/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecCMS.c | 376 CFTypeRef policy, SecTrustRef *trustref, CFArrayRef additional_certs, 405 if (policy) { /* if no policy is given skip verification */ 409 require_noerr_action_quiet(SecCmsSignedDataVerifySignerInfo(sigd, 0, NULL, policy, trustref), 421 require_noerr_action_quiet(SecCmsSignedDataVerifySignerInfo(sigd, j, NULL, policy, &trustRef), 504 CFTypeRef policy, SecTrustRef *trustref, 507 OSStatus status = SecCMSVerifySignedData_internal(message, detached_contents, policy, trustref, NULL, attached_contents, signed_attributes); 513 CFTypeRef policy, SecTrustRef *trustref, CFArrayRef additional_certificates, 517 OSStatus status = SecCMSVerifySignedData_internal(message, detached_contents, policy, trustref, additional_certificates, attached_contents, &signed_attributes); 527 CFTypeRef policy, SecTrustRe 375 SecCMSVerifySignedData_internal(CFDataRef message, CFDataRef detached_contents, CFTypeRef policy, SecTrustRef *trustref, CFArrayRef additional_certs, CFDataRef *attached_contents, CFDictionaryRef *signed_attributes) argument 503 SecCMSVerifyCopyDataAndAttributes(CFDataRef message, CFDataRef detached_contents, CFTypeRef policy, SecTrustRef *trustref, CFDataRef *attached_contents, CFDictionaryRef *signed_attributes) argument 512 SecCMSVerifySignedData(CFDataRef message, CFDataRef detached_contents, CFTypeRef policy, SecTrustRef *trustref, CFArrayRef additional_certificates, CFDataRef *attached_contents, CFDictionaryRef *message_attributes) argument 526 SecCMSVerify(CFDataRef message, CFDataRef detached_contents, CFTypeRef policy, SecTrustRef *trustref, CFDataRef *attached_contents) argument [all...] |
/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/ |
H A D | cmssiginfo.c | 1091 CFTypeRef policy; 1094 policy = CERT_PolicyForCertUsage(certUsageEmailRecipient); 1095 if (CERT_VerifyCert(keychainOrArray, cert, policy, CFAbsoluteTimeGetCurrent(), NULL) != SECSuccess) { 1096 CFRelease(policy); 1099 CFRelease(policy); 1143 CFTypeRef policy; 1146 policy = CERT_PolicyForCertUsage(certUsageEmailRecipient); 1147 if (CERT_VerifyCert(keychainOrArray, cert, policy, CFAbsoluteTimeGetCurrent(), NULL) != SECSuccess) { 1148 CFRelease(policy); 1151 CFRelease(policy); [all...] |
/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/ |
H A D | cmssiginfo.c | 1091 CFTypeRef policy; 1094 policy = CERT_PolicyForCertUsage(certUsageEmailRecipient); 1095 if (CERT_VerifyCert(keychainOrArray, cert, policy, CFAbsoluteTimeGetCurrent(), NULL) != SECSuccess) { 1096 CFRelease(policy); 1099 CFRelease(policy); 1143 CFTypeRef policy; 1146 policy = CERT_PolicyForCertUsage(certUsageEmailRecipient); 1147 if (CERT_VerifyCert(keychainOrArray, cert, policy, CFAbsoluteTimeGetCurrent(), NULL) != SECSuccess) { 1148 CFRelease(policy); 1151 CFRelease(policy); [all...] |
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/ |
H A D | cmssiginfo.c | 1091 CFTypeRef policy; 1094 policy = CERT_PolicyForCertUsage(certUsageEmailRecipient); 1095 if (CERT_VerifyCert(keychainOrArray, cert, policy, CFAbsoluteTimeGetCurrent(), NULL) != SECSuccess) { 1096 CFRelease(policy); 1099 CFRelease(policy); 1143 CFTypeRef policy; 1146 policy = CERT_PolicyForCertUsage(certUsageEmailRecipient); 1147 if (CERT_VerifyCert(keychainOrArray, cert, policy, CFAbsoluteTimeGetCurrent(), NULL) != SECSuccess) { 1148 CFRelease(policy); 1151 CFRelease(policy); [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | Trust.cpp | 204 SecPointer<Policy> policy = Policy::required(SecPolicyRef(item)); local 205 return CssmField(policy->oid(), policy->value()); 335 // If a new unified revocation policy was explicitly specified, 337 // Note that the caller could configure revocation policy options 343 // caller has explicitly set the revocation policy they want to use 344 secdebug("evTrust", "Trust::evaluate() using explicit revocation policy (%d)", 351 // and did not explicitly specify the revocation policy; 671 SecPointer<Policy> policy = (CFArrayGetCount(mPolicies)) ? local 674 mResult == kSecTrustResultUnspecified && mResultIndex < mCertChain.size() && policy; [all...] |
