Searched refs:peer (Results 51 - 75 of 228) sorted by relevance

12345678910

/macosx-10.9.5/Security-55471.14.18/sec/SOSCircle/SecureObjectSync/
H A DSOSPeerInfo.h41 bool SOSPeerInfoUpdateDigestWithPublicKeyBytes(SOSPeerInfoRef peer, const struct ccdigest_info *di,
43 bool SOSPeerInfoUpdateDigestWithDescription(SOSPeerInfoRef peer, const struct ccdigest_info *di,
60 size_t SOSPeerInfoGetDEREncodedSize(SOSPeerInfoRef peer, CFErrorRef *error);
61 uint8_t* SOSPeerInfoEncodeToDER(SOSPeerInfoRef peer, CFErrorRef* error,
64 CFDataRef SOSPeerInfoCopyEncodedData(SOSPeerInfoRef peer, CFAllocatorRef allocator, CFErrorRef *error);
67 // Gestalt info about the peer. It was fetched by the implementation on the other side.
76 CFStringRef SOSPeerInfoGetPeerName(SOSPeerInfoRef peer);
77 CFStringRef SOSPeerInfoGetPeerDeviceType(SOSPeerInfoRef peer);
80 // Stringified ID for this peer, not human readable.
81 CFStringRef SOSPeerInfoGetPeerID(SOSPeerInfoRef peer);
[all...]
H A DSOSCircle.c154 CFArrayForEach(array, ^(const void *peer) {
155 if (!SOSPeerInfoUpdateDigestWithPublicKeyBytes((SOSPeerInfoRef)peer, di, a_digest, error))
255 bool SOSCircleVerifyPeerSigned(SOSCircleRef circle, SOSPeerInfoRef peer, CFErrorRef *error) { argument
256 SecKeyRef pub_key = SOSPeerInfoCopyPubKey(peer);
285 SOSPeerInfoRef peer = (SOSPeerInfoRef) element;
287 return CFEqual(peer_id, SOSPeerInfoGetPeerID(peer));
336 static inline SOSConcordanceStatus CheckPeerStatus(SOSCircleRef circle, SOSPeerInfoRef peer, CFErrorRef *error) {
338 SecKeyRef pubKey = SOSPeerInfoCopyPubKey(peer);
340 require_action_quiet(SOSCircleHasActivePeer(circle, peer, error), exit, result = kSOSConcordanceNoPeer);
382 SOSCircleForEachActiveValidPeer(signers_circle, user_pubKey, ^(SOSPeerInfoRef peer) {
[all...]
/macosx-10.9.5/ntp-88/ntpd/
H A Drefclock_palisade.h182 static int palisade_start (int, struct peer *);
183 static void palisade_shutdown (int, struct peer *);
184 static void palisade_receive (struct peer *);
185 static void palisade_poll (int, struct peer *);
187 int palisade_configure (int, struct peer *);
188 int TSIP_decode (struct peer *);
H A Drefclock_gpsvme.c81 static int psc_start(int, struct peer *);
82 static void psc_shutdown(int, struct peer *);
83 static void psc_poll(int, struct peer *);
95 struct peer *peer
126 /* initialize peer variables */
127 pp = peer->procptr;
129 pp->io.srcclock = (caddr_t) peer;
135 peer->precision = PRECISION;
149 struct peer *pee
[all...]
H A Drefclock_bancomm.c166 static int vme_start (int, struct peer *);
167 static void vme_shutdown (int, struct peer *);
169 static void vme_poll (int unit, struct peer *);
219 struct peer *peer
227 tfp_type = (int)(peer->ttl);
243 printf("Opening DATUM DEVICE %s\n",DEVICE_NAME(peer->refclkunit));
245 if ( (fd_vme = open(DEVICE_NAME(peer->refclkunit), O_RDWR)) < 0) {
276 pp = peer->procptr;
281 pp->io.srcclock = (caddr_t)peer;
[all...]
H A Drefclock_arc.c206 This avoids ntpd syncing to another peer first and then
530 static void dummy_event_handler (struct peer *);
531 static void arc_event_handler (struct peer *);
542 static int arc_start (int, struct peer *);
543 static void arc_shutdown (int, struct peer *);
545 static void arc_poll (int, struct peer *);
563 peer->nextaction = current_time + QUEUETICK; \
569 struct peer *peer
590 struct peer *pee
861 struct peer *peer; local
[all...]
