/macosx-10.10.1/Security-57031.1.35/Security/include/security_smime/ |
H A D | tsaSupportPriv.h | 43 OSStatus decodeTimeStampToken(SecCmsSignerInfoRef signerinfo, CSSM_DATA_PTR inData, CSSM_DATA_PTR encDigest, uint64_t expectedNonce); 44 OSStatus decodeTimeStampTokenWithPolicy(SecCmsSignerInfoRef signerinfo, CFTypeRef timeStampPolicy, CSSM_DATA_PTR inData, CSSM_DATA_PTR encDigest, uint64_t expectedNonce); 45 OSStatus createTSAMessageImprint(SecCmsSignedDataRef signedData, CSSM_DATA_PTR encDigest, SecAsn1TSAMessageImprint *messageImprint);
|
H A D | cmssigdata.c | 224 OSStatus createTSAMessageImprint(SecCmsSignedDataRef signedData, CSSM_DATA_PTR encDigest, argument 227 // Calculate hash of encDigest and put in messageImprint.hashedMessage 228 // We pass in encDigest, since in the verification case, it comes from a different signedData 239 require(encDigest, xit); 244 SecCmsDigestContextUpdate(digcx, encDigest->Data, encDigest->Length); 498 // Calculate hash of encDigest and put in messageImprint.hashedMessage 500 CSSM_DATA *encDigest = SecCmsSignerInfoGetEncDigest(signerinfo); local 501 require_noerr(createTSAMessageImprint(sigd, encDigest, &messageImprint), tsxit);
|
H A D | cmssiginfo.c | 455 if (SECITEM_CopyItem(poolp, &(signerinfo->encDigest), &signature) 677 publickey, &(signerinfo->encDigest), 690 sig = &(signerinfo->encDigest); 783 status = decodeTimeStampTokenWithPolicy(signerinfo, timeStampPolicy, (attr->values)[0], &signerinfo->encDigest, 0); 791 return &signerinfo->encDigest;
|
H A D | cmstpriv.h | 214 CSSM_DATA encDigest; member in struct:SecCmsSignerInfoStr
|
H A D | tsaSupport.c | 1236 OSStatus decodeTimeStampToken(SecCmsSignerInfoRef signerinfo, CSSM_DATA_PTR inData, CSSM_DATA_PTR encDigest, uint64_t expectedNonce) argument 1238 return decodeTimeStampTokenWithPolicy(signerinfo, NULL, inData, encDigest, expectedNonce); 1241 OSStatus decodeTimeStampTokenWithPolicy(SecCmsSignerInfoRef signerinfo, CFTypeRef timeStampPolicy, CSSM_DATA_PTR inData, CSSM_DATA_PTR encDigest, uint64_t expectedNonce) argument 1245 encDigest is the original signed blob, which we must hash and compare. 1281 if (encDigest) 1282 printDataAsHex("encDigest",encDigest, 0);
|
H A D | cmsasn1.c | 195 offsetof(SecCmsSignerInfo,encDigest) },
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_smime/lib/ |
H A D | tsaSupportPriv.h | 43 OSStatus decodeTimeStampToken(SecCmsSignerInfoRef signerinfo, CSSM_DATA_PTR inData, CSSM_DATA_PTR encDigest, uint64_t expectedNonce); 44 OSStatus decodeTimeStampTokenWithPolicy(SecCmsSignerInfoRef signerinfo, CFTypeRef timeStampPolicy, CSSM_DATA_PTR inData, CSSM_DATA_PTR encDigest, uint64_t expectedNonce); 45 OSStatus createTSAMessageImprint(SecCmsSignedDataRef signedData, CSSM_DATA_PTR encDigest, SecAsn1TSAMessageImprint *messageImprint);
|
