/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/Regressions/ |
H A D | sd-10-policytree.c | 9 #include <libDER/oids.h>
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/regressions/ |
H A D | kc-41-sececkey.c | 100 static const SecAsn1Oid *oids[] = { local 112 for (ix = 0; ix < sizeof(oids) / sizeof(*oids); ++ix) { 113 if (oids[ix]) { 114 algId.algorithm = *oids[ix];
|
H A D | kc-40-seckey.c | 89 static const SecAsn1Oid *oids[] = { local 106 for (ix = 0; ix < sizeof(oids) / sizeof(*oids); ++ix) { 107 if (oids[ix]) { 108 algId.algorithm = *oids[ix]; 308 oidlen = 11 for the sha2 family of oids, so we have 29 bytes; or
|
/macosx-10.10.1/OpenSSL098-52/src/crypto/objects/ |
H A D | objects.pl | 219 $oids = join('L,',@a) . "L"; 220 if ($oids ne "L") 222 $oids = $pref_oid . $pref_sep . $oids; 226 $oids = $pref_oid; 228 return($oids);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/ |
H A D | requirements.grammar | 122 } else if (const char *oids = matchPrefix(key, "field.")) { 125 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids); 127 } else if (const char *oids = matchPrefix(key, "extension.")) { 130 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids); 132 } else if (const char *oids = matchPrefix(key, "policy.")) { 135 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids);
|
/macosx-10.10.1/OpenSSL098-52/src/crypto/ocsp/ |
H A D | ocsp_ext.c | 459 X509_EXTENSION *OCSP_accept_responses_new(char **oids) argument 467 while (oids && *oids) 469 if ((nid=OBJ_txt2nid(*oids))!=NID_undef&&(o=OBJ_nid2obj(nid))) 471 oids++; 507 /* per ACCESS_DESCRIPTION parameter are oids, of which there are currently
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-41-sececkey.c | 94 static const SecAsn1Oid *oids[] = { local 106 for (ix = 0; ix < array_size(oids); ++ix) { 107 if (oids[ix]) { 108 algId.algorithm = *oids[ix];
|
H A D | si-40-seckey.c | 85 static const SecAsn1Oid *oids[] = { local 102 for (ix = 0; ix < array_size(oids); ++ix) { 103 if (oids[ix]) { 104 algId.algorithm = *oids[ix]; 260 oidlen = 11 for the sha2 family of oids, so we have 29 bytes; or
|
/macosx-10.10.1/Heimdal-398.1.2/lib/gssapi/ |
H A D | test_gssscram.c | 154 gss_cred_id_t cred, gss_OID_set oids, OM_uint32 time_rec) 167 gss_release_oid_set(&junk, &oids); 153 ac_complete(void *ctx, OM_uint32 major, gss_status_id_t status, gss_cred_id_t cred, gss_OID_set oids, OM_uint32 time_rec) argument
|
/macosx-10.10.1/pam_modules-140/modules/pam_ntlm/ |
H A D | pam_ntlm.c | 69 gss_cred_id_t cred, gss_OID_set oids, OM_uint32 time_rec) 73 gss_release_oid_set(&junk, &oids); 68 ac_complete(void *ctx, OM_uint32 major, gss_status_id_t status, gss_cred_id_t cred, gss_OID_set oids, OM_uint32 time_rec) argument
|
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/servers/slapd/ |
H A D | controls.c | 459 char **oids; local 475 oids = (char **)SLAP_MALLOC( (n + 1) * sizeof(char *) ); 476 if ( oids == NULL ) { 481 SLAP_FREE( oids ); 488 oids[n] = ch_strdup( sc->sc_oid ); 492 oids[n] = NULL; 495 *ctrloidsp = oids; 928 char *oids[ 2 ]; local 929 oids[ 0 ] = failed_oid; 930 oids[ [all...] |
H A D | backend.c | 971 char *oids[ 2 ]; local 972 oids[ 0 ] = (*ctrls)->ldctl_oid; 973 oids[ 1 ] = NULL; 974 slap_ctrl_whatFailed_add( op, rs, oids );
|
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/libraries/libldap/ |
H A D | tls2.c | 62 static oid_name oids[] = { variable 1082 for ( i=0; !BER_BVISNULL( &oids[i].oid ); i++ ) { 1083 if ( oids[i].oid.bv_len != oid->bv_len ) continue; 1084 if ( !strcmp( oids[i].oid.bv_val, oid->bv_val )) 1085 return &oids[i]; 1194 char oids[8192], *oidptr = oids, *oidbuf = NULL; local 1198 size_t dnsize, oidrem = sizeof(oids), oidsize = 0; 1287 oidsize = sizeof(oids) * 2;
|
/macosx-10.10.1/Heimdal-398.1.2/lib/hx509/ |
H A D | ks_p12.c | 168 const heim_oid *oids[] = { local 173 for (i = 0; i < sizeof(oids)/sizeof(oids[0]); i++) { 174 const heim_oid *oid = oids[i];
