/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | ACL.cpp | 7 * as defined in and that are subject to the Apple Public Source License 63 // parse the subject 64 parse(info.proto().subject()); 79 // parse subject 80 parse(owner.subject()); 140 // release subject form (if any) 221 // carefully copy the subject 224 proto = AclEntryPrototype(*mSubjectForm, mDelegate); // shares subject 226 walk(w, proto.subject()); // copy subject i 325 parse(const TypedList &subject) argument 378 parsePrompt(const TypedList &subject) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | ACL.cpp | 7 * as defined in and that are subject to the Apple Public Source License 63 // parse the subject 64 parse(info.proto().subject()); 79 // parse subject 80 parse(owner.subject()); 140 // release subject form (if any) 221 // carefully copy the subject 224 proto = AclEntryPrototype(*mSubjectForm, mDelegate); // shares subject 226 walk(w, proto.subject()); // copy subject i 325 parse(const TypedList &subject) argument 378 parsePrompt(const TypedList &subject) argument [all...] |
/macosx-10.10/emacs-93/emacs/lisp/obsolete/ |
H A D | rnewspost.el | 74 (define-key news-reply-mode-map "\C-c\C-f\C-s" 'mail-subject) 94 (define-key news-reply-mode-map [menu-bar fields mail-subject] 95 '("Subject" . mail-subject)) 220 (defun news-setup (to subject in-reply-to newsgroups replybuffer) 231 (mail-setup to subject in-reply-to nil replybuffer nil) 235 (mail-setup to subject in-reply-to nil replybuffer nil)) 260 (let* (newsgroups subject 266 subject (mail-fetch-field "subject"))) 281 ;@@ setting of subject an [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/ |
H A D | tpOcspVerify.cpp | 7 * as defined in and that are subject to the Apple Public Source License 49 TPCertInfo &subject, 59 crtn = subject.fetchField(&CSSMOID_X509V1SerialNumber, &subjectSerial); 63 crtn = subject.fetchField(&CSSMOID_X509V1IssuerNameStd, &issuerSubject); 75 subject.freeField(&CSSMOID_X509V1SerialNumber, subjectSerial); 86 TPCertInfo &subject, 92 crtn = subject.fetchField(&CSSMOID_AuthorityInfoAccess, &extField); 147 subject.freeField(&CSSMOID_AuthorityInfoAccess, extField); 156 * -- extracting URLs from subject cert if net fetch is enabled; 162 TPCertInfo &subject, 48 tpOcspGetCertId( TPCertInfo &subject, TPCertInfo &issuer, OCSPClientCertID *&certID) argument 85 tpOcspUrlsFromCert( TPCertInfo &subject, SecNssCoder &coder) argument 159 tpGenOcspdReq( TPVerifyContext &vfyCtx, SecNssCoder &coder, TPCertInfo &subject, TPCertInfo &issuer, OCSPClientCertID &certId, const CSSM_DATA **urls, CSSM_DATA &nonce) argument 363 tpOcspFlushAndReFetch( TPVerifyContext &vfyCtx, SecNssCoder &coder, TPCertInfo &subject, TPCertInfo &issuer, OCSPClientCertID &certID) argument 399 TPCertInfo &subject; member in class:PendingRequest 495 TPCertInfo *subject = certGroup.certAtIndex(dex); local [all...] |
H A D | tpCrlVerify.cpp | 5 * subject to the Apple Public Source License Version 1.2 (the 'License'). 150 TPCertInfo &subject, 164 /* Search inputCrls for a CRL for subject cert */ 166 crl = vfyCtx.inputCrls->findCrlForCert(subject); 167 if(crl && (crl->verifyWithContextNow(vfyCtx, &subject) == CSSM_OK)) { 176 crl = tpGlobalCrlCache().search(subject, vfyCtx); 179 if(crl->verifyWithContextNow(vfyCtx, &subject) == CSSM_OK) { 194 crl = tpDbFindIssuerCrl(vfyCtx, *subject.issuerName(), subject); 206 crtn = tpFetchCrlFromNet(subject, vfyCt 149 tpFindCrlForCert( TPCertInfo &subject, TPCrlInfo *&foundCrl, TPVerifyContext &vfyCtx) argument 289 tpGetCrlStatusForCert( TPCertInfo &subject, const CSSM_DATA &issuers) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hx509/ |
