/macosx-10.10.1/Heimdal-398.1.2/lib/hx509/ |
H A D | ks_keychain.c | 455 int anchors; member in struct:ks_keychain 476 if (strcasecmp(residue, "system-anchors") == 0) { 477 ctx->anchors = 1; 685 if (ctx->anchors) { 686 CFArrayRef anchors; local 697 ret = SecTrustCopyAnchorCertificates(&anchors); 702 "Can't get trust anchors from Keychain"); 705 for (i = 0; i < CFArrayGetCount(anchors); i++) { 710 cr = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, i); 724 CFRelease(anchors); [all...] |
H A D | hxtool.c | 201 hx509_certs anchors = NULL; local 218 ret = hx509_certs_init(hxcontext, "MEMORY:cms-anchors", 0, NULL, &anchors); 225 certs_strings(hxcontext, "anchors", anchors, lock, &opt->anchors_strings); 296 hx509_verify_attach_anchors(ctx, anchors); 330 hx509_certs_free(&anchors); 379 hx509_certs store, pool, anchors, signer = NULL; local 409 ret = hx509_certs_init(hxcontext, "MEMORY:cert-anchors", 410 0, NULL, &anchors); 877 hx509_certs anchors, chain, certs; local [all...] |
H A D | cms.c | 1158 * @param anchors trust anchors that the client will use, used to 1161 * trust anchors. 1176 hx509_certs anchors, 1194 digest_alg, certs, peer, anchors, pool, 1211 hx509_certs anchors; member in struct:sigctx 1404 sigctx->anchors, 1469 hx509_certs anchors, 1517 sigctx.anchors = anchors; 1169 hx509_cms_create_signed_1(hx509_context context, int flags, const heim_oid *eContentType, const void *data, size_t length, const AlgorithmIdentifier *digest_alg, hx509_cert cert, hx509_peer_info peer, hx509_certs anchors, hx509_certs pool, heim_octet_string *signed_data) argument 1462 hx509_cms_create_signed(hx509_context context, int flags, const heim_oid *eContentType, const void *data, size_t length, const AlgorithmIdentifier *digest_alg, hx509_certs certs, hx509_peer_info peer, hx509_certs anchors, hx509_certs pool, heim_octet_string *signed_data) argument [all...] |
H A D | cert.c | 436 * Set the trust anchors in the verification context, makes an 442 * @param set a keyset containing the trust anchors. 557 * Allow using the operating system builtin trust anchors if no other 558 * trust anchors are configured. 562 * trust anchors. 1223 * If the trust anchors are not given, calculate optimistic path, just 1239 hx509_certs anchors, 1257 while (!certificate_is_anchor(context, anchors, current)) { 1259 ret = find_parent(context, time_now, anchors, path, 1281 certificate_is_anchor(context, anchors, pat 1236 _hx509_calculate_path(hx509_context context, int flags, time_t time_now, hx509_certs anchors, unsigned int max_depth, hx509_cert cert, hx509_certs pool, hx509_path *path) argument 2038 hx509_certs anchors = NULL; local [all...] |
H A D | hx509-private.h | 52 hx509_certs anchors,
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecCertificateInternalP.h | 225 /* This cert is signed by it's parent and so on until a certiicate in anchors can be found. */ 226 bool SecCertificateIssuerChainHasAnchorIn(SecCertificateRefP certificate, CFArrayRef anchors); 228 /* This cert is signed by it's parent and so on until a certiicate in anchors can be found. */ 229 bool SecCertificateSignatureChainHasAnchorIn(SecCertificateRefP certificate, CFArrayRef anchors);
|
H A D | SecTrust.h | 265 anchors other than the ones in anchorCertificates. 276 @param anchorCertificatesOnly If true, disables trusting any anchors other 289 no custom anchors have been specified. 291 @param anchors On return, an array of custom anchor certificates (roots) 292 used by this trust, or NULL if no custom anchors have been specified. Call 297 CFArrayRef *anchors) 535 anchors. 537 treated as anchors implicitly. 589 anchors keychain are searched for certificates to complete the chain. You 670 @param anchors O [all...] |
