/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/ |
H A D | module.c | 340 struct berval oid; local 353 rc = (ext_getoid)(0, &oid, 256); 357 if (oid.bv_val == NULL || oid.bv_len == 0) { 363 rc = load_extop( &oid, ext_main );
|
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecCertificateInternalP.h | 274 /* Return the SecCertificateExtensionRef for the extension with the given oid. Return NULL if it does not exist or if an error occours call SecCertificateGetStatus() to see if an error occured or not. */ 275 SecCertificateExtensionRef SecCertificateGetExtensionWithOID(SecCertificateRefP certificate, CFDataRef oid); 277 CFDataRef SecCertificateExtensionGetDER(SecCertificateExtensionRef extension, CFDataRef oid); 279 CFDataRef SecCertificateExtensionGetOIDDER(SecCertificateExtensionRef extension, CFDataRef oid); 280 CFStringRef SecCertificateExtensionGetOIDString(SecCertificateExtensionRef extension, CFDataRef oid); 297 const DERItem *oid);
|
H A D | SecPolicy.cpp | 110 SecPolicyGetOID(SecPolicyRef policyRef, CSSM_OID* oid) argument 113 Required(oid) = Policy::required(policyRef)->oid(); 436 const CssmOid &oid = pol->oid(); local 437 if ((oid == CssmOid::overlay(CSSMOID_APPLE_TP_REVOCATION)) 438 || (oid == CssmOid::overlay(CSSMOID_APPLE_TP_REVOCATION_CRL)) 439 || (oid == CssmOid::overlay(CSSMOID_APPLE_TP_REVOCATION_OCSP)))
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecCertificateInternalP.h | 274 /* Return the SecCertificateExtensionRef for the extension with the given oid. Return NULL if it does not exist or if an error occours call SecCertificateGetStatus() to see if an error occured or not. */ 275 SecCertificateExtensionRef SecCertificateGetExtensionWithOID(SecCertificateRefP certificate, CFDataRef oid); 277 CFDataRef SecCertificateExtensionGetDER(SecCertificateExtensionRef extension, CFDataRef oid); 279 CFDataRef SecCertificateExtensionGetOIDDER(SecCertificateExtensionRef extension, CFDataRef oid); 280 CFStringRef SecCertificateExtensionGetOIDString(SecCertificateExtensionRef extension, CFDataRef oid); 297 const DERItem *oid);
|
H A D | SecPolicy.cpp | 110 SecPolicyGetOID(SecPolicyRef policyRef, CSSM_OID* oid) argument 113 Required(oid) = Policy::required(policyRef)->oid(); 436 const CssmOid &oid = pol->oid(); local 437 if ((oid == CssmOid::overlay(CSSMOID_APPLE_TP_REVOCATION)) 438 || (oid == CssmOid::overlay(CSSMOID_APPLE_TP_REVOCATION_CRL)) 439 || (oid == CssmOid::overlay(CSSMOID_APPLE_TP_REVOCATION_OCSP)))
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecCertificateInternalP.h | 274 /* Return the SecCertificateExtensionRef for the extension with the given oid. Return NULL if it does not exist or if an error occours call SecCertificateGetStatus() to see if an error occured or not. */ 275 SecCertificateExtensionRef SecCertificateGetExtensionWithOID(SecCertificateRefP certificate, CFDataRef oid); 277 CFDataRef SecCertificateExtensionGetDER(SecCertificateExtensionRef extension, CFDataRef oid); 279 CFDataRef SecCertificateExtensionGetOIDDER(SecCertificateExtensionRef extension, CFDataRef oid); 280 CFStringRef SecCertificateExtensionGetOIDString(SecCertificateExtensionRef extension, CFDataRef oid); 297 const DERItem *oid);
|
H A D | SecPolicy.cpp | 110 SecPolicyGetOID(SecPolicyRef policyRef, CSSM_OID* oid) argument 113 Required(oid) = Policy::required(policyRef)->oid(); 436 const CssmOid &oid = pol->oid(); local 437 if ((oid == CssmOid::overlay(CSSMOID_APPLE_TP_REVOCATION)) 438 || (oid == CssmOid::overlay(CSSMOID_APPLE_TP_REVOCATION_CRL)) 439 || (oid == CssmOid::overlay(CSSMOID_APPLE_TP_REVOCATION_OCSP)))
|
/macosx-10.10/BerkeleyDB-21/db/test/ |
H A D | sdbtest001.tcl | 93 set oid [open $t2 w] 95 puts $oid [expr $subdb * $newent + $i] 97 close $oid
|
H A D | test002.tcl | 116 set oid [open $t2 w] 118 puts $oid $i 120 close $oid
|
H A D | test020.tcl | 108 set oid [open $t2 w] 110 puts $oid $i 112 close $oid
|
H A D | reputils.tcl | 950 set oid [open $testdir/ELECTION_SOURCE.$elect_serial w] 952 puts $oid "source $test_path/test.tcl" 953 puts $oid "set elected_event 0" 954 puts $oid "set elected_env \"NONE\"" 955 puts $oid "set is_repchild 1" 956 puts $oid "replsetup $qdir" 957 foreach i $machids { puts $oid "repladd $i" } 958 puts $oid "set env_cmd \{$envstring\}" 960 puts $oid "set dbenv \[eval \$env_cmd -errfile \ 963 puts $oid "se [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_pkcs12/ |
H A D | pkcs12SafeBag.h | 271 const CSSM_OID &oid, 278 CFDataRef oid, 287 CSSM_OID &oid() { return mOid; } function in class:P12OpaqueBag
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_pkcs12/lib/ |
H A D | pkcs12SafeBag.h | 271 const CSSM_OID &oid, 278 CFDataRef oid, 287 CSSM_OID &oid() { return mOid; } function in class:P12OpaqueBag
