/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | IdentityCursor.cpp | 155 // a single-element certificate array, no anchors, and no keychains to search. 170 // Set the anchors and keychain search list to be empty 171 trustLite->anchors(anchorsArray);
|
H A D | SecTrust.cpp | 127 Trust::required(trust)->anchors(anchorCertificates); 375 CFArrayRef customAnchors = Trust::required(trust)->anchors();
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-20-sectrust-activation.c | 812 CFArrayRef anchors = CFArrayCreate(NULL, (const void **)&_iphone_cert_authority, local 814 ok_status(SecTrustSetAnchorCertificates(trust, anchors), "set anchors"); 820 CFReleaseSafe(anchors); 850 anchors = CFArrayCreate(NULL, (const void **)&_factory_device_ca, 1, NULL); 857 ok_status(SecTrustSetAnchorCertificates(trust, anchors), "set anchor"); 865 CFReleaseSafe(anchors); 899 anchors = CFArrayCreate(NULL, (const void **)&_pairing_root_cert, 901 ok_status(SecTrustSetAnchorCertificates(trust, anchors), "set anchors"); [all...] |
H A D | si-24-sectrust-itms.c | 131 CFArrayRef anchors = CFArrayCreate(kCFAllocatorDefault, (const void **)&root, 1, NULL); local 140 ok_status(SecTrustSetAnchorCertificates(trust, anchors), "set iTMS anchor for evaluation"); 160 CFReleaseSafe(anchors);
|
H A D | si-71-mobile-store-policy.c | 451 static void test_escrow_with_anchor_roots(CFArrayRef anchors) argument 470 SecTrustSetAnchorCertificates(trust, anchors); 484 static void test_pcs_escrow_with_anchor_roots(CFArrayRef anchors) argument 503 SecTrustSetAnchorCertificates(trust, anchors); 518 CFArrayRef anchors = NULL; local 519 isnt(anchors = SecCertificateCopyEscrowRoots(kSecCertificateProductionEscrowRoot), NULL, "unable to get production anchors"); 520 test_escrow_with_anchor_roots(anchors); 521 CFReleaseSafe(anchors); 526 CFArrayRef anchors local [all...] |
H A D | si-27-sectrust-exceptions.c | 348 CFArrayRef anchors = CFArrayCreate(kCFAllocatorDefault, NULL, 0, &kCFTypeArrayCallBacks); local 349 ok_status(SecTrustSetAnchorCertificates(trust, anchors), "set empty anchor list"); 353 ok_status(SecTrustSetAnchorCertificatesOnly(trust, false), "trust passed in anchors and system anchors"); 357 ok_status(SecTrustSetAnchorCertificatesOnly(trust, true), "only trust passed in anchors (default)"); 372 CFReleaseSafe(anchors);
|
H A D | si-65-cms-cert-policy.c | 229 CFArrayRef anchors = CFArrayCreate(kCFAllocatorDefault, (const void **)&anchor, 1, &kCFTypeArrayCallBacks); local 236 SecTrustSetAnchorCertificates(trust, anchors); 247 CFReleaseNull(anchors);
|
H A D | si-81-sectrust-server-auth.c | 427 CFMutableArrayRef certs=NULL, servers=NULL, anchors=NULL; local 443 isnt(anchors = CFArrayCreateMutable(kCFAllocatorDefault, 0, &kCFTypeArrayCallBacks), NULL, "create anchors array"); 444 CFArrayAppendValue(anchors, cert2); 459 ok_status(SecTrustSetAnchorCertificates(trust, anchors), "set anchors"); 481 ok_status(SecTrustSetAnchorCertificates(trust, anchors), "set anchors"); 505 ok_status(SecTrustSetAnchorCertificates(trust, anchors), "set anchors"); [all...] |
H A D | si-22-sectrust-iap.c | 553 CFArrayRef anchors = CFArrayCreate(NULL, v_anchors, local 558 ok_status(SecTrustSetAnchorCertificates(trust, anchors), "set anchors"); 573 ok_status(SecTrustSetAnchorCertificates(trust, anchors), "set anchors"); 582 CFReleaseSafe(anchors);
|
H A D | si-20-sectrust.c | 694 CFArrayRef anchors = CFArrayCreate(NULL, (const void **)&cert1, 1, &kCFTypeArrayCallBacks); local 695 ok_status(SecTrustSetAnchorCertificates(trust, anchors), "set anchors"); 701 CFReleaseSafe(anchors); 702 anchors = CFArrayCreate(NULL, NULL, 0, NULL); 703 ok_status(SecTrustSetAnchorCertificates(trust, anchors), "set empty anchors list"); 708 ok_status(SecTrustSetAnchorCertificatesOnly(trust, false), "trust passed in anchors and system anchors"); 713 ok_status(SecTrustSetAnchorCertificatesOnly(trust, true), "only trust passed in anchors (defaul [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/ |