H A D | test_windows.in | 56 --subject="CN=Windows-CA,DC=heimdal,DC=pki" \ 66 --subject="CN=kdc.heimdal.pki,dc=heimdal,dc=pki" \ 78 --subject="CN=User,DC=heimdal,DC=pki" \
|
H A D | test_ca.in | 53 --subject="CN=Love,DC=it,DC=su,DC=se" \ 60 --subject="cn=foo" \ 108 --subject="cn=foo" \ 116 --subject="cn=foo" \ 125 --subject="cn=foo" \ 134 --subject="cn=foo" \ 143 --subject="cn=foo" \ 171 --subject="cn=www.test.h5l.se" \ 191 --subject="cn=foo" \ 197 echo "issue certificate (email, null subject D [all...] |
H A D | req.c | 182 "PKCS10 needs to have a subject"); 192 &r.certificationRequestInfo.subject); 247 hx509_name subject; local 290 ret = hx509_name_from_Name(&rinfo->subject, &subject); 296 ret = hx509_request_set_name(context, *req, subject); 297 hx509_name_free(&subject); 314 char *subject; local 315 ret = hx509_name_to_string(req->name, &subject); 320 fprintf(f, "name: %s\n", subject); [all...] |
/macosx-10.10/cups-408/cups/notifier/ |
H A D | rss.c | 36 char *subject, /* Message subject/summary */ member in struct:_cups_rss_s 57 static _cups_rss_t *new_message(int sequence_number, char *subject, 92 char *subject, /* Subject for notification message */ local 319 subject = cupsNotifySubject(language, event); 322 if (printer_up_time && notify_sequence_number && subject && text) 342 xml_escape(subject), xml_escape(text), 376 if (subject) 377 free(subject); 421 if (msg->subject) 444 *subject, /* Subject */ local 565 new_message(int sequence_number, char *subject, char *text, char *link_url, time_t event_time) argument [all...] |
/macosx-10.10/emacs-93/emacs/lisp/gnus/ |
H A D | nnlistserv.el | 91 map url page subject from ) 101 subject (match-string 2) 109 (cdr active) subject from "" 121 (headers '(sent name email subject id)) 122 sent name email subject id) 137 (format "Subject: %s\n" subject)
|
/macosx-10.10/libauto-186/auto_tester/ |
H A D | cfdata.m | 30 __strong CFDataRef subject; 55 subjectCopy = CFDataCreateCopy(NULL, subject); 58 subjectMutableCopy = CFDataCreateMutableCopy(NULL, size, subject); 67 CFMakeCollectable(subject); 84 CFRelease(subject); 94 if (!subject) subject = CFDataCreate(NULL, (uint8_t *)buffer, size); 114 CFIndex count = CFDataGetLength(subject)/sizeof(void *); 115 result = result && allSame(self, (void **)CFDataGetBytePtr(subject), count); 142 subject [all...] |
/macosx-10.10/libauto-186/tests/ |
H A D | cfdata.m | 37 __strong CFDataRef subject; 62 subjectCopy = CFDataCreateCopy(NULL, subject); 65 subjectMutableCopy = CFDataCreateMutableCopy(NULL, size, subject); 74 CFMakeCollectable(subject); 91 CFRelease(subject); 101 if (!subject) subject = CFDataCreate(NULL, (uint8_t *)buffer, size); 121 CFIndex count = CFDataGetLength(subject)/sizeof(void *); 122 result = result && allSame(self, (void **)CFDataGetBytePtr(subject), count); 150 subject [all...] |
/macosx-10.10/ruby-106/ruby/lib/rubygems/ |
H A D | security.rb | 168 # subject contains FILTER 170 # subject contains FILTER 383 # * The certificate contains a subject key identifier 403 # Creates an unsigned certificate for +subject+ and +key+. The lifetime of 408 def self.create_cert subject, key, age = ONE_YEAR, extensions = EXTENSIONS, 419 cert.subject = subject 431 # Creates a self-signed certificate with an issuer and subject from +email+, 432 # a subject alternative name of +email+ and the given +extensions+ for the 436 subject [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_client/ |
H A D | keychainacl.h | 5 * subject to the Apple Public Source License Version 1.2 (the 'License'). 71 void comment(TypedList &subject); 72 void uncomment(TypedList &subject);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/ |
H A D | keychainacl.h | 5 * subject to the Apple Public Source License Version 1.2 (the 'License'). 71 void comment(TypedList &subject); 72 void uncomment(TypedList &subject);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/ocspTool/ |
