/macosx-10.10/PowerManagement-494.1.2/AppleSmartBatteryManager/ |
H A D | AppleSmartBatteryManagerUserClient.h | 80 virtual bool initWithTask(task_t owningTask, void *security_id,
|
H A D | AppleSmartBatteryManagerUserClient.cpp | 48 void *security_id, UInt32 type, OSDictionary * properties) 65 if (!super::initWithTask(owningTask, security_id, type, properties)) { 47 initWithTask(task_t owningTask, void *security_id, UInt32 type, OSDictionary * properties) argument
|
/macosx-10.10/IOHIDFamily-606.1.7/IOHIDSystem/ |
H A D | IOHIDUserClient.h | 109 virtual bool initWithTask(task_t owningTask, void * security_id, UInt32 type ); 142 virtual bool initWithTask(task_t owningTask, void * security_id, UInt32 type );
|
H A D | IOHIKeyboard.cpp | 1139 void * security_id, 1150 this, owningTask, security_id, NULL, handler ); 1159 return super::newUserClient( owningTask, security_id, type, properties, handler ); 1185 void * security_id, 1191 if ( !client->initWithTask( owningTask, security_id, 0, properties ) ) { 1138 newUserClient(task_t owningTask, void * security_id, UInt32 type, OSDictionary * properties, IOUserClient ** handler ) argument 1184 newUserClientGated(task_t owningTask, void * security_id, OSDictionary * properties, IOUserClient ** handler ) argument
|
H A D | IOHIDSecurePromptClient.cpp | 141 void* security_id, 145 require(super::initWithTask(owningTask, security_id, type), init_error); 175 return super::initWithTask(owningTask, security_id, type, properties); 140 initWithTask(task_t owningTask, void* security_id, UInt32 type, OSDictionary * properties) argument
|
/macosx-10.10/xnu-2782.1.97/iokit/Kernel/ |
H A D | RootDomainUserClient.h | 84 virtual bool initWithTask(task_t owningTask, void *security_id,
|
H A D | RootDomainUserClient.cpp | 50 bool RootDomainUserClient::initWithTask(task_t owningTask, void *security_id, argument 56 if (!super::initWithTask(owningTask, security_id, type, properties))
|
/macosx-10.10/ntfs-84/kext/ |
H A D | ntfs_secure.c | 195 * ntfs_next_security_id_init - determine the next security_id to use 196 * @vol: volume for which to determine the next security_id 197 * @next_security_id: destination in which to return the next security_id 199 * Scan the $SII index of the $Secure system file and determine the security_id 202 * Return the next security_id in *@next_security_id. 273 * security_id. 303 * node and if not present, we have the last security_id in @prev_ie, 310 prev_ie->key.sii.security_id) + 1); 317 ntfs_debug("Found next security_id 0x%x in index root.", 411 * security_id 503 le32 security_id; local [all...] |
H A D | ntfs_usnjrnl.h | 203 /*0x30*/le32 security_id; /* File security_id copied from member in struct:__anon11443
|
H A D | ntfs_layout.h | 519 * security_id (le32). 523 * values and second by ascending security_id values. E.g. used for $SDH 936 /* 52*/ le32 security_id; /* Security_id for the file. member in struct:__anon11346::__anon11347::__anon11349 1797 * in FILE_Secure and the correct descriptor is found using the security_id 1811 * (security_id, not to be confused with a SID). The security_id is unique for 1814 * data attribute. The $SII index is sorted by ascending security_id. 1825 * When a precise match is found, the security_id coresponding to the security 1833 * security_id and is added to the $SDS data attribute. Then, entries 1845 le32 security_id; /* Th member in struct:__anon11382 1866 le32 security_id; /* The security_id assigned to the descriptor. */ member in struct:__anon11383 1878 le32 security_id; /* The security_id assigned to the descriptor. */ member in struct:__anon11384 1894 le32 security_id; /* The security_id assigned to the descriptor. */ member in struct:__anon11385 1900 le32 security_id; /* The security_id assigned to the descriptor. */ member in struct:__anon11386 [all...] |
