/macosx-10.10/BerkeleyDB-21/db/test/ |
H A D | test001.tcl | 162 set oid [open $t2 w] 172 puts $oid $j 174 close $oid
|
H A D | test008.tcl | 162 set oid [open $t2.tmp w] 164 puts $oid $f 166 close $oid
|
H A D | test013.tcl | 184 set oid [open $t2 w] 186 puts $oid $i 188 close $oid
|
H A D | test014.tcl | 201 set oid [open $t2 w] 203 puts $oid $i 205 close $oid
|
H A D | test015.tcl | 208 set oid [open $t2 w] 210 puts $oid $i 212 close $oid
|
H A D | test016.tcl | 160 set oid [open $t2 w] 162 puts $oid $i 164 close $oid
|
H A D | test036.tcl | 146 set oid [open $t2 w] 148 puts $oid $i 150 close $oid
|
H A D | test097.tcl | 108 set oid [open $t2 w] 110 puts $oid $i 112 close $oid
|
/macosx-10.10/Heimdal-398.1.2/appl/popper/ |
H A D | auth_gssapi.c | 160 gss_OID oid; local 189 &export_name, &oid); 195 if(oid != GSS_KRB5_NT_PRINCIPAL_NAME) {
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/servers/slapd/ |
H A D | at.c | 48 const char *oid ) 53 return strcmp( syn_oid, oid ) == 0; 464 /* Keep old oid, free new oid; 605 char *oid; local 608 oid = oidm_find( at->at_oid ); 609 if ( !oid ) { 613 if ( oid != at->at_oid ) { 615 at->at_oid = oid; 620 char *oid; local [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/x509/ |
H A D | x509_vpm.c | 276 ASN1_OBJECT *oid, *doid; local 294 oid = sk_ASN1_OBJECT_value(policies, i); 295 doid = OBJ_dup(oid);
|
/macosx-10.10/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | RequirementParser.cpp | 76 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids); 77 maker.putData(oid.data(), oid.length()); 81 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids); 82 maker.putData(oid.data(), oid.length()); 86 CssmAutoData oid(Allocator::standard()); oid [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_x509_cl/lib/ |
H A D | Session_Crypto.cpp | 267 const CSSM_OID *oid = cssmAlgToOid(context->AlgorithmType); local 269 if(oid == NULL) { 274 algId.algorithm = *oid;
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | RequirementParser.cpp | 76 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids); 77 maker.putData(oid.data(), oid.length()); 81 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids); 82 maker.putData(oid.data(), oid.length()); 86 CssmAutoData oid(Allocator::standard()); oid [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecKey.c | 62 /* Currently length of SHA512 oid + 1 */ 73 0x06, oid.Len, oid.Data, 79 static size_t DEREncodeDigestInfoPrefix(const SecAsn1Oid *oid, argument 81 size_t algIdLen = oid->Length + 4; 95 digestInfo[ix++] = oid->Length; 96 memcpy(&digestInfo[ix], oid->Data, oid->Length); 97 ix += oid->Length; 386 const SecAsn1Oid *oid, cons 385 SecKeyCreatePublicFromDER(CFAllocatorRef allocator, const SecAsn1Oid *oid, const SecAsn1Item *params, const SecAsn1Item *keyData) argument [all...] |
