/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/anchorTest/ |
H A D | buildCertKeychains | 7 echo Usage: buildX509Anchors anchors\|certs anchor_dir 16 case anchors: 27 echo Usage: buildX509Anchors anchors\|certs anchor_dir
|
/macosx-10.10.1/ruby-106/ruby/ext/psych/yaml/ |
H A D | dumper.c | 134 emitter->anchors = yaml_malloc(sizeof(*(emitter->anchors)) 136 if (!emitter->anchors) goto error; 137 memset(emitter->anchors, 0, sizeof(*(emitter->anchors)) 171 if (!emitter->anchors) { 180 if (!emitter->anchors[index].serialized) { 195 yaml_free(emitter->anchors); 197 emitter->anchors = NULL; 213 emitter->anchors[inde [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/ |
H A D | SecTrustServer.h | 44 #define kSecTrustAnchorsKey "anchors" 64 CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, 85 void SecTrustServerEvaluateBlock(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, __unused CFArrayRef accessGroups, void (^evaluated)(SecTrustResultType tr, CFArrayRef details, CFDictionaryRef info, SecCertificatePathRef chain, CFErrorRef error)); 88 SecTrustResultType SecTrustServerEvaluate(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, __unused CFArrayRef accessGroups, CFArrayRef *details, CFDictionaryRef *info, SecCertificatePathRef *chain, CFErrorRef *error);
|
H A D | SecTrustServer.c | 360 CFArrayRef anchors = NULL; local 365 It does not matter since we would be returning the wrong anchors */ 370 anchors = subject_to_anchors(nic); 371 require_quiet(anchors, errOut); 372 parents = CopyCertsFromIndices(anchors); 388 CFArrayRef anchors = NULL; local 394 It does not matter since we would be returning the wrong anchors */ 399 anchors = subject_to_anchors(nic); 400 require_quiet(anchors, errOut); 401 cert_datas = CopyCertDataFromIndices(anchors); 669 SecPathBuilderInit(SecPathBuilderRef builder, CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, CFArrayRef accessGroups, SecPathBuilderCompleted completed, const void *context) argument 746 SecPathBuilderCreate(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, CFArrayRef accessGroups, SecPathBuilderCompleted completed, const void *context) argument 1300 SecTrustServerEvaluateBlock(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, __unused CFArrayRef accessGroups, void (^evaluated)(SecTrustResultType tr, CFArrayRef details, CFDictionaryRef info, SecCertificatePathRef chain, CFErrorRef error)) argument 1312 SecTrustServerEvaluate(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, __unused CFArrayRef accessGroups, CFArrayRef *pdetails, CFDictionaryRef *pinfo, SecCertificatePathRef *pchain, CFErrorRef *perror) argument [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_cdsa_utilities/ |
H A D | cssmtrust.h | 80 CssmData *anchors() const { return CssmData::overlay(AnchorCerts); } 81 CssmData * &anchors() { return CssmData::overlayVar(AnchorCerts); } 116 CssmData *anchors() const { return callerAuth().anchors(); } 117 CssmData * &anchors() { return callerAuth().anchors(); } 118 void anchors(uint32 count, CSSM_DATA *vector) 119 { anchorCount() = count; anchors() = CssmData::overlay(vector); }
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_cdsa_utilities/lib/ |
H A D | cssmtrust.h | 80 CssmData *anchors() const { return CssmData::overlay(AnchorCerts); } 81 CssmData * &anchors() { return CssmData::overlayVar(AnchorCerts); } 116 CssmData *anchors() const { return callerAuth().anchors(); } 117 CssmData * &anchors() { return callerAuth().anchors(); } 118 void anchors(uint32 count, CSSM_DATA *vector) 119 { anchorCount() = count; anchors() = CssmData::overlay(vector); }
|
/macosx-10.10.1/bind9-45.101/bind9/ |
H A D | bind.keys | 2 # The bind.keys file is used to override the built-in DNSSEC trust anchors 4 # trust anchors it contains are those for the DNS root zone ("."), and for 5 # the ISC DNSSEC Lookaside Validation zone ("dlv.isc.org"). Trust anchors 9 # The built-in trust anchors are provided for convenience of configuration. 35 # ROOT KEY: See https://data.iana.org/root-anchors/root-anchors.xml
