• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/

Lines Matching +defs:child +defs:name

75 static void secdumpdata(CFDataRef data, const char *name) {
76 int fd = open(name, O_CREAT | O_WRONLY | O_TRUNC, 0666);
454 a critical subject alt name extension. */
471 /* Compare hostname suffix to domain name.
496 /* trivial case with at least one empty name */
542 /* Compare hostname, to a server name obtained from the server's cert
549 character * which is considered to match any single domain name
829 /* Can't check intermediates common name if there is no intermediate. */
1061 /* No names specified means we accept any name. */
1091 from the cert are matched against a server name list, where
1092 the server names list can contain wildcards and the dns name
1305 /* For each node of depth i-1 in the valid_policy_tree where P-OID is in the expected_policy_set, create a child node as follows: set the valid_policy to P-OID, set the qualifier_set to P-Q, and set the expected_policy_set to {P-OID}. */
1320 /* If the valid_policy_tree includes a node of depth i-1 with the valid_policy anyPolicy, generate a child node with the following values: set the valid_policy to P-OID, set the qualifier_set to P-Q, and set the expected_policy_set to {P-OID}. */
1330 /* Return true iff node has a child with a valid_policy equal to oid. */
1333 policy_tree_t child;
1334 for (child = node->children; child; child = child->siblings) {
1335 if (oid_equal(child->valid_policy, (*oid))) {
1342 /* For each node in the valid_policy_tree of depth i-1, for each value in the expected_policy_set (including anyPolicy) that does not appear in a child node, create a child node with the following values: set the valid_policy to the value from the expected_policy_set in the parent node, set the qualifier_set to AP-Q, and set the expected_policy_set to the value in the valid_policy from this node. */
1468 /* Verify that the subject name is within one of the permitted_subtrees for X.500 distinguished names, and verify that each of the alternative names in the subjectAltName extension (critical or non-critical) is within one of the permitted_subtrees for that name type. */
1469 /* Verify that the subject name is not within any of the excluded_subtrees for X.500 distinguished names, and verify that each of the alternative names in the subjectAltName extension (critical or non-critical) is not within any of the excluded_subtrees for that name type. */
1544 /* If no node of depth i in the valid_policy_tree has a valid_policy of ID-P but there is a node of depth i with a valid_policy of anyPolicy, then generate a child node of the node of depth i-1 that has a valid_policy of anyPolicy as follows:
1562 i-1 or less without any child nodes, delete that
1575 /* (g) If a name constraints extension is included in the certificate, modify the permitted_subtrees and excluded_subtrees state variables as follows:
1577 /* @@@ handle name constraints. */