Searched refs:certStatus (Results 1 - 25 of 36) sorted by relevance

12

/macosx-10.10.1/ipsec-286.1.1/ipsec-tools/racoon/
H A Dcrypto_cssm.h41 extern vchar_t* crypto_cssm_get_x509cert(CFDataRef persistentCertRef, cert_status_t *certStatus);
H A Doakley.c155 static int oakley_check_certid_1 (vchar_t *, int, int, void*, cert_status_t *certStatus);
1609 oakley_find_status_in_certchain (cert_t *certchain, cert_status_t certStatus) argument
1614 if (p->status == certStatus) {
1878 oakley_check_certid_1(vchar_t *cert, int idtype, int idlen, void *id, cert_status_t *certStatus) argument
1900 if (certStatus && !*certStatus) {
1901 *certStatus = CERT_STATUS_INVALID;
1908 if (certStatus && !*certStatus) {
1909 *certStatus
[all...]
H A Dcrypto_cssm.c129 cert_status_t certStatus = CERT_STATUS_OK; local
185 certStatus = CERT_STATUS_PREMATURE;
189 certStatus = CERT_STATUS_EXPIRED;
192 certStatus = CERT_STATUS_OK;
206 return certStatus;
215 cert_status_t certStatus = 0; local
247 certStatus = hostcert->status;
261 if (!certStatus) {
262 certStatus = p->status;
286 } else if (certStatus
370 crypto_cssm_get_x509cert(CFDataRef persistentCertRef, cert_status_t *certStatus) argument
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/
H A DSecOCSPResponse.c99 certStatus CertStatus,
132 this->certStatus = CS_NotParsed;
139 if ((resp->certStatus.Data == NULL) || (resp->certStatus.Length == 0)) {
140 ocspdErrorLog("OCSPSingleResponse: bad certStatus");
143 this->certStatus = (SecAsn1OCSPCertStatusTag)(resp->certStatus.Data[0] & SEC_ASN1_TAGNUM_MASK);
144 if (this->certStatus == CS_Revoked) {
146 SecAsn1OCSPCertStatus certStatus; local
147 memset(&certStatus,
[all...]
H A DSecOCSPResponse.h97 SecAsn1OCSPCertStatusTag certStatus; member in struct:__SecOCSPSingleResponse
100 CFAbsoluteTime revokedTime; /* != NULL_TIME for certStatus == CS_Revoked */
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/clAppUtils/
H A DcertVerify.h103 const char **certStatus; member in struct:__anon5220
138 const char **certStatus,
H A DcertVerify.cpp105 const char **certStatus, // e.g., "1:0x18", leading 0x optional
128 const char *str = certStatus[dex];
559 if(vfyArgs->certStatus) {
560 if(vfyCertStatus(&vfyResult, vfyArgs->numCertStatus, vfyArgs->certStatus,
660 const char **certStatus,
687 vfyArgs.certStatus = certStatus;
102 vfyCertStatus( const CSSM_TP_VERIFY_CONTEXT_RESULT *vfyResult, unsigned numCertStatus, const char **certStatus, CSSM_BOOL quiet) argument
629 certVerifySimple( CSSM_TP_HANDLE tpHand, CSSM_CL_HANDLE clHand, CSSM_CSP_HANDLE cspHand, BlobList &certs, BlobList &roots, CSSM_BOOL useSystemAnchors, CSSM_BOOL leafCertIsCA, CSSM_BOOL allowExpiredRoot, CertVerifyPolicy vfyPolicy, const char *sslHost, CSSM_BOOL sslClient, const char *senderEmail, CE_KeyUsage intendedKeyUse, const char *expectedErrStr, unsigned numCertErrors, const char **certErrors, unsigned numCertStatus, const char **certStatus, CSSM_BOOL useTrustSettings, CSSM_BOOL quiet, CSSM_BOOL verbose) argument
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/ocspTool/
H A DocspTool.cpp228 SecAsn1OCSPCertStatus certStatus; local
229 memset(&certStatus, 0, sizeof(certStatus));
237 certStatus.revokedInfo = &revokedInfo;
245 ortn = SecAsn1EncodeItem(coder, &certStatus,
247 &singleResp.certStatus);
250 ortn = SecAsn1EncodeItem(coder, &certStatus,
252 &singleResp.certStatus);
255 printf("***Error encoding certStatus\n");
803 printf("certStatus
820 SecAsn1OCSPCertStatus certStatus; local
1096 SecAsn1OCSPCertStatusTag certStatus = CS_Good; local
[all...]
/macosx-10.10.1/Security-57031.1.35/Security/include/security_ocspd/
H A DocspResponse.cpp221 if((resp->certStatus.Data == NULL) || (resp->certStatus.Length == 0)) {
222 ocspdErrorLog("OCSPSingleResponse: bad certStatus\n");
225 mCertStatus = (SecAsn1OCSPCertStatusTag)(resp->certStatus.Data[0] & SEC_ASN1_TAGNUM_MASK);
