/macosx-10.10.1/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | syspolicy.sql | 50 -- The primary authority. This table is conceptually scanned 54 CREATE TABLE authority ( table 65 expires FLOAT NOT NULL DEFAULT (5000000), -- expiration of rule authority (Julian date) 67 label TEXT NULL, -- text label for authority rule 78 CREATE INDEX authority_type ON authority (type); 79 CREATE INDEX authority_priority ON authority (priority); 80 CREATE INDEX authority_expires ON authority (expires); 83 CREATE TRIGGER authority_update AFTER UPDATE ON authority 85 UPDATE authority SET mtime = JULIANDAY('now') WHERE id = old.id; 90 SELECT * from authority [all...] |
H A D | SecAssessment.cpp | 136 CFStringRef kSecAssessmentAssessmentAuthority = CFSTR("assessment:authority"); 137 CFStringRef kSecAssessmentAssessmentSource = CFSTR("assessment:authority:source"); 138 CFStringRef kSecAssessmentAssessmentAuthorityRow = CFSTR("assessment:authority:row"); 139 CFStringRef kSecAssessmentAssessmentAuthorityOverride = CFSTR("assessment:authority:override"); 140 CFStringRef kSecAssessmentAssessmentAuthorityOriginalVerdict = CFSTR("assessment:authority:verdict"); 141 CFStringRef kSecAssessmentAssessmentFromCache = CFSTR("assessment:authority:cached"); 142 CFStringRef kSecAssessmentAssessmentWeakSignature = CFSTR("assessment:authority:weak"); 278 string authority = "UNSPECIFIED"; 283 authority = cfString(auth); 285 authority [all...] |
H A D | policyengine.h | 87 void recordOutcome(SecStaticCodeRef code, bool allow, AuthorityType type, double expires, SQLite::int64 authority);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | syspolicy.sql | 50 -- The primary authority. This table is conceptually scanned 54 CREATE TABLE authority ( table 65 expires FLOAT NOT NULL DEFAULT (5000000), -- expiration of rule authority (Julian date) 67 label TEXT NULL, -- text label for authority rule 78 CREATE INDEX authority_type ON authority (type); 79 CREATE INDEX authority_priority ON authority (priority); 80 CREATE INDEX authority_expires ON authority (expires); 83 CREATE TRIGGER authority_update AFTER UPDATE ON authority 85 UPDATE authority SET mtime = JULIANDAY('now') WHERE id = old.id; 90 SELECT * from authority [all...] |
H A D | SecAssessment.cpp | 136 CFStringRef kSecAssessmentAssessmentAuthority = CFSTR("assessment:authority"); 137 CFStringRef kSecAssessmentAssessmentSource = CFSTR("assessment:authority:source"); 138 CFStringRef kSecAssessmentAssessmentAuthorityRow = CFSTR("assessment:authority:row"); 139 CFStringRef kSecAssessmentAssessmentAuthorityOverride = CFSTR("assessment:authority:override"); 140 CFStringRef kSecAssessmentAssessmentAuthorityOriginalVerdict = CFSTR("assessment:authority:verdict"); 141 CFStringRef kSecAssessmentAssessmentFromCache = CFSTR("assessment:authority:cached"); 142 CFStringRef kSecAssessmentAssessmentWeakSignature = CFSTR("assessment:authority:weak"); 278 string authority = "UNSPECIFIED"; 283 authority = cfString(auth); 285 authority [all...] |
H A D | policyengine.h | 87 void recordOutcome(SecStaticCodeRef code, bool allow, AuthorityType type, double expires, SQLite::int64 authority);
|
/macosx-10.10.1/security_systemkeychain-55202/Gatekeeper/ |
H A D | GKAppDelegate.h | 11 @property (retain) NSMutableArray *authority; variable
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/gke/ |
H A D | gkgenerate | 55 for auth in data.authority.values(): 66 # Start by collecting authority evidence from the authority records 74 auth.update(data["authority"]) 79 auth.update(data["authority"]) 82 fail("No authority records (nothing to do)") 86 # Scrub the authority records to remove incriminating evidence 98 # The authority file is written as-is, as a plist 101 authority=auth, variable 105 print "Wrote %d authority recor [all...] |
H A D | gkhandmake | 104 authority = auth, variable
|
H A D | gkrecord | 180 authority = auth, variable
|
/macosx-10.10.1/libxml2-26/libxml2/ |
H A D | testURI.c | 38 if (uri->authority) printf("authority: %s\n", uri->authority);
|
H A D | uri.c | 131 * authority = server | reg_name 479 if (uri->authority != NULL) xmlFree(uri->authority); 480 uri->authority = NULL; 499 * Parse an authority part and fills in the appropriate fields 502 * authority = [ userinfo "@" ] host [ ":" port ] 743 * hier-part = "//" authority path-abempty 792 * relative-part = "//" authority path-abempty 1163 } else if (uri->authority != NULL) { 1171 p = uri->authority; [all...] |