H A D | SecTrust.cpp | 134 Trust::AnchorPolicy policy = (anchorCertificatesOnly) ? Trust::useAnchorsOnly : Trust::useAnchorsAndBuiltIns; local 135 Trust::required(trust)->anchorPolicy(policy); 358 // caller has explicitly set the network policy 803 SecPolicyRef policy, SecTrustUserSetting *trustSetting) 810 Policy::required(policy), 820 SecPolicyRef policy, SecTrustUserSetting trustSetting) 826 Policy::required(policy); 851 CFDictionaryAddValue(usageDict, kSecTrustSettingsPolicy, policy); 869 SecPolicyRef policy, SecTrustUserSetting trustSetting) 883 Policy::required(policy), 802 SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) argument 819 SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument 868 SecTrustSetUserTrustLegacy(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | Trust.cpp | 204 SecPointer<Policy> policy = Policy::required(SecPolicyRef(item)); local 205 return CssmField(policy->oid(), policy->value()); 335 // If a new unified revocation policy was explicitly specified, 337 // Note that the caller could configure revocation policy options 343 // caller has explicitly set the revocation policy they want to use 344 secdebug("evTrust", "Trust::evaluate() using explicit revocation policy (%d)", 351 // and did not explicitly specify the revocation policy; 671 SecPointer<Policy> policy = (CFArrayGetCount(mPolicies)) ? local 674 mResult == kSecTrustResultUnspecified && mResultIndex < mCertChain.size() && policy; [all...] |
H A D | SecTrust.cpp | 134 Trust::AnchorPolicy policy = (anchorCertificatesOnly) ? Trust::useAnchorsOnly : Trust::useAnchorsAndBuiltIns; local 135 Trust::required(trust)->anchorPolicy(policy); 358 // caller has explicitly set the network policy 803 SecPolicyRef policy, SecTrustUserSetting *trustSetting) 810 Policy::required(policy), 820 SecPolicyRef policy, SecTrustUserSetting trustSetting) 826 Policy::required(policy); 851 CFDictionaryAddValue(usageDict, kSecTrustSettingsPolicy, policy); 869 SecPolicyRef policy, SecTrustUserSetting trustSetting) 883 Policy::required(policy), 802 SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) argument 819 SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument 868 SecTrustSetUserTrustLegacy(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | Trust.cpp | 204 SecPointer<Policy> policy = Policy::required(SecPolicyRef(item)); local 205 return CssmField(policy->oid(), policy->value()); 335 // If a new unified revocation policy was explicitly specified, 337 // Note that the caller could configure revocation policy options 343 // caller has explicitly set the revocation policy they want to use 344 secdebug("evTrust", "Trust::evaluate() using explicit revocation policy (%d)", 351 // and did not explicitly specify the revocation policy; 671 SecPointer<Policy> policy = (CFArrayGetCount(mPolicies)) ? local 674 mResult == kSecTrustResultUnspecified && mResultIndex < mCertChain.size() && policy; [all...] |
H A D | SecTrust.cpp | 134 Trust::AnchorPolicy policy = (anchorCertificatesOnly) ? Trust::useAnchorsOnly : Trust::useAnchorsAndBuiltIns; local 135 Trust::required(trust)->anchorPolicy(policy); 358 // caller has explicitly set the network policy 803 SecPolicyRef policy, SecTrustUserSetting *trustSetting) 810 Policy::required(policy), 820 SecPolicyRef policy, SecTrustUserSetting trustSetting) 826 Policy::required(policy); 851 CFDictionaryAddValue(usageDict, kSecTrustSettingsPolicy, policy); 869 SecPolicyRef policy, SecTrustUserSetting trustSetting) 883 Policy::required(policy), 802 SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) argument 819 SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument 868 SecTrustSetUserTrustLegacy(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_manifest/lib/ |
