/macosx-10.10/ruby-106/ruby/test/rubygems/ |
H A D | test_gem_security_signer.rb | 20 signer = Gem::Security::Signer.new nil, nil 22 assert_nil signer.key 23 assert_nil signer.cert_chain 27 signer = Gem::Security::Signer.new PUBLIC_KEY, [] 29 assert_empty signer.cert_chain 33 signer = Gem::Security::Signer.new nil, [@cert_file, CHILD_CERT] 36 signer.cert_chain.map { |c| c.to_pem } 46 signer = Gem::Security::Signer.new nil, [@cert_file] 49 signer.cert_chain.map { |c| c.to_pem } 61 signer [all...] |
/macosx-10.10/bind9-45.101/bind9/contrib/zkt/examples/ |
H A D | zkt-signer.sh | 3 # Shell script to start the zkt-signer 12 ZKT_CONFFILE=`pwd`/dnssec.conf ../../zkt-signer "$@"
|
/macosx-10.10/OpenSSL098-52/src/crypto/ocsp/ |
H A D | ocsp_vfy.c | 78 X509 *signer, *x; local 82 ret = ocsp_find_signer(&signer, bs, certs, st, flags); 93 skey = X509_get_pubkey(signer); 109 init_res = X509_STORE_CTX_init(&ctx, st, signer, NULL); 111 init_res = X509_STORE_CTX_init(&ctx, st, signer, bs->certs); 169 X509 *signer; local 171 if ((signer = ocsp_find_signer_sk(certs, rid))) 173 *psigner = signer; 177 (signer = ocsp_find_signer_sk(bs->certs, rid))) 179 *psigner = signer; 219 X509 *signer, *sca; local 363 X509 *signer; local 433 X509 *signer; local [all...] |
/macosx-10.10/bind9-45.101/bind9/lib/dns/rdata/generic/ |
H A D | rrsig_46.h | 35 dns_name_t signer; member in struct:dns_rdata_rrsig
|
H A D | sig_24.h | 36 dns_name_t signer; member in struct:dns_rdata_sig_t
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dlv/ns3/ |
H A D | sign.sh | 42 $SIGNER -r $RANDFILE -l $dlvzone -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 57 $SIGNER -r $RANDFILE -l $dlvzone -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 72 $SIGNER -r $RANDFILE -l $dlvzone -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 87 $SIGNER -r $RANDFILE -l $dlvzone -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 101 $SIGNER -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | SignatureContext.h | 49 RawSigner &signer) : 52 mSigner(signer), 46 SignatureContext( AppleCSPSession &session, DigestObject &digest, RawSigner &signer) argument
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dlv/ |
H A D | clean.sh | 24 rm -f ns1/signer.err 31 rm -f ns2/signer.err 41 rm -f ns3/signer.err 46 rm -f ns6/signer.err
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dlv/ns6/ |
H A D | sign.sh | 36 $SIGNER -g -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 51 $SIGNER -g -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 66 $SIGNER -g -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 81 $SIGNER -g -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err 96 $SIGNER -g -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer [all...] |
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/filter-aaaa/ |
H A D | clean.sh | 21 rm -f ns1/signer.err 34 rm -f ns4/signer.err
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/filter-aaaa/ns1/ |
H A D | sign.sh | 35 $SIGNER -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/filter-aaaa/ns4/ |
H A D | sign.sh | 35 $SIGNER -r $RANDFILE -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/tsiggss/ |
H A D | authsock.pl | 69 my ($signer, 82 printf("version=%u signer=%s name=%s addr=%s type=%s key=%s key_data_len=%u\n", 83 $version, $signer, $name, $addr, $type, $key, length($key_data));
|
/macosx-10.10/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | SecCodeSigner.h | 199 SecCodeSignerRef *signer); 206 @param signer A SecCodeSigner object containing all the information required 219 OSStatus SecCodeSignerAddSignature(SecCodeSignerRef signer, 222 OSStatus SecCodeSignerAddSignatureWithErrors(SecCodeSignerRef signer,
|
H A D | SecCodeSigner.cpp | 49 const CFStringRef kSecCodeSignerIdentity = CFSTR("signer"); 81 // Create a signer object 97 SecPointer<SecCodeSigner> signer = new SecCodeSigner(flags); local 98 signer->parameters(parameters); 99 CodeSigning::Required(signerRef) = signer->handle();
