/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/ |
H A D | dnssec.c | 62 cert_t *cert = NULL; local 118 /* create cert holder */ 119 cert = oakley_newcert(); 120 if (cert == NULL) { 122 "failed to get cert buffer.\n"); 125 cert->pl = vmalloc(res->ci_certlen + 1); 126 if (cert->pl == NULL) { 128 "failed to get cert buffer.\n"); 131 memcpy(cert->pl->v + 1, res->ci_cert, res->ci_certlen); 132 cert [all...] |
/macosx-10.9.5/ruby-104/ruby/sample/openssl/ |
H A D | echo_svr.rb | 15 cert = OpenSSL::X509::Certificate.new(File::read(cert_file)) 20 cert = OpenSSL::X509::Certificate.new 21 cert.version = 2 22 cert.serial = 0 24 cert.subject = name 25 cert.issuer = name 26 cert.not_before = Time.now 27 cert.not_after = Time.now + 3600 28 cert.public_key = key.public_key 29 ef = OpenSSL::X509::ExtensionFactory.new(nil,cert) [all...] |
H A D | certstore.rb | 34 def verify(cert) 35 error, crl_map = do_verify(cert) 37 [[false, cert, crl_map[cert.subject], error]] 47 def is_ca?(cert) 48 case guess_cert_type(cert) 73 def do_verify(cert) 76 result = @x509store.verify(cert) do |ok, ctx| 77 cert = ctx.current_cert 79 crl_map[cert [all...] |
H A D | crlstore.rb | 15 def find_crl(cert) 16 do_find_crl(cert) 21 def do_find_crl(cert) 22 unless ca = find_ca(cert) 26 if crl = renew_crl(cert, ca) 35 if new_crl = renew_crl(cert, ca) 48 def find_ca(cert) 49 @c_store.get_certs(cert.issuer).each do |cafile| 51 if cert.verify(ca.public_key) 95 def get_cdp(cert) [all...] |
/macosx-10.9.5/CPANInternal-140/Crypt-SSLeay/lib/Crypt/SSLeay/ |
H A D | X509.pm | 6 my $cert = shift; 7 not_string2time($cert->get_notBeforeString); 11 my $cert = shift; 12 not_string2time($cert->get_notAfterString);
|
/macosx-10.9.5/CPANInternal-140/Crypt-SSLeay-0.64/lib/Crypt/SSLeay/ |
H A D | X509.pm | 6 my $cert = shift; 7 not_string2time($cert->get_notBeforeString); 11 my $cert = shift; 12 not_string2time($cert->get_notAfterString);
|
/macosx-10.9.5/ruby-104/ruby/test/openssl/ |
H A D | test_x509cert.rb | 25 cert = issue_cert(@ca, @rsa2048, s, Time.now, Time.now+3600, [], 27 assert_equal(s, cert.serial) 28 cert = OpenSSL::X509::Certificate.new(cert.to_der) 29 assert_equal(s, cert.serial) 46 cert = issue_cert(@ca, pk, 1, Time.now, Time.now+3600, exts, 48 assert_equal(cert.extensions[1].value, 49 OpenSSL::TestUtils.get_subject_key_id(cert)) 50 cert = OpenSSL::X509::Certificate.new(cert [all...] |
/macosx-10.9.5/cups-372.4/cups/scheduler/ |
H A D | cert.c | 2 * "$Id: cert.c 11093 2013-07-03 20:48:42Z msweet $" 48 cupsd_cert_t *cert; /* Current certificate */ local 62 if ((cert = calloc(sizeof(cupsd_cert_t), 1)) == NULL) 69 cert->pid = pid; 70 cert->type = type; 71 strlcpy(cert->username, username, sizeof(cert->username)); 74 cert->certificate[i] = hex[CUPS_RAND() & 15]; 89 free(cert); 257 DEBUG_printf(("ADD pid=%d, username=%s, cert 279 cupsd_cert_t *cert, /* Current certificate */ local 324 cupsd_cert_t *cert, /* Current certificate */ local 363 cupsd_cert_t *cert; /* Current certificate */ local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/regressions/ |
H A D | gencerts.sh | 4 openssl req -x509 -newkey rsa:1024 -sha1 -days 3650 -subj "$SUBJECT" -nodes -keyout privkey-1.pem -out cert-1.pem 5 openssl x509 -in cert-1.pem -out cert-1.der -outform DER 7 openssl pkcs12 -export -passout pass:password -out identity-1.p12 -inkey privkey-1.pem -in cert-1.pem 10 xxd -i cert-1.der cert-1.h
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/ |
H A D | sslSession.c | 66 SSLCertificate *cert; local 79 cert = ctx->peerCert; 81 while (cert) 83 sessionIDLen += 4 + cert->derCert.length; 84 cert = cert->next; 90 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(certChain, ix); local 92 sslDebugLog("SSLAddSessionData: got cert %d of %d\n", (int)ix+1, (int)certCount); 93 if (!cert || CFGetTypeID(cert) ! 247 SSLCertificate *cert; local 250 SecCertificateRef cert; local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/ |
H A D | sslSession.c | 66 SSLCertificate *cert; local 79 cert = ctx->peerCert; 81 while (cert) 83 sessionIDLen += 4 + cert->derCert.length; 84 cert = cert->next; 90 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(certChain, ix); local 92 sslDebugLog("SSLAddSessionData: got cert %d of %d\n", (int)ix+1, (int)certCount); 93 if (!cert || CFGetTypeID(cert) ! 247 SSLCertificate *cert; local 250 SecCertificateRef cert; local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/ |
