Searched refs:certificate (Results 101 - 125 of 216) sorted by relevance

123456789

/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/
H A DSecTrust.cpp382 // Get the user's default anchor certificate set
477 SecCertificateRef certificate = NULL; local
491 certificate = (SecCertificateRef) CFArrayGetValueAtIndex(certs, 0);
492 if (certificate) {
493 return certificate;
518 certificate = (SecCertificateRef) CFArrayGetValueAtIndex(evidenceChain, ix);
519 // note: we do not retain this certificate. The assumption here is
520 // that the certificate is retained by the trust object, so it is
526 return certificate;
548 // This function returns an array of dictionaries, one per certificate,
668 SecCertificateRef certificate = SecTrustGetCertificateAtIndex(trust, ix); local
802 SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) argument
819 SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
868 SecTrustSetUserTrustLegacy(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
[all...]
H A DTrustAdditions.cpp88 static SecCertificateRef _rootCertificateWithSubjectOfCertificate(SecCertificateRef certificate);
89 static SecCertificateRef _rootCertificateWithSubjectKeyIDOfCertificate(SecCertificateRef certificate);
146 // returns a SecKeychainRef for the system root certificate store; caller must release
187 // Cannot get root certificates if there is no trusted system root certificate store.
212 // returns the Organization component of the given certificate's subject name,
215 static CFStringRef organizationNameForCertificate(SecCertificateRef certificate) argument
223 // status = SecCertificateCopySubjectComponent(certificate, oidPtr, &organizationName);
225 organizationName = Certificate::required(certificate)->distinguishedName(&CSSMOID_X509V1SubjectNameCStruct, oidPtr);
235 // status = SecCertificateCopyFieldValues(certificate, &CSSMOID_X509V1SubjectNameCStruct, &fieldValues);
237 fieldValues = Certificate::required(certificate)
377 _rootCertificateWithSubjectOfCertificate(SecCertificateRef certificate) argument
504 SecCertificateRef certificate = (SecCertificateRef)value; local
517 _rootCertificateWithSubjectKeyIDOfCertificate(SecCertificateRef certificate) argument
[all...]
H A DSecFDERecoveryAsymmetricCrypto.cpp36 static void encodePrivateKeyHeader(const CssmData &inBlob, CFDataRef certificate, FVPrivateKeyHeader &outHeader);
75 static void encodePrivateKeyHeader(const CssmData &inBlob, CFDataRef certificate, FVPrivateKeyHeader &outHeader) argument
78 const CssmData cert(const_cast<UInt8 *>(CFDataGetBytePtr(certificate)), CFDataGetLength(certificate));
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DSecTrust.cpp382 // Get the user's default anchor certificate set
477 SecCertificateRef certificate = NULL; local
491 certificate = (SecCertificateRef) CFArrayGetValueAtIndex(certs, 0);
492 if (certificate) {
493 return certificate;
518 certificate = (SecCertificateRef) CFArrayGetValueAtIndex(evidenceChain, ix);
519 // note: we do not retain this certificate. The assumption here is
520 // that the certificate is retained by the trust object, so it is
526 return certificate;
548 // This function returns an array of dictionaries, one per certificate,
668 SecCertificateRef certificate = SecTrustGetCertificateAtIndex(trust, ix); local
802 SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) argument
819 SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
868 SecTrustSetUserTrustLegacy(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
[all...]
H A DTrustAdditions.cpp88 static SecCertificateRef _rootCertificateWithSubjectOfCertificate(SecCertificateRef certificate);
89 static SecCertificateRef _rootCertificateWithSubjectKeyIDOfCertificate(SecCertificateRef certificate);
146 // returns a SecKeychainRef for the system root certificate store; caller must release
187 // Cannot get root certificates if there is no trusted system root certificate store.
