Searched refs:identity (Results 26 - 50 of 372) sorted by relevance

1234567891011>>

/macosx-10.9.5/security_systemkeychain-55191.2/Gatekeeper/
H A DAuthority.h9 @property (strong) NSNumber *identity; variable
/macosx-10.9.5/eap8021x-180/EAP8021X.fproj/
H A DEAPCertificateUtil.c119 * NULL case i.e. find the first identity.
126 * the first identity (dict == NULL), or one that matches the given
129 * noErr and a non-NULL SecIdentityRef in *ret_identity if an identity
170 SecIdentityRef identity; local
173 identity = (SecIdentityRef)CFArrayGetValueAtIndex(identity_list, i);
176 CFRetain(identity);
177 *ret_identity = identity;
180 status = SecIdentityCopyCertificate(identity, &this_cert);
189 CFRetain(identity);
190 *ret_identity = identity;
281 EAPSecIdentityCreateCertificateTrustChain(SecIdentityRef identity, CFArrayRef * ret_chain) argument
356 EAPSecIdentityCreateTrustChain(SecIdentityRef identity, CFArrayRef * ret_array) argument
399 SecIdentityRef identity = NULL; local
424 EAPSecIdentityHandleCreate(SecIdentityRef identity) argument
453 EAPSecIdentityHandleCreate(SecIdentityRef identity) argument
974 SecIdentityRef identity; local
1015 SecIdentityRef identity; local
1045 remove_identity(SecIdentityRef identity) argument
1085 SecIdentityRef identity; local
[all...]
H A DEAPCertificateUtil.h64 EAPSecIdentityHandleCreate(SecIdentityRef identity);
69 * Find the identity that matches the given id_handle, and
75 * identity plus certificate trust chain for use with SSLSetCertificate().
95 EAPSecIdentityCreateTrustChain(SecIdentityRef identity,
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/
H A DIdentityCursor.h54 virtual bool next(SecPointer<Identity> &identity);
73 virtual bool next(SecPointer<Identity> &identity);
H A DIdentityCursor.cpp102 // create identity reference, given certificate
105 SecPointer<Identity> identity(new Identity(mSearchList /*keychains*/, certificate));
107 mPreferredIdentity = identity;
114 IdentityCursorPolicyAndID::next(SecPointer<Identity> &identity) argument
129 identity = mPreferredIdentity;
136 bool result = IdentityCursor::next(currIdentity); // base class finds the next identity by keyUsage
148 identityOK = true; // return this identity
198 identityOK = true; // return this identity
227 identity = currIdentity; // caller will release the identity
303 next(SecPointer<Identity> &identity) argument
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/
H A DIdentityCursor.h54 virtual bool next(SecPointer<Identity> &identity);
73 virtual bool next(SecPointer<Identity> &identity);
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/
H A DIdentityCursor.h54 virtual bool next(SecPointer<Identity> &identity);
73 virtual bool next(SecPointer<Identity> &identity);
/macosx-10.9.5/SecurityTool-55115/
H A Didentity_prefs.c46 const char *identity,
60 // find identity (if specified by name or hash)
61 if (identity || hash) {
62 identityRef = find_identity(keychainOrArray, identity, hash, keyUsage);
64 sec_error("No matching identity found for \"%s\"", (hash) ? hash : identity);
70 // set the identity preference
177 char *identity = NULL, *service = NULL, *hash = NULL; local
182 * " -n Specify no identity (clears existing preference for service)\n"
183 * " -c Specify identity b
45 do_set_identity_preference(CFTypeRef keychainOrArray, const char *identity, const char *service, CSSM_KEYUSE keyUsage, const char *hash) argument
[all...]
H A Didentity_find.c53 const char *identity,
74 CFStringRef matchRef = (identity) ? CFStringCreateWithCString(NULL, identity, kCFStringEncodingUTF8) : NULL;
118 if (!strcmp(identity, "*")) { // special case: means "just take the first one"
119 sec_error("Using identity \"%s\"", nameBuf);
154 sec_error("\"%s\" is ambiguous, matches more than one certificate", identity);
181 void printIdentity(SecIdentityRef identity, SecPolicyRef policy, int ordinalValue) argument
187 status = SecIdentityCopyCertificate(identity, &cert);
346 // create an identity search, specifying all identities (i.e. returnOnlyValidIdentities=FALSE)
365 // create a second identity searc
52 find_identity(CFTypeRef keychainOrArray, const char *identity, const char *hash, CSSM_KEYUSE keyUsage) argument
393 SecIdentityRef identity = NULL; local
[all...]
/macosx-10.9.5/WebCore-7537.78.1/platform/network/
H A DCredential.h59 Credential(SecIdentityRef identity, CFArrayRef certificates, CredentialPersistence);
70 SecIdentityRef identity() const;
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/include/dns/
H A Dssu.h102 dns_name_t *identity, unsigned int matchtype,
107 * either grants or denies update privileges of an identity (or set of
113 * name to be updated matches the signing identity.
123 *\li 'identity' is a valid absolute name
