/macosx-10.10.1/Security-57031.1.35/securityd/src/ |
H A D | tokenkey.cpp | 36 : Key(db), mKey(tokenKey), mHeader(hdr) 48 database().token().tokend().releaseKey(mKey); 51 this, mKey); 71 return mKey; // tokend-side handle
|
H A D | localkey.cpp | 43 this, handle(), mKey.header().algorithm(), mKey.header().usage(), mAttributes, &db); 58 mKey = CssmClient::Key(Server::csp(), newKey, false); 59 CssmKey::Header &header = mKey->header(); 109 return mKey; 134 hdr = mKey.header();
|
H A D | tokenkey.h | 61 KeyHandle mKey; // tokend reference handle member in class:TokenKey
|
H A D | kckey.cpp | 112 // This makes the mKey key value available for use, as well as its ACL. 124 mKey = CssmClient::Key(Server::csp(), key); 130 mAttributes = mKey.header().attributes() & managedAttributes; 131 mKey.header().clearAttribute(managedAttributes); 132 mKey.header().setAttribute(forcedAttributes); 155 CssmKey externalKey = mKey;
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | AppleCSPKeys.cpp | 55 CASSERT(mKey.keyClass() == CSSM_KEYCLASS_SESSION_KEY); 57 mKey.KeyHeader.LogicalKeySizeInBits); 58 copyCssmData(mKey, 70 (uint32)(mKey.length() * 8); 84 assert(mKey.blobType() == CSSM_KEYBLOB_RAW); 85 const CssmData &keyBlob = CssmData::overlay(mKey.KeyData);
|
H A D | AppleCSPKeys.h | 41 mKey(cssmKey), 86 const CssmKey &mKey; member in class:CSPKeyInfoProvider
|
H A D | bsafeKeyGen.cpp | 296 switch(mKey.algorithm()) { 315 const CSSM_KEYHEADER *hdr = &mKey.KeyHeader; 348 BS_setKeyPkcs1(mKey, bsBinKey->bsKey()); 352 BSafeItem item(mKey.KeyData); 365 if(mKey.blobType() != CSSM_KEYBLOB_RAW) { 378 switch(mKey.algorithm()) { 380 switch(mKey.keyClass()) { 382 if(mKey.blobFormat() != 388 BS_setKeyPkcs1(mKey, bKey); 394 if(mKey [all...] |
H A D | FEEKeys.cpp | 402 feeKey = rawCssmKeyToFee(mKey); 418 if(mKey.blobType() != CSSM_KEYBLOB_RAW) { 421 feeKey = rawCssmKeyToFee(mKey); 440 assert(mKey.blobType() == CSSM_KEYBLOB_RAW); 441 if((mKey.algorithm() == CSSM_ALGID_FEE) && 442 (mKey.blobFormat() == CSSM_KEYBLOB_RAW_FORMAT_NONE) && 443 (mKey.keyClass() == CSSM_KEYCLASS_PUBLIC_KEY)) { 444 const CssmData &keyBlob = CssmData::overlay(mKey.KeyData);
|
H A D | DH_keys.cpp | 336 assert(mKey.blobType() == CSSM_KEYBLOB_RAW); 337 switch(mKey.keyClass()) { 346 DH *dhKey = rawCssmKeyToDh(mKey); 361 if(mKey.blobType() != CSSM_KEYBLOB_RAW) { 364 DH *dhKey = rawCssmKeyToDh(mKey); 390 assert(mKey.blobType() == CSSM_KEYBLOB_RAW); 393 switch(mKey.keyClass()) { 395 if(mKey.blobFormat() == CSSM_KEYBLOB_RAW_FORMAT_PKCS3) { 407 const CssmData &keyBlob = CssmData::overlay(mKey.KeyData);
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_cdsa_client/ |
H A D | macclient.h | 44 Key key() const { assert(mKey); return mKey; } 45 void key(const Key &k) { mKey = k; set(CSSM_ATTRIBUTE_KEY, mKey); } 49 Key mKey; member in class:Security::CssmClient::MacContext
|
H A D | signclient.h | 41 Key key() const { assert(mKey); return mKey; } 42 void key(const Key &k) { mKey = k; set(CSSM_ATTRIBUTE_KEY, mKey); } 50 Key mKey; member in class:Security::CssmClient::SigningContext
|
H A D | cryptoclient.cpp | 35 mKey = key; 48 if (!mKey && mAlgorithm != CSSM_ALGID_NONE) 50 if (!mKey || mKey->keyClass() == CSSM_KEYCLASS_SESSION_KEY) 53 mMode, neededCred(), mKey, mInitVector, mPadding, NULL, 59 neededCred(), mKey, mPadding, &mHandle));
|
