/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/dnssec/ns5/ |
H A D | trusted.conf.bad | 18 /* $Id: trusted.conf.bad,v 1.9 2007/06/19 23:47:02 tbox Exp $ */ 20 trusted-keys {
|
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/dnssec/ns1/ |
H A D | sign.sh | 41 # Configure the resolving server with a trusted key. 46 trusted-keys { 50 ' > trusted.conf 62 cp trusted.conf ../ns2/trusted.conf 63 cp trusted.conf ../ns3/trusted.conf 64 cp trusted.conf ../ns4/trusted.conf 65 cp trusted [all...] |
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/pending/ns1/ |
H A D | sign.sh | 39 # Configure the resolving server with a trusted key. 45 trusted-keys { 49 ' > trusted.conf 50 cp trusted.conf ../ns2/trusted.conf 51 cp trusted.conf ../ns3/trusted.conf 52 cp trusted.conf ../ns4/trusted.conf
|
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/dnssec/ |
H A D | setup.sh | 29 cd ../ns5 && cp -f trusted.conf.bad trusted.conf
|
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/autosign/ns1/ |
H A D | keygen.sh | 48 trusted-keys { 52 ' > trusted.conf 53 cp trusted.conf ../ns2/trusted.conf 54 cp trusted.conf ../ns3/trusted.conf 55 cp trusted.conf ../ns4/trusted.conf 61 trusted-keys { 65 ' > trusted [all...] |
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/gost/ns1/ |
H A D | sign.sh | 36 # Configure the resolving server with a trusted key. 42 trusted-keys { 46 ' > trusted.conf 47 cp trusted.conf ../ns2/trusted.conf
|
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/staticstub/ns3/ |
H A D | sign.sh | 38 # Configure the resolving server with a trusted key. 44 trusted-keys { 48 ' > trusted.conf 49 cp trusted.conf ../ns2/trusted.conf
|
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/gost/ |
H A D | clean.sh | 19 rm -f */K* */dsset-* */*.signed */trusted.conf
|
/macosx-10.10.1/bind9-45.101/bind9/bin/named/ |
H A D | bindkeys.pl | 50 $lines =~ s/managed-keys/trusted-keys/;
|
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/dlv/ |
H A D | clean.sh | 39 rm -f ns1/trusted.conf ns5/trusted.conf 40 rm -f ns3/trusted-dlv.conf ns5/trusted-dlv.conf
|
/macosx-10.10.1/ruby-106/ruby/test/rubygems/ |
H A D | test_gem_security_trust_dir.rb | 50 trusted = @trust_dir.cert_path PUBLIC_CERT 52 assert_path_exists trusted 56 assert_equal mask, File.stat(trusted).mode unless win_platform? 58 assert_equal PUBLIC_CERT.to_pem, File.read(trusted)
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/rootStoreTool/ |
H A D | buildSysAnchors | 26 security add-trusted-cert -o "$SETTINGS_FILE_PATH" || exit(1) 37 security add-trusted-cert -i "$SETTINGS_FILE_PATH" -o "$SETTINGS_FILE_PATH" "$root" || exit(1)
|
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/dlv/ns1/ |
H A D | sign.sh | 46 trusted-keys { 50 ' > trusted.conf 51 cp trusted.conf ../ns5
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/trustSettings/ |
H A D | makeTrustSettings | 17 security add-trusted-cert -o "$TRUST_SETTINGS_PATH" || exit(1) 20 set SECCMD="$SECTOOL add-trusted-cert -i $TRUST_SETTINGS_PATH -o $TRUST_SETTINGS_PATH"
|
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/pending/ |
H A D | clean.sh | 25 rm -rf */trusted.conf
|
/macosx-10.10.1/bind9-45.101/bind9/bin/tests/system/staticstub/ |
H A D | clean.sh | 23 rm -rf */trusted.conf
|
/macosx-10.10.1/security_certificates-55040/ |
H A D | buildRootKeychain | 38 $SECURITY add-trusted-cert -o "$SETTINGS_FILE_PATH" || exit(1) 52 $SECURITY -q add-trusted-cert -i "$SETTINGS_FILE_PATH" -o "$SETTINGS_FILE_PATH" -k "$ROOT_CERT_KC_PATH" "$root" || exit(1) 56 # After adding the trusted roots, add trust settings to explicitly distrust certs 68 $SECURITY -q add-trusted-cert -i "$SETTINGS_FILE_PATH" -o "$SETTINGS_FILE_PATH" -k "$TEMP_CERT_KC_PATH" -r unspecified "$cert" || exit(1) 79 $SECURITY -q add-trusted-cert -i "$SETTINGS_FILE_PATH" -o "$SETTINGS_FILE_PATH" -k "$TEMP_CERT_KC_PATH" -r deny "$cert" || exit(1)
