Searched refs:kSecPaddingPKCS1 (Results 1 - 25 of 31) sorted by relevance

12

/macosx-10.9.5/Security-55471.14.18/sec/Security/
H A DSecKey.h47 kSecPaddingPKCS1 = 1, enumerator in enum:__anon5087
165 @discussion If the padding argument is kSecPaddingPKCS1, PKCS1 padding
202 @discussion If the padding argument is kSecPaddingPKCS1, PKCS1 padding
224 @param padding See Padding Types above, typically kSecPaddingPKCS1.
232 @discussion If the padding argument is kSecPaddingPKCS1, PKCS1 padding
256 @param padding See Padding Types above, typically kSecPaddingPKCS1.
264 @discussion If the padding argument is kSecPaddingPKCS1, PKCS1 padding
274 kSecPaddingPKCS1,
H A DSecKey.c481 SecPadding padding, /* kSecPaddingPKCS1@@@ */
544 return key->key_class->rawSign(key, kSecPaddingPKCS1,
547 return key->key_class->rawVerify(key, kSecPaddingPKCS1,
556 SecPadding padding, /* kSecPaddingNone or kSecPaddingPKCS1 */
575 SecPadding padding, /* kSecPaddingNone or kSecPaddingPKCS1 */
598 SecPadding padding, /* kSecPaddingNone, kSecPaddingPKCS1, kSecPaddingOAEP */
611 SecPadding padding, /* kSecPaddingNone, kSecPaddingPKCS1, kSecPaddingOAEP */
925 return SecKeyRawVerify(this, kSecPaddingPKCS1,
944 return SecKeyRawSign(this, kSecPaddingPKCS1,
963 return SecKeyRawVerify(this, kSecPaddingPKCS1,
[all...]
H A DSecRSAKey.c302 case kSecPaddingPKCS1:
371 case kSecPaddingPKCS1:
471 case kSecPaddingPKCS1:
817 case kSecPaddingPKCS1:
897 case kSecPaddingPKCS1:
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/regressions/
H A Dkc-40-seckey.c127 case kSecPaddingPKCS1: max_len = keySizeInBytes - 11; break;
227 is_status(SecKeyRawSign(privKey, kSecPaddingPKCS1,
231 ok_status(SecKeyRawSign(privKey, kSecPaddingPKCS1,
233 ok_status(SecKeyRawVerify(pubKey, kSecPaddingPKCS1,
341 test_encrypt_decrypt(pubKey, privKey, kSecPaddingPKCS1, keySizeInBytes);
442 ok_status(SecKeyRawSign(privKey2, kSecPaddingPKCS1,
444 ok_status(SecKeyRawVerify(pubKey2, kSecPaddingPKCS1,
H A Dkc-41-sececkey.c284 ok_status(SecKeyRawSign(privKey2, kSecPaddingPKCS1,
286 ok_status(SecKeyRawVerify(pubKey2, kSecPaddingPKCS1,
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/
H A Dsi-40-seckey.c118 case kSecPaddingPKCS1: max_len = keySizeInBytes - 11; break;
189 is_status(SecKeyRawSign(privKey, kSecPaddingPKCS1,
192 ok_status(SecKeyRawSign(privKey, kSecPaddingPKCS1,
194 ok_status(SecKeyRawVerify(pubKey, kSecPaddingPKCS1,
292 test_encrypt_decrypt(pubKey, privKey, kSecPaddingPKCS1, keySizeInBytes);
386 ok_status(SecKeyRawSign(privKey2, kSecPaddingPKCS1,
388 ok_status(SecKeyRawVerify(pubKey2, kSecPaddingPKCS1,
H A Dsi-40-seckey-custom.c114 SecPadding padding = kSecPaddingPKCS1;
H A Dsi-41-sececkey.c232 ok_status(SecKeyRawSign(privKey2, kSecPaddingPKCS1,
234 ok_status(SecKeyRawVerify(pubKey2, kSecPaddingPKCS1,
/macosx-10.9.5/Heimdal-323.92.1/lib/hcrypto/
H A Drsa-sf.c147 status = SecKeyEncrypt(key, kSecPaddingPKCS1, from, flen, to, &tlen);
