Searched refs:trusted (Results 1 - 25 of 50) sorted by last modified time

12

/macosx-10.9.5/security_certificates-55036.1.3/
H A DbuildRootKeychain38 $SECURITY add-trusted-cert -o "$SETTINGS_FILE_PATH" || exit(1)
52 $SECURITY -q add-trusted-cert -i "$SETTINGS_FILE_PATH" -o "$SETTINGS_FILE_PATH" -k "$ROOT_CERT_KC_PATH" "$root" || exit(1)
56 # After adding the trusted roots, add trust settings to explicitly distrust certs
68 $SECURITY -q add-trusted-cert -i "$SETTINGS_FILE_PATH" -o "$SETTINGS_FILE_PATH" -k "$TEMP_CERT_KC_PATH" -r unspecified "$cert" || exit(1)
79 $SECURITY -q add-trusted-cert -i "$SETTINGS_FILE_PATH" -o "$SETTINGS_FILE_PATH" -k "$TEMP_CERT_KC_PATH" -r deny "$cert" || exit(1)
/macosx-10.9.5/WebCore-7537.78.1/page/
H A DWindowFeatures.cpp174 const bool trusted = false; local
180 // - dialogHide: trusted && boolFeature(features, "dialoghide"), makes dialog hide when you print
182 // - unadorned: trusted && boolFeature(features, "unadorned");
205 statusBarVisible = boolFeature(features, "status", !trusted);
/macosx-10.9.5/Security-55471.14.18/sec/securityd/
H A DSecPolicyServer.c405 another cert that is trusted, then we are supposed
1284 /* If the anchor is trusted we don't procces the last cert in the
1288 /* Add a detail for the root not being trusted. */
1830 bool trusted; local
1841 trusted = true;
1871 trusted = true;
1876 trusted = false;
1886 trusted = false;
1892 rvc->certIX, (trusted ? "t" : "u"));
1896 return trusted;
[all...]
/macosx-10.9.5/OpenSSH-186/openssh/
H A Dclientloop.c308 u_int trusted, u_int timeout, char **_proto, char **_data)
409 if (trusted == 0) {
439 if (trusted || generated) {
307 client_x11_get_proto(const char *display, const char *xauth_path, u_int trusted, u_int timeout, char **_proto, char **_data) argument
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/commands/
H A Dcert_command.rb38 'Add a trusted certificate.') do |cert, options|
43 'List trusted certificates where the',
51 'Remove trusted certificates where the',
162 You can list trusted certificates with:
170 If you wish to remove a previously trusted certificate:
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/
H A DSecAccess.cpp257 ACL::ApplicationList trusted; local
259 trusted.push_back(TrustedApplication::required(
261 access = new Access(cfString(descriptor), trusted);
650 // Support specification of trusted applications by either
H A DAccess.cpp66 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted) : mMutex(Mutex::recursive) argument
68 makeStandard(descriptor, trusted);
73 ACL::ApplicationList trusted; local
74 trusted.push_back(new TrustedApplication);
75 makeStandard(descriptor, trusted);
78 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted, argument
81 makeStandard(descriptor, trusted, limitedRights, freeRights);
84 void Access::makeStandard(const string &descriptor, const ACL::ApplicationList &trusted, argument
116 limited->applications() = trusted;
H A DAccess.h77 Access(const string &description, const ACL::ApplicationList &trusted);
78 Access(const string &description, const ACL::ApplicationList &trusted,
119 void makeStandard(const string &description, const ACL::ApplicationList &trusted,
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/
H A DSecAccess.cpp257 ACL::ApplicationList trusted; local
259 trusted.push_back(TrustedApplication::required(
261 access = new Access(cfString(descriptor), trusted);
650 // Support specification of trusted applications by either
H A DAccess.cpp66 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted) : mMutex(Mutex::recursive) argument
68 makeStandard(descriptor, trusted);
73 ACL::ApplicationList trusted; local
74 trusted.push_back(new TrustedApplication);
75 makeStandard(descriptor, trusted);
