/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/gtk/ |
H A D | WebKitResponsePolicyDecision.cpp | 49 GRefPtr<WebKitURIRequest> request; member in struct:_WebKitResponsePolicyDecisionPrivate 84 * WebKitResponsePolicyDecision:request: 91 g_param_spec_object("request", 92 _("Response URI request"), 93 _("The URI request that is associated with this policy decision"), 117 * Gets the value of the #WebKitResponsePolicyDecision:request property. 119 * Returns: (transfer none): The URI request that is associated with this policy decision. 124 return decision->priv->request.get(); 146 * that triggered this policy decision request. See also webkit_web_view_can_show_mime_type(). 158 WebKitResponsePolicyDecision* webkitResponsePolicyDecisionCreate(API::URLRequest* request, AP argument [all...] |
/macosx-10.10/WebKit2-7600.1.25/UIProcess/InspectorServer/ |
H A D | HTTPRequest.cpp | 43 RefPtr<HTTPRequest> request = HTTPRequest::create(); local 50 size_t requestLineLength = request->parseRequestLine(pos, remainingLength, failureReason); 57 size_t headersLength = request->parseHeaders(pos, remainingLength, failureReason); 64 size_t dataLength = request->parseRequestBody(pos, remainingLength); 70 return request.release(); 99 // the headers didn't end with a blank line and we have an invalid request.
|
/macosx-10.10/cups-408/cups/cgi-bin/ |
H A D | jobs.c | 136 ipp_t *request; /* IPP request */ local 142 * Build a job request, which requires the following 151 request = ippNewRequest(op); 155 ippAddString(request, IPP_TAG_OPERATION, IPP_TAG_URI, "job-uri", 161 ippAddString(request, IPP_TAG_OPERATION, IPP_TAG_NAME, 165 * Do the request and get back a response... 168 ippDelete(cupsDoRequest(http, request, "/jobs"));
|
H A D | printers.c | 44 ipp_t *request, /* IPP request */ local 107 request = ippNewRequest(CUPS_GET_DEFAULT); 109 ippAddStrings(request, IPP_TAG_OPERATION, IPP_TAG_KEYWORD, 113 if ((response = cupsDoRequest(http, request, "/")) != NULL) 225 ipp_t *request; /* IPP request */ local 227 resource[HTTP_MAX_URI]; /* Path for request */ 231 * Build a printer request, which requires the following 239 request 305 ipp_t *request, /* IPP request */ local 474 ipp_t *request, /* IPP request */ local [all...] |
/macosx-10.10/postfix-255/postfix/src/local/ |
H A D | forward.c | 14 /* int forward_finish(request, attr, cancel) 15 /* DELIVER_REQUEST *request; 115 static FORWARD_INFO *forward_open(DELIVER_REQUEST *request, const char *sender) argument 168 if (request->dsn_ret) 170 MAIL_ATTR_DSN_RET, request->dsn_ret); 171 if (request->dsn_envid && *(request->dsn_envid)) 173 MAIL_ATTR_DSN_ENVID, request->dsn_envid); 188 PASS_ATTR(cleanup, MAIL_ATTR_LOG_CLIENT_NAME, request->client_name); 189 PASS_ATTR(cleanup, MAIL_ATTR_LOG_CLIENT_ADDR, request 251 forward_send(FORWARD_INFO *info, DELIVER_REQUEST *request, DELIVER_ATTR attr, char *delivered) argument 331 forward_finish(DELIVER_REQUEST *request, DELIVER_ATTR attr, int cancel) argument [all...] |
/macosx-10.10/ruby-106/ruby/test/openssl/ |
H A D | test_ocsp.rb | 37 request = OpenSSL::OCSP::Request.new 39 request.add_certid(cid) 40 request.sign(@cert, @key, [@cert]) 41 assert_kind_of OpenSSL::OCSP::Request, request 43 assert_equal cid.serial, request.certid.first.serial
|
/macosx-10.10/cups-408/cups/cups/ |
H A D | testipp.c | 249 ipp_t *request; /* Request */ local 268 * Test request generation code... 273 request = ippNew(); 274 request->request.op.version[0] = 0x01; 275 request->request.op.version[1] = 0x01; 276 request->request.op.operation_id = IPP_OP_PRINT_JOB; 277 request [all...] |
/macosx-10.10/remote_cmds-47/yppush.tproj/ |
H A D | yppush.c | 90 extern void yppush_xfrrespprog_1(struct svc_req *request, SVCXPRT *xprt); 141 struct ypreq_xfr request; local 146 request.map_parms.domain=(char *)&Domain; 147 request.map_parms.map=(char *)⤅ 148 request.map_parms.peer=master; 149 request.map_parms.ordernum=OrderNum; 150 request.transid=(u_int)pid; 151 request.prog=prog; 152 request.port=transp->xp_port; 156 request [all...] |
/macosx-10.10/WebKit-7600.1.25/mac/Misc/ |
