/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_csp/lib/ |
H A D | DH_exchange.cpp | 41 DH *privKey = contextToDhKey(context, session, CSSM_ATTRIBUTE_KEY, local
|
H A D | AppleCSPContext.cpp | 93 generate( const Context &context, AppleCSPSession &session, CssmKey &pubKey, BinaryKey *pubBinKey, CssmKey &privKey, BinaryKey *privBinKey) argument
|
H A D | DH_keys.cpp | 165 generate( const Context &context, CssmKey &pubKey, CssmKey &privKey) argument
|
H A D | FEEAsymmetricContext.cpp | 530 feePubKey privKey = contextToFeeKey(context, session, CSSM_ATTRIBUTE_KEY, local
|
H A D | FEEKeys.cpp | 224 generate( const Context &context, CssmKey &pubKey, CssmKey &privKey) argument
|
H A D | bsafeKeyGen.cpp | 111 generate( const Context &context, CssmKey &pubKey, CssmKey &privKey) argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/regressions/ |
H A D | ssl-41-clientauth.c | 297 SecKeyRef privKey = NULL; local [all...] |
H A D | ssl-40-clientauth.c | 308 SecKeyRef privKey = NULL; local 352 SecKeyRef privKey = NULL; local [all...] |
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/ |
H A D | si-64-ossl-cms.c | 148 SecKeyRef privKey = NULL; local
|
H A D | si-40-seckey.c | 30 static void testdigestandsignalg(SecKeyRef privKey, SecKeyRef pubKey, const SecAsn1AlgId *algId) { argument 69 static void testdigestandsign(SecKeyRef privKey, SecKeyRef pubKey) { argument 111 static void test_encrypt_decrypt(SecKeyRef pubKey, SecKeyRef privKey, uint32_t padding, size_t keySizeInBytes) argument 160 SecKeyRef pubKey = NULL, privKey = NULL; local 329 SecKeyRef pubKey = NULL, privKey = NULL; local [all...] |
H A D | si-41-sececkey.c | 39 static void testdigestandsignalg(SecKeyRef privKey, SecKeyRef pubKey, const SecAsn1AlgId *algId) { argument 79 static void testdigestandsign(SecKeyRef privKey, SecKeyRef pubKey) { argument 105 SecKeyRef pubKey = NULL, privKey = NULL; local 172 SecKeyRef pubKey = NULL, privKey = NULL; local [all...] |
H A D | si-42-identity.c | 455 SecKeyRef privKey = NULL; local
|
/macosx-10.9.5/Security-55471.14.18/include/security_smime/ |
H A D | cmsreclist.c | 191 SecPrivateKeyRef privKey = NULL; local
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_smime/lib/ |
H A D | cmsreclist.c | 191 SecPrivateKeyRef privKey = NULL; local
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_csp/tests/ |
H A D | t-rsa.cpp | 59 B_KEY_OBJ privKey = NULL; check(B_CreateKeyObject(&privKey)); local
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/ |
H A D | sslKeychain.c | 339 SecKeyRef privKey = NULL; /* Retained */ local
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/ |
H A D | sslKeychain.c | 339 SecKeyRef privKey = NULL; /* Retained */ local
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/ |
H A D | sslKeychain.c | 339 SecKeyRef privKey = NULL; /* Retained */ local
|
/macosx-10.9.5/Security-55471.14.18/include/security_pkcs12/ |
