Searched refs:signer (Results 1 - 25 of 127) sorted by relevance

123456

/macosx-10.10/ruby-106/ruby/test/rubygems/
H A Dtest_gem_security_signer.rb20 signer = Gem::Security::Signer.new nil, nil
22 assert_nil signer.key
23 assert_nil signer.cert_chain
27 signer = Gem::Security::Signer.new PUBLIC_KEY, []
29 assert_empty signer.cert_chain
33 signer = Gem::Security::Signer.new nil, [@cert_file, CHILD_CERT]
36 signer.cert_chain.map { |c| c.to_pem }
46 signer = Gem::Security::Signer.new nil, [@cert_file]
49 signer.cert_chain.map { |c| c.to_pem }
61 signer
[all...]
/macosx-10.10/bind9-45.101/bind9/contrib/zkt/examples/
H A Dzkt-signer.sh3 # Shell script to start the zkt-signer
12 ZKT_CONFFILE=`pwd`/dnssec.conf ../../zkt-signer "$@"
/macosx-10.10/OpenSSL098-52/src/crypto/ocsp/
H A Docsp_vfy.c78 X509 *signer, *x; local
82 ret = ocsp_find_signer(&signer, bs, certs, st, flags);
93 skey = X509_get_pubkey(signer);
109 init_res = X509_STORE_CTX_init(&ctx, st, signer, NULL);
111 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs);
169 X509 *signer; local
171 if ((signer = ocsp_find_signer_sk(certs, rid)))
173 *psigner = signer;
177 (signer = ocsp_find_signer_sk(bs->certs, rid)))
179 *psigner = signer;
219 X509 *signer, *sca; local
363 X509 *signer; local
433 X509 *signer; local
[all...]
/macosx-10.10/bind9-45.101/bind9/lib/dns/rdata/generic/
H A Drrsig_46.h35 dns_name_t signer; member in struct:dns_rdata_rrsig
H A Dsig_24.h36 dns_name_t signer; member in struct:dns_rdata_sig_t
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dlv/ns3/
H A Dsign.sh42 $SIGNER -r $RANDFILE -l $dlvzone -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
57 $SIGNER -r $RANDFILE -l $dlvzone -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
72 $SIGNER -r $RANDFILE -l $dlvzone -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
87 $SIGNER -r $RANDFILE -l $dlvzone -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
101 $SIGNER -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/
H A DSignatureContext.h49 RawSigner &signer) :
52 mSigner(signer),
46 SignatureContext( AppleCSPSession &session, DigestObject &digest, RawSigner &signer) argument
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dlv/
H A Dclean.sh24 rm -f ns1/signer.err
31 rm -f ns2/signer.err
41 rm -f ns3/signer.err
46 rm -f ns6/signer.err
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dlv/ns6/
H A Dsign.sh36 $SIGNER -g -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
51 $SIGNER -g -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
66 $SIGNER -g -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
81 $SIGNER -g -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
96 $SIGNER -g -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer
[all...]
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/filter-aaaa/
H A Dclean.sh21 rm -f ns1/signer.err
34 rm -f ns4/signer.err
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/filter-aaaa/ns1/
H A Dsign.sh35 $SIGNER -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/filter-aaaa/ns4/
H A Dsign.sh35 $SIGNER -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/tsiggss/
H A Dauthsock.pl69 my ($signer,
82 printf("version=%u signer=%s name=%s addr=%s type=%s key=%s key_data_len=%u\n",
83 $version, $signer, $name, $addr, $type, $key, length($key_data));
/macosx-10.10/Security-57031.1.35/Security/include/security_codesigning/
H A DSecCodeSigner.h199 SecCodeSignerRef *signer);
206 @param signer A SecCodeSigner object containing all the information required
219 OSStatus SecCodeSignerAddSignature(SecCodeSignerRef signer,
222 OSStatus SecCodeSignerAddSignatureWithErrors(SecCodeSignerRef signer,
H A DSecCodeSigner.cpp49 const CFStringRef kSecCodeSignerIdentity = CFSTR("signer");
81 // Create a signer object
97 SecPointer<SecCodeSigner> signer = new SecCodeSigner(flags); local
98 signer->parameters(parameters);
99 CodeSigning::Required(signerRef) = signer->handle();
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/lib/
