Searched refs:issuer (Results 1 - 25 of 154) sorted by relevance

1234567

/macosx-10.9.5/Security-55471.14.18/sec/securityd/
H A DSecOCSPRequest.h46 SecCertificateRef issuer; // Nonretained member in struct:__SecOCSPRequest
54 @param issuer The parent of certificate.
58 SecCertificateRef issuer);
H A DSecCAIssuerRequest.c68 CFURLRef issuer = CFArrayGetValueAtIndex(request->issuers, local
70 CFStringRef scheme = CFURLCopyScheme(issuer);
74 CFSTR("GET"), issuer, kCFHTTPVersion1_1);
84 secdebug("caissuer", "failed to get %@", issuer);
86 secdebug("caissuer", "skipping unsupported uri %@", issuer);
100 parent if the normalized subject of parent matches the normalized issuer
132 CFURLRef issuer = CFArrayGetValueAtIndex(request->issuers, local
134 SecCAIssuerCacheAddCertificate(parent, issuer, expires);
156 CFURLRef issuer = CFArrayGetValueAtIndex(issuers, ix); local
157 CFStringRef scheme = CFURLCopyScheme(issuer);
[all...]
H A DSecOCSPRequest.c70 /* fields obtained from issuer */
85 /* algId refers to the hash we'll perform in issuer name and key */
98 issuerPubKeyDigest = SecCertificateCopyPublicKeySHA1Digest(this->issuer);
132 SecCertificateRef issuer) {
137 this->issuer = issuer;
131 SecOCSPRequestCreate(SecCertificateRef certificate, SecCertificateRef issuer) argument
H A DSecOCSPResponse.c56 internalError (2), --Internal error in issuer
444 CFDataRef issuer = SecCertificateCopyIssuerSequence(request->certificate); local
445 const DERItem *publicKey = SecCertificateGetPublicKeyData(request->issuer);
479 parameters, CFDataGetBytePtr(issuer), CFDataGetLength(issuer));
528 CFReleaseSafe(issuer);
548 SecCertificatePathRef issuer) {
550 SecCertificateRef signer = SecCertificatePathGetCertificateAtIndex(issuer, 0);
582 SecKeyRef key = SecCertificatePathCopyPublicKeyAtIndex(issuer, 0);
599 SecCertificatePathRef issuer) {
547 SecOCSPResponseIsIssuer(SecOCSPResponseRef this, SecCertificatePathRef issuer) argument
598 SecOCSPResponseCopySigner(SecOCSPResponseRef this, SecCertificatePathRef issuer) argument
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_x509_tp/lib/
H A DTPNetwork.h47 * Fetch issuer cert of specified cert if the cert has an issuerAltName
48 * with a URI. If non-NULL cert is returned, it has passed subject/issuer
60 TPCertInfo *&issuer); // RETURNED
H A DtpOcspCertVfy.h44 * verify if we don't know the issuer; sometimes we can.
55 TPCertInfo *issuer, // issuer of the related cert, may be issuer of
H A DTPNetwork.cpp70 const CSSM_DATA *issuer, // optional
77 return ocspdCRLFetch(alloc, url, issuer,
93 const CSSM_DATA *issuer, // optional, only if cert and CRL have same issuer
112 crtn = tpFetchViaNet(url, issuer, LT_Crl, cssmTime, alloc, crlData);
133 crtn = tpFetchViaNet(url, issuer, LT_Crl, cssmTime, alloc, crlData);
185 TPCertInfo *issuer = NULL; local
196 issuer = new TPCertInfo(clHand,
210 /* subject/issuer match? */
211 if(!issuer
68 tpFetchViaNet( const CSSM_DATA &url, const CSSM_DATA *issuer, LF_Type lfType, CSSM_TIMESTRING verifyTime, Allocator &alloc, CSSM_DATA &rtnBlob) argument
91 tpCrlViaNet( const CSSM_DATA &url, const CSSM_DATA *issuer, TPVerifyContext &vfyCtx, TPCertInfo &forCert, TPCrlInfo *&rtnCrl) argument
238 tpFetchViaGeneralNames( const CE_GeneralNames *names, TPCertInfo &forCert, const CSSM_DATA *issuer, TPVerifyContext *verifyContext, CSSM_CL_HANDLE clHand, CSSM_CSP_HANDLE cspHand, const char *verifyTime, TPCertInfo **certInfo, TPCrlInfo **crlInfo) argument
421 tpFetchIssuerFromNet( TPCertInfo &subject, CSSM_CL_HANDLE clHand, CSSM_CSP_HANDLE cspHand, const char *verifyTime, TPCertInfo *&issuer) argument
[all...]
