/macosx-10.10.1/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | crypto_cssm.h | 41 extern vchar_t* crypto_cssm_get_x509cert(CFDataRef persistentCertRef, cert_status_t *certStatus);
|
H A D | oakley.c | 155 static int oakley_check_certid_1 (vchar_t *, int, int, void*, cert_status_t *certStatus); 1609 oakley_find_status_in_certchain (cert_t *certchain, cert_status_t certStatus) argument 1614 if (p->status == certStatus) { 1878 oakley_check_certid_1(vchar_t *cert, int idtype, int idlen, void *id, cert_status_t *certStatus) argument 1900 if (certStatus && !*certStatus) { 1901 *certStatus = CERT_STATUS_INVALID; 1908 if (certStatus && !*certStatus) { 1909 *certStatus [all...] |
H A D | crypto_cssm.c | 129 cert_status_t certStatus = CERT_STATUS_OK; local 185 certStatus = CERT_STATUS_PREMATURE; 189 certStatus = CERT_STATUS_EXPIRED; 192 certStatus = CERT_STATUS_OK; 206 return certStatus; 215 cert_status_t certStatus = 0; local 247 certStatus = hostcert->status; 261 if (!certStatus) { 262 certStatus = p->status; 286 } else if (certStatus 370 crypto_cssm_get_x509cert(CFDataRef persistentCertRef, cert_status_t *certStatus) argument [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/ |
H A D | SecOCSPResponse.c | 99 certStatus CertStatus, 132 this->certStatus = CS_NotParsed; 139 if ((resp->certStatus.Data == NULL) || (resp->certStatus.Length == 0)) { 140 ocspdErrorLog("OCSPSingleResponse: bad certStatus"); 143 this->certStatus = (SecAsn1OCSPCertStatusTag)(resp->certStatus.Data[0] & SEC_ASN1_TAGNUM_MASK); 144 if (this->certStatus == CS_Revoked) { 146 SecAsn1OCSPCertStatus certStatus; local 147 memset(&certStatus, [all...] |
H A D | SecOCSPResponse.h | 97 SecAsn1OCSPCertStatusTag certStatus; member in struct:__SecOCSPSingleResponse 100 CFAbsoluteTime revokedTime; /* != NULL_TIME for certStatus == CS_Revoked */
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/clAppUtils/ |
H A D | certVerify.h | 103 const char **certStatus; member in struct:__anon5220 138 const char **certStatus,
|
H A D | certVerify.cpp | 105 const char **certStatus, // e.g., "1:0x18", leading 0x optional 128 const char *str = certStatus[dex]; 559 if(vfyArgs->certStatus) { 560 if(vfyCertStatus(&vfyResult, vfyArgs->numCertStatus, vfyArgs->certStatus, 660 const char **certStatus, 687 vfyArgs.certStatus = certStatus; 102 vfyCertStatus( const CSSM_TP_VERIFY_CONTEXT_RESULT *vfyResult, unsigned numCertStatus, const char **certStatus, CSSM_BOOL quiet) argument 629 certVerifySimple( CSSM_TP_HANDLE tpHand, CSSM_CL_HANDLE clHand, CSSM_CSP_HANDLE cspHand, BlobList &certs, BlobList &roots, CSSM_BOOL useSystemAnchors, CSSM_BOOL leafCertIsCA, CSSM_BOOL allowExpiredRoot, CertVerifyPolicy vfyPolicy, const char *sslHost, CSSM_BOOL sslClient, const char *senderEmail, CE_KeyUsage intendedKeyUse, const char *expectedErrStr, unsigned numCertErrors, const char **certErrors, unsigned numCertStatus, const char **certStatus, CSSM_BOOL useTrustSettings, CSSM_BOOL quiet, CSSM_BOOL verbose) argument
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/ocspTool/ |
H A D | ocspTool.cpp | 228 SecAsn1OCSPCertStatus certStatus; local 229 memset(&certStatus, 0, sizeof(certStatus)); 237 certStatus.revokedInfo = &revokedInfo; 245 ortn = SecAsn1EncodeItem(coder, &certStatus, 247 &singleResp.certStatus); 250 ortn = SecAsn1EncodeItem(coder, &certStatus, 252 &singleResp.certStatus); 255 printf("***Error encoding certStatus\n"); 803 printf("certStatus 820 SecAsn1OCSPCertStatus certStatus; local 1096 SecAsn1OCSPCertStatusTag certStatus = CS_Good; local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_ocspd/ |
H A D | ocspResponse.cpp | 221 if((resp->certStatus.Data == NULL) || (resp->certStatus.Length == 0)) { 222 ocspdErrorLog("OCSPSingleResponse: bad certStatus\n"); 225 mCertStatus = (SecAsn1OCSPCertStatusTag)(resp->certStatus.Data[0] & SEC_ASN1_TAGNUM_MASK); 228 SecAsn1OCSPCertStatus certStatus; local 229 memset(&certStatus, 0, sizeof(certStatus)); 230 if(SecAsn1DecodeData(mCoder, &resp->certStatus, 231 kSecAsn1OCSPCertStatusRevokedTemplate, &certStatus)) { 232 ocspdErrorLog("OCSPSingleResponse: err decoding certStatus\ [all...] |
