Searched refs:anchors (Results 1 - 25 of 94) sorted by relevance

1234

/macosx-10.9.5/CPANInternal-140/YAML-Syck/
H A Dhandler.c48 if ( p->anchors == NULL )
50 p->anchors = st_init_strtable();
52 if ( st_lookup( p->anchors, (st_data_t)a, (st_data_t *)&ntmp ) )
59 st_insert( p->anchors, (st_data_t)a, (st_data_t)n );
68 if ( p->anchors == NULL )
70 p->anchors = st_init_strtable();
72 if ( st_delete( p->anchors, (st_data_t *)&atmp, (st_data_t *)&ntmp ) )
79 st_insert( p->anchors, (st_data_t)a, (st_data_t)1 );
87 if ( p->anchors != NULL )
89 if ( st_lookup( p->anchors, (st_data_
[all...]
H A Demitter.c127 e->anchors = NULL;
157 if ( e->anchors != NULL )
159 st_foreach( e->anchors, syck_st_free_anchors, 0 );
160 st_free_table( e->anchors );
161 e->anchors = NULL;
398 if ( e->anchors != NULL &&
400 st_lookup( e->anchors, (st_data_t)oid, (st_data_t *)&anchor_name ) )
1315 if ( e->anchors == NULL )
1317 e->anchors = st_init_numtable();
1320 if ( ! st_lookup( e->anchors, (st_data_
[all...]
H A Dsyck_.c167 p->anchors = NULL;
212 if ( p->anchors != NULL )
214 st_foreach( p->anchors, syck_st_free_nodes, 0 );
215 st_free_table( p->anchors );
216 p->anchors = NULL;
/macosx-10.9.5/ruby-104/ruby/ext/psych/yaml/
H A Ddumper.c134 emitter->anchors = yaml_malloc(sizeof(*(emitter->anchors))
136 if (!emitter->anchors) goto error;
137 memset(emitter->anchors, 0, sizeof(*(emitter->anchors))
171 if (!emitter->anchors) {
180 if (!emitter->anchors[index].serialized) {
195 yaml_free(emitter->anchors);
197 emitter->anchors = NULL;
213 emitter->anchors[inde
[all...]
/macosx-10.9.5/Security-55471.14.18/sec/securityd/
H A DSecTrustServer.h45 #define kSecTrustAnchorsKey "anchors"
65 CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies,
86 void SecTrustServerEvaluateBlock(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, __unused CFArrayRef accessGroups, void (^evaluated)(SecTrustResultType tr, CFArrayRef details, CFDictionaryRef info, SecCertificatePathRef chain, CFErrorRef error));
89 SecTrustResultType SecTrustServerEvaluate(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, __unused CFArrayRef accessGroups, CFArrayRef *details, CFDictionaryRef *info, SecCertificatePathRef *chain, CFErrorRef *error);
H A DSecTrustServer.c361 CFArrayRef anchors = NULL; local
366 It does not matter since we would be returning the wrong anchors */
371 anchors = subject_to_anchors(nic);
372 require_quiet(anchors, errOut);
373 parents = CopyCertsFromIndices(anchors);
389 CFArrayRef anchors = NULL; local
395 It does not matter since we would be returning the wrong anchors */
400 anchors = subject_to_anchors(nic);
401 require_quiet(anchors, errOut);
402 cert_datas = CopyCertDataFromIndices(anchors);
670 SecPathBuilderInit(SecPathBuilderRef builder, CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, CFArrayRef accessGroups, SecPathBuilderCompleted completed, const void *context) argument
747 SecPathBuilderCreate(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, CFArrayRef accessGroups, SecPathBuilderCompleted completed, const void *context) argument
1298 SecTrustServerEvaluateBlock(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, __unused CFArrayRef accessGroups, void (^evaluated)(SecTrustResultType tr, CFArrayRef details, CFDictionaryRef info, SecCertificatePathRef chain, CFErrorRef error)) argument
1310 SecTrustServerEvaluate(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, __unused CFArrayRef accessGroups, CFArrayRef *pdetails, CFDictionaryRef *pinfo, SecCertificatePathRef *pchain, CFErrorRef *perror) argument
[all...]
