/macosx-10.9.5/securityd-55199.3/src/ |
H A D | server.cpp | 222 void Server::setupConnection(ConnectLevel type, Port replyPort, Port taskPort, argument 248 Connection *connection = new Connection(*proc, replyPort); 249 if (mConnections.contains(replyPort)) // malicious re-entry attempt? 251 mConnections[replyPort] = connection; 252 notifyIfDead(replyPort); 262 void Server::endConnection(Port replyPort) argument 265 PortMap<Connection>::iterator it = mConnections.find(replyPort);
|
H A D | server.h | 96 static Connection &connection(mach_port_t replyPort, audit_token_t &auditToken); // find by reply port and make active 147 void setupConnection(ConnectLevel type, Port replyPort, Port taskPort, const audit_token_t &auditToken, 150 void endConnection(Port replyPort);
|
H A D | csproxy.cpp | 408 #define CSH_ARGS mach_port_t servicePort, mach_port_t replyPort, OSStatus *rcode
|
H A D | transition.cpp | 57 #define UCSP_ARGS mach_port_t servicePort, mach_port_t replyPort, \ 61 #define BEGIN_IPC(name) BEGIN_IPCN RefPointer<Connection> connRef(&Server::connection(replyPort, auditToken)); \ 228 Server::active().setupConnection(Server::connectNewProcess, replyPort, 241 Server::active().setupConnection(Server::connectNewThread, replyPort, taskPort, auditToken); 253 Server::active().endConnection(replyPort);
|
/macosx-10.9.5/CF-855.17/ |
H A D | CFUserNotification.c | 204 static SInt32 _CFUserNotificationSendRequest(CFAllocatorRef allocator, CFStringRef sessionID, mach_port_t replyPort, SInt32 token, CFTimeInterval timeout, CFOptionFlags flags, CFDictionaryRef dictionary) { argument 235 msg->header.msgh_bits = MACH_MSGH_BITS(MACH_MSG_TYPE_COPY_SEND, (replyPort == MACH_PORT_NULL) ? 0 : MACH_MSG_TYPE_MAKE_SEND_ONCE); 238 msg->header.msgh_local_port = replyPort; 272 mach_port_t replyPort = MACH_PORT_NULL; local 275 retval = mach_port_allocate(mach_task_self(), MACH_PORT_RIGHT_RECEIVE, &replyPort); 276 if (ERR_SUCCESS == retval && MACH_PORT_NULL != replyPort) retval = _CFUserNotificationSendRequest(allocator, sessionID, replyPort, token, timeout, flags, dictionary); 280 userNotification->_replyPort = replyPort; 296 if (ERR_SUCCESS != retval && MACH_PORT_NULL != replyPort) mach_port_destroy(mach_task_self(), replyPort); local [all...] |
H A D | CFMessagePort.c | 168 static mach_msg_base_t *__CFMessagePortCreateMessage(bool reply, mach_port_t port, mach_port_t replyPort, int32_t convid, int32_t msgid, const uint8_t *bytes, int32_t byteslen) { argument 179 msg->base.header.msgh_local_port = replyPort; 181 msg->base.header.msgh_bits = MACH_MSGH_BITS((reply ? MACH_MSG_TYPE_MOVE_SEND_ONCE : MACH_MSG_TYPE_COPY_SEND), (MACH_PORT_NULL != replyPort ? MACH_MSG_TYPE_MAKE_SEND_ONCE : 0)); 198 msg->base.header.msgh_local_port = replyPort; 200 msg->base.header.msgh_bits = MACH_MSGH_BITS((reply ? MACH_MSG_TYPE_MOVE_SEND_ONCE : MACH_MSG_TYPE_COPY_SEND), (MACH_PORT_NULL != replyPort ? MACH_MSG_TYPE_MAKE_SEND_ONCE : 0)); 725 CFMachPortRef replyPort = ms->_replyPort; local 755 if (NULL != replyPort) { 756 CFMachPortInvalidate(replyPort); 757 CFRelease(replyPort);
|
/macosx-10.9.5/UserNotification-28/Libunc/ |
H A D | UNCUserNotification.c | 219 static int UNCSendRequest(const char *sessionID, mach_port_t replyPort, int token, double timeout, unsigned long flags, const char **contents) { argument 250 msg->header.msgh_local_port = replyPort; 269 mach_port_t replyPort = MACH_PORT_NULL; local 272 retval = mach_port_allocate(mach_task_self(), MACH_PORT_RIGHT_RECEIVE, &replyPort); 273 if (ERR_SUCCESS == retval && MACH_PORT_NULL != replyPort) retval = UNCSendRequest(sessionID, replyPort, token, timeout, flags, contents); 278 userNotification->_replyPort = replyPort; 297 if (ERR_SUCCESS != retval && MACH_PORT_NULL != replyPort) mach_port_destroy(mach_task_self(), replyPort); local
|
