/macosx-10.10.1/WebKit2-7600.1.25/UIProcess/API/C/ |
H A D | WKSessionRef.h | 40 WK_EXPORT bool WKSessionIsEphemeral(WKSessionRef session);
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_cdsa_plugin/ |
H A D | cssmplugin.cpp | 94 // Create one attachment session. This is what CSSM calls to process 115 // make the new session object, hanging in thin air 116 auto_ptr<PluginSession> session(this->makeSession(theHandle, 123 funcTbl = session->construct(); 125 // commit this session creation 127 sessionMap()[theHandle] = session.release(); 134 // if session->construct() has succeeded previously. 135 // If session->detach() fails, we do not destroy the session and it continues 144 PluginSession *session; local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | DH_utils.h | 46 AppleCSPSession &session, 61 AppleCSPSession &session,
|
H A D | DigestContext.h | 36 AppleCSPSession &session, 38 AppleCSPContext(session), mDigest(digest) { } 35 DigestContext( AppleCSPSession &session, DigestObject &digest) argument
|
H A D | rc2Context.h | 31 RC2Context(AppleCSPSession &session) : argument 32 BlockCryptor(session) { }
|
H A D | rc5Context.h | 30 RC5Context(AppleCSPSession &session) : argument 31 BlockCryptor(session) { }
|
H A D | FEESignatureObject.h | 45 AppleCSPSession &session, 52 mSession(session) { } 86 AppleCSPSession &session, 88 FEESigner(randFcn, randRef, session, alloc) { }; 119 AppleCSPSession &session, 121 FEESigner(randFcn, randRef, session, alloc) { }; 42 FEESigner( feeRandFcn randFcn, void *randRef, AppleCSPSession &session, Allocator &alloc) argument 83 FEERawSigner( feeRandFcn randFcn, void *randRef, AppleCSPSession &session, Allocator &alloc) argument 116 FEEECDSASigner( feeRandFcn randFcn, void *randRef, AppleCSPSession &session, Allocator &alloc) argument
|
H A D | RSA_DSA_utils.h | 46 AppleCSPSession &session, 59 AppleCSPSession &session, 78 AppleCSPSession &session); 89 AppleCSPSession &session, 101 AppleCSPSession &session, 109 AppleCSPSession &session,
|
H A D | FEEKeys.h | 48 AppleCSPSession &session, 61 AppleCSPSession &session, 63 AppleCSPContext(session) {} 95 AppleCSPSession &session); 99 AppleCSPSession &session); 60 FEEKeyPairGenContext( AppleCSPSession &session, const Context &) argument
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_cdsa_plugin/lib/ |
H A D | cssmplugin.cpp | 94 // Create one attachment session. This is what CSSM calls to process 115 // make the new session object, hanging in thin air 116 auto_ptr<PluginSession> session(this->makeSession(theHandle, 123 funcTbl = session->construct(); 125 // commit this session creation 127 sessionMap()[theHandle] = session.release(); 134 // if session->construct() has succeeded previously. 135 // If session->detach() fails, we do not destroy the session and it continues 144 PluginSession *session; local [all...] |
/macosx-10.10.1/Security-57031.1.35/securityd/src/ |
H A D | authhost.h | 41 AuthHostInstance(Session &session, AuthHostType host); 44 Session &session() const;
|
/macosx-10.10.1/WebKit2-7600.1.25/Shared/ |
H A D | SessionTracker.cpp | 70 NetworkStorageSession* SessionTracker::session(SessionID sessionID) function in class:WebKit::SessionTracker 77 SessionID SessionTracker::sessionID(const NetworkStorageSession& session) argument 79 if (&session == &NetworkStorageSession::defaultStorageSession()) 81 return storageSessionToID().get(&session); 84 void SessionTracker::setSession(SessionID sessionID, std::unique_ptr<NetworkStorageSession> session) argument 87 storageSessionToID().set(session.get(), sessionID); 88 staticSessionMap().set(sessionID, WTF::move(session)); 95 storageSessionToID().remove(session(sessionID));
|
/macosx-10.10.1/WebInspectorUI-7600.1.17/UserInterface/Models/ |