H A D | SecCertificateRequest.c | 96 CFArrayRef oid = CFStringCreateArrayBySeparatingStrings(kCFAllocatorDefault, local 98 CFIndex i = 0, count = CFArrayGetCount(oid); 101 CFStringRef oid_octet = CFArrayGetValueAtIndex(oid, i); 114 CFReleaseSafe(oid); 119 CFReleaseSafe(oid); 157 const void * oid, const void * value, const unsigned char type_in, NSS_ATV *nss_atv) 191 if (CFGetTypeID(oid) == CFStringGetTypeID()) { 192 if (CFEqual(kSecOidCommonName, oid)) { 194 } else if (CFEqual(kSecOidCountryName, oid)) { 196 } else if (CFEqual(kSecOidStateProvinceName, oid)) { 156 make_nss_atv(PRArenaPool *poolp, const void * oid, const void * value, const unsigned char type_in, NSS_ATV *nss_atv) argument [all...] |
/macosx-10.10/curl-83.1.2/curl/lib/ |
H A D | x509asn1.c | 173 static const curl_OID * searchOID(const char * oid) argument 181 if(!strcmp(op->numoid, oid) || curl_strequal(op->textoid, oid)) 589 curl_asn1Element oid; local 604 p3 = Curl_getASN1Element(&oid, atv.beg, atv.end); 606 str = Curl_ASN1tostr(&oid, 0); 769 curl_asn1Element oid; local 773 beg = Curl_getASN1Element(&oid, beg, end); 778 return OID2str(oid.beg, oid 1026 checkOID(const char * beg, const char * end, const char * oid) argument [all...] |
/macosx-10.10/ruby-106/ruby/ext/openssl/lib/openssl/ |
H A D | ssl.rb | 100 next if ext.oid != "subjectAltName" 121 cert.subject.to_a.each{|oid, value| 122 if oid == "CN"
|
/macosx-10.10/ruby-106/ruby/lib/rubygems/ |
H A D | security.rb | 394 extension.oid == "#{x509_entry}AltName" 526 extension.oid == 'subjectAltName' 533 extension.oid == 'subjectAltName'
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/contrib/slapd-modules/comp_match/ |
H A D | authorityKeyIdentifier.c | 34 MatchingComponentOtherName ( char* oid, ComponentSyntaxInfo* csi_attr, ComponentSyntaxInfo* csi_assert ) { argument 38 if ( oid ) { 39 mr = retrieve_matching_rule( oid, csi_attr->csi_comp_desc->cd_type_id); 44 rc = MatchingComponentOid ( oid, (ComponentSyntaxInfo*)&((ComponentOtherName*)csi_attr)->type_id, (ComponentSyntaxInfo*)&((ComponentOtherName*)csi_assert)->type_id ); 48 rc = MatchingComponentAnyDefinedBy ( oid, (ComponentAny*)&((ComponentOtherName*)csi_attr)->value, (ComponentAny*)&((ComponentOtherName*)csi_assert)->value); 256 MatchingComponentORAddress ( char* oid, ComponentSyntaxInfo* csi_attr, ComponentSyntaxInfo* csi_assert ) { argument 260 if ( oid ) { 261 mr = retrieve_matching_rule( oid, csi_attr->csi_comp_desc->cd_type_id); 266 rc = MatchingComponentOid ( oid, (ComponentSyntaxInfo*)&((ComponentORAddress*)csi_attr)->type_id, (ComponentSyntaxInfo*)&((ComponentORAddress*)csi_assert)->type_id ); 270 rc = MatchingComponentAnyDefinedBy ( oid, (ComponentAn 518 MatchingComponentDirectoryString( char* oid, ComponentSyntaxInfo* csi_attr, ComponentSyntaxInfo* csi_assert ) argument 812 MatchingComponentEDIPartyName( char* oid, ComponentSyntaxInfo* csi_attr, ComponentSyntaxInfo* csi_assert ) argument 1048 MatchingComponentGeneralName( char* oid, ComponentSyntaxInfo* csi_attr, ComponentSyntaxInfo* csi_assert ) argument 1545 MatchingComponentGeneralNames( char* oid, ComponentSyntaxInfo* csi_attr, ComponentSyntaxInfo* csi_assert ) argument 1771 MatchingComponentAuthorityKeyIdentifier( char* oid, ComponentSyntaxInfo* csi_attr, ComponentSyntaxInfo* csi_assert ) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/mech/ |
