Searched refs:session (Results 51 - 75 of 543) sorted by relevance

1234567891011>>

/macosx-10.10.1/WebKit2-7600.1.25/UIProcess/API/C/
H A DWKSessionRef.h40 WK_EXPORT bool WKSessionIsEphemeral(WKSessionRef session);
/macosx-10.10.1/Security-57031.1.35/Security/include/security_cdsa_plugin/
H A Dcssmplugin.cpp94 // Create one attachment session. This is what CSSM calls to process
115 // make the new session object, hanging in thin air
116 auto_ptr<PluginSession> session(this->makeSession(theHandle,
123 funcTbl = session->construct();
125 // commit this session creation
127 sessionMap()[theHandle] = session.release();
134 // if session->construct() has succeeded previously.
135 // If session->detach() fails, we do not destroy the session and it continues
144 PluginSession *session; local
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_csp/lib/
H A DDH_utils.h46 AppleCSPSession &session,
61 AppleCSPSession &session,
H A DDigestContext.h36 AppleCSPSession &session,
38 AppleCSPContext(session), mDigest(digest) { }
35 DigestContext( AppleCSPSession &session, DigestObject &digest) argument
H A Drc2Context.h31 RC2Context(AppleCSPSession &session) : argument
32 BlockCryptor(session) { }
H A Drc5Context.h30 RC5Context(AppleCSPSession &session) : argument
31 BlockCryptor(session) { }
H A DFEESignatureObject.h45 AppleCSPSession &session,
52 mSession(session) { }
86 AppleCSPSession &session,
88 FEESigner(randFcn, randRef, session, alloc) { };
119 AppleCSPSession &session,
121 FEESigner(randFcn, randRef, session, alloc) { };
42 FEESigner( feeRandFcn randFcn, void *randRef, AppleCSPSession &session, Allocator &alloc) argument
83 FEERawSigner( feeRandFcn randFcn, void *randRef, AppleCSPSession &session, Allocator &alloc) argument
116 FEEECDSASigner( feeRandFcn randFcn, void *randRef, AppleCSPSession &session, Allocator &alloc) argument
H A DRSA_DSA_utils.h46 AppleCSPSession &session,
59 AppleCSPSession &session,
78 AppleCSPSession &session);
89 AppleCSPSession &session,
101 AppleCSPSession &session,
109 AppleCSPSession &session,
H A DFEEKeys.h48 AppleCSPSession &session,
61 AppleCSPSession &session,
63 AppleCSPContext(session) {}
95 AppleCSPSession &session);
99 AppleCSPSession &session);
60 FEEKeyPairGenContext( AppleCSPSession &session, const Context &) argument
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_cdsa_plugin/lib/
H A Dcssmplugin.cpp94 // Create one attachment session. This is what CSSM calls to process
115 // make the new session object, hanging in thin air
116 auto_ptr<PluginSession> session(this->makeSession(theHandle,
123 funcTbl = session->construct();
125 // commit this session creation
127 sessionMap()[theHandle] = session.release();
134 // if session->construct() has succeeded previously.
135 // If session->detach() fails, we do not destroy the session and it continues
144 PluginSession *session; local
[all...]
/macosx-10.10.1/Security-57031.1.35/securityd/src/
H A Dauthhost.h41 AuthHostInstance(Session &session, AuthHostType host);
44 Session &session() const;
/macosx-10.10.1/WebKit2-7600.1.25/Shared/
H A DSessionTracker.cpp70 NetworkStorageSession* SessionTracker::session(SessionID sessionID) function in class:WebKit::SessionTracker
77 SessionID SessionTracker::sessionID(const NetworkStorageSession& session) argument
79 if (&session == &NetworkStorageSession::defaultStorageSession())
81 return storageSessionToID().get(&session);
84 void SessionTracker::setSession(SessionID sessionID, std::unique_ptr<NetworkStorageSession> session) argument
87 storageSessionToID().set(session.get(), sessionID);
88 staticSessionMap().set(sessionID, WTF::move(session));
95 storageSessionToID().remove(session(sessionID));
/macosx-10.10.1/WebInspectorUI-7600.1.17/UserInterface/Models/
H A DReplaySession.js39 var session = new WebInspector.ReplaySession(identifier);
40 session._updateFromPayload(payload);
41 return session;
45 SegmentsChanged: "replay-session-segments-changed",
59 // The replay manager won't update the session's list of segments nor create a new session.