H A D | ntfs_mft.c | 1792 * @security_id: security_id to set in the attribute 1798 * If @security_id is not zero, insert a Win2k+ style standard information 1804 const FILE_ATTR_FLAGS file_attrs, const le32 security_id, 1812 if (!security_id) 1830 if (security_id) 1831 si->security_id = security_id; 1833 security_id ? "Win2k+" : "NT4"); 2582 le32 security_id; local 1803 ntfs_standard_info_attribute_insert(MFT_RECORD *m, ATTR_RECORD *a, const FILE_ATTR_FLAGS file_attrs, const le32 security_id, struct timespec *create_time) argument [all...] |
/macosx-10.10/IOHIDFamily-606.1.7/IOHIDFamily/ |
H A D | IOHIDEventServiceUserClient.h | 104 virtual bool initWithTask(task_t owningTask, void * security_id, UInt32 type);
|
H A D | IOHIDResourceUserClient.h | 181 virtual bool initWithTask(task_t owningTask, void * security_id, UInt32 type);
|
H A D | IOHIDDevice.h | 264 @param security_id A token representing the access level for the task. 271 void * security_id, 276 void * security_id,
|
H A D | IOHIDEventServiceUserClient.cpp | 191 bool IOHIDEventServiceUserClient::initWithTask(task_t owningTask, void * security_id, UInt32 type) argument
|
H A D | IOHIDResourceUserClient.cpp | 74 bool IOHIDResourceDeviceUserClient::initWithTask(task_t owningTask, void * security_id, UInt32 type) argument 82 result = super::initWithTask(owningTask, security_id, type);
|
H A D | IOHIDLibUserClient.h | 190 virtual bool initWithTask(task_t owningTask, void *security_id, UInt32 type);
|
H A D | IOHIDDevice.cpp | 858 void * security_id, 884 this, owningTask, security_id, properties, handler ); 893 return super::newUserClient( owningTask, security_id, type, properties, handler ); 897 void * security_id, 903 if ( !client->initWithTask( owningTask, security_id, kIOHIDLibUserClientConnectManager, properties ) ) { 857 newUserClient( task_t owningTask, void * security_id, UInt32 type, OSDictionary * properties, IOUserClient ** handler ) argument 896 newUserClientGated( task_t owningTask, void * security_id, OSDictionary * properties, IOUserClient ** handler ) argument
|
/macosx-10.10/IOGraphics-485/IOGraphicsFamily/IOKit/i2c/ |
H A D | IOI2CInterface.h | 248 void * security_id,
|
/macosx-10.10/AppleRAID-4.0.6/ |
H A D | AppleRAIDUserClient.cpp | 30 AppleRAIDUserClient::initWithTask(task_t owningTask, void *security_id, UInt32 type) argument 34 if (!super::initWithTask(owningTask, security_id, type)) return false;
|
H A D | AppleRAIDUserClient.h | 68 virtual bool initWithTask(task_t owningTask, void * security_id, UInt32 type);
|
/macosx-10.10/IOHIDFamily-606.1.7/IOHIDSystem/IOKit/hidsystem/ |
H A D | IOHIKeyboard.h | 246 void * security_id, 251 void * security_id,
|
H A D | IOHIDSystem.h | 374 /* withToken */ void * security_id, 768 void * security_id,
|
/macosx-10.10/IOGraphics-485/IOGraphicsFamily/ |
H A D | IOI2CInterface.cpp | 56 void * security_id, 55 newUserClient( task_t owningTask, void * security_id, UInt32 type, IOUserClient ** handler ) argument
|
/macosx-10.10/AppleUSBCDCDriver-4205.2.2/AppleUSBCDCACM/DataDriver/Headers/ |
H A D | AppleUSBCDCACMData.h | 379 bool initWithTask(task_t owningTask, void *security_id , UInt32 type);
|