/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/ |
H A D | cmsrecinfo.c | 40 #include "cert.h" 70 SecCertificateRef cert, SecPublicKeyRef pubKey, 100 rv = SecCertificateGetAlgorithmID(cert,&algid); 106 ri->cert = CERT_DupCertificate(cert); 107 if (ri->cert == NULL) 110 const SecAsn1AlgId *length_data_swapped = (const SecAsn1AlgId *)SecCertificateGetPublicKeyAlgorithm(cert); 126 rid->id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert); 173 ri->ri.keyTransRecipientInfo.recipientIdentifier.id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert); 210 if ((rek->recipientIdentifier.id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert)) 69 nss_cmsrecipientinfo_create(SecCmsEnvelopedDataRef envd, SecCmsRecipientIDSelector type, SecCertificateRef cert, SecPublicKeyRef pubKey, const SecAsn1Item *subjKeyID) argument 289 SecCmsRecipientInfoCreate(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument 313 SecCmsRecipientInfoCreateWithSubjKeyIDFromCert(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument 343 SecCmsRecipientInfoCreateWithSubjKeyIDFromCert(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument 464 SecCertificateRef cert; local 594 SecCmsRecipientInfoUnwrapBulkKey(SecCmsRecipientInfoRef ri, int subIndex, SecCertificateRef cert, SecPrivateKeyRef privkey, SECOidTag bulkalgtag) argument [all...] |
/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/ |
H A D | cmsrecinfo.c | 40 #include "cert.h" 70 SecCertificateRef cert, SecPublicKeyRef pubKey, 100 rv = SecCertificateGetAlgorithmID(cert,&algid); 106 ri->cert = CERT_DupCertificate(cert); 107 if (ri->cert == NULL) 110 const SecAsn1AlgId *length_data_swapped = (const SecAsn1AlgId *)SecCertificateGetPublicKeyAlgorithm(cert); 126 rid->id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert); 173 ri->ri.keyTransRecipientInfo.recipientIdentifier.id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert); 210 if ((rek->recipientIdentifier.id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert)) 69 nss_cmsrecipientinfo_create(SecCmsEnvelopedDataRef envd, SecCmsRecipientIDSelector type, SecCertificateRef cert, SecPublicKeyRef pubKey, const SecAsn1Item *subjKeyID) argument 289 SecCmsRecipientInfoCreate(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument 313 SecCmsRecipientInfoCreateWithSubjKeyIDFromCert(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument 343 SecCmsRecipientInfoCreateWithSubjKeyIDFromCert(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument 464 SecCertificateRef cert; local 594 SecCmsRecipientInfoUnwrapBulkKey(SecCmsRecipientInfoRef ri, int subIndex, SecCertificateRef cert, SecPrivateKeyRef privkey, SECOidTag bulkalgtag) argument [all...] |
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/ |
H A D | cmsrecinfo.c | 40 #include "cert.h" 70 SecCertificateRef cert, SecPublicKeyRef pubKey, 100 rv = SecCertificateGetAlgorithmID(cert,&algid); 106 ri->cert = CERT_DupCertificate(cert); 107 if (ri->cert == NULL) 110 const SecAsn1AlgId *length_data_swapped = (const SecAsn1AlgId *)SecCertificateGetPublicKeyAlgorithm(cert); 126 rid->id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert); 173 ri->ri.keyTransRecipientInfo.recipientIdentifier.id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert); 210 if ((rek->recipientIdentifier.id.issuerAndSN = CERT_GetCertIssuerAndSN(poolp, cert)) 69 nss_cmsrecipientinfo_create(SecCmsEnvelopedDataRef envd, SecCmsRecipientIDSelector type, SecCertificateRef cert, SecPublicKeyRef pubKey, const SecAsn1Item *subjKeyID) argument 289 SecCmsRecipientInfoCreate(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument 313 SecCmsRecipientInfoCreateWithSubjKeyIDFromCert(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument 343 SecCmsRecipientInfoCreateWithSubjKeyIDFromCert(SecCmsEnvelopedDataRef envd, SecCertificateRef cert) argument 464 SecCertificateRef cert; local 594 SecCmsRecipientInfoUnwrapBulkKey(SecCmsRecipientInfoRef ri, int subIndex, SecCertificateRef cert, SecPrivateKeyRef privkey, SECOidTag bulkalgtag) argument [all...] |
