/macosx-10.9.5/security_dotmac_tp-55107.1/lib/ |
H A D | dotMacTpAsn1Templates.cpp | 35 { SEC_ASN1_UTF8_STRING, offsetof(DotMacTpPendingRequest, domainName) },
|
H A D | dotMacTpAsn1Templates.h | 46 * domainName UTF8String } 51 CSSM_DATA domainName; member in struct:__anon12552
|
H A D | dotMacTpUtils.h | 75 const CSSM_DATA &domainName, // UTF8, no NULL 84 CSSM_DATA &domainName, // RETURNED, UTF8, no NULL 90 const CSSM_DATA &domainName, // UTF8, no NULL
|
H A D | dotMacTpUtils.cpp | 172 const CSSM_DATA &domainName, // UTF8, no NULL 181 req.domainName = domainName; 213 CSSM_DATA &domainName, // RETURNED, UTF8, no NULL 241 domainName = req.domainName; 262 const CSSM_DATA &domainName, // UTF8, no NULL 268 unsigned domainLen = (domainName.Length && domainName.Data) ? domainName 170 dotMacEncodeRefId( const CSSM_DATA &userName, const CSSM_DATA &domainName, DotMacCertTypeTag certTypeTag, SecNssCoder &coder, CSSM_DATA &refId) argument 209 dotMacDecodeRefId( SecNssCoder &coder, const CSSM_DATA &refId, CSSM_DATA &userName, CSSM_DATA &domainName, DotMacCertTypeTag *certTypeTag) argument 260 dotMacTpCertFetch( const CSSM_DATA &userName, const CSSM_DATA &domainName, DotMacCertTypeTag certType, Allocator &alloc, CSSM_DATA &result) argument [all...] |
H A D | dotMacCredRequest.cpp | 210 CSSM_DATA domainName = { strlen(DOT_MAC_DOMAIN), (uint8 *)DOT_MAC_DOMAIN }; local 229 fullHostName.malloc(hostName.Length + 1 + domainName.Length); 233 memmove(fullName.Data + hostName.Length + 1, domainName.Data, domainName.Length); 257 dotMacTokenizeHostName(fullName, hostName, domainName); 324 CSSM_DATA archReqDomain = domainName; 327 domainName = archReqDomain; 329 fullHostName.malloc(hostName.Length + 1 + domainName.Length); 333 memmove(fullName.Data + hostName.Length + 1, domainName.Data, domainName [all...] |
/macosx-10.9.5/CF-855.17/ |
H A D | CFError_Private.h | 40 CF_EXPORT void CFErrorSetCallBackForDomain(CFStringRef domainName, CFErrorUserInfoKeyCallBack callBack) CF_AVAILABLE(10_5, 2_0); 41 CF_EXPORT CFErrorUserInfoKeyCallBack CFErrorGetCallBackForDomain(CFStringRef domainName) CF_AVAILABLE(10_5, 2_0);
|
H A D | CFPreferences.c | 51 static CFURLRef _CFPreferencesURLForStandardDomainWithSafetyLevel(CFStringRef domainName, CFStringRef userName, CFStringRef hostName, unsigned long safeLevel); 457 static CFStringRef _CFPreferencesStandardDomainCacheKey(CFStringRef domainName, CFStringRef userName, CFStringRef hostName) { argument 462 result = CFStringCreateWithFormat(__CFPreferencesAllocator(), NULL, CFSTR("%@%@"), prefix, domainName); 468 static CFURLRef _CFPreferencesURLForStandardDomainWithSafetyLevel(CFStringRef domainName, CFStringRef userName, CFStringRef hostName, unsigned long safeLevel) { argument 478 if (domainName == kCFPreferencesAnyApplication) { 480 } else if (domainName == kCFPreferencesCurrentApplication) { 487 appName = domainName; 519 static CFURLRef _CFPreferencesURLForStandardDomain(CFStringRef domainName, CFStringRef userName, CFStringRef hostName) { argument 520 return _CFPreferencesURLForStandardDomainWithSafetyLevel(domainName, userName, hostName, __CFSafeLaunchLevel); 523 CFPreferencesDomainRef _CFPreferencesStandardDomain(CFStringRef domainName, CFStringRe argument 661 CFStringRef domainName; local 765 _CFPreferencesDomainExists(CFStringRef domainName, CFStringRef userName, CFStringRef hostName) argument [all...] |
H A D | CFError.c | 501 void CFErrorSetCallBackForDomain(CFStringRef domainName, CFErrorUserInfoKeyCallBack callBack) { argument 505 CFDictionarySetValue(_CFErrorCallBackTable, domainName, (void *)callBack); 507 CFDictionaryRemoveValue(_CFErrorCallBackTable, domainName); 512 CFErrorUserInfoKeyCallBack CFErrorGetCallBackForDomain(CFStringRef domainName) { argument 515 CFErrorUserInfoKeyCallBack callBack = (CFErrorUserInfoKeyCallBack)CFDictionaryGetValue(_CFErrorCallBackTable, domainName);
|
H A D | ForFoundationOnly.h | 123 CF_EXPORT CFPreferencesDomainRef _CFPreferencesStandardDomain(CFStringRef domainName, CFStringRef userName, CFStringRef hostName); 134 CF_EXPORT Boolean _CFPreferencesDomainExists(CFStringRef domainName, CFStringRef userName, CFStringRef hostName);
|
/macosx-10.9.5/Security-55471.14.18/sec/securityd/ |
H A D | SecTrustStoreServer.h | 38 SecTrustStoreRef SecTrustStoreForDomainName(CFStringRef domainName, CFErrorRef *error);
|
H A D | SecTrustStoreServer.c | 212 domainName (ok) is a caller provided string of any length (might be 0), only 215 SecTrustStoreRef SecTrustStoreForDomainName(CFStringRef domainName, CFErrorRef *error) { argument 216 if (CFEqual(CFSTR("user"), domainName)) { 220 SecError(errSecParam, error, CFSTR("unknown domain: %@"), domainName);
