/macosx-10.9.5/Heimdal-323.92.1/lib/hx509/ |
H A D | name.c | 164 stringtooid(const char *name, size_t len, heim_oid *oid) argument 170 memset(oid, 0, sizeof(*oid)); 174 return der_copy_oid(no[i].o, oid); 181 ret = der_parse_heim_oid(s, ".", oid); 583 const heim_oid *oid, 613 ret = der_copy_oid(oid, &rdn->val[0].type); 664 heim_oid oid; local 703 ret = stringtooid(p, q - p, &oid); 718 der_free_oid(&oid); 580 _hx509_name_modify(hx509_context context, Name *name, int append, const heim_oid *oid, const char *str) argument 1027 char *oid; local 1090 char *oid; local [all...] |
H A D | ks_p12.c | 47 const heim_oid *oid; member in struct:type 57 find_attribute(const PKCS12_Attributes *attrs, const heim_oid *oid) argument 63 if (der_heim_oid_cmp(oid, &attrs->val[i].attrId) == 0) 174 const heim_oid *oid = oids[i]; local 175 attr = find_attribute(attrs, oid); 177 _hx509_set_cert_attribute(context, cert, oid, 310 const heim_oid *oid, 317 if (der_heim_oid_cmp(bagtypes[i].oid, oid) == 0) 450 const heim_oid *oid, 308 parse_pkcs12_type(hx509_context context, struct hx509_collector *c, const heim_oid *oid, const void *data, size_t length, const PKCS12_Attributes *attrs) argument 448 addBag(hx509_context context, PKCS12_AuthenticatedSafe *as, const heim_oid *oid, void *data, size_t length) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/sec/Security/ |
H A D | SecECKey.c | 99 static ccec_const_cp_t ccec_cp_for_oid(ccoid_t oid) argument 101 if (oid.oid) { 102 if (ccoid_equal(oid, ccoid_secp192r1)) { 104 } else if (ccoid_equal(oid, ccoid_secp256r1)) { 106 } else if (ccoid_equal(oid, ccoid_secp224r1)) { 108 } else if (ccoid_equal(oid, ccoid_secp384r1)) { 110 } else if (ccoid_equal(oid, ccoid_secp521r1)) { 363 ccoid_t oid; local 367 require_noerr(ccec_der_import_priv_keytype(keyDataLength, keyData, &oid, [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_smime/ |
H A D | secoid.c | 66 /* netscape directory oid - owned by Mark Smith (mcs@netscape.com) */ 467 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, desc, mech, ext } 469 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, 0, mech, ext } 1144 SECOidData *oid; local 1161 oid = secoidDynamicTable[i]; 1163 entry = PL_HashTableAdd( oid_d_hash, &oid->oid, oid ); 1312 const SECOidData *oid; local 1381 SECOID_FindOID(const SECItem *oid) argument 1409 SECOID_FindOIDTag(const SECItem *oid) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_smime/lib/ |
H A D | secoid.c | 66 /* netscape directory oid - owned by Mark Smith (mcs@netscape.com) */ 467 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, desc, mech, ext } 469 #define OD(oid,tag,desc,mech,ext) { OI(oid), tag, 0, mech, ext } 1144 SECOidData *oid; local 1161 oid = secoidDynamicTable[i]; 1163 entry = PL_HashTableAdd( oid_d_hash, &oid->oid, oid ); 1312 const SECOidData *oid; local 1381 SECOID_FindOID(const SECItem *oid) argument 1409 SECOID_FindOIDTag(const SECItem *oid) argument [all...] |
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/contrib/slapd-modules/comp_match/ |
H A D | componentlib.h | 66 int MatchingComponentBits (char* oid, ComponentSyntaxInfo *bits1 , ComponentSyntaxInfo* bits2); 101 int MatchingComponentBool (char* oid, ComponentSyntaxInfo *a, ComponentSyntaxInfo *b); 120 int MatchingComponentEnum (char *oid, ComponentSyntaxInfo *a, ComponentSyntaxInfo * b); 160 int MatchingComponentInt (char* oid, ComponentSyntaxInfo *a, ComponentSyntaxInfo *b); 190 int MatchingComponentNull (char* oid, ComponentSyntaxInfo *a, ComponentSyntaxInfo *b); 228 int MatchingComponentOcts (char* oid, ComponentSyntaxInfo *a, ComponentSyntaxInfo *b); 244 int GEncComponentOid (GenBuf *b, ComponentOid *oid); 247 int MatchingComponentOid (char* oid, ComponentSyntaxInfo *a, ComponentSyntaxInfo *b); 283 int MatchingComponentReal (char* oid, ComponentSyntaxInfo *a, ComponentSyntaxInfo *b); 302 int MatchingComponentRelativeOid (char* oid, ComponentSyntaxInf 390 AsnOid oid; member in struct:ComponentAnyInfo [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/ |