74 var session = this;
77 session._segments = segmentsArray;
78 session.dispatchEventToListeners(WebInspector.ReplaySession.Event.SegmentsChanged, {oldSegments: oldSegments});
/macosx-10.10.1/postfix-255/postfix/src/smtp/
H A Dsmtp_trouble.c50 /* a transcript of the session. No notification is generated for
73 /* The session is marked as "do not cache".
101 /* The session is marked as "do not cache".
165 static void smtp_check_code(SMTP_SESSION *session, int code) argument
181 session->error_mask |= MAIL_ERROR_PROTOCOL;
189 SMTP_SESSION *session = state->session; local
244 session ? session->namaddrport : "none", &why->dsn);
257 * Don't cache this session
357 SMTP_SESSION *session = state->session; local
418 SMTP_SESSION *session = state->session; local
[all...]
/macosx-10.10.1/DiskArbitration-268/DiskArbitrationAgent/
H A DDiskArbitrationAgent.m67 DASessionRef session;
69 session = DASessionCreate( kCFAllocatorDefault );
71 if ( session )
75 disk = _DADiskCreateFromSerialization( kCFAllocatorDefault, session, serialization );
108 CFRelease( session );
/macosx-10.10.1/WebKit2-7600.1.25/NetworkProcess/mac/
H A DRemoteNetworkingContext.mm63 NetworkStorageSession* session = SessionTracker::session(m_sessionID);
64 if (session)
65 return *session;
66 // Some requests may still be coming shortly after NetworkProcess was told to destroy its session.
67 LOG_ERROR("Invalid session ID. Please file a bug unless you just disabled private browsing, in which case it's an expected race.");
97 if (SessionTracker::session(sessionID))
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/
H A DSecOTRPackets.c111 void SecOTRAppendDHMessage(SecOTRSessionRef session, argument
120 if(!session) return;
126 SecFDHKAppendPublicSerialization(session->_myKey, gxmpi);
140 AES_CTR_IV0_Transform(sizeof(session->_r), session->_r, gxmpiSize, gxmpiLocation, encGxmpiLocation);
150 void SecOTRAppendDHKeyMessage(SecOTRSessionRef session, argument
159 SecFDHKAppendPublicSerialization(session->_myKey, appendTo);
162 static uint8_t* AppendEncryptedSignature(SecOTRSessionRef session, argument
171 SecFDHKAppendPublicSerialization(session->_myKey, mbData);
172 SecPDHKAppendSerialization(session
219 AppendMACedEncryptedSignature(SecOTRSessionRef session, bool usePrime, CFMutableDataRef appendTo) argument
241 SecOTRAppendRevealSignatureMessage(SecOTRSessionRef session, CFMutableDataRef appendTo) argument
258 SecOTRAppendSignatureMessage(SecOTRSessionRef session, CFMutableDataRef appendTo) argument
[all...]
/macosx-10.10.1/DiskArbitration-268/diskarbitrationd/
H A DDAServer.c263 DASessionRef session; local
265 session = ( void * ) CFArrayGetValueAtIndex( gDASessionList, index );
267 if ( DASessionGetID( session ) == sessionID )
269 return session;
276 void _DAConfigurationCallback( SCDynamicStoreRef session, CFArrayRef keys, void * info ) argument
298 user = ___SCDynamicStoreCopyConsoleUser( session, &userUID, &userGID );
306 if ( session ) /* not SystemUIServer */
339 userList = SCDynamicStoreCopyConsoleInformation( session );
352 userList = ___SCDynamicStoreCopyConsoleInformation( session );
1031 DASessionRef session; local
1082 DASessionRef session; local
1121 DASessionRef session; local
1153 DASessionRef session; local
1194 DASessionRef session; local
1238 DASessionRef session; local
1282 DASessionRef session; local
1350 DASessionRef session; local
1401 DASessionRef session; local
1478 DASessionRef session; local
1542 DASessionRef session; local
1676 DASessionRef session; local
1731 DASessionRef session; local
1865 DASessionRef session; local
1931 DASessionRef session; local
1972 DASessionRef session; local
2006 DASessionRef session; local
[all...]
