/macosx-10.9.5/Security-55471.14.18/include/security_codesigning/ |
H A D | syspolicy.sql | 140 values (1, 1, 2, 'Mac App Store', 'anchor apple generic and certificate leaf[field.1.2.840.113635.100.6.1.9] exists'); 144 values (2, 1, 2, 'Mac App Store', 'anchor apple generic and certificate leaf[field.1.2.840.113635.100.6.1.10] exists'); 148 values (1, 1, 2, 'Developer ID', 'anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] exists and certificate leaf[field.1.2.840.113635.100.6.1.13] exists'); 150 values (2, 1, 2, 'Developer ID', 'anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] exists and (certificate leaf[field.1.2.840.113635.100.6.1.14] or certificate leaf[field.1.2.840.113635.100.6.1.13])');
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_codesigning/lib/ |
H A D | syspolicy.sql | 140 values (1, 1, 2, 'Mac App Store', 'anchor apple generic and certificate leaf[field.1.2.840.113635.100.6.1.9] exists'); 144 values (2, 1, 2, 'Mac App Store', 'anchor apple generic and certificate leaf[field.1.2.840.113635.100.6.1.10] exists'); 148 values (1, 1, 2, 'Developer ID', 'anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] exists and certificate leaf[field.1.2.840.113635.100.6.1.13] exists'); 150 values (2, 1, 2, 'Developer ID', 'anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] exists and (certificate leaf[field.1.2.840.113635.100.6.1.14] or certificate leaf[field.1.2.840.113635.100.6.1.13])');
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/Tool/ |
H A D | scep.c | 321 SecCertificateRef leaf = NULL; local 543 leaf = (SecCertificateRef)CFArrayGetValueAtIndex(issued_certs, 0); 544 require(leaf, out); 545 CFDataRef leaf_data = SecCertificateCopyData(leaf); 551 CFShow(leaf); 553 candidate_identity = SecIdentityCreate(kCFAllocatorDefault, leaf, phone_privateKey);
|
/macosx-10.9.5/CPANInternal-140/Tree-Simple-VisitorFactory/t/ |
H A D | 80_Tree_Simple_Visitor_Sort_test.t | 163 # test visitiing a leaf node 164 my $leaf = Tree::Simple->new("leaf"); 165 $leaf->accept($visitor);
|
/macosx-10.9.5/CPANInternal-140/Tree-Simple-VisitorFactory-0.10/t/ |
H A D | 80_Tree_Simple_Visitor_Sort_test.t | 163 # test visitiing a leaf node 164 my $leaf = Tree::Simple->new("leaf"); 165 $leaf->accept($visitor);
|
/macosx-10.9.5/llvmCore-3425.0.33/include/llvm/ADT/ |
H A D | IntervalMap.h | 169 // Both leaf and branch nodes store vectors of pairs. 412 // Compute the leaf node branching factor that makes a node fit in three 426 // Now that we have the leaf branching factor, compute the actual allocation 435 /// Allocator - The recycling allocator used for both branch and leaf nodes. 458 // A NodeRef doesn't know whether it references a leaf node or a branch node. 670 // When all of the leaf nodes from all the subtrees are concatenated, they must 671 // satisfy the same constraints as a single leaf node. They must be sorted, 766 /// path - The path entries, path[0] is the root node, path.back() is a leaf. 779 template <typename NodeT> NodeT &leaf() const { 959 // 1: Root points to leaf [all...] |
/macosx-10.9.5/CPANInternal-140/Heap/Binary/ |
H A D | Binary.pm | 263 # child up until a pair of larger children is found or a leaf node is 269 my $leaf = int(@$h/2); 271 while( $i < $leaf ) {
|
/macosx-10.9.5/CPANInternal-140/Heap-0.80/lib/Heap/ |
H A D | Binary.pm | 250 # child up until a pair of larger children is found or a leaf node is 256 my $leaf = int(@$h/2); 258 while( $i < $leaf ) {
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/ |