H A D | ReplaySession.js | 39 var session = new WebInspector.ReplaySession(identifier); 40 session._updateFromPayload(payload); 41 return session; 45 SegmentsChanged: "replay-session-segments-changed", 59 // The replay manager won't update the session's list of segments nor create a new session. 74 var session = this; 77 session._segments = segmentsArray; 78 session.dispatchEventToListeners(WebInspector.ReplaySession.Event.SegmentsChanged, {oldSegments: oldSegments});
|
/macosx-10.10.1/postfix-255/postfix/src/smtp/ |
H A D | smtp_trouble.c | 50 /* a transcript of the session. No notification is generated for 73 /* The session is marked as "do not cache". 101 /* The session is marked as "do not cache". 165 static void smtp_check_code(SMTP_SESSION *session, int code) argument 181 session->error_mask |= MAIL_ERROR_PROTOCOL; 189 SMTP_SESSION *session = state->session; local 244 session ? session->namaddrport : "none", &why->dsn); 257 * Don't cache this session 357 SMTP_SESSION *session = state->session; local 418 SMTP_SESSION *session = state->session; local [all...] |
/macosx-10.10.1/DiskArbitration-268/DiskArbitrationAgent/ |
H A D | DiskArbitrationAgent.m | 67 DASessionRef session; 69 session = DASessionCreate( kCFAllocatorDefault ); 71 if ( session ) 75 disk = _DADiskCreateFromSerialization( kCFAllocatorDefault, session, serialization ); 108 CFRelease( session );
|
/macosx-10.10.1/WebKit2-7600.1.25/NetworkProcess/mac/ |
H A D | RemoteNetworkingContext.mm | 63 NetworkStorageSession* session = SessionTracker::session(m_sessionID); 64 if (session) 65 return *session; 66 // Some requests may still be coming shortly after NetworkProcess was told to destroy its session. 67 LOG_ERROR("Invalid session ID. Please file a bug unless you just disabled private browsing, in which case it's an expected race."); 97 if (SessionTracker::session(sessionID))
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/ |
H A D | SecOTRPackets.c | 111 void SecOTRAppendDHMessage(SecOTRSessionRef session, argument 120 if(!session) return; 126 SecFDHKAppendPublicSerialization(session->_myKey, gxmpi); 140 AES_CTR_IV0_Transform(sizeof(session->_r), session->_r, gxmpiSize, gxmpiLocation, encGxmpiLocation); 150 void SecOTRAppendDHKeyMessage(SecOTRSessionRef session, argument 159 SecFDHKAppendPublicSerialization(session->_myKey, appendTo); 162 static uint8_t* AppendEncryptedSignature(SecOTRSessionRef session, argument 171 SecFDHKAppendPublicSerialization(session->_myKey, mbData); 172 SecPDHKAppendSerialization(session 219 AppendMACedEncryptedSignature(SecOTRSessionRef session, bool usePrime, CFMutableDataRef appendTo) argument 241 SecOTRAppendRevealSignatureMessage(SecOTRSessionRef session, CFMutableDataRef appendTo) argument 258 SecOTRAppendSignatureMessage(SecOTRSessionRef session, CFMutableDataRef appendTo) argument [all...] |
/macosx-10.10.1/DiskArbitration-268/diskarbitrationd/ |
H A D | DAServer.c | 263 DASessionRef session; local 265 session = ( void * ) CFArrayGetValueAtIndex( gDASessionList, index ); 267 if ( DASessionGetID( session ) == sessionID ) 269 return session; 276 void _DAConfigurationCallback( SCDynamicStoreRef session, CFArrayRef keys, void * info ) argument 298 user = ___SCDynamicStoreCopyConsoleUser( session, &userUID, &userGID ); 306 if ( session ) /* not SystemUIServer */ 339 userList = SCDynamicStoreCopyConsoleInformation( session ); 352 userList = ___SCDynamicStoreCopyConsoleInformation( session ); 1031 DASessionRef session; local 1082 DASessionRef session; local 1121 DASessionRef session; local 1153 DASessionRef session; local 1194 DASessionRef session; local 1238 DASessionRef session; local 1282 DASessionRef session; local 1350 DASessionRef session; local 1401 DASessionRef session; local 1478 DASessionRef session; local 1542 DASessionRef session; local 1676 DASessionRef session; local 1731 DASessionRef session; local 1865 DASessionRef session; local 1931 DASessionRef session; local 1972 DASessionRef session; local 2006 DASessionRef session; local [all...] |
