/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-27-sectrust-exceptions.c | 310 SecPolicyRef policy = SecPolicyCreateSSL(false, CFSTR("store.apple.com")); local 313 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust"); 329 CFReleaseSafe(policy); 330 policy = SecPolicyCreateSSL(false, CFSTR("badstore.apple.com")); 331 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust with hostname mismatch"); 343 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust"); 375 CFReleaseSafe(policy);
|
H A D | si-70-sectrust-unified.c | 239 SecPolicyRef policy = NULL; local 249 policy = SecPolicyCreateSSL(server, CFSTR("xedge.apple.com")); // deliberate hostname mismatch 250 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), 276 isnt(revocation, NULL, "create revocation policy"); 310 /* Test creation of a policy via SecPolicyCreateWithProperties */ 311 CFReleaseNull(policy); 319 policy = SecPolicyCreateWithProperties(kSecPolicyAppleSSL, properties); 320 isnt(policy, NULL, "SecPolicyCreateWithProperties"); 324 /* Test introspection of a policy's properties via SecPolicyCopyProperties */ 327 isnt(properties = SecPolicyCopyProperties(policy), NUL [all...] |
H A D | si-20-sectrust.c | 639 SecPolicyRef policy = SecPolicyCreateSSL(false, NULL); local 644 is_status(SecTrustCreateWithCertificates(kCFBooleanTrue, policy, &trust), 647 errSecParam, "create trust with boolean instead of policy"); 650 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust"); 720 ok_status(SecTrustCreateWithCertificates(cert0, policy, &trust), 744 CFReleaseSafe(policy); 747 policy = SecPolicyCreateSSL(server, CFSTR("xedge2.apple.com")); 748 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), 771 CFReleaseSafe(policy); 773 policy [all...] |
H A D | si-24-sectrust-shoebox.c | 823 SecPolicyRef policy; local 836 SecPolicyRef policy, SecTrustRef *trustref, CFArrayRef additional_certificates, 841 isnt(policy = SecPolicyCreatePassbookCardSigner(CFSTR("pass.com.apple.cardman"), CFSTR("A1B2C3D4E5")), 842 NULL, "create policy"); 843 ok_status(SecCMSVerifySignedData(goodSig, goodManifest, policy, NULL, NULL, NULL, NULL), "verify signed data 1"); 844 CFReleaseNull(policy); 847 policy = NULL; 850 isnt(policy = SecPolicyCreatePassbookCardSigner(CFSTR("pass.com.apple.cardman"), CFSTR("IAMBOGUS")), 851 NULL, "create policy"); 852 isnt(SecCMSVerifySignedData(badSig, badManifest, policy, NUL 877 SecPolicyRef policy; local [all...] |
/macosx-10.10/eap8021x-198/EAP8021X.fproj/ |
H A D | EAPTLSUtil.c | 1227 SecPolicyRef policy = NULL; local 1244 policy = SecPolicyCreateEAP(FALSE, trusted_server_names); 1245 if (policy == NULL) { 1248 status = SecTrustCreateWithCertificates(server_certs, policy, &trust); 1323 my_CFRelease(&policy); 1614 SecPolicyRef policy = NULL; local 1667 status = EAPSecPolicyCopy(&policy); 1671 status = SecTrustCreateWithCertificates(server_certs, policy, &trust); 1761 my_CFRelease(&policy);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/sslViewer/ |
H A D | sslAppUtils.cpp | 530 SecPolicyRef policy = NULL; 579 ortn = SecPolicySearchCopyNext(policySearch, &policy); 585 /* build a SecTrustRef for specified policy and certs */ 587 policy, &secTrust); 681 if(policy) { 682 CFRelease(policy);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/clAppUtils/ |
H A D | sslAppUtils.cpp | 448 NULL, // SSL policy 521 SecPolicyRef policy = NULL; local 570 ortn = SecPolicySearchCopyNext(policySearch, &policy); 576 /* build a SecTrustRef for specified policy and certs */ 578 policy, &secTrust); 672 if(policy) { 673 CFRelease(policy); 691 const CSSM_OID *vfyPolicy, // optional - if NULL, use SSL policy to complete
|
/macosx-10.10/Security-57031.1.35/sslViewer/ |
H A D | sslAppUtils.cpp | 521 SecPolicyRef policy = NULL; 570 ortn = SecPolicySearchCopyNext(policySearch, &policy); 576 /* build a SecTrustRef for specified policy and certs */ 578 policy, &secTrust); 672 if(policy) { 673 CFRelease(policy);
|
/macosx-10.10/network_cmds-457/traceroute6.tproj/ |
H A D | traceroute6.c | 310 int setpolicy(int so, char *policy); 986 setpolicy(so, policy) 988 char *policy; 992 buf = ipsec_set_policy(policy, strlen(policy));
|
/macosx-10.10/ruby-106/ruby/ |
H A D | thread_pthread.c | 937 int policy; local 940 pthread_getschedparam(th->thread_id, &policy, &sp); 941 max = sched_get_priority_max(policy); 942 min = sched_get_priority_min(policy); 952 pthread_setschedparam(th->thread_id, policy, &sp);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/ |
H A D | tpCertGroup.cpp | 376 * Map a policy OID to one of the standard (non-revocation) policies. 377 * Returns true if it's a standard policy. 508 * PolicyIdentifiers, Optional policy OID. NULL indicates default 509 * X.509 trust policy. 533 * policy action. 563 /* keep track of whether we did policy checking; if not, we do defaults */ 634 /* default policy OID in case caller hasn't specified one */ 638 /* keep going, I guess - no policy-specific info - use kTPx509Basic */ 646 /* keep going, I guess - no policy-specific info - use kTPx509Basic */ 649 /* get policy [all...] |