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | RequirementParser.cpp | 73 } else if (const char *oids = matchPrefix(key, "field.")) { 76 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids); 78 } else if (const char *oids = matchPrefix(key, "extension.")) { 81 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids); 83 } else if (const char *oids = matchPrefix(key, "policy.")) { 86 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | RequirementParser.cpp | 73 } else if (const char *oids = matchPrefix(key, "field.")) { 76 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids); 78 } else if (const char *oids = matchPrefix(key, "extension.")) { 81 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids); 83 } else if (const char *oids = matchPrefix(key, "policy.")) { 86 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids);
|
/macosx-10.10.1/cups-408/cups/cups/ |
H A D | auth.c | 87 gss_cred_id_t creds, gss_OID_set oids, 485 gss_OID_set oids, /* I - Mechanism OIDs (unused) */ 499 gss_release_oid_set(&min, &oids); 480 cups_gss_acquire( void *ctx, OM_uint32 major, gss_status_id_t status, gss_cred_id_t creds, gss_OID_set oids, OM_uint32 time_rec) argument
|
/macosx-10.10.1/smb-759.0/lib/smb/ |
H A D | gss.c | 39 gss_cred_id_t creds, gss_OID_set oids, OM_uint32 time_rec __unused) 44 gss_release_oid_set(&min, &oids); 38 acquire_cred_complete(void *ctx, OM_uint32 maj, gss_status_id_t status __unused, gss_cred_id_t creds, gss_OID_set oids, OM_uint32 time_rec __unused) argument
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/ |
H A D | SecImportExport.c | 34 #include <libDER/oids.h>
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/ |
H A D | policytree.c | 29 #include <libDER/oids.h> 81 plus all oids in either set. */
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_smime/ |
H A D | secoid.c | 478 const static SECOidData oids[] = { variable 851 /* verisign oids */ 856 /* pkix oids */ 944 /* pkcs12 v2 oids */ 1329 for ( i = 0; i < ( sizeof(oids) / sizeof(SECOidData) ); i++ ) { 1330 oid = &oids[i]; 1432 PORT_Assert((unsigned int)tagnum < (sizeof(oids) / sizeof(SECOidData))); 1433 return (SECOidData *)(&oids[tagnum]);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_smime/lib/ |
H A D | secoid.c | 478 const static SECOidData oids[] = { variable 851 /* verisign oids */ 856 /* pkix oids */ 944 /* pkcs12 v2 oids */ 1329 for ( i = 0; i < ( sizeof(oids) / sizeof(SECOidData) ); i++ ) { 1330 oid = &oids[i]; 1432 PORT_Assert((unsigned int)tagnum < (sizeof(oids) / sizeof(SECOidData))); 1433 return (SECOidData *)(&oids[tagnum]);
|
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/Security/ |
H A D | secoid.c | 615 static const SECOidData oids[] = { variable 984 /* verisign oids */ 989 /* pkix oids */ 1075 /* pkcs12 v2 oids */ 1397 for ( ix = 0; ix < ( sizeof(oids) / sizeof(SECOidData) ); ix++ ) { 1398 oid = &oids[ix]; 1497 PORT_Assert((unsigned int)tagnum < (sizeof(oids) / sizeof(SECOidData))); 1498 return (SECOidData *)(&oids[tagnum]);
|
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/lib/ |
H A D | secoid.c | 615 static const SECOidData oids[] = { variable 984 /* verisign oids */ 989 /* pkix oids */ 1075 /* pkcs12 v2 oids */ 1397 for ( ix = 0; ix < ( sizeof(oids) / sizeof(SECOidData) ); ix++ ) { 1398 oid = &oids[ix]; 1497 PORT_Assert((unsigned int)tagnum < (sizeof(oids) / sizeof(SECOidData))); 1498 return (SECOidData *)(&oids[tagnum]);
|
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/security_smime/ |
H A D | secoid.c | 615 static const SECOidData oids[] = { variable 984 /* verisign oids */ 989 /* pkix oids */ 1075 /* pkcs12 v2 oids */ 1397 for ( ix = 0; ix < ( sizeof(oids) / sizeof(SECOidData) ); ix++ ) { 1398 oid = &oids[ix]; 1497 PORT_Assert((unsigned int)tagnum < (sizeof(oids) / sizeof(SECOidData))); 1498 return (SECOidData *)(&oids[tagnum]);
|