/macosx-10.9.5/CPANInternal-140/YAML-Syck/ |
H A D | handler.c | 48 if ( p->anchors == NULL ) 50 p->anchors = st_init_strtable(); 52 if ( st_lookup( p->anchors, (st_data_t)a, (st_data_t *)&ntmp ) ) 59 st_insert( p->anchors, (st_data_t)a, (st_data_t)n ); 68 if ( p->anchors == NULL ) 70 p->anchors = st_init_strtable(); 72 if ( st_delete( p->anchors, (st_data_t *)&atmp, (st_data_t *)&ntmp ) ) 79 st_insert( p->anchors, (st_data_t)a, (st_data_t)1 ); 87 if ( p->anchors != NULL ) 89 if ( st_lookup( p->anchors, (st_data_ [all...] |
H A D | emitter.c | 127 e->anchors = NULL; 157 if ( e->anchors != NULL ) 159 st_foreach( e->anchors, syck_st_free_anchors, 0 ); 160 st_free_table( e->anchors ); 161 e->anchors = NULL; 398 if ( e->anchors != NULL && 400 st_lookup( e->anchors, (st_data_t)oid, (st_data_t *)&anchor_name ) ) 1315 if ( e->anchors == NULL ) 1317 e->anchors = st_init_numtable(); 1320 if ( ! st_lookup( e->anchors, (st_data_ [all...] |
H A D | syck_.c | 167 p->anchors = NULL; 212 if ( p->anchors != NULL ) 214 st_foreach( p->anchors, syck_st_free_nodes, 0 ); 215 st_free_table( p->anchors ); 216 p->anchors = NULL;
|
/macosx-10.9.5/ruby-104/ruby/ext/psych/yaml/ |
H A D | dumper.c | 134 emitter->anchors = yaml_malloc(sizeof(*(emitter->anchors)) 136 if (!emitter->anchors) goto error; 137 memset(emitter->anchors, 0, sizeof(*(emitter->anchors)) 171 if (!emitter->anchors) { 180 if (!emitter->anchors[index].serialized) { 195 yaml_free(emitter->anchors); 197 emitter->anchors = NULL; 213 emitter->anchors[inde [all...] |
/macosx-10.9.5/Security-55471.14.18/sec/securityd/ |
H A D | SecTrustServer.h | 45 #define kSecTrustAnchorsKey "anchors" 65 CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, 86 void SecTrustServerEvaluateBlock(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, __unused CFArrayRef accessGroups, void (^evaluated)(SecTrustResultType tr, CFArrayRef details, CFDictionaryRef info, SecCertificatePathRef chain, CFErrorRef error)); 89 SecTrustResultType SecTrustServerEvaluate(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, __unused CFArrayRef accessGroups, CFArrayRef *details, CFDictionaryRef *info, SecCertificatePathRef *chain, CFErrorRef *error);
|
H A D | SecTrustServer.c | 361 CFArrayRef anchors = NULL; local 366 It does not matter since we would be returning the wrong anchors */ 371 anchors = subject_to_anchors(nic); 372 require_quiet(anchors, errOut); 373 parents = CopyCertsFromIndices(anchors); 389 CFArrayRef anchors = NULL; local 395 It does not matter since we would be returning the wrong anchors */ 400 anchors = subject_to_anchors(nic); 401 require_quiet(anchors, errOut); 402 cert_datas = CopyCertDataFromIndices(anchors); 670 SecPathBuilderInit(SecPathBuilderRef builder, CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, CFArrayRef accessGroups, SecPathBuilderCompleted completed, const void *context) argument 747 SecPathBuilderCreate(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, CFArrayRef accessGroups, SecPathBuilderCompleted completed, const void *context) argument 1298 SecTrustServerEvaluateBlock(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, __unused CFArrayRef accessGroups, void (^evaluated)(SecTrustResultType tr, CFArrayRef details, CFDictionaryRef info, SecCertificatePathRef chain, CFErrorRef error)) argument 1310 SecTrustServerEvaluate(CFArrayRef certificates, CFArrayRef anchors, bool anchorsOnly, CFArrayRef policies, CFAbsoluteTime verifyTime, __unused CFArrayRef accessGroups, CFArrayRef *pdetails, CFDictionaryRef *pinfo, SecCertificatePathRef *pchain, CFErrorRef *perror) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_cdsa_utilities/ |
H A D | cssmtrust.h | 80 CssmData *anchors() const { return CssmData::overlay(AnchorCerts); } 81 CssmData * &anchors() { return CssmData::overlayVar(AnchorCerts); } 116 CssmData *anchors() const { return callerAuth().anchors(); } 117 CssmData * &anchors() { return callerAuth().anchors(); } 118 void anchors(uint32 count, CSSM_DATA *vector) 119 { anchorCount() = count; anchors() = CssmData::overlay(vector); }
