• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/

Lines Matching defs:cert

55  * Ideally we'd like to implement our own lock to protect the state of the cert stores
84 * going to consult system prefs every time we do a cert evaluation. We
124 * It's recursive to accomodate CodeSigning's need to do cert verification
319 SecCertificateRef cert,
326 TS_REQUIRED(cert)
345 *trustSettings = ts->copyTrustSettings(cert);
348 *modDate = ts->copyModDate(cert);
427 * Fundamental routine used by TP to ascertain status of one cert.
430 * specific constraints was found for the cert. Returns true in
431 * *foundAnyEntry if any entry was found for the cert, even if it
433 * optimize for the case where a cert is being evaluated for
439 * Allowed errors applying to the specified cert evaluation
445 * aside, that is). It's why the per-cert dictionaries are stored
446 * as a dictionary, keyed off of the cert hash. It's why TrustSettings
449 * which are not needed to verify a cert.
458 /* parameters describing the current cert evalaution */
513 /* validate cert returns true if matching entry was found */
605 * Obtain a string representing a cert's SHA1 digest. This string is
606 * the key used to look up per-cert trust settings in a TrustSettings record.
616 /* use this string instead of the cert hash as the dictionary key */
630 const void *cert,
639 if(cert == NULL) {
643 CC_SHA1(cert, (CC_LONG)certLen, digest);
657 * Add a cert's TrustSettings to a non-persistent TrustSettings record.
720 /* works with existing and with new cert */
753 SecCertificateRef cert,
758 TS_REQUIRED(cert)
777 ts->deleteTrustSettings(cert);