/macosx-10.10.1/Security-57031.1.35/Security/authd/ |
H A D | authd_private.h | 93 int32_t session; member in struct:AuthorizationExternalBlob
|
H A D | server.c | 4 #include "session.h" 201 LOGD("server: au_sdev_handle_t event=%i, session=%i", event, aia.ai_asid); 204 LOGV("server: session %i destroyed", aia.ai_asid); 285 __block session_t session = NULL; local 298 session = (session_t)CFDictionaryGetValue(gSessionMap, &info.asid); 299 if (session) { 300 CFRetain(session); 302 session = session_create(info.asid); 303 CFDictionarySetValue(gSessionMap, session_get_key(session), session); 404 __block session_t session = NULL; local [all...] |
H A D | authtoken.c | 52 session_t session; member in struct:_auth_token_s 79 CFReleaseSafe(auth->session); 193 auth->session = (session_t)CFRetain(process_get_session(proc)); 227 auth->session = server_find_copy_session(info->asid, true); 228 if (auth->session == NULL) { 229 LOGV("authtoken[%i]: failed to create session", auth->auditInfo.pid); 307 return auth->session;
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | AppleCSP.h | 20 // AppleCSP.h - top-level plugin and session classes 42 AppleCSPSession &session,
|
H A D | ascContext.cpp | 106 AppleCSPSession &session, 119 cspCtx = new AppleSymmKeyGenerator(session, 125 cspCtx = new ASCContext(session); 154 symmetricKeyBits(context, session(), CSSM_ALGID_ASC, 105 setup( AppleCSPSession &session, CSPFullPluginSession::CSPContext * &cspCtx, const Context &context) argument
|
H A D | bfContext.cpp | 54 symmetricKeyBits(context, session(), CSSM_ALGID_BLOWFISH,
|
H A D | rc4Context.cpp | 45 symmetricKeyBits(context, session(), CSSM_ALGID_RC4,
|
H A D | bsafeContext.cpp | 41 BSafe::BSafeContext::BSafeContext(AppleCSPSession &session) argument 42 : AppleCSPContext(session) 194 BinaryKey &binKey = session().lookupRefKey(key); 209 BinaryKey &binKey = session().lookupRefKey(key); 323 session().getRandomBytes(BSAFE_RANDSIZE, seed);
|
H A D | BlockCryptor.cpp | 41 session().free(mInBuf); 46 session().free(mChainBuf); 77 session().free(mInBuf); 82 mInBuf = (uint8 *)session().malloc(blockSizeIn); 90 session().free(mChainBuf); 95 mChainBuf = (uint8 *)session().malloc(blockSizeIn);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_x509_cl/lib/ |
H A D | DecodedCert.cpp | 35 AppleX509CLSession &session) 36 : DecodedItem(session) 43 AppleX509CLSession &session, 45 : DecodedItem(session) 34 DecodedCert( AppleX509CLSession &session) argument 42 DecodedCert( AppleX509CLSession &session, const CssmData &encodedCert) argument
|
H A D | DecodedItem.h | 76 * (if necessary) and copying to the session allocator's memory space. 82 * requires a copy (from internal memory to the session allocator's 155 AppleX509CLSession &session);
|
/macosx-10.10.1/Security-57031.1.35/securityd/src/ |
H A D | AuthorizationMechEval.cpp | 36 AgentMechanismRef::AgentMechanismRef(const AuthHostType type, Session &session) : argument 37 RefPointer<QueryInvokeMechanism>(new QueryInvokeMechanism(type, session)) {} 40 AgentMechanismEvaluator::AgentMechanismEvaluator(uid_t uid, Session& session, const vector<string>& inMechanisms) : argument 41 mMechanisms(inMechanisms), mClientUid(uid), mSession(session)
|
H A D | authority.cpp | 31 #include "session.h" 80 // link to session 104 Session &AuthorizationToken::session() const function in class:AuthorizationToken 162 secdebug("SSauth", "Authorization %p grabbing session %p creds %p", 163 this, &session(), &session().authCredentials()); 164 CredentialSet result = session().authCredentials();
|
/macosx-10.10.1/configd-699.1.5/SystemConfiguration.fproj/ |
H A D | SCPLock.c | 292 ok = SCDynamicStoreAddWatchedKey(prefsPrivate->session, 305 ok = SCDynamicStoreAddTemporaryValue(prefsPrivate->session, 320 ok = SCDynamicStoreNotifyWait(prefsPrivate->session); 328 changes = SCDynamicStoreCopyNotifiedKeys(prefsPrivate->session); 338 (void) SCDynamicStoreRemoveWatchedKey(prefsPrivate->session, 343 changes = SCDynamicStoreCopyNotifiedKeys(prefsPrivate->session); 367 /* sorry, you must provide a session */ 390 if (prefsPrivate->session == NULL) { 493 * session was created so we need to compare 513 * session wa [all...] |
H A D | SCPOpen.c | 118 if (prefsPrivate->session) CFRelease(prefsPrivate->session); 174 /* allocate prefs session */ 195 prefsPrivate->session = NULL; 256 // save preferences session "name" 400 * allocate and initialize a new prefs session 825 /* establish a dynamic store session */ 826 prefsPrivate->session = SCDynamicStoreCreate(allocator, 830 if (prefsPrivate->session == NULL) { 835 /* create the session "commi [all...] |