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_cdsa_utilities/lib/ |
H A D | cssmtrust.h | 80 CssmData *anchors() const { return CssmData::overlay(AnchorCerts); } 81 CssmData * &anchors() { return CssmData::overlayVar(AnchorCerts); } 116 CssmData *anchors() const { return callerAuth().anchors(); } 117 CssmData * &anchors() { return callerAuth().anchors(); } 118 void anchors(uint32 count, CSSM_DATA *vector) 119 { anchorCount() = count; anchors() = CssmData::overlay(vector); }
|
/macosx-10.9.5/bind9-45.100/bind9/ |
H A D | bind.keys | 2 # The bind.keys file is used to override the built-in DNSSEC trust anchors 4 # trust anchors it contains are those for the DNS root zone ("."), and for 5 # the ISC DNSSEC Lookaside Validation zone ("dlv.isc.org"). Trust anchors 9 # The built-in trust anchors are provided for convenience of configuration. 35 # ROOT KEY: See https://data.iana.org/root-anchors/root-anchors.xml
|
/macosx-10.9.5/Heimdal-323.92.1/lib/hx509/ |
H A D | test_cms.in | 63 --anchors=FILE:$srcdir/data/secp160r1TestCA.cert.pem \ 77 --anchors=FILE:$srcdir/data/ca.crt \ 92 --anchors=FILE:$srcdir/data/ca.crt \ 100 --anchors=FILE:$srcdir/data/ca.crt \ 114 --anchors=FILE:$srcdir/data/ca.crt \ 121 --anchors=FILE:$srcdir/data/test.crt \ 135 --anchors=FILE:$srcdir/data/ca.crt \ 148 --anchors=FILE:$srcdir/data/ca.crt \ 162 --anchors=FILE:$srcdir/data/ca.crt \ 177 --anchors [all...] |
H A D | ks_keychain.c | 477 int anchors; member in struct:ks_keychain 498 if (strcasecmp(residue, "system-anchors") == 0) { 499 ctx->anchors = 1; 707 if (ctx->anchors) { 708 CFArrayRef anchors; local 719 ret = SecTrustCopyAnchorCertificates(&anchors); 724 "Can't get trust anchors from Keychain"); 727 for (i = 0; i < CFArrayGetCount(anchors); i++) { 732 cr = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, i); 746 CFRelease(anchors); [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | TrustStore.cpp | 215 CFRef<CFArrayRef> anchors; local 219 * Get the current set of all positively trusted anchors. 223 anchors.take()); 230 CFIndex numCerts = CFArrayGetCount(anchors); 233 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex); 247 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex); 255 secdebug("anchors", "%ld anchors loaded", (long)numCerts);
|
H A D | Trust.h | 77 void anchors(CFArrayRef anchorList) { mAnchors.take(cfArrayize(anchorList)); } function in class:Security::KeychainCore::Trust 104 CFArrayRef anchors() const { return mAnchors; } function in class:Security::KeychainCore::Trust 119 CFCopyRef<CFArrayRef> anchors); 170 bool mUsingTrustSettings; // true if built-in anchors will be trusted 171 AnchorPolicy mAnchorPolicy; // policy for trusting passed-in and/or built-in anchors
|
H A D | Trust.cpp | 268 secdebug("trusteval", "Trust::evaluate: anchors: %ld", CFArrayGetCount(mAllowedAnchors)); 308 // always check trust settings if caller did not provide explicit trust anchors 347 // caller explicitly provided empty anchors and no keychain list, 350 secdebug("evTrust", "Trust::evaluate() has empty anchors and no keychains"); 382 CFCopyRef<CFArrayRef> anchors(mAllowedAnchors); 383 CFToVector<CssmData, SecCertificateRef, cfCertificateData> roots(anchors); 384 if (!anchors) { 386 // built-in anchors will be trusted unless explicitly disabled. 389 (mUsingTrustSettings) ? "using UserTrust" : "has no trusted anchors!"); 393 // built-in anchors wil 625 evaluateUserTrust(const CertGroup &chain, const CSSM_TP_APPLE_EVIDENCE_INFO *infoList, CFCopyRef<CFArrayRef> anchors) argument [all...] |
H A D | SecCertificateInternalP.h | 225 /* This cert is signed by it's parent and so on until a certiicate in anchors can be found. */ 226 bool SecCertificateIssuerChainHasAnchorIn(SecCertificateRefP certificate, CFArrayRef anchors); 228 /* This cert is signed by it's parent and so on until a certiicate in anchors can be found. */ 229 bool SecCertificateSignatureChainHasAnchorIn(SecCertificateRefP certificate, CFArrayRef anchors);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | TrustStore.cpp | 215 CFRef<CFArrayRef> anchors; local 219 * Get the current set of all positively trusted anchors. 223 anchors.take()); 230 CFIndex numCerts = CFArrayGetCount(anchors); 233 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex); 247 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex); 255 secdebug("anchors", "%ld anchors loaded", (long)numCerts);
