Searched refs:Server (Results 1 - 25 of 330) sorted by last modified time

1234567891011>>

/macosx-10.9.5/configd-596.15/SystemConfiguration.fproj/
H A DSCNetworkReachabilityInternal.h212 #pragma mark [XPC] Reachability Server
227 #pragma mark [XPC] Reachability Server (client->server request)
267 #pragma mark [XPC] Reachability Server (server->client request)
310 #pragma mark [XPC] Reachability Server (client APIs)
/macosx-10.9.5/apache_mod_php-87.4/
H A DMakefile34 --with-config-file-scan-dir=/Library/Server/Web/Config/php \
/macosx-10.9.5/securityd-55199.3/src/
H A Dkcdatabase.cpp149 Server::active().random(newSig.bytes);
257 RefPointer<KeychainDatabase> srcKC = Server::keychain(dbToClone);
499 CssmClient::WrapKey wrap(Server::csp(), CSSM_ALGID_NONE);
539 keybagQuery.inferHints(Server::process());
583 CssmClient::Key key(Server::csp(), masterKey.get());
736 common().setup(mBlob, CssmClient::Key(Server::csp(), systemKeychain.key(), true));
811 query.inferHints(Server::process());
826 keybagQuery.inferHints(Server::process());
861 query.inferHints(Server::process());
924 query.inferHints(Server
[all...]
H A Ddbcrypto.cpp30 #include "server.h" // just for Server::csp()
76 GenerateKey desGenerator(Server::csp(), CSSM_ALGID_3DES_3KEY_EDE, 24 * 8);
81 GenerateKey signGenerator(Server::csp(), CSSM_ALGID_SHA1HMAC,
109 Server::active().random(mSalt);
133 Server::active().random(mSalt);
166 Encrypt cryptor(Server::csp(), CSSM_ALGID_3DES_3KEY_EDE);
173 CssmAutoData cipher1(Server::csp().allocator());
177 CssmAutoData cipher2(Server::csp().allocator());
194 Server::active().random(iv);
204 Encrypt cryptor(Server
[all...]
H A Dtoken.cpp207 Server::active().longTermActivity();
H A Dsession.cpp66 Session::Session(const AuditInfo &audit, Server &server)
69 // link to Server as the global nexus in the object mesh
93 Server &Session::server() const
95 return parent<Server>();
105 return Server::session();
206 keybagQuery.inferHints(Server::process());
216 keybagQuery.inferHints(Server::process());
237 service_context_t context = { sessionId(), originatorUid(), {} }; //*Server::connection().auditToken()
307 RootSession::RootSession(uint64_t attributes, Server &server)
319 : Session(audit, Server
[all...]
H A Dsession.h47 class Server;
69 Session(const CommonCriteria::AuditInfo &audit, Server &server);
72 Server &server() const;
204 RootSession(uint64_t attributes, Server &server);
H A Dtransition.cpp30 // conspiracy that is securityd, anchored in the Server object.
61 #define BEGIN_IPC(name) BEGIN_IPCN RefPointer<Connection> connRef(&Server::connection(replyPort, auditToken)); \
67 #define END_IPC(base) END_IPCN(base) Server::requestComplete(*rcode); return KERN_SUCCESS;
175 { mData = data(); mLength = length(); Server::releaseWhenDone(mData); }
218 return Server::optionalDatabase(noDb);
228 Server::active().setupConnection(Server::connectNewProcess, replyPort,
241 Server::active().setupConnection(Server::connectNewThread, replyPort, taskPort, auditToken);
253 Server
[all...]
H A Dacl_keychain.cpp75 Process &process = Server::process();
91 Server::active().longTermActivity();
177 query.inferHints(Server::process());
183 query.inferHints(Server::process());
224 return Server::session().isRightAuthorized(rightString, Server::connection(), false/*no UI*/);
H A Dagentquery.cpp122 mConnection(&Server::connection()),
123 mAuditToken(Server::connection().auditToken())
126 Server::active().longTermActivity();
143 MachPlusPlus::Bootstrap processBootstrap = Server::process().taskPort().bootstrap();
244 mConnection(&Server::connection()),
245 mAuditToken(Server::connection().auditToken())
248 Server::active().longTermActivity();
620 uid_t targetUid = Server::process().uid();
634 MachPlusPlus::Bootstrap processBootstrap = Server::process().taskPort().bootstrap();
1147 this->inferHints(Server
[all...]
