Searched refs:cert (Results 1 - 25 of 460) sorted by relevance

1234567891011>>

/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/
H A Ddnssec.c62 cert_t *cert = NULL; local
118 /* create cert holder */
119 cert = oakley_newcert();
120 if (cert == NULL) {
122 "failed to get cert buffer.\n");
125 cert->pl = vmalloc(res->ci_certlen + 1);
126 if (cert->pl == NULL) {
128 "failed to get cert buffer.\n");
131 memcpy(cert->pl->v + 1, res->ci_cert, res->ci_certlen);
132 cert
[all...]
/macosx-10.9.5/ruby-104/ruby/sample/openssl/
H A Decho_svr.rb15 cert = OpenSSL::X509::Certificate.new(File::read(cert_file))
20 cert = OpenSSL::X509::Certificate.new
21 cert.version = 2
22 cert.serial = 0
24 cert.subject = name
25 cert.issuer = name
26 cert.not_before = Time.now
27 cert.not_after = Time.now + 3600
28 cert.public_key = key.public_key
29 ef = OpenSSL::X509::ExtensionFactory.new(nil,cert)
[all...]
H A Dcertstore.rb34 def verify(cert)
35 error, crl_map = do_verify(cert)
37 [[false, cert, crl_map[cert.subject], error]]
47 def is_ca?(cert)
48 case guess_cert_type(cert)
73 def do_verify(cert)
76 result = @x509store.verify(cert) do |ok, ctx|
77 cert = ctx.current_cert
79 crl_map[cert
[all...]
H A Dcrlstore.rb15 def find_crl(cert)
16 do_find_crl(cert)
21 def do_find_crl(cert)
22 unless ca = find_ca(cert)
26 if crl = renew_crl(cert, ca)
35 if new_crl = renew_crl(cert, ca)
48 def find_ca(cert)
49 @c_store.get_certs(cert.issuer).each do |cafile|
51 if cert.verify(ca.public_key)
95 def get_cdp(cert)
[all...]
/macosx-10.9.5/CPANInternal-140/Crypt-SSLeay/lib/Crypt/SSLeay/
H A DX509.pm6 my $cert = shift;
7 not_string2time($cert->get_notBeforeString);
11 my $cert = shift;
12 not_string2time($cert->get_notAfterString);
/macosx-10.9.5/CPANInternal-140/Crypt-SSLeay-0.64/lib/Crypt/SSLeay/
H A DX509.pm6 my $cert = shift;
7 not_string2time($cert->get_notBeforeString);
11 my $cert = shift;
12 not_string2time($cert->get_notAfterString);
/macosx-10.9.5/ruby-104/ruby/test/openssl/
H A Dtest_x509cert.rb25 cert = issue_cert(@ca, @rsa2048, s, Time.now, Time.now+3600, [],
27 assert_equal(s, cert.serial)
28 cert = OpenSSL::X509::Certificate.new(cert.to_der)
29 assert_equal(s, cert.serial)
46 cert = issue_cert(@ca, pk, 1, Time.now, Time.now+3600, exts,
48 assert_equal(cert.extensions[1].value,
49 OpenSSL::TestUtils.get_subject_key_id(cert))
50 cert = OpenSSL::X509::Certificate.new(cert
[all...]
/macosx-10.9.5/cups-372.4/cups/scheduler/
H A Dcert.c2 * "$Id: cert.c 11093 2013-07-03 20:48:42Z msweet $"
48 cupsd_cert_t *cert; /* Current certificate */ local
62 if ((cert = calloc(sizeof(cupsd_cert_t), 1)) == NULL)
69 cert->pid = pid;
70 cert->type = type;
71 strlcpy(cert->username, username, sizeof(cert->username));
74 cert->certificate[i] = hex[CUPS_RAND() & 15];
89 free(cert);
257 DEBUG_printf(("ADD pid=%d, username=%s, cert
279 cupsd_cert_t *cert, /* Current certificate */ local
324 cupsd_cert_t *cert, /* Current certificate */ local
363 cupsd_cert_t *cert; /* Current certificate */ local
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/regressions/
H A Dgencerts.sh4 openssl req -x509 -newkey rsa:1024 -sha1 -days 3650 -subj "$SUBJECT" -nodes -keyout privkey-1.pem -out cert-1.pem
5 openssl x509 -in cert-1.pem -out cert-1.der -outform DER
7 openssl pkcs12 -export -passout pass:password -out identity-1.p12 -inkey privkey-1.pem -in cert-1.pem
10 xxd -i cert-1.der cert-1.h
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/
H A DsslSession.c66 SSLCertificate *cert; local
79 cert = ctx->peerCert;
81 while (cert)
83 sessionIDLen += 4 + cert->derCert.length;
84 cert = cert->next;
90 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(certChain, ix); local
92 sslDebugLog("SSLAddSessionData: got cert %d of %d\n", (int)ix+1, (int)certCount);
93 if (!cert || CFGetTypeID(cert) !
