/macosx-10.9.5/configd-596.15/SystemConfiguration.fproj/ |
H A D | SCNetworkReachabilityInternal.h | 212 #pragma mark [XPC] Reachability Server 227 #pragma mark [XPC] Reachability Server (client->server request) 267 #pragma mark [XPC] Reachability Server (server->client request) 310 #pragma mark [XPC] Reachability Server (client APIs)
|
/macosx-10.9.5/apache_mod_php-87.4/ |
H A D | Makefile | 34 --with-config-file-scan-dir=/Library/Server/Web/Config/php \
|
/macosx-10.9.5/securityd-55199.3/src/ |
H A D | kcdatabase.cpp | 149 Server::active().random(newSig.bytes); 257 RefPointer<KeychainDatabase> srcKC = Server::keychain(dbToClone); 499 CssmClient::WrapKey wrap(Server::csp(), CSSM_ALGID_NONE); 539 keybagQuery.inferHints(Server::process()); 583 CssmClient::Key key(Server::csp(), masterKey.get()); 736 common().setup(mBlob, CssmClient::Key(Server::csp(), systemKeychain.key(), true)); 811 query.inferHints(Server::process()); 826 keybagQuery.inferHints(Server::process()); 861 query.inferHints(Server::process()); 924 query.inferHints(Server [all...] |
H A D | dbcrypto.cpp | 30 #include "server.h" // just for Server::csp() 76 GenerateKey desGenerator(Server::csp(), CSSM_ALGID_3DES_3KEY_EDE, 24 * 8); 81 GenerateKey signGenerator(Server::csp(), CSSM_ALGID_SHA1HMAC, 109 Server::active().random(mSalt); 133 Server::active().random(mSalt); 166 Encrypt cryptor(Server::csp(), CSSM_ALGID_3DES_3KEY_EDE); 173 CssmAutoData cipher1(Server::csp().allocator()); 177 CssmAutoData cipher2(Server::csp().allocator()); 194 Server::active().random(iv); 204 Encrypt cryptor(Server [all...] |
H A D | token.cpp | 207 Server::active().longTermActivity();
|
H A D | session.cpp | 66 Session::Session(const AuditInfo &audit, Server &server) 69 // link to Server as the global nexus in the object mesh 93 Server &Session::server() const 95 return parent<Server>(); 105 return Server::session(); 206 keybagQuery.inferHints(Server::process()); 216 keybagQuery.inferHints(Server::process()); 237 service_context_t context = { sessionId(), originatorUid(), {} }; //*Server::connection().auditToken() 307 RootSession::RootSession(uint64_t attributes, Server &server) 319 : Session(audit, Server [all...] |
H A D | session.h | 47 class Server; 69 Session(const CommonCriteria::AuditInfo &audit, Server &server); 72 Server &server() const; 204 RootSession(uint64_t attributes, Server &server);
|
H A D | transition.cpp | 30 // conspiracy that is securityd, anchored in the Server object. 61 #define BEGIN_IPC(name) BEGIN_IPCN RefPointer<Connection> connRef(&Server::connection(replyPort, auditToken)); \ 67 #define END_IPC(base) END_IPCN(base) Server::requestComplete(*rcode); return KERN_SUCCESS; 175 { mData = data(); mLength = length(); Server::releaseWhenDone(mData); } 218 return Server::optionalDatabase(noDb); 228 Server::active().setupConnection(Server::connectNewProcess, replyPort, 241 Server::active().setupConnection(Server::connectNewThread, replyPort, taskPort, auditToken); 253 Server [all...] |
H A D | acl_keychain.cpp | 75 Process &process = Server::process(); 91 Server::active().longTermActivity(); 177 query.inferHints(Server::process()); 183 query.inferHints(Server::process()); 224 return Server::session().isRightAuthorized(rightString, Server::connection(), false/*no UI*/);
|
