Searched refs:oids (Results 1 - 25 of 47) sorted by relevance

12

/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/Regressions/
H A Dsd-10-policytree.c9 #include <libDER/oids.h>
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/regressions/
H A Dkc-41-sececkey.c100 static const SecAsn1Oid *oids[] = { local
112 for (ix = 0; ix < sizeof(oids) / sizeof(*oids); ++ix) {
113 if (oids[ix]) {
114 algId.algorithm = *oids[ix];
H A Dkc-40-seckey.c89 static const SecAsn1Oid *oids[] = { local
106 for (ix = 0; ix < sizeof(oids) / sizeof(*oids); ++ix) {
107 if (oids[ix]) {
108 algId.algorithm = *oids[ix];
308 oidlen = 11 for the sha2 family of oids, so we have 29 bytes; or
/macosx-10.10.1/OpenSSL098-52/src/crypto/objects/
H A Dobjects.pl219 $oids = join('L,',@a) . "L";
220 if ($oids ne "L")
222 $oids = $pref_oid . $pref_sep . $oids;
226 $oids = $pref_oid;
228 return($oids);
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/
H A Drequirements.grammar122 } else if (const char *oids = matchPrefix(key, "field.")) {
125 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids);
127 } else if (const char *oids = matchPrefix(key, "extension.")) {
130 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids);
132 } else if (const char *oids = matchPrefix(key, "policy.")) {
135 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids);
/macosx-10.10.1/OpenSSL098-52/src/crypto/ocsp/
H A Docsp_ext.c459 X509_EXTENSION *OCSP_accept_responses_new(char **oids) argument
467 while (oids && *oids)
469 if ((nid=OBJ_txt2nid(*oids))!=NID_undef&&(o=OBJ_nid2obj(nid)))
471 oids++;
507 /* per ACCESS_DESCRIPTION parameter are oids, of which there are currently
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/Regressions/secitem/
H A Dsi-41-sececkey.c94 static const SecAsn1Oid *oids[] = { local
106 for (ix = 0; ix < array_size(oids); ++ix) {
107 if (oids[ix]) {
108 algId.algorithm = *oids[ix];
H A Dsi-40-seckey.c85 static const SecAsn1Oid *oids[] = { local
102 for (ix = 0; ix < array_size(oids); ++ix) {
103 if (oids[ix]) {
104 algId.algorithm = *oids[ix];
260 oidlen = 11 for the sha2 family of oids, so we have 29 bytes; or
/macosx-10.10.1/Heimdal-398.1.2/lib/gssapi/
H A Dtest_gssscram.c154 gss_cred_id_t cred, gss_OID_set oids, OM_uint32 time_rec)
167 gss_release_oid_set(&junk, &oids);
153 ac_complete(void *ctx, OM_uint32 major, gss_status_id_t status, gss_cred_id_t cred, gss_OID_set oids, OM_uint32 time_rec) argument
/macosx-10.10.1/pam_modules-140/modules/pam_ntlm/
H A Dpam_ntlm.c69 gss_cred_id_t cred, gss_OID_set oids, OM_uint32 time_rec)
73 gss_release_oid_set(&junk, &oids);
68 ac_complete(void *ctx, OM_uint32 major, gss_status_id_t status, gss_cred_id_t cred, gss_OID_set oids, OM_uint32 time_rec) argument
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/servers/slapd/
H A Dcontrols.c459 char **oids; local
475 oids = (char **)SLAP_MALLOC( (n + 1) * sizeof(char *) );
476 if ( oids == NULL ) {
481 SLAP_FREE( oids );
488 oids[n] = ch_strdup( sc->sc_oid );
492 oids[n] = NULL;
495 *ctrloidsp = oids;
928 char *oids[ 2 ]; local
929 oids[ 0 ] = failed_oid;
930 oids[
[all...]
H A Dbackend.c971 char *oids[ 2 ]; local
972 oids[ 0 ] = (*ctrls)->ldctl_oid;
973 oids[ 1 ] = NULL;
974 slap_ctrl_whatFailed_add( op, rs, oids );
/macosx-10.10.1/OpenLDAP-499.27/OpenLDAP/libraries/libldap/
H A Dtls2.c62 static oid_name oids[] = { variable
1082 for ( i=0; !BER_BVISNULL( &oids[i].oid ); i++ ) {
1083 if ( oids[i].oid.bv_len != oid->bv_len ) continue;
1084 if ( !strcmp( oids[i].oid.bv_val, oid->bv_val ))
1085 return &oids[i];
1194 char oids[8192], *oidptr = oids, *oidbuf = NULL; local
1198 size_t dnsize, oidrem = sizeof(oids), oidsize = 0;
1287 oidsize = sizeof(oids) * 2;
/macosx-10.10.1/Heimdal-398.1.2/lib/hx509/
H A Dks_p12.c168 const heim_oid *oids[] = { local
173 for (i = 0; i < sizeof(oids)/sizeof(oids[0]); i++) {
174 const heim_oid *oid = oids[i];
