Searched refs:respDER (Results 1 - 6 of 6) sorted by relevance

/macosx-10.10.1/Security-57031.1.35/Security/include/security_smime/
H A DtsaSupportPriv.h42 OSStatus SecTSAResponseCopyDEREncoding(SecAsn1CoderRef coder, const CSSM_DATA *tsaResponse, SecAsn1TimeStampRespDER *respDER);
H A Dcmssigdata.c286 SecAsn1TimeStampRespDER respDER = {{{0}},}; local
296 require_noerr(SecTSAResponseCopyDEREncoding(coder, tsaResponse, &respDER), xit);
299 tsaWriteFileX("/tmp/tsa-timeStampToken.der", respDER.timeStampTokenDER.Data, respDER.timeStampTokenDER.Length);
302 tsastatus = (SecAsn1TSAPKIStatusInfo *)&respDER.status;
346 require_action(respDER.timeStampTokenDER.Data && respDER.timeStampTokenDER.Length, xit, status = errSecTimestampBadDataFormat);
351 The bytes in respDER are a full CMS message, which we need to check now for validity.
355 require_noerr(status = decodeTimeStampToken(signerinfo, &respDER.timeStampTokenDER, NULL, expectedNonce), xit);
357 status = SecCmsSignerInfoAddTimeStamp(signerinfo, &respDER
[all...]
H A DtsaSupport.c716 OSStatus SecTSAResponseCopyDEREncoding(SecAsn1CoderRef coder, const CSSM_DATA *tsaResponse, SecAsn1TimeStampRespDER *respDER) argument
721 require(tsaResponse && respDER, errOut);
723 &kSecAsn1TSATimeStampRespTemplateDER, respDER), errOut);
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_smime/lib/
H A DtsaSupportPriv.h42 OSStatus SecTSAResponseCopyDEREncoding(SecAsn1CoderRef coder, const CSSM_DATA *tsaResponse, SecAsn1TimeStampRespDER *respDER);
H A Dcmssigdata.c286 SecAsn1TimeStampRespDER respDER = {{{0}},}; local
296 require_noerr(SecTSAResponseCopyDEREncoding(coder, tsaResponse, &respDER), xit);
299 tsaWriteFileX("/tmp/tsa-timeStampToken.der", respDER.timeStampTokenDER.Data, respDER.timeStampTokenDER.Length);
302 tsastatus = (SecAsn1TSAPKIStatusInfo *)&respDER.status;
346 require_action(respDER.timeStampTokenDER.Data && respDER.timeStampTokenDER.Length, xit, status = errSecTimestampBadDataFormat);
351 The bytes in respDER are a full CMS message, which we need to check now for validity.
355 require_noerr(status = decodeTimeStampToken(signerinfo, &respDER.timeStampTokenDER, NULL, expectedNonce), xit);
357 status = SecCmsSignerInfoAddTimeStamp(signerinfo, &respDER
[all...]
H A DtsaSupport.c716 OSStatus SecTSAResponseCopyDEREncoding(SecAsn1CoderRef coder, const CSSM_DATA *tsaResponse, SecAsn1TimeStampRespDER *respDER) argument
721 require(tsaResponse && respDER, errOut);
723 &kSecAsn1TSATimeStampRespTemplateDER, respDER), errOut);

Completed in 169 milliseconds