Searched refs:token (Results 1 - 19 of 19) sorted by relevance

/xnu-2782.1.97/bsd/sys/
H A Dfsctl.h79 user64_addr_t token; member in struct:user64_namespace_handler_info
85 user32_addr_t token; member in struct:user32_namespace_handler_info
93 user_addr_t token; member in struct:namespace_handler_info
101 user64_addr_t token; member in struct:user64_namespace_handler_info_ext
108 user32_addr_t token; member in struct:user32_namespace_handler_info_ext
117 user_addr_t token; member in struct:namespace_handler_info_ext
126 user64_addr_t token; member in struct:user64_namespace_handler_data
138 user32_addr_t token; member in struct:user32_namespace_handler_data
150 user_addr_t token; member in struct:namespace_handler_data
169 int32_t *token; member in struct:namespace_handler_info
175 int32_t *token; member in struct:namespace_handler_info_ext
182 int32_t *token; member in struct:namespace_handler_data
[all...]
H A Dcodesign.h183 int csops_audittoken(pid_t pid, unsigned int ops, void * useraddr, size_t usersize, audit_token_t * token);
/xnu-2782.1.97/osfmk/vm/
H A Dvm_purgeable.c44 struct token { struct
50 struct token *tokens;
55 token_idx_t token_init_idx = 1; /* token 0 is reserved!! */
57 * be added onto token queue */
59 int available_for_purge = 0; /* increase when ripe token
61 * token removed.
97 token_idx_t token = queue->token_q_head; local
115 while (token) {
116 if (tokens[token].count != 0) {
119 assert(token
157 token_idx_t token; local
314 token_idx_t token; local
372 token_idx_t token; local
437 token_idx_t token = vm_purgeable_token_remove_first(queue); local
453 token_idx_t token = vm_purgeable_token_remove_last(queue); local
608 token_idx_t token; local
[all...]
/xnu-2782.1.97/SETUP/config/
H A Dparser.y37 %token BUILDDIR
38 %token COMMA
39 %token EQUALS
40 %token INIT
41 %token MACHINE
42 %token OBJECTDIR
43 %token OPTIONS
44 %token MAKEOPTIONS
45 %token PSEUDO_DEVICE
46 %token SEMICOLO
[all...]
/xnu-2782.1.97/iokit/IOKit/
H A DIOKitKeysPrivate.h66 // clientHasPrivilege security token for kIOClientPrivilegeSecureConsoleProcess
68 void * token; member in struct:_IOUCProcessToken
/xnu-2782.1.97/libkern/c++/
H A DOSUnserialize.y113 %token NUMBER
114 %token STRING
115 %token DATA
116 %token BOOLEAN
117 %token SYNTAX_ERROR
H A DOSUnserializeXML.y137 %token ARRAY
138 %token BOOLEAN
139 %token DATA
140 %token DICTIONARY
141 %token IDREF
142 %token KEY
143 %token NUMBER
144 %token SET
145 %token STRING
146 %token SYNTAX_ERRO
[all...]
H A DOSUnserialize.cpp213 /* Enabling the token table. */
542 /* YYTOKNUM[YYLEX-NUM] -- Internal token number corresponding to
543 token YYLEX-NUM. */
606 positive, shift that token. If negative, reduce the rule which
813 YYFPRINTF (yyoutput, "token %s (", yytname[yytype]);
1018 /* Copy into YYRESULT an error message about the unexpected token
1223 /* Look-ahead token as an internal (translated) token number. */
1270 yychar = YYEMPTY; /* Cause a token to be read. */
1368 look-ahead token i
[all...]
H A DOSUnserializeXML.cpp246 /* Enabling the token table. */
577 /* YYTOKNUM[YYLEX-NUM] -- Internal token number corresponding to
578 token YYLEX-NUM. */
641 positive, shift that token. If negative, reduce the rule which
851 YYFPRINTF (yyoutput, "token %s (", yytname[yytype]);
1056 /* Copy into YYRESULT an error message about the unexpected token
1261 /* Look-ahead token as an internal (translated) token number. */
1308 yychar = YYEMPTY; /* Cause a token to be read. */
1406 look-ahead token i
[all...]