212 // returns the Organization component of the given certificate's subject name,
215 static CFStringRef organizationNameForCertificate(SecCertificateRef certificate) argument
223 // status = SecCertificateCopySubjectComponent(certificate, oidPtr, &organizationName);
225 organizationName = Certificate::required(certificate)->distinguishedName(&CSSMOID_X509V1SubjectNameCStruct, oidPtr);
235 // status = SecCertificateCopyFieldValues(certificate, &CSSMOID_X509V1SubjectNameCStruct, &fieldValues);
237 fieldValues = Certificate::required(certificate)
377 _rootCertificateWithSubjectOfCertificate(SecCertificateRef certificate) argument
504 SecCertificateRef certificate = (SecCertificateRef)value; local
517 _rootCertificateWithSubjectKeyIDOfCertificate(SecCertificateRef certificate) argument
[all...]
H A DSecFDERecoveryAsymmetricCrypto.cpp36 static void encodePrivateKeyHeader(const CssmData &inBlob, CFDataRef certificate, FVPrivateKeyHeader &outHeader);
75 static void encodePrivateKeyHeader(const CssmData &inBlob, CFDataRef certificate, FVPrivateKeyHeader &outHeader) argument
78 const CssmData cert(const_cast<UInt8 *>(CFDataGetBytePtr(certificate)), CFDataGetLength(certificate));
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DSecTrust.cpp382 // Get the user's default anchor certificate set
477 SecCertificateRef certificate = NULL; local
491 certificate = (SecCertificateRef) CFArrayGetValueAtIndex(certs, 0);
492 if (certificate) {
493 return certificate;
518 certificate = (SecCertificateRef) CFArrayGetValueAtIndex(evidenceChain, ix);
519 // note: we do not retain this certificate. The assumption here is
520 // that the certificate is retained by the trust object, so it is
526 return certificate;
548 // This function returns an array of dictionaries, one per certificate,
668 SecCertificateRef certificate = SecTrustGetCertificateAtIndex(trust, ix); local
802 SecTrustGetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting *trustSetting) argument
819 SecTrustSetUserTrust(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
868 SecTrustSetUserTrustLegacy(SecCertificateRef certificate, SecPolicyRef policy, SecTrustUserSetting trustSetting) argument
[all...]
H A DTrustAdditions.cpp88 static SecCertificateRef _rootCertificateWithSubjectOfCertificate(SecCertificateRef certificate);
89 static SecCertificateRef _rootCertificateWithSubjectKeyIDOfCertificate(SecCertificateRef certificate);
146 // returns a SecKeychainRef for the system root certificate store; caller must release
187 // Cannot get root certificates if there is no trusted system root certificate store.
212 // returns the Organization component of the given certificate's subject name,
215 static CFStringRef organizationNameForCertificate(SecCertificateRef certificate) argument
223 // status = SecCertificateCopySubjectComponent(certificate, oidPtr, &organizationName);
225 organizationName = Certificate::required(certificate)->distinguishedName(&CSSMOID_X509V1SubjectNameCStruct, oidPtr);
235 // status = SecCertificateCopyFieldValues(certificate, &CSSMOID_X509V1SubjectNameCStruct, &fieldValues);
237 fieldValues = Certificate::required(certificate)
377 _rootCertificateWithSubjectOfCertificate(SecCertificateRef certificate) argument
504 SecCertificateRef certificate = (SecCertificateRef)value; local
517 _rootCertificateWithSubjectKeyIDOfCertificate(SecCertificateRef certificate) argument
[all...]
H A DSecFDERecoveryAsymmetricCrypto.cpp36 static void encodePrivateKeyHeader(const CssmData &inBlob, CFDataRef certificate, FVPrivateKeyHeader &outHeader);
75 static void encodePrivateKeyHeader(const CssmData &inBlob, CFDataRef certificate, FVPrivateKeyHeader &outHeader) argument
78 const CssmData cert(const_cast<UInt8 *>(CFDataGetBytePtr(certificate)), CFDataGetLength(certificate));
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/anchorTest/
H A DbuildCertKeychains51 set cmd="$SECTOOL add-certificate -k $KCFILE $i"
53 $SECTOOL add-certificate -k $KCFILE "$i" || exit(1)
/macosx-10.10.1/emacs-93/emacs/lisp/net/
H A Dtls.el87 Used by `tls-certificate-information'."
