/macosx-10.9.5/ruby-104/ruby/test/openssl/ |
H A D | test_ns_spki.rb | 22 spki.public_key = key1.public_key 24 assert(spki.verify(spki.public_key)) 25 assert(spki.verify(key1.public_key)) 26 assert(!spki.verify(key2.public_key)) 31 assert_equal(key1.public_key.to_der, spki.public_key.to_der) 32 assert(spki.verify(spki.public_key)) 41 assert_equal(OpenSSL::PKey::RSA, spki.public_key.class) 47 assert_equal(OpenSSL::PKey::RSA, spki.public_key [all...] |
H A D | test_pkey_dh.rb | 39 public_key = dh.public_key 40 assert_no_key(public_key) #implies public_key.public? is false! 41 assert_equal(dh.to_der, public_key.to_der) 42 assert_equal(dh.to_pem, public_key.to_pem) 46 dh = OpenSSL::TestUtils::TEST_KEY_DH512_PUB.public_key # creates a copy 54 dh2 = dh.public_key
|
H A D | test_x509req.rb | 18 req.public_key = key.public_key 25 assert_equal(@rsa1024.public_key.to_der, req.public_key.to_der) 27 assert_equal(@rsa1024.public_key.to_der, req.public_key.to_der) 30 assert_equal(@dsa512.public_key.to_der, req.public_key.to_der) 32 assert_equal(@dsa512.public_key.to_der, req.public_key [all...] |
H A D | test_pkey_ec.rb | 44 assert_equal(key.public_key?, true) 74 bn = key.public_key.to_bn 84 k.public_key = key.public_key 119 puba = key.public_key 120 pubb = k.public_key 148 ec2.public_key = ec.public_key 159 ec2.public_key = ec.public_key [all...] |
H A D | test_x509store.rb | 71 assert_equal(true, ca1_cert.verify(ca1_cert.public_key)) # self signed 72 assert_equal(true, ca2_cert.verify(ca1_cert.public_key)) # issued by ca1 73 assert_equal(true, ee1_cert.verify(ca2_cert.public_key)) # issued by ca2 74 assert_equal(true, ee2_cert.verify(ca2_cert.public_key)) # issued by ca2 75 assert_equal(true, ee3_cert.verify(ca2_cert.public_key)) # issued by ca2 76 assert_equal(true, crl1.verify(ca1_cert.public_key)) # issued by ca1 77 assert_equal(true, crl1_2.verify(ca1_cert.public_key)) # issued by ca1 78 assert_equal(true, crl2.verify(ca2_cert.public_key)) # issued by ca2 79 assert_equal(true, crl2_2.verify(ca2_cert.public_key)) # issued by ca2
|
H A D | test_pkey_rsa.rb | 38 key3 = key.public_key 46 pem = key.public_key.to_pem 85 pub_key = pkey.public_key 97 pub_key = pkey.public_key 208 asn1 = OpenSSL::ASN1.decode(key.public_key.to_der) 214 pem = key.public_key.to_pem 237 der = OpenSSL::TestUtils::TEST_KEY_RSA1024.public_key.to_der 245 pem = OpenSSL::TestUtils::TEST_KEY_RSA1024.public_key.to_pem
|
H A D | test_pkey_dsa.rb | 12 key3 = key.public_key 20 pem = key.public_key.to_pem 142 pem = key.public_key.to_pem 189 key = OpenSSL::TestUtils::TEST_KEY_DSA256.public_key 198 key = OpenSSL::TestUtils::TEST_KEY_DSA256.public_key
|
H A D | utils.rb | 132 cert.public_key = key.public_key
|
/macosx-10.9.5/Security-55471.14.18/regressions/test/ |
H A D | testcert.h | 32 SecKeyRef *private_key, SecKeyRef *public_key); 36 SecKeyRef public_key, SecKeyRef private_key); 40 SecKeyRef public_key, CFStringRef subject,
|
H A D | testcert.c | 103 SecIdentityRef test_cert_create_root_certificate(CFStringRef subject, SecKeyRef public_key, SecKeyRef private_key) argument 114 ca_cert = SecGenerateSelfSignedCertificate(ca_subject, extensions, public_key, private_key); 127 SecKeyRef public_key, CFStringRef subject, 148 public_key, cert_subject, NULL); 160 SecKeyRef *private_key, SecKeyRef *public_key) 170 return SecKeyGeneratePair(parameters, public_key, private_key); 126 test_cert_issue_certificate(SecIdentityRef ca_identity, SecKeyRef public_key, CFStringRef subject, unsigned int serial_no, unsigned int key_usage) argument 159 test_cert_generate_key(uint32_t key_size_in_bits, CFTypeRef sec_attr_key_type, SecKeyRef *private_key, SecKeyRef *public_key) argument
|
/macosx-10.9.5/Security-55471.14.18/sec/SOSCircle/Regressions/ |
H A D | sc-51-persistentEC.c | 30 SecKeyRef public_key = NULL; local 44 ok_status(SecKeyGeneratePair(keygen_parameters, &public_key, &full_key), "generate EC Key Pair"); 46 CFReleaseNull(public_key);
|
H A D | sc-100-devicecircle.c | 184 SecKeyRef public_key = NULL; local 189 GenerateECPair(256, &public_key, &user_key); 191 CFReleaseNull(public_key); 492 CFReleaseNull(public_key); // Should be NULL but just in case..
