Searched refs:encDigest (Results 1 - 21 of 21) sorted by relevance

/macosx-10.10.1/Security-57031.1.35/Security/include/security_smime/
H A DtsaSupportPriv.h43 OSStatus decodeTimeStampToken(SecCmsSignerInfoRef signerinfo, CSSM_DATA_PTR inData, CSSM_DATA_PTR encDigest, uint64_t expectedNonce);
44 OSStatus decodeTimeStampTokenWithPolicy(SecCmsSignerInfoRef signerinfo, CFTypeRef timeStampPolicy, CSSM_DATA_PTR inData, CSSM_DATA_PTR encDigest, uint64_t expectedNonce);
45 OSStatus createTSAMessageImprint(SecCmsSignedDataRef signedData, CSSM_DATA_PTR encDigest, SecAsn1TSAMessageImprint *messageImprint);
H A Dcmssigdata.c224 OSStatus createTSAMessageImprint(SecCmsSignedDataRef signedData, CSSM_DATA_PTR encDigest, argument
227 // Calculate hash of encDigest and put in messageImprint.hashedMessage
228 // We pass in encDigest, since in the verification case, it comes from a different signedData
239 require(encDigest, xit);
244 SecCmsDigestContextUpdate(digcx, encDigest->Data, encDigest->Length);
498 // Calculate hash of encDigest and put in messageImprint.hashedMessage
500 CSSM_DATA *encDigest = SecCmsSignerInfoGetEncDigest(signerinfo); local
501 require_noerr(createTSAMessageImprint(sigd, encDigest, &messageImprint), tsxit);
H A Dcmssiginfo.c455 if (SECITEM_CopyItem(poolp, &(signerinfo->encDigest), &signature)
677 publickey, &(signerinfo->encDigest),
690 sig = &(signerinfo->encDigest);
783 status = decodeTimeStampTokenWithPolicy(signerinfo, timeStampPolicy, (attr->values)[0], &signerinfo->encDigest, 0);
791 return &signerinfo->encDigest;
H A Dcmstpriv.h214 CSSM_DATA encDigest; member in struct:SecCmsSignerInfoStr
H A DtsaSupport.c1236 OSStatus decodeTimeStampToken(SecCmsSignerInfoRef signerinfo, CSSM_DATA_PTR inData, CSSM_DATA_PTR encDigest, uint64_t expectedNonce) argument
1238 return decodeTimeStampTokenWithPolicy(signerinfo, NULL, inData, encDigest, expectedNonce);
1241 OSStatus decodeTimeStampTokenWithPolicy(SecCmsSignerInfoRef signerinfo, CFTypeRef timeStampPolicy, CSSM_DATA_PTR inData, CSSM_DATA_PTR encDigest, uint64_t expectedNonce) argument
1245 encDigest is the original signed blob, which we must hash and compare.