H A D | cmssigdata.c | 224 OSStatus createTSAMessageImprint(SecCmsSignedDataRef signedData, CSSM_DATA_PTR encDigest, argument 227 // Calculate hash of encDigest and put in messageImprint.hashedMessage 228 // We pass in encDigest, since in the verification case, it comes from a different signedData 239 require(encDigest, xit); 244 SecCmsDigestContextUpdate(digcx, encDigest->Data, encDigest->Length); 498 // Calculate hash of encDigest and put in messageImprint.hashedMessage 500 CSSM_DATA *encDigest = SecCmsSignerInfoGetEncDigest(signerinfo); local 501 require_noerr(createTSAMessageImprint(sigd, encDigest, &messageImprint), tsxit);
|
H A D | cmssiginfo.c | 455 if (SECITEM_CopyItem(poolp, &(signerinfo->encDigest), &signature) 677 publickey, &(signerinfo->encDigest), 690 sig = &(signerinfo->encDigest); 783 status = decodeTimeStampTokenWithPolicy(signerinfo, timeStampPolicy, (attr->values)[0], &signerinfo->encDigest, 0); 791 return &signerinfo->encDigest;
|
H A D | cmstpriv.h | 214 CSSM_DATA encDigest; member in struct:SecCmsSignerInfoStr
|
H A D | tsaSupport.c | 1236 OSStatus decodeTimeStampToken(SecCmsSignerInfoRef signerinfo, CSSM_DATA_PTR inData, CSSM_DATA_PTR encDigest, uint64_t expectedNonce) argument 1238 return decodeTimeStampTokenWithPolicy(signerinfo, NULL, inData, encDigest, expectedNonce); 1241 OSStatus decodeTimeStampTokenWithPolicy(SecCmsSignerInfoRef signerinfo, CFTypeRef timeStampPolicy, CSSM_DATA_PTR inData, CSSM_DATA_PTR encDigest, uint64_t expectedNonce) argument 1245 encDigest is the original signed blob, which we must hash and compare. 1281 if (encDigest) 1282 printDataAsHex("encDigest",encDigest, 0);
|
H A D | cmsasn1.c | 195 offsetof(SecCmsSignerInfo,encDigest) },
|
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/Security/ |
H A D | cmssiginfo.c | 470 if (SECITEM_CopyItem(poolp, &(signerinfo->encDigest), &signature) 683 if (errSecSuccess == SecKeyDigestAndVerify(publickey, &signerinfo->digestAlg, encoded_attrs.Data, encoded_attrs.Length, signerinfo->encDigest.Data, signerinfo->encDigest.Length)) 694 sig = &(signerinfo->encDigest);
|
H A D | cmstpriv.h | 198 SecAsn1Item encDigest; member in struct:SecCmsSignerInfoStr
|
H A D | cmsasn1.c | 195 offsetof(SecCmsSignerInfo,encDigest) },
|
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/lib/ |
H A D | cmssiginfo.c | 470 if (SECITEM_CopyItem(poolp, &(signerinfo->encDigest), &signature) 683 if (errSecSuccess == SecKeyDigestAndVerify(publickey, &signerinfo->digestAlg, encoded_attrs.Data, encoded_attrs.Length, signerinfo->encDigest.Data, signerinfo->encDigest.Length)) 694 sig = &(signerinfo->encDigest);
|
H A D | cmstpriv.h | 198 SecAsn1Item encDigest; member in struct:SecCmsSignerInfoStr
|
H A D | cmsasn1.c | 195 offsetof(SecCmsSignerInfo,encDigest) },
|
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/security_smime/ |
H A D | cmssiginfo.c | 470 if (SECITEM_CopyItem(poolp, &(signerinfo->encDigest), &signature) 683 if (errSecSuccess == SecKeyDigestAndVerify(publickey, &signerinfo->digestAlg, encoded_attrs.Data, encoded_attrs.Length, signerinfo->encDigest.Data, signerinfo->encDigest.Length)) 694 sig = &(signerinfo->encDigest);
|
H A D | cmstpriv.h | 198 SecAsn1Item encDigest; member in struct:SecCmsSignerInfoStr
|
H A D | cmsasn1.c | 195 offsetof(SecCmsSignerInfo,encDigest) },
|