H A Drefclock_wwv.c582 static int wwv_start (int, struct peer *);
583 static void wwv_shutdown (int, struct peer *);
585 static void wwv_poll (int, struct peer *);
590 static void wwv_epoch (struct peer *);
591 static void wwv_rf (struct peer *, double);
592 static void wwv_endpoc (struct peer *, int);
593 static void wwv_rsec (struct peer *, double);
594 static void wwv_qrz (struct peer *, struct sync *, int);
595 static void wwv_corr4 (struct peer *, struct decvec *,
597 static void wwv_gain (struct peer *);
794 struct peer *peer; local
926 wwv_rf( struct peer *peer, double isig ) argument
1299 wwv_qrz( struct peer *peer, struct sync *sp, int pdelay ) argument
1387 wwv_endpoc( struct peer *peer, int epopos ) argument
1750 wwv_rsec( struct peer *peer, double bit ) argument
2119 wwv_corr4( struct peer *peer, struct decvec *vp, double data[], double tab[][4] ) argument
2566 wwv_qsy( struct peer *peer, int chan ) argument
[all...]
H A Drefclock_leitch.c76 struct peer *peer; member in struct:leitchunit
101 static int leitch_start (int, struct peer *);
102 static void leitch_shutdown (int, struct peer *);
103 static void leitch_poll (int, struct peer *);
104 static void leitch_control (int, struct refclockstat *, struct refclockstat *, struct peer *);
109 static void leitch_timeout (struct peer *);
150 struct peer *peer
165 struct peer *pee
213 struct peer *peer; local
[all...]
H A Dntp_control.c64 static void ctl_putpeer (int, struct peer *);
112 { CS_PEERID, RO, "peer" }, /* 9 */
372 * the reference clock driver doesn't set peer->sstclktype to something
825 * ctlpeerstatus - return a status word for this peer
829 register struct peer *peer
834 status = peer->status;
835 if (!(peer->flags & FLAG_PREEMPT))
837 if (peer->keyid != 0)
839 if (peer
2136 struct peer *peer; local
2168 register struct peer *peer; local
2298 register struct peer *peer; local
2911 report_event( int err, struct peer *peer, const char *str ) argument
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/xpc-tsa/
H A Dmain-tsa.m29 xpc_connection_t peer;
41 void handle_connection_event(const xpc_connection_t peer);
192 xpc_connection_t peer = xpc_dictionary_get_remote_connection(event);
197 xpc_connection_send_message(peer, reply);
215 xpc_connection_t peer = xpc_dictionary_get_remote_connection(event);
233 xpc_release(info->peer);
235 if (peer == NULL && XPC_ERROR_CONNECTION_INVALID == event && 0 != info->processed) {
240 xpctsaDebug("listener event error (connection %p): %s", peer, xpc_dictionary_get_string(event, XPC_ERROR_KEY_DESCRIPTION));
256 xpctsaDebug("Unknown op=%s request from pid %d", operation, xpc_connection_get_pid(peer));
267 void handle_connection_event(const xpc_connection_t peer)
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/sslViewer/
H A DioSock.h44 * info about a peer returned from MakeServerConnection() and
65 PeerSpec *peer); // RETURNED
83 PeerSpec *peer); // RETURNED
/macosx-10.9.5/ntp-88/include/
H A Dntpd.h.orig23 extern u_short ctlpeerstatus (struct peer *);
30 extern void report_event (int, struct peer *, const char *);
114 extern int local_clock(struct peer *, double);
130 extern struct peer *findexistingpeer (sockaddr_u *, struct peer *, int);
131 extern struct peer *findpeer (sockaddr_u *, struct interface *, int, int *);
132 extern struct peer *findpeerbyassoc (u_int);
133 extern void set_peerdstadr (struct peer *peer, struct interface *interface);
134 extern struct peer *newpee
[all...]
