/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/dotMacTool/ |
H A D | keyPicker.cpp | 34 SecKeyRef *privKey) // RETURNED 31 keyPicker( SecKeychainRef kcRef, SecKeyRef *pubKey, SecKeyRef *privKey) argument
|
H A D | keyPicker.h | 40 SecKeyRef *privKey); // RETURNED
|
/macosx-10.10/OpenSSL098-52/src/demos/maurice/ |
H A D | example2.c | 34 EVP_PKEY *privKey; local 39 privKey = ReadPrivateKey(PRIVFILE); 40 if (!privKey) 49 EVP_PKEY_free(privKey); 66 RSA_private_decrypt(len, buf, buf2, privKey->pkey.rsa,RSA_PKCS1_PADDING); 70 EVP_PKEY_free(privKey);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | DH_exchange.cpp | 41 DH *privKey = contextToDhKey(context, session, CSSM_ATTRIBUTE_KEY, local 43 if(privKey == NULL) { 46 cspDhDebug("DeriveKey_DH, privKey %p", privKey); 47 privSize = DH_size(privKey); 85 int rtn = DH_compute_key(buf, pubKeyBn, privKey); 105 DH_free(privKey);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/clAppUtils/ |
H A D | keyPicker.h | 54 SecKeyRef *privKey); // RETURNED
|
/macosx-10.10/BerkeleyDB-21/db/java/src/com/sleepycat/util/keyrange/ |
H A D | RangeCursor.java | 65 private DatabaseEntry privKey; field in class:RangeCursor 132 privKey = new DatabaseEntry(); 136 privKey = null; 163 privKey = key; 210 swapData(key, privKey); 271 KeyRange.copy(range.beginKey, privKey); 300 KeyRange.copy(range.beginKey, privKey); 310 KeyRange.copy(range.beginKey, privKey); 314 range.compare(privKey, range.beginKey) == 0) { 319 !range.check(privKey)) { [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/regressions/ |
H A D | kc-41-sececkey.c | 59 static void testdigestandsignalg(SecKeyRef privKey, SecKeyRef pubKey, const SecAsn1AlgId *algId) { argument 62 size_t sigLen = SecKeyGetSize(privKey, kSecKeySignatureSize); 79 ok_status(status = SecKeyDigestAndSign(privKey, algId, dataToDigest, dataToDigestLen, 99 static void testdigestandsign(SecKeyRef privKey, SecKeyRef pubKey) { argument 120 testdigestandsignalg(privKey, pubKey, &algId); 168 SecKeyRef pubKey = NULL, privKey = NULL; local 178 ok_status(status = SecKeyGeneratePair(kgp, &pubKey, &privKey), 187 ok(privKey, "privKey returned"); 189 is(SecKeyGetSize(privKey, kSecKeyKeySizeInBit 240 SecKeyRef pubKey = NULL, privKey = NULL; local [all...] |
H A D | kc-40-seckey.c | 49 static void testdigestandsignalg(SecKeyRef privKey, SecKeyRef pubKey, const SecAsn1AlgId *algId) { argument 52 size_t sigLen = SecKeyGetSize(privKey, kSecKeySignatureSize); 69 ok_status(status = SecKeyDigestAndSign(privKey, algId, dataToDigest, dataToDigestLen, 88 static void testdigestandsign(SecKeyRef privKey, SecKeyRef pubKey) { argument 114 testdigestandsignalg(privKey, pubKey, &algId); 135 static void test_encrypt_decrypt(SecKeyRef pubKey, SecKeyRef privKey, uint32_t padding, size_t keySizeInBytes) argument 167 ok_status(SecKeyDecrypt(privKey, padding, 211 SecKeyRef pubKey = NULL, privKey = NULL; local 221 ok_status(status = SecKeyGeneratePair(kgp, &pubKey, &privKey), 230 ok(privKey, "privKe 400 SecKeyRef pubKey = NULL, privKey = NULL; local [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-41-sececkey.c | 53 static void testdigestandsignalg(SecKeyRef privKey, SecKeyRef pubKey, const SecAsn1AlgId *algId) { argument 56 size_t sigLen = SecKeyGetSize(privKey, kSecKeySignatureSize); 73 ok_status(status = SecKeyDigestAndSign(privKey, algId, dataToDigest, dataToDigestLen, 93 static void testdigestandsign(SecKeyRef privKey, SecKeyRef pubKey) { argument 114 testdigestandsignalg(privKey, pubKey, &algId); 119 SecKeyRef pubKey = NULL, privKey = NULL; local 130 ok_status(status = SecKeyGeneratePair(kgp, &pubKey, &privKey), 139 ok(privKey, "privKey returned"); 141 is(SecKeyGetSize(privKey, kSecKeyKeySizeInBit 186 SecKeyRef pubKey = NULL, privKey = NULL; local 279 SecKeyRef pubKey = NULL, privKey = NULL; local [all...] |