H A D | agentquery.cpp | 122 mConnection(&Server::connection()), 123 mAuditToken(Server::connection().auditToken()) 126 Server::active().longTermActivity(); 143 MachPlusPlus::Bootstrap processBootstrap = Server::process().taskPort().bootstrap(); 244 mConnection(&Server::connection()), 245 mAuditToken(Server::connection().auditToken()) 248 Server::active().longTermActivity(); 620 uid_t targetUid = Server::process().uid(); 634 MachPlusPlus::Bootstrap processBootstrap = Server::process().taskPort().bootstrap(); 1147 this->inferHints(Server [all...] |
H A D | agentquery.h | 53 SecurityAgentConnection(const AuthHostType type = securityAgent, Session &session = Server::session()); 76 SecurityAgentXPCConnection(const AuthHostType type = securityAgent, Session &session = Server::session()); 107 SecurityAgentQuery(const AuthHostType type = securityAgent, Session &session = Server::session()); 138 SecurityAgentXPCQuery(const AuthHostType type = securityAgent, Session &session = Server::session());
|
H A D | tokendatabase.cpp | 304 //@@@ Server::releaseWhenDone(key); 819 CssmClient::WrapKey wrap(Server::csp(), CSSM_ALGID_NONE); 834 //@@@ Server::csp().freeKey(mKey) ?? 835 Server::csp()->allocator().free(mKey.keyData());
|
/macosx-10.9.5/ruby-104/ruby/lib/xmlrpc/ |
H A D | server.rb | 536 # Implements a standalone XML-RPC server. The method XMLRPC::Server#serve is 541 # s = XMLRPC::Server.new(8080) 561 class Server < WEBrickServlet class 563 # Creates a new XMLRPC::Server instance, which is a XML-RPC server 568 # XMLRPC::Server#serve. 657 # See also, XMLRPC::Server#set_valid_ip
|
/macosx-10.9.5/apache-786.1/httpd/ |
H A D | configure | 1668 --disable-include Server Side Includes
|
H A D | configure.orig | 1668 --disable-include Server Side Includes
|
H A D | httpd.spec | 6 Summary: Apache HTTP Server
|
/macosx-10.9.5/cups-372.4/cups/cgi-bin/ |
H A D | admin.c | 1556 cups_option_t *settings; /* Server settings */ 2593 cups_option_t *settings; /* Server settings */ 3035 title = cgiText(_("Set As Server Default"));
|
/macosx-10.9.5/smb-697.95.1/lib/smb/ |
H A D | ctx.c | 581 smb_log_info("%s: Client principal name '%s' Server principal name '%s'", 657 /* Server return a negotiate token, get the mech dictionary */ 855 /* Server return a negotiate token, get the mech dictionary */ 1519 smb_log_info("%s: Server doesn't support Kerberos and its required!", ASL_LEVEL_ERR, __FUNCTION__); 1523 /* Server requires clear text password, but we are not doing clear text passwords. */ 1532 smb_log_info("%s: Server doesn't support Kerberos, syserr = %s", 2333 CFStringRef Server = CFStringCreateWithCString(NULL, ctx->serverName, kCFStringEncodingUTF8); local 2334 if (Server != NULL) { 2335 CFDictionarySetValue(mutableDict, kNetFSServerDisplayNameKey, Server); 2336 CFRelease (Server); [all...] |
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSCore/ |
H A D | mDNS.c | 6304 if (!sps[0]) LogSPS("BeginSleepProcessing: %-6s %#a No Sleep Proxy Server found (Next Browse Q in %d, interval %d)", 6333 LogSPS("BeginSleepProcessing: %-6s Found Sleep Proxy Server %d TTL %d %s", intf->ifname, i, sps[i]->resrec.rroriginalttl, CRDisplayString(m, sps[i])); 6378 LogSPS("BeginSleepProcessing: Not registering with Sleep Proxy Server"); 6383 LogSPS("BeginSleepProcessing: Not registering with Sleep Proxy Server on all interfaces"); 6406 // If we're going to sleep, need to stop advertising that we're a Sleep Proxy Server 8844 LogInfo("mDNSCoreReceiveResponse: Server %p responded with code %d to DNSSEC Query %##s (%s), clear DO flag", 8851 LogInfo("mDNSCoreReceiveResponse: Server %p responded with code %d to query %##s (%s)", 10805 // Look up a DNS Server, matching by name and InterfaceID 10832 // Look up a DNS Server for a question within its valid DNSServer bits 11361 LogInfo("InitDNSConfig: question %p %##s (%s) Timeout %d, DNS Server [all...] |
