/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | secCrypto.c | 62 SecAsn1AlgId algId; local 63 algId.algorithm = oidForSSLHash(hash); 64 return SecKeySignDigest(keyRef, &algId, plaintext, plaintextLen, sig, sigLen);
|
H A D | sslBER.c | 248 CSSM_X509_ALGORITHM_IDENTIFIER *algId = &subjPubKeyInfo.algorithm; local 282 if(!nssCompareCssmData(&algId->algorithm, &CSSMOID_ecPublicKey)) { 287 if((algId->parameters.Data[0] != BER_TAG_OID) || 288 (algId->parameters.Length < 2)) { 298 curveOid.Data = algId->parameters.Data + 2; 299 curveOid.Length = algId->parameters.Length - 2; 301 /* algId->parameters is the curve OID */
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | secCrypto.c | 62 SecAsn1AlgId algId; local 63 algId.algorithm = oidForSSLHash(hash); 64 return SecKeySignDigest(keyRef, &algId, plaintext, plaintextLen, sig, sigLen);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | secCrypto.c | 62 SecAsn1AlgId algId; local 63 algId.algorithm = oidForSSLHash(hash); 64 return SecKeySignDigest(keyRef, &algId, plaintext, plaintextLen, sig, sigLen);
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/ocspTool/ |
H A D | ocspUtils.h | 27 CSSM_ALGORITHMS algId, // RSA/SHA1, DSA/SHA1
|
H A D | ocspUtils.cpp | 15 CSSM_ALGORITHMS algId, // RSA/SHA1, DSA/SHA1 41 crtn = cspSign(cspHand, algId, (CSSM_KEY_PTR)privCssmKey, 12 ocspSign( SecIdentityRef idRef, CSSM_DATA &plainText, CSSM_ALGORITHMS algId, CSSM_DATA &sig) argument
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/clAppUtils/ |
H A D | CertBuilderApp.cpp | 190 CSSM_X509_ALGORITHM_IDENTIFIER algId; local 193 algId.algorithm = CSSMOID_SHA1WithRSA; 196 algId.algorithm = CSSMOID_MD5WithRSA; 199 algId.algorithm = CSSMOID_MD2WithRSA; 202 algId.algorithm = CSSMOID_APPLE_FEE_MD5; 205 algId.algorithm = CSSMOID_APPLE_FEE_SHA1; 208 algId.algorithm = CSSMOID_ECDSA_WithSHA1; 211 algId.algorithm = CSSMOID_SHA1WithDSA_CMS; 214 algId.algorithm = CSSMOID_SHA224WithRSA; 217 algId [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecNetscapeTemplates.h | 81 CSSM_X509_ALGORITHM_IDENTIFIER algId; member in struct:__anon3811
|
H A D | SecNetscapeTemplates.cpp | 63 offsetof(SignedPublicKeyAndChallenge, algId),
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecNetscapeTemplates.h | 81 CSSM_X509_ALGORITHM_IDENTIFIER algId; member in struct:__anon4697
|
H A D | SecNetscapeTemplates.cpp | 63 offsetof(SignedPublicKeyAndChallenge, algId),
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecNetscapeTemplates.h | 81 CSSM_X509_ALGORITHM_IDENTIFIER algId; member in struct:__anon4784
|
H A D | SecNetscapeTemplates.cpp | 63 offsetof(SignedPublicKeyAndChallenge, algId),
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_x509_cl/lib/ |
H A D | Session_Crypto.cpp | 58 CssmAutoData algId(*this); 60 CL_certCrlDecodeComponents(CertToBeVerified, tbs, algId, sig); 86 CssmAutoData algId(*this); // in DER format 88 CL_certCrlDecodeComponents(CertToBeVerified, tbs, algId, sig); 151 CssmData &algIdData = algId.get(); 222 /* cook up algId from context->(signing key, sig algorithm) */ 249 * signature algId matches the one we're signing with, or just use 250 * that algId here....for now, this is up to the app to make sure. 265 CSSM_X509_ALGORITHM_IDENTIFIER algId; local 266 memset(&algId, [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_csp/open_ssl/opensslUtils/ |
