/macosx-10.9.5/Security-55471.14.18/sec/securityd/ |
H A D | SecOCSPRequest.h | 46 SecCertificateRef issuer; // Nonretained member in struct:__SecOCSPRequest 54 @param issuer The parent of certificate. 58 SecCertificateRef issuer);
|
H A D | SecCAIssuerRequest.c | 68 CFURLRef issuer = CFArrayGetValueAtIndex(request->issuers, local 70 CFStringRef scheme = CFURLCopyScheme(issuer); 74 CFSTR("GET"), issuer, kCFHTTPVersion1_1); 84 secdebug("caissuer", "failed to get %@", issuer); 86 secdebug("caissuer", "skipping unsupported uri %@", issuer); 100 parent if the normalized subject of parent matches the normalized issuer 132 CFURLRef issuer = CFArrayGetValueAtIndex(request->issuers, local 134 SecCAIssuerCacheAddCertificate(parent, issuer, expires); 156 CFURLRef issuer = CFArrayGetValueAtIndex(issuers, ix); local 157 CFStringRef scheme = CFURLCopyScheme(issuer); [all...] |
H A D | SecOCSPRequest.c | 70 /* fields obtained from issuer */ 85 /* algId refers to the hash we'll perform in issuer name and key */ 98 issuerPubKeyDigest = SecCertificateCopyPublicKeySHA1Digest(this->issuer); 132 SecCertificateRef issuer) { 137 this->issuer = issuer; 131 SecOCSPRequestCreate(SecCertificateRef certificate, SecCertificateRef issuer) argument
|
H A D | SecOCSPResponse.c | 56 internalError (2), --Internal error in issuer 444 CFDataRef issuer = SecCertificateCopyIssuerSequence(request->certificate); local 445 const DERItem *publicKey = SecCertificateGetPublicKeyData(request->issuer); 479 parameters, CFDataGetBytePtr(issuer), CFDataGetLength(issuer)); 528 CFReleaseSafe(issuer); 548 SecCertificatePathRef issuer) { 550 SecCertificateRef signer = SecCertificatePathGetCertificateAtIndex(issuer, 0); 582 SecKeyRef key = SecCertificatePathCopyPublicKeyAtIndex(issuer, 0); 599 SecCertificatePathRef issuer) { 547 SecOCSPResponseIsIssuer(SecOCSPResponseRef this, SecCertificatePathRef issuer) argument 598 SecOCSPResponseCopySigner(SecOCSPResponseRef this, SecCertificatePathRef issuer) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_x509_tp/lib/ |
H A D | TPNetwork.h | 47 * Fetch issuer cert of specified cert if the cert has an issuerAltName 48 * with a URI. If non-NULL cert is returned, it has passed subject/issuer 60 TPCertInfo *&issuer); // RETURNED
|
H A D | tpOcspCertVfy.h | 44 * verify if we don't know the issuer; sometimes we can. 55 TPCertInfo *issuer, // issuer of the related cert, may be issuer of
|
H A D | TPNetwork.cpp | 70 const CSSM_DATA *issuer, // optional 77 return ocspdCRLFetch(alloc, url, issuer, 93 const CSSM_DATA *issuer, // optional, only if cert and CRL have same issuer 112 crtn = tpFetchViaNet(url, issuer, LT_Crl, cssmTime, alloc, crlData); 133 crtn = tpFetchViaNet(url, issuer, LT_Crl, cssmTime, alloc, crlData); 185 TPCertInfo *issuer = NULL; local 196 issuer = new TPCertInfo(clHand, 210 /* subject/issuer match? */ 211 if(!issuer 68 tpFetchViaNet( const CSSM_DATA &url, const CSSM_DATA *issuer, LF_Type lfType, CSSM_TIMESTRING verifyTime, Allocator &alloc, CSSM_DATA &rtnBlob) argument 91 tpCrlViaNet( const CSSM_DATA &url, const CSSM_DATA *issuer, TPVerifyContext &vfyCtx, TPCertInfo &forCert, TPCrlInfo *&rtnCrl) argument 238 tpFetchViaGeneralNames( const CE_GeneralNames *names, TPCertInfo &forCert, const CSSM_DATA *issuer, TPVerifyContext *verifyContext, CSSM_CL_HANDLE clHand, CSSM_CSP_HANDLE cspHand, const char *verifyTime, TPCertInfo **certInfo, TPCrlInfo **crlInfo) argument 421 tpFetchIssuerFromNet( TPCertInfo &subject, CSSM_CL_HANDLE clHand, CSSM_CSP_HANDLE cspHand, const char *verifyTime, TPCertInfo *&issuer) argument [all...] |
