/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_asn1/security_asn1/ |
H A D | ocspTemplates.c | 38 offsetof(SecAsn1OCSPCertID, algId), 65 offsetof(SecAsn1OCSPSignature, algId), 210 offsetof(SecAsn1OCSPBasicResponse, algId),
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/ |
H A D | SecOCSPResponse.c | 482 if (!SecAsn1OidCompare(algorithm, &certId->algId.algorithm) || 483 !SecAsn1OidCompare(parameters, &certId->algId.parameters)) { 484 algorithm = &certId->algId.algorithm; 485 parameters = &certId->algId.parameters; 550 return SecKeyDigestAndVerify(key, &this->basicResponse.algId,
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/ocspTool/ |
H A D | ocspTool.cpp | 184 /* algId refers to the hash we'll perform in issuer name and key */ 185 certId.algId.algorithm = CSSMOID_SHA1; 186 certId.algId.parameters.Data = nullParam; 187 certId.algId.parameters.Length = sizeof(nullParam); 370 /* algId refers to the hash we'll perform in issuer name and key */ 371 certId.algId.algorithm = CSSMOID_SHA1; 372 certId.algId.parameters.Data = nullParam; 373 certId.algId.parameters.Length = sizeof(nullParam); 457 printf("algId : "); 458 printDataAsHex(&certID->algId [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/ |
H A D | SecCertificatePath.c | 412 const DERAlgorithmId *algId = local 415 if (algId->params.length != 0) { 416 params = &algId->params; 423 if (!DEROidCompare(&algId->oid, &chain_algId->oid)) { 434 SecAsn1Oid oid1 = { .Data = algId->oid.data, .Length = algId->oid.length };
|
H A D | SecDH.c | 227 DERItem algId; local 229 algId.data = (uint8_t *)alg; 230 algId.length = alg_len; 232 DERReturn drtn = DERParseSequence(&algId,
|
H A D | p12import.c | 139 const SecAsn1AlgId *algId, NSS_P12_PBE_Params *pbeParams/*optional*/) 142 const SecAsn1Item *param = &algId->parameters; 153 static int p12Decrypt(pkcs12_context * context, const SecAsn1AlgId *algId, argument 158 algIdParse(context, algId, &pbep); 164 require_noerr_quiet(pkcsOidToParams(&algId->algorithm, &alg, &keySizeInBits, 138 algIdParse(pkcs12_context * context, const SecAsn1AlgId *algId, NSS_P12_PBE_Params *pbeParams ) argument
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | FEEAsymmetricContext.cpp | 513 * Optionally performs X9.63 key derivation if algId == 519 CSSM_ALGORITHMS algId, 535 if((algId == CSSM_ALGID_ECDH) & (privSize != keyData->Length)) { 565 switch(algId) { 517 DeriveKey_ECDH( const Context &context, CSSM_ALGORITHMS algId, const CssmData &Param, CSSM_DATA *keyData, AppleCSPSession &session) argument
|
H A D | FEEKeys.cpp | 288 CSSM_ALGORITHMS algId = context.algorithm(); local 310 switch(algId) {
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_ocspd/ |
H A D | ocspResponse.cpp | 105 /* algId refers to the hash we'll perform in issuer name and key */ 106 certID.algId.algorithm = CSSMOID_SHA1; 107 certID.algId.parameters.Data = nullParam; 108 certID.algId.parameters.Length = sizeof(nullParam); 152 const CSSM_OID *alg = &exist.algId.algorithm;
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/libDER/libDER/ |
H A D | DER_Keys.c | 61 { DER_OFFSET(DERSubjPubKeyInfo, algId),
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ocspd/common/ |
