Searched refs:policy (Results 251 - 275 of 479) sorted by relevance

<<11121314151617181920

/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A DSecCMS.c376 CFTypeRef policy, SecTrustRef *trustref, CFArrayRef additional_certs,
405 if (policy) { /* if no policy is given skip verification */
409 require_noerr_action_quiet(SecCmsSignedDataVerifySignerInfo(sigd, 0, NULL, policy, trustref),
421 require_noerr_action_quiet(SecCmsSignedDataVerifySignerInfo(sigd, j, NULL, policy, &trustRef),
504 CFTypeRef policy, SecTrustRef *trustref,
507 OSStatus status = SecCMSVerifySignedData_internal(message, detached_contents, policy, trustref, NULL, attached_contents, signed_attributes);
513 CFTypeRef policy, SecTrustRef *trustref, CFArrayRef additional_certificates,
517 OSStatus status = SecCMSVerifySignedData_internal(message, detached_contents, policy, trustref, additional_certificates, attached_contents, &signed_attributes);
527 CFTypeRef policy, SecTrustRe
375 SecCMSVerifySignedData_internal(CFDataRef message, CFDataRef detached_contents, CFTypeRef policy, SecTrustRef *trustref, CFArrayRef additional_certs, CFDataRef *attached_contents, CFDictionaryRef *signed_attributes) argument
503 SecCMSVerifyCopyDataAndAttributes(CFDataRef message, CFDataRef detached_contents, CFTypeRef policy, SecTrustRef *trustref, CFDataRef *attached_contents, CFDictionaryRef *signed_attributes) argument
512 SecCMSVerifySignedData(CFDataRef message, CFDataRef detached_contents, CFTypeRef policy, SecTrustRef *trustref, CFArrayRef additional_certificates, CFDataRef *attached_contents, CFDictionaryRef *message_attributes) argument
526 SecCMSVerify(CFDataRef message, CFDataRef detached_contents, CFTypeRef policy, SecTrustRef *trustref, CFDataRef *attached_contents) argument
[all...]
/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/
H A Dcmssiginfo.c1091 CFTypeRef policy;
1094 policy = CERT_PolicyForCertUsage(certUsageEmailRecipient);
1095 if (CERT_VerifyCert(keychainOrArray, cert, policy, CFAbsoluteTimeGetCurrent(), NULL) != SECSuccess) {
1096 CFRelease(policy);
1099 CFRelease(policy);
1143 CFTypeRef policy;
1146 policy = CERT_PolicyForCertUsage(certUsageEmailRecipient);
1147 if (CERT_VerifyCert(keychainOrArray, cert, policy, CFAbsoluteTimeGetCurrent(), NULL) != SECSuccess) {
1148 CFRelease(policy);
1151 CFRelease(policy);
[all...]
/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/
H A Dcmssiginfo.c1091 CFTypeRef policy;
1094 policy = CERT_PolicyForCertUsage(certUsageEmailRecipient);
1095 if (CERT_VerifyCert(keychainOrArray, cert, policy, CFAbsoluteTimeGetCurrent(), NULL) != SECSuccess) {
1096 CFRelease(policy);
1099 CFRelease(policy);
1143 CFTypeRef policy;
1146 policy = CERT_PolicyForCertUsage(certUsageEmailRecipient);
1147 if (CERT_VerifyCert(keychainOrArray, cert, policy, CFAbsoluteTimeGetCurrent(), NULL) != SECSuccess) {
1148 CFRelease(policy);
1151 CFRelease(policy);
[all...]
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/
H A Dcmssiginfo.c1091 CFTypeRef policy;
1094 policy = CERT_PolicyForCertUsage(certUsageEmailRecipient);
1095 if (CERT_VerifyCert(keychainOrArray, cert, policy, CFAbsoluteTimeGetCurrent(), NULL) != SECSuccess) {
1096 CFRelease(policy);
1099 CFRelease(policy);
1143 CFTypeRef policy;
1146 policy = CERT_PolicyForCertUsage(certUsageEmailRecipient);
1147 if (CERT_VerifyCert(keychainOrArray, cert, policy, CFAbsoluteTimeGetCurrent(), NULL) != SECSuccess) {
1148 CFRelease(policy);
1151 CFRelease(policy);
[all...]