247 SSLCertificate *cert; local
250 SecCertificateRef cert; local
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/
H A DsslSession.c66 SSLCertificate *cert; local
79 cert = ctx->peerCert;
81 while (cert)
83 sessionIDLen += 4 + cert->derCert.length;
84 cert = cert->next;
90 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(certChain, ix); local
92 sslDebugLog("SSLAddSessionData: got cert %d of %d\n", (int)ix+1, (int)certCount);
93 if (!cert || CFGetTypeID(cert) !
247 SSLCertificate *cert; local
250 SecCertificateRef cert; local
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/
H A DsslSession.c66 SSLCertificate *cert; local
79 cert = ctx->peerCert;
81 while (cert)
83 sessionIDLen += 4 + cert->derCert.length;
84 cert = cert->next;
90 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(certChain, ix); local
92 sslDebugLog("SSLAddSessionData: got cert %d of %d\n", (int)ix+1, (int)certCount);
93 if (!cert || CFGetTypeID(cert) !
247 SSLCertificate *cert; local
250 SecCertificateRef cert; local
[all...]
/macosx-10.9.5/Heimdal-323.92.1/lib/hx509/
H A Dtest_ca.in62 --certificate="FILE:cert-ee.pem" || exit 1
66 cert:FILE:cert-ee.pem \
69 echo "issue crl (no cert)"
76 cert:FILE:cert-ee.pem \
80 echo "issue crl (with cert)"
84 FILE:cert-ee.pem || exit 1
88 cert:FILE:cert
[all...]
H A Dtest_cert.in61 FILE:${srcdir}/data/test.crt PEM-FILE:cert-pem.tmp || exit 1
63 ${hxtool} certificate-copy PEM-FILE:cert-pem.tmp DER-FILE:cert-der.tmp || exit 1
64 ${hxtool} certificate-copy DER-FILE:cert-der.tmp PEM-FILE:cert-pem2.tmp || exit 1
66 cmp cert-pem.tmp cert-pem2.tmp || exit 1
68 echo "verify n0ll cert (fail)"
71 cert:FILE:$srcdir/data/n0ll.pem \
74 echo "verify n0ll cert (fai
[all...]
/macosx-10.9.5/Security-55471.14.18/include/security_smime/
H A DSecCmsRecipientInfo.h53 SecCmsRecipientInfoCreate(SecCmsMessageRef cmsg, SecCertificateRef cert);
68 SecCertificateRef cert);
H A Dcert.h2 * cert.h
41 void CERT_DestroyCertificate(SecCertificateRef cert);
42 SecCertificateRef CERT_DupCertificate(SecCertificateRef cert);
44 // from security/nss/lib/certdb/cert.h
57 CFArrayRef CERT_CertChainFromCert(SecCertificateRef cert, SECCertUsage usage,Boolean includeRoot);
59 CFArrayRef CERT_CertListFromCert(SecCertificateRef cert);
64 SecPublicKeyRef CERT_ExtractPublicKey(SecCertificateRef cert);
66 SECStatus CERT_CheckCertUsage (SecCertificateRef cert,unsigned char usage);
77 // Return the cert if found. "issuerAndSN" is the issuer and serial number to look for
88 // find the smime symmetric capabilities profile for a given cert
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_x509_tp/lib/
H A DtpCrlVerify.cpp65 * I.e. when cert verification is complete the cache will be empty.
77 TPCertInfo &cert,
98 TPCertInfo &cert,
102 TPCrlInfo *crl = findCrlForCert(cert);
145 * Find CRL for specified cert. Only returns a fully verified CRL.
147 * to cert's return codes.
164 /* Search inputCrls for a CRL for subject cert */
257 * Does this cert have a CrlDistributionPoints extension? We don't parse it, we
261 TPCertInfo &cert)
264 CSSM_RETURN crtn = cert
97 search( TPCertInfo &cert, TPVerifyContext &vfyCtx) argument
260 tpCertHasCrlDistPt( TPCertInfo &cert) argument
341 TPCertInfo *cert = certGroup.certAtIndex(certDex); local
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_smime/lib/
H A DSecCmsRecipientInfo.h53 SecCmsRecipientInfoCreate(SecCmsMessageRef cmsg, SecCertificateRef cert);
68 SecCertificateRef cert);
H A Dcert.h2 * cert.h
41 void CERT_DestroyCertificate(SecCertificateRef cert);
42 SecCertificateRef CERT_DupCertificate(SecCertificateRef cert);
44 // from security/nss/lib/certdb/cert.h
57 CFArrayRef CERT_CertChainFromCert(SecCertificateRef cert, SECCertUsage usage,Boolean includeRoot);
59 CFArrayRef CERT_CertListFromCert(SecCertificateRef cert);
64 SecPublicKeyRef CERT_ExtractPublicKey(SecCertificateRef cert);
66 SECStatus CERT_CheckCertUsage (SecCertificateRef cert,unsigned char usage);
77 // Return the cert if found. "issuerAndSN" is the issuer and serial number to look for
88 // find the smime symmetric capabilities profile for a given cert
[all...]