H A D | IdentityCursor.cpp | 155 // a single-element certificate array, no anchors, and no keychains to search. 170 // Set the anchors and keychain search list to be empty 171 trustLite->anchors(anchorsArray);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecCertificateInternalP.h | 225 /* This cert is signed by it's parent and so on until a certiicate in anchors can be found. */ 226 bool SecCertificateIssuerChainHasAnchorIn(SecCertificateRefP certificate, CFArrayRef anchors); 228 /* This cert is signed by it's parent and so on until a certiicate in anchors can be found. */ 229 bool SecCertificateSignatureChainHasAnchorIn(SecCertificateRefP certificate, CFArrayRef anchors);
|
H A D | SecTrust.h | 265 anchors other than the ones in anchorCertificates. 276 @param anchorCertificatesOnly If true, disables trusting any anchors other 289 no custom anchors have been specified. 291 @param anchors On return, an array of custom anchor certificates (roots) 292 used by this trust, or NULL if no custom anchors have been specified. Call 297 CFArrayRef *anchors) 535 anchors. 537 treated as anchors implicitly. 589 anchors keychain are searched for certificates to complete the chain. You 670 @param anchors O [all...] |
H A D | IdentityCursor.cpp | 155 // a single-element certificate array, no anchors, and no keychains to search. 170 // Set the anchors and keychain search list to be empty 171 trustLite->anchors(anchorsArray);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecCertificateInternalP.h | 225 /* This cert is signed by it's parent and so on until a certiicate in anchors can be found. */ 226 bool SecCertificateIssuerChainHasAnchorIn(SecCertificateRefP certificate, CFArrayRef anchors); 228 /* This cert is signed by it's parent and so on until a certiicate in anchors can be found. */ 229 bool SecCertificateSignatureChainHasAnchorIn(SecCertificateRefP certificate, CFArrayRef anchors);
|
H A D | SecTrust.h | 265 anchors other than the ones in anchorCertificates. 276 @param anchorCertificatesOnly If true, disables trusting any anchors other 289 no custom anchors have been specified. 291 @param anchors On return, an array of custom anchor certificates (roots) 292 used by this trust, or NULL if no custom anchors have been specified. Call 297 CFArrayRef *anchors) 535 anchors. 537 treated as anchors implicitly. 589 anchors keychain are searched for certificates to complete the chain. You 670 @param anchors O [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/ |
H A D | SecCertificateInternal.h | 223 /* This cert is signed by it's parent and so on until a certiicate in anchors can be found. */ 224 bool SecCertificateIssuerChainHasAnchorIn(SecCertificateRef certificate, CFArrayRef anchors); 226 /* This cert is signed by it's parent and so on until a certiicate in anchors can be found. */ 227 bool SecCertificateSignatureChainHasAnchorIn(SecCertificateRef certificate, CFArrayRef anchors);
|
H A D | SecTrust.h | 262 anchors other than the ones in anchorCertificates. 273 @param anchorCertificatesOnly If true, disables trusting any anchors other 286 no custom anchors have been specified. 288 @param anchors On return, an array of custom anchor certificates (roots) 289 used by this trust, or NULL if no custom anchors have been specified. Call 294 CFArrayRef *anchors) 532 anchors. 534 treated as anchors implicitly. 586 anchors keychain are searched for certificates to complete the chain. You 667 @param anchors O [all...] |
H A D | SecTrust.c | 106 /* If true we don't trust any anchors other than the ones in _anchors. */ 241 CFArrayRef *anchors) { 242 if (!trust|| !anchors) { 252 *anchors = anchorsArray; 596 static SecTrustResultType certs_anchors_bool_policies_date_ag_to_details_info_chain_int_error_request(enum SecXPCOperation op, CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, __unused CFArrayRef accessGroups, CFArrayRef *details, CFDictionaryRef *info, SecCertificatePathRef *chain, CFErrorRef *error) argument 602 if (anchors && !SecXPCDictionarySetCertificates(message, kSecTrustAnchorsKey, anchors, error)) 240 SecTrustCopyCustomAnchorCertificates(SecTrustRef trust, CFArrayRef *anchors) argument