H A D | test_pknistkdf.c | 42 const heim_oid *oid; member in struct:testcase 234 ai.algorithm = *c->oid; 355 tests[0].oid = &asn1_oid_id_pkinit_kdf_ah_sha1; 356 tests[1].oid = &asn1_oid_id_pkinit_kdf_ah_sha256; 357 tests[2].oid = &asn1_oid_id_pkinit_kdf_ah_sha512;
|
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/servers/slapd/ |
H A D | module.c | 340 struct berval oid; local 353 rc = (ext_getoid)(0, &oid, 256); 357 if (oid.bv_val == NULL || oid.bv_len == 0) { 363 rc = load_extop( &oid, ext_main );
|
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | SecCertificateInternalP.h | 274 /* Return the SecCertificateExtensionRef for the extension with the given oid. Return NULL if it does not exist or if an error occours call SecCertificateGetStatus() to see if an error occured or not. */ 275 SecCertificateExtensionRef SecCertificateGetExtensionWithOID(SecCertificateRefP certificate, CFDataRef oid); 277 CFDataRef SecCertificateExtensionGetDER(SecCertificateExtensionRef extension, CFDataRef oid); 279 CFDataRef SecCertificateExtensionGetOIDDER(SecCertificateExtensionRef extension, CFDataRef oid); 280 CFStringRef SecCertificateExtensionGetOIDString(SecCertificateExtensionRef extension, CFDataRef oid); 297 const DERItem *oid);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | SecCertificateInternalP.h | 274 /* Return the SecCertificateExtensionRef for the extension with the given oid. Return NULL if it does not exist or if an error occours call SecCertificateGetStatus() to see if an error occured or not. */ 275 SecCertificateExtensionRef SecCertificateGetExtensionWithOID(SecCertificateRefP certificate, CFDataRef oid); 277 CFDataRef SecCertificateExtensionGetDER(SecCertificateExtensionRef extension, CFDataRef oid); 279 CFDataRef SecCertificateExtensionGetOIDDER(SecCertificateExtensionRef extension, CFDataRef oid); 280 CFStringRef SecCertificateExtensionGetOIDString(SecCertificateExtensionRef extension, CFDataRef oid); 297 const DERItem *oid);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | SecCertificateInternalP.h | 274 /* Return the SecCertificateExtensionRef for the extension with the given oid. Return NULL if it does not exist or if an error occours call SecCertificateGetStatus() to see if an error occured or not. */ 275 SecCertificateExtensionRef SecCertificateGetExtensionWithOID(SecCertificateRefP certificate, CFDataRef oid); 277 CFDataRef SecCertificateExtensionGetDER(SecCertificateExtensionRef extension, CFDataRef oid); 279 CFDataRef SecCertificateExtensionGetOIDDER(SecCertificateExtensionRef extension, CFDataRef oid); 280 CFStringRef SecCertificateExtensionGetOIDString(SecCertificateExtensionRef extension, CFDataRef oid); 297 const DERItem *oid);
|
/macosx-10.9.5/BerkeleyDB-21/db/test/ |
H A D | sdbtest001.tcl | 93 set oid [open $t2 w] 95 puts $oid [expr $subdb * $newent + $i] 97 close $oid
|
H A D | test002.tcl | 116 set oid [open $t2 w] 118 puts $oid $i 120 close $oid
|
H A D | test020.tcl | 108 set oid [open $t2 w] 110 puts $oid $i 112 close $oid
|