/macosx-10.10.1/bless-103/libbless/EFI/ |
H A D | BLCreateEFIXMLRepresentationForPath.c | 230 DASessionRef session = NULL; local 236 session = DASessionCreate(kCFAllocatorDefault); 237 if(session) { 238 dadisk = DADiskCreateFromIOMedia(kCFAllocatorDefault, session, 253 CFRelease(session);
|
/macosx-10.10.1/xnu-2782.1.97/bsd/kern/ |
H A D | subr_prf.c | 164 struct session *sessp; 186 struct session * sessp; 203 session_rele((struct session *) sessp); 208 * with the given session. 215 struct session *sess = (struct session *)tpr;
|
/macosx-10.10.1/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | pfkey_racoon.c | 103 #include "session.h" 1749 ike_session_t *session = NULL; local 1841 session = iph2->parent_session; 1969 if (session == NULL) 1970 session = ike_session_get_session(iph2->src, iph2->dst, 1, NULL); 1971 if (session == NULL) 1974 if (ike_session_link_phase2(session, iph2)) 2692 pk_sendget_inbound_sastats(ike_session_t *session) argument 2697 if (!session) { 2702 session 2733 pk_sendget_outbound_sastats(ike_session_t *session) argument 2783 ike_session_t *session; local [all...] |
/macosx-10.10.1/OpenSSL098-52/src/ssl/ |
H A D | s3_enc.c | 166 EVP_DigestUpdate(&s1,s->session->master_key, 167 s->session->master_key_length); 173 EVP_DigestUpdate(&m5,s->session->master_key, 174 s->session->master_key_length); 345 s->session->key_arg_length=0; 371 if (!ssl_cipher_get_evp(s->session,&c,&hash,&comp)) 405 if (s->session->cipher != NULL) 407 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_eNULL) 411 if ((s->session->cipher->algorithms & SSL_ENC_MASK) == SSL_RC4) 472 if ((s->session [all...] |
/macosx-10.10.1/passwordserver_sasl-193/cyrus_sasl/plugins/ |
H A D | kerberos4.c | 156 des_cblock key; /* session key */ 157 des_cblock session; /* session key */ member in struct:context 246 &text->session, &text->ip_local, 251 &text->session, &text->ip_local, &text->ip_remote); 286 &text->session, &text->ip_remote, 290 &text->session, &text->ip_remote, 587 * use DES ECB in the session key 621 memcpy(text->session, ad.session, [all...] |
/macosx-10.10.1/CPANInternal-159.1/SOAP-Lite-1.11/lib/SOAP/Transport/ |
H A D | TCP.pm | 215 for my $session (grep { defined } @ready) { 217 if (my $rc = $session->read($data, 4096)) { 218 $data{$session} .= $data if $rc > 0; 220 $session->write($self->SUPER::handle(delete $data{$session})); 221 $session->close;
|
/macosx-10.10.1/vim-55/runtime/autoload/ |
H A D | gnat.vim | 15 " 05.08.2006 MK Add session support 79 "\ expand('~')[0:-2] . ".vimfiles.session]gnat_" . 83 "\ expand('~') . "/vimfiles/session/gnat_" .
|
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/libraries/libldap/ |
H A D | tls_m.c | 2340 tlsm_session *session; member in struct:tls_data 2426 tlsm_session *session; local 2446 session = SSL_ImportFD( c->tc_model, fd ); 2447 if ( !session ) { 2452 rc = SSL_ResetHandshake( session, is_server ); 2456 "TLS: error: new session - reset handshake failure %d - error %d:%s\n", 2460 PR_Close( session ); 2461 session = NULL; 2464 return (tls_session *)session; 2468 tlsm_session_accept_or_connect( tls_session *session, in argument 2516 tlsm_session_upflags( Sockbuf *sb, tls_session *session, int rc ) argument 2559 tlsm_session_my_dn( tls_session *session, struct berval *der_dn ) argument 2574 tlsm_session_peer_dn( tls_session *session, struct berval *der_dn ) argument 2594 tlsm_session_chkhost( LDAP *ld, tls_session *session, const char *name_in ) argument 3045 tlsm_session *session = arg; local [all...] |
/macosx-10.10.1/Heimdal-398.1.2/kcm/ |
H A D | cache.c | 287 cache->session = -1; 966 if (kcm_is_same_session(client, p->uid, p->session)) 976 kcm_cache_remove_session(pid_t session) argument 983 if (p->session == session) { 984 kcm_log(1, "remove credental %s because session %d went away", 985 p->name, (int)session); 1054 c->session = s32; 1139 CHECK(ret = krb5_store_int32(sp, c->session)); 1185 c->session 1256 int32_t session; local 1303 kcm_unparse_wrap(krb5_storage *sp, char *name, int32_t session, int (^wrapped)(krb5_storage *inner)) argument [all...] |
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/ |
H A D | build_auth.c | 135 &cred->session, 192 ret = krb5_crypto_init(context, &cred->session, enctype, &crypto);
|