H A D | opensslAsn1.cpp | 153 CSSM_X509_ALGORITHM_IDENTIFIER &algId) 160 algId.parameters = encNullData; 297 CSSM_X509_ALGORITHM_IDENTIFIER &algId = nssPubKeyInfo.algorithm; local 298 algId.algorithm = CSSMOID_RSA; 301 algId.parameters.Data = (uint8 *)algParams; 302 algId.parameters.Length = algParamsLen; 306 nullAlgParams(algId); 461 CSSM_X509_ALGORITHM_IDENTIFIER &algId = nssPrivKeyInfo.algorithm; local 462 algId.algorithm = CSSMOID_RSA; 465 algId 152 nullAlgParams( CSSM_X509_ALGORITHM_IDENTIFIER &algId) argument 657 dsaToNssAlgIdBSAFE( const DSA *openKey, NSS_DSAAlgorithmIdBSAFE &algId, SecNssCoder &coder) argument 671 nssAlgIdToDsaBSAFE( NSS_DSAAlgorithmIdBSAFE &algId, DSA *openKey) argument 687 dsaToNssAlgIdX509( const DSA *openKey, NSS_DSAAlgorithmIdX509 &algId, SecNssCoder &coder) argument 698 nssAlgIdToDsaX509( NSS_DSAAlgorithmIdX509 &algId, DSA *openKey) argument 741 NSS_DSAAlgorithmIdBSAFE &algId = nssPubKey.dsaAlg; local 1000 NSS_DSAAlgorithmIdX509 &algId = nssPubKey.dsaAlg; local 1423 dhToNssAlgIdX942( const DH *openKey, NSS_DHAlgorithmIdentifierX942 &algId, SecNssCoder &coder) argument 1456 nssAlgIdToDhX942( NSS_DHAlgorithmIdentifierX942 &algId, DH *openKey) argument 1804 CSSM_X509_ALGORITHM_IDENTIFIER &algId = digestInfo.digestAlgorithm; local [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/regressions/ |
H A D | kc-41-sececkey.c | 59 static void testdigestandsignalg(SecKeyRef privKey, SecKeyRef pubKey, const SecAsn1AlgId *algId) { argument 66 oid.length = algId->algorithm.Length; 67 oid.data = algId->algorithm.Data; 79 ok_status(status = SecKeyDigestAndSign(privKey, algId, dataToDigest, dataToDigestLen, 86 ok_status(SecKeyDigestAndVerify(pubKey, algId, dataToDigest, dataToDigestLen, 90 is_status(SecKeyDigestAndVerify(pubKey, algId, dataToDigest, dataToDigestLen, 94 is_status(SecKeyDigestAndVerify(pubKey, algId, dataToDigest, dataToDigestLen, 111 SecAsn1AlgId algId = {}; local 114 algId.algorithm = *oids[ix]; 116 algId [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/libDER/libDERUtils/ |
H A D | printFields.c | 284 DERAlgorithmId algId; local 288 &algId, sizeof(algId)); 290 DERPerror("DERParseSequenceContent(algId)", drtn); 293 printItem("alg", IT_Leaf, verbose, ASN1_OBJECT_ID, &algId.oid); 294 if(algId.params.data) { 295 printItem("params", IT_Leaf, verbose, algId.params.data[0], &algId.params); 316 printItem("algId", IT_Branch, verbose, ASN1_CONSTR_SEQUENCE, &pubKeyInfo.algId); [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/cspxutils/hashTimeSA/ |
H A D | hashTimeSA.cpp | 74 CSSM_ALGORITHMS algId; // MD5, SHA1 member in struct:__anon5319 115 switch(params->algId) { 192 switch(params->algId) { 292 CSSM_ALGORITHMS *algId, 297 *algId = CSSM_ALGID_MD5; 301 *algId = CSSM_ALGID_SHA1; 305 *algId = CSSM_ALGID_SHA224; 309 *algId = CSSM_ALGID_SHA256; 313 *algId = CSSM_ALGID_SHA384; 317 *algId 290 algToAlgId( HT_Alg alg, CSSM_ALGORITHMS *algId, const char **algStr) argument [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/include/security_asn1/ |
