/macosx-10.10/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | SecRequirement.h | 65 @param requirement On successful return, contains a reference to a SecRequirement 71 SecRequirementRef *requirement); 77 of a requirement. 81 @param requirement On successful return, contains a reference to a SecRequirement 91 SecRequirementRef *requirement); 94 CFErrorRef *errors, SecRequirementRef *requirement); 102 @param requirement A valid SecRequirement object. 110 OSStatus SecRequirementCopyData(SecRequirementRef requirement, SecCSFlags flags, 125 @param requirement A valid SecRequirement object. 128 containing a text representation of the requirement [all...] |
H A D | Requirements.cpp | 74 // CF-level comparison of SecRequirement objects compares the entire requirement 75 // structure for equality. This means that two requirement programs are recognized 82 return !memcmp(this->requirement(), other->requirement(), this->requirement()->length()); 87 return CFHash(CFTempDataWrap(*this->requirement()));
|
H A D | SecTaskPriv.h | 36 @abstract Validate a SecTask instance for a specified requirement. 38 @param requirement A requirement string to be validated. 40 task satisfies the requirement. 42 OSStatus SecTaskValidateForRequirement(SecTaskRef task, CFStringRef requirement);
|
H A D | SecRequirementPriv.h | 41 Take a dictionary of requirement objects and package them up as a requirement set. 61 @param requirementSet A CFData containing a requirement set. 63 @param requirements Upon success, a dictionary containing each requirement contained 64 in requirementSet. The keys are CFNumbers indicating the requirement type. 74 Create a SecRequirement object or requirement set based on the string provided. 82 can be a SecRequirementRef (for a single requirement) or a CFDataRef for a requirement set. 92 kSecCSParseRequirementSet = 0x0002, // accept requirement sets 101 Converts a requirement objec [all...] |
H A D | SecStaticCode.h | 133 @param requirement On optional code requirement specifying additional conditions 154 SecRequirementRef requirement); 157 SecRequirementRef requirement, CFErrorRef *errors);
|
H A D | Requirements.h | 31 #include "requirement.h" 39 // requirement. All its semantics are within the Requirement object it holds. 54 const Requirement *requirement() const { return mReq; } function in class:Security::CodeSigning::SecRequirement
|
H A D | SecCode.h | 205 @param requirement An optional code requirement specifying additional conditions 216 SecRequirementRef requirement); 219 SecRequirementRef requirement, CFErrorRef *errors); 259 @param requirement On successful return, contains a copy of a SecRequirement 265 SecRequirementRef *requirement); 346 the designated requirement that the system did generate, or would have generated,
|
H A D | reqreader.h | 30 #include <security_codesigning/requirement.h> 38 // The Reader class provides structured access to a opExpr-type code requirement. 44 const Requirement *requirement() const { return mReq; } function in class:Security::CodeSigning::Requirement::Reader
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | SecRequirement.h | 65 @param requirement On successful return, contains a reference to a SecRequirement 71 SecRequirementRef *requirement); 77 of a requirement. 81 @param requirement On successful return, contains a reference to a SecRequirement 91 SecRequirementRef *requirement); 94 CFErrorRef *errors, SecRequirementRef *requirement); 102 @param requirement A valid SecRequirement object. 110 OSStatus SecRequirementCopyData(SecRequirementRef requirement, SecCSFlags flags, 125 @param requirement A valid SecRequirement object. 128 containing a text representation of the requirement [all...] |
H A D | Requirements.cpp | 74 // CF-level comparison of SecRequirement objects compares the entire requirement 75 // structure for equality. This means that two requirement programs are recognized 82 return !memcmp(this->requirement(), other->requirement(), this->requirement()->length()); 87 return CFHash(CFTempDataWrap(*this->requirement()));
|
H A D | SecTaskPriv.h | 36 @abstract Validate a SecTask instance for a specified requirement. 38 @param requirement A requirement string to be validated. 40 task satisfies the requirement. 42 OSStatus SecTaskValidateForRequirement(SecTaskRef task, CFStringRef requirement);
|
H A D | SecRequirementPriv.h | 41 Take a dictionary of requirement objects and package them up as a requirement set. 61 @param requirementSet A CFData containing a requirement set. 63 @param requirements Upon success, a dictionary containing each requirement contained 64 in requirementSet. The keys are CFNumbers indicating the requirement type. 74 Create a SecRequirement object or requirement set based on the string provided. 82 can be a SecRequirementRef (for a single requirement) or a CFDataRef for a requirement set. 92 kSecCSParseRequirementSet = 0x0002, // accept requirement sets 101 Converts a requirement objec [all...] |
