/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/ |
H A D | SecKey.h | 158 @param dataToSign The data to be signed, typically the digest of the 160 @param dataToSignLen Length of dataToSign in bytes. 173 first byte of dataToSign is zero; there is no way to verify leading zeroes 177 of the digest type - and the dataToSign is a SHA1 digest - use 183 const uint8_t *dataToSign,
|
H A D | SecKey.c | 448 const uint8_t *dataToSign, /* signature over this data */ 449 size_t dataToSignLen, /* length of dataToSign */ 506 memcpy(&digestInfo[offset], dataToSign, digestLen); 523 const uint8_t *dataToSign, /* signature over this data */ 524 size_t dataToSignLen, /* length of dataToSign */ 531 return key->key_class->rawSign(key, padding, dataToSign, dataToSignLen, 534 return SecKeyDigestInfoSignVerify(key, padding, dataToSign, dataToSignLen, 543 size_t signedDataLen, /* length of dataToSign */ 445 SecKeyDigestInfoSignVerify( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen, int mode) argument 520 SecKeyRawSign( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
|
H A D | SecKeyPriv.h | 104 const uint8_t *dataToSign, size_t dataToSignLen,
|
H A D | SecRSAKey.c | 795 const uint8_t *dataToSign, size_t dataToSignLen, 815 require_noerr_quiet(ccn_read_uint(ccrsa_ctx_n(fullkey), s, dataToSignLen, dataToSign), errOut); 846 memcpy(sBytes, dataToSign, dataToSignLen); 794 SecRSAPrivateKeyRawSign(SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
|
H A D | SecECKey.c | 532 const uint8_t *dataToSign, size_t dataToSignLen, 538 require_noerr(err = ccec_sign(fullkey, dataToSignLen, dataToSign, 531 SecECPrivateKeyRawSign(SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecKeyPriv.h | 78 const uint8_t *dataToSign, size_t dataToSignLen, 201 @param dataToSign The data to be signed, typically the digest of the actual data. 202 @param dataToSignLen Length of dataToSign in bytes. 214 first byte of dataToSign is zero; there is no way to verify leading zeroes 218 the digest type - and the dataToSign is a SHA1 digest - use kSecPaddingPKCS1SHA1. 223 const uint8_t *dataToSign,
|
H A D | KeyItem.h | 122 void RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signedData);
|
H A D | KeyItem.cpp | 1166 void KeyItem::RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signature) argument 1215 CssmData data(dataToSign.Data, dataToSign.Length);
|
H A D | SecKey.cpp | 828 const uint8_t *dataToSign, 839 dataInput.Data = (uint8_t*) dataToSign; 858 size_t signedDataLen, /* length of dataToSign */ 825 SecKeyRawSign( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecKeyPriv.h | 78 const uint8_t *dataToSign, size_t dataToSignLen, 201 @param dataToSign The data to be signed, typically the digest of the actual data. 202 @param dataToSignLen Length of dataToSign in bytes. 214 first byte of dataToSign is zero; there is no way to verify leading zeroes 218 the digest type - and the dataToSign is a SHA1 digest - use kSecPaddingPKCS1SHA1. 223 const uint8_t *dataToSign,
|
H A D | KeyItem.h | 122 void RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signedData);
|
H A D | KeyItem.cpp | 1166 void KeyItem::RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signature) argument 1215 CssmData data(dataToSign.Data, dataToSign.Length);
|
H A D | SecKey.cpp | 828 const uint8_t *dataToSign, 839 dataInput.Data = (uint8_t*) dataToSign; 858 size_t signedDataLen, /* length of dataToSign */ 825 SecKeyRawSign( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecKeyPriv.h | 78 const uint8_t *dataToSign, size_t dataToSignLen, 201 @param dataToSign The data to be signed, typically the digest of the actual data. 202 @param dataToSignLen Length of dataToSign in bytes. 214 first byte of dataToSign is zero; there is no way to verify leading zeroes 218 the digest type - and the dataToSign is a SHA1 digest - use kSecPaddingPKCS1SHA1. 223 const uint8_t *dataToSign,
|
H A D | KeyItem.h | 122 void RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signedData);
|
H A D | KeyItem.cpp | 1166 void KeyItem::RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signature) argument 1215 CssmData data(dataToSign.Data, dataToSign.Length);
|
H A D | SecKey.cpp | 828 const uint8_t *dataToSign, 839 dataInput.Data = (uint8_t*) dataToSign; 858 size_t signedDataLen, /* length of dataToSign */ 825 SecKeyRawSign( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
|
/macosx-10.10.1/mDNSResponder-561.1.1/mDNSMacOSX/ |
H A D | CryptoSupport.c | 592 CFDataRef dataToSign = CFDataCreate(NULL, digest, dlen); local 593 if (dataToSign == NULL) 599 ret = SecTransformSetAttribute(verifyXForm, kSecTransformInputAttributeName, dataToSign, &error); 600 CFRelease(dataToSign);
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-40-seckey-custom.c | 50 const uint8_t *dataToSign, size_t dataToSignLen, 49 CustomKeyRawSign(SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
|