|
/macosx-10.10.1/Heimdal-398.1.2/lib/hx509/ |
H A D | test_cms.in | 63 --anchors=FILE:$srcdir/data/secp160r1TestCA.cert.pem \ 77 --anchors=FILE:$srcdir/data/ca.crt \ 92 --anchors=FILE:$srcdir/data/ca.crt \ 100 --anchors=FILE:$srcdir/data/ca.crt \ 114 --anchors=FILE:$srcdir/data/ca.crt \ 121 --anchors=FILE:$srcdir/data/test.crt \ 135 --anchors=FILE:$srcdir/data/ca.crt \ 148 --anchors=FILE:$srcdir/data/ca.crt \ 162 --anchors=FILE:$srcdir/data/ca.crt \ 177 --anchors [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/regressions/test/ |
H A D | testpolicy.m | 68 NSArray* anchors, 130 if ([anchors count]) 131 SecTrustSetAnchorCertificates(trustRef, (CFArrayRef)anchors); 167 NSArray* anchors, 178 runOneLeafTest(policy, anchors, intermediates, path, ![fileName hasPrefix:@"Invalid"], [expect objectForKey:fileName], date);
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/secTime/ |
H A D | secTime.cpp | 32 * within the system anchors list. (This does not apply to Trust Settings). 416 #pragma mark -- CSSM_TP_CertGroupVerify, system anchors -- 424 BlobList *anchors; /* cgvAnchor* only */ member in struct:__anon5264 439 cgvParams->anchors = NULL; 495 if(cgvParams->anchors) { 496 delete(cgvParams->anchors); 502 #pragma mark -- CSSM_TP_CertGroupVerify, explicit anchors -- 514 cgvParams->anchors = new BlobList(); 515 cgvParams->anchors->addFile(ST_ANCHOR_NAME); 536 vfyArgs.roots = cgvParams->anchors; [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/ |
H A D | TrustStore.cpp | 215 CFRef<CFArrayRef> anchors; local 219 * Get the current set of all positively trusted anchors. 223 anchors.take()); 230 CFIndex numCerts = CFArrayGetCount(anchors); 233 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex); 247 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex); 255 secdebug("anchors", "%ld anchors loaded", (long)numCerts);
|
H A D | Trust.h | 77 void anchors(CFArrayRef anchorList) { mAnchors.take(cfArrayize(anchorList)); } function in class:Security::KeychainCore::Trust 104 CFArrayRef anchors() const { return mAnchors; } function in class:Security::KeychainCore::Trust 119 CFCopyRef<CFArrayRef> anchors); 170 bool mUsingTrustSettings; // true if built-in anchors will be trusted 171 AnchorPolicy mAnchorPolicy; // policy for trusting passed-in and/or built-in anchors
|
H A D | Trust.cpp | 271 secdebug("trusteval", "Trust::evaluate: anchors: %ld", CFArrayGetCount(mAllowedAnchors)); 311 // always check trust settings if caller did not provide explicit trust anchors 350 // caller explicitly provided empty anchors and no keychain list, 353 secdebug("evTrust", "Trust::evaluate() has empty anchors and no keychains"); 385 CFCopyRef<CFArrayRef> anchors(mAllowedAnchors); 386 CFToVector<CssmData, SecCertificateRef, cfCertificateData> roots(anchors); 387 if (!anchors) { 389 // built-in anchors will be trusted unless explicitly disabled. 392 (mUsingTrustSettings) ? "using UserTrust" : "has no trusted anchors!"); 396 // built-in anchors wil 628 evaluateUserTrust(const CertGroup &chain, const CSSM_TP_APPLE_EVIDENCE_INFO *infoList, CFCopyRef<CFArrayRef> anchors) argument [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | TrustStore.cpp | 215 CFRef<CFArrayRef> anchors; local 219 * Get the current set of all positively trusted anchors. 223 anchors.take()); 230 CFIndex numCerts = CFArrayGetCount(anchors); 233 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex); 247 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex); 255 secdebug("anchors", "%ld anchors loaded", (long)numCerts);
|
H A D | Trust.h | 77 void anchors(CFArrayRef anchorList) { mAnchors.take(cfArrayize(anchorList)); } function in class:Security::KeychainCore::Trust 104 CFArrayRef anchors() const { return mAnchors; } function in class:Security::KeychainCore::Trust 119 CFCopyRef<CFArrayRef> anchors); 170 bool mUsingTrustSettings; // true if built-in anchors will be trusted 171 AnchorPolicy mAnchorPolicy; // policy for trusting passed-in and/or built-in anchors
