/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_x509_cl/lib/ |
H A D | Session_CSR.cpp | 50 NSSCertRequest certReq; local 51 NSSCertRequestInfo &reqInfo = certReq.reqInfo; 54 memset(&certReq, 0, sizeof(certReq)); 128 certReq.signatureAlgorithm.algorithm = csrReq->signatureOid; 130 CL_nullAlgParams(certReq.signatureAlgorithm); 131 certReq.signature.Data = (uint8 *)sig.data(); 132 certReq.signature.Length = sig.length() * 8; 138 prtn = SecNssEncodeItemOdata(&certReq, kSecAsn1CertRequestTemplate, encCsr); 162 NSSCertRequest certReq; local [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/signerAndSubjSsl/ |
H A D | signerAndSubjSsl.cpp | 114 CSSM_APPLE_TP_CERT_REQUEST certReq; local 275 /* certReq for root */ 276 memset(&certReq, 0, sizeof(CSSM_APPLE_TP_CERT_REQUEST)); 277 certReq.cspHand = cspHand; 278 certReq.clHand = clHand; 279 certReq.serialNumber = 0x12345678; 280 certReq.numSubjectNames = NUM_ROOT_NAMES; 281 certReq.subjectNames = rootRdn; 282 certReq.numIssuerNames = 0; 283 certReq [all...] |
/macosx-10.10.1/security_dotmac_tp-55107.1/lib/ |
H A D | dotMacCredRequest.cpp | 342 CSSM_APPLE_DOTMAC_TP_CERT_REQUEST *certReq = local 344 if(!certReq || !certReq->userName.Data || !certReq->userName.Length) { 350 dotMacTokenizeUserName(certReq->userName, certReq->userName, certReqDomain); 362 if(certReq->flags & CSSM_DOTMAC_TP_IS_REQ_PENDING) { 367 if(certReq->password.Data == NULL) { 372 certReq->userName, 373 certReq 407 CSSM_APPLE_DOTMAC_TP_CERT_REQUEST *certReq = local [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/sslSubjName/ |
H A D | sslSubjName.cpp | 253 CSSM_APPLE_TP_CERT_REQUEST certReq; local 325 /* certReq for root */ 326 memset(&certReq, 0, sizeof(CSSM_APPLE_TP_CERT_REQUEST)); 327 certReq.cspHand = cspHand; 328 certReq.clHand = clHand; 329 certReq.serialNumber = 0x12345678; 330 certReq.numSubjectNames = NUM_ROOT_NAMES; 331 certReq.subjectNames = rootRdn; 332 certReq.numIssuerNames = 0; 333 certReq [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/dotMacTool/ |
H A D | dotMacTool.cpp | 234 CSSM_APPLE_DOTMAC_TP_CERT_REQUEST certReq; local 244 memset(&certReq, 0, sizeof(certReq)); 245 certReq.userName.Data = (uint8 *)userName; 246 certReq.userName.Length = strlen(userName); 256 certReq.version = CSSM_DOT_MAC_TP_REQ_VERSION; 258 reqSet.Requests = &certReq; 305 CSSM_APPLE_DOTMAC_TP_CERT_REQUEST certReq; local 470 memset(&certReq, 0, sizeof(certReq)); [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certSerialEncodeTest/ |
H A D | certSerialEncodeTest.cpp | 113 CSSM_APPLE_TP_CERT_REQUEST certReq; local 128 /* certReq for root */ 129 memset(&certReq, 0, sizeof(CSSM_APPLE_TP_CERT_REQUEST)); 130 certReq.cspHand = cspHand; 131 certReq.clHand = clHand; 132 certReq.serialNumber = serialNumIn; 133 certReq.numSubjectNames = NUM_ROOT_NAMES; 134 certReq.subjectNames = rootRdn; 135 certReq.numIssuerNames = 0; 136 certReq [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/signerAndSubjTp/ |