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | ssh-gss.h | 97 gss_OID_desc oid; member in struct:ssh_gssapi_mech_struct 110 gss_OID oid; /* client */ member in struct:__anon3227
|
/macosx-10.10/Security-57031.1.35/Security/sec/SOSCircle/SecureObjectSync/ |
H A D | SOSMessage.h | 87 void SOSMessageAddExtension(SOSMessageRef message, CFDataRef oid, bool isCritical, CFDataRef extension); 123 void(^withExtension)(CFDataRef oid, bool isCritical,
|
/macosx-10.10/xnu-2782.1.97/osfmk/kern/ |
H A D | timer_queue.h | 184 extern uint64_t timer_sysctl_get(int oid); 185 extern int timer_sysctl_set(int oid, uint64_t value);
|
/macosx-10.10/tcpdump-61/tcpdump/ |
H A D | print-snmp.c | 261 u_char oid; /* sub-id following parent */ member in struct:obj 284 const char *oid; /* ASN.1 encoded OID */ member in struct:obj_abrev 313 if ((o) == objp->oid) \ 688 size_t a_len = strlen(a->oid); 691 if (memcmp(a->oid, (char *)p, a_len) == 0) { 693 i -= strlen(a->oid); 694 p += strlen(a->oid); 899 smi_decode_oid(struct be *elem, unsigned int *oid, argument 919 oid[*oidlen] = o / OIDMUX; 920 if (oid[*oidle 1029 unsigned int oid[128], oidlen; local 1059 unsigned int i, oid[128], oidlen; local [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hx509/ |
H A D | ks_p12.c | 47 const heim_oid *oid; member in struct:type 57 find_attribute(const PKCS12_Attributes *attrs, const heim_oid *oid) argument 63 if (der_heim_oid_cmp(oid, &attrs->val[i].attrId) == 0) 174 const heim_oid *oid = oids[i]; local 175 attr = find_attribute(attrs, oid); 177 _hx509_set_cert_attribute(context, cert, oid, 310 const heim_oid *oid, 317 if (der_heim_oid_cmp(bagtypes[i].oid, oid) == 0) 450 const heim_oid *oid, 308 parse_pkcs12_type(hx509_context context, struct hx509_collector *c, const heim_oid *oid, const void *data, size_t length, const PKCS12_Attributes *attrs) argument 448 addBag(hx509_context context, PKCS12_AuthenticatedSafe *as, const heim_oid *oid, void *data, size_t length) argument [all...] |
/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/ |
H A D | secoid.c | 73 /* netscape directory oid - owned by Mark Smith (mcs@netscape.com) */ 442 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, desc, mech, ext } 444 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, desc, ext } 447 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, 0, mech, ext } 1238 SECOidData *oid; 1255 oid = secoidDynamicTable[i]; 1257 entry = PL_HashTableAdd( oid_d_hash, &oid 1383 const SECOidData *oid; local 1451 SECOID_FindOID(const SecAsn1Item *oid) argument 1471 SECOID_FindOIDTag(const SecAsn1Item *oid) argument [all...] |
/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/ |
H A D | secoid.c | 73 /* netscape directory oid - owned by Mark Smith (mcs@netscape.com) */ 442 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, desc, mech, ext } 444 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, desc, ext } 447 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, 0, mech, ext } 1238 SECOidData *oid; 1255 oid = secoidDynamicTable[i]; 1257 entry = PL_HashTableAdd( oid_d_hash, &oid 1383 const SECOidData *oid; local 1451 SECOID_FindOID(const SecAsn1Item *oid) argument 1471 SECOID_FindOIDTag(const SecAsn1Item *oid) argument [all...] |
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/ |
H A D | secoid.c | 73 /* netscape directory oid - owned by Mark Smith (mcs@netscape.com) */ 442 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, desc, mech, ext } 444 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, desc, ext } 447 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, 0, mech, ext } 1238 SECOidData *oid; 1255 oid = secoidDynamicTable[i]; 1257 entry = PL_HashTableAdd( oid_d_hash, &oid 1383 const SECOidData *oid; local 1451 SECOID_FindOID(const SecAsn1Item *oid) argument 1471 SECOID_FindOIDTag(const SecAsn1Item *oid) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/mech/ |
H A D | gss_cred.c | 162 gss_OID_desc oid; local 172 oid.elements = data.data; 173 oid.length = (OM_uint32)data.length; 175 m = __gss_get_mechanism(&oid);
|
H A D | gss_krb5.c | 618 heim_oid baseoid, oid; local 626 /* All this to append an integer to an oid... */ 635 oid.length = baseoid.length + 1; 636 oid.components = calloc(oid.length, sizeof(*oid.components)); 637 if (oid.components == NULL) { 644 memcpy(oid.components, baseoid.components, 649 oid.components[oid 709 gsskrb5_extract_key(OM_uint32 *minor_status, gss_ctx_id_t context_handle, const gss_OID oid, krb5_keyblock **keyblock) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/packages/mac/ |
H A D | build-export-files.sh | 53 exportfile "${HEIMDAL_TMPDIR}/gss.exp" gss gss-oid
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/contrib/ldapc++/src/ |
H A D | LDAPConnection.h | 219 * @param oid The Object Identifier of the Extended Operation that 228 LDAPExtResult* extOperation(const std::string& oid, const std::string&
|