Searched refs:cert (Results 1 - 25 of 677) sorted by last modified time

1234567891011>>

/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/
H A Dcmsrecinfo.c40 #include "cert.h"
70 SecCertificateRef cert, SecPublicKeyRef pubKey,
100 rv = SecCertificateGetAlgorithmID(cert,&algid);
106 ri->cert = CERT_DupCertificate(cert);
107 if (ri->cert == NULL)
110 const SecAsn1AlgId *length_data_swapped = (const SecAsn1AlgId *)SecCertificateGetPublicKeyAlgorithm(cert);
126 rid->id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert);
173 ri->ri.keyTransRecipientInfo.recipientIdentifier.id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert);
210 if ((rek->recipientIdentifier.id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert))
69 nss_cmsrecipientinfo_create(SecCmsEnvelopedDataRef envd, SecCmsRecipientIDSelector type, SecCertificateRef cert, SecPublicKeyRef pubKey, const SecAsn1Item *subjKeyID) argument
289 SecCmsRecipientInfoCreate(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument
313 SecCmsRecipientInfoCreateWithSubjKeyIDFromCert(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument
343 SecCmsRecipientInfoCreateWithSubjKeyIDFromCert(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument
464 SecCertificateRef cert; local
594 SecCmsRecipientInfoUnwrapBulkKey(SecCmsRecipientInfoRef ri, int subIndex, SecCertificateRef cert, SecPrivateKeyRef privkey, SECOidTag bulkalgtag) argument
[all...]
/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/
H A Dcmsrecinfo.c40 #include "cert.h"
70 SecCertificateRef cert, SecPublicKeyRef pubKey,
100 rv = SecCertificateGetAlgorithmID(cert,&algid);
106 ri->cert = CERT_DupCertificate(cert);
107 if (ri->cert == NULL)
110 const SecAsn1AlgId *length_data_swapped = (const SecAsn1AlgId *)SecCertificateGetPublicKeyAlgorithm(cert);
126 rid->id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert);
173 ri->ri.keyTransRecipientInfo.recipientIdentifier.id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert);
210 if ((rek->recipientIdentifier.id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert))
69 nss_cmsrecipientinfo_create(SecCmsEnvelopedDataRef envd, SecCmsRecipientIDSelector type, SecCertificateRef cert, SecPublicKeyRef pubKey, const SecAsn1Item *subjKeyID) argument
289 SecCmsRecipientInfoCreate(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument
313 SecCmsRecipientInfoCreateWithSubjKeyIDFromCert(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument
343 SecCmsRecipientInfoCreateWithSubjKeyIDFromCert(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument
464 SecCertificateRef cert; local
594 SecCmsRecipientInfoUnwrapBulkKey(SecCmsRecipientInfoRef ri, int subIndex, SecCertificateRef cert, SecPrivateKeyRef privkey, SECOidTag bulkalgtag) argument
[all...]
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/
H A Dcmsrecinfo.c40 #include "cert.h"
70 SecCertificateRef cert, SecPublicKeyRef pubKey,
100 rv = SecCertificateGetAlgorithmID(cert,&algid);
106 ri->cert = CERT_DupCertificate(cert);
107 if (ri->cert == NULL)
110 const SecAsn1AlgId *length_data_swapped = (const SecAsn1AlgId *)SecCertificateGetPublicKeyAlgorithm(cert);
126 rid->id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert);
173 ri->ri.keyTransRecipientInfo.recipientIdentifier.id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert);
210 if ((rek->recipientIdentifier.id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert))
69 nss_cmsrecipientinfo_create(SecCmsEnvelopedDataRef envd, SecCmsRecipientIDSelector type, SecCertificateRef cert, SecPublicKeyRef pubKey, const SecAsn1Item *subjKeyID) argument
289 SecCmsRecipientInfoCreate(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument
313 SecCmsRecipientInfoCreateWithSubjKeyIDFromCert(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument
343 SecCmsRecipientInfoCreateWithSubjKeyIDFromCert(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument
464 SecCertificateRef cert; local
594 SecCmsRecipientInfoUnwrapBulkKey(SecCmsRecipientInfoRef ri, int subIndex, SecCertificateRef cert, SecPrivateKeyRef privkey, SECOidTag bulkalgtag) argument
[all...]