H A D | ocspResponse.cpp | 105 /* algId refers to the hash we'll perform in issuer name and key */ 106 certID.algId.algorithm = CSSMOID_SHA1; 107 certID.algId.parameters.Data = nullParam; 108 certID.algId.parameters.Length = sizeof(nullParam); 152 const CSSM_OID *alg = &exist.algId.algorithm;
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | sslCrypto.c | 304 CFIndex algId; local 332 algId = SecKeyGetAlgorithmID(pubkey); 334 algId = SecKeyGetAlgorithmId(pubkey); 339 switch(algId) {
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | sslCrypto.c | 304 CFIndex algId; local 332 algId = SecKeyGetAlgorithmID(pubkey); 334 algId = SecKeyGetAlgorithmId(pubkey); 339 switch(algId) {
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | sslCrypto.c | 304 CFIndex algId; local 332 algId = SecKeyGetAlgorithmID(pubkey); 334 algId = SecKeyGetAlgorithmId(pubkey); 339 switch(algId) {
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/p12/ |
H A D | p12Parse.cpp | 309 const CSSM_X509_ALGORITHM_IDENTIFIER &algId, 315 printf("encrAlg = %s\n", oidStr(algId.algorithm, pinfo.mParser)); 316 const CSSM_DATA ¶m = algId.parameters; 375 const CSSM_X509_ALGORITHM_IDENTIFIER &algId = ci.encrAlg; local 376 if(p12AlgIdParse(algId, pbep, pinfo, depth)) { 442 const CSSM_X509_ALGORITHM_IDENTIFIER &algId = keyBag->algorithm; local 444 if(p12AlgIdParse(algId, &pbep, pinfo, depth)) { 466 bool found = pkcsOidToParams(&algId.algorithm, 470 bool found = pkcsOidToParams(&algId.algorithm, 308 p12AlgIdParse( const CSSM_X509_ALGORITHM_IDENTIFIER &algId, NSS_P12_PBE_Params *pbeParams, P12ParseInfo &pinfo, unsigned depth) argument
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/p12Parse/ |
H A D | p12Parse.cpp | 312 const CSSM_X509_ALGORITHM_IDENTIFIER &algId, 318 printf("encrAlg = %s\n", oidStr(algId.algorithm, pinfo.mParser)); 319 const CSSM_DATA ¶m = algId.parameters; 378 const CSSM_X509_ALGORITHM_IDENTIFIER &algId = ci.encrAlg; local 379 if(p12AlgIdParse(algId, pbep, pinfo, depth)) { 445 const CSSM_X509_ALGORITHM_IDENTIFIER &algId = keyBag->algorithm; local 447 if(p12AlgIdParse(algId, &pbep, pinfo, depth)) { 469 bool found = pkcsOidToParams(&algId.algorithm, 473 bool found = pkcsOidToParams(&algId.algorithm, 311 p12AlgIdParse( const CSSM_X509_ALGORITHM_IDENTIFIER &algId, NSS_P12_PBE_Params *pbeParams, P12ParseInfo &pinfo, unsigned depth) argument
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecKey.cpp | 1514 static OSStatus SecKeyGetDigestInfo(SecKeyRef key, const SecAsn1AlgId *algId, argument 1525 if ((algId->algorithm.Length == CSSMOID_RSA.Length) && 1526 !memcmp(algId->algorithm.Data, CSSMOID_RSA.Data, 1527 algId->algorithm.Length - 1)) { 1529 switch (algId->algorithm.Data[algId->algorithm.Length - 1]) { 1577 } else if ((algId->algorithm.Length == CSSMOID_ECDSA_WithSHA224.Length) && 1578 !memcmp(algId->algorithm.Data, CSSMOID_ECDSA_WithSHA224.Data, 1579 algId->algorithm.Length - 1)) { 1581 switch (algId 1706 SecKeyVerifyDigest( SecKeyRef key, const SecAsn1AlgId *algId, const uint8_t *digestData, size_t digestDataLen, const uint8_t *sig, size_t sigLen) argument 1726 SecKeySignDigest( SecKeyRef key, const SecAsn1AlgId *algId, const uint8_t *digestData, size_t digestDataLen, uint8_t *sig, size_t *sigLen) argument [all...] |
H A D | SecKeyPriv.h | 315 const SecAsn1AlgId *algId, /* algorithm oid/params */ 323 const SecAsn1AlgId *algId, /* algorithm oid/params */