H A DSecCodeSigner.h199 SecCodeSignerRef *signer);
206 @param signer A SecCodeSigner object containing all the information required
219 OSStatus SecCodeSignerAddSignature(SecCodeSignerRef signer,
222 OSStatus SecCodeSignerAddSignatureWithErrors(SecCodeSignerRef signer,
H A DSecCodeSigner.cpp49 const CFStringRef kSecCodeSignerIdentity = CFSTR("signer");
81 // Create a signer object
97 SecPointer<SecCodeSigner> signer = new SecCodeSigner(flags); local
98 signer->parameters(parameters);
99 CodeSigning::Required(signerRef) = signer->handle();
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A DSecSCEP.h50 @param signer identity to sign scep request with, if NULL the keypair to be
58 SecIdentityRef signer, CFTypeRef recipient) CF_RETURNS_RETAINED;
78 @param signer SecCertificateRef or CFArray thereof for CA (and optionally RA if used).
83 SecSCEPVerifyReply(CFDataRef request, CFDataRef reply, CFTypeRef signer,
95 CFDictionaryRef signed_attrs, SecIdentityRef signer, CFTypeRef recipient);
/macosx-10.10/ruby-106/ruby/lib/rubygems/security/
H A Dpolicy.rb80 # Ensures that +signer+ is valid for +time+ and was signed by the +issuer+.
83 def check_cert signer, issuer, time
85 signer
87 message = "certificate #{signer.subject}"
89 if not_before = signer.not_before and not_before > time then
94 if not_after = signer.not_after and not_after < time then
98 if issuer and not signer.verify issuer.public_key then
107 # Ensures the public key of +key+ matches the public key in +signer+
109 def check_key signer, key
110 unless signer an
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/
H A DtpOcspCertVfy.cpp37 * assumed to be (i.e., must, but we don't check that here) the signer of the
43 TPCertInfo &signerCert) // potential signer of OCSP response
62 tpOcspDebug("tpIsAuthorizedOcspSigner: signer is issued by issuer, no EKU");
80 tpOcspDebug("tpIsAuthorizedOcspSigner: signer is issued by issuer, no OCSP "
93 tpOcspDebug("tpIsAuthorizedOcspSigner: FOUND authorized signer");
98 tpOcspDebug("tpIsAuthorizedOcspSigner: signer sig verify FAIL");
115 TPCertInfo &signer)
120 * Name inside response must == signer's SubjectName.
121 * Note we can't use signer.subjectName(); that's normalized.
126 CSSM_RETURN crtn = signer
113 tpOcspResponderIDCheck( OCSPResponse &ocspResp, TPCertInfo &signer) argument
166 tpOcspResponseSigVerify( TPVerifyContext &vfyCtx, OCSPResponse &ocspResp, TPCertInfo &signer) argument
234 tpIsOcspIssuer( TPVerifyContext &vfyCtx, OCSPResponse &ocspResp, const CSSM_DATA *signerData, TPCertInfo *signer, OcspCertType certType, TPCertInfo *issuer, TPCertInfo **signerRtn) argument
[all...]
/macosx-10.10/bind9-45.101/bind9/contrib/zkt/
H A DREADME.logging9 In previous version of dnssec-signer every message was written
14 Since v0.96, the dnssec-signer command is able to log all messages
21 If a file is specified, than each run of dnssec-signer will append the
23 name of zkt-<ISOdate&timeUTC>+log" will be created on each dnssec-signer run.
63 Start and stop of dnssec-signer
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dlv/ns1/
H A Dsign.sh38 $SIGNER -r $RANDFILE -g -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dlv/ns2/
H A Dsign.sh39 $SIGNER -r $RANDFILE -l $dlvzone -g -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
/macosx-10.10/bind9-45.101/bind9/lib/dns/include/dns/
H A Dssu.h134 dns_ssutable_checkrules(dns_ssutable_t *table, dns_name_t *signer,
162 *\li 'signer' is NULL or a valid absolute name
205 dns_ssu_external_match(dns_name_t *identity, dns_name_t *signer,
/macosx-10.10/bind9-45.101/bind9/lib/dns/include/dst/
H A Dgssapi.h193 dst_gssapi_identitymatchesrealmkrb5(dns_name_t *signer, dns_name_t *name,
196 * Compare a "signer" (in the format of a Kerberos-format Kerberos5
203 dst_gssapi_identitymatchesrealmms(dns_name_t *signer, dns_name_t *name,
206 * Compare a "signer" (in the format of a Kerberos-format Kerberos5

Completed in 234 milliseconds

123456