/macosx-10.9.5/Security-55471.14.18/sec/Security/ |
H A D | SecKey.h | 47 kSecPaddingPKCS1 = 1, enumerator in enum:__anon5087 165 @discussion If the padding argument is kSecPaddingPKCS1, PKCS1 padding 202 @discussion If the padding argument is kSecPaddingPKCS1, PKCS1 padding 224 @param padding See Padding Types above, typically kSecPaddingPKCS1. 232 @discussion If the padding argument is kSecPaddingPKCS1, PKCS1 padding 256 @param padding See Padding Types above, typically kSecPaddingPKCS1. 264 @discussion If the padding argument is kSecPaddingPKCS1, PKCS1 padding 274 kSecPaddingPKCS1,
|
H A D | SecKey.c | 481 SecPadding padding, /* kSecPaddingPKCS1@@@ */ 544 return key->key_class->rawSign(key, kSecPaddingPKCS1, 547 return key->key_class->rawVerify(key, kSecPaddingPKCS1, 556 SecPadding padding, /* kSecPaddingNone or kSecPaddingPKCS1 */ 575 SecPadding padding, /* kSecPaddingNone or kSecPaddingPKCS1 */ 598 SecPadding padding, /* kSecPaddingNone, kSecPaddingPKCS1, kSecPaddingOAEP */ 611 SecPadding padding, /* kSecPaddingNone, kSecPaddingPKCS1, kSecPaddingOAEP */ 925 return SecKeyRawVerify(this, kSecPaddingPKCS1, 944 return SecKeyRawSign(this, kSecPaddingPKCS1, 963 return SecKeyRawVerify(this, kSecPaddingPKCS1, [all...] |
H A D | SecRSAKey.c | 302 case kSecPaddingPKCS1: 371 case kSecPaddingPKCS1: 471 case kSecPaddingPKCS1: 817 case kSecPaddingPKCS1: 897 case kSecPaddingPKCS1:
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/regressions/ |
H A D | kc-40-seckey.c | 127 case kSecPaddingPKCS1: max_len = keySizeInBytes - 11; break; 227 is_status(SecKeyRawSign(privKey, kSecPaddingPKCS1, 231 ok_status(SecKeyRawSign(privKey, kSecPaddingPKCS1, 233 ok_status(SecKeyRawVerify(pubKey, kSecPaddingPKCS1, 341 test_encrypt_decrypt(pubKey, privKey, kSecPaddingPKCS1, keySizeInBytes); 442 ok_status(SecKeyRawSign(privKey2, kSecPaddingPKCS1, 444 ok_status(SecKeyRawVerify(pubKey2, kSecPaddingPKCS1,
|
H A D | kc-41-sececkey.c | 284 ok_status(SecKeyRawSign(privKey2, kSecPaddingPKCS1, 286 ok_status(SecKeyRawVerify(pubKey2, kSecPaddingPKCS1,
|
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/ |
H A D | si-40-seckey.c | 118 case kSecPaddingPKCS1: max_len = keySizeInBytes - 11; break; 189 is_status(SecKeyRawSign(privKey, kSecPaddingPKCS1, 192 ok_status(SecKeyRawSign(privKey, kSecPaddingPKCS1, 194 ok_status(SecKeyRawVerify(pubKey, kSecPaddingPKCS1, 292 test_encrypt_decrypt(pubKey, privKey, kSecPaddingPKCS1, keySizeInBytes); 386 ok_status(SecKeyRawSign(privKey2, kSecPaddingPKCS1, 388 ok_status(SecKeyRawVerify(pubKey2, kSecPaddingPKCS1,
|
H A D | si-40-seckey-custom.c | 114 SecPadding padding = kSecPaddingPKCS1;
|
H A D | si-41-sececkey.c | 232 ok_status(SecKeyRawSign(privKey2, kSecPaddingPKCS1, 234 ok_status(SecKeyRawVerify(pubKey2, kSecPaddingPKCS1,
|
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/ |
H A D | rsa-sf.c | 147 status = SecKeyEncrypt(key, kSecPaddingPKCS1, from, flen, to, &tlen); 211 status = SecKeyEncrypt(key, kSecPaddingPKCS1, from, flen, to, &tlen); 234 /* SecKeyDecrypt gets kSecPaddingPKCS1 wrong (14322412), lets inline pkcs1 padding here ourself */
