/macosx-10.9.5/securityd-55199.3/src/ |
H A D | token.cpp | 80 TokenDaemon &Token::tokend() function in class:Token 93 // We don't currently use a database handle to tokend. 98 return noDb; // we don't currently use tokend-side DbHandles 136 if (pinFromAclTag(tag, "?")) { // read from tokend - do not cache 138 token().tokend().getAcl(aclKind(), tokenHandle(), tag, count, racls); 155 // (hardware) reset is reported (as an error) by tokend. TokenAcls have their 157 // with tokend. Thus, incrementing the reset level invalidates all TokenAcls 160 // them to initially load their state from tokend. 199 // characterized, and activated. From tokend's point of view, this is where 203 void Token::insert(::Reader &slot, RefPointer<TokenDaemon> tokend) argument 465 RefPointer<TokenDaemon> tokend = new TokenDaemon(candidate, local [all...] |
H A D | token.h | 34 #include "tokend.h" 56 TokenDaemon &tokend(); 62 void insert(::Reader &slot, RefPointer<TokenDaemon> tokend); 95 TokenDaemon &tokend() const { return *mTokend; } function in class:Token::Access 96 TokenDaemon &operator () () const { return tokend(); } 113 RefPointer<TokenDaemon> mTokend; // the (one) tokend that runs the card 121 TokenDaemon::Score mScore; // score of winning tokend
|
H A D | tokenacl.cpp | 29 #include "tokend.h" 49 // contents are used in any way. Here is where we fetch the ACL data from tokend 57 secdebug("tokenacl", "%p loading ACLs from tokend", this); 61 token().tokend().getOwner(aclKind(), tokenHandle(), owner); 67 token().tokend().getAcl(aclKind(), tokenHandle(), NULL, count, infos); 103 // tokend, and the resulting ACL is being re-read when next needed. 121 // hand the request off to tokend to do as it will 122 token().tokend().changeAcl(aclKind(), tokenHandle(), Required(cred), edit); 129 token().tokend().changeOwner(aclKind(), tokenHandle(), Required(cred), newOwner); 136 // This cooks a suitable changeAcl call to tokend, a [all...] |
H A D | reader.h | 62 void insertToken(TokenDaemon *tokend);
|
H A D | tokenkey.cpp | 43 // Destruction of a TokenKey releases the reference from tokend 48 database().token().tokend().releaseKey(mKey); 71 return mKey; // tokend-side handle 123 // This is not currently supported through tokend. If we need it, 124 // we'll have to force unlock and fake it (in tokend, most likely).
|
H A D | reader.cpp | 107 //@@@ or should we call some verify-still-the-same function of tokend? 121 void Reader::insertToken(TokenDaemon *tokend) argument 124 token->insert(*this, tokend);
|
H A D | tokencache.cpp | 42 #define TOKEND_UID "tokend" 43 #define TOKEND_GID "tokend" 176 case tokend: 226 cache.makedir(workPath(), O_CREAT, 0700, tokend); local 227 cache.makedir(cachePath(), O_CREAT, 0700, tokend); local
|
H A D | tokencache.h | 103 enum Owner { securityd, tokend }; enumerator in enum:TokenCache::Owner
|
H A D | pcscmonitor.cpp | 514 CodeRepository<Bundle> candidates("Security/tokend", ".tokend", "TOKENDAEMONPATH", false); 528 // prepare a virtual reader, removing any existing one (this would kill a previous tokend) 532 // now launch the tokend 533 RefPointer<TokenDaemon> tokend = new TokenDaemon(tokendBundle, local 536 if (tokend->state() == ServerChild::dead) { // ah well, this one's no good 537 secdebug("pcsc", "softtoken %s tokend launch failed", bundleName.c_str()); 542 // probe the (single) tokend 543 if (!tokend->probe()) { // non comprende... 551 reader->insertToken(tokend); [all...] |
H A D | tokendatabase.cpp | 107 // to tokend as an authenticate request. 157 TokenDaemon &TokenDatabase::tokend() function in class:TokenDatabase 159 return common().token().tokend(); 171 //@@@ let tokend decide? Are there any secure transient keystores? 289 // Given a key handle and CssmKey returned from tokend, create a Key representing 302 CssmError::throwMe(CSSM_ERRCODE_INTERNAL_ERROR); // bad key return from tokend 333 // (aka passphrase et al) to tokend for processing. 647 if (hKey) { // tokend returned a key reference & data 684 if (hKey) { // tokend returned a key reference & data 710 if (hKey != noKey && data) { // tokend returne [all...] |
H A D | tokendatabase.h | 93 TokenDaemon &tokend();
|
/macosx-10.9.5/SecurityTokend-55107/mig/ |
H A D | mig.mk | 25 DEFS = $(SRCROOT)/mig/tokend.defs 27 HEADER = $(DERIVED_SRC)/tokend.h
|
H A D | tokend.defs | 25 @header tokend.defs 26 @abstract Mach RPC interface between securityd and tokend. 33 subsystem tokend 2000; 37 import "tokend.h";
|