Searched refs:owner (Results 151 - 175 of 792) sorted by relevance

1234567891011>>

/macosx-10.10/swig-12/Lib/ruby/
H A Ddirector.swg332 mutable ownership_map owner;
343 owner[vptr] = new GCArray_T<Type>(vptr);
352 owner[vptr] = new GCItem_T<Type>(vptr);
360 owner[vptr] = new GCItem_Object(own);
369 ownership_map::iterator iter = owner.find(vptr);
370 if (iter != owner.end()) {
372 owner.erase(iter);
/macosx-10.10/apache-793/httpd/modules/aaa/
H A Dmod_authz_owner.c49 reason = "'Require file-owner' is not supported on this platform.";
55 char *owner = NULL;
81 reason = "no file owner information available";
88 status = apr_uid_name_get(&owner, finfo.user, r->pool);
89 if (status != APR_SUCCESS || !owner) {
90 reason = "could not get name of file owner";
97 if (strcmp(owner, r->user)) {
98 reason = apr_psprintf(r->pool, "file owner %s does not match.",
99 owner);
175 ap_register_auth_provider(p, AUTHZ_PROVIDER_GROUP, "file-owner",
[all...]
/macosx-10.10/tcl-105/tk/tk/macosx/
H A DtkMacOSXClipboard.c163 Window owner, /* Window to be the owner. */
169 clipboardOwner = owner ? Tk_IdToWindow(display, owner) : NULL;
172 changeCount = [pb declareTypes:[NSArray array] owner:NSApp];
230 owner:NSApp];
158 XSetSelectionOwner( Display *display, Atom selection, Window owner, Time time) argument
/macosx-10.10/Security-57031.1.35/Security/include/securityd_client/
H A Dssclient.h181 const AccessCredentials *cred, const AclEntryInput *owner,
238 const AccessCredentials *cred, const AclEntryInput *owner,
242 const AccessCredentials *cred, const AclEntryInput *owner, CssmData &data,
245 cred, owner, data, newKey, newKeyHeader, returnAllocator); }
249 const AccessCredentials *cred, const AclEntryInput *owner,
254 const AccessCredentials *cred, const AclEntryInput *owner,
259 const AccessCredentials *cred, const AclEntryInput *owner,
263 const AccessCredentials *cred, const AclEntryInput *owner,
265 { return deriveKey(db, context, baseKey, keyUsage, keyAttr, param, cred, owner, newKey, newHeader, returnAllocator); }
309 void getKeyOwner(KeyHandle key, AclOwnerPrototype &owner, Allocato
240 unwrapKey(DbHandle db, const Security::Context &context, KeyHandle key, KeyHandle publicKey, const CssmWrappedKey &wrappedKey, uint32 keyUsage, uint32 keyAttr, const AccessCredentials *cred, const AclEntryInput *owner, CssmData &data, KeyHandle &newKey, CssmKey::Header &newKeyHeader) argument
261 deriveKey(DbHandle db, const Security::Context &context, KeyHandle baseKey, uint32 keyUsage, uint32 keyAttr, CssmData &param, const AccessCredentials *cred, const AclEntryInput *owner, KeyHandle &newKey, CssmKey::Header &newHeader) argument
310 getKeyOwner(KeyHandle key, AclOwnerPrototype &owner) argument
323 getDbOwner(DbHandle db, AclOwnerPrototype &owner) argument
333 extractMasterKey(DbHandle db, const Context &context, DbHandle sourceDb, uint32 keyUsage, uint32 keyAttr, const AccessCredentials *cred, const AclEntryInput *owner, KeyHandle &newKey, CssmKey::Header &newHeader) argument
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurityd/lib/
H A Dssclient.h181 const AccessCredentials *cred, const AclEntryInput *owner,
238 const AccessCredentials *cred, const AclEntryInput *owner,
242 const AccessCredentials *cred, const AclEntryInput *owner, CssmData &data,
245 cred, owner, data, newKey, newKeyHeader, returnAllocator); }
249 const AccessCredentials *cred, const AclEntryInput *owner,
254 const AccessCredentials *cred, const AclEntryInput *owner,
259 const AccessCredentials *cred, const AclEntryInput *owner,
263 const AccessCredentials *cred, const AclEntryInput *owner,
265 { return deriveKey(db, context, baseKey, keyUsage, keyAttr, param, cred, owner, newKey, newHeader, returnAllocator); }
309 void getKeyOwner(KeyHandle key, AclOwnerPrototype &owner, Allocato
240 unwrapKey(DbHandle db, const Security::Context &context, KeyHandle key, KeyHandle publicKey, const CssmWrappedKey &wrappedKey, uint32 keyUsage, uint32 keyAttr, const AccessCredentials *cred, const AclEntryInput *owner, CssmData &data, KeyHandle &newKey, CssmKey::Header &newKeyHeader) argument
261 deriveKey(DbHandle db, const Security::Context &context, KeyHandle baseKey, uint32 keyUsage, uint32 keyAttr, CssmData &param, const AccessCredentials *cred, const AclEntryInput *owner, KeyHandle &newKey, CssmKey::Header &newHeader) argument
310 getKeyOwner(KeyHandle key, AclOwnerPrototype &owner) argument
323 getDbOwner(DbHandle db, AclOwnerPrototype &owner) argument
333 extractMasterKey(DbHandle db, const Context &context, DbHandle sourceDb, uint32 keyUsage, uint32 keyAttr, const AccessCredentials *cred, const AclEntryInput *owner, KeyHandle &newKey, CssmKey::Header &newHeader) argument
[all...]