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/
H A DTrust.cpp204 SecPointer<Policy> policy = Policy::required(SecPolicyRef(item)); local
205 return CssmField(policy->oid(), policy->value());
335 // If a new unified revocation policy was explicitly specified,
337 // Note that the caller could configure revocation policy options
343 // caller has explicitly set the revocation policy they want to use
344 secdebug("evTrust", "Trust::evaluate() using explicit revocation policy (%d)",
351 // and did not explicitly specify the revocation policy;
671 SecPointer<Policy> policy = (CFArrayGetCount(mPolicies)) ? local
674 mResult == kSecTrustResultUnspecified && mResultIndex < mCertChain.size() && policy;
[all...]
H A DSecTrust.cpp134 Trust::AnchorPolicy policy = (anchorCertificatesOnly) ? Trust::useAnchorsOnly : Trust::useAnchorsAndBuiltIns; local
135 Trust::required(trust)->anchorPolicy(policy);
358 // caller has explicitly set the network policy
803 SecPolicyRef policy, SecTrustUserSetting *trustSetting)
810 Policy::required(policy),
820 SecPolicyRef policy, SecTrustUserSetting trustSetting)
826 Policy::required(policy);
851 CFDictionaryAddValue(usageDict, kSecTrustSettingsPolicy, policy);
869 SecPolicyRef policy, SecTrustUserSetting trustSetting)
883 Policy::required(policy),
802 SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) argument
819 SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
868 SecTrustSetUserTrustLegacy(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DTrust.cpp204 SecPointer<Policy> policy = Policy::required(SecPolicyRef(item)); local
205 return CssmField(policy->oid(), policy->value());
335 // If a new unified revocation policy was explicitly specified,
337 // Note that the caller could configure revocation policy options
343 // caller has explicitly set the revocation policy they want to use
344 secdebug("evTrust", "Trust::evaluate() using explicit revocation policy (%d)",
351 // and did not explicitly specify the revocation policy;
671 SecPointer<Policy> policy = (CFArrayGetCount(mPolicies)) ? local
674 mResult == kSecTrustResultUnspecified && mResultIndex < mCertChain.size() && policy;
[all...]
H A DSecTrust.cpp134 Trust::AnchorPolicy policy = (anchorCertificatesOnly) ? Trust::useAnchorsOnly : Trust::useAnchorsAndBuiltIns; local
135 Trust::required(trust)->anchorPolicy(policy);
358 // caller has explicitly set the network policy
803 SecPolicyRef policy, SecTrustUserSetting *trustSetting)
810 Policy::required(policy),
820 SecPolicyRef policy, SecTrustUserSetting trustSetting)
826 Policy::required(policy);
851 CFDictionaryAddValue(usageDict, kSecTrustSettingsPolicy, policy);
869 SecPolicyRef policy, SecTrustUserSetting trustSetting)
883 Policy::required(policy),
802 SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) argument
819 SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
868 SecTrustSetUserTrustLegacy(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DTrust.cpp204 SecPointer<Policy> policy = Policy::required(SecPolicyRef(item)); local
205 return CssmField(policy->oid(), policy->value());
335 // If a new unified revocation policy was explicitly specified,
337 // Note that the caller could configure revocation policy options
343 // caller has explicitly set the revocation policy they want to use
344 secdebug("evTrust", "Trust::evaluate() using explicit revocation policy (%d)",
351 // and did not explicitly specify the revocation policy;
671 SecPointer<Policy> policy = (CFArrayGetCount(mPolicies)) ? local
674 mResult == kSecTrustResultUnspecified && mResultIndex < mCertChain.size() && policy;
[all...]