H A D | reputils.tcl | 950 set oid [open $testdir/ELECTION_SOURCE.$elect_serial w] 952 puts $oid "source $test_path/test.tcl" 953 puts $oid "set elected_event 0" 954 puts $oid "set elected_env \"NONE\"" 955 puts $oid "set is_repchild 1" 956 puts $oid "replsetup $qdir" 957 foreach i $machids { puts $oid "repladd $i" } 958 puts $oid "set env_cmd \{$envstring\}" 960 puts $oid "set dbenv \[eval \$env_cmd -errfile \ 963 puts $oid "se [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_pkcs12/ |
H A D | pkcs12SafeBag.h | 271 const CSSM_OID &oid, 278 CFDataRef oid, 287 CSSM_OID &oid() { return mOid; } function in class:P12OpaqueBag
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_pkcs12/lib/ |
H A D | pkcs12SafeBag.h | 271 const CSSM_OID &oid, 278 CFDataRef oid, 287 CSSM_OID &oid() { return mOid; } function in class:P12OpaqueBag
|
/macosx-10.9.5/CPANInternal-140/DBIx-Class-Schema-Loader-0.07033/lib/DBIx/Class/Schema/Loader/DBI/ |
H A D | Pg.pm | 119 JOIN pg_catalog.pg_class c ON c.oid = x.indrelid 120 JOIN pg_catalog.pg_class i ON i.oid = x.indexrelid 122 LEFT JOIN pg_catalog.pg_namespace n ON n.oid = c.relnamespace 165 SELECT obj_description(oid) 167 WHERE relname=? AND relnamespace=(SELECT oid FROM pg_namespace WHERE nspname=?) 183 SELECT oid 185 WHERE relname=? AND relnamespace=(SELECT oid FROM pg_namespace WHERE nspname=?) 295 JOIN pg_catalog.pg_type t ON t.oid = e.enumtypid
|
/macosx-10.9.5/CPANInternal-140/Perl-Ldap/lib/Net/LDAP/ |
H A D | Control.pm | 56 my($class,$oid) = @_; 58 require Carp and Carp::croak("$oid is already registered to $Type2Pkg{$oid}") 59 if exists $Type2Pkg{$oid} and $Type2Pkg{$oid} ne $class; 62 if exists $Pkg2Type{$class} and $Pkg2Type{$class} ne $oid; 64 $Type2Pkg{$oid} = $class; 65 $Pkg2Type{$class} = $oid; 71 my $oid = (@_ & 1) ? shift : undef; 74 $args{'type'} ||= $oid || [all...] |
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | ssh-gss.h | 97 gss_OID_desc oid; member in struct:ssh_gssapi_mech_struct 110 gss_OID oid; /* client */ member in struct:__anon3349
|
H A D | kexgsss.c | 77 gss_OID oid; local 91 oid = ssh_gssapi_id_kex(NULL, kex->name, kex->kex_type); 92 if (oid == GSS_C_NO_OID) 97 if (GSS_ERROR(PRIVSEP(ssh_gssapi_server_ctx(&ctxt, oid))))
|
/macosx-10.9.5/tcpdump-56/tcpdump/ |
H A D | print-snmp.c | 261 u_char oid; /* sub-id following parent */ member in struct:obj 284 const char *oid; /* ASN.1 encoded OID */ member in struct:obj_abrev 313 if ((o) == objp->oid) \ 688 size_t a_len = strlen(a->oid); 691 if (memcmp(a->oid, (char *)p, a_len) == 0) { 693 i -= strlen(a->oid); 694 p += strlen(a->oid); 899 smi_decode_oid(struct be *elem, unsigned int *oid, argument 919 oid[*oidlen] = o / OIDMUX; 920 if (oid[*oidle 1029 unsigned int oid[128], oidlen; local 1059 unsigned int i, oid[128], oidlen; local [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/mech/ |
H A D | gss_cred.c | 149 gss_OID_desc oid; local 159 oid.elements = data.data; 160 oid.length = (OM_uint32)data.length; 162 m = __gss_get_mechanism(&oid);
|
H A D | gss_krb5.c | 618 heim_oid baseoid, oid; local 626 /* All this to append an integer to an oid... */ 635 oid.length = baseoid.length + 1; 636 oid.components = calloc(oid.length, sizeof(*oid.components)); 637 if (oid.components == NULL) { 644 memcpy(oid.components, baseoid.components, 649 oid.components[oid 709 gsskrb5_extract_key(OM_uint32 *minor_status, gss_ctx_id_t context_handle, const gss_OID oid, krb5_keyblock **keyblock) argument [all...] |
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/contrib/ldapc++/src/ |
H A D | LDAPConnection.h | 219 * @param oid The Object Identifier of the Extended Operation that 228 LDAPExtResult* extOperation(const std::string& oid, const std::string&
|