/xnu-2782.1.97/bsd/sys/ |
H A D | fsctl.h | 79 user64_addr_t token; member in struct:user64_namespace_handler_info 85 user32_addr_t token; member in struct:user32_namespace_handler_info 93 user_addr_t token; member in struct:namespace_handler_info 101 user64_addr_t token; member in struct:user64_namespace_handler_info_ext 108 user32_addr_t token; member in struct:user32_namespace_handler_info_ext 117 user_addr_t token; member in struct:namespace_handler_info_ext 126 user64_addr_t token; member in struct:user64_namespace_handler_data 138 user32_addr_t token; member in struct:user32_namespace_handler_data 150 user_addr_t token; member in struct:namespace_handler_data 169 int32_t *token; member in struct:namespace_handler_info 175 int32_t *token; member in struct:namespace_handler_info_ext 182 int32_t *token; member in struct:namespace_handler_data [all...] |
H A D | codesign.h | 183 int csops_audittoken(pid_t pid, unsigned int ops, void * useraddr, size_t usersize, audit_token_t * token);
|
/xnu-2782.1.97/osfmk/vm/ |
H A D | vm_purgeable.c | 44 struct token { struct 50 struct token *tokens; 55 token_idx_t token_init_idx = 1; /* token 0 is reserved!! */ 57 * be added onto token queue */ 59 int available_for_purge = 0; /* increase when ripe token 61 * token removed. 97 token_idx_t token = queue->token_q_head; local 115 while (token) { 116 if (tokens[token].count != 0) { 119 assert(token 157 token_idx_t token; local 314 token_idx_t token; local 372 token_idx_t token; local 437 token_idx_t token = vm_purgeable_token_remove_first(queue); local 453 token_idx_t token = vm_purgeable_token_remove_last(queue); local 608 token_idx_t token; local [all...] |
/xnu-2782.1.97/SETUP/config/ |
H A D | parser.y | 37 %token BUILDDIR 38 %token COMMA 39 %token EQUALS 40 %token INIT 41 %token MACHINE 42 %token OBJECTDIR 43 %token OPTIONS 44 %token MAKEOPTIONS 45 %token PSEUDO_DEVICE 46 %token SEMICOLO [all...] |
/xnu-2782.1.97/iokit/IOKit/ |
H A D | IOKitKeysPrivate.h | 66 // clientHasPrivilege security token for kIOClientPrivilegeSecureConsoleProcess 68 void * token; member in struct:_IOUCProcessToken
|
/xnu-2782.1.97/libkern/c++/ |
H A D | OSUnserialize.y | 113 %token NUMBER 114 %token STRING 115 %token DATA 116 %token BOOLEAN 117 %token SYNTAX_ERROR
|
H A D | OSUnserializeXML.y | 137 %token ARRAY 138 %token BOOLEAN 139 %token DATA 140 %token DICTIONARY 141 %token IDREF 142 %token KEY 143 %token NUMBER 144 %token SET 145 %token STRING 146 %token SYNTAX_ERRO [all...] |
H A D | OSUnserialize.cpp | 213 /* Enabling the token table. */ 542 /* YYTOKNUM[YYLEX-NUM] -- Internal token number corresponding to 543 token YYLEX-NUM. */ 606 positive, shift that token. If negative, reduce the rule which 813 YYFPRINTF (yyoutput, "token %s (", yytname[yytype]); 1018 /* Copy into YYRESULT an error message about the unexpected token 1223 /* Look-ahead token as an internal (translated) token number. */ 1270 yychar = YYEMPTY; /* Cause a token to be read. */ 1368 look-ahead token i [all...] |
H A D | OSUnserializeXML.cpp | 246 /* Enabling the token table. */ 577 /* YYTOKNUM[YYLEX-NUM] -- Internal token number corresponding to 578 token YYLEX-NUM. */ 641 positive, shift that token. If negative, reduce the rule which 851 YYFPRINTF (yyoutput, "token %s (", yytname[yytype]); 1056 /* Copy into YYRESULT an error message about the unexpected token 1261 /* Look-ahead token as an internal (translated) token number. */ 1308 yychar = YYEMPTY; /* Cause a token to be read. */ 1406 look-ahead token i [all...] |
/xnu-2782.1.97/libsyscall/mach/ |
H A D | mach_msg.c | 695 uint64_t token; local 741 retval = proc_importance_assertion_begin_with_msg(&bufRequest->Head, NULL, &token); 779 proc_importance_assertion_complete(token); 791 proc_importance_assertion_complete(token);