H A DSecTrust.cpp134 Trust::AnchorPolicy policy = (anchorCertificatesOnly) ? Trust::useAnchorsOnly : Trust::useAnchorsAndBuiltIns; local
135 Trust::required(trust)->anchorPolicy(policy);
358 // caller has explicitly set the network policy
803 SecPolicyRef policy, SecTrustUserSetting *trustSetting)
810 Policy::required(policy),
820 SecPolicyRef policy, SecTrustUserSetting trustSetting)
826 Policy::required(policy);
851 CFDictionaryAddValue(usageDict, kSecTrustSettingsPolicy, policy);
869 SecPolicyRef policy, SecTrustUserSetting trustSetting)
883 Policy::required(policy),
802 SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) argument
819 SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
868 SecTrustSetUserTrustLegacy(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_manifest/lib/
H A DAppleManifest.cpp706 SecPolicyRef policy, ManifestInternal *manifest)
717 SecPolicyRef originalPolicy = policy;
719 if (policy == NULL)
725 result = SecPolicySearchCopyNext (search, &policy);
777 result = SecCmsSignedDataVerifySignerInfo (signedData, j, NULL, policy, &trustRef);
837 CFRelease (policy);
704 Verify(CFDataRef data, SecManifestTrustSetupCallback setupCallback, void* setupContext, SecManifestTrustEvaluateCallback evaluateCallback, void* evaluateContext, SecPolicyRef policy, ManifestInternal *manifest) argument
/macosx-10.10/vim-55/runtime/syntax/
H A Dgpg.vim56 \ secret-keyring set-filename set-policy-url status-fd
81 \ no-show-policy-url no-sig-cache no-sig-create-check
86 \ show-policy-url show-session-key simple-sk-checksum
/macosx-10.10/Security-57031.1.35/Security/utilities/src/
H A DSecCertificateTrace.c516 CFStringRef policy = SecCFStringCopyEncodingDelimiters(CFDictionaryGetValue(certRecord, kCertStatsPolicy), kCertStatsDelimiters);
527 kCertStatsPolicy, policy,
534 CFReleaseSafe(policy);
/macosx-10.10/Security-57031.1.35/Security/utilities/utilities/
H A DSecCertificateTrace.c516 CFStringRef policy = SecCFStringCopyEncodingDelimiters(CFDictionaryGetValue(certRecord, kCertStatsPolicy), kCertStatsDelimiters);
527 kCertStatsPolicy, policy,
534 CFReleaseSafe(policy);
/macosx-10.10/xnu-2782.1.97/osfmk/kern/
H A Dwait_queue.c221 * KERN_INVALID_ARGUMENT - The policy parameter was invalid
226 int policy)
229 if ((policy & SYNC_POLICY_FIXED_PRIORITY) != 0)
232 wq->wq_fifo = ((policy & SYNC_POLICY_REVERSED) == 0);
253 int policy)
260 ret = wait_queue_init(wq, policy);
294 * KERN_INVALID_ARGUMENT - The policy parameter was invalid
299 int policy)
303 ret = wait_queue_init(&wqset->wqs_wait_queue, policy);
308 if (policy
224 wait_queue_init( wait_queue_t wq, int policy) argument
252 wait_queue_alloc( int policy) argument
297 wait_queue_set_init( wait_queue_set_t wqset, int policy) argument
319 wait_queue_sub_init( wait_queue_set_t wqset, int policy) argument
361 wait_queue_set_alloc( int policy) argument
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/
H A Dget_s.c225 out->policy = strdup("default");
228 out->policy = strdup(ext->data.u.policy);
229 if (out->policy == NULL) {
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/clAppUtils/
H A DtpUtils.h134 const CSSM_OID *policy, // optional
/macosx-10.10/ipsec-286.1.1/ipsec-tools/Common/
H A Dpfkey.c863 u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq)
870 policy, policylen, seq, NULL, NULL, NULL, 0)) < 0)
884 struct sockaddr_storage *dst_end, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq, char *ipsec_if,
892 policy, policylen, seq, ipsec_if, internal_if, outgoing_if, disabled)) < 0)
906 caddr_t policy, int policylen, u_int32_t seq)
913 policy, policylen, seq, NULL, NULL, NULL, 0)) < 0)
927 u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq)
934 policy, policylen, seq, NULL, NULL, NULL, 0)) < 0)
949 caddr_t policy, int policylen, u_int32_t seq)
956 policy, policyle
862 pfkey_send_spdadd(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
883 pfkey_send_spdadd_with_interface(int so, struct sockaddr_storage *src, struct sockaddr_storage *src_end, u_int prefs, struct sockaddr_storage *dst, struct sockaddr_storage *dst_end, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq, char *ipsec_if, char *internal_if, char *outgoing_if, u_int disabled) argument
905 pfkey_send_spdadd2(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) argument
926 pfkey_send_spdupdate(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
947 pfkey_send_spdupdate2(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) argument
969 pfkey_send_spddelete(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
1051 pfkey_send_spdsetidx(int so, struct sockaddr_storage *src, u_int prefs, struct sockaddr_storage *dst, u_int prefd, u_int proto, caddr_t policy, int policylen, u_int32_t seq) argument
1429 pfkey_send_x4(int so, u_int type, struct sockaddr_storage *src, struct sockaddr_storage *src_end, u_int prefs, struct sockaddr_storage *dst, struct sockaddr_storage *dst_end, u_int prefd, u_int proto, u_int64_t ltime, u_int64_t vtime, char *policy, int policylen, u_int32_t seq, char *ipsec_if, char *internal_if, char *outgoing_if, u_int disabled) argument
[all...]
