(KeyHandle key, AclOwnerPrototype &owner, Allocato 240 unwrapKey(DbHandle db, const Security::Context &context, KeyHandle key, KeyHandle publicKey, const CssmWrappedKey &wrappedKey, uint32 keyUsage, uint32 keyAttr, const AccessCredentials *cred, const AclEntryInput *owner, CssmData &data, KeyHandle &newKey, CssmKey::Header &newKeyHeader) argument 261 deriveKey(DbHandle db, const Security::Context &context, KeyHandle baseKey, uint32 keyUsage, uint32 keyAttr, CssmData ¶m, const AccessCredentials *cred, const AclEntryInput *owner, KeyHandle &newKey, CssmKey::Header &newHeader) argument 310 getKeyOwner(KeyHandle key, AclOwnerPrototype &owner) argument 323 getDbOwner(DbHandle db, AclOwnerPrototype &owner) argument 333 extractMasterKey(DbHandle db, const Context &context, DbHandle sourceDb, uint32 keyUsage, uint32 keyAttr, const AccessCredentials *cred, const AclEntryInput *owner, KeyHandle &newKey, CssmKey::Header &newHeader) argument [all...] |
/macosx-10.10/WebKit2-7600.1.25/WebProcess/WebPage/mac/ |
H A D | PlatformCALayerRemote.cpp | 48 PassRefPtr<PlatformCALayerRemote> PlatformCALayerRemote::create(LayerType layerType, PlatformCALayerClient* owner, RemoteLayerTreeContext& context) argument 53 layer = adoptRef(new PlatformCALayerRemoteTiledBacking(layerType, owner, context)); 55 layer = adoptRef(new PlatformCALayerRemote(layerType, owner, context)); 62 PassRefPtr<PlatformCALayerRemote> PlatformCALayerRemote::create(PlatformLayer *platformLayer, PlatformCALayerClient* owner, RemoteLayerTreeContext& context) argument 64 return PlatformCALayerRemoteCustom::create(platformLayer, owner, context); 67 PassRefPtr<PlatformCALayerRemote> PlatformCALayerRemote::create(const PlatformCALayerRemote& other, WebCore::PlatformCALayerClient* owner, RemoteLayerTreeContext& context) argument 69 RefPtr<PlatformCALayerRemote> layer = adoptRef(new PlatformCALayerRemote(other, owner, context)); 76 PlatformCALayerRemote::PlatformCALayerRemote(LayerType layerType, PlatformCALayerClient* owner, RemoteLayerTreeContext& context) argument 77 : PlatformCALayer(layerType, owner) 83 if (owner) 87 PlatformCALayerRemote(const PlatformCALayerRemote& other, PlatformCALayerClient* owner, RemoteLayerTreeContext& context) argument [all...] |
H A D | PlatformCALayerRemoteTiledBacking.h | 39 PlatformCALayerRemoteTiledBacking(WebCore::PlatformCALayer::LayerType, WebCore::PlatformCALayerClient* owner, RemoteLayerTreeContext&);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_cspdl/lib/ |
H A D | SSCSPSession.cpp | 174 const AclEntryInput *owner = NULL; local 178 owner = &AclEntryInput::overlay(CredAndAclEntry->InitialAclEntry); 204 cred, owner, DescriptiveData, unwrappedKeyHandle, 223 const AclEntryInput *owner = NULL; local 227 owner = &AclEntryInput::overlay(credAndAclEntry->InitialAclEntry); 242 keyUsage, keyAttr, cred, owner, keyHandle, derivedKey.header()); 247 keyAttr, param, cred, owner, keyHandle, derivedKey.header()); 266 const AclEntryInput *owner = NULL; local 270 owner = &AclEntryInput::overlay(credAndAclEntry->InitialAclEntry); 275 keyAttr, cred, owner, keyHandl 297 const AclEntryInput *owner = NULL; local [all...] |
H A D | SSCSPDLSession.cpp | 50 // Acl owner manipulation 51 virtual void getOwner(AutoAclOwnerPrototype &owner) const; 192 ClientSessionKey::getOwner(AutoAclOwnerPrototype &owner) const 195 owner.allocator(mClientSession.returnAllocator); 197 *reinterpret_cast<AclOwnerPrototype *>(static_cast<CSSM_ACL_OWNER_PROTOTYPE *>(owner)));
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_sd_cspdl/lib/ |
H A D | SDCSPSession.cpp | 178 const AclEntryInput *owner = NULL; local 182 owner = &AclEntryInput::overlay(CredAndAclEntry->InitialAclEntry); 208 cred, owner, DescriptiveData, unwrappedKeyHandle, local 227 const AclEntryInput *owner = NULL; local 231 owner = &AclEntryInput::overlay(credAndAclEntry->InitialAclEntry); 246 keyUsage, keyAttr, cred, owner, keyHandle, derivedKey.header()); local 251 keyAttr, param, cred, owner, keyHandle, derivedKey.header()); local 270 const AclEntryInput *owner = NULL; local 274 owner = &AclEntryInput::overlay(credAndAclEntry->InitialAclEntry); 279 keyAttr, cred, owner, keyHandl local 301 const AclEntryInput *owner = NULL; local 321 cred, owner, local [all...] |