205 dns_ssu_external_match(dns_name_t *identity, dns_name_t *signer,
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/
H A Deap_sim.h127 int EAPSIMIdentity(char *identity, int maxlen);
134 int EAPAKAIdentity(char *identity, int maxlen);
H A Deap.h61 #define EAP_TYPE_IDENTITY 1 /* request for identity */
131 char *identity; // authenticatee identity member in struct:EAP_Input
191 int (*identity) (char *identity, int maxlen); member in struct:eap_ext
198 char *our_identity; /* Our identity name */
201 char peer_identity[MAX_NAME_LENGTH]; /* peer name discovered with identity request */
/macosx-10.9.5/smb-697.95.1/lib/smb/
H A Dgss.c54 gss_auth_identity_desc identity; local
61 identity.type = GSS_AUTH_IDENTITY_TYPE_1;
62 identity.flags = 0;
63 identity.username = strdup(user);
64 identity.realm = strdup(domain ? domain : "");
65 identity.password = strdup(password);
66 identity.credentialsRef = NULL;
68 if (identity.username == NULL ||
69 identity.realm == NULL ||
70 identity
[all...]
/macosx-10.9.5/Security-55471.14.18/sec/Security/Tool/
H A Dpkcs12_util.c178 /* find the identity using the persistent handle */
190 printf("Found identity:\n");
209 SecIdentityRef identity; local
213 /* add identity */
214 identity = (SecIdentityRef)CFDictionaryGetValue(item_dict, kSecImportItemIdentity);
215 if (identity != NULL) {
218 SecIdentityCopyCertificate(identity, &cert);
227 identity };
239 fprintf(stderr, "SecItemAdd(identity) failed %d\n",
278 SecIdentityRef identity; local
[all...]
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/
H A Dtest_gssscram.c181 gss_auth_identity_desc identity; local
184 memset(&identity, 0, sizeof(identity));
186 identity.username = rk_UNCONST(user);
187 identity.realm = "";
188 identity.password = rk_UNCONST(password);
203 &identity,
/macosx-10.9.5/cups-372.4/cups/scheduler/
H A Dtls-darwin.c162 SecIdentityRef identity = NULL;/* Identity */ local
219 err = SecItemCopyMatching(query, (CFTypeRef *)&identity);
253 err = SecItemCopyMatching(query, (CFTypeRef *)&identity);
265 if (CFGetTypeID(identity) != SecIdentityGetTypeID())
271 if ((certificates = CFArrayCreate(NULL, (const void **)&identity,
284 if (identity)
285 CFRelease(identity);
/macosx-10.9.5/OpenSSH-186/openssh/regress/
H A Dconch-ciphers.sh22 ${CONCH} --identity $OBJ/rsa --port $PORT --user $USER -e none \
/macosx-10.9.5/Security-55471.14.18/include/security_smime/
H A DSecCmsSignerInfo.h51 SecCmsSignerInfoCreate(SecCmsMessageRef cmsg, SecIdentityRef identity, SECOidTag digestalgtag);
208 SECOidTag digestalg, SecIdentityRef identity);
/macosx-10.9.5/Security-55471.14.18/libsecurity_smime/lib/
H A DSecCmsSignerInfo.h51 SecCmsSignerInfoCreate(SecCmsMessageRef cmsg, SecIdentityRef identity, SECOidTag digestalgtag);
208 SECOidTag digestalg, SecIdentityRef identity);
/macosx-10.9.5/ppp-727.90.1/Helpers/pppd/
H A Deap.h72 int (*identity) __P((char *identity, int maxlen)); member in struct:eap_ext
86 char *our_identity; /* Our identity name */
89 char peer_identity[MAX_NAME_LENGTH]; /* peer name discovered with identity request */
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/virtchannel_transform/
H A DpkgIndex.tcl8 package ifneeded tcl::transform::identity 1 [list source [list [file join $dir identity.tcl]]]
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/servers/slapd/back-sql/rdbms_depend/mssql/
H A Dbacksql_create.sql2 id int identity (1, 1) not null ,
29 id int identity (1, 1) not null ,
52 id int identity (1, 1) not null ,
/macosx-10.9.5/WebCore-7537.78.1/platform/graphics/win/
H A DSimpleFontDataWin.cpp100 static const MAT2 identity = { 0, 1, 0, 0, 0, 0, 0, 1 }; local
101 DWORD len = GetGlyphOutline(hdc, 'x', GGO_METRICS, &gm, 0, 0, &identity);
210 static const MAT2 identity = { 0, 1, 0, 0, 0, 0, 0, 1 };
211 GetGlyphOutline(hdc, glyph, GGO_METRICS | GGO_GLYPH_INDEX, &gdiMetrics, 0, 0, &identity);
235 static const MAT2 identity = { 0, 1, 0, 0, 0, 0, 0, 1 }; local
236 GetGlyphOutline(hdc, glyph, GGO_METRICS | GGO_GLYPH_INDEX, &gdiMetrics, 0, 0, &identity);
/macosx-10.9.5/KerberosHelper-148/Source/
H A Dlkdc_acl.c214 const char *identity)
268 printf("added %s to acl for %s\n", trustedAppName, identity);
419 printf("%s -s identity -t\t\t\ttest using identitys key\n",
421 printf("%s -s identity -a application\tadd appliction to acl\n",
423 printf("%s -s identity -D\t\t\tdelete all ACL\n",
425 printf("%s -s identity -l\t\t\tlist ACL\n",
440 const char *identity = NULL; local
456 identity = optarg;
468 if (identity == NULL) {
469 fprintf(stderr, "no identity give
212 addTrustedApplication(SecKeychainItemRef itemRef, const char *trustedAppName, const char *identity) argument
[all...]

Completed in 494 milliseconds

1234567891011>>