/macosx-10.9.5/Security-55471.14.18/sec/SOSCircle/SecureObjectSync/ |
H A D | SOSPeerInfo.h | 41 bool SOSPeerInfoUpdateDigestWithPublicKeyBytes(SOSPeerInfoRef peer, const struct ccdigest_info *di, 43 bool SOSPeerInfoUpdateDigestWithDescription(SOSPeerInfoRef peer, const struct ccdigest_info *di, 60 size_t SOSPeerInfoGetDEREncodedSize(SOSPeerInfoRef peer, CFErrorRef *error); 61 uint8_t* SOSPeerInfoEncodeToDER(SOSPeerInfoRef peer, CFErrorRef* error, 64 CFDataRef SOSPeerInfoCopyEncodedData(SOSPeerInfoRef peer, CFAllocatorRef allocator, CFErrorRef *error); 67 // Gestalt info about the peer. It was fetched by the implementation on the other side. 76 CFStringRef SOSPeerInfoGetPeerName(SOSPeerInfoRef peer); 77 CFStringRef SOSPeerInfoGetPeerDeviceType(SOSPeerInfoRef peer); 80 // Stringified ID for this peer, not human readable. 81 CFStringRef SOSPeerInfoGetPeerID(SOSPeerInfoRef peer); [all...] |
H A D | SOSCircle.c | 154 CFArrayForEach(array, ^(const void *peer) { 155 if (!SOSPeerInfoUpdateDigestWithPublicKeyBytes((SOSPeerInfoRef)peer, di, a_digest, error)) 255 bool SOSCircleVerifyPeerSigned(SOSCircleRef circle, SOSPeerInfoRef peer, CFErrorRef *error) { argument 256 SecKeyRef pub_key = SOSPeerInfoCopyPubKey(peer); 285 SOSPeerInfoRef peer = (SOSPeerInfoRef) element; 287 return CFEqual(peer_id, SOSPeerInfoGetPeerID(peer)); 336 static inline SOSConcordanceStatus CheckPeerStatus(SOSCircleRef circle, SOSPeerInfoRef peer, CFErrorRef *error) { 338 SecKeyRef pubKey = SOSPeerInfoCopyPubKey(peer); 340 require_action_quiet(SOSCircleHasActivePeer(circle, peer, error), exit, result = kSOSConcordanceNoPeer); 382 SOSCircleForEachActiveValidPeer(signers_circle, user_pubKey, ^(SOSPeerInfoRef peer) { [all...] |
/macosx-10.9.5/ntp-88/ntpd/ |
H A D | refclock_palisade.h | 182 static int palisade_start (int, struct peer *); 183 static void palisade_shutdown (int, struct peer *); 184 static void palisade_receive (struct peer *); 185 static void palisade_poll (int, struct peer *); 187 int palisade_configure (int, struct peer *); 188 int TSIP_decode (struct peer *);
|
H A D | refclock_gpsvme.c | 81 static int psc_start(int, struct peer *); 82 static void psc_shutdown(int, struct peer *); 83 static void psc_poll(int, struct peer *); 95 struct peer *peer 126 /* initialize peer variables */ 127 pp = peer->procptr; 129 pp->io.srcclock = (caddr_t) peer; 135 peer->precision = PRECISION; 149 struct peer *pee [all...] |
H A D | refclock_bancomm.c | 166 static int vme_start (int, struct peer *); 167 static void vme_shutdown (int, struct peer *); 169 static void vme_poll (int unit, struct peer *); 219 struct peer *peer 227 tfp_type = (int)(peer->ttl); 243 printf("Opening DATUM DEVICE %s\n",DEVICE_NAME(peer->refclkunit)); 245 if ( (fd_vme = open(DEVICE_NAME(peer->refclkunit), O_RDWR)) < 0) { 276 pp = peer->procptr; 281 pp->io.srcclock = (caddr_t)peer; [all...] |
H A D | refclock_arc.c | 206 This avoids ntpd syncing to another peer first and then 530 static void dummy_event_handler (struct peer *); 531 static void arc_event_handler (struct peer *); 542 static int arc_start (int, struct peer *); 543 static void arc_shutdown (int, struct peer *); 545 static void arc_poll (int, struct peer *); 563 peer->nextaction = current_time + QUEUETICK; \ 569 struct peer *peer 590 struct peer *pee 861 struct peer *peer; local [all...] |
