/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecPolicy.cpp | 65 /* FIXME: this policy name should be deprecated and replaced with "kSecPolicyAppleIDValidationRecordSigning" */ 178 SecPointer<Policy> policy; local 179 while ( cursor->next(policy) ) /* copies the next policy */ 181 CFArrayAppendValue(currPolicies, policy->handle()); /* 'SecPolicyRef' appended */ 182 CFRelease(policy->handle()); /* refcount bumped up when appended to array */ 192 SecPolicyCopy(CSSM_CERT_TYPE certificateType, const CSSM_OID *policyOID, SecPolicyRef* policy) argument 194 Required(policy); 204 ortn = SecPolicySearchCopyNext(srchRef, policy); 213 // return a SecPolicyRef object for the X.509 Basic policy 214 SecPolicyRef policy = nil; local 231 SecPolicyRef policy = nil; local 270 SecPolicyRef policy = NULL; local 288 SecPolicyRef policy = NULL; local 350 SecPolicyRef policy = SecPolicyCreateWithOID(policyIdentifier); local 362 SecPolicyRef policy = SecPolicyCreateWithSecAsn1Oid(oidPtr); local 394 SecPolicyRef policy = SecPolicyCreateSSL(true, hostname); local [all...] |
H A D | PolicyCursor.cpp | 93 bool PolicyCursor::next(SecPointer<Policy> &policy) argument 103 policy = new Policy(theOneTP(), *theOidList[mSearchPos]); 111 // Return a new policy instance for an OID, outside of cursor iteration 113 void PolicyCursor::policy(const CSSM_OID* oid, SecPointer<Policy> &policy) argument 116 policy = new Policy(theOneTP(), *policyOid);
|
H A D | PolicyCursor.h | 53 bool next(SecPointer<Policy> &policy); 55 static void policy(const CSSM_OID* oid, SecPointer<Policy> &policy); 65 #if 1 // quick version -- using built-in policy list
|
H A D | SecPolicySearch.cpp | 72 SecPointer<Policy> policy; local 73 if (!PolicyCursor::required(searchRef)->next(policy)) 75 *policyRef = policy->handle();
|
H A D | TrustStore.h | 54 // set/get user trust for a certificate and policy 55 SecTrustUserSetting find(Certificate *cert, Policy *policy, 57 void assign(Certificate *cert, Policy *policy, SecTrustUserSetting assignment); 64 Item findItem(Certificate *cert, Policy *policy,
|
H A D | SecIdentitySearchPriv.h | 52 @param policy An optional policy reference. If provided, returned identities must be valid for this policy. Pass NULL to ignore policy when searching. 62 In 10.7 and later, you should use SecItemCopyMatching (see SecItem.h) to find identities that match a given policy. 64 To specify the policy which the identity must match, add this key/value pair to the query dictionary: 79 OSStatus SecIdentitySearchCreateWithPolicy(SecPolicyRef policy, CFStringRef idString, uint32 keyUsage, CFTypeRef keychainOrArray, Boolean returnOnlyValidIdentities, SecIdentitySearchRef* searchRef)
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecPolicy.cpp | 65 /* FIXME: this policy name should be deprecated and replaced with "kSecPolicyAppleIDValidationRecordSigning" */ 178 SecPointer<Policy> policy; local 179 while ( cursor->next(policy) ) /* copies the next policy */ 181 CFArrayAppendValue(currPolicies, policy->handle()); /* 'SecPolicyRef' appended */ 182 CFRelease(policy->handle()); /* refcount bumped up when appended to array */ 192 SecPolicyCopy(CSSM_CERT_TYPE certificateType, const CSSM_OID *policyOID, SecPolicyRef* policy) argument 194 Required(policy); 204 ortn = SecPolicySearchCopyNext(srchRef, policy); 213 // return a SecPolicyRef object for the X.509 Basic policy 214 SecPolicyRef policy = nil; local 231 SecPolicyRef policy = nil; local 270 SecPolicyRef policy = NULL; local 288 SecPolicyRef policy = NULL; local 350 SecPolicyRef policy = SecPolicyCreateWithOID(policyIdentifier); local 362 SecPolicyRef policy = SecPolicyCreateWithSecAsn1Oid(oidPtr); local 394 SecPolicyRef policy = SecPolicyCreateSSL(true, hostname); local [all...] |
