/macosx-10.9.5/security_certificates-55036.1.3/ |
H A D | buildRootKeychain | 38 $SECURITY add-trusted-cert -o "$SETTINGS_FILE_PATH" || exit(1) 52 $SECURITY -q add-trusted-cert -i "$SETTINGS_FILE_PATH" -o "$SETTINGS_FILE_PATH" -k "$ROOT_CERT_KC_PATH" "$root" || exit(1) 56 # After adding the trusted roots, add trust settings to explicitly distrust certs 68 $SECURITY -q add-trusted-cert -i "$SETTINGS_FILE_PATH" -o "$SETTINGS_FILE_PATH" -k "$TEMP_CERT_KC_PATH" -r unspecified "$cert" || exit(1) 79 $SECURITY -q add-trusted-cert -i "$SETTINGS_FILE_PATH" -o "$SETTINGS_FILE_PATH" -k "$TEMP_CERT_KC_PATH" -r deny "$cert" || exit(1)
|
/macosx-10.9.5/WebCore-7537.78.1/page/ |
H A D | WindowFeatures.cpp | 174 const bool trusted = false; local 180 // - dialogHide: trusted && boolFeature(features, "dialoghide"), makes dialog hide when you print 182 // - unadorned: trusted && boolFeature(features, "unadorned"); 205 statusBarVisible = boolFeature(features, "status", !trusted);
|
/macosx-10.9.5/Security-55471.14.18/sec/securityd/ |
H A D | SecPolicyServer.c | 405 another cert that is trusted, then we are supposed 1284 /* If the anchor is trusted we don't procces the last cert in the 1288 /* Add a detail for the root not being trusted. */ 1830 bool trusted; local 1841 trusted = true; 1871 trusted = true; 1876 trusted = false; 1886 trusted = false; 1892 rvc->certIX, (trusted ? "t" : "u")); 1896 return trusted; [all...] |
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | clientloop.c | 308 u_int trusted, u_int timeout, char **_proto, char **_data) 409 if (trusted == 0) { 439 if (trusted || generated) { 307 client_x11_get_proto(const char *display, const char *xauth_path, u_int trusted, u_int timeout, char **_proto, char **_data) argument
|
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/commands/ |
H A D | cert_command.rb | 38 'Add a trusted certificate.') do |cert, options| 43 'List trusted certificates where the', 51 'Remove trusted certificates where the', 162 You can list trusted certificates with: 170 If you wish to remove a previously trusted certificate:
|
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | SecAccess.cpp | 257 ACL::ApplicationList trusted; local 259 trusted.push_back(TrustedApplication::required( 261 access = new Access(cfString(descriptor), trusted); 650 // Support specification of trusted applications by either
|
H A D | Access.cpp | 66 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted) : mMutex(Mutex::recursive) argument 68 makeStandard(descriptor, trusted); 73 ACL::ApplicationList trusted; local 74 trusted.push_back(new TrustedApplication); 75 makeStandard(descriptor, trusted); 78 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted, argument 81 makeStandard(descriptor, trusted, limitedRights, freeRights); 84 void Access::makeStandard(const string &descriptor, const ACL::ApplicationList &trusted, argument 116 limited->applications() = trusted;
|
H A D | Access.h | 77 Access(const string &description, const ACL::ApplicationList &trusted); 78 Access(const string &description, const ACL::ApplicationList &trusted, 119 void makeStandard(const string &description, const ACL::ApplicationList &trusted,
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | SecAccess.cpp | 257 ACL::ApplicationList trusted; local 259 trusted.push_back(TrustedApplication::required( 261 access = new Access(cfString(descriptor), trusted); 650 // Support specification of trusted applications by either
|
H A D | Access.cpp | 66 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted) : mMutex(Mutex::recursive) argument 68 makeStandard(descriptor, trusted); 73 ACL::ApplicationList trusted; local 74 trusted.push_back(new TrustedApplication); 75 makeStandard(descriptor, trusted); 78 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted, argument 81 makeStandard(descriptor, trusted, limitedRights, freeRights); 84 void Access::makeStandard(const string &descriptor, const ACL::ApplicationList &trusted, argument 116 limited->applications() = trusted;