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/secTrustTime/ |
H A D | secTrustTime.cpp | 104 /* cached CSSM anchors - simulate old SecTrustGetCSSMAnchorCertificates() */ 110 CSSM_DATA **anchors, /* RETURNED */ 121 *anchors = cachedAnchors; 109 getAnchors( CSSM_DATA **anchors, unsigned *numAnchors) argument
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_cdsa_utils/ |
H A D | cuCdsaUtils.cpp | 636 * Verify a CRL against system anchors and intermediate certs. 644 const CSSM_DATA *anchors, // optional - if NULL, use Trust Settings 685 /* anchors */ 687 authCtx.AnchorCerts = const_cast<CSSM_DATA_PTR>(anchors); 698 if(anchors == NULL) { 734 if(anchors == NULL) { 767 if(anchors == NULL) { 638 cuCrlVerify( CSSM_TP_HANDLE tpHand, CSSM_CL_HANDLE clHand, CSSM_CSP_HANDLE cspHand, const CSSM_DATA *crlData, CSSM_DL_DB_HANDLE_PTR certKeychain, const CSSM_DATA *anchors, uint32 anchorCount) argument
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_cdsa_utils/lib/ |
H A D | cuCdsaUtils.cpp | 636 * Verify a CRL against system anchors and intermediate certs. 644 const CSSM_DATA *anchors, // optional - if NULL, use Trust Settings 685 /* anchors */ 687 authCtx.AnchorCerts = const_cast<CSSM_DATA_PTR>(anchors); 698 if(anchors == NULL) { 734 if(anchors == NULL) { 767 if(anchors == NULL) { 638 cuCrlVerify( CSSM_TP_HANDLE tpHand, CSSM_CL_HANDLE clHand, CSSM_CSP_HANDLE cspHand, const CSSM_DATA *crlData, CSSM_DL_DB_HANDLE_PTR certKeychain, const CSSM_DATA *anchors, uint32 anchorCount) argument
|
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/ |
H A D | krb5_locl.h | 381 hx509_certs anchors; member in struct:krb5_pk_identity
|
H A D | pkinit.c | 759 ctx->id->anchors, req.trustedCertifiers); 1917 ret = hx509_certs_init(context->hx509ctx, anchor_id, 0, NULL, &id->anchors); 1920 "Failed to init anchors"); 1971 hx509_verify_attach_anchors(id->verify_ctx, id->anchors); 1978 hx509_certs_free(&id->anchors); 2323 hx509_certs_free(&ctx->id->anchors); 2371 char *anchors = NULL; local 2411 "pkinit_anchors", NULL, &anchors); 2412 x509_anchors = anchors;
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/ipc/ |
H A D | securityd_client.h | 188 SecTrustResultType (*sec_trust_evaluate)(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, __unused CFArrayRef accessGroups, CFArrayRef *details, CFDictionaryRef *info, SecCertificatePathRef *chain, CFErrorRef *error);
|
H A D | server.c | 390 CFArrayRef certificates = NULL, anchors = NULL, policies = NULL; local 394 SecXPCDictionaryCopyCertificatesOptional(event, kSecTrustAnchorsKey, &anchors, &error) && 405 SecTrustServerEvaluateBlock(certificates, anchors, anchorsOnly, policies, verifyTime, accessGroups, ^(SecTrustResultType tr, CFArrayRef details, CFDictionaryRef info, SecCertificatePathRef chain, CFErrorRef replyError) { 434 CFReleaseSafe(anchors);
|
/macosx-10.10.1/cxxfilt-11/cxxfilt/bfd/ |
H A D | pef.c | 135 struct traceback_table_anchors anchors; local 139 anchors.ctl_info = bfd_getb32 (buf + pos + offset); 142 if (anchors.ctl_info > 1024) 145 offset += anchors.ctl_info * 4;
|
/macosx-10.10.1/IOStorageFamily-182.1.1/ |
H A D | IOMediaBSDClient.cpp | 235 AnchorTable * _anchors; // (table of anchors) 499 AnchorTable * anchors = gIOMediaBSDClientGlobals.getAnchors(); local 532 anchorID = anchors->locate(anchor, whole); 543 anchorID = anchors->update(anchor, whole); 548 anchorID = anchors->insert(anchor, whole); // (get new anchor ID) 594 if (anchorNew) anchors->remove(anchorID); 604 // Obtain the table of anchors. 613 // Obtain the table of anchors. 3120 // Notification handler for anchors. 3123 AnchorTable * anchors [all...] |