Searched refs:cert (Results 1 - 25 of 675) sorted by relevance

1234567891011>>

/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/trustSettings/
H A Done.scr17 cert = dmitchAppleThawte.cer
18 cert = thawteCA.cer
26 cert = dmitchAppleThawte.cer
27 cert = thawteCA.cer
35 cert = dmitchAppleThawte.cer
36 cert = thawteCA.cer
44 cert = dmitchAppleThawte.cer
45 cert = thawteCA.cer
53 cert = dmitchAppleThawte.cer
54 cert
[all...]
H A DtrustSettings.scr31 cert = localhost.cer
32 cert = debugRoot.cer
42 cert = localhost.cer
43 cert = debugRoot.cer
54 cert = localhost.cer
55 cert = debugRoot.cer
71 cert = csLeaf.cer
72 cert = csCA.cer
82 cert = csLeaf.cer
83 cert
[all...]
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/parasiticKeys/
H A Dparasite.scr21 cert = ssSubjCert.der
27 cert = uee8k.pem
28 cert = shintca.pem
34 cert = uee16k.pem
35 cert = shintca.pem
41 cert = eepkint1.pem
42 cert = pkint8k.pem
48 cert = eepkint1.pem
49 cert = pkint8k.pem
56 cert
[all...]
H A DparasiteEnableLargeKeys.scr16 cert = ssSubjCert.der
22 cert = uee8k.pem
23 cert = shintca.pem
31 cert = uee16k.pem
32 cert = shintca.pem
40 cert = eepkint1.pem
41 cert = pkint8k.pem
49 cert = eepkint1.pem
50 cert = pkint8k.pem
57 cert
[all...]
H A DparasiteErrDetect.scr13 cert = ssSubjCert.der
15 # leaf cert has a bad public key
21 cert = uee8k.pem
22 cert = shintca.pem
24 # leaf cert has a bad public key
30 cert = uee16k.pem
31 cert = shintca.pem
33 # leaf cert has a bad public key
39 cert = eepkint1.pem
40 cert
[all...]
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/X509tests/
H A Dx509tests.scr15 cert = "End Certificate CP.01.01.crt"
22 cert = "End Certificate CP.01.02.crt"
23 cert = "Intermediate Certificate CP.01.02.crt"
34 cert = "End Certificate CP.01.03.crt"
35 cert = "Intermediate Certificate CP.01.03.crt"
45 cert = "End Certificate CP.02.01.crt"
46 cert = "Intermediate Certificate 1 CP.02.01.crt"
47 cert = "Intermediate Certificate 2 CP.02.01.crt"
57 cert = "End Certificate CP.02.02.crt"
61 cert
[all...]
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/emptyCert/
H A DemptyCert.scr2 # Test for empty/bad cert handling, Radar 3116734.
14 cert = leaf.cer
15 cert = CA.cer
21 test = "Throw in empty cert not as leaf, it should be ignored"
22 cert = leaf.cer
23 cert = CA.cer
24 cert = emptyCert.cer
31 cert = leaf.cer
32 cert = CA.cer
33 cert
[all...]
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/serverGatedCrypto/
H A Dsgc.scr12 cert = luottokunta_v3.100.cer
13 cert = luottokunta_v3.101.cer
20 cert = alandsbanken_v3.100.cer
21 cert = alandsbanken_v3.101.cer
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/implicitAnchor/
H A DimplicitAnchor.scr12 cert = leaf.cer
13 cert = CA.cer
20 cert = leaf.cer
21 cert = CA.cer
22 cert = root.cer
29 cert = leaf.cer
30 cert = CA.cer
31 cert = root.cer
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/NSS_ECC/
H A Dnssecc.scr13 cert = ECCCA.cer
19 cert = ECCp192.cer
25 cert = ECCp256.cer
31 cert = ECCp384.cer
37 cert = ECCp521.cer
H A DmsEcc.scr12 cert = RootP256.cer
18 cert = End_P256_Specified_SHA1.cer
24 cert = End_P256_Specified_SHA256.cer
30 cert = End_P256_combined_SHA256.cer
36 cert = End_P256_combined_SHA512.cer
42 cert = End_P384_Specified_SHA256.cer
48 cert = End_P384_combined_SHA256.cer
54 cert = End_P384_Specified_SHA384.cer
60 cert = End_P384_combined_SHA1.cer
66 cert
[all...]
H A DopensslEcc.scr12 cert = secp256r1ca.cer
18 cert = secp256r1server-secp256r1ca.cer
24 cert = secp384r1ca.cer
30 cert = secp384r1server-secp384r1ca.cer
36 cert = secp521r1ca.cer
42 cert = secp521r1server-secp521r1ca.cer
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/bmpSslHost/
H A DbmpSslHost.scr12 cert = stone.tees_v3.100.cer
13 cert = stone.tees_v3.101.cer
14 cert = stone.tees_v3.102.cer
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/expiredCerts/
H A DexpiredCerts.scr13 cert = ecGoodLeaf.cer
14 cert = ecGoodCA.cer
24 cert = ecExpiredLeaf.cer
25 cert = ecGoodCA.cer