|
/macosx-10.10.1/IOFireWireFamily-456/IOFireWireFamily.kmodproj/ |
H A D | IOFWAddressSpace.cpp | 136 bool trusted = false; local 140 // trusted if not in secure mode 144 trusted = true; 148 // trusted if the local node 149 // trusted if no nodes in set (no source node ID verification) 152 if( !trusted ) 159 trusted = true; 168 while( !trusted && (item = (IOFireWireDevice *) fTrustedNodeSetIterator->getNextObject()) ) 178 trusted = true; 181 // FWKLOG(( "IOFWAddressSpaceAux::isTrustedNode - nodeID = 0x%x, trusted [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/ |
H A D | Access.cpp | 66 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted) : mMutex(Mutex::recursive) argument 68 makeStandard(descriptor, trusted); 73 ACL::ApplicationList trusted; local 74 trusted.push_back(new TrustedApplication); 75 makeStandard(descriptor, trusted); 78 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted, argument 81 makeStandard(descriptor, trusted, limitedRights, freeRights); 84 void Access::makeStandard(const string &descriptor, const ACL::ApplicationList &trusted, argument 116 limited->applications() = trusted;
|
H A D | Access.h | 77 Access(const string &description, const ACL::ApplicationList &trusted); 78 Access(const string &description, const ACL::ApplicationList &trusted, 119 void makeStandard(const string &description, const ACL::ApplicationList &trusted,
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | Access.cpp | 66 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted) : mMutex(Mutex::recursive) argument 68 makeStandard(descriptor, trusted); 73 ACL::ApplicationList trusted; local 74 trusted.push_back(new TrustedApplication); 75 makeStandard(descriptor, trusted); 78 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted, argument 81 makeStandard(descriptor, trusted, limitedRights, freeRights); 84 void Access::makeStandard(const string &descriptor, const ACL::ApplicationList &trusted, argument 116 limited->applications() = trusted;
|
H A D | Access.h | 77 Access(const string &description, const ACL::ApplicationList &trusted); 78 Access(const string &description, const ACL::ApplicationList &trusted, 119 void makeStandard(const string &description, const ACL::ApplicationList &trusted,
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | Access.cpp | 66 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted) : mMutex(Mutex::recursive) argument 68 makeStandard(descriptor, trusted); 73 ACL::ApplicationList trusted; local 74 trusted.push_back(new TrustedApplication); 75 makeStandard(descriptor, trusted); 78 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted, argument 81 makeStandard(descriptor, trusted, limitedRights, freeRights); 84 void Access::makeStandard(const string &descriptor, const ACL::ApplicationList &trusted, argument 116 limited->applications() = trusted;
|
H A D | Access.h | 77 Access(const string &description, const ACL::ApplicationList &trusted); 78 Access(const string &description, const ACL::ApplicationList &trusted, 119 void makeStandard(const string &description, const ACL::ApplicationList &trusted,
|
/macosx-10.10.1/tcl-105/tcl_ext/tklib/tklib/modules/diagrams/ |
H A D | application.tcl | 125 variable trusted 0 136 set trusted 1 151 variable trusted 0 168 set trusted 1 439 variable ::diagram::application::trusted 441 if {$trusted} { 442 puts {Creating trusted environment, please wait...}
|