|
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/ |
H A D | SecKey.h | 177 kSecPaddingPKCS1 = 1, enumerator in enum:__anon3733
|
H A D | KeyItem.cpp | 1176 case kSecPaddingPKCS1: 1234 case kSecPaddingPKCS1: 1289 case kSecPaddingPKCS1: 1328 case kSecPaddingPKCS1:
|
H A D | SecKey.cpp | 850 SecPadding padding, /* kSecPaddingNone or kSecPaddingPKCS1 */ 921 SecPadding padding, /* kSecPaddingNone, kSecPaddingPKCS1, kSecPaddingOAEP */ 1710 return SecKeyRawVerify(key, kSecPaddingPKCS1, 1730 return SecKeyRawSign(key, kSecPaddingPKCS1,
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/ |
H A D | SecKey.h | 177 kSecPaddingPKCS1 = 1, enumerator in enum:__anon4619
|
H A D | KeyItem.cpp | 1176 case kSecPaddingPKCS1: 1234 case kSecPaddingPKCS1: 1289 case kSecPaddingPKCS1: 1328 case kSecPaddingPKCS1:
|
H A D | SecKey.cpp | 850 SecPadding padding, /* kSecPaddingNone or kSecPaddingPKCS1 */ 921 SecPadding padding, /* kSecPaddingNone, kSecPaddingPKCS1, kSecPaddingOAEP */ 1710 return SecKeyRawVerify(key, kSecPaddingPKCS1, 1730 return SecKeyRawSign(key, kSecPaddingPKCS1,
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/ |
H A D | SecKey.h | 177 kSecPaddingPKCS1 = 1, enumerator in enum:__anon4706
|
H A D | KeyItem.cpp | 1176 case kSecPaddingPKCS1: 1234 case kSecPaddingPKCS1: 1289 case kSecPaddingPKCS1: 1328 case kSecPaddingPKCS1:
|
H A D | SecKey.cpp | 850 SecPadding padding, /* kSecPaddingNone or kSecPaddingPKCS1 */ 921 SecPadding padding, /* kSecPaddingNone, kSecPaddingPKCS1, kSecPaddingOAEP */ 1710 return SecKeyRawVerify(key, kSecPaddingPKCS1, 1730 return SecKeyRawSign(key, kSecPaddingPKCS1,
|
/macosx-10.9.5/Heimdal-323.92.1/lib/hx509/ |
H A D | ks_keychain.c | 337 kSecPaddingPKCS1, 359 kSecPaddingPKCS1,
|
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/ |
H A D | crypto_cssm.c | 296 return SecKeyRawVerify(publicKeyRef, useSHA1 ? kSecPaddingPKCS1SHA1 : kSecPaddingPKCS1, (uint8_t*)hash->v, hash->l, (uint8_t*)signature->v, signature->l); 337 status = SecKeyRawSign(privateKeyRef, kSecPaddingPKCS1, (uint8_t*)hash->v,
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/ |
H A D | sslCrypto.c | 169 OSStatus status = SecKeyRawSign(SECKEYREF(privKey), kSecPaddingPKCS1, 248 OSStatus status = SecKeyRawVerify(SECKEYREF(pubKey), kSecPaddingPKCS1,
|
H A D | sslKeyExchange.c | 954 kSecPaddingPKCS1, 1063 kSecPaddingPKCS1,
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/ |
H A D | sslCrypto.c | 169 OSStatus status = SecKeyRawSign(SECKEYREF(privKey), kSecPaddingPKCS1, 248 OSStatus status = SecKeyRawVerify(SECKEYREF(pubKey), kSecPaddingPKCS1,
|
H A D | sslKeyExchange.c | 954 kSecPaddingPKCS1, 1063 kSecPaddingPKCS1,
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/ |
H A D | sslCrypto.c | 169 OSStatus status = SecKeyRawSign(SECKEYREF(privKey), kSecPaddingPKCS1, 248 OSStatus status = SecKeyRawVerify(SECKEYREF(pubKey), kSecPaddingPKCS1,
|