33 cert = ecGoodLeaf.cer
34 cert = ecExpiredCA.cer
42 cert = ecGoodLeaf.cer
43 cert = ecGoodCA.cer
51 # Verify expired cert recovery for each cert (no
[all...]
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/qualCertStatment/
H A DqualCertStatement.scr13 cert = ICA3.cer
20 cert = Netlock1.der
27 cert = badStatementId.cer
/macosx-10.10.1/ipsec-286.1.1/ipsec-tools/racoon/
H A Ddnssec.c62 cert_t *cert = NULL; local
118 /* create cert holder */
119 cert = oakley_newcert();
120 if (cert == NULL) {
122 "failed to get cert buffer.\n");
125 cert->pl = vmalloc(res->ci_certlen + 1);
126 if (cert->pl == NULL) {
128 "failed to get cert buffer.\n");
131 memcpy(cert->pl->v + 1, res->ci_cert, res->ci_certlen);
132 cert
[all...]
/macosx-10.10.1/ruby-106/ruby/sample/openssl/
H A Decho_svr.rb15 cert = OpenSSL::X509::Certificate.new(File::read(cert_file))
20 cert = OpenSSL::X509::Certificate.new
21 cert.version = 2
22 cert.serial = 0
24 cert.subject = name
25 cert.issuer = name
26 cert.not_before = Time.now
27 cert.not_after = Time.now + 3600
28 cert.public_key = key.public_key
29 ef = OpenSSL::X509::ExtensionFactory.new(nil,cert)
[all...]
H A Dcertstore.rb34 def verify(cert)
35 error, crl_map = do_verify(cert)
37 [[false, cert, crl_map[cert.subject], error]]
47 def is_ca?(cert)
48 case guess_cert_type(cert)
73 def do_verify(cert)
76 result = @x509store.verify(cert) do |ok, ctx|
77 cert = ctx.current_cert
79 crl_map[cert
[all...]
/macosx-10.10.1/CPANInternal-159.1/Crypt-SSLeay-0.64/lib/Crypt/SSLeay/
H A DX509.pm6 my $cert = shift;
7 not_string2time($cert->get_notBeforeString);
11 my $cert = shift;
12 not_string2time($cert->get_notAfterString);
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/resourceSigning/
H A DresourceSigning.scr2 # Test Apple Resource Signing cert verification policy
12 cert = leaf.cer
13 cert = intermediate.cer
20 cert = leafNoEKU.cer
21 cert = intermediate.cer
30 cert = leafBadEKU.cer
31 cert = intermediate.cer
40 cert = leafBadKU.cer
41 cert = intermediate.cer
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/CodePkgSigning/
H A DCodePkgSigning.scr15 cert = CodeSignLeaf.cer
21 cert = NoEKULeaf.cer
28 cert = BadCodeSignLeaf.cer
37 cert = CodeSignLeaf.cer
43 cert = NoEKULeaf.cer
50 cert = BadCodeSignLeaf.cer
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/testSubjects/AppleCodeSigning/
H A DAppleCodeSigning.scr2 # Test Software Update Apple Code Signing cert verification policy.
16 cert = csLeaf.cer
17 cert = csCA.cer
23 cert = csDevLeaf.cer
24 cert = csCA.cer
32 cert = csLeafNoEKU.cer
33 cert = csCA.cer
41 cert = csLeafBadEKU.cer
42 cert = csCA.cer
50 cert
[all...]
/macosx-10.10.1/ruby-106/ruby/test/openssl/
H A Dtest_x509cert.rb25 cert = issue_cert(@ca, @rsa2048, s, Time.now, Time.now+3600, [],
27 assert_equal(s, cert.serial)
28 cert = OpenSSL::X509::Certificate.new(cert.to_der)
29 assert_equal(s, cert.serial)
46 cert = issue_cert(@ca, pk, 1, Time.now, Time.now+3600, exts,
48 assert_equal(cert.extensions[1].value,
49 OpenSSL::TestUtils.get_subject_key_id(cert))
50 cert = OpenSSL::X509::Certificate.new(cert
[all...]
/macosx-10.10.1/cups-408/cups/scheduler/
H A Dcert.c2 * "$Id: cert.c 12035 2014-07-16 19:40:05Z msweet $"
39 cupsd_cert_t *cert; /* Current certificate */ local
52 if ((cert = calloc(sizeof(cupsd_cert_t), 1)) == NULL)
59 cert->pid = pid;
60 cert->type = type;
61 strlcpy(cert->username, username, sizeof(cert->username));
64 cert->certificate[i] = hex[CUPS_RAND() & 15];
79 free(cert);
247 DEBUG_printf(("ADD pid=%d, username=%s, cert
269 cupsd_cert_t *cert, /* Current certificate */ local
314 cupsd_cert_t *cert, /* Current certificate */ local
353 cupsd_cert_t *cert; /* Current certificate */ local
[all...]
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/NISCC/TLS_SSL/
H A DnisccSslTest31 foreach cert ( * )
32 echo cert $cert...
33 skipThisNisccCert $cert
38 dbTool $FULL_CLIENT_KC i c=$cert k=../$CLIENT_KEY || exit(1)

Completed in 432 milliseconds

1234567891011>>