92 (defun tls-certificate-information (der)
93 "Parse X.509 certificate in DER format into an assoc list."
94 (let ((certificate (concat "-----BEGIN CERTIFICATE-----\n"
100 (insert certificate)
105 "--certificate-info")
/macosx-10.10.1/Security-57031.1.35/Security/include/security_codesigning/
H A Dsyspolicy.sql132 values (2, 1, -1, 2, 'Apple Installer', 'anchor apple generic and certificate 1[subject.CN] = "Apple Software Update Certification Authority"');
140 values (1, 1, 2, 'Mac App Store', 'anchor apple generic and certificate leaf[field.1.2.840.113635.100.6.1.9] exists');
144 values (2, 1, 2, 'Mac App Store', 'anchor apple generic and certificate leaf[field.1.2.840.113635.100.6.1.10] exists');
148 values (1, 1, 2, 'Developer ID', 'anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] exists and certificate leaf[field.1.2.840.113635.100.6.1.13] exists');
150 values (2, 1, 2, 'Developer ID', 'anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] exists and (certificate leaf[field.1.2.840.113635.100.6.1.14] or certificate leaf[field.1.2.840.113635.100.6.1.13])');
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_codesigning/lib/
H A Dsyspolicy.sql132 values (2, 1, -1, 2, 'Apple Installer', 'anchor apple generic and certificate 1[subject.CN] = "Apple Software Update Certification Authority"');
140 values (1, 1, 2, 'Mac App Store', 'anchor apple generic and certificate leaf[field.1.2.840.113635.100.6.1.9] exists');
144 values (2, 1, 2, 'Mac App Store', 'anchor apple generic and certificate leaf[field.1.2.840.113635.100.6.1.10] exists');
148 values (1, 1, 2, 'Developer ID', 'anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] exists and certificate leaf[field.1.2.840.113635.100.6.1.13] exists');
150 values (2, 1, 2, 'Developer ID', 'anchor apple generic and certificate 1[field.1.2.840.113635.100.6.2.6] exists and (certificate leaf[field.1.2.840.113635.100.6.1.14] or certificate leaf[field.1.2.840.113635.100.6.1.13])');
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/
H A DSecTrustSettingsPriv.h179 SecCertificateRef certificate,
/macosx-10.10.1/curl-83.1.2/curl/lib/
H A Dx509asn1.h94 /* X509 certificate: RFC 5280. */
96 curl_asn1Element certificate; member in struct:__anon7147
/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/
H A DSecTrustStoreServer.c25 * SecTrustStoreServer.c - CertificateSource API to a system root certificate store
227 certificate (ok) is a valid SecCertificateRef.
232 SecCertificateRef certificate,
244 require_action_quiet(subject = SecCertificateGetNormalizedSubjectContent(certificate),
247 require_action_quiet(digest = SecCertificateGetSHA1Digest(certificate), errOut, ok = SecError(errSecParam, error, CFSTR("get sha1 digest failed")));
283 SecCertificateGetBytePtr(certificate),
284 SecCertificateGetLength(certificate), SQLITE_STATIC), errOutSql, ok = SecError(errSecInternal, error, CFSTR("sqlite3 error: %d"), s3e));
382 SecCertificateRef certificate, CFErrorRef *error) {
387 require(issuer = SecCertificateGetNormalizedIssuerContent(certificate),
231 _SecTrustStoreSetTrustSettings(SecTrustStoreRef ts, SecCertificateRef certificate, CFTypeRef tsdoa, CFErrorRef *error) argument
381 SecTrustStoreCopyParents(SecTrustStoreRef ts, SecCertificateRef certificate, CFErrorRef *error) argument
H A DSecPolicyServer.h27 trust policies dealing with certificate revocation.
114 Used by SecTrust to verify if a particular certificate chain matches
115 this policy. Returns true if the policy accepts the certificate chain.