H A D | ocspTemplates.h | 46 SecAsn1AlgId algId; member in struct:__anon3608 77 SecAsn1AlgId algId; member in struct:__anon3610 229 SecAsn1AlgId algId; member in struct:__anon3620
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_asn1/Security/ |
H A D | ocspTemplates.h | 46 SecAsn1AlgId algId; member in struct:__anon4043 77 SecAsn1AlgId algId; member in struct:__anon4045 229 SecAsn1AlgId algId; member in struct:__anon4055
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_asn1/lib/ |
H A D | ocspTemplates.h | 46 SecAsn1AlgId algId; member in struct:__anon4165 77 SecAsn1AlgId algId; member in struct:__anon4167 229 SecAsn1AlgId algId; member in struct:__anon4177
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_asn1/security_asn1/ |
H A D | ocspTemplates.h | 46 SecAsn1AlgId algId; member in struct:__anon4287 77 SecAsn1AlgId algId; member in struct:__anon4289 229 SecAsn1AlgId algId; member in struct:__anon4299
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-41-sececkey.c | 53 static void testdigestandsignalg(SecKeyRef privKey, SecKeyRef pubKey, const SecAsn1AlgId *algId) { argument 60 oid.length = algId->algorithm.Length; 61 oid.data = algId->algorithm.Data; 73 ok_status(status = SecKeyDigestAndSign(privKey, algId, dataToDigest, dataToDigestLen, 80 ok_status(SecKeyDigestAndVerify(pubKey, algId, dataToDigest, dataToDigestLen, 84 is_status(SecKeyDigestAndVerify(pubKey, algId, dataToDigest, dataToDigestLen, 88 is_status(SecKeyDigestAndVerify(pubKey, algId, dataToDigest, dataToDigestLen, 105 SecAsn1AlgId algId = {}; local 108 algId.algorithm = *oids[ix]; 110 algId [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/ |
H A D | SecKey.c | 700 static OSStatus SecKeyGetDigestInfo(SecKeyRef this, const SecAsn1AlgId *algId, argument 710 if ((algId->algorithm.Length == CSSMOID_RSA.Length) && 711 !memcmp(algId->algorithm.Data, CSSMOID_RSA.Data, 712 algId->algorithm.Length - 1)) { 714 switch (algId->algorithm.Data[algId->algorithm.Length - 1]) { 762 } else if ((algId->algorithm.Length == CSSMOID_ECDSA_WithSHA224.Length) && 763 !memcmp(algId->algorithm.Data, CSSMOID_ECDSA_WithSHA224.Data, 764 algId->algorithm.Length - 1)) { 766 switch (algId 873 SecKeyDigestAndVerify( SecKeyRef this, const SecAsn1AlgId *algId, const uint8_t *dataToDigest, size_t dataToDigestLen, const uint8_t *sig, size_t sigLen) argument 895 SecKeyDigestAndSign( SecKeyRef this, const SecAsn1AlgId *algId, const uint8_t *dataToDigest, size_t dataToDigestLen, uint8_t *sig, size_t *sigLen) argument 914 SecKeyVerifyDigest( SecKeyRef this, const SecAsn1AlgId *algId, const uint8_t *digestData, size_t digestDataLen, const uint8_t *sig, size_t sigLen) argument 933 SecKeySignDigest( SecKeyRef this, const SecAsn1AlgId *algId, const uint8_t *digestData, size_t digestDataLen, uint8_t *sig, size_t *sigLen) argument [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/sec/securityd/ |
H A D | SecOCSPRequest.c | 85 /* algId refers to the hash we'll perform in issuer name and key */ 86 certId->algId.algorithm = CSSMOID_SHA1; 89 certId->algId.parameters.Data = nullParam; 90 certId->algId.parameters.Length = sizeof(nullParam);
|