Searched refs:privKey (Results 1 - 25 of 157) sorted by relevance

1234567

/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/dotMacTool/
H A DkeyPicker.cpp34 SecKeyRef *privKey) // RETURNED
31 keyPicker( SecKeychainRef kcRef, SecKeyRef *pubKey, SecKeyRef *privKey) argument
H A DkeyPicker.h40 SecKeyRef *privKey); // RETURNED
/macosx-10.10/OpenSSL098-52/src/demos/maurice/
H A Dexample2.c34 EVP_PKEY *privKey; local
39 privKey = ReadPrivateKey(PRIVFILE);
40 if (!privKey)
49 EVP_PKEY_free(privKey);
66 RSA_private_decrypt(len, buf, buf2, privKey->pkey.rsa,RSA_PKCS1_PADDING);
70 EVP_PKEY_free(privKey);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/
H A DDH_exchange.cpp41 DH *privKey = contextToDhKey(context, session, CSSM_ATTRIBUTE_KEY, local
43 if(privKey == NULL) {
46 cspDhDebug("DeriveKey_DH, privKey %p", privKey);
47 privSize = DH_size(privKey);
85 int rtn = DH_compute_key(buf, pubKeyBn, privKey);
105 DH_free(privKey);
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/clAppUtils/
H A DkeyPicker.h54 SecKeyRef *privKey); // RETURNED
/macosx-10.10/BerkeleyDB-21/db/java/src/com/sleepycat/util/keyrange/
H A DRangeCursor.java65 private DatabaseEntry privKey; field in class:RangeCursor
132 privKey = new DatabaseEntry();
136 privKey = null;
163 privKey = key;
210 swapData(key, privKey);
271 KeyRange.copy(range.beginKey, privKey);
300 KeyRange.copy(range.beginKey, privKey);
310 KeyRange.copy(range.beginKey, privKey);
314 range.compare(privKey, range.beginKey) == 0) {
319 !range.check(privKey)) {
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/regressions/
H A Dkc-41-sececkey.c59 static void testdigestandsignalg(SecKeyRef privKey, SecKeyRef pubKey, const SecAsn1AlgId *algId) { argument
62 size_t sigLen = SecKeyGetSize(privKey, kSecKeySignatureSize);
79 ok_status(status = SecKeyDigestAndSign(privKey, algId, dataToDigest, dataToDigestLen,
99 static void testdigestandsign(SecKeyRef privKey, SecKeyRef pubKey) { argument
120 testdigestandsignalg(privKey, pubKey, &algId);
168 SecKeyRef pubKey = NULL, privKey = NULL; local
178 ok_status(status = SecKeyGeneratePair(kgp, &pubKey, &privKey),
187 ok(privKey, "privKey returned");
189 is(SecKeyGetSize(privKey, kSecKeyKeySizeInBit
240 SecKeyRef pubKey = NULL, privKey = NULL; local
[all...]
H A Dkc-40-seckey.c49 static void testdigestandsignalg(SecKeyRef privKey, SecKeyRef pubKey, const SecAsn1AlgId *algId) { argument
52 size_t sigLen = SecKeyGetSize(privKey, kSecKeySignatureSize);
69 ok_status(status = SecKeyDigestAndSign(privKey, algId, dataToDigest, dataToDigestLen,
88 static void testdigestandsign(SecKeyRef privKey, SecKeyRef pubKey) { argument
114 testdigestandsignalg(privKey, pubKey, &algId);
135 static void test_encrypt_decrypt(SecKeyRef pubKey, SecKeyRef privKey, uint32_t padding, size_t keySizeInBytes) argument
167 ok_status(SecKeyDecrypt(privKey, padding,
211 SecKeyRef pubKey = NULL, privKey = NULL; local
221 ok_status(status = SecKeyGeneratePair(kgp, &pubKey, &privKey),
230 ok(privKey, "privKe
400 SecKeyRef pubKey = NULL, privKey = NULL; local
[all...]
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/
H A Dsi-41-sececkey.c53 static void testdigestandsignalg(SecKeyRef privKey, SecKeyRef pubKey, const SecAsn1AlgId *algId) { argument
56 size_t sigLen = SecKeyGetSize(privKey, kSecKeySignatureSize);
73 ok_status(status = SecKeyDigestAndSign(privKey, algId, dataToDigest, dataToDigestLen,
93 static void testdigestandsign(SecKeyRef privKey, SecKeyRef pubKey) { argument
114 testdigestandsignalg(privKey, pubKey, &algId);
119 SecKeyRef pubKey = NULL, privKey = NULL; local
130 ok_status(status = SecKeyGeneratePair(kgp, &pubKey, &privKey),
139 ok(privKey, "privKey returned");
141 is(SecKeyGetSize(privKey, kSecKeyKeySizeInBit
186 SecKeyRef pubKey = NULL, privKey = NULL; local
279 SecKeyRef pubKey = NULL, privKey = NULL; local
[all...]