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | oakley.c | 1267 user_id = eay_get_x509_common_name(&p->cert); //%%%%%%%% fix this 1398 /* get peer's cert */ 1420 /* check cert common name against Open Directory authentication group */ 1626 int premature = oakley_find_status_in_certchain(iph1->cert, CERT_STATUS_PREMATURE); 1627 int expired = oakley_find_status_in_certchain(iph1->cert, CERT_STATUS_EXPIRED); 1658 if (iph1->cert) 1678 * my != 0 my cert. 1679 * my == 0 peer's cert. 1684 vchar_t *cert = NULL; local 1690 certpl = &iph1->cert; 1878 oakley_check_certid_1(vchar_t *cert, int idtype, int idlen, void *id, cert_status_t *certStatus) argument 2961 oakley_delcert_1(cert_t *cert) argument 2972 oakley_delcert(cert_t *cert) argument [all...] |
H A D | oakley.h | 200 vchar_t cert; /* pointer to the CERT */ member in struct:cert_t_tag
|
H A D | crypto_openssl.c | 279 * Get the common name from a cert 283 eay_get_x509_common_name(cert) 284 vchar_t *cert; 296 x509 = mem2x509(cert); 317 eay_get_x509subjectaltname(cert, altname, type, pos, len) 318 vchar_t *cert; 333 x509 = mem2x509(cert); 412 mem2x509(cert) 413 vchar_t *cert; 421 bp = (unsigned char *) cert [all...] |
H A D | handler.c | 389 oakley_delcert(iph1->cert); 390 iph1->cert = NULL;
|
H A D | isakmp_agg.c | 785 if (iph1->cert != NULL && iph1->rmconf->send_cert) 791 plist = isakmp_plist_append(plist, iph1->cert->pl, ISAKMP_NPTYPE_CERT); 1310 if (iph1->cert != NULL && iph1->rmconf->send_cert) 1327 plist = isakmp_plist_append(plist, iph1->cert->pl, ISAKMP_NPTYPE_CERT);
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecTrust.c | 448 SecCertificateRef cert = SecCertificateCreateWithBytes(allocator, certData, certLength); local 449 if (cert) { 450 array = CFArrayCreate(allocator, (const void **)&cert, 1, &kCFTypeArrayCallBacks); 451 CFReleaseSafe(cert); 647 make it seem like we did a cert evaluation, so ASR can extract 702 /* Trust hasn't been evaluated yet, first attempt to retrieve public key from leaf cert as is. */ 706 /* If this fails use the passed in certs in order as if they are a valid cert path an attempt to extract the key. */ 853 Can be on any non root cert in the chain. 863 Can be on any cert in the chain 899 Can be on any cert i [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecTrust.cpp | 407 SecCertificateRef cert = SecTrustGetCertificateAtIndex(trust, 0); local 408 __secapiresult = SecCertificateCopyPublicKey(cert, &pubKey); 433 SecCertificateRef cert = (SecCertificateRef) CFArrayGetValueAtIndex(evidenceChain, 0); local 434 __secapiresult = SecCertificateCopyPublicKey(cert, &pubKey); 487 // the cert as it's owned by the trust and this is a 'Get' API.
|
H A D | Trust.cpp | 283 // build the target cert group 317 // enable network cert fetch for SSL only: <rdar://7422356> 339 // in which case we must no longer consider the cert an EV candidate. 384 // anchor certificates (if caller provides them, or if cert requires EV) 604 return kSecTrustResultUnspecified; // cert evaluates OK 632 // extract cert chain as Certificate objects 643 Certificate* cert = dynamic_cast<Certificate*>(ii.get()); local 644 if (cert == NULL) { 647 mCertChain[n] = cert; 649 secdebug("trusteval", "evidence %lu from input cert 651 SecCertificateRef cert = SecCertificateRef(CFArrayGetValueAtIndex(mCerts, local 657 SecCertificateRef cert = SecCertificateRef(CFArrayGetValueAtIndex(anchors, local [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecTrust.cpp | 407 SecCertificateRef cert = SecTrustGetCertificateAtIndex(trust, 0); local 408 __secapiresult = SecCertificateCopyPublicKey(cert, &pubKey); 433 SecCertificateRef cert = (SecCertificateRef) CFArrayGetValueAtIndex(evidenceChain, 0); local 434 __secapiresult = SecCertificateCopyPublicKey(cert, &pubKey); 487 // the cert as it's owned by the trust and this is a 'Get' API.