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/
H A Doakley.c1267 user_id = eay_get_x509_common_name(&p->cert); //%%%%%%%% fix this
1398 /* get peer's cert */
1420 /* check cert common name against Open Directory authentication group */
1626 int premature = oakley_find_status_in_certchain(iph1->cert, CERT_STATUS_PREMATURE);
1627 int expired = oakley_find_status_in_certchain(iph1->cert, CERT_STATUS_EXPIRED);
1658 if (iph1->cert)
1678 * my != 0 my cert.
1679 * my == 0 peer's cert.
1684 vchar_t *cert = NULL; local
1690 certpl = &iph1->cert;
1878 oakley_check_certid_1(vchar_t *cert, int idtype, int idlen, void *id, cert_status_t *certStatus) argument
2961 oakley_delcert_1(cert_t *cert) argument
2972 oakley_delcert(cert_t *cert) argument
[all...]
H A Doakley.h200 vchar_t cert; /* pointer to the CERT */ member in struct:cert_t_tag
H A Dcrypto_openssl.c279 * Get the common name from a cert
283 eay_get_x509_common_name(cert)
284 vchar_t *cert;
296 x509 = mem2x509(cert);
317 eay_get_x509subjectaltname(cert, altname, type, pos, len)
318 vchar_t *cert;
333 x509 = mem2x509(cert);
412 mem2x509(cert)
413 vchar_t *cert;
421 bp = (unsigned char *) cert
[all...]
H A Dhandler.c389 oakley_delcert(iph1->cert);
390 iph1->cert = NULL;
H A Disakmp_agg.c785 if (iph1->cert != NULL && iph1->rmconf->send_cert)
791 plist = isakmp_plist_append(plist, iph1->cert->pl, ISAKMP_NPTYPE_CERT);
1310 if (iph1->cert != NULL && iph1->rmconf->send_cert)
1327 plist = isakmp_plist_append(plist, iph1->cert->pl, ISAKMP_NPTYPE_CERT);
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A DSecTrust.c448 SecCertificateRef cert = SecCertificateCreateWithBytes(allocator, certData, certLength); local
449 if (cert) {
450 array = CFArrayCreate(allocator, (const void **)&cert, 1, &kCFTypeArrayCallBacks);
451 CFReleaseSafe(cert);
647 make it seem like we did a cert evaluation, so ASR can extract
702 /* Trust hasn't been evaluated yet, first attempt to retrieve public key from leaf cert as is. */
706 /* If this fails use the passed in certs in order as if they are a valid cert path an attempt to extract the key. */
853 Can be on any non root cert in the chain.
863 Can be on any cert in the chain
899 Can be on any cert i
[all...]
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/
H A DSecTrust.cpp407 SecCertificateRef cert = SecTrustGetCertificateAtIndex(trust, 0); local
408 __secapiresult = SecCertificateCopyPublicKey(cert, &pubKey);
433 SecCertificateRef cert = (SecCertificateRef) CFArrayGetValueAtIndex(evidenceChain, 0); local
434 __secapiresult = SecCertificateCopyPublicKey(cert, &pubKey);
487 // the cert as it's owned by the trust and this is a 'Get' API.
H A DTrust.cpp283 // build the target cert group
317 // enable network cert fetch for SSL only: <rdar://7422356>
339 // in which case we must no longer consider the cert an EV candidate.