H A D | tpOcspCertVfy.cpp | 42 TPCertInfo &issuerCert, // issuer of cert being verified 53 * subject/issuer check). 62 tpOcspDebug("tpIsAuthorizedOcspSigner: signer is issued by issuer, no EKU"); 80 tpOcspDebug("tpIsAuthorizedOcspSigner: signer is issued by issuer, no OCSP " 87 * it claims to be issued by issuer. Sig verify to be sure. 109 * be the issuer of both that response and the cert being verified. Returns 214 OIS_No, // not the issuer 215 OIS_Good, // is the issuer and signature matches 216 OIS_BadSig, // appears to be issuer, but signature doesn't match 222 OCT_Issuer, // it's the issuer o 234 tpIsOcspIssuer( TPVerifyContext &vfyCtx, OCSPResponse &ocspResp, const CSSM_DATA *signerData, TPCertInfo *signer, OcspCertType certType, TPCertInfo *issuer, TPCertInfo **signerRtn) argument 317 tpVerifyOcspResp( TPVerifyContext &vfyCtx, SecNssCoder &coder, TPCertInfo *issuer, OCSPResponse &ocspResp, CSSM_RETURN &cssmErr) argument [all...] |
H A D | TPDatabase.h | 46 * Search a list of DBs for a CRL from the specified issuer and (optional) 56 const CSSM_DATA &issuer,
|
H A D | ocspRequest.h | 42 * The only constructor. Subject and issuer must remain valid for the 47 TPCertInfo &issuer,
|
H A D | tpOcspVerify.cpp | 46 * Get a smart CertID for specified cert and issuer 50 TPCertInfo &issuer, 67 crtn = issuer.fetchField(&CSSMOID_CSSMKeyStruct, &issuerPubKeyData); 76 issuer.freeField(&CSSMOID_X509V1IssuerNameStd, issuerSubject); 77 issuer.freeField(&CSSMOID_CSSMKeyStruct, issuerPubKeyData); 163 TPCertInfo &issuer, 204 ocspReq = new OCSPRequest(subject, issuer, genNonce); 219 crtn = tpOcspGetCertId(subject, issuer, certID); 367 TPCertInfo &issuer, 393 TPCertInfo &issuer, 48 tpOcspGetCertId( TPCertInfo &subject, TPCertInfo &issuer, OCSPClientCertID *&certID) argument 159 tpGenOcspdReq( TPVerifyContext &vfyCtx, SecNssCoder &coder, TPCertInfo &subject, TPCertInfo &issuer, OCSPClientCertID &certId, const CSSM_DATA **urls, CSSM_DATA &nonce) argument 363 tpOcspFlushAndReFetch( TPVerifyContext &vfyCtx, SecNssCoder &coder, TPCertInfo &subject, TPCertInfo &issuer, OCSPClientCertID &certID) argument 400 TPCertInfo &issuer; member in class:PendingRequest 503 TPCertInfo *issuer = certGroup.certAtIndex(dex + 1); local 698 TPCertInfo *issuer = NULL; local [all...] |
/macosx-10.9.5/security_ocspd-55118.2/server/ |
H A D | crlDb.h | 41 * Lookup cached CRL by URL or issuer, and verifyTime. 43 * Exactly one of {url, issuer} should be non-NULL. 48 const CSSM_DATA *issuer, // optional
|
/macosx-10.9.5/ruby-104/ruby/test/openssl/ |
H A D | test_pkcs7.rb | 54 assert_equal(@ee1_cert.issuer.to_s, signers[0].issuer.to_s) 73 assert_equal(@ee1_cert.issuer.to_s, signers[0].issuer.to_s) 93 assert_equal(@ee1_cert.issuer.to_s, signers[0].issuer.to_s) 95 assert_equal(@ee2_cert.issuer.to_s, signers[1].issuer.to_s) 121 assert_equal(@ee1_cert.issuer.to_s, signers[0].issuer [all...] |
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/security/ |
H A D | signer.rb | 68 # If the issuer does not exist it is ignored as it will be checked later. 73 while @cert_chain.first.issuer.to_s != @cert_chain.first.subject.to_s do 74 issuer = Gem::Security.trust_dir.issuer_of @cert_chain.first 76 break unless issuer # cert chain is verified later 78 @cert_chain.unshift issuer
|
/macosx-10.9.5/Security-55471.14.18/include/security_asn1/ |
