/macosx-10.10/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | csutilities.cpp | 99 bool certificateHasField(SecCertificateRef cert, const CSSM_OID &oid) argument 103 switch (OSStatus rc = SecCertificateCopyFirstFieldValue(cert, &oid, &value)) { 105 MacOSError::check(SecCertificateReleaseFirstFieldValue(cert, &oid, value)); 106 return true; // extension found by oid 108 break; // oid not recognized by CL - continue below 121 if (oid == ext->extnId) {
|
H A D | reqinterp.h | 69 bool certFieldGeneric(const CssmOid &oid, const Match &match, SecCertificateRef cert); 71 bool certFieldPolicy(const CssmOid &oid, const Match &match, SecCertificateRef cert);
|
H A D | reqinterp.cpp | 218 const CSSM_OID *oid; member in struct:Security::CodeSigning::CertField 241 if (OSStatus rc = SecCertificateCopySubjectComponent(cert, cf->oid, &value.aref())) { 267 CssmOid oid((char *)key.data(), key.length()); 268 return certFieldGeneric(oid, match, cert); 271 bool Requirement::Interpreter::certFieldGeneric(const CssmOid &oid, const Match &match, SecCertificateRef cert) argument 273 return cert && certificateHasField(cert, oid) && match(kCFBooleanTrue); 279 CssmOid oid((char *)key.data(), key.length()); 280 return certFieldPolicy(oid, match, cert); 283 bool Requirement::Interpreter::certFieldPolicy(const CssmOid &oid, const Match &match, SecCertificateRef cert) argument 285 return cert && certificateHasPolicy(cert, oid) [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | csutilities.cpp | 99 bool certificateHasField(SecCertificateRef cert, const CSSM_OID &oid) argument 103 switch (OSStatus rc = SecCertificateCopyFirstFieldValue(cert, &oid, &value)) { 105 MacOSError::check(SecCertificateReleaseFirstFieldValue(cert, &oid, value)); 106 return true; // extension found by oid 108 break; // oid not recognized by CL - continue below 121 if (oid == ext->extnId) {
|
H A D | reqinterp.h | 69 bool certFieldGeneric(const CssmOid &oid, const Match &match, SecCertificateRef cert); 71 bool certFieldPolicy(const CssmOid &oid, const Match &match, SecCertificateRef cert);
|
H A D | reqinterp.cpp | 218 const CSSM_OID *oid; member in struct:Security::CodeSigning::CertField 241 if (OSStatus rc = SecCertificateCopySubjectComponent(cert, cf->oid, &value.aref())) { 267 CssmOid oid((char *)key.data(), key.length()); 268 return certFieldGeneric(oid, match, cert); 271 bool Requirement::Interpreter::certFieldGeneric(const CssmOid &oid, const Match &match, SecCertificateRef cert) argument 273 return cert && certificateHasField(cert, oid) && match(kCFBooleanTrue); 279 CssmOid oid((char *)key.data(), key.length()); 280 return certFieldPolicy(oid, match, cert); 283 bool Requirement::Interpreter::certFieldPolicy(const CssmOid &oid, const Match &match, SecCertificateRef cert) argument 285 return cert && certificateHasPolicy(cert, oid) [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/clAppUtils/ |
H A D | CertBuilderApp.h | 21 const CSSM_OID *oid; member in struct:__anon5217
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12/ |
H A D | pkcs12Parsed.h | 50 P12UnknownBlob(const CSSM_DATA &blob, const CSSM_OID &oid);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12Parse/ |
H A D | pkcs12Parsed.h | 50 P12UnknownBlob(const CSSM_DATA &blob, const CSSM_OID &oid);
|
H A D | pkcs12Utils.cpp | 57 const CSSM_OID *oid; member in struct:__anon5257 227 const CSSM_OID *oid, 241 if(nssCompareCssmData(oid, info->oid)) { 226 pkcsOidToParams( const CSSM_OID *oid, CSSM_ALGORITHMS &keyAlg, CSSM_ALGORITHMS &encrAlg, CSSM_ALGORITHMS &pbeHashAlg, uint32 &keySizeInBits, uint32 &blockSizeInBytes, CSSM_PADDING &padding, CSSM_ENCRYPT_MODE &mode, PKCS_Which &pkcs) argument
|
/macosx-10.10/security_certtool-55109/src/ |
H A D | CertUI.h | 67 const CSSM_OID *oid; // e.g., CSSMOID_CommonName member in struct:__anon12583 91 /* given a signing key, obtain signing algorithm (int and oid format) */
|
/macosx-10.10/Security-57031.1.35/Security/include/security_asn1/ |
H A D | keyTemplates.h | 178 SecAsn1Oid oid; // CSSMOID_PKCS3 member in struct:__anon3589 228 SecAsn1Oid oid; // CSSMOID_ANSI_DH_PUB_NUMBER member in struct:__anon3593
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_asn1/Security/ |
H A D | keyTemplates.h | 178 SecAsn1Oid oid; // CSSMOID_PKCS3 member in struct:__anon4024 228 SecAsn1Oid oid; // CSSMOID_ANSI_DH_PUB_NUMBER member in struct:__anon4028
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_asn1/lib/ |
H A D | keyTemplates.h | 178 SecAsn1Oid oid; // CSSMOID_PKCS3 member in struct:__anon4146 228 SecAsn1Oid oid; // CSSMOID_ANSI_DH_PUB_NUMBER member in struct:__anon4150
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_asn1/security_asn1/ |
H A D | keyTemplates.h | 178 SecAsn1Oid oid; // CSSMOID_PKCS3 member in struct:__anon4268 228 SecAsn1Oid oid; // CSSMOID_ANSI_DH_PUB_NUMBER member in struct:__anon4272
|
/macosx-10.10/BerkeleyDB-21/db/test/ |
