/macosx-10.9.5/Security-55471.14.18/sec/Security/ |
H A D | SecKey.h | 158 @param dataToSign The data to be signed, typically the digest of the 160 @param dataToSignLen Length of dataToSign in bytes. 173 first byte of dataToSign is zero; there is no way to verify leading zeroes 177 of the digest type - and the dataToSign is a SHA1 digest - use 183 const uint8_t *dataToSign,
|
H A D | SecKey.c | 482 const uint8_t *dataToSign, /* signature over this data */ 483 size_t dataToSignLen, /* length of dataToSign */ 540 memcpy(&digestInfo[offset], dataToSign, digestLen); 557 const uint8_t *dataToSign, /* signature over this data */ 558 size_t dataToSignLen, /* length of dataToSign */ 565 return key->key_class->rawSign(key, padding, dataToSign, dataToSignLen, 568 return SecKeyDigestInfoSignVerify(key, padding, dataToSign, dataToSignLen, 577 size_t signedDataLen, /* length of dataToSign */ 479 SecKeyDigestInfoSignVerify( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen, int mode) argument 554 SecKeyRawSign( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
|
H A D | SecKeyPriv.h | 94 const uint8_t *dataToSign, size_t dataToSignLen,
|
H A D | SecECKey.c | 433 const uint8_t *dataToSign, size_t dataToSignLen, 440 require_noerr(err = ccec_sign(fullkey, dataToSignLen, dataToSign, 432 SecECPrivateKeyRawSign(SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
|
H A D | SecRSAKey.c | 793 const uint8_t *dataToSign, size_t dataToSignLen, 813 require_noerr_quiet(ccn_read_uint(ccrsa_ctx_n(fullkey), s, dataToSignLen, dataToSign), errOut); 844 memcpy(sBytes, dataToSign, dataToSignLen); 792 SecRSAPrivateKeyRawSign(SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/ |
H A D | sslKeyExchange.c | 249 uint8_t *dataToSign; local 281 dataToSign = hashes; 301 dataToSign, 309 dataToSign, // one or two hashes 334 uint8_t *dataToSign; local 347 dataToSign = hashes; 367 dataToSign = &hashes[SSL_MD5_DIGEST_LEN]; 388 dataToSign, // one or two hashes 582 uint8_t *dataToSign; local 596 dataToSign 661 uint8_t *dataToSign; local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/ |
H A D | sslKeyExchange.c | 249 uint8_t *dataToSign; local 281 dataToSign = hashes; 301 dataToSign, 309 dataToSign, // one or two hashes 334 uint8_t *dataToSign; local 347 dataToSign = hashes; 367 dataToSign = &hashes[SSL_MD5_DIGEST_LEN]; 388 dataToSign, // one or two hashes 582 uint8_t *dataToSign; local 596 dataToSign 661 uint8_t *dataToSign; local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/ |
H A D | sslKeyExchange.c | 249 uint8_t *dataToSign; local 281 dataToSign = hashes; 301 dataToSign, 309 dataToSign, // one or two hashes 334 uint8_t *dataToSign; local 347 dataToSign = hashes; 367 dataToSign = &hashes[SSL_MD5_DIGEST_LEN]; 388 dataToSign, // one or two hashes 582 uint8_t *dataToSign; local 596 dataToSign 661 uint8_t *dataToSign; local [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | SecKeyPriv.h | 78 const uint8_t *dataToSign, size_t dataToSignLen, 254 @param dataToSign The data to be signed, typically the digest of the actual data. 255 @param dataToSignLen Length of dataToSign in bytes. 267 first byte of dataToSign is zero; there is no way to verify leading zeroes 271 the digest type - and the dataToSign is a SHA1 digest - use kSecPaddingPKCS1SHA1. 276 const uint8_t *dataToSign,
|
H A D | KeyItem.h | 122 void RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signedData);
|
H A D | KeyItem.cpp | 1163 void KeyItem::RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signature) argument 1212 CssmData data(dataToSign.Data, dataToSign.Length);
|
H A D | SecKey.cpp | 822 const uint8_t *dataToSign, 833 dataInput.Data = (uint8_t*) dataToSign; 852 size_t signedDataLen, /* length of dataToSign */ 819 SecKeyRawSign( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | SecKeyPriv.h | 78 const uint8_t *dataToSign, size_t dataToSignLen, 254 @param dataToSign The data to be signed, typically the digest of the actual data. 255 @param dataToSignLen Length of dataToSign in bytes. 267 first byte of dataToSign is zero; there is no way to verify leading zeroes 271 the digest type - and the dataToSign is a SHA1 digest - use kSecPaddingPKCS1SHA1. 276 const uint8_t *dataToSign,
|
H A D | KeyItem.h | 122 void RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signedData);
|
H A D | KeyItem.cpp | 1163 void KeyItem::RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signature) argument 1212 CssmData data(dataToSign.Data, dataToSign.Length);
|
H A D | SecKey.cpp | 822 const uint8_t *dataToSign, 833 dataInput.Data = (uint8_t*) dataToSign; 852 size_t signedDataLen, /* length of dataToSign */ 819 SecKeyRawSign( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | SecKeyPriv.h | 78 const uint8_t *dataToSign, size_t dataToSignLen, 254 @param dataToSign The data to be signed, typically the digest of the actual data. 255 @param dataToSignLen Length of dataToSign in bytes. 267 first byte of dataToSign is zero; there is no way to verify leading zeroes 271 the digest type - and the dataToSign is a SHA1 digest - use kSecPaddingPKCS1SHA1. 276 const uint8_t *dataToSign,
|
H A D | KeyItem.h | 122 void RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signedData);
|
H A D | KeyItem.cpp | 1163 void KeyItem::RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signature) argument 1212 CssmData data(dataToSign.Data, dataToSign.Length);
|
H A D | SecKey.cpp | 822 const uint8_t *dataToSign, 833 dataInput.Data = (uint8_t*) dataToSign; 852 size_t signedDataLen, /* length of dataToSign */ 819 SecKeyRawSign( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/ |
H A D | si-40-seckey-custom.c | 35 const uint8_t *dataToSign, size_t dataToSignLen, 34 CustomKeyRawSign(SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
|
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSMacOSX/ |
H A D | CryptoSupport.c | 592 CFDataRef dataToSign = CFDataCreate(NULL, digest, dlen); local 593 if (dataToSign == NULL) 599 ret = SecTransformSetAttribute(verifyXForm, kSecTransformInputAttributeName, dataToSign, &error); 600 CFRelease(dataToSign);
|