/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_cspdl/lib/ |
H A D | SSCSPDLSession.h | 40 void makeReferenceKey(SSCSPSession &session,
|
H A D | SSKey.cpp | 35 SSKey::SSKey(SSCSPSession &session, KeyHandle keyHandle, CssmKey &ioKey, argument 38 : ReferencedKey(session.mSSCSPDLSession), 39 mAllocator(session), mKeyHandle(keyHandle), 40 mClientSession(session.clientSession()) 132 header.cspGuid(session.plugin.myGuid()); // Set the csp guid to me. 137 SSKey::SSKey(SSDLSession &session, CssmKey &ioKey, SSDatabase &inSSDatabase, argument 140 : ReferencedKey(session.mSSCSPDLSession), 141 mAllocator(session.allocator()), mKeyHandle(noKey), mUniqueId(uniqueId), 143 mClientSession(session.clientSession()) 234 header.cspGuid(session [all...] |
/macosx-10.10.1/Security-57031.1.35/securityd/src/ |
H A D | process.cpp | 30 #include "session.h" 47 // set parent session 68 SECURITYD_CLIENT_NEW(this, this->pid(), &this->session(), 159 Session& Process::session() const function in class:Process 168 if (audit.sessionId() != this->session().sessionId()) 189 // Change the session of a process. 196 SECURITYD_CLIENT_CHANGE_SESSION(this, &this->session());
|
H A D | kcdatabase.cpp | 44 #include "session.h" 70 service_context_t context = dbCommon.session().get_current_service_context(); 85 if (!dbCommon.session().keybagGetState(session_keybag_check_master_key)) { 96 syslog(LOG_ERR, "Updating iCloud keychain passphrase for uid %d", dbCommon.session().originatorUid()); 105 dbCommon.session().keybagSetState(session_keybag_unlocked|session_keybag_loaded|session_keybag_check_master_key); 107 syslog(LOG_ERR, "Failed to unlock iCloud keychain for uid %d", dbCommon.session().originatorUid()); 118 service_context_t context = dbCommon.session().get_current_service_context(); 145 RefPointer<KeychainDbCommon> newCommon = new KeychainDbCommon(proc.session(), ident); 193 Session &session = process().session(); local [all...] |
/macosx-10.10.1/WebKit2-7600.1.25/Shared/ |
H A D | SessionTracker.h | 40 // FIXME: sessionMap()'s returned map does not include default session. 43 static WebCore::NetworkStorageSession* session(WebCore::SessionID);
|
/macosx-10.10.1/bootp-298/IPConfiguration.bproj/ |
H A D | bootp_session.h | 26 * - maintain BOOTP client socket session 67 bootp_client_free(bootp_client_t * * session);
|
H A D | sysconfig.h | 49 my_SCDynamicStoreCopyDictionary(SCDynamicStoreRef session, CFStringRef key);
|
H A D | arp_session.h | 112 arp_session_set_debug(arp_session_t * session, int debug); 123 arp_client_init(arp_session_t * session, interface_t * if_p);
|
/macosx-10.10.1/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | ipsecSessionTracer.h | 75 void ipsecSessionTracerLogEstablished (ike_session_t *session);
|
/macosx-10.10.1/xnu-2782.1.97/bsd/net/ |
H A D | necp.c | 69 * Each session owns a list of session policies, each of which can 71 * session also has a priority level (such as High, Default, or Low) 73 * a session order value is assigned to the session, which will be used 74 * to sort kernel policies generated by the session. The session client 83 * Whenever a session send the Apply command, its policies are ingested 87 * 1. The session policy is parsed to create kernel policies at the socket 119 * by a session wit 561 struct necp_session *session = (struct necp_session *)unitinfo; local 744 necp_send_ctl_data(struct necp_session *session, u_int8_t *buffer, size_t buffer_size) argument 758 necp_send_success_response(struct necp_session *session, u_int8_t packet_type, u_int32_t message_id) argument 781 necp_send_error_response(struct necp_session *session, u_int8_t packet_type, u_int32_t message_id, u_int32_t error) argument 804 necp_send_policy_id_response(struct necp_session *session, u_int8_t packet_type, u_int32_t message_id, necp_policy_id policy_id) argument 830 struct necp_session *session = (struct necp_session *)unitinfo; local 962 necp_delete_session(struct necp_session *session) argument 1207 necp_handle_set_session_priority(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1258 necp_handle_lock_session_to_proc(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1267 necp_handle_register_service(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1317 necp_handle_unregister_service(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1363 