H A D | AppleManifest.cpp | 706 SecPolicyRef policy, ManifestInternal *manifest) 717 SecPolicyRef originalPolicy = policy; 719 if (policy == NULL) 725 result = SecPolicySearchCopyNext (search, &policy); 777 result = SecCmsSignedDataVerifySignerInfo (signedData, j, NULL, policy, &trustRef); 837 CFRelease (policy); 704 Verify(CFDataRef data, SecManifestTrustSetupCallback setupCallback, void* setupContext, SecManifestTrustEvaluateCallback evaluateCallback, void* evaluateContext, SecPolicyRef policy, ManifestInternal *manifest) argument
|
/macosx-10.10/vim-55/runtime/syntax/ |
H A D | gpg.vim | 56 \ secret-keyring set-filename set-policy-url status-fd 81 \ no-show-policy-url no-sig-cache no-sig-create-check 86 \ show-policy-url show-session-key simple-sk-checksum
|
/macosx-10.10/Security-57031.1.35/Security/utilities/src/ |
H A D | SecCertificateTrace.c | 516 CFStringRef policy = SecCFStringCopyEncodingDelimiters(CFDictionaryGetValue(certRecord, kCertStatsPolicy), kCertStatsDelimiters); 527 kCertStatsPolicy, policy, 534 CFReleaseSafe(policy);
|
/macosx-10.10/Security-57031.1.35/Security/utilities/utilities/ |
H A D | SecCertificateTrace.c | 516 CFStringRef policy = SecCFStringCopyEncodingDelimiters(CFDictionaryGetValue(certRecord, kCertStatsPolicy), kCertStatsDelimiters); 527 kCertStatsPolicy, policy, 534 CFReleaseSafe(policy);
|
/macosx-10.10/xnu-2782.1.97/osfmk/kern/ |
H A D | wait_queue.c | 221 * KERN_INVALID_ARGUMENT - The policy parameter was invalid 226 int policy) 229 if ((policy & SYNC_POLICY_FIXED_PRIORITY) != 0) 232 wq->wq_fifo = ((policy & SYNC_POLICY_REVERSED) == 0); 253 int policy) 260 ret = wait_queue_init(wq, policy); 294 * KERN_INVALID_ARGUMENT - The policy parameter was invalid 299 int policy) 303 ret = wait_queue_init(&wqset->wqs_wait_queue, policy); 308 if (policy 224 wait_queue_init( wait_queue_t wq, int policy) argument 252 wait_queue_alloc( int policy) argument 297 wait_queue_set_init( wait_queue_set_t wqset, int policy) argument 319 wait_queue_sub_init( wait_queue_set_t wqset, int policy) argument 361 wait_queue_set_alloc( int policy) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/ |
H A D | get_s.c | 225 out->policy = strdup("default"); 228 out->policy = strdup(ext->data.u.policy); 229 if (out->policy == NULL) {
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/clAppUtils/ |
H A D | tpUtils.h | 134 const CSSM_OID *policy, // optional
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/Common/ |
H A D | pfkey.c | 863 u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) 870 policy, policylen, seq, NULL, NULL, NULL, 0)) < 0) 884 struct sockaddr_storage *dst_end, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq, char *ipsec_if, 892 policy, policylen, seq, ipsec_if, internal_if, outgoing_if, disabled)) < 0) 906 caddr_t policy, int policylen, u_int32_t seq) 913 policy, policylen, seq, NULL, NULL, NULL, 0)) < 0) 927 u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) 934 policy, policylen, seq, NULL, NULL, NULL, 0)) < 0) 949 caddr_t policy, int policylen, u_int32_t seq) 956 policy, policyle 862 pfkey_send_spdadd(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 883 pfkey_send_spdadd_with_interface(int so, struct sockaddr_storage *src, struct sockaddr_storage *src_end, u_int prefs, struct sockaddr_storage *dst, struct sockaddr_storage *dst_end, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq, char *ipsec_if, char *internal_if, char *outgoing_if, u_int disabled) argument 905 pfkey_send_spdadd2(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) argument 926 pfkey_send_spdupdate(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 947 pfkey_send_spdupdate2(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) argument 969 pfkey_send_spddelete(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 1051 pfkey_send_spdsetidx(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument 1429 pfkey_send_x4(int so, u_int type, struct sockaddr_storage *src, struct sockaddr_storage *src_end, u_int prefs, struct sockaddr_storage *dst, struct sockaddr_storage *dst_end, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, char *policy, int policylen, u_int32_t seq, char *ipsec_if, char *internal_if, char *outgoing_if, u_int disabled) argument [all...] |