H A Dsi-40-seckey.c45 static void testdigestandsignalg(SecKeyRef privKey, SecKeyRef pubKey, const SecAsn1AlgId *algId) { argument
48 size_t sigLen = SecKeyGetSize(privKey, kSecKeySignatureSize);
65 ok_status(status = SecKeyDigestAndSign(privKey, algId, dataToDigest, dataToDigestLen,
84 static void testdigestandsign(SecKeyRef privKey, SecKeyRef pubKey) { argument
110 testdigestandsignalg(privKey, pubKey, &algId);
126 static void test_encrypt_decrypt(SecKeyRef pubKey, SecKeyRef privKey, uint32_t padding, size_t keySizeInBytes) argument
158 ok_status(SecKeyDecrypt(privKey, padding,
175 SecKeyRef pubKey = NULL, privKey = NULL; local
186 ok_status(status = SecKeyGeneratePair(kgp, &pubKey, &privKey),
195 ok(privKey, "privKe
345 SecKeyRef pubKey = NULL, privKey = NULL; local
[all...]
H A Dsi-64-ossl-cms.c163 SecKeyRef privKey = NULL; local
167 isnt(privKey = SecKeyCreateRSAPrivateKey(NULL, privkey_der, privkey_der_len, kSecKeyEncodingPkcs1), NULL, "create private key");
168 isnt(identity = SecIdentityCreate(NULL, cert, privKey), NULL, "create identity");
169 CFReleaseSafe(privKey);
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/certLabelTest/
H A DcertLabelTest.cpp116 CSSM_KEY_PTR privKey,
167 privKey,
288 CSSM_KEY privKey; local
294 &privKey, CSSM_FALSE, CSSM_KEYUSE_ANY, CSSM_KEYBLOB_RAW_FORMAT_NONE,
312 cspHand, clHand, &privKey, &pubKey,
322 cspHand, clHand, &privKey, &pubKey,
332 cspHand, clHand, &privKey, &pubKey,
342 cspHand, clHand, &privKey, &pubKey,
352 cspHand, clHand, &privKey, &pubKey,
363 cspHand, clHand, &privKey,
111 doTest( const char *testName, bool quiet, CSSM_CSP_HANDLE cspHand, CSSM_CL_HANDLE clHand, CSSM_KEY_PTR privKey, CSSM_KEY_PTR pubKey, const void *name1Val, CSSM_SIZE name1Len, CSSM_BER_TAG berTag1, const CSSM_OID *name1Oid, const void *name2Val, CSSM_SIZE name2Len, CSSM_BER_TAG berTag2, const CSSM_OID *name2Oid, CFStringRef expectedLabel, bool labelIsCommonName) argument
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/
H A DsslKeychain.c122 SecKeyRef privKey = NULL; /* Retained */ local
148 * privKey, pubKey.
174 ortn = SecIdentityCopyPrivateKey(identity, &privKey);
209 if(sslPrivKeyGetAlgorithmID(privKey)!=kSecRSAAlgorithmID) {
215 *sslPrivKey = tls_private_key_rsa_create(privKey, SecKeyGetBlockSize(privKey), mySSLPrivKeyRSA_sign, mySSLPrivKeyRSA_decrypt);
229 CFReleaseSafe(privKey);
H A DsslCrypto.h53 CFIndex sslPrivKeyGetAlgorithmID(SecKeyRef privKey);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/
H A DsslKeychain.c122 SecKeyRef privKey = NULL; /* Retained */ local
148 * privKey, pubKey.
174 ortn = SecIdentityCopyPrivateKey(identity, &privKey);
209 if(sslPrivKeyGetAlgorithmID(privKey)!=kSecRSAAlgorithmID) {
215 *sslPrivKey = tls_private_key_rsa_create(privKey, SecKeyGetBlockSize(privKey), mySSLPrivKeyRSA_sign, mySSLPrivKeyRSA_decrypt);
229 CFReleaseSafe(privKey);
H A DsslCrypto.h53 CFIndex sslPrivKeyGetAlgorithmID(SecKeyRef privKey);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/
H A DsslKeychain.c122 SecKeyRef privKey = NULL; /* Retained */ local
148 * privKey, pubKey.