|
H A D | Trust.cpp | 271 secdebug("trusteval", "Trust::evaluate: anchors: %ld", CFArrayGetCount(mAllowedAnchors)); 311 // always check trust settings if caller did not provide explicit trust anchors 350 // caller explicitly provided empty anchors and no keychain list, 353 secdebug("evTrust", "Trust::evaluate() has empty anchors and no keychains"); 385 CFCopyRef<CFArrayRef> anchors(mAllowedAnchors); 386 CFToVector<CssmData, SecCertificateRef, cfCertificateData> roots(anchors); 387 if (!anchors) { 389 // built-in anchors will be trusted unless explicitly disabled. 392 (mUsingTrustSettings) ? "using UserTrust" : "has no trusted anchors!"); 396 // built-in anchors wil 628 evaluateUserTrust(const CertGroup &chain, const CSSM_TP_APPLE_EVIDENCE_INFO *infoList, CFCopyRef<CFArrayRef> anchors) argument [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | TrustStore.cpp | 215 CFRef<CFArrayRef> anchors; local 219 * Get the current set of all positively trusted anchors. 223 anchors.take()); 230 CFIndex numCerts = CFArrayGetCount(anchors); 233 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex); 247 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex); 255 secdebug("anchors", "%ld anchors loaded", (long)numCerts);
|
H A D | Trust.h | 77 void anchors(CFArrayRef anchorList) { mAnchors.take(cfArrayize(anchorList)); } function in class:Security::KeychainCore::Trust 104 CFArrayRef anchors() const { return mAnchors; } function in class:Security::KeychainCore::Trust 119 CFCopyRef<CFArrayRef> anchors); 170 bool mUsingTrustSettings; // true if built-in anchors will be trusted 171 AnchorPolicy mAnchorPolicy; // policy for trusting passed-in and/or built-in anchors
|
H A D | Trust.cpp | 271 secdebug("trusteval", "Trust::evaluate: anchors: %ld", CFArrayGetCount(mAllowedAnchors)); 311 // always check trust settings if caller did not provide explicit trust anchors 350 // caller explicitly provided empty anchors and no keychain list, 353 secdebug("evTrust", "Trust::evaluate() has empty anchors and no keychains"); 385 CFCopyRef<CFArrayRef> anchors(mAllowedAnchors); 386 CFToVector<CssmData, SecCertificateRef, cfCertificateData> roots(anchors); 387 if (!anchors) { 389 // built-in anchors will be trusted unless explicitly disabled. 392 (mUsingTrustSettings) ? "using UserTrust" : "has no trusted anchors!"); 396 // built-in anchors wil 628 evaluateUserTrust(const CertGroup &chain, const CSSM_TP_APPLE_EVIDENCE_INFO *infoList, CFCopyRef<CFArrayRef> anchors) argument [all...] |
/macosx-10.10.1/JavaScriptCore-7600.1.17/yarr/ |
H A D | YarrPattern.h | 111 } anchors; member in union:JSC::Yarr::PatternTerm::__anon2696 175 anchors.bolAnchor = bolAnchor; 176 anchors.eolAnchor = eolAnchor;
|
H A D | YarrInterpreter.h | 101 } anchors; member in union:JSC::Yarr::ByteTerm::__anon2689 306 term.anchors.m_bol = bolAnchor; 307 term.anchors.m_eol = eolAnchor;
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/vfyCacCert/ |
H A D | vfyCacCert.cpp | 321 /* anchors */ 322 const CSSM_DATA *anchors; local 325 ortn = SecTrustGetCSSMAnchorCertificates(&anchors, &anchorCount); 331 authCtx.AnchorCerts = const_cast<CSSM_DATA_PTR>(anchors);
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_cdsa_utils/ |
H A D | cuCdsaUtils.h | 146 * Verify a CRL against system anchors and intermediate certs. 154 const CSSM_DATA *anchors, // optional - if NULL, use Trust Settings
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_cdsa_utils/lib/ |
H A D | cuCdsaUtils.h | 146 * Verify a CRL against system anchors and intermediate certs. 154 const CSSM_DATA *anchors, // optional - if NULL, use Trust Settings
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/clAppUtils/ |
H A D | tpUtils.h | 163 * Obtain system anchors in CF and in CSSM_DATA form. 170 CSSM_DATA **anchors, /* RETURNED */
|