H A D | X509Templates.h | 97 NSS_Name issuer; member in struct:__anon3498 152 NSS_Name issuer; member in struct:__anon3501
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_asn1/Security/ |
H A D | X509Templates.h | 97 NSS_Name issuer; member in struct:__anon3933 152 NSS_Name issuer; member in struct:__anon3936
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_asn1/lib/ |
H A D | X509Templates.h | 97 NSS_Name issuer; member in struct:__anon4055 152 NSS_Name issuer; member in struct:__anon4058
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_asn1/security_asn1/ |
H A D | X509Templates.h | 97 NSS_Name issuer; member in struct:__anon4177 152 NSS_Name issuer; member in struct:__anon4180
|
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | TrustItem.cpp | 165 // This is an ASN.1 sequence of issuer and serial number. 168 CSSM_DATA issuer; member in struct:Security::KeychainCore::IssuerAndSN 174 { SEC_ASN1_OCTET_STRING, offsetof(IssuerAndSN, issuer) }, 181 CertField issuer(cert, CSSMOID_X509V1IssuerName); 184 index.issuer = issuer.data();
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | TrustItem.cpp | 165 // This is an ASN.1 sequence of issuer and serial number. 168 CSSM_DATA issuer; member in struct:Security::KeychainCore::IssuerAndSN 174 { SEC_ASN1_OCTET_STRING, offsetof(IssuerAndSN, issuer) }, 181 CertField issuer(cert, CSSMOID_X509V1IssuerName); 184 index.issuer = issuer.data();
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | TrustItem.cpp | 165 // This is an ASN.1 sequence of issuer and serial number. 168 CSSM_DATA issuer; member in struct:Security::KeychainCore::IssuerAndSN 174 { SEC_ASN1_OCTET_STRING, offsetof(IssuerAndSN, issuer) }, 181 CertField issuer(cert, CSSMOID_X509V1IssuerName); 184 index.issuer = issuer.data();
|
/macosx-10.9.5/tcl-102/tcl_ext/tls/tls/ |
H A D | tlsX509.c | 100 char issuer[BUFSIZ]; 112 issuer[0] = 0; 125 n = BIO_read(bio, issuer, min(BIO_pending(bio), BUFSIZ - 1)); 127 issuer[n] = 0; 160 Tcl_NewStringObj( "issuer", -1) ); 162 Tcl_NewStringObj( issuer, -1) ); 99 char issuer[BUFSIZ]; local
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/ |
H A D | si-68-secmatchissuer.c | 131 CFDataRef issuer = SecCertificateGetNormalizedIssuerContent(intermediate_cert); local 132 ok(CFDataGetLength(issuer) < 128, "max 127 bytes of content - or else you'll need to properly encode issuer sequence"); 133 CFMutableDataRef canonical_issuer = CFDataCreateMutable(kCFAllocatorDefault, CFDataGetLength(issuer) + 2); 134 CFDataSetLength(canonical_issuer, CFDataGetLength(issuer) + 2); 136 memcpy(ptr+2, CFDataGetBytePtr(issuer), CFDataGetLength(issuer)); 138 ptr[1] = CFDataGetLength(issuer);
|
/macosx-10.9.5/ruby-104/ruby/test/rubygems/ |
H A D | test_gem_security.rb | 49 assert_equal '', cert.issuer.to_s 58 assert_equal '/CN=nobody/DC=example', cert.issuer.to_s 76 assert_equal name.to_s, cert.issuer.to_s 137 "#{ALTERNATE_CERT.issuer} to obtain a valid certificate", 160 issuer = PUBLIC_CERT.subject 174 assert_equal issuer.to_s, signed.issuer.to_s 202 issuer = PUBLIC_CERT.subject 211 assert_equal issuer.to_s, signed.issuer [all...] |
/macosx-10.9.5/emacs-92/emacs/lisp/gnus/ |
H A D | gnus-nocem.el | 60 issuer registry." 102 valid issuer, which is much faster if you are selective about the issuers." 232 issuer b e type) 251 ;; We get the name of the issuer. 253 (setq issuer (mail-fetch-field "issuer") 256 (if (not (gnus-nocem-message-wanted-p issuer type)) 257 (message "invalid NoCeM issuer: %s" issuer) 258 (and (gnus-nocem-verify-issuer issue [all...] |