384 // anchor certificates (if caller provides them, or if cert requires EV)
604 return kSecTrustResultUnspecified; // cert evaluates OK
632 // extract cert chain as Certificate objects
643 Certificate* cert = dynamic_cast<Certificate*>(ii.get()); local
644 if (cert == NULL) {
647 mCertChain[n] = cert;
649 secdebug("trusteval", "evidence %lu from input cert
651 SecCertificateRef cert = SecCertificateRef(CFArrayGetValueAtIndex(mCerts, local
657 SecCertificateRef cert = SecCertificateRef(CFArrayGetValueAtIndex(anchors, local
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DSecTrust.cpp407 SecCertificateRef cert = SecTrustGetCertificateAtIndex(trust, 0); local
408 __secapiresult = SecCertificateCopyPublicKey(cert, &pubKey);
433 SecCertificateRef cert = (SecCertificateRef) CFArrayGetValueAtIndex(evidenceChain, 0); local
434 __secapiresult = SecCertificateCopyPublicKey(cert, &pubKey);
487 // the cert as it's owned by the trust and this is a 'Get' API.
H A DTrust.cpp283 // build the target cert group
317 // enable network cert fetch for SSL only: <rdar://7422356>
339 // in which case we must no longer consider the cert an EV candidate.
384 // anchor certificates (if caller provides them, or if cert requires EV)
604 return kSecTrustResultUnspecified; // cert evaluates OK
632 // extract cert chain as Certificate objects
643 Certificate* cert = dynamic_cast<Certificate*>(ii.get()); local
644 if (cert == NULL) {
647 mCertChain[n] = cert;
649 secdebug("trusteval", "evidence %lu from input cert
651 SecCertificateRef cert = SecCertificateRef(CFArrayGetValueAtIndex(mCerts, local
657 SecCertificateRef cert = SecCertificateRef(CFArrayGetValueAtIndex(anchors, local
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DSecTrust.cpp407 SecCertificateRef cert = SecTrustGetCertificateAtIndex(trust, 0); local
408 __secapiresult = SecCertificateCopyPublicKey(cert, &pubKey);
433 SecCertificateRef cert = (SecCertificateRef) CFArrayGetValueAtIndex(evidenceChain, 0); local
434 __secapiresult = SecCertificateCopyPublicKey(cert, &pubKey);
487 // the cert as it's owned by the trust and this is a 'Get' API.
H A DTrust.cpp283 // build the target cert group
317 // enable network cert fetch for SSL only: <rdar://7422356>
339 // in which case we must no longer consider the cert an EV candidate.
384 // anchor certificates (if caller provides them, or if cert requires EV)
604 return kSecTrustResultUnspecified; // cert evaluates OK
632 // extract cert chain as Certificate objects
643 Certificate* cert = dynamic_cast<Certificate*>(ii.get()); local
644 if (cert == NULL) {
647 mCertChain[n] = cert;
649 secdebug("trusteval", "evidence %lu from input cert
651 SecCertificateRef cert = SecCertificateRef(CFArrayGetValueAtIndex(mCerts, local
657 SecCertificateRef cert = SecCertificateRef(CFArrayGetValueAtIndex(anchors, local
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/
H A DsslContext.c228 /* Initial cert verify state: verify with default system roots */
1476 * -- Get raw cert data, convert to ctx->localCert
1478 * -- validate cert chain
1493 /* changing the client cert invalidates negotiated auth type */
1496 return errSecSuccess; // we have cleared the cert, as requested
1518 * -- Get raw cert data, convert to ctx->encryptCert
1520 * -- validate cert chain
1651 /* single-cert version of SSLSetCertificateAuthorities() */
1654 SecCertificateRef cert)
1661 subjectName = SecCertificateCopySubjectSequence(cert);
1653 sslAddCA(SSLContextRef ctx, SecCertificateRef cert) argument
1733 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(cfa, dex); local
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/
H A DsslContext.c228 /* Initial cert verify state: verify with default system roots */
1476 * -- Get raw cert data, convert to ctx->localCert
1478 * -- validate cert chain
1493 /* changing the client cert invalidates negotiated auth type */
1496 return errSecSuccess; // we have cleared the cert, as requested
1518 * -- Get raw cert data, convert to ctx->encryptCert
1520 * -- validate cert chain
1651 /* single-cert version of SSLSetCertificateAuthorities() */
1654 SecCertificateRef cert)
1661 subjectName = SecCertificateCopySubjectSequence(cert);
1653 sslAddCA(SSLContextRef ctx, SecCertificateRef cert) argument
1733 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(cfa, dex); local
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/
H A DsslContext.c228 /* Initial cert verify state: verify with default system roots */
1476 * -- Get raw cert data, convert to ctx->localCert
1478 * -- validate cert chain
1493 /* changing the client cert invalidates negotiated auth type */
1496 return errSecSuccess; // we have cleared the cert, as requested
1518 * -- Get raw cert data, convert to ctx->encryptCert
1520 * -- validate cert chain
1651 /* single-cert version of SSLSetCertificateAuthorities() */
1654 SecCertificateRef cert)
1661 subjectName = SecCertificateCopySubjectSequence(cert);
1653 sslAddCA(SSLContextRef ctx, SecCertificateRef cert) argument
1733 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(cfa, dex); local
[all...]