H A Dagentquery.h53 SecurityAgentConnection(const AuthHostType type = securityAgent, Session &session = Server::session());
76 SecurityAgentXPCConnection(const AuthHostType type = securityAgent, Session &session = Server::session());
107 SecurityAgentQuery(const AuthHostType type = securityAgent, Session &session = Server::session());
138 SecurityAgentXPCQuery(const AuthHostType type = securityAgent, Session &session = Server::session());
H A Dtokendatabase.cpp304 //@@@ Server::releaseWhenDone(key);
819 CssmClient::WrapKey wrap(Server::csp(), CSSM_ALGID_NONE);
834 //@@@ Server::csp().freeKey(mKey) ??
835 Server::csp()->allocator().free(mKey.keyData());
/macosx-10.9.5/ruby-104/ruby/lib/xmlrpc/
H A Dserver.rb536 # Implements a standalone XML-RPC server. The method XMLRPC::Server#serve is
541 # s = XMLRPC::Server.new(8080)
561 class Server < WEBrickServlet class
563 # Creates a new XMLRPC::Server instance, which is a XML-RPC server
568 # XMLRPC::Server#serve.
657 # See also, XMLRPC::Server#set_valid_ip
/macosx-10.9.5/apache-786.1/httpd/
H A Dconfigure1668 --disable-include Server Side Includes
H A Dconfigure.orig1668 --disable-include Server Side Includes
H A Dhttpd.spec6 Summary: Apache HTTP Server
/macosx-10.9.5/cups-372.4/cups/cgi-bin/
H A Dadmin.c1556 cups_option_t *settings; /* Server settings */
2593 cups_option_t *settings; /* Server settings */
3035 title = cgiText(_("Set As Server Default"));
/macosx-10.9.5/smb-697.95.1/lib/smb/
H A Dctx.c581 smb_log_info("%s: Client principal name '%s' Server principal name '%s'",
657 /* Server return a negotiate token, get the mech dictionary */
855 /* Server return a negotiate token, get the mech dictionary */
1519 smb_log_info("%s: Server doesn't support Kerberos and its required!", ASL_LEVEL_ERR, __FUNCTION__);
1523 /* Server requires clear text password, but we are not doing clear text passwords. */
1532 smb_log_info("%s: Server doesn't support Kerberos, syserr = %s",
2333 CFStringRef Server = CFStringCreateWithCString(NULL, ctx->serverName, kCFStringEncodingUTF8); local
2334 if (Server != NULL) {
2335 CFDictionarySetValue(mutableDict, kNetFSServerDisplayNameKey, Server);
2336 CFRelease (Server);
[all...]
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSCore/
H A DmDNS.c6304 if (!sps[0]) LogSPS("BeginSleepProcessing: %-6s %#a No Sleep Proxy Server found (Next Browse Q in %d, interval %d)",
6333 LogSPS("BeginSleepProcessing: %-6s Found Sleep Proxy Server %d TTL %d %s", intf->ifname, i, sps[i]->resrec.rroriginalttl, CRDisplayString(m, sps[i]));
6378 LogSPS("BeginSleepProcessing: Not registering with Sleep Proxy Server");
6383 LogSPS("BeginSleepProcessing: Not registering with Sleep Proxy Server on all interfaces");
6406 // If we're going to sleep, need to stop advertising that we're a Sleep Proxy Server
8844 LogInfo("mDNSCoreReceiveResponse: Server %p responded with code %d to DNSSEC Query %##s (%s), clear DO flag",
8851 LogInfo("mDNSCoreReceiveResponse: Server %p responded with code %d to query %##s (%s)",
10805 // Look up a DNS Server, matching by name and InterfaceID
10832 // Look up a DNS Server for a question within its valid DNSServer bits
11361 LogInfo("InitDNSConfig: question %p %##s (%s) Timeout %d, DNS Server
[all...]