H A D | WebDownload.mm | 56 request:(NSURLRequest *)request 60 - (id)_initWithRequest:(NSURLRequest *)request 66 request:(CFURLRequestRef)request 121 - (NSURLRequest *)download:(NSURLDownload *)download willSendRequest:(NSURLRequest *)request redirectResponse:(NSURLResponse *)redirectResponse 123 return [realDelegate download:download willSendRequest:request redirectResponse:redirectResponse]; 229 - (id)initWithRequest:(NSURLRequest *)request delegate:(id<NSURLDownloadDelegate>)delegate 232 return [super initWithRequest:request delegate:_webInternal]; 236 request [all...] |
/macosx-10.10/WebCore-7600.1.25/Modules/indexeddb/ |
H A D | IDBFactory.cpp | 103 RefPtr<IDBRequest> request = IDBRequest::create(context, IDBAny::create(this), 0); local 104 m_backend->getDatabaseNames(request, *(context->securityOrigin()), *(context->topOrigin()), context, getIndexedDBDatabasePath(context)); 105 return request; 140 RefPtr<IDBOpenDBRequest> request = IDBOpenDBRequest::create(context, databaseCallbacks, transactionId, version, versionNullness); local 141 m_backend->open(name, version, transactionId, request, databaseCallbacks, *(context->securityOrigin()), *(context->topOrigin())); 142 return request; 159 RefPtr<IDBOpenDBRequest> request = IDBOpenDBRequest::create(context, 0, 0, 0, IndexedDB::VersionNullness::Null); local 160 m_backend->deleteDatabase(name, *context->securityOrigin(), *context->topOrigin(), request, context, getIndexedDBDatabasePath(context)); 161 return request;
|
/macosx-10.10/WebCore-7600.1.25/editing/ |
H A D | SpellChecker.cpp | 159 void SpellChecker::requestCheckingFor(PassRefPtr<SpellCheckRequest> request) argument 161 if (!request || !canCheckAsynchronously(request->paragraphRange().get())) 164 ASSERT(request->data().sequence() == unrequestedTextCheckingSequence); 169 request->setCheckerAndSequence(this, sequence); 172 enqueueRequest(request); 176 invokeRequest(request); 179 void SpellChecker::invokeRequest(PassRefPtr<SpellCheckRequest> request) argument 184 m_processingRequest = request; 188 void SpellChecker::enqueueRequest(PassRefPtr<SpellCheckRequest> request) argument [all...] |
/macosx-10.10/WebKit2-7600.1.25/Shared/Network/CustomProtocols/soup/ |
H A D | CustomProtocolManagerImpl.cpp | 47 , request(requestGeneric) 50 // If the struct contains a null request, it is because the request failed. 51 g_object_add_weak_pointer(G_OBJECT(request), reinterpret_cast<void**>(&request)); 56 if (request) 57 g_object_remove_weak_pointer(G_OBJECT(request), reinterpret_cast<void**>(&request)); 62 return g_cancellable_is_cancelled(cancellable.get()) || !request; 73 WebKitSoupRequestGeneric* request; member in struct:WebKit::WebSoupRequestAsyncData 178 WebKitSoupRequestGeneric* request = WEBKIT_SOUP_REQUEST_GENERIC(g_task_get_source_object(data->task)); local 192 WebKitSoupRequestGeneric* request = WEBKIT_SOUP_REQUEST_GENERIC(g_task_get_source_object(task)); local [all...] |
/macosx-10.10/WebKit2-7600.1.25/WebProcess/soup/ |
H A D | WebSoupRequestManager.cpp | 48 , request(requestGeneric) 51 // If the struct contains a null request, it is because the request failed. 52 g_object_add_weak_pointer(G_OBJECT(request), reinterpret_cast<void**>(&request)); 57 if (request) 58 g_object_remove_weak_pointer(G_OBJECT(request), reinterpret_cast<void**>(&request)); 63 return g_cancellable_is_cancelled(cancellable.get()) || !request; 74 WebKitSoupRequestGeneric* request; member in struct:WebKit::WebSoupRequestAsyncData 115 WebKitSoupRequestGeneric* request = WEBKIT_SOUP_REQUEST_GENERIC(g_task_get_source_object(task.get())); local 177 WebKitSoupRequestGeneric* request = WEBKIT_SOUP_REQUEST_GENERIC(g_task_get_source_object(task)); local [all...] |
/macosx-10.10/OpenSSL098-52/src/ms/ |
H A D | testss.bat | 22 echo make a certificate request using 'req'
26 echo convert the certificate request into a self signed certificate using 'x509'
31 echo convert a certificate into a certificate request using 'x509'
45 echo make another certificate request using 'req'
50 echo sign certificate request with the just created CA via 'x509'
74 echo error using 'req' to generate a certificate request
77 echo error using 'x509' to self sign a certificate request