H A DtpOcspCertVfy.cpp42 TPCertInfo &issuerCert, // issuer of cert being verified
53 * subject/issuer check).
62 tpOcspDebug("tpIsAuthorizedOcspSigner: signer is issued by issuer, no EKU");
80 tpOcspDebug("tpIsAuthorizedOcspSigner: signer is issued by issuer, no OCSP "
87 * it claims to be issued by issuer. Sig verify to be sure.
109 * be the issuer of both that response and the cert being verified. Returns
214 OIS_No, // not the issuer
215 OIS_Good, // is the issuer and signature matches
216 OIS_BadSig, // appears to be issuer, but signature doesn't match
222 OCT_Issuer, // it's the issuer o
234 tpIsOcspIssuer( TPVerifyContext &vfyCtx, OCSPResponse &ocspResp, const CSSM_DATA *signerData, TPCertInfo *signer, OcspCertType certType, TPCertInfo *issuer, TPCertInfo **signerRtn) argument
317 tpVerifyOcspResp( TPVerifyContext &vfyCtx, SecNssCoder &coder, TPCertInfo *issuer, OCSPResponse &ocspResp, CSSM_RETURN &cssmErr) argument
[all...]
H A DTPDatabase.h46 * Search a list of DBs for a CRL from the specified issuer and (optional)
56 const CSSM_DATA &issuer,
H A DocspRequest.h42 * The only constructor. Subject and issuer must remain valid for the
47 TPCertInfo &issuer,
H A DtpOcspVerify.cpp46 * Get a smart CertID for specified cert and issuer
50 TPCertInfo &issuer,
67 crtn = issuer.fetchField(&CSSMOID_CSSMKeyStruct, &issuerPubKeyData);
76 issuer.freeField(&CSSMOID_X509V1IssuerNameStd, issuerSubject);
77 issuer.freeField(&CSSMOID_CSSMKeyStruct, issuerPubKeyData);
163 TPCertInfo &issuer,
204 ocspReq = new OCSPRequest(subject, issuer, genNonce);
219 crtn = tpOcspGetCertId(subject, issuer, certID);
367 TPCertInfo &issuer,
393 TPCertInfo &issuer,
48 tpOcspGetCertId( TPCertInfo &subject, TPCertInfo &issuer, OCSPClientCertID *&certID) argument
159 tpGenOcspdReq( TPVerifyContext &vfyCtx, SecNssCoder &coder, TPCertInfo &subject, TPCertInfo &issuer, OCSPClientCertID &certId, const CSSM_DATA **urls, CSSM_DATA &nonce) argument
363 tpOcspFlushAndReFetch( TPVerifyContext &vfyCtx, SecNssCoder &coder, TPCertInfo &subject, TPCertInfo &issuer, OCSPClientCertID &certID) argument
400 TPCertInfo &issuer; member in class:PendingRequest
503 TPCertInfo *issuer = certGroup.certAtIndex(dex + 1); local
698 TPCertInfo *issuer = NULL; local
[all...]
/macosx-10.9.5/security_ocspd-55118.2/server/
H A DcrlDb.h41 * Lookup cached CRL by URL or issuer, and verifyTime.
43 * Exactly one of {url, issuer} should be non-NULL.
48 const CSSM_DATA *issuer, // optional
/macosx-10.9.5/ruby-104/ruby/test/openssl/
H A Dtest_pkcs7.rb54 assert_equal(@ee1_cert.issuer.to_s, signers[0].issuer.to_s)
73 assert_equal(@ee1_cert.issuer.to_s, signers[0].issuer.to_s)
93 assert_equal(@ee1_cert.issuer.to_s, signers[0].issuer.to_s)
95 assert_equal(@ee2_cert.issuer.to_s, signers[1].issuer.to_s)
121 assert_equal(@ee1_cert.issuer.to_s, signers[0].issuer
[all...]
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/security/
H A Dsigner.rb68 # If the issuer does not exist it is ignored as it will be checked later.
