/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_ssl/regressions/ |
H A D | gencerts.sh | 4 openssl req -x509 -newkey rsa:1024 -sha1 -days 3650 -subj "$SUBJECT" -nodes -keyout privkey-1.pem -out cert-1.pem 6 openssl rsa -in privkey-1.pem -out privkey-1.der -outform DER 7 openssl pkcs12 -export -passout pass:password -out identity-1.p12 -inkey privkey-1.pem -in cert-1.pem 9 xxd -i privkey-1.der privkey-1.h
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_smime/ |
H A D | cmsreclist.h | 49 SecPrivateKeyRef privkey; member in struct:SecCmsRecipientStr
|
H A D | cmslocal.h | 180 SecCmsUtilDecryptSymKeyRSA(SecPrivateKeyRef privkey, CSSM_DATA_PTR encKey, SECOidTag bulkalgtag); 188 SecCmsUtilDecryptSymKeyECDH(SecPrivateKeyRef privkey, CSSM_DATA_PTR encKey, CSSM_DATA_PTR ukm, 197 SecCmsUtilDecryptSymKeyMISSI(SecPrivateKeyRef privkey, CSSM_DATA_PTR encKey, 206 SecCmsUtilDecryptSymKeyESDH(SecPrivateKeyRef privkey, CSSM_DATA_PTR encKey,
|
H A D | cmsenvdata.c | 359 if (!recipient->cert || !recipient->privkey) { 373 recipient->privkey, 382 // @@@ See 3401088 for details. We need to CFRelease cinfo->bulkkey before recipient->privkey gets CFReleased. It's created with SecKeyCreateWithCSSMKey which is not safe currently. If the private key's SecKeyRef from which we extracted the CSP gets CFRelease before the builkkey does we crash. We should really fix SecKeyCreateWithCSSMKey which is a huge hack currently. To work around this we add recipient->privkey to the cinfo so it gets when cinfo is destroyed. 383 CFRetain(recipient->privkey); 384 cinfo->privkey = recipient->privkey;
|
H A D | cmsreclist.c | 167 if (recipient->privkey) 168 CFRelease(recipient->privkey); 224 recipient->privkey = privKey;
|
H A D | cryptohi.h | 138 extern SecSymmetricKeyRef WRAP_PubUnwrapSymKey(SecPrivateKeyRef privkey, CSSM_DATA_PTR encKey, SECOidTag bulkalgtag);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_smime/lib/ |
H A D | cmsreclist.h | 49 SecPrivateKeyRef privkey; member in struct:SecCmsRecipientStr
|
H A D | cmslocal.h | 180 SecCmsUtilDecryptSymKeyRSA(SecPrivateKeyRef privkey, CSSM_DATA_PTR encKey, SECOidTag bulkalgtag); 188 SecCmsUtilDecryptSymKeyECDH(SecPrivateKeyRef privkey, CSSM_DATA_PTR encKey, CSSM_DATA_PTR ukm, 197 SecCmsUtilDecryptSymKeyMISSI(SecPrivateKeyRef privkey, CSSM_DATA_PTR encKey, 206 SecCmsUtilDecryptSymKeyESDH(SecPrivateKeyRef privkey, CSSM_DATA_PTR encKey,
|
H A D | cmsenvdata.c | 359 if (!recipient->cert || !recipient->privkey) { 373 recipient->privkey, 382 // @@@ See 3401088 for details. We need to CFRelease cinfo->bulkkey before recipient->privkey gets CFReleased. It's created with SecKeyCreateWithCSSMKey which is not safe currently. If the private key's SecKeyRef from which we extracted the CSP gets CFRelease before the builkkey does we crash. We should really fix SecKeyCreateWithCSSMKey which is a huge hack currently. To work around this we add recipient->privkey to the cinfo so it gets when cinfo is destroyed. 383 CFRetain(recipient->privkey); 384 cinfo->privkey = recipient->privkey;
|
H A D | cmsreclist.c | 167 if (recipient->privkey) 168 CFRelease(recipient->privkey); 224 recipient->privkey = privKey;
|
H A D | cryptohi.h | 138 extern SecSymmetricKeyRef WRAP_PubUnwrapSymKey(SecPrivateKeyRef privkey, CSSM_DATA_PTR encKey, SECOidTag bulkalgtag);
|
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/Security/ |
H A D | cmsreclist.h | 49 SecPrivateKeyRef privkey; member in struct:SecCmsRecipientStr