H A Dntp_refclock.h234 int (*clock_start) (int, struct peer *);
235 void (*clock_shutdown) (int, struct peer *);
236 void (*clock_poll) (int, struct peer *);
238 struct refclockstat *, struct peer *);
240 void (*clock_buginfo) (int, struct refclockbug *, struct peer *);
241 void (*clock_timer) (int, struct peer *);
263 extern void refclock_timer (struct peer *);
264 extern void refclock_transmit (struct peer *);
269 extern void refclock_report (struct peer *, int);
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/xpc/
H A Dmain.c40 xpc_connection_t peer; member in struct:connection_info
64 xpc_object_t create_keychain_search_list_for(xpc_connection_t peer, SecPreferencesDomain domain) argument
67 pid_t peer_pid = xpc_connection_get_pid(peer);
102 void _set_keychain_search_lists_for_domain(xpc_connection_t peer, xpc_object_t all_domains, char *domain_name, SecPreferencesDomain domain_enum) argument
104 xpc_object_t keychains_for_domain = create_keychain_search_list_for(peer, domain_enum);
109 syslog(LOG_ERR, "Can't discover keychain paths for domain %s on behalf of %d", domain_name, xpc_connection_get_pid(peer));
113 #define SET_KEYCHAIN_SEARCH_LISTS_FOR_DOMAIN(peer, all_domains, domain) _set_keychain_search_lists_for_domain(peer, all_domains, #domain, domain);
116 xpc_object_t create_keychain_search_lists(xpc_connection_t peer) argument
120 SET_KEYCHAIN_SEARCH_LISTS_FOR_DOMAIN(peer, all_domain
130 create_keychain_and_lock_paths(xpc_connection_t peer, xpc_object_t keychain_path_dict) argument
267 xpc_connection_t peer = xpc_dictionary_get_connection(event); local
342 handle_connection_event(const xpc_connection_t peer) argument
[all...]
/macosx-10.9.5/WebCore-7537.78.1/Modules/websockets/
H A DWorkerThreadableWebSocketChannel.cpp364 static PassOwnPtr<ScriptExecutionContext::Task> create(WorkerThreadableWebSocketChannel::Peer* peer, argument
368 return adoptPtr(new WorkerContextDidInitializeTask(peer, loaderProxy, workerClientWrapper));
376 // If Bridge::initialize() quitted earlier, we need to kick mainThreadDestroy() to delete the peer.
377 OwnPtr<WorkerThreadableWebSocketChannel::Peer> peer = adoptPtr(m_peer); variable
379 m_loaderProxy->postTaskToLoader(createCallbackTask(&WorkerThreadableWebSocketChannel::mainThreadDestroy, peer.release()));
386 WorkerContextDidInitializeTask(WorkerThreadableWebSocketChannel::Peer* peer, argument
389 : m_peer(peer)
407 Peer* peer = Peer::create(clientWrapper, *loaderProxy, context, taskMode); local
409 WorkerThreadableWebSocketChannel::WorkerContextDidInitializeTask::create(peer, loaderProxy, clientWrapper), taskMode);
412 delete peer;
431 mainThreadConnect(ScriptExecutionContext* context, Peer* peer, const KURL& url, const String& protocol) argument
448 mainThreadSend(ScriptExecutionContext* context, Peer* peer, const String& message) argument
457 mainThreadSendArrayBuffer(ScriptExecutionContext* context, Peer* peer, PassOwnPtr<Vector<char> > data) argument
467 mainThreadSendBlob(ScriptExecutionContext* context, Peer* peer, const KURL& url, const String& type, long long size) argument
523 mainThreadBufferedAmount(ScriptExecutionContext* context, Peer* peer) argument
546 mainThreadClose(ScriptExecutionContext* context, Peer* peer, int code, const String& reason) argument
562 mainThreadFail(ScriptExecutionContext* context, Peer* peer, const String& reason) argument
578 mainThreadDestroy(ScriptExecutionContext* context, PassOwnPtr<Peer> peer) argument
592 OwnPtr<Peer> peer = adoptPtr(m_peer); local
599 mainThreadSuspend(ScriptExecutionContext* context, Peer* peer) argument
615 mainThreadResume(ScriptExecutionContext* context, Peer* peer) argument
[all...]