/macosx-10.10/ipsec-286.1.1/ipsec-tools/Common/ |
H A D | key_debug.c | 547 printf("kdebug_sadb_x_policy: wrong policy struct.\n"); 552 printf("invalid ipsec policy length\n"); 563 panic("kdebug_sadb_x_policy: wrong policy struct.\n"); 609 printf("secpolicy{ refcnt=%u state=%u policy=%u\n", 610 sp->refcnt, sp->state, sp->policy); 614 switch (sp->policy) { 645 printf("kdebug_secpolicy: Invalid policy found. %d\n", 646 sp->policy);
|
/macosx-10.10/xnu-2782.1.97/bsd/netkey/ |
H A D | key_debug.c | 481 printf("kdebug_sadb_x_policy: wrong policy struct.\n"); 486 printf("invalid ipsec policy length\n"); 497 panic("kdebug_sadb_x_policy: wrong policy struct.\n"); 513 printf("secpolicy{ refcnt=%u state=%u policy=%u\n", 514 sp->refcnt, sp->state, sp->policy); 518 switch (sp->policy) { 545 printf("kdebug_secpolicy: Invalid policy found. %d\n", 546 sp->policy);
|
/macosx-10.10/xnu-2782.1.97/osfmk/kern/ |
H A D | processor.c | 64 #include <mach/policy.h> 774 * Allow indicated policy on processor set. 780 __unused int policy) 788 * Forbid indicated policy on processor set. Time sharing cannot 794 __unused int policy, 1018 * Allows control of enabled policies, and per-policy base and limit 778 processor_set_policy_enable( __unused processor_set_t pset, __unused int policy) argument 792 processor_set_policy_disable( __unused processor_set_t pset, __unused int policy, __unused boolean_t change_threads) argument
|
H A D | sync_sema.c | 161 int policy, 169 if (task == TASK_NULL || value < 0 || policy > SYNC_POLICY_MAX) 177 kret = wait_queue_init(&s->wait_queue, policy); /* also inits lock */ 158 semaphore_create( task_t task, semaphore_t *new_semaphore, int policy, int value) argument
|
/macosx-10.10/xnu-2782.1.97/tools/tests/MPMMTest/ |
H A D | MPMMtest.c | 331 thread_affinity_policy_data_t policy; local 344 policy.affinity_tag = tag; 347 (thread_policy_t) &policy,
|
/macosx-10.10/Heimdal-398.1.2/tests/gss/ |
H A D | check-context.in | 340 echo "host without ok-as-delegate with policy-delegate" ; > ${testdir}/messages.log 343 --policy-delegate \ 348 echo "ok-as-delegate used by policy" ; > ${testdir}/messages.log 351 --policy-delegate \ 360 echo "policy delegate to non delegate host" ; > ${testdir}/messages.log 363 --policy-delegate \
|
/macosx-10.10/Security-57031.1.35/Security/include/security_smime/ |
H A D | tsaSupport.c | 1017 CFTypeRef policy = CFRetainSafe(timeStampPolicy); local 1021 if (!policy) { 1022 require(policy = SecPolicyCreateWithOID(kSecPolicyAppleTimeStamping), xit); 1038 result = SecCmsSignedDataVerifySignerInfo (signedData, jx, NULL, policy, &trustRef); 1099 if (policy) 1100 CFRelease (policy);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_smime/lib/ |
H A D | tsaSupport.c | 1017 CFTypeRef policy = CFRetainSafe(timeStampPolicy); local 1021 if (!policy) { 1022 require(policy = SecPolicyCreateWithOID(kSecPolicyAppleTimeStamping), xit); 1038 result = SecCmsSignedDataVerifySignerInfo (signedData, jx, NULL, policy, &trustRef); 1099 if (policy) 1100 CFRelease (policy);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/cmstool/testSubjects/ |
H A D | ptext1.txt | 166 SecPolicyRef policy = NULL; 177 ortn = SecPolicySearchCopyNext(policySearch, &policy); 191 policy, &secTrust);
|
/macosx-10.10/BerkeleyDB-21/db/java/src/com/sleepycat/db/ |
H A D | Environment.java | 958 @param policy 959 The policy defines the startup characteristics of a replication group. 963 int nthreads, ReplicationManagerStartPolicy policy) 966 dbenv.repmgr_start(nthreads, policy.getId()); 962 replicationManagerStart( int nthreads, ReplicationManagerStartPolicy policy) argument
|
/macosx-10.10/Heimdal-398.1.2/tests/apple/ |
H A D | check-apple-ad.in | 112 echo " check delegation (spnego w/ kerberos credentials policy)" 113 ${http_client} --mech=spnego --cred-mech=krb5 --policy --client=ktestuser@ADS.APPLE.COM \
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Tool/ |
H A D | codesign.c | 370 SecPolicyRef policy = SecPolicyCreateiPhoneApplicationSigning(); local 373 if (SecCMSVerify(signed_data, code_dir, policy, NULL, NULL)) {
|
/macosx-10.10/WebCore-7600.1.25/loader/cache/ |
H A D | CachedImage.cpp | 571 bool CachedImage::mustRevalidateDueToCacheHeaders(CachePolicy policy) const 581 return CachedResource::mustRevalidateDueToCacheHeaders(policy);
|
/macosx-10.10/xnu-2782.1.97/bsd/netinet6/ |
H A D | ip6_forward.c | 265 /* get a security policy for this packet */ 284 /* check policy */ 285 switch (sp->policy) { 332 printf("ip6_forward: Invalid policy found. %d\n", sp->policy);
|