/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/signerAndSubjTp/ |
H A D | makeSmimeCert | 22 set kcName=$argv[2] 31 echo Importing subject cert and private key into $kcName... 32 set cmd="certtool i $subjCertFile k=$kcName r=$subjKeyFile f=8 d"
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12/ |
H A D | p12.h | 38 const char *kcName, 45 const char *kcName,
|
H A D | p12.cpp | 48 char *kcName = NULL; local 91 kcName = &argp[2];
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/idPref/ |
H A D | idPref.cpp | 24 char *kcName = NULL; local 53 kcName = optarg; 73 if(kcName) { 74 ortn = SecKeychainOpen(kcName, &kcRef);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/kcImport/ |
H A D | kcImport.cpp | 98 char *kcName = NULL; local 111 kcName = kcItemKcFileName((SecKeychainItemRef)certRef); 112 printf(" identity : cert keychain name %s\n", kcName ? kcName : "<none>"); 121 free(kcName); 122 kcName = kcItemKcFileName((SecKeychainItemRef)keyRef); 123 printf(" identity : key keychain name %s\n", kcName ? kcName : "<none>"); 130 kcName = kcItemKcFileName(item); 131 printf(" cert : keychain name %s\n", kcName [all...] |
/macosx-10.10/security_systemkeychain-55202/src/ |
H A D | systemkeychain.cpp | 75 void createSystemKeychain(const char *kcName, const char *passphrase); 77 void test(const char *kcName); 87 void createAKeychain(const char *kcName, const char *passphrase, CSP &csp, DL &dl, Db &db, Key *masterKeyRef); 88 OSStatus createTokenProtectedKeychain(const char *kcName); 210 void createSystemKeychain(const char *kcName, const char *passphrase) argument 213 if (!strcmp(kcName, kSystemKeychainDir kSystemKeychainName)) 220 Db db(dl, kcName); 224 createAKeychain(kcName, passphrase, csp, dl, db, &masterKey); 227 notice("%s installed as system keychain", kcName); 230 void createAKeychain(const char *kcName, cons argument 445 createTokenProtectedKeychain(const char *kcName) argument 695 test(const char *kcName) argument [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/genKeyPair/ |
H A D | genKeyPair.cpp | 147 char *kcName = NULL; local 155 kcName = argv[1]; 196 ortn = SecKeychainOpen(kcName, &kcRef); 231 printf("...key pair created in keychain %s.\n", kcName);
|
/macosx-10.10/Security-57031.1.35/SecurityTool/ |
H A D | keychain_utilities.h | 61 extern void check_obsolete_keychain(const char *kcName);
|
H A D | keychain_export.c | 312 char *kcName = NULL; local 325 kcName = optarg; 428 if(kcName) { 429 kcRef = keychain_open(kcName);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/idTool/ |
H A D | idTool.cpp | 300 char *kcName; local 305 kcName = argv[1]; 306 if(!strcmp("-", kcName)) { 308 kcName = NULL; 335 if(kcName != NULL) { 336 ortn = SecKeychainOpen(kcName, &kcRef); 339 printf("Cannot open keychain at %s. Aborting.\n", kcName); 401 printf("***No identity found in keychain %s. Aborting.\n", kcName);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/kcTime/ |
H A D | kcTime.cpp | 72 char kcName[KT_NUM_KEYCHAINS][80]; local 109 sprintf(kcName[dex], "%s%d", KT_KC_NAME, dex); 119 ortn = SecKeychainOpen(kcName[dex], &kc); 131 userHome, kcName[dex]); 157 unsigned pwdLen = strlen(kcName[dex]); 159 ortn = SecKeychainCreate(kcName[dex], 161 kcName[dex], 203 ortn = SecKeychainOpen(kcName[dex], &kcRefs[dex]); 235 unsigned pwdLen = strlen(kcName[dex]); 238 pwdLen, kcName[de [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/pubKeyTool/ |
