/macosx-10.9.5/Security-55471.14.18/sec/Security/ |
H A D | SecKey.h | 46 kSecPaddingNone = 0, enumerator in enum:__anon5087 166 will be performed prior to signing. If this argument is kSecPaddingNone, 172 NOTE: The behavior this function with kSecPaddingNone is undefined if the 203 will be checked during verification. If this argument is kSecPaddingNone, 233 will be performed prior to encryption. If this argument is kSecPaddingNone, 265 will be removed after decryption. If this argument is kSecPaddingNone, 273 SecPadding padding, /* kSecPaddingNone,
|
H A D | SecRSAKey.c | 296 case kSecPaddingNone: 364 case kSecPaddingNone: 463 case kSecPaddingNone: 810 case kSecPaddingNone: 890 case kSecPaddingNone:
|
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/ |
H A D | rsa-sf.c | 171 status = SecKeyDecrypt(key, kSecPaddingNone, from, flen, to, &tlen); 236 status = SecKeyDecrypt(key, kSecPaddingNone, from, flen, to, &tlen);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/regressions/ |
H A D | kc-40-seckey.c | 125 case kSecPaddingNone: max_len = keySizeInBytes; break; 140 if (padding == kSecPaddingNone) { 157 if (padding == kSecPaddingNone) { 282 ok_status(SecKeyEncrypt(pubKey, kSecPaddingNone, sig, sigLen, signature, &signature_len), "inspect signature"); 340 test_encrypt_decrypt(pubKey, privKey, kSecPaddingNone, keySizeInBytes);
|
H A D | kc-41-sececkey.c | 180 ok_status(SecKeyRawSign(privKey, kSecPaddingNone, 182 ok_status(SecKeyRawVerify(pubKey, kSecPaddingNone,
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/ |
H A D | si-40-seckey.c | 116 case kSecPaddingNone: max_len = keySizeInBytes; break; 131 if (padding == kSecPaddingNone) { 148 if (padding == kSecPaddingNone) { 236 ok_status(SecKeyDecrypt(pubKey, kSecPaddingNone, sig, sigLen, signature, &signature_len), "inspect signature"); 291 test_encrypt_decrypt(pubKey, privKey, kSecPaddingNone, keySizeInBytes);
|
H A D | si-41-sececkey.c | 133 ok_status(SecKeyRawSign(privKey, kSecPaddingNone, 135 ok_status(SecKeyRawVerify(pubKey, kSecPaddingNone,
|
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | SecKey.h | 176 kSecPaddingNone = 0, enumerator in enum:__anon3733
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | SecKey.h | 176 kSecPaddingNone = 0, enumerator in enum:__anon4619
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | SecKey.h | 176 kSecPaddingNone = 0, enumerator in enum:__anon4706
|
/macosx-10.9.5/Security-55471.14.18/sec/SOSCircle/SecureObjectSync/ |
H A D | SOSPeerInfo.c | 118 if((stat = SecKeyRawSign(privkey, kSecPaddingNone, hbuf, di->output_size, sig, &siglen)) != 0) { 125 return SecKeyRawVerify(pubkey, kSecPaddingNone, hbuf, di->output_size,
|
H A D | SOSCircle.c | 216 OSStatus stat = SecKeyRawSign(privKey, kSecPaddingNone, hash_result, di->output_size, tmp, &tmplen); 251 return SecKeyRawVerify(pubKey, kSecPaddingNone, hash_result, di->output_size,
|