Searched refs:dataToSign (Results 1 - 19 of 19) sorted by relevance

/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/
H A DSecKey.h158 @param dataToSign The data to be signed, typically the digest of the
160 @param dataToSignLen Length of dataToSign in bytes.
173 first byte of dataToSign is zero; there is no way to verify leading zeroes
177 of the digest type - and the dataToSign is a SHA1 digest - use
183 const uint8_t *dataToSign,
H A DSecKey.c448 const uint8_t *dataToSign, /* signature over this data */
449 size_t dataToSignLen, /* length of dataToSign */
506 memcpy(&digestInfo[offset], dataToSign, digestLen);
523 const uint8_t *dataToSign, /* signature over this data */
524 size_t dataToSignLen, /* length of dataToSign */
531 return key->key_class->rawSign(key, padding, dataToSign, dataToSignLen,
534 return SecKeyDigestInfoSignVerify(key, padding, dataToSign, dataToSignLen,
543 size_t signedDataLen, /* length of dataToSign */
445 SecKeyDigestInfoSignVerify( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen, int mode) argument
520 SecKeyRawSign( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
H A DSecKeyPriv.h104 const uint8_t *dataToSign, size_t dataToSignLen,
H A DSecRSAKey.c795 const uint8_t *dataToSign, size_t dataToSignLen,
815 require_noerr_quiet(ccn_read_uint(ccrsa_ctx_n(fullkey), s, dataToSignLen, dataToSign), errOut);
846 memcpy(sBytes, dataToSign, dataToSignLen);
794 SecRSAPrivateKeyRawSign(SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
H A DSecECKey.c532 const uint8_t *dataToSign, size_t dataToSignLen,
538 require_noerr(err = ccec_sign(fullkey, dataToSignLen, dataToSign,
531 SecECPrivateKeyRawSign(SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
/macosx-10.10.1/Security-57031.1.35/Security/include/security_keychain/
H A DSecKeyPriv.h78 const uint8_t *dataToSign, size_t dataToSignLen,
201 @param dataToSign The data to be signed, typically the digest of the actual data.
202 @param dataToSignLen Length of dataToSign in bytes.
214 first byte of dataToSign is zero; there is no way to verify leading zeroes
218 the digest type - and the dataToSign is a SHA1 digest - use kSecPaddingPKCS1SHA1.
223 const uint8_t *dataToSign,
H A DKeyItem.h122 void RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signedData);
H A DKeyItem.cpp1166 void KeyItem::RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signature) argument
1215 CssmData data(dataToSign.Data, dataToSign.Length);
H A DSecKey.cpp828 const uint8_t *dataToSign,
839 dataInput.Data = (uint8_t*) dataToSign;
858 size_t signedDataLen, /* length of dataToSign */
825 SecKeyRawSign( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DSecKeyPriv.h78 const uint8_t *dataToSign, size_t dataToSignLen,
201 @param dataToSign The data to be signed, typically the digest of the actual data.
202 @param dataToSignLen Length of dataToSign in bytes.
214 first byte of dataToSign is zero; there is no way to verify leading zeroes
218 the digest type - and the dataToSign is a SHA1 digest - use kSecPaddingPKCS1SHA1.
223 const uint8_t *dataToSign,
H A DKeyItem.h122 void RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signedData);
H A DKeyItem.cpp1166 void KeyItem::RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signature) argument
1215 CssmData data(dataToSign.Data, dataToSign.Length);
H A DSecKey.cpp828 const uint8_t *dataToSign,
839 dataInput.Data = (uint8_t*) dataToSign;
858 size_t signedDataLen, /* length of dataToSign */
825 SecKeyRawSign( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_keychain/lib/
H A DSecKeyPriv.h78 const uint8_t *dataToSign, size_t dataToSignLen,
201 @param dataToSign The data to be signed, typically the digest of the actual data.
202 @param dataToSignLen Length of dataToSign in bytes.
214 first byte of dataToSign is zero; there is no way to verify leading zeroes
218 the digest type - and the dataToSign is a SHA1 digest - use kSecPaddingPKCS1SHA1.
223 const uint8_t *dataToSign,
H A DKeyItem.h122 void RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signedData);
H A DKeyItem.cpp1166 void KeyItem::RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signature) argument
1215 CssmData data(dataToSign.Data, dataToSign.Length);
H A DSecKey.cpp828 const uint8_t *dataToSign,
839 dataInput.Data = (uint8_t*) dataToSign;
858 size_t signedDataLen, /* length of dataToSign */
825 SecKeyRawSign( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
/macosx-10.10.1/mDNSResponder-561.1.1/mDNSMacOSX/
H A DCryptoSupport.c592 CFDataRef dataToSign = CFDataCreate(NULL, digest, dlen); local
593 if (dataToSign == NULL)
599 ret = SecTransformSetAttribute(verifyXForm, kSecTransformInputAttributeName, dataToSign, &error);
600 CFRelease(dataToSign);
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/Regressions/secitem/
H A Dsi-40-seckey-custom.c50 const uint8_t *dataToSign, size_t dataToSignLen,
49 CustomKeyRawSign(SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument

Completed in 272 milliseconds