/macosx-10.10/WebKit2-7600.1.25/WebProcess/WebPage/mac/
H A DPlatformCALayerRemote.cpp48 PassRefPtr<PlatformCALayerRemote> PlatformCALayerRemote::create(LayerType layerType, PlatformCALayerClient* owner, RemoteLayerTreeContext& context) argument
53 layer = adoptRef(new PlatformCALayerRemoteTiledBacking(layerType, owner, context));
55 layer = adoptRef(new PlatformCALayerRemote(layerType, owner, context));
62 PassRefPtr<PlatformCALayerRemote> PlatformCALayerRemote::create(PlatformLayer *platformLayer, PlatformCALayerClient* owner, RemoteLayerTreeContext& context) argument
64 return PlatformCALayerRemoteCustom::create(platformLayer, owner, context);
67 PassRefPtr<PlatformCALayerRemote> PlatformCALayerRemote::create(const PlatformCALayerRemote& other, WebCore::PlatformCALayerClient* owner, RemoteLayerTreeContext& context) argument
69 RefPtr<PlatformCALayerRemote> layer = adoptRef(new PlatformCALayerRemote(other, owner, context));
76 PlatformCALayerRemote::PlatformCALayerRemote(LayerType layerType, PlatformCALayerClient* owner, RemoteLayerTreeContext& context) argument
77 : PlatformCALayer(layerType, owner)
83 if (owner)
87 PlatformCALayerRemote(const PlatformCALayerRemote& other, PlatformCALayerClient* owner, RemoteLayerTreeContext& context) argument
[all...]
H A DPlatformCALayerRemoteTiledBacking.h39 PlatformCALayerRemoteTiledBacking(WebCore::PlatformCALayer::LayerType, WebCore::PlatformCALayerClient* owner, RemoteLayerTreeContext&);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_cspdl/lib/
H A DSSCSPSession.cpp174 const AclEntryInput *owner = NULL; local
178 owner = &AclEntryInput::overlay(CredAndAclEntry->InitialAclEntry);
204 cred, owner, DescriptiveData, unwrappedKeyHandle,
223 const AclEntryInput *owner = NULL; local
227 owner = &AclEntryInput::overlay(credAndAclEntry->InitialAclEntry);
242 keyUsage, keyAttr, cred, owner, keyHandle, derivedKey.header());
247 keyAttr, param, cred, owner, keyHandle, derivedKey.header());
266 const AclEntryInput *owner = NULL; local
270 owner = &AclEntryInput::overlay(credAndAclEntry->InitialAclEntry);
275 keyAttr, cred, owner, keyHandl
297 const AclEntryInput *owner = NULL; local
[all...]
H A DSSCSPDLSession.cpp50 // Acl owner manipulation
51 virtual void getOwner(AutoAclOwnerPrototype &owner) const;
192 ClientSessionKey::getOwner(AutoAclOwnerPrototype &owner) const
195 owner.allocator(mClientSession.returnAllocator);
197 *reinterpret_cast<AclOwnerPrototype *>(static_cast<CSSM_ACL_OWNER_PROTOTYPE *>(owner)));
/macosx-10.10/Security-57031.1.35/Security/libsecurity_sd_cspdl/lib/
H A DSDCSPSession.cpp178 const AclEntryInput *owner = NULL; local
182 owner = &AclEntryInput::overlay(CredAndAclEntry->InitialAclEntry);
208 cred, owner, DescriptiveData, unwrappedKeyHandle, local
227 const AclEntryInput *owner = NULL; local
231 owner = &AclEntryInput::overlay(credAndAclEntry->InitialAclEntry);
246 keyUsage, keyAttr, cred, owner, keyHandle, derivedKey.header()); local
251 keyAttr, param, cred, owner, keyHandle, derivedKey.header()); local
270 const AclEntryInput *owner = NULL; local
274 owner = &AclEntryInput::overlay(credAndAclEntry->InitialAclEntry);
279 keyAttr, cred, owner, keyHandl local
301 const AclEntryInput *owner = NULL; local
321 cred, owner, local
[all...]