H A D | pubKeyTool.cpp | 393 const char *kcName, 412 ortn = SecKeychainOpen(kcName, &kcRef); 476 char *kcName = NULL; local 512 kcName = optarg; 638 if(outFile || kcName) { 661 if(kcName) { 662 if(pubKeyImport(kcName, pubKey, cspHand) == 0) { 663 printf("....public key %s imported to %s\n", pubKeyFile, kcName); 666 printf("***Error importing public key %s to %s\n", pubKeyFile, kcName); 392 pubKeyImport( const char *kcName, const CSSM_KEY *pubKey, CSSM_CSP_HANDLE rawCspHand) argument
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/sslEAP/ |
H A D | sslEAP.cpp | 69 char *kcName = NULL; local 94 kcName = optarg; 119 if(kcName) { 123 idArray = getSslCerts(kcName, 129 printf("***Can't get signing cert from %s\n", kcName);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/acltool/ |
H A D | acltool.cpp | 203 const char *kcName = NULL; local 248 kcName = optarg; 302 if(kcName) { 303 ortn = SecKeychainOpen(kcName, &kcRef); 306 printf("***Error opening keychain %s. Aborting.\n", kcName);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/sslViewer/ |
H A D | sslAppUtils.h | 32 const char *kcName, // may be NULL, i.e., use default 153 const char *kcName,
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/clAppUtils/ |
H A D | sslAppUtils.h | 24 const char *kcName, // may be NULL, i.e., use default 145 const char *kcName,
|
/macosx-10.10/Security-57031.1.35/sslViewer/ |
H A D | sslAppUtils.h | 31 const char *kcName, // may be NULL, i.e., use default 152 const char *kcName,
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/makeCrl/ |
H A D | makeCrl.cpp | 218 char *kcName = NULL; local 237 kcName = optarg; 277 if(kcName) { 278 ortn = SecKeychainOpen(kcName, &kcRef);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/sslBench/ |
H A D | sslBench.cpp | 58 const char *kcName = DEFAULT_KC; local 99 kcName = optarg; 193 ortn = SecKeychainOpen(kcName, &certKc); 196 kcName, (int)ortn);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/sslHandshakeTimeRB/ |
H A D | sslHandshakeTimeRB.cpp | 118 char *kcName = DEFAULT_KC; local 134 kcName = optarg; 196 idArray = getSslCerts(kcName, 202 printf("***Can't get signing cert from %s\n", kcName);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/sslHdshakeTime/ |
H A D | sslHdshakeTime.cpp | 66 char *kcName = DEFAULT_KC; local 118 kcName = optarg; 215 ortn = SecKeychainOpen(kcName, &certKc); 218 kcName, (int)ortn);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/sslThroughput/ |
H A D | sslThroughput.cpp | 74 char *kcName = DEFAULT_KC; local 93 kcName = optarg; 176 idArray = getSslCerts(kcName, 182 printf("***Can't get signing cert from %s\n", kcName);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/extendAttrTest/ |
H A D | extendAttrTest.cpp | 363 const char *kcName = DEFAULT_KC_NAME; local 372 kcName = optarg; 394 printf("Deleting possible existing keychain and creating %s...\n", kcName); 398 if (SecKeychainOpen(kcName, &kcRef) == noErr) 405 ortn = SecKeychainCreate(kcName,
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12Reencode/ |
H A D | p12Reencode.cpp | 246 char *kcName = NULL; local 264 kcName = argv[3]; 265 OSStatus ortn = SecKeychainOpen(kcName, &kcRef1); 270 kcName = argv[4]; 271 ortn = SecKeychainOpen(kcName, &kcRef2);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/rootStoreTool/ |
H A D | rootStoreTool.cpp | 570 const char *kcName, // only for addToKC option 587 kcName = "/Library/Keychains/System.keychain"; 596 if(kcName) { 597 ortn = SecKeychainOpen(kcName, &kcRef); 608 printf("...cert added to keychain %s\n", (kcName ? kcName : "<default>")); 712 char *kcName = NULL; local 823 kcName = optarg; 883 ortn = addCert(certRef, domain, addToKeychain, kcName, appPolicies, 566 addCert( SecCertificateRef certRef, SecTrustSettingsDomain domain, bool addToKc, const char *kcName, CFArrayRef trustSettings, CFDataRef settingsIn, CFDataRef *settingsOut) argument
|