/macosx-10.9.5/ruby-104/ruby/lib/drb/
H A Dssl.rb128 @cert = config[:SSLCertificate]
160 if @cert && @pkey
178 cert = OpenSSL::X509::Certificate.new
179 cert.version = 3
180 cert.serial = 0
182 cert.subject = name
183 cert.issuer = name
184 cert.not_before = Time.now
185 cert.not_after = Time.now + (365*24*60*60)
186 cert
[all...]
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/rdata/generic/
H A Dcert_37.c33 dns_cert_t cert; local
48 RETTOK(dns_cert_fromtext(&cert, &token.value.as_textregion));
49 RETERR(uint16_tobuffer(cert, target));
169 dns_rdata_cert_t *cert = source; local
173 REQUIRE(cert->common.rdtype == type);
174 REQUIRE(cert->common.rdclass == rdclass);
179 RETERR(uint16_tobuffer(cert->type, target));
180 RETERR(uint16_tobuffer(cert->key_tag, target));
181 RETERR(uint8_tobuffer(cert->algorithm, target));
183 return (mem_tobuffer(target, cert
188 dns_rdata_cert_t *cert = target; local
219 dns_rdata_cert_t *cert = source; local
[all...]
/macosx-10.9.5/ruby-104/ruby/test/rubygems/
H A Dtest_gem_security.rb23 cert = @SEC.create_cert name, key, 60, Gem::Security::EXTENSIONS, 5
25 assert_kind_of OpenSSL::X509::Certificate, cert
27 assert_equal 2, cert.version
28 assert_equal 5, cert.serial
29 assert_equal key.public_key.to_pem, cert.public_key.to_pem
30 assert_in_delta Time.now, cert.not_before, 10
31 assert_in_delta Time.now + 60, cert.not_after, 10
32 assert_equal name.to_s, cert.subject.to_s
34 assert_equal 3, cert.extensions.length,
35 cert
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_x509_cl/lib/
H A DCertFields.cpp47 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local
48 const CSSM_DATA &vers = cert.mCert.tbs.version;
62 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local
63 CSSM_DATA &vers = cert.mCert.tbs.version;
65 cert.coder().allocCopyItem(fieldValue, vers);
80 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local
81 tbsGetCheck(cert.certificateToSign->version, index);
87 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local
88 tbsSetCheck(cert.certificateToSign->version, fieldValue, sizeof(uint32),
108 const DecodedCert &cert local
122 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local
144 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local
162 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local
183 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local
201 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local
222 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local
236 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local
253 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local
268 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local
285 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local
299 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local
313 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local
335 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local
344 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local
358 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local
367 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local
388 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local
406 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local
419 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local
437 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local
454 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local
478 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local
520 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local
535 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local
567 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local
[all...]
/macosx-10.9.5/Security-55471.14.18/include/security_codesigning/
H A Dcsutilities.cpp50 bool isAppleCA(SecCertificateRef cert) argument
52 return verifyHash(cert, gAppleAnchorHash);
75 void hashOfCertificate(SecCertificateRef cert, SHA1::Digest digest) argument
77 assert(cert);
79 MacOSError::check(SecCertificateGetData(cert, &certData));
87 bool verifyHash(SecCertificateRef cert, const Hashing::Byte *digest) argument
90 hashOfCertificate(cert, dig);
99 bool certificateHasField(SecCertificateRef cert, const CSSM_OID &oid) argument
101 assert(cert);
103 switch (OSStatus rc = SecCertificateCopyFirstFieldValue(cert,
135 certificateHasPolicy(SecCertificateRef cert, const CSSM_OID &policyOid) argument
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_codesigning/lib/
H A Dcsutilities.cpp50 bool isAppleCA(SecCertificateRef cert) argument
52 return verifyHash(cert, gAppleAnchorHash);
75 void hashOfCertificate(SecCertificateRef cert, SHA1::Digest digest) argument
77 assert(cert);
79 MacOSError::check(SecCertificateGetData(cert, &certData));
87 bool verifyHash(SecCertificateRef cert, const Hashing::Byte *digest) argument
90 hashOfCertificate(cert, dig);
99 bool certificateHasField(SecCertificateRef cert, const CSSM_OID &oid) argument
101 assert(cert);
103 switch (OSStatus rc = SecCertificateCopyFirstFieldValue(cert,
135 certificateHasPolicy(SecCertificateRef cert, const CSSM_OID &policyOid) argument
[all...]

Completed in 427 milliseconds

1234567891011>>