necp_handle_policy_add(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1513 necp_handle_policy_get(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1574 necp_handle_policy_delete(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1607 necp_handle_policy_apply_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1615 necp_handle_policy_list_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1658 necp_handle_policy_delete_all(struct necp_session *session, u_int32_t message_id, mbuf_t packet, int offset) argument 1689 necp_policy_create(struct necp_session *session, necp_policy_order order, u_int8_t *conditions_array, size_t conditions_array_size, u_int8_t *result, size_t result_size) argument 1726 necp_policy_find(struct necp_session *session, necp_policy_id policy_id) argument 1772 necp_policy_mark_for_deletion(struct necp_session *session, struct necp_session_policy *policy) argument 1788 necp_policy_mark_all_for_deletion(struct necp_session *session) argument 1801 necp_policy_delete(struct necp_session *session, struct necp_session_policy *policy) argument 1898 necp_policy_apply(struct necp_session *session, struct necp_session_policy *policy) argument 2354 necp_policy_apply_all(struct necp_session *session) argument [all...] |
/macosx-10.10.1/DiskArbitration-268/diskarbitrationd/ |
H A D | DAQueue.h | 74 extern void DAQueueCallbacks( DASessionRef session, _DACallbackKind kind, DADiskRef argument0, CFTypeRef argument1 ); 78 extern void DAQueueReleaseSession( DASessionRef session );
|
/macosx-10.10.1/IOHIDFamily-606.1.7/IOHIDEventSystemPlugIns/ |
H A D | IOHIDEventSystemStatistics.h | 26 boolean_t open(IOHIDSessionRef session, IOOptionBits options); 27 void close(IOHIDSessionRef session, IOOptionBits options);
|
/macosx-10.10.1/OpenSSL098-52/src/ssl/ |
H A D | s2_lib.c | 376 if (s->session->master_key_length < 0 || 377 s->session->master_key_length > (int)sizeof(s->session->master_key)) 395 OPENSSL_assert(s->session->master_key_length >= 0 396 && s->session->master_key_length 397 < (int)sizeof(s->session->master_key)); 398 EVP_DigestUpdate(&ctx,s->session->master_key,s->session->master_key_length);
|
H A D | d1_clnt.c | 414 s->session->cipher=s->s3->tmp.new_cipher; 416 s->session->compress_meth=0; 419 s->session->compress_meth=0; 421 s->session->compress_meth= 605 SSL_SESSION *sess = s->session; 606 if ((s->session == NULL) || 607 (s->session->ssl_version != s->version) || 613 (s->session->not_resumable)) 618 /* else use the pre-loaded session */ 646 i=s->session [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | BlockCryptor.h | 41 AppleCSPSession &session) : 42 AppleCSPContext(session), 40 BlockCryptor( AppleCSPSession &session) argument
|
H A D | FEEAsymmetricContext.cpp | 102 session(), 114 session(), 139 &session()); 347 session(), 369 &session()); 523 AppleCSPSession &session) 529 feePubKey privKey = contextToFeeKey(context, session, CSSM_ATTRIBUTE_KEY, 550 pubKey = contextToFeeKey(context, session, CSSM_ATTRIBUTE_PUBLIC_KEY, 517 DeriveKey_ECDH( const Context &context, CSSM_ALGORITHMS algId, const CssmData &Param, CSSM_DATA *keyData, AppleCSPSession &session) argument
|
H A D | FEECSPUtils.cpp | 93 AppleCSPSession &session, 114 return cssmKeyToFee(cssmKey, session, mallocdKey); 124 AppleCSPSession &session, 146 BinaryKey &binKey = session.lookupRefKey(cssmKey); 341 AppleCSPSession *session = local 344 session->getRandomBytes(numBytes, bytes); 91 contextToFeeKey( const Context &context, AppleCSPSession &session, CSSM_ATTRIBUTE_TYPE attrType, CSSM_KEYCLASS keyClass, CSSM_KEYUSE usage, bool &mallocdKey) argument 122 cssmKeyToFee( const CssmKey &cssmKey, AppleCSPSession &session, bool &allocdKey) argument
|
/macosx-10.10.1/WebKit-7600.1.25/win/WebCoreSupport/ |
H A D | WebFrameNetworkingContext.cpp | 47 static NeverDestroyed<std::unique_ptr<NetworkStorageSession>> session; local 48 return session;
|
/macosx-10.10.1/Heimdal-398.1.2/lib/ipc/ |
H A D | common.c | 47 pid_t session; member in struct:heim_icred 85 return cred->session; 103 _heim_ipc_create_cred(uid_t uid, gid_t gid, pid_t pid, pid_t session, heim_icred *cred) argument 111 (*cred)->session = session; 126 (*cred)->session = (uid_t)-1;
|
/macosx-10.10.1/Security-57031.1.35/securityd/dtrace/ |
