Searched refs:tokend (Results 1 - 13 of 13) sorted by relevance

/macosx-10.9.5/securityd-55199.3/src/
H A Dtoken.cpp80 TokenDaemon &Token::tokend() function in class:Token
93 // We don't currently use a database handle to tokend.
98 return noDb; // we don't currently use tokend-side DbHandles
136 if (pinFromAclTag(tag, "?")) { // read from tokend - do not cache
138 token().tokend().getAcl(aclKind(), tokenHandle(), tag, count, racls);
155 // (hardware) reset is reported (as an error) by tokend. TokenAcls have their
157 // with tokend. Thus, incrementing the reset level invalidates all TokenAcls
160 // them to initially load their state from tokend.
199 // characterized, and activated. From tokend's point of view, this is where
203 void Token::insert(::Reader &slot, RefPointer<TokenDaemon> tokend) argument
465 RefPointer<TokenDaemon> tokend = new TokenDaemon(candidate, local
[all...]
H A Dtoken.h34 #include "tokend.h"
56 TokenDaemon &tokend();
62 void insert(::Reader &slot, RefPointer<TokenDaemon> tokend);
95 TokenDaemon &tokend() const { return *mTokend; } function in class:Token::Access
96 TokenDaemon &operator () () const { return tokend(); }
113 RefPointer<TokenDaemon> mTokend; // the (one) tokend that runs the card
121 TokenDaemon::Score mScore; // score of winning tokend
H A Dtokenacl.cpp29 #include "tokend.h"
49 // contents are used in any way. Here is where we fetch the ACL data from tokend
57 secdebug("tokenacl", "%p loading ACLs from tokend", this);
61 token().tokend().getOwner(aclKind(), tokenHandle(), owner);
67 token().tokend().getAcl(aclKind(), tokenHandle(), NULL, count, infos);
103 // tokend, and the resulting ACL is being re-read when next needed.
121 // hand the request off to tokend to do as it will
122 token().tokend().changeAcl(aclKind(), tokenHandle(), Required(cred), edit);
129 token().tokend().changeOwner(aclKind(), tokenHandle(), Required(cred), newOwner);
136 // This cooks a suitable changeAcl call to tokend, a
[all...]
H A Dreader.h62 void insertToken(TokenDaemon *tokend);
H A Dtokenkey.cpp43 // Destruction of a TokenKey releases the reference from tokend
48 database().token().tokend().releaseKey(mKey);
71 return mKey; // tokend-side handle
123 // This is not currently supported through tokend. If we need it,
124 // we'll have to force unlock and fake it (in tokend, most likely).
H A Dreader.cpp107 //@@@ or should we call some verify-still-the-same function of tokend?
121 void Reader::insertToken(TokenDaemon *tokend) argument
124 token->insert(*this, tokend);
H A Dtokencache.cpp42 #define TOKEND_UID "tokend"
43 #define TOKEND_GID "tokend"
176 case tokend:
226 cache.makedir(workPath(), O_CREAT, 0700, tokend); local
227 cache.makedir(cachePath(), O_CREAT, 0700, tokend); local
H A Dtokencache.h103 enum Owner { securityd, tokend }; enumerator in enum:TokenCache::Owner
H A Dpcscmonitor.cpp514 CodeRepository<Bundle> candidates("Security/tokend", ".tokend", "TOKENDAEMONPATH", false);
528 // prepare a virtual reader, removing any existing one (this would kill a previous tokend)
532 // now launch the tokend
533 RefPointer<TokenDaemon> tokend = new TokenDaemon(tokendBundle, local
536 if (tokend->state() == ServerChild::dead) { // ah well, this one's no good
537 secdebug("pcsc", "softtoken %s tokend launch failed", bundleName.c_str());
542 // probe the (single) tokend
543 if (!tokend->probe()) { // non comprende...
551 reader->insertToken(tokend);
[all...]
H A Dtokendatabase.cpp107 // to tokend as an authenticate request.
157 TokenDaemon &TokenDatabase::tokend() function in class:TokenDatabase
159 return common().token().tokend();
171 //@@@ let tokend decide? Are there any secure transient keystores?
289 // Given a key handle and CssmKey returned from tokend, create a Key representing
302 CssmError::throwMe(CSSM_ERRCODE_INTERNAL_ERROR); // bad key return from tokend
333 // (aka passphrase et al) to tokend for processing.
647 if (hKey) { // tokend returned a key reference & data
684 if (hKey) { // tokend returned a key reference & data
710 if (hKey != noKey && data) { // tokend returne
[all...]
H A Dtokendatabase.h93 TokenDaemon &tokend();
/macosx-10.9.5/SecurityTokend-55107/mig/
H A Dmig.mk25 DEFS = $(SRCROOT)/mig/tokend.defs
27 HEADER = $(DERIVED_SRC)/tokend.h
H A Dtokend.defs25 @header tokend.defs
26 @abstract Mach RPC interface between securityd and tokend.
33 subsystem tokend 2000;
37 import "tokend.h";

Completed in 96 milliseconds