/macosx-10.9.5/Security-55471.14.18/include/security_utilities/ |
H A D | security_utilities.d | 80 probe send_error(uint32_t machError, uint32_t replyPort);
|
/macosx-10.9.5/Security-55471.14.18/include/securityd_client/ |
H A D | ssclient.cpp | 146 IPCN(ucsp_client_setup(serverPort, thread.replyPort, &securitydCreds, &rcode, 149 IFDEBUG(serverPort.requestNotify(thread.replyPort));
|
H A D | sstransit.h | 42 #define UCSP_ARGS mGlobal().serverPort, mGlobal().thread().replyPort, &securitydCreds, &rcode
|
H A D | ssclient.h | 430 ReceivePort replyPort; // dedicated reply port (send right held by SecurityServer) member in struct:Security::SecurityServer::ClientSession::Thread
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_utilities/lib/ |
H A D | security_utilities.d | 80 probe send_error(uint32_t machError, uint32_t replyPort);
|
/macosx-10.9.5/Security-55471.14.18/libsecurityd/lib/ |
H A D | ssclient.cpp | 146 IPCN(ucsp_client_setup(serverPort, thread.replyPort, &securitydCreds, &rcode, 149 IFDEBUG(serverPort.requestNotify(thread.replyPort));
|
H A D | sstransit.h | 42 #define UCSP_ARGS mGlobal().serverPort, mGlobal().thread().replyPort, &securitydCreds, &rcode
|
H A D | ssclient.h | 430 ReceivePort replyPort; // dedicated reply port (send right held by SecurityServer) member in struct:Security::SecurityServer::ClientSession::Thread
|
/macosx-10.9.5/kext_tools-326.95.1/ |
H A D | kextd_watchvol.c | 274 // for the death-tracking port and the mach_port_t replyPort. 529 CFDictionaryRemoveValue(sReplyPorts, *port); // stop tracking replyPort 542 mach_port_t replyPort; local 545 replyPort=(mach_port_t)(intptr_t)CFDictionaryGetValue(sReplyPorts,waiter); 548 if (replyPort != MACH_PORT_NULL) { 551 rval = lock_reboot_reply(replyPort, KERN_SUCCESS, empty, status); 553 rval = lock_volume_reply(replyPort, KERN_SUCCESS, status); 1451 kern_return_t _kextmanager_lock_reboot(mach_port_t p, mach_port_t replyPort, argument 1456 // OSKextLog(/* kext */ NULL, kOSKextLogDebugLevel | kOSKextLogGeneralFlag, "DEBUG: _lock_reboot(..%d/%d..)...", client, replyPort); 1504 CFDictionarySetValue(sReplyPorts, sRebootWaiter, (void*)(intptr_t)replyPort); 1539 _kextmanager_lock_volume(mach_port_t p, mach_port_t replyPort, mach_port_t client, uuid_t vol_uuid, int waitForLock, int *lockStatus) argument [all...] |
/macosx-10.9.5/SecurityTokend-55107/lib/ |
H A D | transit.h | 44 mach_port_t servicePort, mach_port_t replyPort, CSSM_RETURN *rcode
|
/macosx-10.9.5/SecurityTokend-55107/security_tokend_client/ |
H A D | transit.h | 44 mach_port_t servicePort, mach_port_t replyPort, CSSM_RETURN *rcode
|
/macosx-10.9.5/libsecurity_agent-55000/lib/ |
H A D | agentclient.cpp | 560 kern_return_t sa_reply_server_didStartTx(mach_port_t replyPort, kern_return_t retval) argument
|
/macosx-10.9.5/securityd-55199.3/libsecurity_agent/lib/ |
H A D | agentclient.cpp | 592 kern_return_t sa_reply_server_didStartTx(mach_port_t replyPort, kern_return_t retval) argument
|
/macosx-10.9.5/securityd-55199.3/libsecurity_agent/security_agent_client/ |
H A D | agentclient.cpp | 592 kern_return_t sa_reply_server_didStartTx(mach_port_t replyPort, kern_return_t retval) argument
|
/macosx-10.9.5/securityd-55199.3/security_agent_client/ |
H A D | agentclient.cpp | 592 kern_return_t sa_reply_server_didStartTx(mach_port_t replyPort, kern_return_t retval) argument
|
/macosx-10.9.5/securityd-55199.3/security_agent_server/ |
H A D | agentclient.cpp | 592 kern_return_t sa_reply_server_didStartTx(mach_port_t replyPort, kern_return_t retval) argument
|
/macosx-10.9.5/xnu-2422.115.4/iokit/Kernel/ |
H A D | IOUserClient.cpp | 1325 mach_port_t replyPort; local 1329 replyPort = (mach_port_t) (reference[0] & ~kIOUCAsync0Flags); 1330 if (replyPort == MACH_PORT_NULL) 1338 replyMsg.msgHdr.msgh_remote_port = replyPort;
|