H A D | refclock_wwv.c | 582 static int wwv_start (int, struct peer *); 583 static void wwv_shutdown (int, struct peer *); 585 static void wwv_poll (int, struct peer *); 590 static void wwv_epoch (struct peer *); 591 static void wwv_rf (struct peer *, double); 592 static void wwv_endpoc (struct peer *, int); 593 static void wwv_rsec (struct peer *, double); 594 static void wwv_qrz (struct peer *, struct sync *, int); 595 static void wwv_corr4 (struct peer *, struct decvec *, 597 static void wwv_gain (struct peer *); 794 struct peer *peer; local 926 wwv_rf( struct peer *peer, double isig ) argument 1299 wwv_qrz( struct peer *peer, struct sync *sp, int pdelay ) argument 1387 wwv_endpoc( struct peer *peer, int epopos ) argument 1750 wwv_rsec( struct peer *peer, double bit ) argument 2119 wwv_corr4( struct peer *peer, struct decvec *vp, double data[], double tab[][4] ) argument 2566 wwv_qsy( struct peer *peer, int chan ) argument [all...] |
H A D | refclock_leitch.c | 76 struct peer *peer; member in struct:leitchunit 101 static int leitch_start (int, struct peer *); 102 static void leitch_shutdown (int, struct peer *); 103 static void leitch_poll (int, struct peer *); 104 static void leitch_control (int, struct refclockstat *, struct refclockstat *, struct peer *); 109 static void leitch_timeout (struct peer *); 150 struct peer *peer 165 struct peer *pee 213 struct peer *peer; local [all...] |
H A D | ntp_control.c | 64 static void ctl_putpeer (int, struct peer *); 112 { CS_PEERID, RO, "peer" }, /* 9 */ 372 * the reference clock driver doesn't set peer->sstclktype to something 825 * ctlpeerstatus - return a status word for this peer 829 register struct peer *peer 834 status = peer->status; 835 if (!(peer->flags & FLAG_PREEMPT)) 837 if (peer->keyid != 0) 839 if (peer 2136 struct peer *peer; local 2168 register struct peer *peer; local 2298 register struct peer *peer; local 2911 report_event( int err, struct peer *peer, const char *str ) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/xpc-tsa/ |
H A D | main-tsa.m | 29 xpc_connection_t peer; 41 void handle_connection_event(const xpc_connection_t peer); 192 xpc_connection_t peer = xpc_dictionary_get_remote_connection(event); 197 xpc_connection_send_message(peer, reply); 215 xpc_connection_t peer = xpc_dictionary_get_remote_connection(event); 233 xpc_release(info->peer); 235 if (peer == NULL && XPC_ERROR_CONNECTION_INVALID == event && 0 != info->processed) { 240 xpctsaDebug("listener event error (connection %p): %s", peer, xpc_dictionary_get_string(event, XPC_ERROR_KEY_DESCRIPTION)); 256 xpctsaDebug("Unknown op=%s request from pid %d", operation, xpc_connection_get_pid(peer)); 267 void handle_connection_event(const xpc_connection_t peer) [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/sslViewer/ |
H A D | ioSock.h | 44 * info about a peer returned from MakeServerConnection() and 65 PeerSpec *peer); // RETURNED 83 PeerSpec *peer); // RETURNED
|
/macosx-10.9.5/ntp-88/include/ |
H A D | ntpd.h.orig | 23 extern u_short ctlpeerstatus (struct peer *); 30 extern void report_event (int, struct peer *, const char *); 114 extern int local_clock(struct peer *, double); 130 extern struct peer *findexistingpeer (sockaddr_u *, struct peer *, int); 131 extern struct peer *findpeer (sockaddr_u *, struct interface *, int, int *); 132 extern struct peer *findpeerbyassoc (u_int); 133 extern void set_peerdstadr (struct peer *peer, struct interface *interface); 134 extern struct peer *newpee [all...] |
H A D | ntp_refclock.h | 234 int (*clock_start) (int, struct peer *); 235 void (*clock_shutdown) (int, struct peer *); 236 void (*clock_poll) (int, struct peer *); 238 struct refclockstat *, struct peer *); 240 void (*clock_buginfo) (int, struct refclockbug *, struct peer *); 241 void (*clock_timer) (int, struct peer *); 263 extern void refclock_timer (struct peer *); 264 extern void refclock_transmit (struct peer *); 269 extern void refclock_report (struct peer *, int);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/xpc/ |