/macosx-10.10/WTF-7600.1.24/wtf/
H A DThreadSpecific.h93 Data(T* value, ThreadSpecific<T>* owner) : value(value), owner(owner) {} argument
96 ThreadSpecific<T>* owner; member in struct:WTF::ThreadSpecific::Data
231 pthread_setspecific(data->owner->m_key, ptr);
238 pthread_setspecific(data->owner->m_key, 0);
240 TlsSetValue(tlsKeys()[data->owner->m_index], 0);
/macosx-10.10/cups-408/cups/scheduler/
H A Dpolicy.c112 const char *owner) /* I - Owner of object */
144 return (cupsdIsAuthorized(con, owner));
266 const char *owner) /* I - Owner of object */
279 "printer=%p(%s), owner=\"%s\")", policy, policy->name, con,
280 con->number, printer, printer ? printer->name : "", owner);
285 cupsdLogMessage(CUPSD_LOG_CRIT, "cupsdGetPrivateAttrs: policy=%p, con=%p, printer=%p, owner=\"%s\", DefaultPolicyPtr=%p: This should never happen, please report a bug.", policy, con, printer, owner, DefaultPolicyPtr);
394 else if (owner && !_cups_strcasecmp(name, "@OWNER") &&
395 !_cups_strcasecmp(username, owner))
110 cupsdCheckPolicy(cupsd_policy_t *p, cupsd_client_t *con, const char *owner) argument
262 cupsdGetPrivateAttrs( cupsd_policy_t *policy, cupsd_client_t *con, cupsd_printer_t *printer, const char *owner) argument
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_client/
H A Dkeyclient.cpp92 KeyImpl::getOwner(AutoAclOwnerPrototype &owner) const
94 owner.allocator(allocator());
95 check(CSSM_GetKeyOwner(csp()->handle(), this, owner));
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/
H A DAccess.h88 Access(const CSSM_ACL_OWNER_PROTOTYPE &owner,
115 void copyOwnerAndAcl(CSSM_ACL_OWNER_PROTOTYPE * &owner,
122 void compile(const CSSM_ACL_OWNER_PROTOTYPE &owner,
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/
H A Dkeyclient.cpp92 KeyImpl::getOwner(AutoAclOwnerPrototype &owner) const
94 owner.allocator(allocator());
95 check(CSSM_GetKeyOwner(csp()->handle(), this, owner));
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DAccess.h88 Access(const CSSM_ACL_OWNER_PROTOTYPE &owner,
115 void copyOwnerAndAcl(CSSM_ACL_OWNER_PROTOTYPE * &owner,
122 void compile(const CSSM_ACL_OWNER_PROTOTYPE &owner,
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DAccess.h88 Access(const CSSM_ACL_OWNER_PROTOTYPE &owner,
115 void copyOwnerAndAcl(CSSM_ACL_OWNER_PROTOTYPE * &owner,
122 void compile(const CSSM_ACL_OWNER_PROTOTYPE &owner,
/macosx-10.10/BerkeleyDB-21/db/java/src/com/sleepycat/asm/
H A DClassVisitor.java85 * @param owner internal name of the enclosing class of the class.
93 void visitOuterClass(String owner, String name, String desc); argument
/macosx-10.10/IOHIDFamily-606.1.7/IOHIDSystem/
H A DIOHIDKeyboardDevice.h50 static IOHIDKeyboardDevice * newKeyboardDeviceAndStart(IOService * owner, UInt32 location = 0);
H A DIOHIDPointingDevice.h48 static IOHIDPointingDevice * newPointingDeviceAndStart(IOService * owner, UInt8 numButtons = 8, UInt32 resolution = 100, bool scroll = false, UInt32 location = 0);
/macosx-10.10/Security-57031.1.35/securityd/src/
H A Dkckey.h55 const AclEntryPrototype *owner = NULL);
H A Dtokenacl.h48 void getOwner(AclOwnerPrototype &owner);
/macosx-10.10/dtrace-147/DTTk/
H A Dinstall80 owner=`ls -ld "$basename" | awk '{ print $3 }'`
81 print ".\n.\tMaybe you need to run \"su - $owner\" first?\n."
/macosx-10.10/postfix-255/postfix/src/global/
H A Dtok822_node.c64 tp->next = tp->prev = tp->head = tp->tail = tp->owner = 0;
/macosx-10.10/ruby-106/ruby/test/rss/
H A Dtest_setup_maker_itunes.rb17 owner = {:name => "John Doe", :email => "john.doe@example.com"}
38 channel.itunes_owner.itunes_name = owner[:name]
39 channel.itunes_owner.itunes_email = owner[:email]
84 assert_equal(owner,

Completed in 215 milliseconds

1234567891011>>