H A D | securityd-watch.d | 26 DTHandle session; /* session handle */ 46 client[0].session = 0; 113 client[arg0].session = arg2; 119 printf("%u T%d:client-new(<%x>,%s(%d),session=<%x>,task=%d)\n", 122 client[arg0].session, client[arg0].taskport); 134 printf("%u T%d:client-change_session(<%x>,new session=<%x>)\n", 211 struct Session session[SessionId]; 224 au_asid_t ai_asid; /* audit session id */ 225 au_asflgs_t ai_flags; /* audit session flag [all...] |
/macosx-10.10.1/curl-83.1.2/curl/lib/ |
H A D | http2.c | 188 static int on_frame_recv(nghttp2_session *session, const nghttp2_frame *frame, argument 194 (void)session; 213 rv = nghttp2_submit_rst_stream(session, NGHTTP2_FLAG_NONE, 223 static int on_invalid_frame_recv(nghttp2_session *session, argument 228 (void)session; 235 static int on_data_chunk_recv(nghttp2_session *session, uint8_t flags, argument 242 (void)session; 268 static int before_frame_send(nghttp2_session *session, argument 273 (void)session; 278 static int on_frame_send(nghttp2_session *session, argument 288 on_frame_not_send(nghttp2_session *session, const nghttp2_frame *frame, int lib_error_code, void *userp) argument 299 on_stream_close(nghttp2_session *session, int32_t stream_id, nghttp2_error_code error_code, void *userp) argument 318 on_unknown_frame_recv(nghttp2_session *session, const uint8_t *head, size_t headlen, const uint8_t *payload, size_t payloadlen, void *userp) argument 332 on_begin_headers(nghttp2_session *session, const nghttp2_frame *frame, void *userp) argument 345 on_header(nghttp2_session *session, const nghttp2_frame *frame, const uint8_t *name, size_t namelen, const uint8_t *value, size_t valuelen, uint8_t flags, void *userp) argument 400 data_source_read_callback(nghttp2_session *session, int32_t stream_id, uint8_t *buf, size_t length, uint32_t *data_flags, nghttp2_data_source *source, void *userp) argument [all...] |
/macosx-10.10.1/Heimdal-398.1.2/lib/ntlm/ |
H A D | ntlm.c | 1285 struct ntlm_buf *session) 1289 session->length = CC_MD4_DIGEST_LENGTH; 1290 session->data = malloc(session->length); 1291 if (session->data == NULL) { 1292 session->length = 0; 1298 heim_ntlm_free_buf(session); 1302 CCDigestFinal(m, session->data); 1311 struct ntlm_buf *session) 1316 session 1284 heim_ntlm_v1_base_session(void *key, size_t len, struct ntlm_buf *session) argument 1309 heim_ntlm_v2_base_session(void *key, size_t len, struct ntlm_buf *ntlmResponse, struct ntlm_buf *session) argument 1329 heim_ntlm_keyex_wrap(struct ntlm_buf *base_session, struct ntlm_buf *session, struct ntlm_buf *encryptedSession) argument 1394 heim_ntlm_build_ntlm1_master(void *key, size_t len, struct ntlm_buf *session, struct ntlm_buf *master) argument 1428 heim_ntlm_build_ntlm2_master(void *key, size_t len, struct ntlm_buf *blob, struct ntlm_buf *session, struct ntlm_buf *master) argument 1460 heim_ntlm_keyex_unwrap(struct ntlm_buf *baseKey, struct ntlm_buf *encryptedSession, struct ntlm_buf *session) argument [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_sd_cspdl/lib/ |
H A D | SDKey.cpp | 41 SDKey::SDKey(SDCSPSession &session, KeyHandle hKey, CssmKey &ioKey, argument 44 : ReferencedKey(session.mSDCSPDLSession), 45 mAllocator(session), mKeyHandle(hKey), 46 mClientSession(session.clientSession()) 140 header.cspGuid(session.plugin.myGuid()); // Set the csp guid to me. 145 SDKey::SDKey(SDDLSession &session, CssmKey &ioKey, KeyHandle hKey, CSSM_DB_HANDLE inDBHandle, argument 148 : ReferencedKey(session.mSDCSPDLSession), 149 mAllocator(session.allocator()), mKeyHandle(hKey), mRecord(record), 150 mClientSession(session.clientSession()) 243 header.cspGuid(session [all...] |
/macosx-10.10.1/Heimdal-398.1.2/lib/kafs/ |
H A D | afskrb5.c | 55 if (cred->session.keyvalue.length != 8) 102 memcpy(kt->ct.HandShakeKey, cred->session.keyvalue.data, 8); 166 in_creds.session.keytype = ETYPE_DES_CBC_CRC; 169 invalid = krb5_enctype_valid(d->context, in_creds.session.keytype); 171 krb5_enctype_enable(d->context, in_creds.session.keytype); 175 in_creds.session.keytype = ETYPE_DES_CBC_MD5; 180 krb5_enctype_disable(d->context, in_creds.session.keytype);
|
/macosx-10.10.1/bless-103/libbless/RAID/ |
H A D | BLUpdateRAIDBooters.c | 107 DASessionRef session = NULL; local 110 session = DASessionCreate(kCFAllocatorDefault); 111 if(session == NULL) { 116 disk = DADiskCreateFromBSDName(kCFAllocatorDefault, session, device+5); 118 CFRelease(session); 126 CFRelease(session); 138 CFRelease(session);
|