H A D | main.c | 40 xpc_connection_t peer; member in struct:connection_info 64 xpc_object_t create_keychain_search_list_for(xpc_connection_t peer, SecPreferencesDomain domain) argument 67 pid_t peer_pid = xpc_connection_get_pid(peer); 102 void _set_keychain_search_lists_for_domain(xpc_connection_t peer, xpc_object_t all_domains, char *domain_name, SecPreferencesDomain domain_enum) argument 104 xpc_object_t keychains_for_domain = create_keychain_search_list_for(peer, domain_enum); 109 syslog(LOG_ERR, "Can't discover keychain paths for domain %s on behalf of %d", domain_name, xpc_connection_get_pid(peer)); 113 #define SET_KEYCHAIN_SEARCH_LISTS_FOR_DOMAIN(peer, all_domains, domain) _set_keychain_search_lists_for_domain(peer, all_domains, #domain, domain); 116 xpc_object_t create_keychain_search_lists(xpc_connection_t peer) argument 120 SET_KEYCHAIN_SEARCH_LISTS_FOR_DOMAIN(peer, all_domain 130 create_keychain_and_lock_paths(xpc_connection_t peer, xpc_object_t keychain_path_dict) argument 267 xpc_connection_t peer = xpc_dictionary_get_connection(event); local 342 handle_connection_event(const xpc_connection_t peer) argument [all...] |
/macosx-10.9.5/WebCore-7537.78.1/Modules/websockets/ |
H A D | WorkerThreadableWebSocketChannel.cpp | 364 static PassOwnPtr<ScriptExecutionContext::Task> create(WorkerThreadableWebSocketChannel::Peer* peer, argument 368 return adoptPtr(new WorkerContextDidInitializeTask(peer, loaderProxy, workerClientWrapper)); 376 // If Bridge::initialize() quitted earlier, we need to kick mainThreadDestroy() to delete the peer. 377 OwnPtr<WorkerThreadableWebSocketChannel::Peer> peer = adoptPtr(m_peer); variable 379 m_loaderProxy->postTaskToLoader(createCallbackTask(&WorkerThreadableWebSocketChannel::mainThreadDestroy, peer.release())); 386 WorkerContextDidInitializeTask(WorkerThreadableWebSocketChannel::Peer* peer, argument 389 : m_peer(peer) 407 Peer* peer = Peer::create(clientWrapper, *loaderProxy, context, taskMode); local 409 WorkerThreadableWebSocketChannel::WorkerContextDidInitializeTask::create(peer, loaderProxy, clientWrapper), taskMode); 412 delete peer; 431 mainThreadConnect(ScriptExecutionContext* context, Peer* peer, const KURL& url, const String& protocol) argument 448 mainThreadSend(ScriptExecutionContext* context, Peer* peer, const String& message) argument 457 mainThreadSendArrayBuffer(ScriptExecutionContext* context, Peer* peer, PassOwnPtr<Vector<char> > data) argument 467 mainThreadSendBlob(ScriptExecutionContext* context, Peer* peer, const KURL& url, const String& type, long long size) argument 523 mainThreadBufferedAmount(ScriptExecutionContext* context, Peer* peer) argument 546 mainThreadClose(ScriptExecutionContext* context, Peer* peer, int code, const String& reason) argument 562 mainThreadFail(ScriptExecutionContext* context, Peer* peer, const String& reason) argument 578 mainThreadDestroy(ScriptExecutionContext* context, PassOwnPtr<Peer> peer) argument 592 OwnPtr<Peer> peer = adoptPtr(m_peer); local 599 mainThreadSuspend(ScriptExecutionContext* context, Peer* peer) argument 615 mainThreadResume(ScriptExecutionContext* context, Peer* peer) argument [all...] |
/macosx-10.9.5/apache-786.1/httpd/modules/ssl/ |
H A D | mod_ssl.h | 41 * peer is non-zero; the server certificate is used otherwise. The 46 (apr_pool_t *p, conn_rec *c, int peer,
|
/macosx-10.9.5/mDNSResponder-522.92.1/Clients/SimpleChat.NET/ |