H A D | findOcspUrl.cpp | 5 * subject to the Apple Public Source License Version 1.2 (the 'License'). 32 CertParser &subject, 36 subject.extensionForOid(CSSMOID_AuthorityInfoAccess); 31 ocspUrlFromCert( CertParser &subject, SecAsn1CoderRef coder) argument
|
/macosx-10.10/Security-57031.1.35/securityd/src/ |
H A D | acls.cpp | 7 * as defined in and that are subject to the Apple Public Source License 106 // This helper tries to add the (new) subject given to the ACL 110 // The new subject will be added at the front (so it is checked first 119 bool SecurityServerAcl::addToStandardACL(const AclValidationContext &context, AclSubject *subject) argument 124 if (dynamic_cast<KeychainPromptAclSubject *>(threshold->subject(size-1))) { 126 secdebug("acl", "adding new subject %p to from of threshold ACL", subject); 127 threshold->add(subject, 0); 175 if (CodeSignatureAclSubject *app = dynamic_cast<CodeSignatureAclSubject *>(list->subject(n))) { 193 Adornable &SecurityServerEnvironment::store(const AclSubject *subject) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_asn1/ |
H A D | csrTemplates.h | 7 * as defined in and that are subject to the Apple Public Source License 42 NSS_Name subject; member in struct:__anon3579
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_asn1/Security/ |
H A D | csrTemplates.h | 7 * as defined in and that are subject to the Apple Public Source License 42 NSS_Name subject; member in struct:__anon4014
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_asn1/lib/ |
H A D | csrTemplates.h | 7 * as defined in and that are subject to the Apple Public Source License 42 NSS_Name subject; member in struct:__anon4136
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_asn1/security_asn1/ |
H A D | csrTemplates.h | 7 * as defined in and that are subject to the Apple Public Source License 42 NSS_Name subject; member in struct:__anon4258
|
/macosx-10.10/ksh-23/ksh/src/lib/libast/comp/ |
H A D | regcmp.c | 190 regex(const char* handle, const char* subject, ...) argument 200 va_start(ap, subject); 201 if (!(re = (Regex_t*)handle) || !subject) 212 if (regexec(&re->re, subject, SUB + 1, match, 0)) 219 strlcpy(sub[n], subject + match[i].rm_so, k); 222 __loc1 = (char*)subject + match[0].rm_so; 223 return (char*)subject + match[0].rm_eo;
|
/macosx-10.10/ruby-106/ruby/sample/openssl/ |
H A D | certstore.rb | 37 [[false, cert, crl_map[cert.subject], error]] 39 @x509store.chain.collect { |c| [true, c, crl_map[c.subject], nil] } 79 crl_map[cert.subject] = true 84 crl_map[cert.subject] = true 92 error_map[cert.subject] = error_string if error_string 98 error_map[cert.subject] || @x509store.error_string 153 # cert.subject.cmp(cert.issuer) == 0 154 cert.subject.to_s == cert.issuer.to_s
|
/macosx-10.10/ruby-106/ruby/test/rubygems/ |
H A D | test_gem_security.rb | 20 name = PUBLIC_CERT.subject 32 assert_equal name.to_s, cert.subject.to_s 50 assert_equal name.to_s, cert.subject.to_s 54 subject = PUBLIC_CERT.subject 56 cert = @SEC.create_cert_self_signed subject, PRIVATE_KEY, 60 63 name = PUBLIC_CERT.subject 75 assert_equal name.to_s, cert.subject.to_s 147 "#{ALTERNATE_CERT.subject}", 160 issuer = PUBLIC_CERT.subject [all...] |
/macosx-10.10/ksh-23/ksh/src/cmd/ksh93/tests/ |
H A D | glob.sh | 77 typeset lineno expected subject pattern got 78 lineno=$1 expected=$2 subject=$3 pattern=$4 80 case $subject in 86 then 'err_exit' $lineno "case $subject in $pattern) -- expected '$expected', got '$got'" 306 x='${subject'$2'}' 309 then 'err_exit' $1 subject="'$subject' $x failed, expected '$3', got '$g'" 316 subject='A regular expressions test' 353 subject='e' 362 subject [all...] |