/macosx-10.10.1/WebKit2-7600.1.25/WebProcess/WebCoreSupport/soup/ |
H A D | WebFrameNetworkingContext.cpp | 48 if (SessionTracker::session(sessionID)) 75 for (const auto& session : SessionTracker::sessionMap().values()) { 76 if (session) 77 soup_cookie_jar_set_accept_policy(session->soupNetworkSession().cookieJar(), soupPolicy); 89 return *SessionTracker::session(SessionID::legacyPrivateSessionID());
|
/macosx-10.10.1/system_cmds-643.1.1/chkpasswd.tproj/ |
H A D | od_passwd.c | 63 ODSessionRef session = NULL; local 80 session = ODSessionCreate(NULL, NULL, NULL); 81 if (session) { 83 node = ODNodeCreateWithName(NULL, session, location, NULL); 85 node = ODNodeCreateWithNodeType(NULL, session, kODNodeTypeAuthentication, NULL);
|
/macosx-10.10.1/configd-699.1.5/configd.tproj/ |
H A D | session.c | 38 #include "session.h" 49 /* information maintained for each active session */ 52 static int lastSession = -1; /* # of last used session */ 57 /* temp session */ 72 /* look for matching session (note: slot 0 is the "server" port) */ 111 temp_session = sessions[0]; /* use "server" session */ 150 /* if first session (the "server" port) */ 157 // allocate a new session for "the" server 165 /* check to see if we already have an open session (note: slot 0 is the "server" port) */ 176 /* and keep looking for a matching session */ 428 sessionName(serverSessionRef session) argument 446 copyEntitlement(serverSessionRef session, CFStringRef entitlement) argument 486 sessionPid(serverSessionRef session) argument 510 hasRootAccess(serverSessionRef session) argument 547 hasWriteAccess(serverSessionRef session, CFStringRef key) argument 651 hasPathAccess(serverSessionRef session, const char *path) argument [all...] |
H A D | session.h | 67 /* mach port used as the key to this session */ 70 /* mach port associated with this session */ 74 /* data associated with this "open" session */ 77 /* credentials associated with this "open" session */ 83 /* root access credential associated with this "open" session */ 87 * write access entitlement associated with this "open" session 114 Boolean hasRootAccess (serverSessionRef session); 116 Boolean hasWriteAccess (serverSessionRef session, 119 Boolean hasPathAccess (serverSessionRef session,
|
/macosx-10.10.1/configd-699.1.5/SystemConfiguration.fproj/helper/ |
H A D | SCHelper_server.c | 49 #pragma mark SCHelper session managment 72 // per session lock 79 // session mach port 86 // write access entitlement associated with this session 122 #pragma mark Helper session management 127 __SCHelperSessionUseEntitlement(SCHelperSessionRef session) argument 129 SCHelperSessionPrivateRef sessionPrivate = (SCHelperSessionPrivateRef)session; 137 __SCHelperSessionGetAuthorization(SCHelperSessionRef session) argument 139 SCHelperSessionPrivateRef sessionPrivate = (SCHelperSessionPrivateRef)session; 146 __SCHelperSessionSetAuthorization(SCHelperSessionRef session, CFTypeRe argument 218 __SCHelperSessionGetPreferences(SCHelperSessionRef session) argument 227 __SCHelperSessionSetThreadName(SCHelperSessionRef session) argument 278 __SCHelperSessionSetPreferences(SCHelperSessionRef session, SCPreferencesRef prefs) argument 310 __SCHelperSessionSetNetworkSetFilter(SCHelperSessionRef session, Boolean setChange) argument 325 __SCHelperSessionUseNetworkSetFilter(SCHelperSessionRef session) argument 334 __SCHelperSessionSetVPNFilter(SCHelperSessionRef session, Boolean vpnChange, CFArrayRef vpnTypes) argument 357 __SCHelperSessionUseVPNFilter(SCHelperSessionRef session, CFArrayRef *vpnTypes) argument 369 SCHelperSessionRef session = (SCHelperSessionRef)value; local 454 SCHelperSessionRef session = (SCHelperSessionRef)cf; local 549 SCHelperSessionRef session = NULL; local 585 __SCHelperSessionAddBacktrace(SCHelperSessionRef session, CFStringRef backtrace, const char * command) argument 669 do_Exit(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument 685 