H A D | PolicyCursor.cpp | 93 bool PolicyCursor::next(SecPointer<Policy> &policy) argument 103 policy = new Policy(theOneTP(), *theOidList[mSearchPos]); 111 // Return a new policy instance for an OID, outside of cursor iteration 113 void PolicyCursor::policy(const CSSM_OID* oid, SecPointer<Policy> &policy) argument 116 policy = new Policy(theOneTP(), *policyOid);
|
H A D | PolicyCursor.h | 53 bool next(SecPointer<Policy> &policy); 55 static void policy(const CSSM_OID* oid, SecPointer<Policy> &policy); 65 #if 1 // quick version -- using built-in policy list
|
H A D | SecPolicySearch.cpp | 72 SecPointer<Policy> policy; local 73 if (!PolicyCursor::required(searchRef)->next(policy)) 75 *policyRef = policy->handle();
|
H A D | TrustStore.h | 54 // set/get user trust for a certificate and policy 55 SecTrustUserSetting find(Certificate *cert, Policy *policy, 57 void assign(Certificate *cert, Policy *policy, SecTrustUserSetting assignment); 64 Item findItem(Certificate *cert, Policy *policy,
|
H A D | SecIdentitySearchPriv.h | 52 @param policy An optional policy reference. If provided, returned identities must be valid for this policy. Pass NULL to ignore policy when searching. 62 In 10.7 and later, you should use SecItemCopyMatching (see SecItem.h) to find identities that match a given policy. 64 To specify the policy which the identity must match, add this key/value pair to the query dictionary: 79 OSStatus SecIdentitySearchCreateWithPolicy(SecPolicyRef policy, CFStringRef idString, uint32 keyUsage, CFTypeRef keychainOrArray, Boolean returnOnlyValidIdentities, SecIdentitySearchRef* searchRef)
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | sandbox-systrace.c | 109 struct systrace_policy policy; local 142 /* Allocate and assign policy */ 143 bzero(&policy, sizeof(policy)); 144 policy.strp_op = SYSTR_POLICY_NEW; 145 policy.strp_maxents = SYS_MAXSYSCALL; 146 if (ioctl(box->systrace_fd, STRIOCPOLICY, &policy) == -1) 150 policy.strp_op = SYSTR_POLICY_ASSIGN; 151 policy.strp_pid = box->child_pid; 152 if (ioctl(box->systrace_fd, STRIOCPOLICY, &policy) [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | PolicyCursor.cpp | 93 bool PolicyCursor::next(SecPointer<Policy> &policy) argument 103 policy = new Policy(theOneTP(), *theOidList[mSearchPos]); 111 // Return a new policy instance for an OID, outside of cursor iteration 113 void PolicyCursor::policy(const CSSM_OID* oid, SecPointer<Policy> &policy) argument 116 policy = new Policy(theOneTP(), *policyOid);
|
H A D | PolicyCursor.h | 53 bool next(SecPointer<Policy> &policy); 55 static void policy(const CSSM_OID* oid, SecPointer<Policy> &policy); 65 #if 1 // quick version -- using built-in policy list
|
H A D | SecPolicySearch.cpp | 72 SecPointer<Policy> policy; local 73 if (!PolicyCursor::required(searchRef)->next(policy)) 75 *policyRef = policy->handle();