H A D | tpPolicies.cpp | 1251 * Limit allowed domains for specific anchors 2535 CFArrayRef anchors = SecCertificateCopyEscrowRoots(rootType); local 2536 CFIndex idx, count = (anchors) ? CFArrayGetCount(anchors) : 0; 2538 SecCertificateRef cert = (SecCertificateRef) CFArrayGetValueAtIndex(anchors, idx); 2544 if (anchors) 2545 CFRelease(anchors);
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/anchorTest/ |
H A D | anchorTest.cpp | 3 * anchors 1086 /* get system anchors only; convert to CSSM */ 1089 CSSM_DATA *anchors; local 1091 ortn = getSystemAnchors(&cfAnchors, &anchors, &numAnchors); 1096 printf("***Hey! I can only find %u anchors; there should be way more than that.\n", 1113 rtn = doTest(clHand, tpHand, cspHand, anchors[dex], allowExpired,
|
/macosx-10.10.1/ruby-106/ruby/ext/psych/yaml/ |
H A D | yaml.h | 1750 } *anchors; member in struct:yaml_emitter_s
|
/macosx-10.10.1/Heimdal-398.1.2/lib/hx509/ |
H A D | hx509-protos.h | 1313 hx509_certs anchors, 1330 * @param anchors trust anchors that the client will use, used to 1333 * trust anchors. 1350 hx509_certs anchors, 2937 * Set the trust anchors in the verification context, makes an 2943 * @param set a keyset containing the trust anchors. 2977 * Allow using the operating system builtin trust anchors if no other 2978 * trust anchors are configured. 2982 * trust anchors [all...] |
H A D | test_ca.in | 303 --anchors=FILE:cert-ca.pem \
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecTrust.cpp | 127 Trust::required(trust)->anchors(anchorCertificates); 375 CFArrayRef customAnchors = Trust::required(trust)->anchors();
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecTrust.cpp | 127 Trust::required(trust)->anchors(anchorCertificates); 375 CFArrayRef customAnchors = Trust::required(trust)->anchors();
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/clAppUtils/ |
H A D | tpUtils.cpp | 1156 * Obtain system anchors in CF and in CSSM_DATA form. 1163 CSSM_DATA **anchors, /* RETURNED */ 1189 *anchors = cssmAnchors; 1161 getSystemAnchors( CFArrayRef *rootArray, CSSM_DATA **anchors, unsigned *numAnchors) argument
|
/macosx-10.10.1/WebKit-7600.1.25/win/Interfaces/ |
H A D | DOMHTML.idl | 168 - (DOMHTMLCollection *)anchors; 170 HRESULT anchors([out, retval] IDOMHTMLCollection** collection);
|
/macosx-10.10.1/libxml2-26/libxml2/doc/ |
H A D | index.py | 1104 anchors = ctxt.xpathEval("//a[@href]") 1107 for anchor in anchors:
|
/macosx-10.10.1/libxslt-13/libxslt/doc/ |
H A D | index.py | 1092 anchors = ctxt.xpathEval("//a[@href]") 1095 for anchor in anchors:
|
/macosx-10.10.1/Heimdal-398.1.2/kdc/ |
H A D | pkinit.c | 527 "MEMORY:trust-anchors", 530 krb5_set_error_message(context, ret, "failed to create trust anchors"); 535 kdc_identity->anchors); 538 krb5_set_error_message(context, ret, "failed to merge trust anchors"); 542 /* Add any registered certificates for this client as trust anchors */ 628 "MEMORY:client-anchors", 633 "Can't allocate client anchors: %d", 2125 const char *anchors, 2146 anchors, 2122 krb5_kdc_pk_initialize(krb5_context context, krb5_kdc_configuration *config, const char *user_id, const char *anchors, char **pool, char **revoke_list) argument
|
/macosx-10.10.1/JavaScriptCore-7600.1.17/yarr/ |
H A D | YarrInterpreter.cpp | 1090 if (((matchBegin && term.anchors.m_bol) 1091 || ((matchEnd != input.end()) && term.anchors.m_eol)) 1914 assertionDotStarEnclosure(term.anchors.bolAnchor, term.anchors.eolAnchor);
|
/macosx-10.10.1/vim-55/runtime/autoload/ |
H A D | javascriptcomplete.vim | 157 let docuprop = ['anchors', 'applets', 'childNodes', 'embeds', 'forms', 'images', 'links', 'stylesheets', 457 elseif shortcontext =~ 'anchors\(\[.\{-}\]\)\?\.$'
|
/macosx-10.10.1/tcl-105/tcl_ext/tklib/tklib/modules/tablelist/scripts/ |
H A D | tablelistUtil.tcl | 20 variable anchors 21 array set anchors { 1143 variable anchors 1148 $w configure -anchor $anchors($alignment) -font $font \ 2547 variable anchors 2548 set anchor $anchors($alignment)
|