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/ |
H A D | SecTrustStore.c | 46 CFStringRef domainName; local 48 domainName = kSecTrustStoreUserName; 54 return gSecurityd->sec_trust_store_for_domain(domainName, NULL); 56 return (SecTrustStoreRef)domainName;
|
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSMacOSX/PreferencePane/ |
H A D | DNSServiceDiscoveryPref.h | 156 -(NSData *)dataForDomain : (NSString *)domainName isEnabled : (BOOL)enabled; 157 -(NSData *)dataForSharedSecret : (NSString *)secret domain : (NSString *)domainName key : (NSString *)keyName;
|
H A D | DNSServiceDiscoveryPref.m | 577 NSString *domainName; 580 domainName = [domainDict objectForKey:(NSString *)SC_DYNDNS_DOMAIN_KEY]; 581 if ([domainString caseInsensitiveCompare:domainName] == NSOrderedSame) return YES; 955 NSString * domainName = nil; 962 domainName = [[NSString alloc] initWithUTF8String:(const char *)ptr]; 964 return ([domainName autorelease]); 968 - (NSData *)dataForDomain:(NSString *)domainName isEnabled:(BOOL)enabled 973 if (domainName && [domainName length] > 0) { 975 [domainDict setObject:domainName forKe [all...] |
/macosx-10.9.5/WebCore-7537.78.1/inspector/front-end/ |
H A D | InspectorBackend.js | 223 var domainName = method[0]; 225 if (!(domainName in this._domainDispatchers)) { 226 console.error("Protocol Error: the message is for non-existing domain '" + domainName + "'"); 229 var dispatcher = this._domainDispatchers[domainName];
|
/macosx-10.9.5/KerberosHelper-148/Source/ |
H A D | DeconstructServiceName.c | 243 domainname domainName; local 245 if (MakeDomainNameFromDNSNameString(&domainName, serviceNameStr)) { 250 if (DeconstructServiceName(&domainName, &nameLabel, &typeDomain, &domainDomain)) {
|
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | CertificateRequest.cpp | 195 CSSM_DATA domainName = { 0, NULL }; local 196 tokenizeName(&attr->value, &userName, &domainName); 197 if (!domainName.Length || !domainName.Data) { 198 domainName.Length = strlen(DOT_MAC_DOMAIN); 199 domainName.Data = (uint8*) DOT_MAC_DOMAIN; 202 mDomain.copy(domainName);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | CertificateRequest.cpp | 195 CSSM_DATA domainName = { 0, NULL }; local 196 tokenizeName(&attr->value, &userName, &domainName); 197 if (!domainName.Length || !domainName.Data) { 198 domainName.Length = strlen(DOT_MAC_DOMAIN); 199 domainName.Data = (uint8*) DOT_MAC_DOMAIN; 202 mDomain.copy(domainName);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | CertificateRequest.cpp | 195 CSSM_DATA domainName = { 0, NULL }; local 196 tokenizeName(&attr->value, &userName, &domainName); 197 if (!domainName.Length || !domainName.Data) { 198 domainName.Length = strlen(DOT_MAC_DOMAIN); 199 domainName.Data = (uint8*) DOT_MAC_DOMAIN; 202 mDomain.copy(domainName);
|
/macosx-10.9.5/security_certtool-55105/src/ |
H A D | CertTool.cpp | 93 printf(" Create a system Identity: %s C domainName [options]\n", argv[0]); 1344 const char *domainName = NULL; local 1370 domainName = argv[2]; 1372 domainName, kCFStringEncodingASCII); 1541 domainName); 1696 strncpy(labelBuf, domainName, sizeof(labelBuf)); 1807 domainName, 1906 printf("..identity registered for domain %s.\n", domainName);
|
/macosx-10.9.5/Security-55471.14.18/sec/SOSCircle/SecureObjectSync/Imported/ |
H A D | securityd_client.h | 155 SecTrustStoreRef (*sec_trust_store_for_domain)(CFStringRef domainName, CFErrorRef* error); // TODO: remove, has no msg id
|
/macosx-10.9.5/Security-55471.14.18/sec/ipc/ |
H A D | securityd_client.h | 155 SecTrustStoreRef (*sec_trust_store_for_domain)(CFStringRef domainName, CFErrorRef* error); // TODO: remove, has no msg id
|
/macosx-10.9.5/WebCore-7537.78.1/inspector/ |
H A D | CodeGeneratorInspector.py | 2129 domainName=domain_name, methodName=json_command_name, 2196 domainName=domain_name,
|
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSCore/ |
H A D | mDNS.c | 7782 mDNSlocal const domainname *getPrimaryServiceName(const domainname *domainName) argument 7784 const domainname *primaryName = domainName; 7785 const domainname *subName = SkipLeadingLabels(domainName, 1); 7790 primaryName = SkipLeadingLabels(domainName, 2);
|
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSShared/ |
H A D | uds_daemon.c | 66 int WCFNameResolvesToAddr(WCFConnection *conn, char* domainName, struct sockaddr* address, uid_t userid) __attribute__((weak_import));
|