/macosx-10.9.5/Security-55471.14.18/include/security_cdsa_utilities/
H A Dcssmtrust.h80 CssmData *anchors() const { return CssmData::overlay(AnchorCerts); }
81 CssmData * &anchors() { return CssmData::overlayVar(AnchorCerts); }
116 CssmData *anchors() const { return callerAuth().anchors(); }
117 CssmData * &anchors() { return callerAuth().anchors(); }
118 void anchors(uint32 count, CSSM_DATA *vector)
119 { anchorCount() = count; anchors() = CssmData::overlay(vector); }
/macosx-10.9.5/Security-55471.14.18/libsecurity_cdsa_utilities/lib/
H A Dcssmtrust.h80 CssmData *anchors() const { return CssmData::overlay(AnchorCerts); }
81 CssmData * &anchors() { return CssmData::overlayVar(AnchorCerts); }
116 CssmData *anchors() const { return callerAuth().anchors(); }
117 CssmData * &anchors() { return callerAuth().anchors(); }
118 void anchors(uint32 count, CSSM_DATA *vector)
119 { anchorCount() = count; anchors() = CssmData::overlay(vector); }
/macosx-10.9.5/bind9-45.100/bind9/
H A Dbind.keys2 # The bind.keys file is used to override the built-in DNSSEC trust anchors
4 # trust anchors it contains are those for the DNS root zone ("."), and for
5 # the ISC DNSSEC Lookaside Validation zone ("dlv.isc.org"). Trust anchors
9 # The built-in trust anchors are provided for convenience of configuration.
35 # ROOT KEY: See https://data.iana.org/root-anchors/root-anchors.xml
/macosx-10.9.5/Heimdal-323.92.1/lib/hx509/
H A Dtest_cms.in63 --anchors=FILE:$srcdir/data/secp160r1TestCA.cert.pem \
77 --anchors=FILE:$srcdir/data/ca.crt \
92 --anchors=FILE:$srcdir/data/ca.crt \
100 --anchors=FILE:$srcdir/data/ca.crt \
114 --anchors=FILE:$srcdir/data/ca.crt \
121 --anchors=FILE:$srcdir/data/test.crt \
135 --anchors=FILE:$srcdir/data/ca.crt \
148 --anchors=FILE:$srcdir/data/ca.crt \
162 --anchors=FILE:$srcdir/data/ca.crt \
177 --anchors
[all...]
H A Dks_keychain.c477 int anchors; member in struct:ks_keychain
498 if (strcasecmp(residue, "system-anchors") == 0) {
499 ctx->anchors = 1;
707 if (ctx->anchors) {
708 CFArrayRef anchors; local
719 ret = SecTrustCopyAnchorCertificates(&anchors);
724 "Can't get trust anchors from Keychain");
727 for (i = 0; i < CFArrayGetCount(anchors); i++) {
732 cr = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, i);
746 CFRelease(anchors);
[all...]
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/
H A DTrustStore.cpp215 CFRef<CFArrayRef> anchors; local
219 * Get the current set of all positively trusted anchors.
223 anchors.take());
230 CFIndex numCerts = CFArrayGetCount(anchors);
233 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex);
247 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex);
255 secdebug("anchors", "%ld anchors loaded", (long)numCerts);
H A DTrust.h77 void anchors(CFArrayRef anchorList) { mAnchors.take(cfArrayize(anchorList)); } function in class:Security::KeychainCore::Trust
104 CFArrayRef anchors() const { return mAnchors; } function in class:Security::KeychainCore::Trust
119 CFCopyRef<CFArrayRef> anchors);
170 bool mUsingTrustSettings; // true if built-in anchors will be trusted
171 AnchorPolicy mAnchorPolicy; // policy for trusting passed-in and/or built-in anchors
H A DTrust.cpp268 secdebug("trusteval", "Trust::evaluate: anchors: %ld", CFArrayGetCount(mAllowedAnchors));
308 // always check trust settings if caller did not provide explicit trust anchors
347 // caller explicitly provided empty anchors and no keychain list,
350 secdebug("evTrust", "Trust::evaluate() has empty anchors and no keychains");
382 CFCopyRef<CFArrayRef> anchors(mAllowedAnchors);
383 CFToVector<CssmData, SecCertificateRef, cfCertificateData> roots(anchors);
384 if (!anchors) {
386 // built-in anchors will be trusted unless explicitly disabled.
389 (mUsingTrustSettings) ? "using UserTrust" : "has no trusted anchors!");
393 // built-in anchors wil
625 evaluateUserTrust(const CertGroup &chain, const CSSM_TP_APPLE_EVIDENCE_INFO *infoList, CFCopyRef<CFArrayRef> anchors) argument
[all...]
H A DSecCertificateInternalP.h225 /* This cert is signed by it's parent and so on until a certiicate in anchors can be found. */
226 bool SecCertificateIssuerChainHasAnchorIn(SecCertificateRefP certificate, CFArrayRef anchors);
228 /* This cert is signed by it's parent and so on until a certiicate in anchors can be found. */
229 bool SecCertificateSignatureChainHasAnchorIn(SecCertificateRefP certificate, CFArrayRef anchors);
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/
H A DTrustStore.cpp215 CFRef<CFArrayRef> anchors; local
219 * Get the current set of all positively trusted anchors.