H A D | signerAndSubjTp.cpp | 144 CSSM_APPLE_TP_CERT_REQUEST certReq; local 410 /* certReq for root */ 411 memset(&certReq, 0, sizeof(CSSM_APPLE_TP_CERT_REQUEST)); 412 certReq.cspHand = cspHand; 413 certReq.clHand = clHand; 414 certReq.serialNumber = serialNumber; 415 certReq.numSubjectNames = NUM_ROOT_NAMES; 416 certReq.subjectNames = rootRdn; 417 certReq.numIssuerNames = 0; 418 certReq [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/ |
H A D | tpCredRequest.cpp | 474 CSSM_APPLE_TP_CERT_REQUEST *certReq = local 476 if((certReq->cspHand == 0) || 477 (certReq->clHand == 0) || 478 (certReq->certPublicKey == NULL) || 479 (certReq->issuerPrivateKey == NULL) || 480 (certReq->signatureOid.Data == NULL)) { 485 const CSSM_KEY *subjectPubKey = certReq->certPublicKey; 495 refKeyToRaw(certReq->cspHand, subjectPubKey, &rawPubKey); 506 csrReq.subjectNameX509 = buildX509Name(certReq->subjectNames, 507 certReq 615 CSSM_APPLE_TP_CERT_REQUEST *certReq = local [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTool/ |
H A D | key_create.c | 344 CSSM_APPLE_TP_CERT_REQUEST certReq; 374 certReq.challengeString = challengeBuf; 392 /* certReq */ 393 certReq.cspHand = cspHand; 394 certReq.clHand = clHand; 395 certReq.serialNumber = 0x12345678; // TBD - random? From user? 396 certReq.numSubjectNames = numNames; 397 certReq.subjectNames = subjectNames; 399 /* TBD - if we're passed in a signing cert, certReq.issuerNameX509 will 402 certReq [all...] |
H A D | createFVMaster.c | 273 CSSM_APPLE_TP_CERT_REQUEST certReq; local 285 certReq.challengeString = NULL; 311 /* certReq */ 312 certReq.cspHand = cspHand; 313 certReq.clHand = clHand; 314 randUint32(&certReq.serialNumber); // random serial number 315 certReq.numSubjectNames = 2; 316 certReq.subjectNames = subjectNames; 318 certReq.numIssuerNames = 0; // root for now 319 certReq [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/dotMacRequest/ |
H A D | dotMacRequest.cpp | 154 SecCertificateRequestRef certReq = NULL; local 164 &certReq); 171 ortn = SecCertificateRequestGetResult(certReq, keychain, &estTime, &certRef); 182 if(certReq) { 183 CFRelease(certReq); 245 SecCertificateRequestRef certReq = NULL; local 253 &certReq); 268 if(certReq != NULL) { 270 CFRelease(certReq); 367 SecCertificateRequestRef certReq local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/ |
H A D | CertificateRequest.cpp | 296 CSSM_APPLE_DOTMAC_TP_CERT_REQUEST certReq; local 351 memset(&certReq, 0, sizeof(certReq)); 352 certReq.version = CSSM_DOT_MAC_TP_REQ_VERSION; 353 certReq.cspHand = cspHand; 354 certReq.clHand = mCL->handle(); 355 certReq.numTypeValuePairs = 1; 356 certReq.typeValuePairs = &tvp; 357 certReq.publicKey = const_cast<CSSM_KEY_PTR>(pubKey); 358 certReq 785 CSSM_APPLE_DOTMAC_TP_CERT_REQUEST certReq; local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | CertificateRequest.cpp | 296 CSSM_APPLE_DOTMAC_TP_CERT_REQUEST certReq; local 351 memset(&certReq, 0, sizeof(certReq)); 352 certReq.version = CSSM_DOT_MAC_TP_REQ_VERSION; 353 certReq.cspHand = cspHand; 354 certReq.clHand = mCL->handle(); 355 certReq.numTypeValuePairs = 1; 356 certReq.typeValuePairs = &tvp; 357 certReq.publicKey = const_cast<CSSM_KEY_PTR>(pubKey); 358 certReq 785 CSSM_APPLE_DOTMAC_TP_CERT_REQUEST certReq; local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | CertificateRequest.cpp | 296 CSSM_APPLE_DOTMAC_TP_CERT_REQUEST certReq; local 351 memset(&certReq, 0, sizeof(certReq)); 352 certReq.version = CSSM_DOT_MAC_TP_REQ_VERSION; 353 certReq.cspHand = cspHand; 354 certReq.clHand = mCL->handle(); 355 certReq.numTypeValuePairs = 1; 356 certReq.typeValuePairs = &tvp; 357 certReq.publicKey = const_cast<CSSM_KEY_PTR>(pubKey); 358 certReq 785 CSSM_APPLE_DOTMAC_TP_CERT_REQUEST certReq; local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/ |
H A D | SecCertificateRequest.c | 682 NSSCertRequest certReq; 683 memset(&certReq, 0, sizeof(certReq)); 687 certReq.reqInfo.version.Length = sizeof(version); 688 certReq.reqInfo.version.Data = &version; 722 certReq.reqInfo.subject.rdns = rdnps; 725 certReq.reqInfo.subjectPublicKeyInfo.algorithm.algorithm.Length = oidRsa.length; 726 certReq.reqInfo.subjectPublicKeyInfo.algorithm.algorithm.Data = oidRsa.data; 727 certReq.reqInfo.subjectPublicKeyInfo.algorithm.parameters = asn1_null; 734 certReq 843 NSSCertRequest certReq; local [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/smimePolicy/ |
H A D | smimePolicy.cpp | 853 CSSM_APPLE_TP_CERT_REQUEST certReq; local 951 /* certReq for root */ 952 memset(&certReq, 0, sizeof(CSSM_APPLE_TP_CERT_REQUEST)); 953 certReq.cspHand = cspHand; 954 certReq.clHand = clHand; 955 certReq.serialNumber = 0x12345678; 956 certReq.numSubjectNames = NUM_ROOT_NAMES; 957 certReq.subjectNames = rootRdn; 958 certReq.numIssuerNames = 0; 959 certReq [all...] |
/macosx-10.10.1/security_certtool-55109/src/ |
H A D | CertTool.cpp | 1067 CSSM_APPLE_TP_CERT_REQUEST certReq; local 1109 certReq.challengeString = challengeBuf; 1113 certReq.challengeString = NULL; 1200 /* certReq */ 1201 certReq.cspHand = cspHand; 1202 certReq.clHand = clHand; 1203 certReq.numSubjectNames = numNames; 1204 certReq.subjectNames = subjectNames; 1212 certReq.serialNumber = ((uint32)(serialNum[0])) << 24 | 1218 certReq [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_smime/ |
H A D | tsaTemplates.h | 61 CSSM_DATA certReq; // BOOL member in struct:__anon3899
|
H A D | tsaTemplates.c | 107 certReq BOOLEAN DEFAULT FALSE, 129 offsetof(SecAsn1TSATimeStampReq, certReq) },
|
H A D | tsaSupport.c | 681 SecAsn1Item certReq = {1, &creq}; //jch - to request or not? local 693 tsreq.certReq = certReq;
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_smime/lib/ |
H A D | tsaTemplates.h | 61 CSSM_DATA certReq; // BOOL member in struct:__anon4916
|
H A D | tsaTemplates.c | 107 certReq BOOLEAN DEFAULT FALSE, 129 offsetof(SecAsn1TSATimeStampReq, certReq) },
|
H A D | tsaSupport.c | 681 SecAsn1Item certReq = {1, &creq}; //jch - to request or not? local 693 tsreq.certReq = certReq;
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/extenTestTp/ |
H A D | extenTestTp.cpp | 1105 CSSM_APPLE_TP_CERT_REQUEST certReq; local 1118 memset(&certReq, 0, sizeof(certReq)); 1136 certReq.cspHand = cspHand; 1137 certReq.clHand = clHand; 1138 certReq.serialNumber = 0x8765; 1139 certReq.numSubjectNames = NUM_DUMMY_NAMES; 1140 certReq.subjectNames = dummyRdn; 1141 certReq.numIssuerNames = NUM_DUMMY_NAMES; 1142 certReq [all...] |