• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.9.5/Security-55471.14.18/libsecurity_apple_x509_tp/lib/

Lines Matching defs:issuer

42 	TPCertInfo &issuerCert,		// issuer of cert being verified
53 * subject/issuer check).
62 tpOcspDebug("tpIsAuthorizedOcspSigner: signer is issued by issuer, no EKU");
80 tpOcspDebug("tpIsAuthorizedOcspSigner: signer is issued by issuer, no OCSP "
87 * it claims to be issued by issuer. Sig verify to be sure.
109 * be the issuer of both that response and the cert being verified. Returns
214 OIS_No, // not the issuer
215 OIS_Good, // is the issuer and signature matches
216 OIS_BadSig, // appears to be issuer, but signature doesn't match
222 OCT_Issuer, // it's the issuer of the cert being verified
230 * "Authorized Responders". It sees if the cert could be the issuer of the
241 TPCertInfo *issuer, // OPTIONAL, if known
277 case OCT_Issuer: // last resort, the actual issuer
286 if(issuer == NULL) {
288 * careful, might not know the issuer...how would this path ever
290 * do OCSP on a cert without its issuer in hand.
296 shouldBeSigner = tpIsAuthorizedOcspSigner(*issuer, *signer);
320 TPCertInfo *issuer, // issuer of the related cert, may be issuer of
374 * Set true if we ever find an apparent issuer which does not correctly
409 OCT_Local, issuer, &responderInfo);
441 OCT_Provided, issuer, &respCert);
475 if((signerInfo == NULL) && (issuer != NULL)) {
477 * Haven't found it yet, try the actual issuer
480 NULL, issuer,
481 OCT_Issuer, issuer, NULL);
490 signerInfo = issuer;
491 tpOcspDebug("tpVerifyOcspResp: signer := issuer");
497 if((issuer != NULL) && !issuer->isStatusFatal(CSSMERR_APPLETP_OCSP_NO_SIGNER)) {
514 * OCSP response, and that it is either the issuer of the cert being
515 * checked or is a valid authorized responder for that issuer based on
573 if((issuer != NULL) && !issuer->isStatusFatal(cssmErr)) {