/macosx-10.9.5/apache-786.1/httpd/modules/ssl/
H A Dmod_ssl.h41 * peer is non-zero; the server certificate is used otherwise. The
46 (apr_pool_t *p, conn_rec *c, int peer,
/macosx-10.9.5/mDNSResponder-522.92.1/Clients/SimpleChat.NET/
H A DSimpleChat.cs113 PeerData peer = new PeerData();
115 peer.InterfaceIndex = ifIndex;
116 peer.Name = serviceName;
117 peer.Type = regType;
118 peer.Domain = domain;
119 peer.Address = null;
121 comboBox1.Items.Add(peer);
146 PeerData peer = new PeerData();
148 peer.InterfaceIndex = ifIndex;
149 peer
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_codesigning/CodeSigningHelper/
H A Dmain.c88 fetchData(xpc_connection_t peer, xpc_object_t event) argument
152 xpc_connection_send_message(peer, reply);
157 static void CodeSigningHelper_peer_event_handler(xpc_connection_t peer, xpc_object_t event) argument
167 xpc_connection_cancel(peer);
169 fetchData(peer, event);
171 syslog(LOG_ERR, "peer sent invalid command %s", cmd);
172 xpc_connection_cancel(peer);
176 static void CodeSigningHelper_event_handler(xpc_connection_t peer) argument
178 xpc_connection_set_event_handler(peer, ^(xpc_object_t event) {
179 CodeSigningHelper_peer_event_handler(peer, even
[all...]
/macosx-10.9.5/Heimdal-323.92.1/lib/hx509/
H A Dtest_crypto.in105 --peer-cmstype=1.2.840.113549.1.1.4 \
113 --peer-cmstype=1.2.840.113549.1.1.5 \
114 --peer-cmstype=1.2.840.113549.1.1.4 \
122 --peer-cmstype=1.2.840.113549.1.1.11 \
123 --peer-cmstype=1.2.840.113549.1.1.5 \
131 --peer-cmstype=1.2.840.113549.2.5 \
132 --peer-cmstype=1.2.840.113549.1.1.5 \
140 --peer-cmstype=2.16.840.1.101.3.4.1.42 \
141 --peer-cmstype=1.2.840.113549.3.7 \
142 --peer
[all...]
/macosx-10.9.5/Security-55471.14.18/include/security_utilities/
H A Dsocks++.cpp77 void SocksClientSocket::open(const IPSockAddress &peer) argument
80 Support::connect(*this, peer);
83 TCPClientSocket::open(peer);
102 void SocksClientSocket::setFd(int fd, const IPSockAddress &local, const IPSockAddress &peer) argument
106 mPeerAddress = peer;
H A Dsocks++4.cpp42 void Server::connect(SocksClientSocket &me, const IPSockAddress &peer) argument
46 Message request(socksConnect, peer);
49 me.mPeerAddress = peer; // best guess, Mr. Sulu
50 secdebug("socks", "%d socks4 connected to %s", me.fd(), string(peer).c_str());
72 void Server::bind(SocksServerSocket &me, const IPAddress &peer, IPPort port) argument
76 Message request(socksBind, IPSockAddress(peer, port));
H A Dsocks++4.h59 virtual void connect(SocksClientSocket &me, const IPSockAddress &peer);
61 virtual void bind(SocksServerSocket &me, const IPAddress &peer, IPPort port);
/macosx-10.9.5/Security-55471.14.18/libsecurity_utilities/lib/
H A Dsocks++.cpp77 void SocksClientSocket::open(const IPSockAddress &peer) argument
80 Support::connect(*this, peer);
83 TCPClientSocket::open(peer);
102 void SocksClientSocket::setFd(int fd, const IPSockAddress &local, const IPSockAddress &peer) argument
106 mPeerAddress = peer;
H A Dsocks++4.cpp42 void Server::connect(SocksClientSocket &me, const IPSockAddress &peer) argument
46 Message request(socksConnect, peer);
49 me.mPeerAddress = peer; // best guess, Mr. Sulu
50 secdebug("socks", "%d socks4 connected to %s", me.fd(), string(peer).c_str());
72 void Server::bind(SocksServerSocket &me, const IPAddress &peer, IPPort port) argument
76 Message request(socksBind, IPSockAddress(peer, port));
/macosx-10.9.5/Security-55471.14.18/sec/SOSCircle/Regressions/
H A Dsc-60-peer.c2 // sc-60-peer.c
35 SOSPeerRef peer; local
37 /* Create peer test. */
38 CFStringRef peer_id = CFSTR("peer 60");
80 ok(peer = SOSPeerCreateSimple(peer_id, kSOSPeerVersion, &error, sendBlock),
81 "create peer: %@", error);
90 ok(SOSPeerSendMessage(peer, message, &error),
91 "send message to peer: %@", error);
96 /* Check the peer's version. */
97 is(SOSPeerGetVersion(peer), kSOSPeerVersio
[all...]

Completed in 280 milliseconds

12345678910