Searched refs:dataToSign (Results 1 - 22 of 22) sorted by relevance

/macosx-10.9.5/Security-55471.14.18/sec/Security/
H A DSecKey.h158 @param dataToSign The data to be signed, typically the digest of the
160 @param dataToSignLen Length of dataToSign in bytes.
173 first byte of dataToSign is zero; there is no way to verify leading zeroes
177 of the digest type - and the dataToSign is a SHA1 digest - use
183 const uint8_t *dataToSign,
H A DSecKey.c482 const uint8_t *dataToSign, /* signature over this data */
483 size_t dataToSignLen, /* length of dataToSign */
540 memcpy(&digestInfo[offset], dataToSign, digestLen);
557 const uint8_t *dataToSign, /* signature over this data */
558 size_t dataToSignLen, /* length of dataToSign */
565 return key->key_class->rawSign(key, padding, dataToSign, dataToSignLen,
568 return SecKeyDigestInfoSignVerify(key, padding, dataToSign, dataToSignLen,
577 size_t signedDataLen, /* length of dataToSign */
479 SecKeyDigestInfoSignVerify( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen, int mode) argument
554 SecKeyRawSign( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
H A DSecKeyPriv.h94 const uint8_t *dataToSign, size_t dataToSignLen,
H A DSecECKey.c433 const uint8_t *dataToSign, size_t dataToSignLen,
440 require_noerr(err = ccec_sign(fullkey, dataToSignLen, dataToSign,
432 SecECPrivateKeyRawSign(SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
H A DSecRSAKey.c793 const uint8_t *dataToSign, size_t dataToSignLen,
813 require_noerr_quiet(ccn_read_uint(ccrsa_ctx_n(fullkey), s, dataToSignLen, dataToSign), errOut);
844 memcpy(sBytes, dataToSign, dataToSignLen);
792 SecRSAPrivateKeyRawSign(SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/
H A DsslKeyExchange.c249 uint8_t *dataToSign; local
281 dataToSign = hashes;
301 dataToSign,
309 dataToSign, // one or two hashes
334 uint8_t *dataToSign; local
347 dataToSign = hashes;
367 dataToSign = &hashes[SSL_MD5_DIGEST_LEN];
388 dataToSign, // one or two hashes
582 uint8_t *dataToSign; local
596 dataToSign
661 uint8_t *dataToSign; local
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/
H A DsslKeyExchange.c249 uint8_t *dataToSign; local
281 dataToSign = hashes;
301 dataToSign,
309 dataToSign, // one or two hashes
334 uint8_t *dataToSign; local
347 dataToSign = hashes;
367 dataToSign = &hashes[SSL_MD5_DIGEST_LEN];
388 dataToSign, // one or two hashes
582 uint8_t *dataToSign; local
596 dataToSign
661 uint8_t *dataToSign; local
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/
H A DsslKeyExchange.c249 uint8_t *dataToSign; local
281 dataToSign = hashes;
301 dataToSign,
309 dataToSign, // one or two hashes
334 uint8_t *dataToSign; local
347 dataToSign = hashes;
367 dataToSign = &hashes[SSL_MD5_DIGEST_LEN];
388 dataToSign, // one or two hashes
582 uint8_t *dataToSign; local
596 dataToSign
661 uint8_t *dataToSign; local
[all...]
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/
H A DSecKeyPriv.h78 const uint8_t *dataToSign, size_t dataToSignLen,
254 @param dataToSign The data to be signed, typically the digest of the actual data.
255 @param dataToSignLen Length of dataToSign in bytes.
267 first byte of dataToSign is zero; there is no way to verify leading zeroes
271 the digest type - and the dataToSign is a SHA1 digest - use kSecPaddingPKCS1SHA1.
276 const uint8_t *dataToSign,
H A DKeyItem.h122 void RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signedData);
H A DKeyItem.cpp1163 void KeyItem::RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signature) argument
1212 CssmData data(dataToSign.Data, dataToSign.Length);
H A DSecKey.cpp822 const uint8_t *dataToSign,
833 dataInput.Data = (uint8_t*) dataToSign;
852 size_t signedDataLen, /* length of dataToSign */
819 SecKeyRawSign( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/
H A DSecKeyPriv.h78 const uint8_t *dataToSign, size_t dataToSignLen,
254 @param dataToSign The data to be signed, typically the digest of the actual data.
255 @param dataToSignLen Length of dataToSign in bytes.
267 first byte of dataToSign is zero; there is no way to verify leading zeroes
271 the digest type - and the dataToSign is a SHA1 digest - use kSecPaddingPKCS1SHA1.
276 const uint8_t *dataToSign,
H A DKeyItem.h122 void RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signedData);
H A DKeyItem.cpp1163 void KeyItem::RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signature) argument
1212 CssmData data(dataToSign.Data, dataToSign.Length);
H A DSecKey.cpp822 const uint8_t *dataToSign,
833 dataInput.Data = (uint8_t*) dataToSign;
852 size_t signedDataLen, /* length of dataToSign */
819 SecKeyRawSign( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/
H A DSecKeyPriv.h78 const uint8_t *dataToSign, size_t dataToSignLen,
254 @param dataToSign The data to be signed, typically the digest of the actual data.
255 @param dataToSignLen Length of dataToSign in bytes.
267 first byte of dataToSign is zero; there is no way to verify leading zeroes
271 the digest type - and the dataToSign is a SHA1 digest - use kSecPaddingPKCS1SHA1.
276 const uint8_t *dataToSign,
H A DKeyItem.h122 void RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signedData);
H A DKeyItem.cpp1163 void KeyItem::RawSign(SecPadding padding, CSSM_DATA dataToSign, const AccessCredentials *credentials, CSSM_DATA& signature) argument
1212 CssmData data(dataToSign.Data, dataToSign.Length);
H A DSecKey.cpp822 const uint8_t *dataToSign,
833 dataInput.Data = (uint8_t*) dataToSign;
852 size_t signedDataLen, /* length of dataToSign */
819 SecKeyRawSign( SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/
H A Dsi-40-seckey-custom.c35 const uint8_t *dataToSign, size_t dataToSignLen,
34 CustomKeyRawSign(SecKeyRef key, SecPadding padding, const uint8_t *dataToSign, size_t dataToSignLen, uint8_t *sig, size_t *sigLen) argument
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSMacOSX/
H A DCryptoSupport.c592 CFDataRef dataToSign = CFDataCreate(NULL, digest, dlen); local
593 if (dataToSign == NULL)
599 ret = SecTransformSetAttribute(verifyXForm, kSecTransformInputAttributeName, dataToSign, &error);
600 CFRelease(dataToSign);

Completed in 304 milliseconds