78 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted, argument
81 makeStandard(descriptor, trusted, limitedRights, freeRights);
84 void Access::makeStandard(const string &descriptor, const ACL::ApplicationList &trusted, argument
116 limited->applications() = trusted;
H A DAccess.h77 Access(const string &description, const ACL::ApplicationList &trusted);
78 Access(const string &description, const ACL::ApplicationList &trusted,
119 void makeStandard(const string &description, const ACL::ApplicationList &trusted,
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/
H A DSecAccess.cpp257 ACL::ApplicationList trusted; local
259 trusted.push_back(TrustedApplication::required(
261 access = new Access(cfString(descriptor), trusted);
650 // Support specification of trusted applications by either
H A DAccess.cpp66 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted) : mMutex(Mutex::recursive) argument
68 makeStandard(descriptor, trusted);
73 ACL::ApplicationList trusted; local
74 trusted.push_back(new TrustedApplication);
75 makeStandard(descriptor, trusted);
78 Access::Access(const string &descriptor, const ACL::ApplicationList &trusted, argument
81 makeStandard(descriptor, trusted, limitedRights, freeRights);
84 void Access::makeStandard(const string &descriptor, const ACL::ApplicationList &trusted, argument
116 limited->applications() = trusted;
H A DAccess.h77 Access(const string &description, const ACL::ApplicationList &trusted);
78 Access(const string &description, const ACL::ApplicationList &trusted,
119 void makeStandard(const string &description, const ACL::ApplicationList &trusted,
/macosx-10.9.5/Heimdal-323.92.1/tests/kdc/
H A Dcheck-kdc.in127 ${kadmin} modify --attributes=+trusted-for-delegation ${ps} || exit 1
/macosx-10.9.5/eap8021x-180/EAP8021X.fproj/
H A DEAPTLSUtil.c1268 * Don't allow exceptions by default if either trusted certs or trusted
1387 /* trusted certs or server names specified, it's OK to proceed */
1525 bool trusted = FALSE; local
1532 trusted = TRUE;
1546 trusted = TRUE;
1551 return (trusted);
1662 * Don't allow trust decisions by the user by default if either trusted
1663 * certs or trusted server names is specified. Trust decisions must be
/macosx-10.9.5/CPANInternal-140/Class-Data-Accessor-0.04004/t/
H A Dstrict.t22 my %trusted = (
39 if ($name =~ /\.(pm|pl|t)$/i && !exists($trusted{$file})) {
H A Dwarnings.t22 my %trusted = (
39 if ($name =~ /\.(pm|pl|t)$/i && !exists($trusted{$file})) {
/macosx-10.9.5/ruby-104/ruby/test/rubygems/
H A Dtest_gem_security_trust_dir.rb50 trusted = @trust_dir.cert_path PUBLIC_CERT
52 assert_path_exists trusted
56 assert_equal mask, File.stat(trusted).mode unless win_platform?
58 assert_equal PUBLIC_CERT.to_pem, File.read(trusted)
/macosx-10.9.5/CPANInternal-140/IO-Socket-SSL/
H A DSSL.pm1935 yourself up a directory containing several trusted certificates as separate files
/macosx-10.9.5/bind9-45.100/bind9/bin/named/
H A Dbindkeys.pl50 $lines =~ s/managed-keys/trusted-keys/;
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/autosign/
H A Dclean.sh19 rm -f */K* */dsset-* */*.signed */trusted.conf */tmp* */*.jnl */*.bk
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/autosign/ns1/
H A Dkeygen.sh48 trusted-keys {
52 ' > trusted.conf
53 cp trusted.conf ../ns2/trusted.conf
54 cp trusted.conf ../ns3/trusted.conf
55 cp trusted.conf ../ns4/trusted.conf
61 trusted-keys {
65 ' > trusted
[all...]
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/dlv/
H A Dclean.sh39 rm -f ns1/trusted.conf ns5/trusted.conf
40 rm -f ns3/trusted-dlv.conf ns5/trusted-dlv.conf
/macosx-10.9.5/bind9-45.100/bind9/bin/tests/system/dlv/ns1/
H A Dsign.sh46 trusted-keys {
50 ' > trusted.conf
51 cp trusted.conf ../ns5

Completed in 184 milliseconds

12