Searched refs:security_id (Results 1 - 25 of 30) sorted by relevance

12

/macosx-10.10/PowerManagement-494.1.2/AppleSmartBatteryManager/
H A DAppleSmartBatteryManagerUserClient.h80 virtual bool initWithTask(task_t owningTask, void *security_id,
H A DAppleSmartBatteryManagerUserClient.cpp48 void *security_id, UInt32 type, OSDictionary * properties)
65 if (!super::initWithTask(owningTask, security_id, type, properties)) {
47 initWithTask(task_t owningTask, void *security_id, UInt32 type, OSDictionary * properties) argument
/macosx-10.10/IOHIDFamily-606.1.7/IOHIDSystem/
H A DIOHIDUserClient.h109 virtual bool initWithTask(task_t owningTask, void * security_id, UInt32 type );
142 virtual bool initWithTask(task_t owningTask, void * security_id, UInt32 type );
H A DIOHIKeyboard.cpp1139 void * security_id,
1150 this, owningTask, security_id, NULL, handler );
1159 return super::newUserClient( owningTask, security_id, type, properties, handler );
1185 void * security_id,
1191 if ( !client->initWithTask( owningTask, security_id, 0, properties ) ) {
1138 newUserClient(task_t owningTask, void * security_id, UInt32 type, OSDictionary * properties, IOUserClient ** handler ) argument
1184 newUserClientGated(task_t owningTask, void * security_id, OSDictionary * properties, IOUserClient ** handler ) argument
H A DIOHIDSecurePromptClient.cpp141 void* security_id,
145 require(super::initWithTask(owningTask, security_id, type), init_error);
175 return super::initWithTask(owningTask, security_id, type, properties);
140 initWithTask(task_t owningTask, void* security_id, UInt32 type, OSDictionary * properties) argument
/macosx-10.10/xnu-2782.1.97/iokit/Kernel/
H A DRootDomainUserClient.h84 virtual bool initWithTask(task_t owningTask, void *security_id,
H A DRootDomainUserClient.cpp50 bool RootDomainUserClient::initWithTask(task_t owningTask, void *security_id, argument
56 if (!super::initWithTask(owningTask, security_id, type, properties))
/macosx-10.10/ntfs-84/kext/
H A Dntfs_secure.c195 * ntfs_next_security_id_init - determine the next security_id to use
196 * @vol: volume for which to determine the next security_id
197 * @next_security_id: destination in which to return the next security_id
199 * Scan the $SII index of the $Secure system file and determine the security_id
202 * Return the next security_id in *@next_security_id.
273 * security_id.
303 * node and if not present, we have the last security_id in @prev_ie,
310 prev_ie->key.sii.security_id) + 1);
317 ntfs_debug("Found next security_id 0x%x in index root.",
411 * security_id
503 le32 security_id; local
[all...]
H A Dntfs_usnjrnl.h203 /*0x30*/le32 security_id; /* File security_id copied from member in struct:__anon11443
H A Dntfs_layout.h519 * security_id (le32).
523 * values and second by ascending security_id values. E.g. used for $SDH
936 /* 52*/ le32 security_id; /* Security_id for the file. member in struct:__anon11346::__anon11347::__anon11349
1797 * in FILE_Secure and the correct descriptor is found using the security_id
1811 * (security_id, not to be confused with a SID). The security_id is unique for
1814 * data attribute. The $SII index is sorted by ascending security_id.
1825 * When a precise match is found, the security_id coresponding to the security
1833 * security_id and is added to the $SDS data attribute. Then, entries
1845 le32 security_id; /* Th member in struct:__anon11382
1866 le32 security_id; /* The security_id assigned to the descriptor. */ member in struct:__anon11383
1878 le32 security_id; /* The security_id assigned to the descriptor. */ member in struct:__anon11384
1894 le32 security_id; /* The security_id assigned to the descriptor. */ member in struct:__anon11385
1900 le32 security_id; /* The security_id assigned to the descriptor. */ member in struct:__anon11386
[all...]
H A Dntfs_mft.c1792 * @security_id: security_id to set in the attribute
1798 * If @security_id is not zero, insert a Win2k+ style standard information
1804 const FILE_ATTR_FLAGS file_attrs, const le32 security_id,
1812 if (!security_id)
1830 if (security_id)
1831 si->security_id = security_id;
1833 security_id ? "Win2k+" : "NT4");
2582 le32 security_id; local
1803 ntfs_standard_info_attribute_insert(MFT_RECORD *m, ATTR_RECORD *a, const FILE_ATTR_FLAGS file_attrs, const le32 security_id, struct timespec *create_time) argument
[all...]
/macosx-10.10/IOHIDFamily-606.1.7/IOHIDFamily/
H A DIOHIDEventServiceUserClient.h104 virtual bool initWithTask(task_t owningTask, void * security_id, UInt32 type);
H A DIOHIDResourceUserClient.h181 virtual bool initWithTask(task_t owningTask, void * security_id, UInt32 type);
H A DIOHIDDevice.h264 @param security_id A token representing the access level for the task.
271 void * security_id,
276 void * security_id,
H A DIOHIDEventServiceUserClient.cpp191 bool IOHIDEventServiceUserClient::initWithTask(task_t owningTask, void * security_id, UInt32 type) argument
H A DIOHIDResourceUserClient.cpp74 bool IOHIDResourceDeviceUserClient::initWithTask(task_t owningTask, void * security_id, UInt32 type) argument
82 result = super::initWithTask(owningTask, security_id, type);
H A DIOHIDLibUserClient.h190 virtual bool initWithTask(task_t owningTask, void *security_id, UInt32 type);
H A DIOHIDDevice.cpp858 void * security_id,
884 this, owningTask, security_id, properties, handler );
893 return super::newUserClient( owningTask, security_id, type, properties, handler );
897 void * security_id,
903 if ( !client->initWithTask( owningTask, security_id, kIOHIDLibUserClientConnectManager, properties ) ) {
857 newUserClient( task_t owningTask, void * security_id, UInt32 type, OSDictionary * properties, IOUserClient ** handler ) argument
896 newUserClientGated( task_t owningTask, void * security_id, OSDictionary * properties, IOUserClient ** handler ) argument
/macosx-10.10/IOGraphics-485/IOGraphicsFamily/IOKit/i2c/
H A DIOI2CInterface.h248 void * security_id,
/macosx-10.10/AppleRAID-4.0.6/
H A DAppleRAIDUserClient.cpp30 AppleRAIDUserClient::initWithTask(task_t owningTask, void *security_id, UInt32 type) argument
34 if (!super::initWithTask(owningTask, security_id, type)) return false;
H A DAppleRAIDUserClient.h68 virtual bool initWithTask(task_t owningTask, void * security_id, UInt32 type);
/macosx-10.10/IOHIDFamily-606.1.7/IOHIDSystem/IOKit/hidsystem/
H A DIOHIKeyboard.h246 void * security_id,
251 void * security_id,
H A DIOHIDSystem.h374 /* withToken */ void * security_id,
768 void * security_id,
/macosx-10.10/IOGraphics-485/IOGraphicsFamily/
H A DIOI2CInterface.cpp56 void * security_id,
55 newUserClient( task_t owningTask, void * security_id, UInt32 type, IOUserClient ** handler ) argument
/macosx-10.10/AppleUSBCDCDriver-4205.2.2/AppleUSBCDCACM/DataDriver/Headers/
H A DAppleUSBCDCACMData.h379 bool initWithTask(task_t owningTask, void *security_id , UInt32 type);

Completed in 229 milliseconds

12