/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | secCrypto.c | 60 return SecKeyRawSign(keyRef, kSecPaddingPKCS1, plaintext, plaintextLen, sig, sigLen);
|
H A D | sslKeychain.c | 83 return SecKeyRawSign(keyRef, kSecPaddingPKCS1, plaintext, plaintextLen, sig, sigLen);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | secCrypto.c | 60 return SecKeyRawSign(keyRef, kSecPaddingPKCS1, plaintext, plaintextLen, sig, sigLen);
|
H A D | sslKeychain.c | 83 return SecKeyRawSign(keyRef, kSecPaddingPKCS1, plaintext, plaintextLen, sig, sigLen);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | secCrypto.c | 60 return SecKeyRawSign(keyRef, kSecPaddingPKCS1, plaintext, plaintextLen, sig, sigLen);
|
H A D | sslKeychain.c | 83 return SecKeyRawSign(keyRef, kSecPaddingPKCS1, plaintext, plaintextLen, sig, sigLen);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/regressions/ |
H A D | kc-40-seckey.c | 242 is_status(SecKeyRawSign(privKey, kSecPaddingPKCS1, 246 ok_status(SecKeyRawSign(privKey, kSecPaddingPKCS1, 267 ok_status(!SecKeyRawSign(privKey, kSecPaddingPKCS1MD2, 276 ok_status(!SecKeyRawSign(privKey, kSecPaddingPKCS1MD5, 286 ok_status(SecKeyRawSign(privKey, kSecPaddingPKCS1SHA1, 314 ok_status(SecKeyRawSign(privKey, kSecPaddingPKCS1SHA224, 325 ok_status(SecKeyRawSign(privKey, kSecPaddingPKCS1SHA256, 336 ok_status(SecKeyRawSign(privKey, kSecPaddingPKCS1SHA384, 347 ok_status(SecKeyRawSign(privKey, kSecPaddingPKCS1SHA512, 457 ok_status(SecKeyRawSign(privKey [all...] |
H A D | kc-41-sececkey.c | 195 ok_status(SecKeyRawSign(privKey, kSecPaddingNone, 299 ok_status(SecKeyRawSign(privKey2, kSecPaddingPKCS1,
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-40-seckey.c | 205 is_status(SecKeyRawSign(privKey, kSecPaddingPKCS1, 208 ok_status(SecKeyRawSign(privKey, kSecPaddingPKCS1, 225 ok_status(!SecKeyRawSign(privKey, kSecPaddingPKCS1MD2, 234 ok_status(!SecKeyRawSign(privKey, kSecPaddingPKCS1MD5, 243 ok_status(SecKeyRawSign(privKey, kSecPaddingPKCS1SHA1, 266 ok_status(SecKeyRawSign(privKey, kSecPaddingPKCS1SHA224, 277 ok_status(SecKeyRawSign(privKey, kSecPaddingPKCS1SHA256, 288 ok_status(SecKeyRawSign(privKey, kSecPaddingPKCS1SHA384, 299 ok_status(SecKeyRawSign(privKey, kSecPaddingPKCS1SHA512, 403 ok_status(SecKeyRawSign(privKey [all...] |
H A D | si-41-sececkey.c | 147 ok_status(SecKeyRawSign(privKey, kSecPaddingNone, 251 ok_status(SecKeyRawSign(privKey2, kSecPaddingPKCS1,
|
H A D | si-40-seckey-custom.c | 210 ok_status(SecKeyRawSign(customKey, padding, src, srcLen, dst, &dstLen), 211 "SecKeyRawSign");
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecKey.h | 50 /* For SecKeyRawSign/SecKeyRawVerify only, data to be signed is an MD2 55 /* For SecKeyRawSign/SecKeyRawVerify only, data to be signed is an MD5 60 /* For SecKeyRawSign/SecKeyRawVerify only, data to be signed is a SHA1 65 /* For SecKeyRawSign/SecKeyRawVerify only, data to be signed is a SHA224 70 /* For SecKeyRawSign/SecKeyRawVerify only, data to be signed is a SHA256 75 /* For SecKeyRawSign/SecKeyRawVerify only, data to be signed is a SHA384 80 /* For SecKeyRawSign/SecKeyRawVerify only, data to be signed is a SHA512 153 @function SecKeyRawSign 180 OSStatus SecKeyRawSign(
|
H A D | SecKey.c | 520 OSStatus SecKeyRawSign( function 910 return SecKeyRawSign(this, kSecPaddingPKCS1, 948 return SecKeyRawSign(this, kSecPaddingPKCS1,
|
H A D | SecCertificateRequest.c | 747 require_noerr_quiet(SecKeyRawSign(privateKey, kSecPaddingPKCS1SHA1, 814 require_noerr_quiet(SecKeyRawSign(privateKey, kSecPaddingPKCS1SHA1, 1030 require_noerr_quiet(SecKeyRawSign(privateKey, kSecPaddingPKCS1SHA1, 1139 require_noerr_quiet(SecKeyRawSign(privateKey, kSecPaddingPKCS1SHA1,
|
/macosx-10.10/Security-57031.1.35/SecurityTests/regressions/kc/ |
H A D | kc-50-iPhone-emulation.c | 83 result = SecKeyRawSign(privateKey, paddings[n], (uint8_t*) data, strlen(data), signature, &signatureLength); 84 ok_status(result, "SecKeyRawSign"); 168 result = SecKeyRawSign(privateKey, paddings[n], (uint8_t*) data, strlen(data), signature, &signatureLength); 169 ok_status(result, "SecKeyRawSign");
|
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecKeyPriv.h | 197 @function SecKeyRawSign 220 OSStatus SecKeyRawSign(
|
H A D | SecKey.cpp | 825 SecKeyRawSign( function 1742 return SecKeyRawSign(key, kSecPaddingPKCS1,
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecKeyPriv.h | 197 @function SecKeyRawSign 220 OSStatus SecKeyRawSign(
|
H A D | SecKey.cpp | 825 SecKeyRawSign( function 1742 return SecKeyRawSign(key, kSecPaddingPKCS1,
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecKeyPriv.h | 197 @function SecKeyRawSign 220 OSStatus SecKeyRawSign(
|
H A D | SecKey.cpp | 825 SecKeyRawSign( function 1742 return SecKeyRawSign(key, kSecPaddingPKCS1,
|
/macosx-10.10/Heimdal-398.1.2/lib/hx509/ |
H A D | ks_keychain.c | 285 status = SecKeyRawSign(kc->pkey, 314 status = SecKeyRawSign(kc->pkey,
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | crypto_cssm.c | 337 status = SecKeyRawSign(privateKeyRef, kSecPaddingPKCS1, (uint8_t*)hash->v,
|
/macosx-10.10/Security-57031.1.35/Security/sec/SOSCircle/SecureObjectSync/ |
H A D | SOSPeerInfo.c | 139 if((stat = SecKeyRawSign(privkey, kSecPaddingNone, hbuf, di->output_size, sig, &siglen)) != 0) {
|
H A D | SOSCircle.c | 275 OSStatus stat = SecKeyRawSign(privKey, kSecPaddingNone, hash_result, di->output_size, tmp, &tmplen); 278 secerror("Bad Circle SecKeyRawSign, stat: %ld", (long)stat); 279 SOSCreateError(kSOSErrorBadFormat, CFSTR("Bad Circle SecKeyRawSign"), (error != NULL) ? *error : NULL, error);
|