H A D | pkcs12Crypto.cpp | 372 p12UnwrapKey( CSSM_CSP_HANDLE cspHand, CSSM_DL_DB_HANDLE_PTR dlDbHand, int keyIsPermanent, const CSSM_DATA &shroudedKeyBits, CSSM_ALGORITHMS keyAlg, CSSM_ALGORITHMS encrAlg, CSSM_ALGORITHMS pbeHashAlg, uint32 keySizeInBits, uint32 blockSizeInBytes, CSSM_PADDING padding, CSSM_ENCRYPT_MODE mode, uint32 iterCount, const CSSM_DATA &salt, const CSSM_DATA *pwd, const CSSM_KEY *passKey, SecNssCoder &coder, const CSSM_DATA &labelData, SecAccessRef access, bool noAcl, CSSM_KEYUSE keyUsage, CSSM_KEYATTR_FLAGS keyAttrs, CSSM_KEY_PTR &privKey) argument 544 p12WrapKey( CSSM_CSP_HANDLE cspHand, CSSM_KEY_PTR privKey, const CSSM_ACCESS_CREDENTIALS *privKeyCreds, CSSM_ALGORITHMS keyAlg, CSSM_ALGORITHMS encrAlg, CSSM_ALGORITHMS pbeHashAlg, uint32 keySizeInBits, uint32 blockSizeInBytes, CSSM_PADDING padding, CSSM_ENCRYPT_MODE mode, uint32 iterCount, const CSSM_DATA &salt, const CSSM_DATA *pwd, const CSSM_KEY *passKey, SecNssCoder &coder, CSSM_DATA &shroudedKeyBits) argument
|
H A D | pkcs12Decode.cpp | 251 CSSM_KEY_PTR privKey = (CSSM_KEY_PTR)mCoder.malloc(sizeof(CSSM_KEY)); local
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/regressions/ |
H A D | kc-41-sececkey.c | 44 static void testdigestandsignalg(SecKeyRef privKey, SecKeyRef pubKey, const SecAsn1AlgId *algId) { argument 84 static void testdigestandsign(SecKeyRef privKey, SecKeyRef pubKey) { argument 153 SecKeyRef pubKey = NULL, privKey = NULL; local 225 SecKeyRef pubKey = NULL, privKey = NULL; local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_pkcs12/lib/ |
H A D | pkcs12Crypto.cpp | 372 p12UnwrapKey( CSSM_CSP_HANDLE cspHand, CSSM_DL_DB_HANDLE_PTR dlDbHand, int keyIsPermanent, const CSSM_DATA &shroudedKeyBits, CSSM_ALGORITHMS keyAlg, CSSM_ALGORITHMS encrAlg, CSSM_ALGORITHMS pbeHashAlg, uint32 keySizeInBits, uint32 blockSizeInBytes, CSSM_PADDING padding, CSSM_ENCRYPT_MODE mode, uint32 iterCount, const CSSM_DATA &salt, const CSSM_DATA *pwd, const CSSM_KEY *passKey, SecNssCoder &coder, const CSSM_DATA &labelData, SecAccessRef access, bool noAcl, CSSM_KEYUSE keyUsage, CSSM_KEYATTR_FLAGS keyAttrs, CSSM_KEY_PTR &privKey) argument 544 p12WrapKey( CSSM_CSP_HANDLE cspHand, CSSM_KEY_PTR privKey, const CSSM_ACCESS_CREDENTIALS *privKeyCreds, CSSM_ALGORITHMS keyAlg, CSSM_ALGORITHMS encrAlg, CSSM_ALGORITHMS pbeHashAlg, uint32 keySizeInBits, uint32 blockSizeInBytes, CSSM_PADDING padding, CSSM_ENCRYPT_MODE mode, uint32 iterCount, const CSSM_DATA &salt, const CSSM_DATA *pwd, const CSSM_KEY *passKey, SecNssCoder &coder, CSSM_DATA &shroudedKeyBits) argument
|
H A D | pkcs12Decode.cpp | 251 CSSM_KEY_PTR privKey = (CSSM_KEY_PTR)mCoder.malloc(sizeof(CSSM_KEY)); local
|
/macosx-10.9.5/Security-55471.14.18/sec/SOSCircle/SecureObjectSync/ |
H A D | SOSCircle.c | 207 bool SOSCircleSign(SOSCircleRef circle, SecKeyRef privKey, CFErrorRef *error) { argument
|
H A D | SOSPeerInfo.c | 129 static bool SOSPeerInfoSign(SecKeyRef privKey, SOSPeerInfoRef peer, CFErrorRef *error) { argument
|