H A D | sdb004.tcl | 85 set oid [open $t2 w] 87 puts $oid $i 89 close $oid 91 set oid [open $t2.tmp w] 93 puts $oid $f 95 close $oid
|
H A D | test003.tcl | 141 set oid [open $t2 w] 143 puts $oid $i 145 close $oid 148 set oid [open $t2.tmp w] 153 puts $oid $f 155 close $oid
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/ |
H A D | requirements.grammar | 125 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids); 126 maker.putData(oid.data(), oid.length()); 130 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids); 131 maker.putData(oid.data(), oid.length()); 135 CssmAutoData oid(Allocator::standard()); oid [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecCertificateInternal.h | 272 /* Return the SecCertificateExtensionRef for the extension with the given oid. Return NULL if it does not exist or if an error occours call SecCertificateGetStatus() to see if an error occured or not. */ 273 SecCertificateExtensionRef SecCertificateGetExtensionWithOID(SecCertificateRef certificate, CFDataRef oid); 275 CFDataRef SecCertificateExtensionGetDER(SecCertificateExtensionRef extension, CFDataRef oid); 277 CFDataRef SecCertificateExtensionGetOIDDER(SecCertificateExtensionRef extension, CFDataRef oid); 278 CFStringRef SecCertificateExtensionGetOIDString(SecCertificateExtensionRef extension, CFDataRef oid); 295 const DERItem *oid); 305 bool SecCertificateHasMarkerExtension(SecCertificateRef certificate, CFTypeRef oid);
|
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/krb5/ |
H A D | inquire_sec_context_by_oid.c | 39 heim_oid oid; local 45 &oid, NULL); 53 der_free_oid(&oid); 59 if (oid.length - 1 == prefix.length) { 60 *suffix = oid.components[oid.length - 1]; 61 oid.length--; 62 ret = (der_heim_oid_cmp(&oid, &prefix) == 0); 63 oid.length++; 66 der_free_oid(&oid); [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hx509/ |
H A D | name.c | 164 stringtooid(const char *name, size_t len, heim_oid *oid) argument 170 memset(oid, 0, sizeof(*oid)); 174 return der_copy_oid(no[i].o, oid); 181 ret = der_parse_heim_oid(s, ".", oid); 588 const heim_oid *oid, 618 ret = der_copy_oid(oid, &rdn->val[0].type); 669 heim_oid oid; local 708 ret = stringtooid(p, q - p, &oid); 723 der_free_oid(&oid); 585 _hx509_name_modify(hx509_context context, Name *name, int append, const heim_oid *oid, const char *str) argument 1032 char *oid; local 1095 char *oid; local [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_smime/ |
H A D | secoid.c | 69 /* netscape directory oid - owned by Mark Smith (mcs@netscape.com) */ 470 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, desc, mech, ext } 472 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, 0, mech, ext } 1147 SECOidData *oid; local 1164 oid = secoidDynamicTable[i]; 1166 entry = PL_HashTableAdd( oid_d_hash, &oid->oid, oid ); 1315 const SECOidData *oid; local 1384 SECOID_FindOID(const SECItem *oid) argument 1412 SECOID_FindOIDTag(const SECItem *oid) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_smime/lib/ |
H A D | secoid.c | 69 /* netscape directory oid - owned by Mark Smith (mcs@netscape.com) */ 470 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, desc, mech, ext } 472 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, 0, mech, ext } 1147 SECOidData *oid; local 1164 oid = secoidDynamicTable[i]; 1166 entry = PL_HashTableAdd( oid_d_hash, &oid->oid, oid ); 1315 const SECOidData *oid; local 1384 SECOID_FindOID(const SECItem *oid) argument 1412 SECOID_FindOIDTag(const SECItem *oid) argument [all...] |
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/contrib/slapd-modules/comp_match/ |
H A D | componentlib.h | 66 int MatchingComponentBits (char* oid, ComponentSyntaxInfo *bits1 , ComponentSyntaxInfo* bits2); 101 int MatchingComponentBool (char* oid, ComponentSyntaxInfo *a, ComponentSyntaxInfo *b); 120 int MatchingComponentEnum (char *oid, ComponentSyntaxInfo *a, ComponentSyntaxInfo * b); 160 int MatchingComponentInt (char* oid, ComponentSyntaxInfo *a, ComponentSyntaxInfo *b); 190 int MatchingComponentNull (char* oid, ComponentSyntaxInfo *a, ComponentSyntaxInfo *b); 228 int MatchingComponentOcts (char* oid, ComponentSyntaxInfo *a, ComponentSyntaxInfo *b); 244 int GEncComponentOid (GenBuf *b, ComponentOid *oid); 247 int MatchingComponentOid (char* oid, ComponentSyntaxInfo *a, ComponentSyntaxInfo *b); 283 int MatchingComponentReal (char* oid, ComponentSyntaxInfo *a, ComponentSyntaxInfo *b); 302 int MatchingComponentRelativeOid (char* oid, ComponentSyntaxInf 390 AsnOid oid; member in struct:ComponentAnyInfo [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | test_pknistkdf.c | 42 const heim_oid *oid; member in struct:testcase 234 ai.algorithm = *c->oid; 355 tests[0].oid = &asn1_oid_id_pkinit_kdf_ah_sha1; 356 tests[1].oid = &asn1_oid_id_pkinit_kdf_ah_sha256; 357 tests[2].oid = &asn1_oid_id_pkinit_kdf_ah_sha512;
|