/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/trustSettings/ |
H A D | one.scr | 17 cert = dmitchAppleThawte.cer 18 cert = thawteCA.cer 26 cert = dmitchAppleThawte.cer 27 cert = thawteCA.cer 35 cert = dmitchAppleThawte.cer 36 cert = thawteCA.cer 44 cert = dmitchAppleThawte.cer 45 cert = thawteCA.cer 53 cert = dmitchAppleThawte.cer 54 cert [all...] |
H A D | trustSettings.scr | 31 cert = localhost.cer 32 cert = debugRoot.cer 42 cert = localhost.cer 43 cert = debugRoot.cer 54 cert = localhost.cer 55 cert = debugRoot.cer 71 cert = csLeaf.cer 72 cert = csCA.cer 82 cert = csLeaf.cer 83 cert [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/parasiticKeys/ |
H A D | parasite.scr | 21 cert = ssSubjCert.der 27 cert = uee8k.pem 28 cert = shintca.pem 34 cert = uee16k.pem 35 cert = shintca.pem 41 cert = eepkint1.pem 42 cert = pkint8k.pem 48 cert = eepkint1.pem 49 cert = pkint8k.pem 56 cert [all...] |
H A D | parasiteEnableLargeKeys.scr | 16 cert = ssSubjCert.der 22 cert = uee8k.pem 23 cert = shintca.pem 31 cert = uee16k.pem 32 cert = shintca.pem 40 cert = eepkint1.pem 41 cert = pkint8k.pem 49 cert = eepkint1.pem 50 cert = pkint8k.pem 57 cert [all...] |
H A D | parasiteErrDetect.scr | 13 cert = ssSubjCert.der 15 # leaf cert has a bad public key 21 cert = uee8k.pem 22 cert = shintca.pem 24 # leaf cert has a bad public key 30 cert = uee16k.pem 31 cert = shintca.pem 33 # leaf cert has a bad public key 39 cert = eepkint1.pem 40 cert [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/X509tests/ |
H A D | x509tests.scr | 15 cert = "End Certificate CP.01.01.crt" 22 cert = "End Certificate CP.01.02.crt" 23 cert = "Intermediate Certificate CP.01.02.crt" 34 cert = "End Certificate CP.01.03.crt" 35 cert = "Intermediate Certificate CP.01.03.crt" 45 cert = "End Certificate CP.02.01.crt" 46 cert = "Intermediate Certificate 1 CP.02.01.crt" 47 cert = "Intermediate Certificate 2 CP.02.01.crt" 57 cert = "End Certificate CP.02.02.crt" 61 cert [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/emptyCert/ |
H A D | emptyCert.scr | 2 # Test for empty/bad cert handling, Radar 3116734. 14 cert = leaf.cer 15 cert = CA.cer 21 test = "Throw in empty cert not as leaf, it should be ignored" 22 cert = leaf.cer 23 cert = CA.cer 24 cert = emptyCert.cer 31 cert = leaf.cer 32 cert = CA.cer 33 cert [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/serverGatedCrypto/ |
H A D | sgc.scr | 12 cert = luottokunta_v3.100.cer 13 cert = luottokunta_v3.101.cer 20 cert = alandsbanken_v3.100.cer 21 cert = alandsbanken_v3.101.cer
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/implicitAnchor/ |
H A D | implicitAnchor.scr | 12 cert = leaf.cer 13 cert = CA.cer 20 cert = leaf.cer 21 cert = CA.cer 22 cert = root.cer 29 cert = leaf.cer 30 cert = CA.cer 31 cert = root.cer
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/NSS_ECC/ |
H A D | nssecc.scr | 13 cert = ECCCA.cer 19 cert = ECCp192.cer 25 cert = ECCp256.cer 31 cert = ECCp384.cer 37 cert = ECCp521.cer
|
H A D | msEcc.scr | 12 cert = RootP256.cer 18 cert = End_P256_Specified_SHA1.cer 24 cert = End_P256_Specified_SHA256.cer 30 cert = End_P256_combined_SHA256.cer 36 cert = End_P256_combined_SHA512.cer 42 cert = End_P384_Specified_SHA256.cer 48 cert = End_P384_combined_SHA256.cer 54 cert = End_P384_Specified_SHA384.cer 60 cert = End_P384_combined_SHA1.cer 66 cert [all...] |
H A D | opensslEcc.scr | 12 cert = secp256r1ca.cer 18 cert = secp256r1server-secp256r1ca.cer 24 cert = secp384r1ca.cer 30 cert = secp384r1server-secp384r1ca.cer 36 cert = secp521r1ca.cer 42 cert = secp521r1server-secp521r1ca.cer
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/bmpSslHost/ |
H A D | bmpSslHost.scr | 12 cert = stone.tees_v3.100.cer 13 cert = stone.tees_v3.101.cer 14 cert = stone.tees_v3.102.cer
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/expiredCerts/ |