H A D | cryptoclient.h | 44 Key key() const { return mKey; } 56 Key mKey; member in class:Security::CssmClient::Crypt
|
H A D | macclient.cpp | 37 mKey, &mHandle));
|
H A D | signclient.cpp | 36 cred(), mKey, &mHandle));
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/ |
H A D | macclient.h | 44 Key key() const { assert(mKey); return mKey; } 45 void key(const Key &k) { mKey = k; set(CSSM_ATTRIBUTE_KEY, mKey); } 49 Key mKey; member in class:Security::CssmClient::MacContext
|
H A D | signclient.h | 41 Key key() const { assert(mKey); return mKey; } 42 void key(const Key &k) { mKey = k; set(CSSM_ATTRIBUTE_KEY, mKey); } 50 Key mKey; member in class:Security::CssmClient::SigningContext
|
H A D | cryptoclient.cpp | 35 mKey = key; 48 if (!mKey && mAlgorithm != CSSM_ALGID_NONE) 50 if (!mKey || mKey->keyClass() == CSSM_KEYCLASS_SESSION_KEY) 53 mMode, neededCred(), mKey, mInitVector, mPadding, NULL, 59 neededCred(), mKey, mPadding, &mHandle));
|
H A D | cryptoclient.h | 44 Key key() const { return mKey; } 56 Key mKey; member in class:Security::CssmClient::Crypt
|
H A D | macclient.cpp | 37 mKey, &mHandle));
|
H A D | signclient.cpp | 36 cred(), mKey, &mHandle));
|
/macosx-10.10.1/ruby-106/ruby/ext/curses/ |
H A D | curses.c | 65 static VALUE mKey; variable 2671 mKey = rb_define_module_under(mCurses, "Key"); 3393 rb_define_const(mKey, "MOUSE", INT2NUM(KEY_MOUSE)); 3403 rb_define_const(mKey, "MIN", INT2NUM(KEY_MIN)); 3413 rb_define_const(mKey, "BREAK", INT2NUM(KEY_BREAK)); 3423 rb_define_const(mKey, "DOWN", INT2NUM(KEY_DOWN)); 3433 rb_define_const(mKey, "UP", INT2NUM(KEY_UP)); 3443 rb_define_const(mKey, "LEFT", INT2NUM(KEY_LEFT)); 3453 rb_define_const(mKey, "RIGHT", INT2NUM(KEY_RIGHT)); 3463 rb_define_const(mKey, "HOM [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | appleSession.c | 114 SSLBuffer mKey; member in struct:SessionCacheEntry 141 serr = SSLCopyBuffer(key, &entry->mKey); 148 SSLFreeBuffer(&entry->mKey); 162 SSLFreeBuffer(&entry->mKey); // no SSLContext 171 if(key->length != entry->mKey.length) { 174 if((key->data == NULL) || (entry->mKey.data == NULL)) { 177 return (memcmp(key->data, entry->mKey.data, entry->mKey.length) == 0); 331 cachePrint(entry, &entry->mKey, &entry->mSessionData); 355 cachePrint(entry, &entry->mKey, [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | appleSession.c | 114 SSLBuffer mKey; member in struct:SessionCacheEntry 141 serr = SSLCopyBuffer(key, &entry->mKey); 148 SSLFreeBuffer(&entry->mKey); 162 SSLFreeBuffer(&entry->mKey); // no SSLContext 171 if(key->length != entry->mKey.length) { 174 if((key->data == NULL) || (entry->mKey.data == NULL)) { 177 return (memcmp(key->data, entry->mKey.data, entry->mKey.length) == 0); 331 cachePrint(entry, &entry->mKey, &entry->mSessionData); 355 cachePrint(entry, &entry->mKey, [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | appleSession.c | 114 SSLBuffer mKey; member in struct:SessionCacheEntry 141 serr = SSLCopyBuffer(key, &entry->mKey); 148 SSLFreeBuffer(&entry->mKey); 162 SSLFreeBuffer(&entry->mKey); // no SSLContext 171 if(key->length != entry->mKey.length) { 174 if((key->data == NULL) || (entry->mKey.data == NULL)) { 177 return (memcmp(key->data, entry->mKey.data, entry->mKey.length) == 0); 331 cachePrint(entry, &entry->mKey, &entry->mSessionData); 355 cachePrint(entry, &entry->mKey, [all...] |