80 echo error using 'x509' convert a certificate to a certificate request
83 echo first generated request is invalid
86 echo second generated request i [all...] |
H A D | testssce.bat | 22 echo make a certificate request using 'req'
26 echo convert the certificate request into a self signed certificate using 'x509'
31 echo convert a certificate into a certificate request using 'x509'
45 echo make another certificate request using 'req'
50 echo sign certificate request with the just created CA via 'x509'
80 echo error using 'req' to generate a certificate request
83 echo error using 'x509' to self sign a certificate request
86 echo error using 'x509' convert a certificate to a certificate request
89 echo first generated request is invalid
92 echo second generated request i [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | piddiskrep.cpp | 44 xpc_object_t request = xpc_dictionary_create(NULL, NULL, 0); local 45 assert(request != NULL); 46 xpc_dictionary_set_string(request, "command", "fetchData"); 47 xpc_dictionary_set_int64(request, "pid", mPid); 49 xpc_object_t reply = xpc_connection_send_message_with_reply_sync(conn, request); 68 xpc_release(request);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | piddiskrep.cpp | 44 xpc_object_t request = xpc_dictionary_create(NULL, NULL, 0); local 45 assert(request != NULL); 46 xpc_dictionary_set_string(request, "command", "fetchData"); 47 xpc_dictionary_set_int64(request, "pid", mPid); 49 xpc_object_t reply = xpc_connection_send_message_with_reply_sync(conn, request); 68 xpc_release(request);
|
/macosx-10.10/WebKit2-7600.1.25/WebProcess/InjectedBundle/ |
H A D | InjectedBundlePagePolicyClient.cpp | 42 RefPtr<API::URLRequest> request = API::URLRequest::create(resourceRequest); 45 WKBundlePagePolicyAction policy = m_client.decidePolicyForNavigationAction(toAPI(page), toAPI(frame), toAPI(action), toAPI(request.get()), &userDataToPass, m_client.base.clientInfo); 55 RefPtr<API::URLRequest> request = API::URLRequest::create(resourceRequest); 58 WKBundlePagePolicyAction policy = m_client.decidePolicyForNewWindowAction(toAPI(page), toAPI(frame), toAPI(action), toAPI(request.get()), toAPI(frameName.impl()), &userDataToPass, m_client.base.clientInfo); 69 RefPtr<API::URLRequest> request = API::URLRequest::create(resourceRequest); local 72 WKBundlePagePolicyAction policy = m_client.decidePolicyForResponse(toAPI(page), toAPI(frame), toAPI(response.get()), toAPI(request.get()), &userDataToPass, m_client.base.clientInfo);
|
H A D | InjectedBundlePageResourceLoadClient.cpp | 36 void InjectedBundlePageResourceLoadClient::didInitiateLoadForResource(WebPage* page, WebFrame* frame, uint64_t identifier, const WebCore::ResourceRequest& request, bool pageIsProvisionallyLoading) argument 41 m_client.didInitiateLoadForResource(toAPI(page), toAPI(frame), identifier, toAPI(request), pageIsProvisionallyLoading, m_client.base.clientInfo); 44 void InjectedBundlePageResourceLoadClient::willSendRequestForFrame(WebPage* page, WebFrame* frame, uint64_t identifier, ResourceRequest& request, const ResourceResponse& redirectResponse) argument 49 RefPtr<API::URLRequest> returnedRequest = adoptRef(toImpl(m_client.willSendRequestForFrame(toAPI(page), toAPI(frame), identifier, toAPI(request), toAPI(redirectResponse), m_client.base.clientInfo))); 51 request.updateFromDelegatePreservingOldProperties(returnedRequest->resourceRequest()); 53 request = ResourceRequest();
|
/macosx-10.10/ruby-106/ruby/test/webrick/ |
H A D | test_filehandler.rb | 86 http.request(req){|res| 92 http.request(req){|res| 99 http.request(req){|res| 108 http.request(req){|res| 117 http.request(req){|res| 126 http.request(req){|res| 135 http.request(req){|res| 144 http.request(req){|res| 153 http.request(req){|res| 169 http.request(re [all...] |
/macosx-10.10/tcl-105/tk84/tk/generic/ |
H A D | tkError.c | 52 * If an X error occurs that matches the error, request, 81 Tk_CreateErrorHandler(display, error, request, minorCode, errorProc, clientData) 87 int request; /* Consider only errors with this 88 * major request code (-1 means 91 * minor request code (-1 means 129 errorPtr->request = request; 264 || ((errorPtr->request != -1) 265 && (errorPtr->request != errEventPtr->request_code))
