/macosx-10.9.5/security_systemkeychain-55191.2/Gatekeeper/ |
H A D | Authority.h | 9 @property (strong) NSNumber *identity; variable
|
/macosx-10.9.5/eap8021x-180/EAP8021X.fproj/ |
H A D | EAPCertificateUtil.c | 119 * NULL case i.e. find the first identity. 126 * the first identity (dict == NULL), or one that matches the given 129 * noErr and a non-NULL SecIdentityRef in *ret_identity if an identity 170 SecIdentityRef identity; local 173 identity = (SecIdentityRef)CFArrayGetValueAtIndex(identity_list, i); 176 CFRetain(identity); 177 *ret_identity = identity; 180 status = SecIdentityCopyCertificate(identity, &this_cert); 189 CFRetain(identity); 190 *ret_identity = identity; 281 EAPSecIdentityCreateCertificateTrustChain(SecIdentityRef identity, CFArrayRef * ret_chain) argument 356 EAPSecIdentityCreateTrustChain(SecIdentityRef identity, CFArrayRef * ret_array) argument 399 SecIdentityRef identity = NULL; local 424 EAPSecIdentityHandleCreate(SecIdentityRef identity) argument 453 EAPSecIdentityHandleCreate(SecIdentityRef identity) argument 974 SecIdentityRef identity; local 1015 SecIdentityRef identity; local 1045 remove_identity(SecIdentityRef identity) argument 1085 SecIdentityRef identity; local [all...] |
H A D | EAPCertificateUtil.h | 64 EAPSecIdentityHandleCreate(SecIdentityRef identity); 69 * Find the identity that matches the given id_handle, and 75 * identity plus certificate trust chain for use with SSLSetCertificate(). 95 EAPSecIdentityCreateTrustChain(SecIdentityRef identity,
|
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | IdentityCursor.h | 54 virtual bool next(SecPointer<Identity> &identity); 73 virtual bool next(SecPointer<Identity> &identity);
|
H A D | IdentityCursor.cpp | 102 // create identity reference, given certificate 105 SecPointer<Identity> identity(new Identity(mSearchList /*keychains*/, certificate)); 107 mPreferredIdentity = identity; 114 IdentityCursorPolicyAndID::next(SecPointer<Identity> &identity) argument 129 identity = mPreferredIdentity; 136 bool result = IdentityCursor::next(currIdentity); // base class finds the next identity by keyUsage 148 identityOK = true; // return this identity 198 identityOK = true; // return this identity 227 identity = currIdentity; // caller will release the identity 303 next(SecPointer<Identity> &identity) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | IdentityCursor.h | 54 virtual bool next(SecPointer<Identity> &identity); 73 virtual bool next(SecPointer<Identity> &identity);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | IdentityCursor.h | 54 virtual bool next(SecPointer<Identity> &identity); 73 virtual bool next(SecPointer<Identity> &identity);
|
/macosx-10.9.5/SecurityTool-55115/ |
H A D | identity_prefs.c | 46 const char *identity, 60 // find identity (if specified by name or hash) 61 if (identity || hash) { 62 identityRef = find_identity(keychainOrArray, identity, hash, keyUsage); 64 sec_error("No matching identity found for \"%s\"", (hash) ? hash : identity); 70 // set the identity preference 177 char *identity = NULL, *service = NULL, *hash = NULL; local 182 * " -n Specify no identity (clears existing preference for service)\n" 183 * " -c Specify identity b 45 do_set_identity_preference(CFTypeRef keychainOrArray, const char *identity, const char *service, CSSM_KEYUSE keyUsage, const char *hash) argument [all...] |
H A D | identity_find.c | 53 const char *identity, 74 CFStringRef matchRef = (identity) ? CFStringCreateWithCString(NULL, identity, kCFStringEncodingUTF8) : NULL; 118 if (!strcmp(identity, "*")) { // special case: means "just take the first one" 119 sec_error("Using identity \"%s\"", nameBuf); 154 sec_error("\"%s\" is ambiguous, matches more than one certificate", identity); 181 void printIdentity(SecIdentityRef identity, SecPolicyRef policy, int ordinalValue) argument 187 status = SecIdentityCopyCertificate(identity, &cert); 346 // create an identity search, specifying all identities (i.e. returnOnlyValidIdentities=FALSE) 365 // create a second identity searc 52 find_identity(CFTypeRef keychainOrArray, const char *identity, const char *hash, CSSM_KEYUSE keyUsage) argument 393 SecIdentityRef identity = NULL; local [all...] |
/macosx-10.9.5/WebCore-7537.78.1/platform/network/ |
H A D | Credential.h | 59 Credential(SecIdentityRef identity, CFArrayRef certificates, CredentialPersistence); 70 SecIdentityRef identity() const;
|
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/include/dns/ |
H A D | ssu.h | 102 dns_name_t *identity, unsigned int matchtype, 107 * either grants or denies update privileges of an identity (or set of 113 * name to be updated matches the signing identity. 123 *\li 'identity' is a valid absolute name 205 dns_ssu_external_match(dns_name_t *identity, dns_name_t *signer,