/xnu-2782.1.97/libsyscall/mach/
H A Dmach_msg.c695 uint64_t token; local
741 retval = proc_importance_assertion_begin_with_msg(&bufRequest->Head, NULL, &token);
779 proc_importance_assertion_complete(token);
791 proc_importance_assertion_complete(token);
/xnu-2782.1.97/bsd/netinet/
H A Dflow_divert.c545 FDLOG0(LOG_WARNING, &nil_pcb, "HMAC in token does not match computed HMAC");
1640 FDLOG(LOG_ERR, &nil_pcb, "failed to get the token key: %d", error);
2261 FDLOG(LOG_INFO, fd_cb, "Got %s from token", signing_id);
2762 mbuf_t token = NULL; local
2793 error = soopt_getm(sopt, &token);
2798 error = soopt_mcopyin(sopt, token);
2803 error = flow_divert_packet_get_tlv(token, 0, FLOW_DIVERT_TLV_KEY_UNIT, sizeof(key_unit), (void *)&key_unit, NULL);
2807 FDLOG(LOG_ERR, &nil_pcb, "Failed to get the key unit from the token: %d", error);
2813 error = flow_divert_packet_get_tlv(token, 0, FLOW_DIVERT_TLV_CTL_UNIT, sizeof(ctl_unit), (void *)&ctl_unit, NULL);
2815 FDLOG(LOG_ERR, &nil_pcb, "Failed to get the control socket unit from the token
2877 mbuf_t token = NULL; local
[all...]
H A Dmptcp_subr.c4147 mptcp_generate_token(char *sha_digest, int sha_digest_len, caddr_t token, argument
4154 bcopy(sha_digest, token, sizeof (u_int32_t));
/xnu-2782.1.97/bsd/vfs/
H A Dvfs_syscalls.c8479 uint32_t token; member in struct:nspace_item_info
8642 nspace_items[i].token = 0;
8753 nspace_items[i].token = 0;
8772 error = nspace_items[i].token;
8782 printf("woken up for token %d but it's not done, cancelled or timedout and error == 0.\n",
8783 nspace_items[i].token);
8789 nspace_items[i].token = 0; // clear this so that the handler will not find it anymore
8971 nspace_items[i].token = ++nspace_token_id;
9016 * token, flags, and the FD pointer
9018 error = copyout(&nspace_items[i].token, nh
9366 uint32_t token, val; local
9408 uint32_t token, val; local
9456 uint32_t token, val; local
[all...]
/xnu-2782.1.97/bsd/net/
H A Dpf_ioctl.c383 printf("%s: unable to allocate pf token structure!", __func__);
389 new_token->token.token_value = token_value;
390 new_token->token.pid = proc_pid(p);
391 proc_name(new_token->token.pid, new_token->token.proc_name,
392 sizeof (new_token->token.proc_name));
393 new_token->token.timestamp = pf_calendar_time_second();
409 if (tok->token_value == entry->token.token_value) {
1786 u_int64_t token; local
1789 if ((token
[all...]
H A Dpfvar.h1839 struct pfioc_token token; member in struct:pfioc_kernel_token
/xnu-2782.1.97/bsd/kern/
H A Dkern_proc.c1913 audit_token_t token; local
1946 error = copyin(uaudittoken, &token, sizeof(audit_token_t));
1949 /* verify the audit token pid/idversion matches with proc */
1950 if ((token.val[5] != upid) || (token.val[7] != uidversion)) {
/xnu-2782.1.97/osfmk/kern/
H A Dtask.h837 task_suspension_token_t token);
H A Dtask.c1152 * Drop a reference on a task suspension token.
1156 task_suspension_token_t token)
1158 return(task_deallocate((task_t)token));
1900 * token, we'll track it for him in the kernel in the form of a naked
1967 printf("warning: %s(%d) failed to copyout suspension token for task %s(%d) with error: %d\n",
2004 * We found a suspension token in the caller's IPC space. Release a send right to indicate that
2027 * Making/holding a token/reference/port is the callers responsibility.
2044 * Suspend the target task, and return a suspension token. The token
2062 * as a "suspension token," whic
1155 task_suspension_token_deallocate( task_suspension_token_t token) argument
[all...]
/xnu-2782.1.97/iokit/Kernel/
H A DIOUserClient.cpp983 security_token_t token; local
1031 task = (task_t)((IOUCProcessToken *)securityToken)->token;
1036 kr = task_info( task, TASK_SECURITY_TOKEN, (task_info_t) &token, &count );
1042 if (0 != token.val[0])
1046 user = CopyConsoleUser(token.val[0]);
1053 user = CopyConsoleUser(token.val[0]);

Completed in 122 milliseconds