H A D | SimpleChat.cs | 113 PeerData peer = new PeerData(); 115 peer.InterfaceIndex = ifIndex; 116 peer.Name = serviceName; 117 peer.Type = regType; 118 peer.Domain = domain; 119 peer.Address = null; 121 comboBox1.Items.Add(peer); 146 PeerData peer = new PeerData(); 148 peer.InterfaceIndex = ifIndex; 149 peer [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_codesigning/CodeSigningHelper/ |
H A D | main.c | 88 fetchData(xpc_connection_t peer, xpc_object_t event) argument 152 xpc_connection_send_message(peer, reply); 157 static void CodeSigningHelper_peer_event_handler(xpc_connection_t peer, xpc_object_t event) argument 167 xpc_connection_cancel(peer); 169 fetchData(peer, event); 171 syslog(LOG_ERR, "peer sent invalid command %s", cmd); 172 xpc_connection_cancel(peer); 176 static void CodeSigningHelper_event_handler(xpc_connection_t peer) argument 178 xpc_connection_set_event_handler(peer, ^(xpc_object_t event) { 179 CodeSigningHelper_peer_event_handler(peer, even [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/hx509/ |
H A D | test_crypto.in | 105 --peer-cmstype=1.2.840.113549.1.1.4 \ 113 --peer-cmstype=1.2.840.113549.1.1.5 \ 114 --peer-cmstype=1.2.840.113549.1.1.4 \ 122 --peer-cmstype=1.2.840.113549.1.1.11 \ 123 --peer-cmstype=1.2.840.113549.1.1.5 \ 131 --peer-cmstype=1.2.840.113549.2.5 \ 132 --peer-cmstype=1.2.840.113549.1.1.5 \ 140 --peer-cmstype=2.16.840.1.101.3.4.1.42 \ 141 --peer-cmstype=1.2.840.113549.3.7 \ 142 --peer [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_utilities/ |
H A D | socks++.cpp | 77 void SocksClientSocket::open(const IPSockAddress &peer) argument 80 Support::connect(*this, peer); 83 TCPClientSocket::open(peer); 102 void SocksClientSocket::setFd(int fd, const IPSockAddress &local, const IPSockAddress &peer) argument 106 mPeerAddress = peer;
|
H A D | socks++4.cpp | 42 void Server::connect(SocksClientSocket &me, const IPSockAddress &peer) argument 46 Message request(socksConnect, peer); 49 me.mPeerAddress = peer; // best guess, Mr. Sulu 50 secdebug("socks", "%d socks4 connected to %s", me.fd(), string(peer).c_str()); 72 void Server::bind(SocksServerSocket &me, const IPAddress &peer, IPPort port) argument 76 Message request(socksBind, IPSockAddress(peer, port));
|
H A D | socks++4.h | 59 virtual void connect(SocksClientSocket &me, const IPSockAddress &peer); 61 virtual void bind(SocksServerSocket &me, const IPAddress &peer, IPPort port);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_utilities/lib/ |
H A D | socks++.cpp | 77 void SocksClientSocket::open(const IPSockAddress &peer) argument 80 Support::connect(*this, peer); 83 TCPClientSocket::open(peer); 102 void SocksClientSocket::setFd(int fd, const IPSockAddress &local, const IPSockAddress &peer) argument 106 mPeerAddress = peer;
|
H A D | socks++4.cpp | 42 void Server::connect(SocksClientSocket &me, const IPSockAddress &peer) argument 46 Message request(socksConnect, peer); 49 me.mPeerAddress = peer; // best guess, Mr. Sulu 50 secdebug("socks", "%d socks4 connected to %s", me.fd(), string(peer).c_str()); 72 void Server::bind(SocksServerSocket &me, const IPAddress &peer, IPPort port) argument 76 Message request(socksBind, IPSockAddress(peer, port));
|
/macosx-10.9.5/Security-55471.14.18/sec/SOSCircle/Regressions/ |
H A D | sc-60-peer.c | 2 // sc-60-peer.c 35 SOSPeerRef peer; local 37 /* Create peer test. */ 38 CFStringRef peer_id = CFSTR("peer 60"); 80 ok(peer = SOSPeerCreateSimple(peer_id, kSOSPeerVersion, &error, sendBlock), 81 "create peer: %@", error); 90 ok(SOSPeerSendMessage(peer, message, &error), 91 "send message to peer: %@", error); 96 /* Check the peer's version. */ 97 is(SOSPeerGetVersion(peer), kSOSPeerVersio [all...] |