|
H A D | cmslocal.h | 181 SecCmsUtilDecryptSymKeyRSA(SecPrivateKeyRef privkey, SecAsn1Item * encKey, SECOidTag bulkalgtag); 189 SecCmsUtilDecryptSymKeyMISSI(SecPrivateKeyRef privkey, SecAsn1Item * encKey, 198 SecCmsUtilDecryptSymKeyESDH(SecPrivateKeyRef privkey, SecAsn1Item * encKey,
|
H A D | cmsreclist.c | 169 if (recipient->privkey) 170 CFRelease(recipient->privkey); 229 recipient->privkey = privKey;
|
H A D | cryptohi.h | 139 extern SecSymmetricKeyRef WRAP_PubUnwrapSymKey(SecPrivateKeyRef privkey, const SecAsn1Item *encKey, SECOidTag bulkalgtag);
|
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/lib/ |
H A D | cmsreclist.h | 49 SecPrivateKeyRef privkey; member in struct:SecCmsRecipientStr
|
H A D | cmslocal.h | 181 SecCmsUtilDecryptSymKeyRSA(SecPrivateKeyRef privkey, SecAsn1Item * encKey, SECOidTag bulkalgtag); 189 SecCmsUtilDecryptSymKeyMISSI(SecPrivateKeyRef privkey, SecAsn1Item * encKey, 198 SecCmsUtilDecryptSymKeyESDH(SecPrivateKeyRef privkey, SecAsn1Item * encKey,
|
H A D | cmsreclist.c | 169 if (recipient->privkey) 170 CFRelease(recipient->privkey); 229 recipient->privkey = privKey;
|
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/security_smime/ |
H A D | cmsreclist.h | 49 SecPrivateKeyRef privkey; member in struct:SecCmsRecipientStr
|
H A D | cmslocal.h | 181 SecCmsUtilDecryptSymKeyRSA(SecPrivateKeyRef privkey, SecAsn1Item * encKey, SECOidTag bulkalgtag); 189 SecCmsUtilDecryptSymKeyMISSI(SecPrivateKeyRef privkey, SecAsn1Item * encKey, 198 SecCmsUtilDecryptSymKeyESDH(SecPrivateKeyRef privkey, SecAsn1Item * encKey,
|
H A D | cmsreclist.c | 169 if (recipient->privkey) 170 CFRelease(recipient->privkey); 229 recipient->privkey = privKey;
|
/macosx-10.10.1/Heimdal-398.1.2/lib/hcrypto/ |
H A D | ec.c | 55 mp_int privkey; member in struct:EC_KEY 135 random(key->privkey, key->group->size); 136 } while(mp_cmp(key->privkey, key->group->order) >= 0); 141 if (ec_point_mul(&key->pubkey, key->group, key->privkey) != 1)
|
/macosx-10.10.1/xnu-2782.1.97/bsd/netinet6/ |
H A D | in6_cga.c | 188 struct iovec privkey, pubkey; local 195 privkey = cfg->cga_privkey; 196 if (privkey.iov_base == NULL || privkey.iov_len == 0 || 197 privkey.iov_len >= IN6_CGA_KEY_MAXSIZE) 210 MALLOC(privkeycopy, caddr_t, privkey.iov_len, M_IP6CGA, M_WAITOK); 221 bcopy(privkey.iov_base, privkeycopy, privkey.iov_len); 222 privkey.iov_base = privkeycopy; 225 in6_cga.cga_privkey = privkey; [all...] |
/macosx-10.10.1/Security-57031.1.35/Security/sec/Security/ |
H A D | SecRSAKey.c | 677 static int ccrsa_priv_init(ccrsa_priv_ctx_t privkey, argument 686 const cc_size np = cczp_n(ccrsa_ctx_private_zp(privkey)); 687 cc_size nq = cczp_n(ccrsa_ctx_private_zq(privkey)); 689 if (ccn_read_uint(np, CCZP_PRIME(ccrsa_ctx_private_zp(privkey)), p_size, p)) 691 cczp_init(ccrsa_ctx_private_zp(privkey)); 692 if (ccn_read_uint(np, ccrsa_ctx_private_dp(privkey), dp_size, dp)) 694 if (ccn_read_uint(np, ccrsa_ctx_private_qinv(privkey), qinv_size, qinv)) 697 if (ccn_read_uint(nq, CCZP_PRIME(ccrsa_ctx_private_zq(privkey)), q_size, q)) 700 nq = ccn_n(nq, cczp_prime(ccrsa_ctx_private_zq(privkey))); 701 CCZP_N(ccrsa_ctx_private_zq(privkey)) 733 ccrsa_priv_ctx_t privkey = ccrsa_ctx_private(fullkey); local 964 ccrsa_priv_ctx_t privkey = ccrsa_ctx_private(fullkey); local [all...] |
/macosx-10.10.1/Security-57031.1.35/SecurityTests/clxutils/sslScripts/openssl/ |
H A D | opensslTest | 6 set PRIV_KEY_ENCR=privkey.pem
|