|
/macosx-10.10/postfix-255/postfix/src/smtp/ |
H A D | smtp_proto.c | 234 #define SMTP_MIME_DOWNGRADE(session, request) \ 237 && strcmp(request->encoding, MAIL_ATTR_ENC_7BIT) != 0) 263 DELIVER_REQUEST *request = state->request; local 365 request->queue_id, 462 session->state->request->queue_id, 505 request->nexthop)); 510 request->nexthop)); 579 * To avoid deadlock, the PIPELINING engine needs to request a TCP send 681 /* XXX Mix-up of per-session and per-request flag 1145 DELIVER_REQUEST *request = state->request; local 2058 DELIVER_REQUEST *request = state->request; local [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/ntlm/ |
H A D | acquire_cred.c | 46 krb5_storage *request, *response; local 59 ret = krb5_kcm_storage_request(context, KCM_OP_HAVE_NTLM_CRED, &request); 63 ret = krb5_store_stringz(request, target_name->user); 67 ret = krb5_store_stringz(request, target_name->domain); 71 ret = krb5_kcm_call(context, request, &response, &response_data); 72 krb5_storage_free(request); 173 krb5_storage *request, *response; local 217 krb5_kcm_storage_request(context, KCM_OP_ADD_NTLM_CRED, &request); 219 krb5_store_stringz(request, name->user); 220 krb5_store_stringz(request, nam [all...] |
/macosx-10.10/WebCore-7600.1.25/platform/network/ |
H A D | ResourceHandle.cpp | 73 ResourceHandle::ResourceHandle(NetworkingContext* context, const ResourceRequest& request, ResourceHandleClient* client, bool defersLoading, bool shouldContentSniff) argument 74 : d(adoptPtr(new ResourceHandleInternal(this, context, request, client, defersLoading, shouldContentSniff && shouldContentSniffURL(request.url())))) 76 if (!request.url().isValid()) { 81 if (!portAllowed(request.url())) { 87 PassRefPtr<ResourceHandle> ResourceHandle::create(NetworkingContext* context, const ResourceRequest& request, ResourceHandleClient* client, bool defersLoading, bool shouldContentSniff) argument 89 BuiltinResourceHandleConstructorMap::iterator protocolMapItem = builtinResourceHandleConstructorMap().find(request.url().protocol()); 92 return protocolMapItem->value(request, client); 94 RefPtr<ResourceHandle> newHandle(adoptRef(new ResourceHandle(context, request, client, defersLoading, shouldContentSniff))); 133 void ResourceHandle::loadResourceSynchronously(NetworkingContext* context, const ResourceRequest& request, StoredCredential argument [all...] |
/macosx-10.10/webdavfs-367/mount.tproj/ |
H A D | webdav_authcache.c | 317 CFHTTPMessageRef request) 350 syslog(LOG_DEBUG, "AddServerCred: no mount creds, req %p", request); 363 url = CFHTTPMessageCopyRequestURL(request); 396 int AddProxyCredentials(struct authcache_entry *entry_ptr, CFHTTPMessageRef request) argument 429 syslog(LOG_DEBUG, "AddProxyCredentials: no mount creds, req %p", request); 442 url = CFHTTPMessageCopyRequestURL(request); 476 uid_t uid, /* -> uid of the user making the request */ 477 CFHTTPMessageRef request, /* -> the request message to apply authentication to */ 492 result = AddProxyCredentials(entry_ptr, request); 315 AddServerCredentials( struct authcache_entry *entry_ptr, CFHTTPMessageRef request) argument 475 CreateProxyAuthenticationFromResponse( uid_t uid, CFHTTPMessageRef request, CFHTTPMessageRef response) argument 521 CreateAuthenticationFromResponse( uid_t uid, CFHTTPMessageRef request, CFHTTPMessageRef response, int *result, int isProxy) argument 579 FindAuthenticationForRequest( uid_t uid, CFHTTPMessageRef request) argument 605 ApplyCredentialsToRequest(struct authcache_entry *entry_ptr, CFHTTPMessageRef request) argument 644 AddExistingAuthentications( uid_t uid, CFHTTPMessageRef request) argument 700 DoServerAuthentication( uid_t uid, CFHTTPMessageRef request, CFHTTPMessageRef response) argument 765 AddProxyAuthentication( uid_t uid, CFHTTPMessageRef request, CFHTTPMessageRef response) argument 827 authcache_apply( uid_t uid, CFHTTPMessageRef request, UInt32 statusCode, CFHTTPMessageRef response, UInt32 *generation) argument 902 authcache_valid( uid_t uid, CFHTTPMessageRef request, UInt32 generation) argument [all...] |