do_Auth(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument 737 do_keychain_copy(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument 771 do_keychain_exists(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument 804 do_keychain_remove(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument 837 do_keychain_set(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument 928 do_interface_refresh(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument 972 do_prefs_Open(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument 1086 do_prefs_Access(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument 1136 do_prefs_Lock(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument 1174 do_prefs_Commit(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument 1327 do_prefs_Apply(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument 1352 do_prefs_Unlock(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument 1377 do_prefs_Close(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument 1398 do_prefs_Synchronize(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument 1417 sessionName(SCHelperSessionRef session) argument 1434 sessionPrefsID(SCHelperSessionRef session) argument 1452 copyEntitlement(SCHelperSessionRef session, CFStringRef entitlement) argument 1494 isSetChange(SCHelperSessionRef session) argument 1525 isVPNChange(SCHelperSessionRef session) argument 1580 checkEntitlement(SCHelperSessionRef session, CFStringRef prefsID, CFStringRef entitlement_name) argument 1619 hasAuthorization(SCHelperSessionRef session, Boolean needWrite) argument 1781 SCHelperSessionRef session = (SCHelperSessionRef)arg; local 1836 SCHelperSessionRef session; local 2030 SCHelperSessionRef session; local 2150 SCHelperSessionRef session; local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_authorization/lib/ |
H A D | AuthorizationPriv.h | 116 This function allows the creator of a (new) security session to associate an arbitrary 117 UNIX user identity (uid) with the session. This uid can be retrieved with 118 SessionGetDistinguishedUser by anyone who knows the session's id, and may also 121 This call can only be made by the process that created the session, and only 126 @param session (input) Session-id for which to set the uid. Can be one of the 130 OSStatus SessionSetDistinguishedUser(SecuritySessionId session, uid_t user); 135 Retrieves the distinguished uid of a session as set by the session creator 138 @param session (input) Session-id for which to set the uid. Can be one of the 142 OSStatus SessionGetDistinguishedUser(SecuritySessionId session, uid_ [all...] |
/macosx-10.10.1/WebKit-7600.1.25/wince/WebCoreSupport/ |
H A D | PlatformStrategiesWinCE.cpp | 87 String PlatformStrategiesWinCE::cookiesForDOM(const NetworkStorageSession& session, const URL& firstParty, const URL& url) argument 89 return WebCore::cookiesForDOM(session, firstParty, url); 92 void PlatformStrategiesWinCE::setCookiesFromDOM(const NetworkStorageSession& session, const URL& firstParty, const URL& url, const String& cookieString) argument 94 WebCore::setCookiesFromDOM(session, firstParty, url, cookieString); 97 bool PlatformStrategiesWinCE::cookiesEnabled(const NetworkStorageSession& session, const URL& firstParty, const URL& url) argument 99 return WebCore::cookiesEnabled(session, firstParty, url); 102 String PlatformStrategiesWinCE::cookieRequestHeaderFieldValue(const NetworkStorageSession& session, const URL& firstParty, const URL& url) argument 104 return WebCore::cookieRequestHeaderFieldValue(session, firstParty, url); 107 bool PlatformStrategiesWinCE::getRawCookies(const NetworkStorageSession& session, const URL& firstParty, const URL& url, Vector<Cookie>& rawCookies) argument 109 return WebCore::getRawCookies(session, firstPart 112 deleteCookie(const NetworkStorageSession& session, const URL& url, const String& cookieName) argument [all...] |