|
H A D | Trust.h | 77 void anchors(CFArrayRef anchorList) { mAnchors.take(cfArrayize(anchorList)); } function in class:Security::KeychainCore::Trust 104 CFArrayRef anchors() const { return mAnchors; } function in class:Security::KeychainCore::Trust 119 CFCopyRef<CFArrayRef> anchors); 170 bool mUsingTrustSettings; // true if built-in anchors will be trusted 171 AnchorPolicy mAnchorPolicy; // policy for trusting passed-in and/or built-in anchors
|
H A D | Trust.cpp | 268 secdebug("trusteval", "Trust::evaluate: anchors: %ld", CFArrayGetCount(mAllowedAnchors)); 308 // always check trust settings if caller did not provide explicit trust anchors 347 // caller explicitly provided empty anchors and no keychain list, 350 secdebug("evTrust", "Trust::evaluate() has empty anchors and no keychains"); 382 CFCopyRef<CFArrayRef> anchors(mAllowedAnchors); 383 CFToVector<CssmData, SecCertificateRef, cfCertificateData> roots(anchors); 384 if (!anchors) { 386 // built-in anchors will be trusted unless explicitly disabled. 389 (mUsingTrustSettings) ? "using UserTrust" : "has no trusted anchors!"); 393 // built-in anchors wil 625 evaluateUserTrust(const CertGroup &chain, const CSSM_TP_APPLE_EVIDENCE_INFO *infoList, CFCopyRef<CFArrayRef> anchors) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | TrustStore.cpp | 215 CFRef<CFArrayRef> anchors; local 219 * Get the current set of all positively trusted anchors. 223 anchors.take()); 230 CFIndex numCerts = CFArrayGetCount(anchors); 233 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex); 247 SecCertificateRef certRef = (SecCertificateRef)CFArrayGetValueAtIndex(anchors, dex); 255 secdebug("anchors", "%ld anchors loaded", (long)numCerts);
|
H A D | Trust.h | 77 void anchors(CFArrayRef anchorList) { mAnchors.take(cfArrayize(anchorList)); } function in class:Security::KeychainCore::Trust 104 CFArrayRef anchors() const { return mAnchors; } function in class:Security::KeychainCore::Trust 119 CFCopyRef<CFArrayRef> anchors); 170 bool mUsingTrustSettings; // true if built-in anchors will be trusted 171 AnchorPolicy mAnchorPolicy; // policy for trusting passed-in and/or built-in anchors
|
H A D | Trust.cpp | 268 secdebug("trusteval", "Trust::evaluate: anchors: %ld", CFArrayGetCount(mAllowedAnchors)); 308 // always check trust settings if caller did not provide explicit trust anchors 347 // caller explicitly provided empty anchors and no keychain list, 350 secdebug("evTrust", "Trust::evaluate() has empty anchors and no keychains"); 382 CFCopyRef<CFArrayRef> anchors(mAllowedAnchors); 383 CFToVector<CssmData, SecCertificateRef, cfCertificateData> roots(anchors); 384 if (!anchors) { 386 // built-in anchors will be trusted unless explicitly disabled. 389 (mUsingTrustSettings) ? "using UserTrust" : "has no trusted anchors!"); 393 // built-in anchors wil 625 evaluateUserTrust(const CertGroup &chain, const CSSM_TP_APPLE_EVIDENCE_INFO *infoList, CFCopyRef<CFArrayRef> anchors) argument [all...] |
/macosx-10.9.5/JavaScriptCore-7537.78.1/yarr/ |
H A D | YarrPattern.h | 112 } anchors; member in union:JSC::Yarr::PatternTerm::__anon2816 176 anchors.bolAnchor = bolAnchor; 177 anchors.eolAnchor = eolAnchor;
|
H A D | YarrInterpreter.h | 102 } anchors; member in union:JSC::Yarr::ByteTerm::__anon2809 307 term.anchors.m_bol = bolAnchor; 308 term.anchors.m_eol = eolAnchor;
|
/macosx-10.9.5/Security-55471.14.18/include/security_cdsa_utils/ |
H A D | cuCdsaUtils.h | 146 * Verify a CRL against system anchors and intermediate certs. 154 const CSSM_DATA *anchors, // optional - if NULL, use Trust Settings
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_cdsa_utils/lib/ |
H A D | cuCdsaUtils.h | 146 * Verify a CRL against system anchors and intermediate certs. 154 const CSSM_DATA *anchors, // optional - if NULL, use Trust Settings
|