|
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/security/ |
H A D | policy.rb | 69 # Verifies that +data+ matches the +signature+ created by +public_key+ and 72 def check_data public_key, digest, signature, data 74 public_key.verify digest.new, signature, data.digest 98 if issuer and not signer.verify issuer.public_key then 118 signer.public_key.to_pem == key.public_key.to_pem 165 save_dgst = digester.digest save_cert.public_key.to_s 167 pkey_str = root.public_key.to_s 240 check_data signer.public_key, digester, signature, digest if @verify_data
|
/macosx-10.9.5/ruby-104/ruby/sample/openssl/ |
H A D | gen_csr.rb | 43 req.public_key = keypair.public_key
|
H A D | echo_svr.rb | 28 cert.public_key = key.public_key
|
H A D | crlstore.rb | 51 if cert.verify(ca.public_key) 88 unless crl.verify(ca.public_key)
|
/macosx-10.9.5/ruby-104/ruby/test/rubygems/ |
H A D | test_gem_security.rb | 29 assert_equal key.public_key.to_pem, cert.public_key.to_pem 72 assert_equal key.public_key.to_pem, cert.public_key.to_pem 168 cert.public_key = key.public_key 172 assert_equal key.public_key.to_pem, signed.public_key.to_pem 209 assert_equal PUBLIC_KEY.to_pem, signed.public_key.to_pem
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/ |
H A D | si-68-secmatchissuer.c | 94 SecKeyRef public_key = NULL, private_key = NULL; local 95 ok_status(test_cert_generate_key(512, kSecAttrKeyTypeRSA, &private_key, &public_key), "generate keypair"); 107 test_cert_create_root_certificate(root_authority_name, public_key, private_key); 115 test_cert_issue_certificate(ca_identity, public_key, intermediate_authority_name, 42, kSecKeyUsageKeyCertSign); 122 SecCertificateRef leaf_cert = test_cert_issue_certificate(intermediate_identity, public_key, 180 CFRelease(public_key);
|
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/ |
H A D | security.rb | 281 # ruby -ryaml -e 'puts YAML.load_documents($stdin)' > public_key.crt 289 # openssl rsautl -verify -inkey public_key.crt -certin \ 412 cert.public_key = key.public_key 488 expired_certificate.public_key.to_pem == private_key.public_key.to_pem 523 signee_key = certificate.public_key
|
H A D | test_case.rb | 1106 PUBLIC_KEY = PRIVATE_KEY.public_key
|
/macosx-10.9.5/ruby-104/ruby/lib/drb/ |
H A D | ssl.rb | 186 cert.public_key = rsa.public_key
|
/macosx-10.9.5/ruby-104/ruby/lib/webrick/ |
H A D | ssl.rb | 112 cert.public_key = rsa.public_key
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/ |
H A D | SecOTRDHKey.c | 37 static size_t AppendECPublicKeyAsDATA(CFMutableDataRef data, ccec_pub_ctx_t public_key) argument 39 size_t size = ccec_export_pub_size(public_key); 42 ccec_export_pub(public_key, CFDataIncreaseLengthAndGetMutableBytes(data, (CFIndex)size));
|
/macosx-10.9.5/Heimdal-323.92.1/kdc/ |
H A D | pkinit.c | 53 BIGNUM *public_key; member in struct:pk_client_params::__anon746::__anon747 58 EC_KEY *public_key; member in struct:pk_client_params::__anon746::__anon748 184 if (cp->u.dh.public_key) 185 BN_free(cp->u.dh.public_key); 191 if (cp->u.ecdh.public_key) 192 EC_KEY_free(cp->u.ecdh.public_key); 221 if (client_params->u.dh.public_key == NULL) { 223 krb5_set_error_message(context, ret, "public_key"); 243 dh_gen_keylen = DH_compute_key(dh_gen_key, client_params->u.dh.public_key, client_params->u.dh.key); 261 if (client_params->u.ecdh.public_key [all...] |
/macosx-10.9.5/ruby-104/ruby/ext/openssl/ |
H A D | ossl_pkey_ec.c | 386 * key.public_key => OpenSSL::PKey::EC::Point 403 ossl_raise(eECError, "EC_KEY_get0_get0_group (has public_key but no group???"); 410 * key.public_key = ec_point 414 static VALUE ossl_ec_key_set_public_key(VALUE self, VALUE public_key) argument 420 if (!NIL_P(public_key)) 421 SafeRequire_EC_POINT(public_key, point); 433 return public_key; 438 * key.public_key? => true or false 440 * Both public_key? and private_key? may return false at the same time unlike other PKey classes. 455 * Both public_key [all...] |