/macosx-10.10/libpthread-105.1.4/src/ |
H A D | internal.h | 134 policy:8, member in struct:_pthread 188 policy:8, member in struct:_pthread_attr_t 223 policy:3, member in struct:__anon9628 231 policy:3, member in struct:_pthread_mutex_options
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | pfkey_racoon.c | 88 #include "policy.h" 1802 * than one in the policy, so kernel will drop them; 1830 * If there is a phase 2 handler against the policy identifier in 1855 plog(ASL_LEVEL_ERR, "no policy found: id:%d.\n", 1862 /* get inbound policy */ 1880 "No in-bound policy found: %s\n", 2108 caddr_t policy, p; local 2113 /* get policy buffer size */ 2127 /* make policy structure */ 2128 policy 2213 caddr_t policy = NULL; local 2314 caddr_t policy = NULL; local 2415 caddr_t policy = NULL; local [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/ |
H A D | tpPolicies.cpp | 20 policies.cpp - TP module policy implementation 134 * Certificate policy OIDs 1189 TPPolicy policy, 1328 if((policy == kTP_IPSec) && (tpCompareOids(purpose, &CSSMOID_EKU_IPSec))) { 1387 TPPolicy policy, 1393 bool iChat = (policy == kTP_iChat) ? true : false; 1418 /* Verify optional email address, a.k.a. handle for iChat policy */ 1526 tpPolicyError("SMIME policy: error fetching subjectName"); 1549 tpPolicyError("SMIME policy fail: empty subject name and " 1568 tpPolicyError("SMIME policy fai 1188 tp_verifySslOpts( TPPolicy policy, TPCertGroup &certGroup, const CSSM_DATA *sslFieldOpts, const iSignCertInfo *certInfo) argument 1386 tp_verifySmimeOpts( TPPolicy policy, TPCertGroup &certGroup, const CSSM_DATA *smimeFieldOpts, const iSignCertInfo *certInfo) argument 1911 tp_verifyCodePkgSignOpts( TPPolicy policy, TPCertGroup &certGroup, const CSSM_DATA *fieldOpts, const iSignCertInfo *certInfo) argument 2694 tp_policyVerify( TPPolicy policy, Allocator &alloc, CSSM_CL_HANDLE clHand, CSSM_CSP_HANDLE cspHand, TPCertGroup *certGroup, CSSM_BOOL verifiedToRoot, CSSM_BOOL verifiedViaTrustSetting, CSSM_APPLE_TP_ACTION_FLAGS actionFlags, const CSSM_DATA *policyFieldData, void *policyOpts) argument 3294 tp_policyTrustSettingParams( TPPolicy policy, const CSSM_DATA *policyData, const char **policyStr, uint32 *policyStrLen, SecTrustSettingsKeyUsage *keyUse) argument [all...] |
H A D | tpCrlVerify.cpp | 38 /* general purpose, switch to policy-specific code based on TPVerifyContext.policy */ 43 switch(tpVerifyContext.policy) { 320 assert(vfyCtx.policy == kRevokeCrlBasic); 350 /* Another revocation policy claimed that this cert is good to go */
|
/macosx-10.10/Heimdal-398.1.2/kadmin/ |
H A D | ank.c | 72 char *policy, 99 expiration, pw_expiration, attributes, policy); 66 add_one_principal(const char *name, int rand_key, int rand_password, int use_defaults, int verbose_flag, char *password, char *policy, krb5_key_data *key_data, const char *max_ticket_life, const char *max_renewable_life, const char *attributes, const char *expiration, const char *pw_expiration) argument
|
H A D | kadmin.local | 88 #Kerberos should pick up policy from policy data 93 #Kerberos should pick up policy from policy data 104 -policy) 105 # policy%dmin
|
/macosx-10.10/OpenSSL098-52/src/crypto/x509/ |
H A D | x509_vpm.c | 259 int X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, ASN1_OBJECT *policy) argument 267 if (!sk_ASN1_OBJECT_push(param->policies, policy))
|