/macosx-10.10.1/pyobjc-45/2.6/pyobjc/pyobjc-core/libxml2-src/ |
H A D | testURI.c | 38 if (uri->authority) printf("authority: %s\n", uri->authority);
|
H A D | uri.c | 100 * authority = server | reg_name 448 if (uri->authority != NULL) xmlFree(uri->authority); 449 uri->authority = NULL; 468 * Parse an authority part and fills in the appropriate fields 471 * authority = [ userinfo "@" ] host [ ":" port ] 712 * hier-part = "//" authority path-abempty 761 * relative-part = "//" authority path-abempty 1161 } else if (uri->authority != NULL) { 1176 p = uri->authority; [all...] |
/macosx-10.10.1/libxml2-26/libxml2/include/libxml/ |
H A D | uri.h | 36 char *authority; /* the authority part */ member in struct:_xmlURI
|
/macosx-10.10.1/pyobjc-45/2.6/pyobjc/pyobjc-core/libxml2-src/include/libxml/ |
H A D | uri.h | 36 char *authority; /* the authority part */ member in struct:_xmlURI
|
/macosx-10.10.1/security_systemkeychain-55202/src/ |
H A D | spctl.cpp | 47 doAdd, // add authority rule 51 doList, // list authority rules 419 CFDictionary authority(result.get<CFDictionaryRef>(kSecAssessmentAssessmentAuthority), 0); 421 if (authority) 422 source = authority.get<CFStringRef>(kSecAssessmentAssessmentSource); 425 if (!rawOutput && authority) { 426 if (CFBooleanRef weak = authority.get<CFBooleanRef>(kSecAssessmentAssessmentWeakSignature)) 447 if (authority) { 450 if (CFBooleanRef cached = authority.get<CFBooleanRef>(kSecAssessmentAssessmentFromCache)) { 453 else if (CFNumberRef row = authority [all...] |
/macosx-10.10.1/bind9-45.101/bind9/lib/dns/include/dns/ |
H A D | sdb.h | 83 dns_sdbauthorityfunc_t authority; member in struct:dns_sdbmethods 117 * argument to 'lookup' and 'authority' is an opaque pointer to be passed to 127 * function 'authority' (if non-NULL), which must provide an SOA record 129 * these records. The 'authority' function may be NULL if invoking 149 * If flags includes DNS_SDBFLAG_RELATIVEOWNER, the lookup and authority 204 * This function may optionally be called from the 'authority' callback
|
H A D | sdlz.h | 125 * supply an authority method. This method is called when the DNS 128 * function does not supply authority information for the dns 129 * record. A SDLZ driver does not have to implement an authority 193 * If this function supplies authority information for the DNS record 194 * the authority method is not required. If it does not, the 195 * authority function is required. A SDLZ driver must implement a 285 dns_sdlzauthorityfunc_t authority; member in struct:dns_sdlzmethods 348 * This function may optionally be called from the 'authority'
|
/macosx-10.10.1/OpenSSH-189/openssh/openbsd-compat/ |
H A D | getrrsetbyname.c | 182 struct dns_rr *authority; member in struct:dns_response 441 /* parse authority section */ 442 resp->authority = parse_dns_rrsection(answer, size, &cp, 444 if (resp->header.nscount && resp->authority == NULL) { 604 free_dns_rr(p->authority);
|
/macosx-10.10.1/Security-57031.1.35/securityd/src/ |
H A D | main.cpp | 32 #include "authority.h" 234 Authority authority(authorizationConfig); 253 Server server(authority, codeSignatures, bootstrapName);
|
H A D | session.cpp | 349 OSStatus result = Server::authority().authorize(rights, environment, flags, 408 OSStatus result = Server::authority().authorize(rights, environment, flags, 509 return Server::authority().getRule(rightName, rightDict); 524 OSStatus result = Server::authority().setRule(inRightName, rightDict, &effective, &resultCreds, auth); 549 OSStatus result = Server::authority().removeRule(inRightName, &effective, &resultCreds, auth);
|
H A D | server.cpp | 62 Server::Server(Authority &authority, CodeSignatures &signatures, const char *bootstrapName) argument 66 mAuthority(authority), 458 // We relinquish our primary state authority. From now on, we'll be
|
/macosx-10.10.1/libresolv-57/ |
H A D | dns_util.h | 257 dns_resource_record_t **authority; member in struct:__anon9396
|
/macosx-10.10.1/apache-793/httpd/test/ |
H A D | make_sni.sh | 167 # And get it signed by either our client cert issuing root authority. 254 # And get it signed by our root authority. 321 - root.key|pem Certificate authority root and key. (You could 323 quell warnings about an unknown authority). 342 - xs-root-1/2 Certificate authority which has issued above
|