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecKey.cpp | 1514 static OSStatus SecKeyGetDigestInfo(SecKeyRef key, const SecAsn1AlgId *algId, argument 1525 if ((algId->algorithm.Length == CSSMOID_RSA.Length) && 1526 !memcmp(algId->algorithm.Data, CSSMOID_RSA.Data, 1527 algId->algorithm.Length - 1)) { 1529 switch (algId->algorithm.Data[algId->algorithm.Length - 1]) { 1577 } else if ((algId->algorithm.Length == CSSMOID_ECDSA_WithSHA224.Length) && 1578 !memcmp(algId->algorithm.Data, CSSMOID_ECDSA_WithSHA224.Data, 1579 algId->algorithm.Length - 1)) { 1581 switch (algId 1706 SecKeyVerifyDigest( SecKeyRef key, const SecAsn1AlgId *algId, const uint8_t *digestData, size_t digestDataLen, const uint8_t *sig, size_t sigLen) argument 1726 SecKeySignDigest( SecKeyRef key, const SecAsn1AlgId *algId, const uint8_t *digestData, size_t digestDataLen, uint8_t *sig, size_t *sigLen) argument [all...] |
H A D | SecKeyPriv.h | 315 const SecAsn1AlgId *algId, /* algorithm oid/params */ 323 const SecAsn1AlgId *algId, /* algorithm oid/params */
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecKey.cpp | 1514 static OSStatus SecKeyGetDigestInfo(SecKeyRef key, const SecAsn1AlgId *algId, argument 1525 if ((algId->algorithm.Length == CSSMOID_RSA.Length) && 1526 !memcmp(algId->algorithm.Data, CSSMOID_RSA.Data, 1527 algId->algorithm.Length - 1)) { 1529 switch (algId->algorithm.Data[algId->algorithm.Length - 1]) { 1577 } else if ((algId->algorithm.Length == CSSMOID_ECDSA_WithSHA224.Length) && 1578 !memcmp(algId->algorithm.Data, CSSMOID_ECDSA_WithSHA224.Data, 1579 algId->algorithm.Length - 1)) { 1581 switch (algId 1706 SecKeyVerifyDigest( SecKeyRef key, const SecAsn1AlgId *algId, const uint8_t *digestData, size_t digestDataLen, const uint8_t *sig, size_t sigLen) argument 1726 SecKeySignDigest( SecKeyRef key, const SecAsn1AlgId *algId, const uint8_t *digestData, size_t digestDataLen, uint8_t *sig, size_t *sigLen) argument [all...] |
H A D | SecKeyPriv.h | 315 const SecAsn1AlgId *algId, /* algorithm oid/params */ 323 const SecAsn1AlgId *algId, /* algorithm oid/params */
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_pkcs12/ |
H A D | pkcs12Coder.h | 247 const CSSM_X509_ALGORITHM_IDENTIFIER &algId, 316 CSSM_X509_ALGORITHM_IDENTIFIER &algId,
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_pkcs12/lib/ |
H A D | pkcs12Coder.h | 247 const CSSM_X509_ALGORITHM_IDENTIFIER &algId, 316 CSSM_X509_ALGORITHM_IDENTIFIER &algId,
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_x509_cl/lib/ |
H A D | clNssUtils.cpp | 547 CSSM_X509_ALGORITHM_IDENTIFIER &algId) 554 algId.parameters = encNullData; 592 CSSM_X509_ALGORITHM_IDENTIFIER &algId = nssKeyInfo.algorithm; local 593 coder.allocCopyItem(*oid, algId.algorithm); 596 CL_nullAlgParams(algId); 1333 CssmOwnedData &algId, // ditto 1348 /* tbsBlob and algId are raw ASN_ANY including tags, which we pass 1351 algId.copy(nssObj.signatureAlgorithm.Data, 1366 const CssmData &algId, // ditto 1373 nssObj.signatureAlgorithm.Data = algId 546 CL_nullAlgParams( CSSM_X509_ALGORITHM_IDENTIFIER &algId) argument 1330 CL_certCrlDecodeComponents( const CssmData &signedItem, CssmOwnedData &tbsBlob, CssmOwnedData &algId, CssmOwnedData &rawSig) argument 1364 CL_certEncodeComponents( const CssmData &TBSCert, const CssmData &algId, const CssmData &rawSig, CssmOwnedData &signedCert) argument [all...] |