174 ortn = SecIdentityCopyPrivateKey(identity, &privKey);
209 if(sslPrivKeyGetAlgorithmID(privKey)!=kSecRSAAlgorithmID) {
215 *sslPrivKey = tls_private_key_rsa_create(privKey, SecKeyGetBlockSize(privKey), mySSLPrivKeyRSA_sign, mySSLPrivKeyRSA_decrypt);
229 CFReleaseSafe(privKey);
H A DsslCrypto.h53 CFIndex sslPrivKeyGetAlgorithmID(SecKeyRef privKey);
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/genKeyPair/
H A DgenKeyPair.cpp36 CSSM_KEY_PTR privKey, // mallocd by caller
70 memset(privKey, 0, sizeof(CSSM_KEY));
128 privKey);
215 CSSM_KEY privKey; local
225 &privKey,
234 cspFreeKey(cspHand, &privKey);
28 genKeyPair(CSSM_CSP_HANDLE cspHand, CSSM_DL_DB_HANDLE dlDbHand, uint32 algorithm, const char *keyLabel, unsigned keyLabelLen, uint32 keySize, CSSM_KEY_PTR pubKey, uint32 pubKeyUsage, CSSM_KEY_PTR privKey, uint32 privKeyUsage) argument
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/threadTest/
H A DsignVerify.cpp24 CSSM_KEY privKey; member in struct:__anon5281
55 &svParams->privKey,
94 &svParams->privKey,
H A DrsaSign.cpp45 B_KEY_OBJ *privKey)
120 brtn = B_CreateKeyObject(privKey);
128 *privKey,
143 B_KEY_OBJ privKey,
167 privKey,
249 B_KEY_OBJ privKey; member in struct:__anon5280
263 &svParams->privKey);
300 svParams->privKey,
41 RsaGenKeyPair( const TestParams *testParams, unsigned keySize, B_KEY_OBJ *pubKey, B_KEY_OBJ *privKey) argument
141 rsaSign( const TestParams *testParams, B_KEY_OBJ privKey, const CSSM_DATA *ptext, uint8 *sigBytes, unsigned maxSigSize, unsigned *actSigSize) argument
/macosx-10.10/OpenSSL098-52/src/demos/engines/ibmca/
H A Dhw_ibmca.c641 ICA_KEY_RSA_CRT *privKey=NULL; local
669 !bn_wexpand(key, sizeof(*privKey)/BN_BYTES ))
676 privKey = (ICA_KEY_RSA_CRT *)key->d;
682 if ( keyRecordSize > sizeof(privKey->keyRecord )) {
699 memset(privKey, 0, sizeof(ICA_KEY_RSA_CRT));
700 privKey->keyType = CORRECT_ENDIANNESS(CRT_KEY_TYPE);
701 privKey->keyLength = CORRECT_ENDIANNESS(sizeof(ICA_KEY_RSA_CRT));
702 privKey->modulusBitLength =
708 privKey->pLength = CORRECT_ENDIANNESS(BN_num_bytes(p)+8);
709 privKey
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/keyStoreLeak/
H A DkeyStoreLeak.c48 CSSM_KEY_PTR privKey, // mallocd by caller
65 memset(privKey, 0, sizeof(CSSM_KEY));
97 privKey);
105 if(privKey->KeyHeader.BlobType != CSSM_KEYBLOB_REFERENCE) {
106 printf("privKey blob type: exp %u got %u\n",
107 CSSM_KEYBLOB_REFERENCE, (unsigned)privKey->KeyHeader.BlobType);
112 CSSM_KEYBLOB_REFERENCE, (unsigned)privKey->KeyHeader.BlobType);
120 CSSM_KEYBLOB_RAW, (unsigned)privKey->KeyHeader.BlobType);
151 CSSM_KEY privKey; local
196 &privKey,
41 genKeyPair(CSSM_CSP_HANDLE cspHand, CSSM_DL_HANDLE dlHand, CSSM_DB_HANDLE dbHand, const CSSM_DATA_PTR keyLabel, CSSM_KEY_PTR pubKey, uint32 pubKeyUsage, uint32 pubKeyAttr, CSSM_KEY_PTR privKey, uint32 privKeyUsage, uint32 privKeyAttr, uint32 keyGenAlg) argument
[all...]
/macosx-10.10/Security-57031.1.35/Security/sec/SOSCircle/SecureObjectSync/
H A DSOSAccountCredentials.c55 static void SOSAccountGenerationSignatureUpdate(SOSAccountRef account, SecKeyRef privKey) { argument
66 require_quiet(SOSFullPeerInfoUpgradeSignatures(cloud_fpi, privKey, NULL), gen_sign);
70 SOSCircleGenerationUpdate(circle, privKey, fpi, NULL);
80 static void SOSAccountPeerSignatureUpdate(SOSAccountRef account, SecKeyRef privKey) { argument
84 SOSFullPeerInfoUpgradeSignatures(fpi, privKey, NULL);
105 static void SOSAccountSetTrustedUserPublicKey(SOSAccountRef account, bool public_was_trusted, SecKeyRef privKey) argument
107 if (!privKey) return;
108 SecKeyRef publicKey = SecKeyCreatePublicFromPrivate(privKey);
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/ssl2Padding/
H A Dssl2Padding.cpp216 CSSM_KEY_PTR privKey,
233 rtn = doRsaDecrypt(cspHand, privKey, decrPad, quiet, expectResult, &ctext, &rptext);
308 CSSM_KEY privKey; local
314 &privKey, CSSM_TRUE /* ref */, CSSM_KEYUSE_ANY, CSSM_KEYBLOB_RAW_FORMAT_NONE,
337 rtn = doTest(cspHand, &pubKey, &privKey,
350 rtn = doTest(cspHand, &pubKey, &privKey,
363 rtn = doTest(cspHand, &pubKey, &privKey,
377 rtn = doTest(cspHand, &pubKey, &privKey,
213 doTest( CSSM_CSP_HANDLE cspHand, CSSM_KEY_PTR pubKey, CSSM_KEY_PTR privKey, CSSM_PADDING encrPad, CSSM_PADDING decrPad, CSSM_BOOL quiet, CSSM_RETURN expectResult) argument

Completed in 156 milliseconds

1234567