/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/anchorTest/ |
H A D | anchorSourceTest | 53 foreach certFile (*) 54 if ( ( -f "$certFile" ) && ( "$certFile" != X509Anchors) ) then 56 echo testing $certFile.... 58 # $CERTCRL -c "$certFile" -C "$certFile" -a -f -L -T 20071217154316 59 $CERTCRL -c "$certFile" -C "$certFile" -a -f -L 61 echo "++++++++ Verification error on $certFile" 62 $CERTCRL -c "$certFile" [all...] |
H A D | intermedSourceTest | 63 foreach certFile (*) 64 if ( -f "$certFile" ) then 66 echo testing $certFile.... 68 $CERTCRL -c "$certFile" -s -a -f -L -n -N -d $SYSTEM_CERTS $TRUST_SETTINGS_ARG 71 echo "Note: $certFile is expired" 74 echo "++++++++ Verification error on $certFile ($ERR)" 75 $CERTCRL -c "$certFile" -s -a -f -v -n -N -d $SYSTEM_CERTS $TRUST_SETTINGS_ARG
|
H A D | intermedTest | 87 foreach certFile ($CERTS_DIR/*) 88 set cmd="$CERTCRL -c $certFile -s -a -f -L $TRUST_SETTINGS_ARG $EVAL_TIME" 93 set CERTNAM=`basename "$certFile"` 109 $CERTCRL -c $certFile -s -a -f -v
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/keyFromCert/ |
H A D | keyFromCert.cpp | 19 printf("Usage: %s [-q] certFile keyFile\n", argv[0]); 32 const char *certFile = NULL; local 37 certFile = argv[1]; 43 certFile = argv[2]; 55 rtn = readFile(certFile, &rawCert.Data, &len); 57 printf("Error reading %s; %s\n", certFile, strerror(rtn));
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/crlTool/ |
H A D | crlTool.cpp | 22 printf(" -c certFile -- obtain CRL via net from this cert\n"); 123 char *certFile = NULL; local 143 certFile = optarg; 164 if((certFile != NULL) && (crlFile != NULL)) { 165 printf("***crlFile and certFile are mutually exclusive.\n"); 168 if((certFile == NULL) && (crlFile == NULL)) { 169 printf("***Must specify either certFile or crlFile\n"); 185 if(certFile) { 186 if(readFile(certFile, &certData, &certDataLen)) { 187 printf("***Error reading %s. Aborting.\n", certFile); [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/cspxutils/dbTool/ |
H A D | dbCert.h | 35 const char *certFile,
|
H A D | dbCert.cpp | 429 const char *certFile, 475 if(readFile(certFile, &certData.Data, &len)) { 476 printf("***Error reading cert from %s. Aborting.\n", certFile); 482 certFile, // printName 490 certFile, // printName 495 printf("***Error importing cert %s. Aborting.\n", certFile); 426 importBadCert( CSSM_DL_HANDLE dlHand, const char *dbFileName, const char *certFile, const char *keyFile, CSSM_ALGORITHMS keyAlg, CSSM_BOOL pemFormat, CSSM_KEYBLOB_FORMAT keyFormat, CSSM_BOOL verbose) argument
|
H A D | dbTool.cpp | 36 printf(" c=certFile\n"); 657 char *certFile = NULL; local 692 certFile = &argp[2]; 708 crtn = importBadCert(dlDbHand.DLHandle, dbFileName, certFile,
|
/macosx-10.10.1/Security-57031.1.35/SecurityTool/ |
H A D | trusted_cert_add.c | 212 char *certFile = NULL; local 339 certFile = argv[optind]; 347 if(defaultSetting && (certFile != NULL)) { 352 if((certFile == NULL) && (settingsFileOut == NULL) && !defaultSetting) { 483 else if(certFile != NULL) { 484 if(readCertFile(certFile, &certRef)) { 485 fprintf(stderr, "Error reading file %s\n", certFile); 563 char *certFile = NULL; local 589 certFile = argv[optind]; 595 if((certFile [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/extenGrab/ |
H A D | extenGrab.cpp | 16 printf("Usage: %s certFile outFileBase [r for CRL, default is cert]\n", 72 const char *certFile = argv[1]; local 77 if(readFile(certFile, &rawCert, &rawCertLen)) {
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/cspxutils/pubKeyTool/ |
H A D | pubKeyTool.cpp | 472 char *certFile = NULL; local 492 certFile = optarg; 536 if(pubKeyFile || certFile) { 560 if(privKeyFile || certFile) { 582 if(certFile) { 593 if(readFile(certFile, &certData.Data, &len)) { 594 printf("***Error reading cert from %s. Aborting.\n", certFile);
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/ocspTool/ |
H A D | ocspTool.cpp | 339 const unsigned char *certFile, 348 CSSM_DATA certData = {certFileLen, (uint8 *)certFile}; 978 const unsigned char *certFile, 994 CSSM_DATA cdata = {certFileLen, (uint8 *)certFile}; 337 genOcspReq( CSSM_CL_HANDLE clHand, const unsigned char *certFile, unsigned certFileLen, const unsigned char *issuerCertFile, unsigned issuerCertFileLen, unsigned char **outFile, unsigned *outFileLen) argument 976 postOcspReq( CSSM_CL_HANDLE clHand, const unsigned char *certFile, unsigned certFileLen, const unsigned char *issuerCertFile, unsigned issuerCertFileLen, const char *responderURI, bool doParse, bool verbose, unsigned char **outFile, unsigned *outFileLen) argument
|
/macosx-10.10.1/vim-55/runtime/syntax/ |
H A D | samba.vim | 35 syn keyword sambaKeyword contained certFile change char character chars chat
|