X-Git-Url: https://git.saurik.com/apple/security.git/blobdiff_plain/fa7225c82381bac4432a6edf16f53b5370238d85..7e6b461318c8a779d91381531435a68ee4e8b6ed:/OSX/libsecurity_keychain/lib/IdentityCursor.cpp?ds=inline diff --git a/OSX/libsecurity_keychain/lib/IdentityCursor.cpp b/OSX/libsecurity_keychain/lib/IdentityCursor.cpp index cbee7fa7..519b47c2 100644 --- a/OSX/libsecurity_keychain/lib/IdentityCursor.cpp +++ b/OSX/libsecurity_keychain/lib/IdentityCursor.cpp @@ -238,7 +238,7 @@ IdentityCursorPolicyAndID::next(SecPointer &identity) IdentityCursor::IdentityCursor(const StorageManager::KeychainList &searchList, CSSM_KEYUSE keyUsage) : mSearchList(searchList), - mKeyCursor(mSearchList, CSSM_DL_DB_RECORD_PRIVATE_KEY, NULL), + mKeyCursor(mSearchList, (SecItemClass) CSSM_DL_DB_RECORD_PRIVATE_KEY, NULL), mMutex(Mutex::recursive) { StLock_(mMutex); @@ -275,7 +275,7 @@ IdentityCursor::~IdentityCursor() throw() { } -CFDataRef +CFDataRef CF_RETURNS_RETAINED IdentityCursor::pubKeyHashForSystemIdentity(CFStringRef domain) { StLock_(mMutex); @@ -322,7 +322,7 @@ IdentityCursor::next(SecPointer &identity) uniqueId->get(&dbAttributes, NULL); const CssmData &keyHash = dbAttributes[0]; - mCertificateCursor = KCCursor(mSearchList, CSSM_DL_DB_RECORD_X509_CERTIFICATE, NULL); + mCertificateCursor = KCCursor(mSearchList, (SecItemClass) CSSM_DL_DB_RECORD_X509_CERTIFICATE, NULL); mCertificateCursor->add(CSSM_DB_EQUAL, Schema::kX509CertificatePublicKeyHash, keyHash); // if we have entries for the system identities, exclude their public key hashes in the search