|
/xnu-2782.1.97/bsd/netinet/ |
H A D | flow_divert.c | 545 FDLOG0(LOG_WARNING, &nil_pcb, "HMAC in token does not match computed HMAC"); 1640 FDLOG(LOG_ERR, &nil_pcb, "failed to get the token key: %d", error); 2261 FDLOG(LOG_INFO, fd_cb, "Got %s from token", signing_id); 2762 mbuf_t token = NULL; local 2793 error = soopt_getm(sopt, &token); 2798 error = soopt_mcopyin(sopt, token); 2803 error = flow_divert_packet_get_tlv(token, 0, FLOW_DIVERT_TLV_KEY_UNIT, sizeof(key_unit), (void *)&key_unit, NULL); 2807 FDLOG(LOG_ERR, &nil_pcb, "Failed to get the key unit from the token: %d", error); 2813 error = flow_divert_packet_get_tlv(token, 0, FLOW_DIVERT_TLV_CTL_UNIT, sizeof(ctl_unit), (void *)&ctl_unit, NULL); 2815 FDLOG(LOG_ERR, &nil_pcb, "Failed to get the control socket unit from the token 2877 mbuf_t token = NULL; local [all...] |
H A D | mptcp_subr.c | 4147 mptcp_generate_token(char *sha_digest, int sha_digest_len, caddr_t token, argument 4154 bcopy(sha_digest, token, sizeof (u_int32_t));
|
/xnu-2782.1.97/bsd/vfs/ |
H A D | vfs_syscalls.c | 8479 uint32_t token; member in struct:nspace_item_info 8642 nspace_items[i].token = 0; 8753 nspace_items[i].token = 0; 8772 error = nspace_items[i].token; 8782 printf("woken up for token %d but it's not done, cancelled or timedout and error == 0.\n", 8783 nspace_items[i].token); 8789 nspace_items[i].token = 0; // clear this so that the handler will not find it anymore 8971 nspace_items[i].token = ++nspace_token_id; 9016 * token, flags, and the FD pointer 9018 error = copyout(&nspace_items[i].token, nh 9366 uint32_t token, val; local 9408 uint32_t token, val; local 9456 uint32_t token, val; local [all...] |
/xnu-2782.1.97/bsd/net/ |
H A D | pf_ioctl.c | 383 printf("%s: unable to allocate pf token structure!", __func__); 389 new_token->token.token_value = token_value; 390 new_token->token.pid = proc_pid(p); 391 proc_name(new_token->token.pid, new_token->token.proc_name, 392 sizeof (new_token->token.proc_name)); 393 new_token->token.timestamp = pf_calendar_time_second(); 409 if (tok->token_value == entry->token.token_value) { 1786 u_int64_t token; local 1789 if ((token [all...] |
H A D | pfvar.h | 1839 struct pfioc_token token; member in struct:pfioc_kernel_token
|
/xnu-2782.1.97/bsd/kern/ |
H A D | kern_proc.c | 1913 audit_token_t token; local 1946 error = copyin(uaudittoken, &token, sizeof(audit_token_t)); 1949 /* verify the audit token pid/idversion matches with proc */ 1950 if ((token.val[5] != upid) || (token.val[7] != uidversion)) {
|
/xnu-2782.1.97/osfmk/kern/ |
H A D | task.h | 837 task_suspension_token_t token);
|
H A D | task.c | 1152 * Drop a reference on a task suspension token. 1156 task_suspension_token_t token) 1158 return(task_deallocate((task_t)token)); 1900 * token, we'll track it for him in the kernel in the form of a naked 1967 printf("warning: %s(%d) failed to copyout suspension token for task %s(%d) with error: %d\n", 2004 * We found a suspension token in the caller's IPC space. Release a send right to indicate that 2027 * Making/holding a token/reference/port is the callers responsibility. 2044 * Suspend the target task, and return a suspension token. The token 2062 * as a "suspension token," whic 1155 task_suspension_token_deallocate( task_suspension_token_t token) argument [all...] |
/xnu-2782.1.97/iokit/Kernel/ |
H A D | IOUserClient.cpp | 983 security_token_t token; local 1031 task = (task_t)((IOUCProcessToken *)securityToken)->token; 1036 kr = task_info( task, TASK_SECURITY_TOKEN, (task_info_t) &token, &count ); 1042 if (0 != token.val[0]) 1046 user = CopyConsoleUser(token.val[0]); 1053 user = CopyConsoleUser(token.val[0]);
|