/macosx-10.9.5/Security-55471.14.18/include/security_cdsa_utilities/ |
H A D | acl_codesigning.h | 60 CodeSignatureAclSubject(const OSXVerifier &verifier) argument 61 : AclSubject(CSSM_ACL_SUBJECT_TYPE_CODE_SIGNATURE), OSXVerifier(verifier) { } 74 virtual bool verifyCodeSignature(const OSXVerifier &verifier,
|
H A D | cssmcred.h | 53 const CssmSubserviceUid *verifier() const { return CssmSubserviceUid::overlay(Verifier); } function in class:Security::CssmSample 54 CssmSubserviceUid * &verifier() function in class:Security::CssmSample 155 if (sample.verifier()) 156 walk(operate, sample.verifier());
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_cdsa_utilities/lib/ |
H A D | acl_codesigning.h | 60 CodeSignatureAclSubject(const OSXVerifier &verifier) argument 61 : AclSubject(CSSM_ACL_SUBJECT_TYPE_CODE_SIGNATURE), OSXVerifier(verifier) { } 74 virtual bool verifyCodeSignature(const OSXVerifier &verifier,
|
H A D | cssmcred.h | 53 const CssmSubserviceUid *verifier() const { return CssmSubserviceUid::overlay(Verifier); } function in class:Security::CssmSample 54 CssmSubserviceUid * &verifier() function in class:Security::CssmSample 155 if (sample.verifier()) 156 walk(operate, sample.verifier());
|
/macosx-10.9.5/securityd-55199.3/src/ |
H A D | codesigdb.h | 94 bool verify(Process &process, const OSXVerifier &verifier, const AclValidationContext &context); 98 const OSXVerifier &verifier, const AclValidationContext &context);
|
H A D | localdatabase.cpp | 85 CssmClient::Verify verifier(Server::csp(), context.algorithm(), verifyOnlyAlgorithm); 86 verifier.override(context); 87 verifier.verify(data, signature); 105 CssmClient::VerifyMac verifier(Server::csp(), context.algorithm()); 106 verifier.override(context); 107 verifier.verify(data, mac);
|
H A D | codesigdb.cpp | 227 const OSXVerifier &verifier, const AclValidationContext &context) 237 if (SecRequirementRef requirement = verifier.requirement()) { 254 switch (matchSignedClientToLegacyACL(process, code, verifier, context)) { 260 CssmData::wrap(verifier.legacyHash(), SHA1::digestLength), 261 verifier.path()); 296 SecCodeRef code, const OSXVerifier &verifier, const AclValidationContext &context) 336 string aclName = trim(verifier.path(), '/', ".app"); // ACL 369 if (!query(verifier.path().c_str())) { 226 verify(Process &process, const OSXVerifier &verifier, const AclValidationContext &context) argument 295 matchSignedClientToLegacyACL(Process &process, SecCodeRef code, const OSXVerifier &verifier, const AclValidationContext &context) argument
|
H A D | acls.cpp | 231 bool SecurityServerEnvironment::verifyCodeSignature(const OSXVerifier &verifier, argument 234 return Server::codeSignatures().verify(Server::process(), verifier, context);
|
H A D | dbcrypto.cpp | 283 VerifyMac verifier(Server::csp(), verifyAlgorithm); 284 verifier.key(mSigningKey); 285 verifier.verify(signChunk, 2, CssmData::wrap(blob->blobSignature)); 434 VerifyMac verifier(Server::csp(), verifyAlgorithm); 435 verifier.key(mSigningKey); 437 verifier.verify(signChunk, 2, signature);
|
H A D | acls.h | 111 bool verifyCodeSignature(const OSXVerifier &verifier, const AclValidationContext &context);
|
/macosx-10.9.5/securityd-55199.3/tests/ |
H A D | testcrypto.cpp | 90 Verify verifier(csp, CSSM_ALGID_SHA1WithRSA); 91 verifier.key(clearPublicKey); 92 verifier.verify(data, signature);
|
/macosx-10.9.5/Heimdal-323.92.1/lib/ntlm/ |
H A D | heimntlm-protos.h | 66 unsigned char verifier[8]);
|
H A D | ntlm.c | 1915 * @param hash The NTLM session verifier 1926 unsigned char verifier[8]) 1940 memcpy(verifier, ntlm2_sess_hash, 8); 1924 heim_ntlm_calculate_ntlm2_sess_hash(const unsigned char clnt_nonce[8], const unsigned char svr_chal[8], unsigned char verifier[8]) argument
|
/macosx-10.9.5/smb-697.95.1/kernel/smbfs/ |
H A D | smbfs.h | 89 uint64_t verifier; // inout member in struct:gssdProxyPB 107 uint64_t verifier; // inout member in struct:user_gssdProxyPB
|
/macosx-10.9.5/ppp-727.90.1/Helpers/pppd/ |
H A D | chap-new.c | 395 int (*verifier)(u_char *, u_char *, int, struct chap_digest_type *, 425 verifier = chap_verify_hook; 427 verifier = chap_verify_response; 428 ok = (*verifier)(name, (u_char*)ss->name, id, ss->digest,
|
/macosx-10.9.5/JavaScriptCore-7537.78.1/bytecompiler/ |
H A D | BytecodeGenerator.cpp | 1290 RegisterID* BytecodeGenerator::emitResolveBaseForPut(RegisterID* dst, const ResolveResult&, const Identifier& property, NonlocalResolveInfo& verifier) argument 1299 verifier.resolved(putToBaseIndex); 1305 RegisterID* BytecodeGenerator::emitResolveWithBaseForPut(RegisterID* baseDst, RegisterID* propDst, const ResolveResult& resolveResult, const Identifier& property, NonlocalResolveInfo& verifier) argument 1314 verifier.resolved(putToBaseIndex);
|
/macosx-10.9.5/xnu-2422.115.4/bsd/nfs/ |
H A D | nfs4_subs.c | 95 * the verifier (mounttime) changes, then all previous (mounts') state gets dropped. 213 uint64_t verifier, xid; local 296 nfsm_chain_get_64(error, &nmrep, verifier); 307 nfsm_chain_add_64(error, &nmreq, verifier);
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/ |
H A D | configure | 863 --enable-alwaystrue enable the alwaystrue password verifier (discouraged) 7368 echo "$as_me:$LINENO: checking if I should include the alwaystrue verifier" >&5 7369 echo $ECHO_N "checking if I should include the alwaystrue verifier... $ECHO_C" >&6
|