H A D | sslSession.c | 66 SSLCertificate *cert; local 79 cert = ctx->peerCert; 81 while (cert) 83 sessionIDLen += 4 + cert->derCert.length; 84 cert = cert->next; 90 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(certChain, ix); local 92 sslDebugLog("SSLAddSessionData: got cert %d of %d\n", (int)ix+1, (int)certCount); 93 if (!cert || CFGetTypeID(cert) ! 247 SSLCertificate *cert; local 250 SecCertificateRef cert; local [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/hx509/ |
H A D | test_ca.in | 62 --certificate="FILE:cert-ee.pem" || exit 1 66 cert:FILE:cert-ee.pem \ 69 echo "issue crl (no cert)" 76 cert:FILE:cert-ee.pem \ 80 echo "issue crl (with cert)" 84 FILE:cert-ee.pem || exit 1 88 cert:FILE:cert [all...] |
H A D | test_cert.in | 61 FILE:${srcdir}/data/test.crt PEM-FILE:cert-pem.tmp || exit 1 63 ${hxtool} certificate-copy PEM-FILE:cert-pem.tmp DER-FILE:cert-der.tmp || exit 1 64 ${hxtool} certificate-copy DER-FILE:cert-der.tmp PEM-FILE:cert-pem2.tmp || exit 1 66 cmp cert-pem.tmp cert-pem2.tmp || exit 1 68 echo "verify n0ll cert (fail)" 71 cert:FILE:$srcdir/data/n0ll.pem \ 74 echo "verify n0ll cert (fai [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_smime/ |
H A D | SecCmsRecipientInfo.h | 53 SecCmsRecipientInfoCreate(SecCmsMessageRef cmsg, SecCertificateRef cert); 68 SecCertificateRef cert);
|
H A D | cert.h | 2 * cert.h 41 void CERT_DestroyCertificate(SecCertificateRef cert); 42 SecCertificateRef CERT_DupCertificate(SecCertificateRef cert); 44 // from security/nss/lib/certdb/cert.h 57 CFArrayRef CERT_CertChainFromCert(SecCertificateRef cert, SECCertUsage usage,Boolean includeRoot); 59 CFArrayRef CERT_CertListFromCert(SecCertificateRef cert); 64 SecPublicKeyRef CERT_ExtractPublicKey(SecCertificateRef cert); 66 SECStatus CERT_CheckCertUsage (SecCertificateRef cert,unsigned char usage); 77 // Return the cert if found. "issuerAndSN" is the issuer and serial number to look for 88 // find the smime symmetric capabilities profile for a given cert [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_x509_tp/lib/ |
H A D | tpCrlVerify.cpp | 65 * I.e. when cert verification is complete the cache will be empty. 77 TPCertInfo &cert, 98 TPCertInfo &cert, 102 TPCrlInfo *crl = findCrlForCert(cert); 145 * Find CRL for specified cert. Only returns a fully verified CRL. 147 * to cert's return codes. 164 /* Search inputCrls for a CRL for subject cert */ 257 * Does this cert have a CrlDistributionPoints extension? We don't parse it, we 261 TPCertInfo &cert) 264 CSSM_RETURN crtn = cert 97 search( TPCertInfo &cert, TPVerifyContext &vfyCtx) argument 260 tpCertHasCrlDistPt( TPCertInfo &cert) argument 341 TPCertInfo *cert = certGroup.certAtIndex(certDex); local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_smime/lib/ |
H A D | SecCmsRecipientInfo.h | 53 SecCmsRecipientInfoCreate(SecCmsMessageRef cmsg, SecCertificateRef cert); 68 SecCertificateRef cert);
|
H A D | cert.h | 2 * cert.h 41 void CERT_DestroyCertificate(SecCertificateRef cert); 42 SecCertificateRef CERT_DupCertificate(SecCertificateRef cert); 44 // from security/nss/lib/certdb/cert.h 57 CFArrayRef CERT_CertChainFromCert(SecCertificateRef cert, SECCertUsage usage,Boolean includeRoot); 59 CFArrayRef CERT_CertListFromCert(SecCertificateRef cert); 64 SecPublicKeyRef CERT_ExtractPublicKey(SecCertificateRef cert); 66 SECStatus CERT_CheckCertUsage (SecCertificateRef cert,unsigned char usage); 77 // Return the cert if found. "issuerAndSN" is the issuer and serial number to look for 88 // find the smime symmetric capabilities profile for a given cert [all...] |
/macosx-10.9.5/ruby-104/ruby/lib/drb/ |
H A D | ssl.rb | 128 @cert = config[:SSLCertificate] 160 if @cert && @pkey 178 cert = OpenSSL::X509::Certificate.new 179 cert.version = 3 180 cert.serial = 0 182 cert.subject = name 183 cert.issuer = name 184 cert.not_before = Time.now 185 cert.not_after = Time.now + (365*24*60*60) 186 cert [all...] |
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/rdata/generic/ |
H A D | cert_37.c | 33 dns_cert_t cert; local 48 RETTOK(dns_cert_fromtext(&cert, &token.value.as_textregion)); 49 RETERR(uint16_tobuffer(cert, target)); 169 dns_rdata_cert_t *cert = source; local 173 REQUIRE(cert->common.rdtype == type); 174 REQUIRE(cert->common.rdclass == rdclass); 179 RETERR(uint16_tobuffer(cert->type, target)); 180 RETERR(uint16_tobuffer(cert->key_tag, target)); 181 RETERR(uint8_tobuffer(cert->algorithm, target)); 183 return (mem_tobuffer(target, cert 188 dns_rdata_cert_t *cert = target; local 219 dns_rdata_cert_t *cert = source; local [all...] |