|
H A D | Trust.cpp | 283 // build the target cert group 317 // enable network cert fetch for SSL only: <rdar://7422356> 339 // in which case we must no longer consider the cert an EV candidate. 384 // anchor certificates (if caller provides them, or if cert requires EV) 604 return kSecTrustResultUnspecified; // cert evaluates OK 632 // extract cert chain as Certificate objects 643 Certificate* cert = dynamic_cast<Certificate*>(ii.get()); local 644 if (cert == NULL) { 647 mCertChain[n] = cert; 649 secdebug("trusteval", "evidence %lu from input cert 651 SecCertificateRef cert = SecCertificateRef(CFArrayGetValueAtIndex(mCerts, local 657 SecCertificateRef cert = SecCertificateRef(CFArrayGetValueAtIndex(anchors, local [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecTrust.cpp | 407 SecCertificateRef cert = SecTrustGetCertificateAtIndex(trust, 0); local 408 __secapiresult = SecCertificateCopyPublicKey(cert, &pubKey); 433 SecCertificateRef cert = (SecCertificateRef) CFArrayGetValueAtIndex(evidenceChain, 0); local 434 __secapiresult = SecCertificateCopyPublicKey(cert, &pubKey); 487 // the cert as it's owned by the trust and this is a 'Get' API.
|
H A D | Trust.cpp | 283 // build the target cert group 317 // enable network cert fetch for SSL only: <rdar://7422356> 339 // in which case we must no longer consider the cert an EV candidate. 384 // anchor certificates (if caller provides them, or if cert requires EV) 604 return kSecTrustResultUnspecified; // cert evaluates OK 632 // extract cert chain as Certificate objects 643 Certificate* cert = dynamic_cast<Certificate*>(ii.get()); local 644 if (cert == NULL) { 647 mCertChain[n] = cert; 649 secdebug("trusteval", "evidence %lu from input cert 651 SecCertificateRef cert = SecCertificateRef(CFArrayGetValueAtIndex(mCerts, local 657 SecCertificateRef cert = SecCertificateRef(CFArrayGetValueAtIndex(anchors, local [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | sslContext.c | 228 /* Initial cert verify state: verify with default system roots */ 1476 * -- Get raw cert data, convert to ctx->localCert 1478 * -- validate cert chain 1493 /* changing the client cert invalidates negotiated auth type */ 1496 return errSecSuccess; // we have cleared the cert, as requested 1518 * -- Get raw cert data, convert to ctx->encryptCert 1520 * -- validate cert chain 1651 /* single-cert version of SSLSetCertificateAuthorities() */ 1654 SecCertificateRef cert) 1661 subjectName = SecCertificateCopySubjectSequence(cert); 1653 sslAddCA(SSLContextRef ctx, SecCertificateRef cert) argument 1733 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(cfa, dex); local [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | sslContext.c | 228 /* Initial cert verify state: verify with default system roots */ 1476 * -- Get raw cert data, convert to ctx->localCert 1478 * -- validate cert chain 1493 /* changing the client cert invalidates negotiated auth type */ 1496 return errSecSuccess; // we have cleared the cert, as requested 1518 * -- Get raw cert data, convert to ctx->encryptCert 1520 * -- validate cert chain 1651 /* single-cert version of SSLSetCertificateAuthorities() */ 1654 SecCertificateRef cert) 1661 subjectName = SecCertificateCopySubjectSequence(cert); 1653 sslAddCA(SSLContextRef ctx, SecCertificateRef cert) argument 1733 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(cfa, dex); local [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | sslContext.c | 228 /* Initial cert verify state: verify with default system roots */ 1476 * -- Get raw cert data, convert to ctx->localCert 1478 * -- validate cert chain 1493 /* changing the client cert invalidates negotiated auth type */ 1496 return errSecSuccess; // we have cleared the cert, as requested 1518 * -- Get raw cert data, convert to ctx->encryptCert 1520 * -- validate cert chain 1651 /* single-cert version of SSLSetCertificateAuthorities() */ 1654 SecCertificateRef cert) 1661 subjectName = SecCertificateCopySubjectSequence(cert); 1653 sslAddCA(SSLContextRef ctx, SecCertificateRef cert) argument 1733 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(cfa, dex); local [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | StaticCode.cpp | 61 // A requirement representing a Mac or iOS dev cert, a Mac or iOS distribution cert, or a developer ID 566 // if this is an Apple developer cert.... 1279 validateDirectory(); // need the cert chain 1325 // Retrieve one certificate from the cert chain. 1331 SecCertificateRef SecStaticCode::cert(int ix) function in class:Security::CodeSigning::SecStaticCode 1333 validateDirectory(); // need cert chain 1346 validateDirectory(); // need cert chain 1623 // if it is a Mac or IPhone developer cert, an app store distribution cert, [all...] |
H A D | StaticCode.h | 180 SecCertificateRef cert(int ix); // get a cert from the cert chain
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | StaticCode.cpp | 61 // A requirement representing a Mac or iOS dev cert, a Mac or iOS distribution cert, or a developer ID 566 // if this is an Apple developer cert.... 1279 validateDirectory(); // need the cert chain 1325 // Retrieve one certificate from the cert chain. 1331 SecCertificateRef SecStaticCode::cert(int ix) function in class:Security::CodeSigning::SecStaticCode 1333 validateDirectory(); // need cert chain 1346 validateDirectory(); // need cert chain 1623 // if it is a Mac or IPhone developer cert, an app store distribution cert, [all...] |
H A D | StaticCode.h | 180 SecCertificateRef cert(int ix); // get a cert from the cert chain
|
/macosx-10.10/curl-83.1.2/curl/lib/vtls/ |
H A D | curl_darwinssl.c | 813 CF_INLINE CFStringRef CopyCertSubject(SecCertificateRef cert) argument 819 server_cert_summary = SecCertificateCopySubjectSummary(cert); 825 SecCertificateCopyLongDescription(NULL, cert, NULL); 831 server_cert_summary = SecCertificateCopySubjectSummary(cert); 835 (void)SecCertificateCopyCommonName(cert, &server_cert_summary); 850 SecCertificateRef cert = NULL; local 868 (SecKeychainItemRef *)&cert); 869 if(status == noErr && cert) { 871 status = SecIdentityCreateWithCertificate(NULL, cert, out_c_a_k); 872 CFRelease(cert); 1224 SecCertificateRef cert = NULL; local [all...] |
/macosx-10.10/cups-408/cups/scheduler/ |
H A D | Makefile | 21 cert.o \
|
/macosx-10.10/cups-408/cups/cups/ |
H A D | tls-gnutls.c | 35 /* Server cert keychain path */ 71 cups_file_t *fp; /* Key/cert file */ 368 gnutls_x509_crt_t cert; /* Certificate */ local 372 cert = http_gnutls_create_credential((http_credential_t *)cupsArrayFirst(credentials)); 373 if (cert) 375 result = gnutls_x509_crt_check_hostname(cert, common_name) != 0; 376 gnutls_x509_crt_deinit(cert); 396 gnutls_x509_crt_t cert; /* Certificate */ local 405 if ((cert = http_gnutls_create_credential((http_credential_t *)cupsArrayFirst(credentials))) == NULL) 461 if (curtime < gnutls_x509_crt_get_activation_time(cert) || 485 gnutls_x509_crt_t cert; /* Certificate */ local 513 gnutls_x509_crt_t cert; /* Certificate */ local 748 gnutls_x509_crt_t cert; /* Certificate */ local [all...] |