H A D | SecSCEP.c | 637 secdebug("scep", "candidate leaf: %@ forms chain of length %" PRIdCFIndex, candidate_leaf, chain_count); 639 SecCertificateRef leaf = SecTrustGetCertificateAtIndex(trust, 0); local 679 // is leaf allowed to sign and/or encrypt? 680 SecKeyUsage key_usage = SecCertificateGetKeyUsage(leaf); 684 _ra_certificate = leaf; 685 CFRetain(leaf); 688 _ra_encryption_certificate = leaf; 689 CFRetain(leaf); 692 _ra_signing_certificate = leaf; 693 CFRetain(leaf); [all...] |
H A D | SecCertificatePath.c | 68 0 means nothing has been checked. 1 means the leaf has been verified 73 none. 0 means the leaf is self signed. */ 288 SecCertificateRef leaf) { 294 /* First make sure the new leaf is signed by path's current leaf. */ 298 OSStatus status = SecCertificateIsSignedBy(leaf, issuerKey); 327 result->certificates[0] = leaf; 328 CFRetain(leaf); 370 self signed counting from the leaf up. Return -1 if there is none. */ 417 /* Return the leaf certificat 287 SecCertificatePathCopyAddingLeaf(SecCertificatePathRef path, SecCertificateRef leaf) argument [all...] |
/macosx-10.9.5/libstdcxx-60/include/c++/4.2.1/ext/pb_ds/detail/pat_trie_/ |
H A D | erase_fn_imps.hpp | 128 p_l->~leaf(); 169 static_cast<leaf_pointer>(p_nd)->~leaf();
|
H A D | pat_trie_.hpp | 149 typedef typename Node_And_It_Traits::leaf leaf; typedef in class:pb_ds::detail::PB_DS_CLASS_NAME 150 typedef typename Allocator::template rebind<leaf>::other leaf_allocator;
|
H A D | constructors_destructor_fn_imps.hpp | 180 new (p_new_lf) leaf(p_other_leaf->value());
|
/macosx-10.9.5/tcl-102/tk84/tk/generic/ |
H A D | tkOption.c | 23 * leaf of the tree. For example, the options "x.y.z" and "x.y*a" 25 * "x" and "x.y", but have different leaf nodes. One of the following 26 * structures exists for each node or leaf in the option tree. It is 34 * leaf class nodes 35 * leaf name nodes 37 * All interior nodes refer to _window_ classes and names; all leaf nodes 40 * values, and compare leaf node values to corresponding option values. 69 Tk_Uid valueUid; /* For leaf nodes, this is the string 77 * leaf nodes. */ 87 * NODE - Zero means this is a leaf elemen [all...] |
/macosx-10.9.5/vim-53/src/ |
H A D | os_riscos.c | 861 * If (3) is nothing then only the leaf is wildcarded - add to gap 882 * If rest is just a leaf then all matches are added to gap. 960 * Now : have we reached the leaf names part yet? 976 /* If start_element is -1 then we are matching leaf names */ 1003 buf[buflen] = '.'; /* Join path and leaf */ 1149 char_u *leaf; /* Pointer to start of leaf in old_name */ local 1164 leaf = fname; 1169 leaf = ptr + 1; 1179 * leaf pt [all...] |
/macosx-10.9.5/CPANInternal-140/Tree-Simple-VisitorFactory/lib/Tree/Simple/Visitor/ |
H A D | CreateDirectoryTree.pm | 65 # if its a leaf and it 152 =item Any node which is not a leaf is considered a directory. 154 Obviously since files themselves are leaf nodes, this makes sense that non-leaves will be directories. 156 =item Any node (including leaf nodes) which ends in either the character C</> or C<\> is considered a directory.
|
/macosx-10.9.5/CPANInternal-140/Tree-Simple-VisitorFactory-0.10/lib/Tree/Simple/Visitor/ |
H A D | CreateDirectoryTree.pm | 65 # if its a leaf and it 152 =item Any node which is not a leaf is considered a directory. 154 Obviously since files themselves are leaf nodes, this makes sense that non-leaves will be directories. 156 =item Any node (including leaf nodes) which ends in either the character C</> or C<\> is considered a directory.
