/macosx-10.5.8/xnu-1228.15.4/bsd/kern/ |
H A D | sysv_ipc.c | 80 ipcperm(kauth_cred_t cred, struct ipc_perm *perm, int mode) argument 87 if (kauth_cred_getuid(cred) != perm->cuid && kauth_cred_getuid(cred) != perm->uid) { 94 if ((kauth_cred_ismember_gid(cred, perm->gid, &is_member) || !is_member) && 95 (kauth_cred_ismember_gid(cred, perm->cgid, &is_member) || !is_member)) { 104 return ((mode & perm->mode) == mode ? 0 : EACCES);
|
H A D | kern_bsm_audit.c | 1059 struct ipc_perm perm; local 1060 perm.uid = ar->ar_arg_pipc_perm.pipc_uid; 1061 perm.gid = ar->ar_arg_pipc_perm.pipc_gid; 1062 perm.cuid = ar->ar_arg_pipc_perm.pipc_uid; 1063 perm.cgid = ar->ar_arg_pipc_perm.pipc_gid; 1064 perm.mode = ar->ar_arg_pipc_perm.pipc_mode; 1065 perm._seq = 0; 1066 perm._key = 0; 1067 tok = au_to_ipc_perm(&perm); 1087 struct ipc_perm perm; local [all...] |
H A D | kern_bsm_token.c | 427 token_t *au_to_ipc_perm(struct ipc_perm *perm) argument 433 if(perm == NULL) { 448 ADD_U_INT32(dptr, perm->uid); 449 ADD_U_INT32(dptr, perm->gid); 450 ADD_U_INT32(dptr, perm->cuid); 451 ADD_U_INT32(dptr, perm->cgid); 454 ADD_U_INT16(dptr, perm->mode); 457 ADD_U_INT16(dptr, perm->_seq); 460 ADD_U_INT16(dptr, perm->_key);
|
H A D | kern_audit.c | 2289 audit_arg_svipc_perm(const struct ipc_perm *perm) argument 2297 bcopy(perm, &ar->k_ar.ar_arg_svipc_perm,
|
/macosx-10.5.8/xnu-1228.15.4/bsd/crypto/rc4/ |
H A D | rc4.c | 65 state->perm[i] = (u_char)i; 71 j += state->perm[i] + key[i % keylen]; 72 swap_bytes(&state->perm[i], &state->perm[j]); 93 state->index2 += state->perm[state->index1]; 96 swap_bytes(&state->perm[state->index1], 97 &state->perm[state->index2]); 100 j = state->perm[state->index1] + state->perm[state->index2]; 101 outbuf[i] = inbuf[i] ^ state->perm[ [all...] |
H A D | rc4.h | 44 u_char perm[256]; member in struct:rc4_state
|
/macosx-10.5.8/xnu-1228.15.4/osfmk/kern/ |
H A D | security.c | 137 const char * perm) 143 "mach_task", perm); 154 const char * perm __unused) 167 labelstr_t perm) 185 rc = mac_port_check_service(&subjl, &objl, serv, perm); 198 __unused labelstr_t perm) 211 labelstr_t perm) 256 rc = mac_port_check_service(&subjl, objl, serv, perm); 270 __unused labelstr_t perm) 283 labelstr_t perm) 134 mac_task_check_service( task_t self, task_t obj, const char * perm) argument 162 mac_check_service( __unused ipc_space_t space, labelstr_t subj, labelstr_t obj, labelstr_t serv, labelstr_t perm) argument 193 mac_check_service( __unused ipc_space_t space, __unused labelstr_t subj, __unused labelstr_t obj, __unused labelstr_t serv, __unused labelstr_t perm) argument 206 mac_port_check_service_obj( ipc_space_t space, labelstr_t subj, mach_port_name_t obj, labelstr_t serv, labelstr_t perm) argument 265 mac_port_check_service_obj( __unused ipc_space_t space, __unused labelstr_t subj, __unused mach_port_name_t obj, __unused labelstr_t serv, __unused labelstr_t perm) argument 278 mac_port_check_access( ipc_space_t space, mach_port_name_t sub, mach_port_name_t obj, labelstr_t serv, labelstr_t perm) argument 335 mac_port_check_access( __unused ipc_space_t space, __unused mach_port_name_t sub, __unused mach_port_name_t obj, __unused labelstr_t serv, __unused labelstr_t perm) argument [all...] |
/macosx-10.5.8/xnu-1228.15.4/bsd/sys/ |
H A D | ipc.h | 188 #define IXSEQ_TO_IPCID(ix,perm) (((perm._seq) << 16L) | (ix & 0xffff))
|
/macosx-10.5.8/xnu-1228.15.4/security/ |
H A D | mac_mach_internal.h | 57 int mac_task_check_service(task_t self, task_t obj, const char *perm); 108 const char *serv, const char *perm);
|
H A D | mac_policy.h | 2527 @param perm Permission, or method, within the specified service 2542 const char *perm
|
/macosx-10.5.8/xnu-1228.15.4/bsd/isofs/cd9660/ |
H A D | cd9660_node.c | 354 if (!(ap->perm[0]&0x40)) 356 if (!(ap->perm[0]&0x10)) 358 if (!(ap->perm[0]&4)) 360 if (!(ap->perm[0]&1)) 362 if (!(ap->perm[1]&0x40)) 364 if (!(ap->perm[1]&0x10))
|
H A D | iso.h | 232 u_char perm [ISODCL (9, 10)]; /* 9.5.3 */ member in struct:iso_extended_attributes
|
/macosx-10.5.8/xnu-1228.15.4/bsd/bsm/ |
H A D | audit_kernel.h | 372 void audit_arg_svipc_perm(const struct ipc_perm *perm);
|
H A D | audit_record.h | 263 token_t *au_to_ipc_perm(struct ipc_perm *perm);
|
/macosx-10.5.8/xnu-1228.15.4/osfmk/ppc/ |
H A D | mappings.c | 292 * perm Mapping is permanent 1245 * void mapping_free_init(mb, perm) - Adds a block of storage to the free mapping list 1268 * If perm is negative, the mapping is initialized, but immediately queued to the mapCtl.mapcrel 1278 void mapping_free_init(vm_offset_t mbl, int perm, boolean_t locked) { argument 1280 perm indicates if the block can be released 1291 if(perm >= 0) { /* See if we need to initialize the block */ 1292 if(perm) { 1294 mb->mapblokflags = mbPerm; /* Set perm */ 1304 mb->mapblokflags = 0; /* Set not perm */ 1321 if(perm < [all...] |
H A D | mappings.h | 379 extern void mapping_free_init(vm_offset_t mbl, int perm, boolean_t locked); /* Sets start and end of a block of mappings */
|