}
}
-IdentityCursorPolicyAndID::~IdentityCursorPolicyAndID() throw()
+IdentityCursorPolicyAndID::~IdentityCursorPolicyAndID() _NOEXCEPT
{
if (mPolicy) {
CFRelease(mPolicy);
IdentityCursor::IdentityCursor(const StorageManager::KeychainList &searchList, CSSM_KEYUSE keyUsage) :
mSearchList(searchList),
- mKeyCursor(mSearchList, CSSM_DL_DB_RECORD_PRIVATE_KEY, NULL),
+ mKeyCursor(mSearchList, (SecItemClass) CSSM_DL_DB_RECORD_PRIVATE_KEY, NULL),
mMutex(Mutex::recursive)
{
StLock<Mutex>_(mMutex);
mKeyCursor->add(CSSM_DB_EQUAL, KeySchema::Unwrap, true);
}
-IdentityCursor::~IdentityCursor() throw()
+IdentityCursor::~IdentityCursor() _NOEXCEPT
{
}
-CFDataRef
+CFDataRef CF_RETURNS_RETAINED
IdentityCursor::pubKeyHashForSystemIdentity(CFStringRef domain)
{
StLock<Mutex>_(mMutex);
CFDataRef entryValue = nil;
- auto_ptr<Dictionary> identDict;
+ unique_ptr<Dictionary> identDict;
Dictionary* d = Dictionary::CreateDictionary("com.apple.security.systemidentities", Dictionary::US_System);
if (d)
{
uniqueId->get(&dbAttributes, NULL);
const CssmData &keyHash = dbAttributes[0];
- mCertificateCursor = KCCursor(mSearchList, CSSM_DL_DB_RECORD_X509_CERTIFICATE, NULL);
+ mCertificateCursor = KCCursor(mSearchList, (SecItemClass) CSSM_DL_DB_RECORD_X509_CERTIFICATE, NULL);
mCertificateCursor->add(CSSM_DB_EQUAL, Schema::kX509CertificatePublicKeyHash, keyHash);
// if we have entries for the system identities, exclude their public key hashes in the search