|
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/ |
H A D | eap_sim.h | 127 int EAPSIMIdentity(char *identity, int maxlen); 134 int EAPAKAIdentity(char *identity, int maxlen);
|
H A D | eap.h | 61 #define EAP_TYPE_IDENTITY 1 /* request for identity */ 131 char *identity; // authenticatee identity member in struct:EAP_Input 191 int (*identity) (char *identity, int maxlen); member in struct:eap_ext 198 char *our_identity; /* Our identity name */ 201 char peer_identity[MAX_NAME_LENGTH]; /* peer name discovered with identity request */
|
/macosx-10.9.5/smb-697.95.1/lib/smb/ |
H A D | gss.c | 54 gss_auth_identity_desc identity; local 61 identity.type = GSS_AUTH_IDENTITY_TYPE_1; 62 identity.flags = 0; 63 identity.username = strdup(user); 64 identity.realm = strdup(domain ? domain : ""); 65 identity.password = strdup(password); 66 identity.credentialsRef = NULL; 68 if (identity.username == NULL || 69 identity.realm == NULL || 70 identity [all...] |
/macosx-10.9.5/Security-55471.14.18/sec/Security/Tool/ |
H A D | pkcs12_util.c | 178 /* find the identity using the persistent handle */ 190 printf("Found identity:\n"); 209 SecIdentityRef identity; local 213 /* add identity */ 214 identity = (SecIdentityRef)CFDictionaryGetValue(item_dict, kSecImportItemIdentity); 215 if (identity != NULL) { 218 SecIdentityCopyCertificate(identity, &cert); 227 identity }; 239 fprintf(stderr, "SecItemAdd(identity) failed %d\n", 278 SecIdentityRef identity; local [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/ |
H A D | test_gssscram.c | 181 gss_auth_identity_desc identity; local 184 memset(&identity, 0, sizeof(identity)); 186 identity.username = rk_UNCONST(user); 187 identity.realm = ""; 188 identity.password = rk_UNCONST(password); 203 &identity,
|
/macosx-10.9.5/cups-372.4/cups/scheduler/ |
H A D | tls-darwin.c | 162 SecIdentityRef identity = NULL;/* Identity */ local 219 err = SecItemCopyMatching(query, (CFTypeRef *)&identity); 253 err = SecItemCopyMatching(query, (CFTypeRef *)&identity); 265 if (CFGetTypeID(identity) != SecIdentityGetTypeID()) 271 if ((certificates = CFArrayCreate(NULL, (const void **)&identity, 284 if (identity) 285 CFRelease(identity);
|
/macosx-10.9.5/OpenSSH-186/openssh/regress/ |
H A D | conch-ciphers.sh | 22 ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER -e none \
|
/macosx-10.9.5/Security-55471.14.18/include/security_smime/ |
H A D | SecCmsSignerInfo.h | 51 SecCmsSignerInfoCreate(SecCmsMessageRef cmsg, SecIdentityRef identity, SECOidTag digestalgtag); 208 SECOidTag digestalg, SecIdentityRef identity);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_smime/lib/ |
H A D | SecCmsSignerInfo.h | 51 SecCmsSignerInfoCreate(SecCmsMessageRef cmsg, SecIdentityRef identity, SECOidTag digestalgtag); 208 SECOidTag digestalg, SecIdentityRef identity);
|
/macosx-10.9.5/ppp-727.90.1/Helpers/pppd/ |
H A D | eap.h | 72 int (*identity) __P((char *identity, int maxlen)); member in struct:eap_ext 86 char *our_identity; /* Our identity name */ 89 char peer_identity[MAX_NAME_LENGTH]; /* peer name discovered with identity request */
|
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/virtchannel_transform/ |
H A D | pkgIndex.tcl | 8 package ifneeded tcl::transform::identity 1 [list source [list [file join $dir identity.tcl]]]
|
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/servers/slapd/back-sql/rdbms_depend/mssql/ |
H A D | backsql_create.sql | 2 id int identity (1, 1) not null , 29 id int identity (1, 1) not null , 52 id int identity (1, 1) not null ,
|
/macosx-10.9.5/WebCore-7537.78.1/platform/graphics/win/ |
H A D | SimpleFontDataWin.cpp | 100 static const MAT2 identity = { 0, 1, 0, 0, 0, 0, 0, 1 }; local 101 DWORD len = GetGlyphOutline(hdc, 'x', GGO_METRICS, &gm, 0, 0, &identity); 210 static const MAT2 identity = { 0, 1, 0, 0, 0, 0, 0, 1 }; 211 GetGlyphOutline(hdc, glyph, GGO_METRICS | GGO_GLYPH_INDEX, &gdiMetrics, 0, 0, &identity); 235 static const MAT2 identity = { 0, 1, 0, 0, 0, 0, 0, 1 }; local 236 GetGlyphOutline(hdc, glyph, GGO_METRICS | GGO_GLYPH_INDEX, &gdiMetrics, 0, 0, &identity);
|
/macosx-10.9.5/KerberosHelper-148/Source/ |
H A D | lkdc_acl.c | 214 const char *identity) 268 printf("added %s to acl for %s\n", trustedAppName, identity); 419 printf("%s -s identity -t\t\t\ttest using identitys key\n", 421 printf("%s -s identity -a application\tadd appliction to acl\n", 423 printf("%s -s identity -D\t\t\tdelete all ACL\n", 425 printf("%s -s identity -l\t\t\tlist ACL\n", 440 const char *identity = NULL; local 456 identity = optarg; 468 if (identity == NULL) { 469 fprintf(stderr, "no identity give 212 addTrustedApplication(SecKeychainItemRef itemRef, const char *trustedAppName, const char *identity) argument [all...] |