|
/macosx-10.9.5/Heimdal-323.92.1/lib/roken/ |
H A D | tsearch.c | 82 (*action)(root, leaf, level);
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/ |
H A D | si-21-sectrust-asr.c | 117 SecCertificateRef leaf, root; local 129 isnt(leaf = SecCertificateCreateWithData(kCFAllocatorDefault, cert_data), NULL, "create leaf"); 132 CFArrayRef certs = CFArrayCreate(kCFAllocatorDefault, (const void **)&leaf, 1, NULL); 140 ok_status(SecTrustCreateWithCertificates(certs, policy, &trust), "create trust for leaf"); 150 isnt(pub_key_leaf = SecTrustCopyPublicKey(trust), NULL, "get leaf pub key"); 159 CFReleaseSafe(leaf);
|
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/pt/tests/data/ok/peg_tclparam-snit/ |
H A D | 3_peg_itself | 72 # leaf Symbol 'ALNUM' 100 # leaf Symbol 'ALPHA' 128 # leaf Symbol 'AND' 169 # leaf Symbol 'ASCII' 282 # leaf Symbol 'CharOctalFull' 318 # leaf Symbol 'CharOctalPart' 362 # leaf Symbol 'CharSpecial' 390 # leaf Symbol 'CharUnescaped' 430 # leaf Symbol 'CharUnicode' 777 # leaf Symbo [all...] |
/macosx-10.9.5/tcl-102/tcl_ext/xotcl/xotcl/library/xml/ |
H A D | sgml.tcl | 1147 # Evaluated for leaf nodes 1151 set nullable [nullable leaf $rep $name] 1233 # followpos functions for each leaf node, in name/value format 1258 # No action at leaf nodes 1285 # leaf Evaluated at a leaf node 1291 proc sgml::TraverseDepth1st {state t leaf nonTerm} { 1306 [TraverseDepth1st $state $child $leaf $nonTerm] break 1318 eval $leaf 1418 # nodeType leaf o [all...] |
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/pt/tests/data/ok/peg_cparam-critcl/ |
H A D | 3_peg_itself | 1951 /* 96 = */ "str 'leaf'", 2037 * leaf Symbol 'ALNUM' 2069 * leaf Symbol 'ALPHA' 2101 * leaf Symbol 'AND' 2148 * leaf Symbol 'ASCII' 2275 * leaf Symbol 'CharOctalFull' 2315 * leaf Symbol 'CharOctalPart' 2365 * leaf Symbol 'CharSpecial' 2397 * leaf Symbol 'CharUnescaped' 2443 * leaf Symbo [all...] |
/macosx-10.9.5/ncurses-42/ncurses/test/ |
H A D | ditto.c | 155 char *leaf; local 160 if ((leaf = strrchr(slave_name, '/')) == 0) {
|
/macosx-10.9.5/vim-53/runtime/syntax/ |
H A D | mib.vim | 40 syn keyword mibEpilogue leaf-name
|
/macosx-10.9.5/tcl-102/tk/tk/generic/ |
H A D | tkOption.c | 21 * or class field in an option is associated with a node or leaf of the tree. 23 * in the tree; they share the nodes "x" and "x.y", but have different leaf 24 * nodes. One of the following structures exists for each node or leaf in the 32 * leaf class nodes 33 * leaf name nodes 35 * All interior nodes refer to _window_ classes and names; all leaf nodes 38 * values, and compare leaf node values to corresponding option values. 67 Tk_Uid valueUid; /* For leaf nodes, this is the string value of 73 * priority. Irrelevant except in leaf 84 * NODE - Zero means this is a leaf elemen 1229 SetupStacks( TkWindow *winPtr, int leaf) argument 1394 ExtendStacks( ElArray *arrayPtr, int leaf) argument [all...] |