228 SecAsn1OCSPCertStatus certStatus; local
229 memset(&certStatus, 0, sizeof(certStatus));
230 if(SecAsn1DecodeData(mCoder, &resp->certStatus,
231 kSecAsn1OCSPCertStatusRevokedTemplate, &certStatus)) {
232 ocspdErrorLog("OCSPSingleResponse: err decoding certStatus\
[all...]
H A DocspResponse.h110 SecAsn1OCSPCertStatusTag certStatus() { return mCertStatus; } function in class:OCSPSingleResponse
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ocspd/common/
H A DocspResponse.cpp221 if((resp->certStatus.Data == NULL) || (resp->certStatus.Length == 0)) {
222 ocspdErrorLog("OCSPSingleResponse: bad certStatus\n");
225 mCertStatus = (SecAsn1OCSPCertStatusTag)(resp->certStatus.Data[0] & SEC_ASN1_TAGNUM_MASK);
228 SecAsn1OCSPCertStatus certStatus; local
229 memset(&certStatus, 0, sizeof(certStatus));
230 if(SecAsn1DecodeData(mCoder, &resp->certStatus,
231 kSecAsn1OCSPCertStatusRevokedTemplate, &certStatus)) {
232 ocspdErrorLog("OCSPSingleResponse: err decoding certStatus\
[all...]
H A DocspResponse.h110 SecAsn1OCSPCertStatusTag certStatus() { return mCertStatus; } function in class:OCSPSingleResponse
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_x509_tp/lib/
H A DtpOcspVerify.cpp309 SecAsn1OCSPCertStatusTag certStatus = singleResp.certStatus(); local
311 if ((certStatus == CS_Revoked) &&
315 certStatus = CS_Good;
318 switch(certStatus) {
349 tpOcspDebug("tpApplySingleResp: BAD certStatus (%d) for cert %u",
350 (int)certStatus, dex);
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/certcrl/
H A Dscript.cpp624 vfyArgs.certStatus = (const char **)realloc(vfyArgs.certStatus,
626 vfyArgs.certStatus[vfyArgs.numCertStatus - 1] = value;
802 if(vfyArgs.certStatus != NULL) {
804 free((void *)vfyArgs.certStatus[i]); // mallocd by parseLine
806 free((void *)vfyArgs.certStatus); // reallocd by us
/macosx-10.10.1/Security-57031.1.35/Security/include/security_asn1/
H A DocspTemplates.h149 * The result goes into SecAsn1OCSPSingleResponse.certStatus on encode.
158 * certStatus CertStatus,
165 SecAsn1Item certStatus; // ASN_ANY here member in struct:__anon3616
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_asn1/Security/
H A DocspTemplates.h149 * The result goes into SecAsn1OCSPSingleResponse.certStatus on encode.
158 * certStatus CertStatus,
165 SecAsn1Item certStatus; // ASN_ANY here member in struct:__anon4051
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_asn1/lib/
H A DocspTemplates.h149 * The result goes into SecAsn1OCSPSingleResponse.certStatus on encode.
158 * certStatus CertStatus,
165 SecAsn1Item certStatus; // ASN_ANY here member in struct:__anon4173
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_asn1/security_asn1/
H A DocspTemplates.h149 * The result goes into SecAsn1OCSPSingleResponse.certStatus on encode.
158 * certStatus CertStatus,
165 SecAsn1Item certStatus; // ASN_ANY here member in struct:__anon4295
/macosx-10.10.1/OpenSSL098-52/src/demos/asn1/
H A Docsp.c134 certStatus CertStatus,
257 CertStatus *certStatus; member in struct:__anon3367
346 ASN1_SIMPLE(SingleResponse, certStatus, CertStatus),
/macosx-10.10.1/OpenSSL098-52/src/crypto/ocsp/
H A Docsp_asn.c142 ASN1_SIMPLE(OCSP_SINGLERESP, certStatus, OCSP_CERTSTATUS),
H A Docsp_cl.c267 cst = single->certStatus;
H A Docsp_prn.c237 cst = single->certStatus;
H A Docsp_srv.c154 cs = single->certStatus;
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/vfyCacCert/
H A DvfyCacCert.cpp35 CSSM_TP_APPLE_CERT_STATUS certStatus,
39 if(certStatus & bit) {
34 statusBitTest( CSSM_TP_APPLE_CERT_STATUS certStatus, uint32 bit, const char *str) argument
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/anchorTest/
H A DanchorTest.cpp903 const char *certStatus; local
911 certStatus = "0:0x314";
919 certStatus = "0:0x1C";
939 1, &certStatus, // per-cert status
958 certStatus = "0:0x315";
962 certStatus = "0:0x1d";

Completed in 298 milliseconds

12