/macosx-10.10.1/WebKit2-7600.1.25/WebProcess/WebCoreSupport/soup/
H A DWebFrameNetworkingContext.cpp48 if (SessionTracker::session(sessionID))
75 for (const auto& session : SessionTracker::sessionMap().values()) {
76 if (session)
77 soup_cookie_jar_set_accept_policy(session->soupNetworkSession().cookieJar(), soupPolicy);
89 return *SessionTracker::session(SessionID::legacyPrivateSessionID());
/macosx-10.10.1/system_cmds-643.1.1/chkpasswd.tproj/
H A Dod_passwd.c63 ODSessionRef session = NULL; local
80 session = ODSessionCreate(NULL, NULL, NULL);
81 if (session) {
83 node = ODNodeCreateWithName(NULL, session, location, NULL);
85 node = ODNodeCreateWithNodeType(NULL, session, kODNodeTypeAuthentication, NULL);
/macosx-10.10.1/configd-699.1.5/configd.tproj/
H A Dsession.c38 #include "session.h"
49 /* information maintained for each active session */
52 static int lastSession = -1; /* # of last used session */
57 /* temp session */
72 /* look for matching session (note: slot 0 is the "server" port) */
111 temp_session = sessions[0]; /* use "server" session */
150 /* if first session (the "server" port) */
157 // allocate a new session for "the" server
165 /* check to see if we already have an open session (note: slot 0 is the "server" port) */
176 /* and keep looking for a matching session */
428 sessionName(serverSessionRef session) argument
446 copyEntitlement(serverSessionRef session, CFStringRef entitlement) argument
486 sessionPid(serverSessionRef session) argument
510 hasRootAccess(serverSessionRef session) argument
547 hasWriteAccess(serverSessionRef session, CFStringRef key) argument
651 hasPathAccess(serverSessionRef session, const char *path) argument
[all...]
H A Dsession.h67 /* mach port used as the key to this session */
70 /* mach port associated with this session */
74 /* data associated with this "open" session */
77 /* credentials associated with this "open" session */
83 /* root access credential associated with this "open" session */
87 * write access entitlement associated with this "open" session
114 Boolean hasRootAccess (serverSessionRef session);
116 Boolean hasWriteAccess (serverSessionRef session,
119 Boolean hasPathAccess (serverSessionRef session,
/macosx-10.10.1/configd-699.1.5/SystemConfiguration.fproj/helper/
H A DSCHelper_server.c49 #pragma mark SCHelper session managment
72 // per session lock
79 // session mach port
86 // write access entitlement associated with this session
122 #pragma mark Helper session management
127 __SCHelperSessionUseEntitlement(SCHelperSessionRef session) argument
129 SCHelperSessionPrivateRef sessionPrivate = (SCHelperSessionPrivateRef)session;
137 __SCHelperSessionGetAuthorization(SCHelperSessionRef session) argument
139 SCHelperSessionPrivateRef sessionPrivate = (SCHelperSessionPrivateRef)session;
146 __SCHelperSessionSetAuthorization(SCHelperSessionRef session, CFTypeRe argument
218 __SCHelperSessionGetPreferences(SCHelperSessionRef session) argument
227 __SCHelperSessionSetThreadName(SCHelperSessionRef session) argument
278 __SCHelperSessionSetPreferences(SCHelperSessionRef session, SCPreferencesRef prefs) argument
310 __SCHelperSessionSetNetworkSetFilter(SCHelperSessionRef session, Boolean setChange) argument
325 __SCHelperSessionUseNetworkSetFilter(SCHelperSessionRef session) argument
334 __SCHelperSessionSetVPNFilter(SCHelperSessionRef session, Boolean vpnChange, CFArrayRef vpnTypes) argument
357 __SCHelperSessionUseVPNFilter(SCHelperSessionRef session, CFArrayRef *vpnTypes) argument
369 SCHelperSessionRef session = (SCHelperSessionRef)value; local
454 SCHelperSessionRef session = (SCHelperSessionRef)cf; local
549 SCHelperSessionRef session = NULL; local
585 __SCHelperSessionAddBacktrace(SCHelperSessionRef session, CFStringRef backtrace, const char * command) argument
669 do_Exit(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument
685 do_Auth(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument
737 do_keychain_copy(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument
771 do_keychain_exists(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument
804 do_keychain_remove(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument
837 do_keychain_set(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument
928 do_interface_refresh(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument
972 do_prefs_Open(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument
1086 do_prefs_Access(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument
1136 do_prefs_Lock(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument
1174 do_prefs_Commit(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument
1327 do_prefs_Apply(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument
1352 do_prefs_Unlock(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument
1377 do_prefs_Close(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument
1398 do_prefs_Synchronize(SCHelperSessionRef session, void *info, CFDataRef data, uint32_t *status, CFDataRef *reply) argument
1417 sessionName(SCHelperSessionRef session) argument
1434 sessionPrefsID(SCHelperSessionRef session) argument
1452 copyEntitlement(SCHelperSessionRef session, CFStringRef entitlement) argument
1494 isSetChange(SCHelperSessionRef session) argument
1525 isVPNChange(SCHelperSessionRef session) argument
1580 checkEntitlement(SCHelperSessionRef session, CFStringRef prefsID, CFStringRef entitlement_name) argument
1619 hasAuthorization(SCHelperSessionRef session, Boolean needWrite) argument
1781 SCHelperSessionRef session = (SCHelperSessionRef)arg; local
1836 SCHelperSessionRef session; local
2030 SCHelperSessionRef session; local
2150 SCHelperSessionRef session; local
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_authorization/lib/
H A DAuthorizationPriv.h116 This function allows the creator of a (new) security session to associate an arbitrary
117 UNIX user identity (uid) with the session. This uid can be retrieved with
118 SessionGetDistinguishedUser by anyone who knows the session's id, and may also
121 This call can only be made by the process that created the session, and only
126 @param session (input) Session-id for which to set the uid. Can be one of the
130 OSStatus SessionSetDistinguishedUser(SecuritySessionId session, uid_t user);
135 Retrieves the distinguished uid of a session as set by the session creator
138 @param session (input) Session-id for which to set the uid. Can be one of the
142 OSStatus SessionGetDistinguishedUser(SecuritySessionId session, uid_
[all...]
/macosx-10.10.1/WebKit-7600.1.25/wince/WebCoreSupport/
H A DPlatformStrategiesWinCE.cpp87 String PlatformStrategiesWinCE::cookiesForDOM(const NetworkStorageSession& session, const URL& firstParty, const URL& url) argument
89 return WebCore::cookiesForDOM(session, firstParty, url);
92 void PlatformStrategiesWinCE::setCookiesFromDOM(const NetworkStorageSession& session, const URL& firstParty, const URL& url, const String& cookieString) argument
94 WebCore::setCookiesFromDOM(session, firstParty, url, cookieString);
97 bool PlatformStrategiesWinCE::cookiesEnabled(const NetworkStorageSession& session, const URL& firstParty, const URL& url) argument
99 return WebCore::cookiesEnabled(session, firstParty, url);
102 String PlatformStrategiesWinCE::cookieRequestHeaderFieldValue(const NetworkStorageSession& session, const URL& firstParty, const URL& url) argument
104 return WebCore::cookieRequestHeaderFieldValue(session, firstParty, url);
107 bool PlatformStrategiesWinCE::getRawCookies(const NetworkStorageSession& session, const URL& firstParty, const URL& url, Vector<Cookie>& rawCookies) argument
109 return WebCore::getRawCookies(session, firstPart
112 deleteCookie(const NetworkStorageSession& session, const URL& url, const String& cookieName) argument
[all...]

Completed in 305 milliseconds

1234567891011>>