/macosx-10.10.1/Security-57031.1.35/Security/include/security_codesigning/
H A DRequirementParser.cpp73 } else if (const char *oids = matchPrefix(key, "field.")) {
76 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids);
78 } else if (const char *oids = matchPrefix(key, "extension.")) {
81 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids);
83 } else if (const char *oids = matchPrefix(key, "policy.")) {
86 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids);
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/lib/
H A DRequirementParser.cpp73 } else if (const char *oids = matchPrefix(key, "field.")) {
76 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids);
78 } else if (const char *oids = matchPrefix(key, "extension.")) {
81 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids);
83 } else if (const char *oids = matchPrefix(key, "policy.")) {
86 CssmAutoData oid(Allocator::standard()); oid.fromOid(oids);
/macosx-10.10.1/cups-408/cups/cups/
H A Dauth.c87 gss_cred_id_t creds, gss_OID_set oids,
485 gss_OID_set oids, /* I - Mechanism OIDs (unused) */
499 gss_release_oid_set(&min, &oids);
480 cups_gss_acquire( void *ctx, OM_uint32 major, gss_status_id_t status, gss_cred_id_t creds, gss_OID_set oids, OM_uint32 time_rec) argument
/macosx-10.10.1/smb-759.0/lib/smb/
H A Dgss.c39 gss_cred_id_t creds, gss_OID_set oids, OM_uint32 time_rec __unused)
44 gss_release_oid_set(&min, &oids);
38 acquire_cred_complete(void *ctx, OM_uint32 maj, gss_status_id_t status __unused, gss_cred_id_t creds, gss_OID_set oids, OM_uint32 time_rec __unused) argument
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/
H A DSecImportExport.c34 #include <libDER/oids.h>
/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/
H A Dpolicytree.c29 #include <libDER/oids.h>
81 plus all oids in either set. */
/macosx-10.10.1/Security-57031.1.35/Security/include/security_smime/
H A Dsecoid.c478 const static SECOidData oids[] = { variable
851 /* verisign oids */
856 /* pkix oids */
944 /* pkcs12 v2 oids */
1329 for ( i = 0; i < ( sizeof(oids) / sizeof(SECOidData) ); i++ ) {
1330 oid = &oids[i];
1432 PORT_Assert((unsigned int)tagnum < (sizeof(oids) / sizeof(SECOidData)));
1433 return (SECOidData *)(&oids[tagnum]);
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_smime/lib/
H A Dsecoid.c478 const static SECOidData oids[] = { variable
851 /* verisign oids */
856 /* pkix oids */
944 /* pkcs12 v2 oids */
1329 for ( i = 0; i < ( sizeof(oids) / sizeof(SECOidData) ); i++ ) {
1330 oid = &oids[i];
1432 PORT_Assert((unsigned int)tagnum < (sizeof(oids) / sizeof(SECOidData)));
1433 return (SECOidData *)(&oids[tagnum]);
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/Security/
H A Dsecoid.c615 static const SECOidData oids[] = { variable
984 /* verisign oids */
989 /* pkix oids */
1075 /* pkcs12 v2 oids */
1397 for ( ix = 0; ix < ( sizeof(oids) / sizeof(SECOidData) ); ix++ ) {
1398 oid = &oids[ix];
1497 PORT_Assert((unsigned int)tagnum < (sizeof(oids) / sizeof(SECOidData)));
1498 return (SECOidData *)(&oids[tagnum]);
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/lib/
H A Dsecoid.c615 static const SECOidData oids[] = { variable
984 /* verisign oids */
989 /* pkix oids */
1075 /* pkcs12 v2 oids */
1397 for ( ix = 0; ix < ( sizeof(oids) / sizeof(SECOidData) ); ix++ ) {
1398 oid = &oids[ix];
1497 PORT_Assert((unsigned int)tagnum < (sizeof(oids) / sizeof(SECOidData)));
1498 return (SECOidData *)(&oids[tagnum]);
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/security_smime/
H A Dsecoid.c615 static const SECOidData oids[] = { variable
984 /* verisign oids */
989 /* pkix oids */
1075 /* pkcs12 v2 oids */
1397 for ( ix = 0; ix < ( sizeof(oids) / sizeof(SECOidData) ); ix++ ) {
1398 oid = &oids[ix];
1497 PORT_Assert((unsigned int)tagnum < (sizeof(oids) / sizeof(SECOidData)));
1498 return (SECOidData *)(&oids[tagnum]);

Completed in 394 milliseconds

12