H A D | uDNS.c | 108 #pragma mark - Name Server List Management 140 debugf("Note: DNS Server %#a:%d for domain %##s (%p) registered more than once", addr, mDNSVal16(port), d->c, interface); 288 LogInfo("PenalizeDNSServer: Server for %##s (%s) changed to %#a:%d (%##s)", 317 LogInfo("PenalizeDNSServer: Server for %p, %##s (%s) changed to NULL, Interval %d", q, q->qname.c, DNSTypeName(q->qtype), q->ThisQInterval); 1648 debugf("startLLQHandshake: m->AdvertisedV4 %#a%s Server %#a:%d%s %##s (%s)", 3936 LogInfo("DNS Server %#a:%d (%#a:%d) %d passed%s", 4734 LogInfo("uDNS_checkCurrentQuestion: Retrying question %p %##s (%s) DNS Server %#a:%d ThisQInterval %d", 4866 LogInfo("uDNS_checkCurrentQuestion: Tried all DNS servers, retry question %p SuppressUnusable %d %##s (%s) with DNS Server %#a:%d after 60 seconds, ThisQInterval %d",
|
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/ |
H A D | server.rb | 9 # Gem::Server and allows users to serve gems for consumption by 23 # gem_server = Gem::Server.new Gem.dir, 8089, false 29 class Gem::Server 517 say "Server started at http://#{host}:#{port}"
|
/macosx-10.9.5/ruby-104/ruby/test/rubygems/ |
H A D | test_gem_server.rb | 5 class Gem::Server 16 @server = Gem::Server.new Gem.dir, process_based_port, false 45 server = Gem::Server.new Gem.dir, 0, false 50 server = Gem::Server.new Gem.dir, 0, false 56 server = Gem::Server.new Gem.dir, 0, false 63 s = Gem::Server.new Gem.dir, process_based_port, false 67 s = Gem::Server.new [Gem.dir, Gem.dir], process_based_port, false 101 server = Gem::Server.new dir, process_based_port, false 151 server = Gem::Server.new dir, process_based_port, false 261 server = Gem::Server [all...] |
/macosx-10.9.5/postfix-252/Postfix.ServerSetup/ |
H A D | set_credentials.sh | 6 /usr/sbin/postconf -e imap_submit_cred_file=/Library/Server/Mail/Config/postfix/submit.cred 10 if [ ! -e /Library/Server/Mail/Config/postfix/submit.cred ] ; then 11 hostname=`/usr/sbin/postconf -c /Library/Server/Mail/Config/postfix -h myhostname` 17 if [ -s /Library/Server/Mail/Config/dovecot/submit.passdb ] ; then 20 pw=`grep "^submit:" /Library/Server/Mail/Config/dovecot/submit.passdb | sed -e 's,.*},,' -e 's,:.*,,'` 30 echo "submitcred version 1" > /Library/Server/Mail/Config/postfix/submit.cred 31 echo "$hostname|submit|$pw" >> /Library/Server/Mail/Config/postfix/submit.cred 33 chmod 600 /Library/Server/Mail/Config/postfix/submit.cred
|
/macosx-10.9.5/cups-372.4/cups/packaging/ |
H A D | cups.list.in | 91 %replaces SUNWlps LP Print Service - Server, (Usr) 93 %replaces SUNWpsu LP Print Server, (Usr) 94 %replaces SUNWpsr LP Print Server, (Root) 259 # Server programs 261 # Server files
|
/macosx-10.9.5/OpenSSH-186/openssh/contrib/caldera/ |
H A D | openssh.spec | 71 Summary(de) : OpenSSH Secure Shell Protocol-Server (sshd). 74 Summary(it) : Server OpenSSH per il protocollo Secure Shell (sshd). 147 Dieses Paket installiert den sshd, den Server-Teil der OpenSSH.
|