H A D | SecStaticCode.h | 133 @param requirement On optional code requirement specifying additional conditions 154 SecRequirementRef requirement); 157 SecRequirementRef requirement, CFErrorRef *errors);
|
H A D | Requirements.h | 31 #include "requirement.h" 39 // requirement. All its semantics are within the Requirement object it holds. 54 const Requirement *requirement() const { return mReq; } function in class:Security::CodeSigning::SecRequirement
|
H A D | SecCode.h | 205 @param requirement An optional code requirement specifying additional conditions 216 SecRequirementRef requirement); 219 SecRequirementRef requirement, CFErrorRef *errors); 259 @param requirement On successful return, contains a copy of a SecRequirement 265 SecRequirementRef *requirement); 346 the designated requirement that the system did generate, or would have generated,
|
/macosx-10.10/ruby-106/ruby/lib/rubygems/ |
H A D | dependency.rb | 4 require "rubygems/requirement" 58 @requirement = Gem::Requirement.create requirements 63 # +requirement+ for the dirty details. 65 @version_requirements = @requirement 70 # and +requirement+. 73 name.hash ^ type.hash ^ requirement.hash 79 [self.class, self.type, self.name, requirement.to_s] 82 [self.class, self.type, self.name, requirement.to_s] 90 @prerelease || requirement.prerelease? 98 @requirement 119 def requirement method in class:Gem [all...] |
H A D | errors.rb | 18 # Version requirement of gem 19 attr_accessor :requirement
|
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecTrustedApplicationPriv.h | 52 the requirement being provided. This is for information purposes only 56 @param requirement A SecRequirementRef indicating what conditions an application 59 code that satisfies the requirement argument. 63 SecRequirementRef requirement, SecTrustedApplicationRef *app); 67 @abstract If a SecTrustedApplicationRef contains a Code Signing requirement, 68 it can be retrieved with this call. If no requirement is recorded, requirement 71 @param requirement Receives the SecRequirementRef contained in appRef, if any. 72 If no Code Signing requirement is contained in appRef, *requirement i [all...] |
H A D | TrustedApplication.h | 57 TrustedApplication(const std::string &path, SecRequirementRef requirement); // with requirement and aux. path 63 SecRequirementRef requirement() const { return mForm->requirement(); } function in class:Security::KeychainCore::TrustedApplication
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecTrustedApplicationPriv.h | 52 the requirement being provided. This is for information purposes only 56 @param requirement A SecRequirementRef indicating what conditions an application 59 code that satisfies the requirement argument. 63 SecRequirementRef requirement, SecTrustedApplicationRef *app); 67 @abstract If a SecTrustedApplicationRef contains a Code Signing requirement, 68 it can be retrieved with this call. If no requirement is recorded, requirement 71 @param requirement Receives the SecRequirementRef contained in appRef, if any. 72 If no Code Signing requirement is contained in appRef, *requirement i [all...] |
H A D | TrustedApplication.h | 57 TrustedApplication(const std::string &path, SecRequirementRef requirement); // with requirement and aux. path 63 SecRequirementRef requirement() const { return mForm->requirement(); } function in class:Security::KeychainCore::TrustedApplication
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecTrustedApplicationPriv.h | 52 the requirement being provided. This is for information purposes only 56 @param requirement A SecRequirementRef indicating what conditions an application 59 code that satisfies the requirement argument. 63 SecRequirementRef requirement, SecTrustedApplicationRef *app); 67 @abstract If a SecTrustedApplicationRef contains a Code Signing requirement, 68 it can be retrieved with this call. If no requirement is recorded, requirement 71 @param requirement Receives the SecRequirementRef contained in appRef, if any. 72 If no Code Signing requirement is contained in appRef, *requirement i [all...] |
H A D | TrustedApplication.h | 57 TrustedApplication(const std::string &path, SecRequirementRef requirement); // with requirement and aux. path 63 SecRequirementRef requirement() const { return mForm->requirement(); } function in class:Security::KeychainCore::TrustedApplication
|
/macosx-10.10/ruby-106/ruby/lib/rubygems/core_ext/ |
H A D | kernel_gem.rb | 11 # Gem::Requirement for how to specify a version requirement. 43 requirements = gem_name.requirement
|
/macosx-10.10/security_systemkeychain-55202/src/ |
H A D | csreq.cpp | 25 // csreq - code requirement munging tool for Code Signing 37 const char *requirement = NULL; // requirement input variable 94 requirement = optarg; 113 if (requirement == NULL) 116 CFRef<CFTypeRef> req = readRequirement(requirement, reqType); 128 if (result.empty()) // empty requirement set 160 "Usage: csreq [-v] -r requirement # check\n" 161 " csreq [-v] -r requirement -t # text output\n" 162 " csreq [-v] -r requirement [all...] |