123 /* True iff certificate could be an extended validation (EV) certificate. */
124 bool SecPolicySubscriberCertificateCouldBeEV(SecCertificateRef certificate);
/macosx-10.10.1/ntp-92/util/
H A Dntp-keygen-opts.def20 name = certificate;
24 descrip = "certificate scheme";
30 Select the certificate message digest/signature encryption scheme.
121 descrip = "generate PC private certificate";
123 Generate a private certificate. By default, the program generates
184 descrip = "trusted certificate (TC scheme)";
186 Generate a trusted certificate. By default, the program generates
187 a non-trusted certificate.
/macosx-10.10.1/Heimdal-398.1.2/lib/gssapi/cf/
H A Dcredential.c37 * Acquire a new initial credentials using long term credentials (password, certificate).
63 * * kGSSICCertificate - SecIdentityRef to the certificate to use with PKINIT/PKU2U
87 CFTypeRef password, certificate; local
110 /* require password or certificate */
112 certificate = CFDictionaryGetValue(attributes, kGSSICCertificate);
113 if (password == NULL && certificate == NULL) {
155 } else if (certificate && CFGetTypeID(certificate) == SecIdentityGetTypeID()) {
156 cred_value = rk_UNCONST(certificate);
158 } else if (certificate
[all...]
/macosx-10.10.1/OpenSSL098-52/src/test/
H A DCAss.cnf3 # This is mostly being used for generation of certificate requests.
42 certificate = $dir/cacert.pem # The CA certificate
H A Dtest.cnf3 # This is mostly being used for generation of certificate requests.
21 certificate = $dir/CAcert.pem # The CA certificate
/macosx-10.10.1/Security-57031.1.35/SecurityTests/regressions/kc/
H A Dkc-16-item-add-certificate.c161 SecCertificateRef certificate = NULL; local
163 CSSM_CERT_X_509v3, CSSM_CERT_ENCODING_DER, &certificate),
165 ok(certificate, "certificate non NULL");
166 ok_status(SecCertificateAddToKeychain(certificate, keychain),
169 is_status(SecCertificateAddToKeychain(certificate, keychain),
182 ok_status(SecKeychainItemCopyKeychain((SecKeychainItemRef)certificate,
187 is(CFGetRetainCount(certificate), 1, "certificate retain count is 1");
188 CFRelease(certificate);
[all...]
H A Dkc-46-dl-add-certificate.c163 SecCertificateRef certificate = NULL; local
165 CSSM_CERT_X_509v3, CSSM_CERT_ENCODING_DER, &certificate),
167 ok(certificate, "certificate non NULL");
168 ok_status(SecCertificateAddToKeychain(certificate, keychain),
171 is_status(SecCertificateAddToKeychain(certificate, keychain),
184 ok_status(SecKeychainItemCopyKeychain((SecKeychainItemRef)certificate,
189 is(CFGetRetainCount(certificate), 1, "certificate retain count is 1");
190 CFRelease(certificate);
[all...]
/macosx-10.10.1/ruby-106/ruby/test/rubygems/
H A Dtest_gem_commands_cert_command.rb157 @cmd.handle_options %W[--certificate #{PUBLIC_CERT_FILE}]
289 --certificate #{PUBLIC_CERT_FILE}
364 ERROR: --certificate not specified and ~/.gem/gem-public_cert.pem does not exist
440 assert_equal "invalid argument: --add #{bad}: invalid X509 certificate",
447 @cmd.handle_options %W[--certificate #{nonexistent}]
450 assert_equal "invalid argument: --certificate #{nonexistent}: does not exist",
457 @cmd.handle_options %W[--certificate #{bad}]
461 "--certificate #{bad}: invalid X509 certificate",
499 --certificate #{ALTERNATE_CERT_FIL
[all...]
/macosx-10.10.1/KerberosHelper-151/Source/
H A DcheckLocalKDC49 my $kdccerthash = `security find-certificate -c com.apple.kerberos.kdc -Z | head -1 | awk '{print \$3}'`;
53 messageout("noCert", "There is no KDC certificate.");
57 messageout("nonMatchingCert", "The KDC certificate hash ($kdccerthash) does not match the realm ($realmhash).");

Completed in 308 milliseconds

123456789