/macosx-10.10/WTF-7600.1.24/wtf/ |
H A D | ThreadSpecific.h | 93 Data(T* value, ThreadSpecific<T>* owner) : value(value), owner(owner) {} argument 96 ThreadSpecific<T>* owner; member in struct:WTF::ThreadSpecific::Data 231 pthread_setspecific(data->owner->m_key, ptr); 238 pthread_setspecific(data->owner->m_key, 0); 240 TlsSetValue(tlsKeys()[data->owner->m_index], 0);
|
/macosx-10.10/cups-408/cups/scheduler/ |
H A D | policy.c | 112 const char *owner) /* I - Owner of object */ 144 return (cupsdIsAuthorized(con, owner)); 266 const char *owner) /* I - Owner of object */ 279 "printer=%p(%s), owner=\"%s\")", policy, policy->name, con, 280 con->number, printer, printer ? printer->name : "", owner); 285 cupsdLogMessage(CUPSD_LOG_CRIT, "cupsdGetPrivateAttrs: policy=%p, con=%p, printer=%p, owner=\"%s\", DefaultPolicyPtr=%p: This should never happen, please report a bug.", policy, con, printer, owner, DefaultPolicyPtr); 394 else if (owner && !_cups_strcasecmp(name, "@OWNER") && 395 !_cups_strcasecmp(username, owner)) 110 cupsdCheckPolicy(cupsd_policy_t *p, cupsd_client_t *con, const char *owner) argument 262 cupsdGetPrivateAttrs( cupsd_policy_t *policy, cupsd_client_t *con, cupsd_printer_t *printer, const char *owner) argument
|
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_client/ |
H A D | keyclient.cpp | 92 KeyImpl::getOwner(AutoAclOwnerPrototype &owner) const 94 owner.allocator(allocator()); 95 check(CSSM_GetKeyOwner(csp()->handle(), this, owner));
|
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | Access.h | 88 Access(const CSSM_ACL_OWNER_PROTOTYPE &owner, 115 void copyOwnerAndAcl(CSSM_ACL_OWNER_PROTOTYPE * &owner, 122 void compile(const CSSM_ACL_OWNER_PROTOTYPE &owner,
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/ |
H A D | keyclient.cpp | 92 KeyImpl::getOwner(AutoAclOwnerPrototype &owner) const 94 owner.allocator(allocator()); 95 check(CSSM_GetKeyOwner(csp()->handle(), this, owner));
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | Access.h | 88 Access(const CSSM_ACL_OWNER_PROTOTYPE &owner, 115 void copyOwnerAndAcl(CSSM_ACL_OWNER_PROTOTYPE * &owner, 122 void compile(const CSSM_ACL_OWNER_PROTOTYPE &owner,
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | Access.h | 88 Access(const CSSM_ACL_OWNER_PROTOTYPE &owner, 115 void copyOwnerAndAcl(CSSM_ACL_OWNER_PROTOTYPE * &owner, 122 void compile(const CSSM_ACL_OWNER_PROTOTYPE &owner,
|
/macosx-10.10/BerkeleyDB-21/db/java/src/com/sleepycat/asm/ |
H A D | ClassVisitor.java | 85 * @param owner internal name of the enclosing class of the class. 93 void visitOuterClass(String owner, String name, String desc); argument
|
/macosx-10.10/IOHIDFamily-606.1.7/IOHIDSystem/ |
H A D | IOHIDKeyboardDevice.h | 50 static IOHIDKeyboardDevice * newKeyboardDeviceAndStart(IOService * owner, UInt32 location = 0);
|
H A D | IOHIDPointingDevice.h | 48 static IOHIDPointingDevice * newPointingDeviceAndStart(IOService * owner, UInt8 numButtons = 8, UInt32 resolution = 100, bool scroll = false, UInt32 location = 0);
|
/macosx-10.10/Security-57031.1.35/securityd/src/ |
H A D | kckey.h | 55 const AclEntryPrototype *owner = NULL);
|
H A D | tokenacl.h | 48 void getOwner(AclOwnerPrototype &owner);
|
/macosx-10.10/dtrace-147/DTTk/ |
H A D | install | 80 owner=`ls -ld "$basename" | awk '{ print $3 }'` 81 print ".\n.\tMaybe you need to run \"su - $owner\" first?\n."
|
/macosx-10.10/postfix-255/postfix/src/global/ |
H A D | tok822_node.c | 64 tp->next = tp->prev = tp->head = tp->tail = tp->owner = 0;
|
/macosx-10.10/ruby-106/ruby/test/rss/ |
H A D | test_setup_maker_itunes.rb | 17 owner = {:name => "John Doe", :email => "john.doe@example.com"} 38 channel.itunes_owner.itunes_name = owner[:name] 39 channel.itunes_owner.itunes_email = owner[:email] 84 assert_equal(owner,
|