H A D | expiredCerts.scr | 13 cert = ecGoodLeaf.cer 14 cert = ecGoodCA.cer 24 cert = ecExpiredLeaf.cer 25 cert = ecGoodCA.cer 33 cert = ecGoodLeaf.cer 34 cert = ecExpiredCA.cer 42 cert = ecGoodLeaf.cer 43 cert = ecGoodCA.cer 51 # Verify expired cert recovery for each cert (no [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/qualCertStatment/ |
H A D | qualCertStatement.scr | 13 cert = ICA3.cer 20 cert = Netlock1.der 27 cert = badStatementId.cer
|
/macosx-10.10.1/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | dnssec.c | 62 cert_t *cert = NULL; local 118 /* create cert holder */ 119 cert = oakley_newcert(); 120 if (cert == NULL) { 122 "failed to get cert buffer.\n"); 125 cert->pl = vmalloc(res->ci_certlen + 1); 126 if (cert->pl == NULL) { 128 "failed to get cert buffer.\n"); 131 memcpy(cert->pl->v + 1, res->ci_cert, res->ci_certlen); 132 cert [all...] |
/macosx-10.10.1/ruby-106/ruby/sample/openssl/ |
H A D | echo_svr.rb | 15 cert = OpenSSL::X509::Certificate.new(File::read(cert_file)) 20 cert = OpenSSL::X509::Certificate.new 21 cert.version = 2 22 cert.serial = 0 24 cert.subject = name 25 cert.issuer = name 26 cert.not_before = Time.now 27 cert.not_after = Time.now + 3600 28 cert.public_key = key.public_key 29 ef = OpenSSL::X509::ExtensionFactory.new(nil,cert) [all...] |
H A D | certstore.rb | 34 def verify(cert) 35 error, crl_map = do_verify(cert) 37 [[false, cert, crl_map[cert.subject], error]] 47 def is_ca?(cert) 48 case guess_cert_type(cert) 73 def do_verify(cert) 76 result = @x509store.verify(cert) do |ok, ctx| 77 cert = ctx.current_cert 79 crl_map[cert [all...] |
/macosx-10.10.1/CPANInternal-159.1/Crypt-SSLeay-0.64/lib/Crypt/SSLeay/ |
H A D | X509.pm | 6 my $cert = shift; 7 not_string2time($cert->get_notBeforeString); 11 my $cert = shift; 12 not_string2time($cert->get_notAfterString);
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/resourceSigning/ |
H A D | resourceSigning.scr | 2 # Test Apple Resource Signing cert verification policy 12 cert = leaf.cer 13 cert = intermediate.cer 20 cert = leafNoEKU.cer 21 cert = intermediate.cer 30 cert = leafBadEKU.cer 31 cert = intermediate.cer 40 cert = leafBadKU.cer 41 cert = intermediate.cer
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/CodePkgSigning/ |
H A D | CodePkgSigning.scr | 15 cert = CodeSignLeaf.cer 21 cert = NoEKULeaf.cer 28 cert = BadCodeSignLeaf.cer 37 cert = CodeSignLeaf.cer 43 cert = NoEKULeaf.cer 50 cert = BadCodeSignLeaf.cer
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/AppleCodeSigning/ |
H A D | AppleCodeSigning.scr | 2 # Test Software Update Apple Code Signing cert verification policy. 16 cert = csLeaf.cer 17 cert = csCA.cer 23 cert = csDevLeaf.cer 24 cert = csCA.cer 32 cert = csLeafNoEKU.cer 33 cert = csCA.cer 41 cert = csLeafBadEKU.cer 42 cert = csCA.cer 50 cert [all...] |
/macosx-10.10.1/ruby-106/ruby/test/openssl/ |
H A D | test_x509cert.rb | 25 cert = issue_cert(@ca, @rsa2048, s, Time.now, Time.now+3600, [], 27 assert_equal(s, cert.serial) 28 cert = OpenSSL::X509::Certificate.new(cert.to_der) 29 assert_equal(s, cert.serial) 46 cert = issue_cert(@ca, pk, 1, Time.now, Time.now+3600, exts, 48 assert_equal(cert.extensions[1].value, 49 OpenSSL::TestUtils.get_subject_key_id(cert)) 50 cert = OpenSSL::X509::Certificate.new(cert [all...] |
/macosx-10.10.1/cups-408/cups/scheduler/ |
H A D | cert.c | 2 * "$Id: cert.c 12035 2014-07-16 19:40:05Z msweet $" 39 cupsd_cert_t *cert; /* Current certificate */ local 52 if ((cert = calloc(sizeof(cupsd_cert_t), 1)) == NULL) 59 cert->pid = pid; 60 cert->type = type; 61 strlcpy(cert->username, username, sizeof(cert->username)); 64 cert->certificate[i] = hex[CUPS_RAND() & 15]; 79 free(cert); 247 DEBUG_printf(("ADD pid=%d, username=%s, cert 269 cupsd_cert_t *cert, /* Current certificate */ local 314 cupsd_cert_t *cert, /* Current certificate */ local 353 cupsd_cert_t *cert; /* Current certificate */ local [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/NISCC/TLS_SSL/ |
H A D | nisccSslTest | 31 foreach cert ( * ) 32 echo cert $cert... 33 skipThisNisccCert $cert 38 dbTool $FULL_CLIENT_KC i c=$cert k=../$CLIENT_KEY || exit(1)
|