73 while @cert_chain.first.issuer.to_s != @cert_chain.first.subject.to_s do
74 issuer = Gem::Security.trust_dir.issuer_of @cert_chain.first
76 break unless issuer # cert chain is verified later
78 @cert_chain.unshift issuer
/macosx-10.9.5/Security-55471.14.18/include/security_asn1/
H A DX509Templates.h97 NSS_Name issuer; member in struct:__anon3498
152 NSS_Name issuer; member in struct:__anon3501
/macosx-10.9.5/Security-55471.14.18/libsecurity_asn1/Security/
H A DX509Templates.h97 NSS_Name issuer; member in struct:__anon3933
152 NSS_Name issuer; member in struct:__anon3936
/macosx-10.9.5/Security-55471.14.18/libsecurity_asn1/lib/
H A DX509Templates.h97 NSS_Name issuer; member in struct:__anon4055
152 NSS_Name issuer; member in struct:__anon4058
/macosx-10.9.5/Security-55471.14.18/libsecurity_asn1/security_asn1/
H A DX509Templates.h97 NSS_Name issuer; member in struct:__anon4177
152 NSS_Name issuer; member in struct:__anon4180
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/
H A DTrustItem.cpp165 // This is an ASN.1 sequence of issuer and serial number.
168 CSSM_DATA issuer; member in struct:Security::KeychainCore::IssuerAndSN
174 { SEC_ASN1_OCTET_STRING, offsetof(IssuerAndSN, issuer) },
181 CertField issuer(cert, CSSMOID_X509V1IssuerName);
184 index.issuer = issuer.data();
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/
H A DTrustItem.cpp165 // This is an ASN.1 sequence of issuer and serial number.
168 CSSM_DATA issuer; member in struct:Security::KeychainCore::IssuerAndSN
174 { SEC_ASN1_OCTET_STRING, offsetof(IssuerAndSN, issuer) },
181 CertField issuer(cert, CSSMOID_X509V1IssuerName);
184 index.issuer = issuer.data();
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/
H A DTrustItem.cpp165 // This is an ASN.1 sequence of issuer and serial number.
168 CSSM_DATA issuer; member in struct:Security::KeychainCore::IssuerAndSN
174 { SEC_ASN1_OCTET_STRING, offsetof(IssuerAndSN, issuer) },
181 CertField issuer(cert, CSSMOID_X509V1IssuerName);
184 index.issuer = issuer.data();
/macosx-10.9.5/tcl-102/tcl_ext/tls/tls/
H A DtlsX509.c100 char issuer[BUFSIZ];
112 issuer[0] = 0;
125 n = BIO_read(bio, issuer, min(BIO_pending(bio), BUFSIZ - 1));
127 issuer[n] = 0;
160 Tcl_NewStringObj( "issuer", -1) );
162 Tcl_NewStringObj( issuer, -1) );
99 char issuer[BUFSIZ]; local
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/
H A Dsi-68-secmatchissuer.c131 CFDataRef issuer = SecCertificateGetNormalizedIssuerContent(intermediate_cert); local
132 ok(CFDataGetLength(issuer) < 128, "max 127 bytes of content - or else you'll need to properly encode issuer sequence");
133 CFMutableDataRef canonical_issuer = CFDataCreateMutable(kCFAllocatorDefault, CFDataGetLength(issuer) + 2);
134 CFDataSetLength(canonical_issuer, CFDataGetLength(issuer) + 2);
136 memcpy(ptr+2, CFDataGetBytePtr(issuer), CFDataGetLength(issuer));
138 ptr[1] = CFDataGetLength(issuer);
/macosx-10.9.5/ruby-104/ruby/test/rubygems/
H A Dtest_gem_security.rb49 assert_equal '', cert.issuer.to_s
58 assert_equal '/CN=nobody/DC=example', cert.issuer.to_s
76 assert_equal name.to_s, cert.issuer.to_s
137 "#{ALTERNATE_CERT.issuer} to obtain a valid certificate",
160 issuer = PUBLIC_CERT.subject
174 assert_equal issuer.to_s, signed.issuer.to_s
202 issuer = PUBLIC_CERT.subject
211 assert_equal issuer.to_s, signed.issuer
[all...]
/macosx-10.9.5/emacs-92/emacs/lisp/gnus/
H A Dgnus-nocem.el60 issuer registry."
102 valid issuer, which is much faster if you are selective about the issuers."
232 issuer b e type)
251 ;; We get the name of the issuer.
253 (setq issuer (mail-fetch-field "issuer")
256 (if (not (gnus-nocem-message-wanted-p issuer type))
257 (message "invalid NoCeM issuer: %s" issuer)
258 (and (gnus-nocem-verify-issuer issue
[all...]

Completed in 232 milliseconds

1234567