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | SecCodeSigner.h | 199 SecCodeSignerRef *signer); 206 @param signer A SecCodeSigner object containing all the information required 219 OSStatus SecCodeSignerAddSignature(SecCodeSignerRef signer, 222 OSStatus SecCodeSignerAddSignatureWithErrors(SecCodeSignerRef signer,
|
H A D | SecCodeSigner.cpp | 49 const CFStringRef kSecCodeSignerIdentity = CFSTR("signer"); 81 // Create a signer object 97 SecPointer<SecCodeSigner> signer = new SecCodeSigner(flags); local 98 signer->parameters(parameters); 99 CodeSigning::Required(signerRef) = signer->handle();
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecSCEP.h | 50 @param signer identity to sign scep request with, if NULL the keypair to be 58 SecIdentityRef signer, CFTypeRef recipient) CF_RETURNS_RETAINED; 78 @param signer SecCertificateRef or CFArray thereof for CA (and optionally RA if used). 83 SecSCEPVerifyReply(CFDataRef request, CFDataRef reply, CFTypeRef signer, 95 CFDictionaryRef signed_attrs, SecIdentityRef signer, CFTypeRef recipient);
|
/macosx-10.10/ruby-106/ruby/lib/rubygems/security/ |
H A D | policy.rb | 80 # Ensures that +signer+ is valid for +time+ and was signed by the +issuer+. 83 def check_cert signer, issuer, time 85 signer 87 message = "certificate #{signer.subject}" 89 if not_before = signer.not_before and not_before > time then 94 if not_after = signer.not_after and not_after < time then 98 if issuer and not signer.verify issuer.public_key then 107 # Ensures the public key of +key+ matches the public key in +signer+ 109 def check_key signer, key 110 unless signer an [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/ |
H A D | tpOcspCertVfy.cpp | 37 * assumed to be (i.e., must, but we don't check that here) the signer of the 43 TPCertInfo &signerCert) // potential signer of OCSP response 62 tpOcspDebug("tpIsAuthorizedOcspSigner: signer is issued by issuer, no EKU"); 80 tpOcspDebug("tpIsAuthorizedOcspSigner: signer is issued by issuer, no OCSP " 93 tpOcspDebug("tpIsAuthorizedOcspSigner: FOUND authorized signer"); 98 tpOcspDebug("tpIsAuthorizedOcspSigner: signer sig verify FAIL"); 115 TPCertInfo &signer) 120 * Name inside response must == signer's SubjectName. 121 * Note we can't use signer.subjectName(); that's normalized. 126 CSSM_RETURN crtn = signer 113 tpOcspResponderIDCheck( OCSPResponse &ocspResp, TPCertInfo &signer) argument 166 tpOcspResponseSigVerify( TPVerifyContext &vfyCtx, OCSPResponse &ocspResp, TPCertInfo &signer) argument 234 tpIsOcspIssuer( TPVerifyContext &vfyCtx, OCSPResponse &ocspResp, const CSSM_DATA *signerData, TPCertInfo *signer, OcspCertType certType, TPCertInfo *issuer, TPCertInfo **signerRtn) argument [all...] |
/macosx-10.10/bind9-45.101/bind9/contrib/zkt/ |
H A D | README.logging | 9 In previous version of dnssec-signer every message was written 14 Since v0.96, the dnssec-signer command is able to log all messages 21 If a file is specified, than each run of dnssec-signer will append the 23 name of zkt-<ISOdate&timeUTC>+log" will be created on each dnssec-signer run. 63 Start and stop of dnssec-signer
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dlv/ns1/ |
H A D | sign.sh | 38 $SIGNER -r $RANDFILE -g -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/dlv/ns2/ |
H A D | sign.sh | 39 $SIGNER -r $RANDFILE -l $dlvzone -g -o $zone -f $outfile $zonefile > /dev/null 2> signer.err || cat signer.err
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/include/dns/ |
H A D | ssu.h | 134 dns_ssutable_checkrules(dns_ssutable_t *table, dns_name_t *signer, 162 *\li 'signer' is NULL or a valid absolute name 205 dns_ssu_external_match(dns_name_t *identity, dns_name_t *signer,
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/include/dst/ |
H A D | gssapi.h | 193 dst_gssapi_identitymatchesrealmkrb5(dns_name_t *signer, dns_name_t *name, 196 * Compare a "signer" (in the format of a Kerberos-format Kerberos5 203 dst_gssapi_identitymatchesrealmms(dns_name_t *signer, dns_name_t *name, 206 * Compare a "signer" (in the format of a Kerberos-format Kerberos5
|