1281 if (encDigest)
1282 printDataAsHex("encDigest",encDigest, 0);
H A Dcmsasn1.c195 offsetof(SecCmsSignerInfo,encDigest) },
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_smime/lib/
H A DtsaSupportPriv.h43 OSStatus decodeTimeStampToken(SecCmsSignerInfoRef signerinfo, CSSM_DATA_PTR inData, CSSM_DATA_PTR encDigest, uint64_t expectedNonce);
44 OSStatus decodeTimeStampTokenWithPolicy(SecCmsSignerInfoRef signerinfo, CFTypeRef timeStampPolicy, CSSM_DATA_PTR inData, CSSM_DATA_PTR encDigest, uint64_t expectedNonce);
45 OSStatus createTSAMessageImprint(SecCmsSignedDataRef signedData, CSSM_DATA_PTR encDigest, SecAsn1TSAMessageImprint *messageImprint);
H A Dcmssigdata.c224 OSStatus createTSAMessageImprint(SecCmsSignedDataRef signedData, CSSM_DATA_PTR encDigest, argument
227 // Calculate hash of encDigest and put in messageImprint.hashedMessage
228 // We pass in encDigest, since in the verification case, it comes from a different signedData
239 require(encDigest, xit);
244 SecCmsDigestContextUpdate(digcx, encDigest->Data, encDigest->Length);
498 // Calculate hash of encDigest and put in messageImprint.hashedMessage
500 CSSM_DATA *encDigest = SecCmsSignerInfoGetEncDigest(signerinfo); local
501 require_noerr(createTSAMessageImprint(sigd, encDigest, &messageImprint), tsxit);
H A Dcmssiginfo.c455 if (SECITEM_CopyItem(poolp, &(signerinfo->encDigest), &signature)
677 publickey, &(signerinfo->encDigest),
690 sig = &(signerinfo->encDigest);
783 status = decodeTimeStampTokenWithPolicy(signerinfo, timeStampPolicy, (attr->values)[0], &signerinfo->encDigest, 0);
791 return &signerinfo->encDigest;
H A Dcmstpriv.h214 CSSM_DATA encDigest; member in struct:SecCmsSignerInfoStr
H A DtsaSupport.c1236 OSStatus decodeTimeStampToken(SecCmsSignerInfoRef signerinfo, CSSM_DATA_PTR inData, CSSM_DATA_PTR encDigest, uint64_t expectedNonce) argument
1238 return decodeTimeStampTokenWithPolicy(signerinfo, NULL, inData, encDigest, expectedNonce);
1241 OSStatus decodeTimeStampTokenWithPolicy(SecCmsSignerInfoRef signerinfo, CFTypeRef timeStampPolicy, CSSM_DATA_PTR inData, CSSM_DATA_PTR encDigest, uint64_t expectedNonce) argument
1245 encDigest is the original signed blob, which we must hash and compare.
1281 if (encDigest)
1282 printDataAsHex("encDigest",encDigest, 0);
H A Dcmsasn1.c195 offsetof(SecCmsSignerInfo,encDigest) },
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/Security/
H A Dcmssiginfo.c470 if (SECITEM_CopyItem(poolp, &(signerinfo->encDigest), &signature)
683 if (errSecSuccess == SecKeyDigestAndVerify(publickey, &signerinfo->digestAlg, encoded_attrs.Data, encoded_attrs.Length, signerinfo->encDigest.Data, signerinfo->encDigest.Length))
694 sig = &(signerinfo->encDigest);
H A Dcmstpriv.h198 SecAsn1Item encDigest; member in struct:SecCmsSignerInfoStr
H A Dcmsasn1.c195 offsetof(SecCmsSignerInfo,encDigest) },
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/lib/
H A Dcmssiginfo.c470 if (SECITEM_CopyItem(poolp, &(signerinfo->encDigest), &signature)
683 if (errSecSuccess == SecKeyDigestAndVerify(publickey, &signerinfo->digestAlg, encoded_attrs.Data, encoded_attrs.Length, signerinfo->encDigest.Data, signerinfo->encDigest.Length))
694 sig = &(signerinfo->encDigest);
H A Dcmstpriv.h198 SecAsn1Item encDigest; member in struct:SecCmsSignerInfoStr
H A Dcmsasn1.c195 offsetof(SecCmsSignerInfo,encDigest) },
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/security_smime/
H A Dcmssiginfo.c470 if (SECITEM_CopyItem(poolp, &(signerinfo->encDigest), &signature)
683 if (errSecSuccess == SecKeyDigestAndVerify(publickey, &signerinfo->digestAlg, encoded_attrs.Data, encoded_attrs.Length, signerinfo->encDigest.Data, signerinfo->encDigest.Length))
694 sig = &(signerinfo->encDigest);
H A Dcmstpriv.h198 SecAsn1Item encDigest; member in struct:SecCmsSignerInfoStr
H A Dcmsasn1.c195 offsetof(SecCmsSignerInfo,encDigest) },

Completed in 224 milliseconds