H A D | context.c | 243 gss_buffer_desc oid; local 251 if (mech && gss_oid_to_str(&junk, (gss_OID)mech, &oid) == GSS_S_COMPLETE) { 252 values[2] = CFStringCreateWithFormat(NULL, NULL, CFSTR("%.*s"), (int)oid.length, (char *)oid.value); 253 gss_release_buffer(&junk, &oid);
|
/macosx-10.10/Security-57031.1.35/Security/include/security_pkcs12/ |
H A D | pkcs12SafeBag.cpp | 499 const CSSM_OID &oid, 505 coder.allocCopyItem(oid, mOid); 510 CFDataRef oid, 518 coder.allocCopyItem(CFDataGetBytePtr(oid), 519 CFDataGetLength(oid), mOid); 498 P12OpaqueBag( const CSSM_OID &oid, const CSSM_DATA &blob, NSS_Attribute **attrs, SecNssCoder &coder) argument 509 P12OpaqueBag( CFDataRef oid, CFDataRef blob, CFStringRef fname, CFDataRef keyId, P12BagAttrs *otherAttrs, SecNssCoder &coder) argument
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_pkcs12/lib/ |
H A D | pkcs12SafeBag.cpp | 499 const CSSM_OID &oid, 505 coder.allocCopyItem(oid, mOid); 510 CFDataRef oid, 518 coder.allocCopyItem(CFDataGetBytePtr(oid), 519 CFDataGetLength(oid), mOid); 498 P12OpaqueBag( const CSSM_OID &oid, const CSSM_DATA &blob, NSS_Attribute **attrs, SecNssCoder &coder) argument 509 P12OpaqueBag( CFDataRef oid, CFDataRef blob, CFStringRef fname, CFDataRef keyId, P12BagAttrs *otherAttrs, SecNssCoder &coder) argument
|
/macosx-10.10/Heimdal-398.1.2/lib/hx509/ |
H A D | crypto.c | 128 find_sig_alg(const heim_oid *oid); 246 const heim_oid *oid, 264 ret = der_copy_oid(oid, &id->algorithm); 279 heim_oid2ecnid(heim_oid *oid) argument 285 if (der_heim_oid_cmp(oid, ASN1_OID_ID_EC_GROUP_SECP256R1) == 0) 287 else if (der_heim_oid_cmp(oid, ASN1_OID_ID_EC_GROUP_SECP160R1) == 0) 289 else if (der_heim_oid_cmp(oid, ASN1_OID_ID_EC_GROUP_SECP160R2) == 0) 1529 find_sig_alg(const heim_oid *oid) argument 1533 if (der_heim_oid_cmp(sig_algs[i]->sig_oid, oid) == 0) 1580 hx509_find_private_alg(const heim_oid *oid) argument 245 set_digest_alg(DigestAlgorithmIdentifier *id, const heim_oid *oid, const void *param, size_t length) argument 1881 _hx509_generate_private_key_init(hx509_context context, const heim_oid *oid, struct hx509_generate_private_context **ctx) argument 2187 const heim_oid *oid; member in struct:hx509cipher 2207 heim_oid oid; member in struct:hx509_crypto_data 2437 find_cipher_by_oid(const heim_oid *oid) argument 2889 find_string2key(const heim_oid *oid, const EVP_CIPHER **c, const EVP_MD **md, PBE_string2key_func *s2k) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | CertificateRequest.cpp | 169 certReqDbg("CertificateRequest(): unknown policy oid"); 190 if((attr->oid.Data == NULL) || (attr->value.Data == NULL)) { 193 if(nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_VALUE_USERNAME, &attr->oid)) { 204 else if(nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_VALUE_PASSWORD, &attr->oid)) { 207 else if(nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_VALUE_HOSTNAME, &attr->oid)) { 210 else if(nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_VALUE_RENEW, &attr->oid)) { 218 else if(nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_VALUE_ASYNC, &attr->oid)) { 222 else if(nssCompareCssmData(&CSSMOID_DOTMAC_CERT_REQ_VALUE_IS_PENDING, &attr->oid)) { 228 certReqDbg("CertificateRequest(): unknown name/value oid");
|