H A D | si-40-seckey.c | 45 static void testdigestandsignalg(SecKeyRef privKey, SecKeyRef pubKey, const SecAsn1AlgId *algId) { argument 48 size_t sigLen = SecKeyGetSize(privKey, kSecKeySignatureSize); 65 ok_status(status = SecKeyDigestAndSign(privKey, algId, dataToDigest, dataToDigestLen, 84 static void testdigestandsign(SecKeyRef privKey, SecKeyRef pubKey) { argument 110 testdigestandsignalg(privKey, pubKey, &algId); 126 static void test_encrypt_decrypt(SecKeyRef pubKey, SecKeyRef privKey, uint32_t padding, size_t keySizeInBytes) argument 158 ok_status(SecKeyDecrypt(privKey, padding, 175 SecKeyRef pubKey = NULL, privKey = NULL; local 186 ok_status(status = SecKeyGeneratePair(kgp, &pubKey, &privKey), 195 ok(privKey, "privKe 345 SecKeyRef pubKey = NULL, privKey = NULL; local [all...] |
H A D | si-64-ossl-cms.c | 163 SecKeyRef privKey = NULL; local 167 isnt(privKey = SecKeyCreateRSAPrivateKey(NULL, privkey_der, privkey_der_len, kSecKeyEncodingPkcs1), NULL, "create private key"); 168 isnt(identity = SecIdentityCreate(NULL, cert, privKey), NULL, "create identity"); 169 CFReleaseSafe(privKey);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/certLabelTest/ |
H A D | certLabelTest.cpp | 116 CSSM_KEY_PTR privKey, 167 privKey, 288 CSSM_KEY privKey; local 294 &privKey, CSSM_FALSE, CSSM_KEYUSE_ANY, CSSM_KEYBLOB_RAW_FORMAT_NONE, 312 cspHand, clHand, &privKey, &pubKey, 322 cspHand, clHand, &privKey, &pubKey, 332 cspHand, clHand, &privKey, &pubKey, 342 cspHand, clHand, &privKey, &pubKey, 352 cspHand, clHand, &privKey, &pubKey, 363 cspHand, clHand, &privKey, 111 doTest( const char *testName, bool quiet, CSSM_CSP_HANDLE cspHand, CSSM_CL_HANDLE clHand, CSSM_KEY_PTR privKey, CSSM_KEY_PTR pubKey, const void *name1Val, CSSM_SIZE name1Len, CSSM_BER_TAG berTag1, const CSSM_OID *name1Oid, const void *name2Val, CSSM_SIZE name2Len, CSSM_BER_TAG berTag2, const CSSM_OID *name2Oid, CFStringRef expectedLabel, bool labelIsCommonName) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | sslKeychain.c | 122 SecKeyRef privKey = NULL; /* Retained */ local 148 * privKey, pubKey. 174 ortn = SecIdentityCopyPrivateKey(identity, &privKey); 209 if(sslPrivKeyGetAlgorithmID(privKey)!=kSecRSAAlgorithmID) { 215 *sslPrivKey = tls_private_key_rsa_create(privKey, SecKeyGetBlockSize(privKey), mySSLPrivKeyRSA_sign, mySSLPrivKeyRSA_decrypt); 229 CFReleaseSafe(privKey);
|
H A D | sslCrypto.h | 53 CFIndex sslPrivKeyGetAlgorithmID(SecKeyRef privKey);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | sslKeychain.c | 122 SecKeyRef privKey = NULL; /* Retained */ local 148 * privKey, pubKey. 174 ortn = SecIdentityCopyPrivateKey(identity, &privKey); 209 if(sslPrivKeyGetAlgorithmID(privKey)!=kSecRSAAlgorithmID) { 215 *sslPrivKey = tls_private_key_rsa_create(privKey, SecKeyGetBlockSize(privKey), mySSLPrivKeyRSA_sign, mySSLPrivKeyRSA_decrypt); 229 CFReleaseSafe(privKey);
|
H A D | sslCrypto.h | 53 CFIndex sslPrivKeyGetAlgorithmID(SecKeyRef privKey);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | sslKeychain.c | 122 SecKeyRef privKey = NULL; /* Retained */ local 148 * privKey, pubKey. 174 ortn = SecIdentityCopyPrivateKey(identity, &privKey); 209 if(sslPrivKeyGetAlgorithmID(privKey)!=kSecRSAAlgorithmID) { 215 *sslPrivKey = tls_private_key_rsa_create(privKey, SecKeyGetBlockSize(privKey), mySSLPrivKeyRSA_sign, mySSLPrivKeyRSA_decrypt); 229 CFReleaseSafe(privKey);
|
H A D | sslCrypto.h | 53 CFIndex sslPrivKeyGetAlgorithmID(SecKeyRef privKey);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/genKeyPair/ |