/macosx-10.10/Security-57031.1.35/Security/include/security_codesigning/
H A DStaticCode.cpp61 // A requirement representing a Mac or iOS dev cert, a Mac or iOS distribution cert, or a developer ID
566 // if this is an Apple developer cert....
1279 validateDirectory(); // need the cert chain
1325 // Retrieve one certificate from the cert chain.
1331 SecCertificateRef SecStaticCode::cert(int ix) function in class:Security::CodeSigning::SecStaticCode
1333 validateDirectory(); // need cert chain
1346 validateDirectory(); // need cert chain
1623 // if it is a Mac or IPhone developer cert, an app store distribution cert,
[all...]
H A DStaticCode.h180 SecCertificateRef cert(int ix); // get a cert from the cert chain
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/lib/
H A DStaticCode.cpp61 // A requirement representing a Mac or iOS dev cert, a Mac or iOS distribution cert, or a developer ID
566 // if this is an Apple developer cert....
1279 validateDirectory(); // need the cert chain
1325 // Retrieve one certificate from the cert chain.
1331 SecCertificateRef SecStaticCode::cert(int ix) function in class:Security::CodeSigning::SecStaticCode
1333 validateDirectory(); // need cert chain
1346 validateDirectory(); // need cert chain
1623 // if it is a Mac or IPhone developer cert, an app store distribution cert,
[all...]
H A DStaticCode.h180 SecCertificateRef cert(int ix); // get a cert from the cert chain
/macosx-10.10/curl-83.1.2/curl/lib/vtls/
H A Dcurl_darwinssl.c813 CF_INLINE CFStringRef CopyCertSubject(SecCertificateRef cert) argument
819 server_cert_summary = SecCertificateCopySubjectSummary(cert);
825 SecCertificateCopyLongDescription(NULL, cert, NULL);
831 server_cert_summary = SecCertificateCopySubjectSummary(cert);
835 (void)SecCertificateCopyCommonName(cert, &server_cert_summary);
850 SecCertificateRef cert = NULL; local
868 (SecKeychainItemRef *)&cert);
869 if(status == noErr && cert) {
871 status = SecIdentityCreateWithCertificate(NULL, cert, out_c_a_k);
872 CFRelease(cert);
1224 SecCertificateRef cert = NULL; local
[all...]
/macosx-10.10/cups-408/cups/scheduler/
H A DMakefile21 cert.o \
/macosx-10.10/cups-408/cups/cups/
H A Dtls-gnutls.c35 /* Server cert keychain path */
71 cups_file_t *fp; /* Key/cert file */
368 gnutls_x509_crt_t cert; /* Certificate */ local
372 cert = http_gnutls_create_credential((http_credential_t *)cupsArrayFirst(credentials));
373 if (cert)
375 result = gnutls_x509_crt_check_hostname(cert, common_name) != 0;
376 gnutls_x509_crt_deinit(cert);
396 gnutls_x509_crt_t cert; /* Certificate */ local
405 if ((cert = http_gnutls_create_credential((http_credential_t *)cupsArrayFirst(credentials))) == NULL)
461 if (curtime < gnutls_x509_crt_get_activation_time(cert) ||
485 gnutls_x509_crt_t cert; /* Certificate */ local
513 gnutls_x509_crt_t cert; /* Certificate */ local
748 gnutls_x509_crt_t cert; /* Certificate */ local
[all...]

Completed in 264 milliseconds

1234567891011>>