|
H A D | TrustStore.h | 54 // set/get user trust for a certificate and policy 55 SecTrustUserSetting find(Certificate *cert, Policy *policy, 57 void assign(Certificate *cert, Policy *policy, SecTrustUserSetting assignment); 64 Item findItem(Certificate *cert, Policy *policy,
|
H A D | SecIdentitySearchPriv.h | 52 @param policy An optional policy reference. If provided, returned identities must be valid for this policy. Pass NULL to ignore policy when searching. 62 In 10.7 and later, you should use SecItemCopyMatching (see SecItem.h) to find identities that match a given policy. 64 To specify the policy which the identity must match, add this key/value pair to the query dictionary: 79 OSStatus SecIdentitySearchCreateWithPolicy(SecPolicyRef policy, CFStringRef idString, uint32 keyUsage, CFTypeRef keychainOrArray, Boolean returnOnlyValidIdentities, SecIdentitySearchRef* searchRef)
|
/macosx-10.10/WebKit2-7600.1.25/WebProcess/Cookies/cf/ |
H A D | WebCookieManagerCFNet.cpp | 43 void WebCookieManager::platformSetHTTPCookieAcceptPolicy(HTTPCookieAcceptPolicy policy) argument 51 CFHTTPCookieStorageSetCookieAcceptPolicy(defaultCookieStorage, policy); 56 CFHTTPCookieStorageSetCookieAcceptPolicy(cookieStorage.get(), policy);
|
/macosx-10.10/BerkeleyDB-21/db/repmgr/ |
H A D | repmgr_stub.c | 73 __repmgr_get_ack_policy(dbenv, policy) 75 int *policy; 77 COMPQUIET(policy, NULL); 87 __repmgr_set_ack_policy(dbenv, policy) 89 int policy; 91 COMPQUIET(policy, 0);
|
/macosx-10.10/WebKit2-7600.1.25/WebProcess/Cookies/ |
H A D | WebCookieManager.messages.in | 32 void SetHTTPCookieAcceptPolicy(uint32_t policy)
|
/macosx-10.10/cups-408/cups/scheduler/ |
H A D | policy.h | 2 * "$Id: policy.h 11093 2013-07-03 20:48:42Z msweet $" 46 extern cupsd_policy_t *cupsdAddPolicy(const char *policy); 53 extern cupsd_policy_t *cupsdFindPolicy(const char *policy); 62 * End of "$Id: policy.h 11093 2013-07-03 20:48:42Z msweet $".
|
H A D | policy.c | 2 * "$Id: policy.c 11742 2014-03-26 21:14:15Z msweet $" 35 * 'cupsdAddPolicy()' - Add a policy to the system. 39 cupsdAddPolicy(const char *policy) /* I - Name of policy */ argument 41 cupsd_policy_t *temp; /* Pointer to policy */ 44 if (!policy) 58 cupsdSetString(&temp->name, policy); 67 * 'cupsdAddPolicyOp()' - Add an operation to a policy. 70 cupsd_location_t * /* O - New policy operation */ 75 cupsd_location_t *temp; /* New policy operatio 187 cupsdFindPolicy(const char *policy) argument 262 cupsdGetPrivateAttrs( cupsd_policy_t *policy, cupsd_client_t *con, cupsd_printer_t *printer, const char *owner) argument [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTool/ |
H A D | trusted_cert_utils.c | 272 /* convert a policy string to a SecPolicyRef */ 393 /* policy string --> CSSM_OID */ 395 const char *policy) 397 if(policy == NULL) { 400 if(!strcmp(policy, "ssl")) { 403 else if(!strcmp(policy, "smime")) { 406 else if(!strcmp(policy, "codeSign")) { 409 else if(!strcmp(policy, "IPSec")) { 412 else if(!strcmp(policy, "iChat")) { 415 else if(!strcmp(policy, "basi 394 policyStringToOid( const char *policy) argument [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/cgVerifyParsed/ |
H A D | tpVerifyParsed.h | 17 const CSSM_OID *policy, // optional
|