/macosx-10.9.5/ruby-104/ruby/test/rubygems/ |
H A D | test_gem_security.rb | 23 cert = @SEC.create_cert name, key, 60, Gem::Security::EXTENSIONS, 5 25 assert_kind_of OpenSSL::X509::Certificate, cert 27 assert_equal 2, cert.version 28 assert_equal 5, cert.serial 29 assert_equal key.public_key.to_pem, cert.public_key.to_pem 30 assert_in_delta Time.now, cert.not_before, 10 31 assert_in_delta Time.now + 60, cert.not_after, 10 32 assert_equal name.to_s, cert.subject.to_s 34 assert_equal 3, cert.extensions.length, 35 cert [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_x509_cl/lib/ |
H A D | CertFields.cpp | 47 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local 48 const CSSM_DATA &vers = cert.mCert.tbs.version; 62 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local 63 CSSM_DATA &vers = cert.mCert.tbs.version; 65 cert.coder().allocCopyItem(fieldValue, vers); 80 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local 81 tbsGetCheck(cert.certificateToSign->version, index); 87 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local 88 tbsSetCheck(cert.certificateToSign->version, fieldValue, sizeof(uint32), 108 const DecodedCert &cert local 122 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local 144 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local 162 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local 183 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local 201 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local 222 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local 236 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local 253 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local 268 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local 285 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local 299 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local 313 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local 335 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local 344 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local 358 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local 367 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local 388 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local 406 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local 419 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local 437 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local 454 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local 478 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local 520 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local 535 DecodedCert &cert = dynamic_cast<DecodedCert &>(item); local 567 const DecodedCert &cert = dynamic_cast<const DecodedCert &>(item); local [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_codesigning/ |
H A D | csutilities.cpp | 50 bool isAppleCA(SecCertificateRef cert) argument 52 return verifyHash(cert, gAppleAnchorHash); 75 void hashOfCertificate(SecCertificateRef cert, SHA1::Digest digest) argument 77 assert(cert); 79 MacOSError::check(SecCertificateGetData(cert, &certData)); 87 bool verifyHash(SecCertificateRef cert, const Hashing::Byte *digest) argument 90 hashOfCertificate(cert, dig); 99 bool certificateHasField(SecCertificateRef cert, const CSSM_OID &oid) argument 101 assert(cert); 103 switch (OSStatus rc = SecCertificateCopyFirstFieldValue(cert, 135 certificateHasPolicy(SecCertificateRef cert, const CSSM_OID &policyOid) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_codesigning/lib/ |
H A D | csutilities.cpp | 50 bool isAppleCA(SecCertificateRef cert) argument 52 return verifyHash(cert, gAppleAnchorHash); 75 void hashOfCertificate(SecCertificateRef cert, SHA1::Digest digest) argument 77 assert(cert); 79 MacOSError::check(SecCertificateGetData(cert, &certData)); 87 bool verifyHash(SecCertificateRef cert, const Hashing::Byte *digest) argument 90 hashOfCertificate(cert, dig); 99 bool certificateHasField(SecCertificateRef cert, const CSSM_OID &oid) argument 101 assert(cert); 103 switch (OSStatus rc = SecCertificateCopyFirstFieldValue(cert, 135 certificateHasPolicy(SecCertificateRef cert, const CSSM_OID &policyOid) argument [all...] |