223 anchors.take());
230 CFIndex numCerts = CFArrayGetCount(anchors);
233 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex);
247 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex);
255 secdebug("anchors", "%ld anchors loaded", (long)numCerts);
H A DTrust.h77 void anchors(CFArrayRef anchorList) { mAnchors.take(cfArrayize(anchorList)); } function in class:Security::KeychainCore::Trust
104 CFArrayRef anchors() const { return mAnchors; } function in class:Security::KeychainCore::Trust
119 CFCopyRef<CFArrayRef> anchors);
170 bool mUsingTrustSettings; // true if built-in anchors will be trusted
171 AnchorPolicy mAnchorPolicy; // policy for trusting passed-in and/or built-in anchors
H A DTrust.cpp268 secdebug("trusteval", "Trust::evaluate: anchors: %ld", CFArrayGetCount(mAllowedAnchors));
308 // always check trust settings if caller did not provide explicit trust anchors
347 // caller explicitly provided empty anchors and no keychain list,
350 secdebug("evTrust", "Trust::evaluate() has empty anchors and no keychains");
382 CFCopyRef<CFArrayRef> anchors(mAllowedAnchors);
383 CFToVector<CssmData, SecCertificateRef, cfCertificateData> roots(anchors);
384 if (!anchors) {
386 // built-in anchors will be trusted unless explicitly disabled.
389 (mUsingTrustSettings) ? "using UserTrust" : "has no trusted anchors!");
393 // built-in anchors wil
625 evaluateUserTrust(const CertGroup &chain, const CSSM_TP_APPLE_EVIDENCE_INFO *infoList, CFCopyRef<CFArrayRef> anchors) argument
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/
H A DTrustStore.cpp215 CFRef<CFArrayRef> anchors; local
219 * Get the current set of all positively trusted anchors.
223 anchors.take());
230 CFIndex numCerts = CFArrayGetCount(anchors);
233 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex);
247 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex);
255 secdebug("anchors", "%ld anchors loaded", (long)numCerts);
H A DTrust.h77 void anchors(CFArrayRef anchorList) { mAnchors.take(cfArrayize(anchorList)); } function in class:Security::KeychainCore::Trust
104 CFArrayRef anchors() const { return mAnchors; } function in class:Security::KeychainCore::Trust
119 CFCopyRef<CFArrayRef> anchors);
170 bool mUsingTrustSettings; // true if built-in anchors will be trusted
171 AnchorPolicy mAnchorPolicy; // policy for trusting passed-in and/or built-in anchors
H A DTrust.cpp268 secdebug("trusteval", "Trust::evaluate: anchors: %ld", CFArrayGetCount(mAllowedAnchors));
308 // always check trust settings if caller did not provide explicit trust anchors
347 // caller explicitly provided empty anchors and no keychain list,
350 secdebug("evTrust", "Trust::evaluate() has empty anchors and no keychains");
382 CFCopyRef<CFArrayRef> anchors(mAllowedAnchors);
383 CFToVector<CssmData, SecCertificateRef, cfCertificateData> roots(anchors);
384 if (!anchors) {
386 // built-in anchors will be trusted unless explicitly disabled.
389 (mUsingTrustSettings) ? "using UserTrust" : "has no trusted anchors!");
393 // built-in anchors wil
625 evaluateUserTrust(const CertGroup &chain, const CSSM_TP_APPLE_EVIDENCE_INFO *infoList, CFCopyRef<CFArrayRef> anchors) argument
[all...]
/macosx-10.9.5/JavaScriptCore-7537.78.1/yarr/
H A DYarrPattern.h112 } anchors; member in union:JSC::Yarr::PatternTerm::__anon2816
176 anchors.bolAnchor = bolAnchor;
177 anchors.eolAnchor = eolAnchor;
H A DYarrInterpreter.h102 } anchors; member in union:JSC::Yarr::ByteTerm::__anon2809
307 term.anchors.m_bol = bolAnchor;
308 term.anchors.m_eol = eolAnchor;
/macosx-10.9.5/Security-55471.14.18/include/security_cdsa_utils/
H A DcuCdsaUtils.h146 * Verify a CRL against system anchors and intermediate certs.
154 const CSSM_DATA *anchors, // optional - if NULL, use Trust Settings
/macosx-10.9.5/Security-55471.14.18/libsecurity_cdsa_utils/lib/
H A DcuCdsaUtils.h146 * Verify a CRL against system anchors and intermediate certs.
154 const CSSM_DATA *anchors, // optional - if NULL, use Trust Settings

Completed in 215 milliseconds

1234