H A D | ocspResponse.h | 110 SecAsn1OCSPCertStatusTag certStatus() { return mCertStatus; } function in class:OCSPSingleResponse
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ocspd/common/ |
H A D | ocspResponse.cpp | 221 if((resp->certStatus.Data == NULL) || (resp->certStatus.Length == 0)) { 222 ocspdErrorLog("OCSPSingleResponse: bad certStatus\n"); 225 mCertStatus = (SecAsn1OCSPCertStatusTag)(resp->certStatus.Data[0] & SEC_ASN1_TAGNUM_MASK); 228 SecAsn1OCSPCertStatus certStatus; local 229 memset(&certStatus, 0, sizeof(certStatus)); 230 if(SecAsn1DecodeData(mCoder, &resp->certStatus, 231 kSecAsn1OCSPCertStatusRevokedTemplate, &certStatus)) { 232 ocspdErrorLog("OCSPSingleResponse: err decoding certStatus\ [all...] |
H A D | ocspResponse.h | 110 SecAsn1OCSPCertStatusTag certStatus() { return mCertStatus; } function in class:OCSPSingleResponse
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/ |
H A D | tpOcspVerify.cpp | 309 SecAsn1OCSPCertStatusTag certStatus = singleResp.certStatus(); local 311 if ((certStatus == CS_Revoked) && 315 certStatus = CS_Good; 318 switch(certStatus) { 349 tpOcspDebug("tpApplySingleResp: BAD certStatus (%d) for cert %u", 350 (int)certStatus, dex);
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/ |
H A D | script.cpp | 624 vfyArgs.certStatus = (const char **)realloc(vfyArgs.certStatus, 626 vfyArgs.certStatus[vfyArgs.numCertStatus - 1] = value; 802 if(vfyArgs.certStatus != NULL) { 804 free((void *)vfyArgs.certStatus[i]); // mallocd by parseLine 806 free((void *)vfyArgs.certStatus); // reallocd by us
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_asn1/ |
H A D | ocspTemplates.h | 149 * The result goes into SecAsn1OCSPSingleResponse.certStatus on encode. 158 * certStatus CertStatus, 165 SecAsn1Item certStatus; // ASN_ANY here member in struct:__anon3616
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_asn1/Security/ |
H A D | ocspTemplates.h | 149 * The result goes into SecAsn1OCSPSingleResponse.certStatus on encode. 158 * certStatus CertStatus, 165 SecAsn1Item certStatus; // ASN_ANY here member in struct:__anon4051
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_asn1/lib/ |
H A D | ocspTemplates.h | 149 * The result goes into SecAsn1OCSPSingleResponse.certStatus on encode. 158 * certStatus CertStatus, 165 SecAsn1Item certStatus; // ASN_ANY here member in struct:__anon4173
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_asn1/security_asn1/ |
H A D | ocspTemplates.h | 149 * The result goes into SecAsn1OCSPSingleResponse.certStatus on encode. 158 * certStatus CertStatus, 165 SecAsn1Item certStatus; // ASN_ANY here member in struct:__anon4295
|
/macosx-10.10.1/OpenSSL098-52/src/demos/asn1/ |
H A D | ocsp.c | 134 certStatus CertStatus, 257 CertStatus *certStatus; member in struct:__anon3367 346 ASN1_SIMPLE(SingleResponse, certStatus, CertStatus),
|
/macosx-10.10.1/OpenSSL098-52/src/crypto/ocsp/ |
H A D | ocsp_asn.c | 142 ASN1_SIMPLE(OCSP_SINGLERESP, certStatus, OCSP_CERTSTATUS),
|
H A D | ocsp_cl.c | 267 cst = single->certStatus;
|
H A D | ocsp_prn.c | 237 cst = single->certStatus;
|
H A D | ocsp_srv.c | 154 cs = single->certStatus;
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/vfyCacCert/ |
H A D | vfyCacCert.cpp | 35 CSSM_TP_APPLE_CERT_STATUS certStatus, 39 if(certStatus & bit) { 34 statusBitTest( CSSM_TP_APPLE_CERT_STATUS certStatus, uint32 bit, const char *str) argument
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/anchorTest/ |
H A D | anchorTest.cpp | 903 const char *certStatus; local 911 certStatus = "0:0x314"; 919 certStatus = "0:0x1C"; 939 1, &certStatus, // per-cert status 958 certStatus = "0:0x315"; 962 certStatus = "0:0x1d";
|