H A DuDNS.c108 #pragma mark - Name Server List Management
140 debugf("Note: DNS Server %#a:%d for domain %##s (%p) registered more than once", addr, mDNSVal16(port), d->c, interface);
288 LogInfo("PenalizeDNSServer: Server for %##s (%s) changed to %#a:%d (%##s)",
317 LogInfo("PenalizeDNSServer: Server for %p, %##s (%s) changed to NULL, Interval %d", q, q->qname.c, DNSTypeName(q->qtype), q->ThisQInterval);
1648 debugf("startLLQHandshake: m->AdvertisedV4 %#a%s Server %#a:%d%s %##s (%s)",
3936 LogInfo("DNS Server %#a:%d (%#a:%d) %d passed%s",
4734 LogInfo("uDNS_checkCurrentQuestion: Retrying question %p %##s (%s) DNS Server %#a:%d ThisQInterval %d",
4866 LogInfo("uDNS_checkCurrentQuestion: Tried all DNS servers, retry question %p SuppressUnusable %d %##s (%s) with DNS Server %#a:%d after 60 seconds, ThisQInterval %d",
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/
H A Dserver.rb9 # Gem::Server and allows users to serve gems for consumption by
23 # gem_server = Gem::Server.new Gem.dir, 8089, false
29 class Gem::Server
517 say "Server started at http://#{host}:#{port}"
/macosx-10.9.5/ruby-104/ruby/test/rubygems/
H A Dtest_gem_server.rb5 class Gem::Server
16 @server = Gem::Server.new Gem.dir, process_based_port, false
45 server = Gem::Server.new Gem.dir, 0, false
50 server = Gem::Server.new Gem.dir, 0, false
56 server = Gem::Server.new Gem.dir, 0, false
63 s = Gem::Server.new Gem.dir, process_based_port, false
67 s = Gem::Server.new [Gem.dir, Gem.dir], process_based_port, false
101 server = Gem::Server.new dir, process_based_port, false
151 server = Gem::Server.new dir, process_based_port, false
261 server = Gem::Server
[all...]
/macosx-10.9.5/postfix-252/Postfix.ServerSetup/
H A Dset_credentials.sh6 /usr/sbin/postconf -e imap_submit_cred_file=/Library/Server/Mail/Config/postfix/submit.cred
10 if [ ! -e /Library/Server/Mail/Config/postfix/submit.cred ] ; then
11 hostname=`/usr/sbin/postconf -c /Library/Server/Mail/Config/postfix -h myhostname`
17 if [ -s /Library/Server/Mail/Config/dovecot/submit.passdb ] ; then
20 pw=`grep "^submit:" /Library/Server/Mail/Config/dovecot/submit.passdb | sed -e 's,.*},,' -e 's,:.*,,'`
30 echo "submitcred version 1" > /Library/Server/Mail/Config/postfix/submit.cred
31 echo "$hostname|submit|$pw" >> /Library/Server/Mail/Config/postfix/submit.cred
33 chmod 600 /Library/Server/Mail/Config/postfix/submit.cred
/macosx-10.9.5/cups-372.4/cups/packaging/
H A Dcups.list.in91 %replaces SUNWlps LP Print Service - Server, (Usr)
93 %replaces SUNWpsu LP Print Server, (Usr)
94 %replaces SUNWpsr LP Print Server, (Root)
259 # Server programs
261 # Server files
/macosx-10.9.5/OpenSSH-186/openssh/contrib/caldera/
H A Dopenssh.spec71 Summary(de) : OpenSSH Secure Shell Protocol-Server (sshd).
74 Summary(it) : Server OpenSSH per il protocollo Secure Shell (sshd).
147 Dieses Paket installiert den sshd, den Server-Teil der OpenSSH.

Completed in 366 milliseconds

1234567891011>>