Searched refs:respDER (Results 1 - 6 of 6) sorted by relevance
/macosx-10.10.1/Security-57031.1.35/Security/include/security_smime/ |
H A D | tsaSupportPriv.h | 42 OSStatus SecTSAResponseCopyDEREncoding(SecAsn1CoderRef coder, const CSSM_DATA *tsaResponse, SecAsn1TimeStampRespDER *respDER);
|
H A D | cmssigdata.c | 286 SecAsn1TimeStampRespDER respDER = {{{0}},}; local 296 require_noerr(SecTSAResponseCopyDEREncoding(coder, tsaResponse, &respDER), xit); 299 tsaWriteFileX("/tmp/tsa-timeStampToken.der", respDER.timeStampTokenDER.Data, respDER.timeStampTokenDER.Length); 302 tsastatus = (SecAsn1TSAPKIStatusInfo *)&respDER.status; 346 require_action(respDER.timeStampTokenDER.Data && respDER.timeStampTokenDER.Length, xit, status = errSecTimestampBadDataFormat); 351 The bytes in respDER are a full CMS message, which we need to check now for validity. 355 require_noerr(status = decodeTimeStampToken(signerinfo, &respDER.timeStampTokenDER, NULL, expectedNonce), xit); 357 status = SecCmsSignerInfoAddTimeStamp(signerinfo, &respDER [all...] |
H A D | tsaSupport.c | 716 OSStatus SecTSAResponseCopyDEREncoding(SecAsn1CoderRef coder, const CSSM_DATA *tsaResponse, SecAsn1TimeStampRespDER *respDER) argument 721 require(tsaResponse && respDER, errOut); 723 &kSecAsn1TSATimeStampRespTemplateDER, respDER), errOut);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_smime/lib/ |
H A D | tsaSupportPriv.h | 42 OSStatus SecTSAResponseCopyDEREncoding(SecAsn1CoderRef coder, const CSSM_DATA *tsaResponse, SecAsn1TimeStampRespDER *respDER);
|
H A D | cmssigdata.c | 286 SecAsn1TimeStampRespDER respDER = {{{0}},}; local 296 require_noerr(SecTSAResponseCopyDEREncoding(coder, tsaResponse, &respDER), xit); 299 tsaWriteFileX("/tmp/tsa-timeStampToken.der", respDER.timeStampTokenDER.Data, respDER.timeStampTokenDER.Length); 302 tsastatus = (SecAsn1TSAPKIStatusInfo *)&respDER.status; 346 require_action(respDER.timeStampTokenDER.Data && respDER.timeStampTokenDER.Length, xit, status = errSecTimestampBadDataFormat); 351 The bytes in respDER are a full CMS message, which we need to check now for validity. 355 require_noerr(status = decodeTimeStampToken(signerinfo, &respDER.timeStampTokenDER, NULL, expectedNonce), xit); 357 status = SecCmsSignerInfoAddTimeStamp(signerinfo, &respDER [all...] |
H A D | tsaSupport.c | 716 OSStatus SecTSAResponseCopyDEREncoding(SecAsn1CoderRef coder, const CSSM_DATA *tsaResponse, SecAsn1TimeStampRespDER *respDER) argument 721 require(tsaResponse && respDER, errOut); 723 &kSecAsn1TSATimeStampRespTemplateDER, respDER), errOut);
|
Completed in 169 milliseconds