H A D | genKeyPair.cpp | 36 CSSM_KEY_PTR privKey, // mallocd by caller 70 memset(privKey, 0, sizeof(CSSM_KEY)); 128 privKey); 215 CSSM_KEY privKey; local 225 &privKey, 234 cspFreeKey(cspHand, &privKey); 28 genKeyPair(CSSM_CSP_HANDLE cspHand, CSSM_DL_DB_HANDLE dlDbHand, uint32 algorithm, const char *keyLabel, unsigned keyLabelLen, uint32 keySize, CSSM_KEY_PTR pubKey, uint32 pubKeyUsage, CSSM_KEY_PTR privKey, uint32 privKeyUsage) argument
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/threadTest/ |
H A D | signVerify.cpp | 24 CSSM_KEY privKey; member in struct:__anon5281 55 &svParams->privKey, 94 &svParams->privKey,
|
H A D | rsaSign.cpp | 45 B_KEY_OBJ *privKey) 120 brtn = B_CreateKeyObject(privKey); 128 *privKey, 143 B_KEY_OBJ privKey, 167 privKey, 249 B_KEY_OBJ privKey; member in struct:__anon5280 263 &svParams->privKey); 300 svParams->privKey, 41 RsaGenKeyPair( const TestParams *testParams, unsigned keySize, B_KEY_OBJ *pubKey, B_KEY_OBJ *privKey) argument 141 rsaSign( const TestParams *testParams, B_KEY_OBJ privKey, const CSSM_DATA *ptext, uint8 *sigBytes, unsigned maxSigSize, unsigned *actSigSize) argument
|
/macosx-10.10/OpenSSL098-52/src/demos/engines/ibmca/ |
H A D | hw_ibmca.c | 641 ICA_KEY_RSA_CRT *privKey=NULL;
local 669 !bn_wexpand(key, sizeof(*privKey)/BN_BYTES ))
676 privKey = (ICA_KEY_RSA_CRT *)key->d;
682 if ( keyRecordSize > sizeof(privKey->keyRecord )) {
699 memset(privKey, 0, sizeof(ICA_KEY_RSA_CRT));
700 privKey->keyType = CORRECT_ENDIANNESS(CRT_KEY_TYPE);
701 privKey->keyLength = CORRECT_ENDIANNESS(sizeof(ICA_KEY_RSA_CRT));
702 privKey->modulusBitLength =
708 privKey->pLength = CORRECT_ENDIANNESS(BN_num_bytes(p)+8);
709 privKey [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/keyStoreLeak/ |
H A D | keyStoreLeak.c | 48 CSSM_KEY_PTR privKey, // mallocd by caller 65 memset(privKey, 0, sizeof(CSSM_KEY)); 97 privKey); 105 if(privKey->KeyHeader.BlobType != CSSM_KEYBLOB_REFERENCE) { 106 printf("privKey blob type: exp %u got %u\n", 107 CSSM_KEYBLOB_REFERENCE, (unsigned)privKey->KeyHeader.BlobType); 112 CSSM_KEYBLOB_REFERENCE, (unsigned)privKey->KeyHeader.BlobType); 120 CSSM_KEYBLOB_RAW, (unsigned)privKey->KeyHeader.BlobType); 151 CSSM_KEY privKey; local 196 &privKey, 41 genKeyPair(CSSM_CSP_HANDLE cspHand, CSSM_DL_HANDLE dlHand, CSSM_DB_HANDLE dbHand, const CSSM_DATA_PTR keyLabel, CSSM_KEY_PTR pubKey, uint32 pubKeyUsage, uint32 pubKeyAttr, CSSM_KEY_PTR privKey, uint32 privKeyUsage, uint32 privKeyAttr, uint32 keyGenAlg) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/SOSCircle/SecureObjectSync/ |
H A D | SOSAccountCredentials.c | 55 static void SOSAccountGenerationSignatureUpdate(SOSAccountRef account, SecKeyRef privKey) { argument 66 require_quiet(SOSFullPeerInfoUpgradeSignatures(cloud_fpi, privKey, NULL), gen_sign); 70 SOSCircleGenerationUpdate(circle, privKey, fpi, NULL); 80 static void SOSAccountPeerSignatureUpdate(SOSAccountRef account, SecKeyRef privKey) { argument 84 SOSFullPeerInfoUpgradeSignatures(fpi, privKey, NULL); 105 static void SOSAccountSetTrustedUserPublicKey(SOSAccountRef account, bool public_was_trusted, SecKeyRef privKey) argument 107 if (!privKey) return; 108 SecKeyRef publicKey = SecKeyCreatePublicFromPrivate(privKey);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/ssl2Padding/ |
H A D | ssl2Padding.cpp | 216 CSSM_KEY_PTR privKey, 233 rtn = doRsaDecrypt(cspHand, privKey, decrPad, quiet, expectResult, &ctext, &rptext); 308 CSSM_KEY privKey; local 314 &privKey, CSSM_TRUE /* ref */, CSSM_KEYUSE_ANY, CSSM_KEYBLOB_RAW_FORMAT_NONE, 337 rtn = doTest(cspHand, &pubKey, &privKey, 350 rtn = doTest(cspHand, &pubKey, &privKey, 363 rtn = doTest(cspHand, &pubKey, &privKey, 377 rtn = doTest(cspHand, &pubKey, &privKey, 213 doTest( CSSM_CSP_HANDLE cspHand, CSSM_KEY_PTR pubKey, CSSM_KEY_PTR privKey, CSSM_PADDING encrPad, CSSM_PADDING decrPad, CSSM_BOOL quiet, CSSM_RETURN expectResult) argument
|