/macosx-10.10/libpthread-105.1.4/src/
H A Dinternal.h134 policy:8, member in struct:_pthread
188 policy:8, member in struct:_pthread_attr_t
223 policy:3, member in struct:__anon9628
231 policy:3, member in struct:_pthread_mutex_options
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/
H A Dpfkey_racoon.c88 #include "policy.h"
1802 * than one in the policy, so kernel will drop them;
1830 * If there is a phase 2 handler against the policy identifier in
1855 plog(ASL_LEVEL_ERR, "no policy found: id:%d.\n",
1862 /* get inbound policy */
1880 "No in-bound policy found: %s\n",
2108 caddr_t policy, p; local
2113 /* get policy buffer size */
2127 /* make policy structure */
2128 policy
2213 caddr_t policy = NULL; local
2314 caddr_t policy = NULL; local
2415 caddr_t policy = NULL; local
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/
H A DtpPolicies.cpp20 policies.cpp - TP module policy implementation
134 * Certificate policy OIDs
1189 TPPolicy policy,
1328 if((policy == kTP_IPSec) && (tpCompareOids(purpose, &CSSMOID_EKU_IPSec))) {
1387 TPPolicy policy,
1393 bool iChat = (policy == kTP_iChat) ? true : false;
1418 /* Verify optional email address, a.k.a. handle for iChat policy */
1526 tpPolicyError("SMIME policy: error fetching subjectName");
1549 tpPolicyError("SMIME policy fail: empty subject name and "
1568 tpPolicyError("SMIME policy fai
1188 tp_verifySslOpts( TPPolicy policy, TPCertGroup &certGroup, const CSSM_DATA *sslFieldOpts, const iSignCertInfo *certInfo) argument
1386 tp_verifySmimeOpts( TPPolicy policy, TPCertGroup &certGroup, const CSSM_DATA *smimeFieldOpts, const iSignCertInfo *certInfo) argument
1911 tp_verifyCodePkgSignOpts( TPPolicy policy, TPCertGroup &certGroup, const CSSM_DATA *fieldOpts, const iSignCertInfo *certInfo) argument
2694 tp_policyVerify( TPPolicy policy, Allocator &alloc, CSSM_CL_HANDLE clHand, CSSM_CSP_HANDLE cspHand, TPCertGroup *certGroup, CSSM_BOOL verifiedToRoot, CSSM_BOOL verifiedViaTrustSetting, CSSM_APPLE_TP_ACTION_FLAGS actionFlags, const CSSM_DATA *policyFieldData, void *policyOpts) argument
3294 tp_policyTrustSettingParams( TPPolicy policy, const CSSM_DATA *policyData, const char **policyStr, uint32 *policyStrLen, SecTrustSettingsKeyUsage *keyUse) argument
[all...]
H A DtpCrlVerify.cpp38 /* general purpose, switch to policy-specific code based on TPVerifyContext.policy */
43 switch(tpVerifyContext.policy) {
320 assert(vfyCtx.policy == kRevokeCrlBasic);
350 /* Another revocation policy claimed that this cert is good to go */
/macosx-10.10/Heimdal-398.1.2/kadmin/
H A Dank.c72 char *policy,
99 expiration, pw_expiration, attributes, policy);
66 add_one_principal(const char *name, int rand_key, int rand_password, int use_defaults, int verbose_flag, char *password, char *policy, krb5_key_data *key_data, const char *max_ticket_life, const char *max_renewable_life, const char *attributes, const char *expiration, const char *pw_expiration) argument
H A Dkadmin.local88 #Kerberos should pick up policy from policy data
93 #Kerberos should pick up policy from policy data
104 -policy)
105 # policy%dmin
/macosx-10.10/OpenSSL098-52/src/crypto/x509/
H A Dx509_vpm.c259 int X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, ASN1_OBJECT *policy) argument
267 if (!sk_ASN1_OBJECT_push(param->policies, policy))

Completed in 243 milliseconds

<<11121314151617181920