|
H A D | Access.h | 77 Access(const string &description, const ACL::ApplicationList &trusted); 78 Access(const string &description, const ACL::ApplicationList &trusted, 119 void makeStandard(const string &description, const ACL::ApplicationList &trusted,
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | SecAccess.cpp | 257 ACL::ApplicationList trusted; local 259 trusted.push_back(TrustedApplication::required( 261 access = new Access(cfString(descriptor), trusted); 650 // Support specification of trusted applications by either
|
H A D | Access.cpp | 66 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted) : mMutex(Mutex::recursive) argument 68 makeStandard(descriptor, trusted); 73 ACL::ApplicationList trusted; local 74 trusted.push_back(new TrustedApplication); 75 makeStandard(descriptor, trusted); 78 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted, argument 81 makeStandard(descriptor, trusted, limitedRights, freeRights); 84 void Access::makeStandard(const string &descriptor, const ACL::ApplicationList &trusted, argument 116 limited->applications() = trusted;
|
H A D | Access.h | 77 Access(const string &description, const ACL::ApplicationList &trusted); 78 Access(const string &description, const ACL::ApplicationList &trusted, 119 void makeStandard(const string &description, const ACL::ApplicationList &trusted,
|
/macosx-10.9.5/Heimdal-323.92.1/tests/kdc/ |
H A D | check-kdc.in | 127 ${kadmin} modify --attributes=+trusted-for-delegation ${ps} || exit 1
|
/macosx-10.9.5/eap8021x-180/EAP8021X.fproj/ |
H A D | EAPTLSUtil.c | 1268 * Don't allow exceptions by default if either trusted certs or trusted 1387 /* trusted certs or server names specified, it's OK to proceed */ 1525 bool trusted = FALSE; local 1532 trusted = TRUE; 1546 trusted = TRUE; 1551 return (trusted); 1662 * Don't allow trust decisions by the user by default if either trusted 1663 * certs or trusted server names is specified. Trust decisions must be
|
/macosx-10.9.5/CPANInternal-140/Class-Data-Accessor-0.04004/t/ |
H A D | strict.t | 22 my %trusted = ( 39 if ($name =~ /\.(pm|pl|t)$/i && !exists($trusted{$file})) {
|
H A D | warnings.t | 22 my %trusted = ( 39 if ($name =~ /\.(pm|pl|t)$/i && !exists($trusted{$file})) {
|
/macosx-10.9.5/ruby-104/ruby/test/rubygems/ |
H A D | test_gem_security_trust_dir.rb | 50 trusted = @trust_dir.cert_path PUBLIC_CERT 52 assert_path_exists trusted 56 assert_equal mask, File.stat(trusted).mode unless win_platform? 58 assert_equal PUBLIC_CERT.to_pem, File.read(trusted)
|
/macosx-10.9.5/CPANInternal-140/IO-Socket-SSL/ |
H A D | SSL.pm | 1935 yourself up a directory containing several trusted certificates as separate files
|
/macosx-10.9.5/bind9-45.100/bind9/bin/named/ |
H A D | bindkeys.pl | 50 $lines =~ s/managed-keys/trusted-keys/;
|
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/autosign/ |
H A D | clean.sh | 19 rm -f */K* */dsset-* */*.signed */trusted.conf */tmp* */*.jnl */*.bk
|
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/autosign/ns1/ |
H A D | keygen.sh | 48 trusted-keys { 52 ' > trusted.conf 53 cp trusted.conf ../ns2/trusted.conf 54 cp trusted.conf ../ns3/trusted.conf 55 cp trusted.conf ../ns4/trusted.conf 61 trusted-keys { 65 ' > trusted [all...] |
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/dlv/ |
H A D | clean.sh | 39 rm -f ns1/trusted.conf ns5/trusted.conf 40 rm -f ns3/trusted-dlv.conf ns5/trusted-dlv.conf
|
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/dlv/ns1/ |
H A D | sign.sh | 46 trusted-keys { 50 ' > trusted.conf 51 cp trusted.conf ../ns5
|