211 status = SecKeyEncrypt(key, kSecPaddingPKCS1, from, flen, to, &tlen);
234 /* SecKeyDecrypt gets kSecPaddingPKCS1 wrong (14322412), lets inline pkcs1 padding here ourself */
/macosx-10.9.5/Security-55471.14.18/include/security_keychain/
H A DSecKey.h177 kSecPaddingPKCS1 = 1, enumerator in enum:__anon3733
H A DKeyItem.cpp1176 case kSecPaddingPKCS1:
1234 case kSecPaddingPKCS1:
1289 case kSecPaddingPKCS1:
1328 case kSecPaddingPKCS1:
H A DSecKey.cpp850 SecPadding padding, /* kSecPaddingNone or kSecPaddingPKCS1 */
921 SecPadding padding, /* kSecPaddingNone, kSecPaddingPKCS1, kSecPaddingOAEP */
1710 return SecKeyRawVerify(key, kSecPaddingPKCS1,
1730 return SecKeyRawSign(key, kSecPaddingPKCS1,
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/Security/
H A DSecKey.h177 kSecPaddingPKCS1 = 1, enumerator in enum:__anon4619
H A DKeyItem.cpp1176 case kSecPaddingPKCS1:
1234 case kSecPaddingPKCS1:
1289 case kSecPaddingPKCS1:
1328 case kSecPaddingPKCS1:
H A DSecKey.cpp850 SecPadding padding, /* kSecPaddingNone or kSecPaddingPKCS1 */
921 SecPadding padding, /* kSecPaddingNone, kSecPaddingPKCS1, kSecPaddingOAEP */
1710 return SecKeyRawVerify(key, kSecPaddingPKCS1,
1730 return SecKeyRawSign(key, kSecPaddingPKCS1,
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/lib/
H A DSecKey.h177 kSecPaddingPKCS1 = 1, enumerator in enum:__anon4706
H A DKeyItem.cpp1176 case kSecPaddingPKCS1:
1234 case kSecPaddingPKCS1:
1289 case kSecPaddingPKCS1:
1328 case kSecPaddingPKCS1:
H A DSecKey.cpp850 SecPadding padding, /* kSecPaddingNone or kSecPaddingPKCS1 */
921 SecPadding padding, /* kSecPaddingNone, kSecPaddingPKCS1, kSecPaddingOAEP */
1710 return SecKeyRawVerify(key, kSecPaddingPKCS1,
1730 return SecKeyRawSign(key, kSecPaddingPKCS1,
/macosx-10.9.5/Heimdal-323.92.1/lib/hx509/
H A Dks_keychain.c337 kSecPaddingPKCS1,
359 kSecPaddingPKCS1,
/macosx-10.9.5/ipsec-258.100.1/ipsec-tools/racoon/
H A Dcrypto_cssm.c296 return SecKeyRawVerify(publicKeyRef, useSHA1 ? kSecPaddingPKCS1SHA1 : kSecPaddingPKCS1, (uint8_t*)hash->v, hash->l, (uint8_t*)signature->v, signature->l);
337 status = SecKeyRawSign(privateKeyRef, kSecPaddingPKCS1, (uint8_t*)hash->v,
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/
H A DsslCrypto.c169 OSStatus status = SecKeyRawSign(SECKEYREF(privKey), kSecPaddingPKCS1,
248 OSStatus status = SecKeyRawVerify(SECKEYREF(pubKey), kSecPaddingPKCS1,
H A DsslKeyExchange.c954 kSecPaddingPKCS1,
1063 kSecPaddingPKCS1,
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/
H A DsslCrypto.c169 OSStatus status = SecKeyRawSign(SECKEYREF(privKey), kSecPaddingPKCS1,
248 OSStatus status = SecKeyRawVerify(SECKEYREF(pubKey), kSecPaddingPKCS1,
H A DsslKeyExchange.c954 kSecPaddingPKCS1,
1063 kSecPaddingPKCS1,
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/
H A DsslCrypto.c169 OSStatus status = SecKeyRawSign(SECKEYREF(privKey), kSecPaddingPKCS1,
248 OSStatus status = SecKeyRawVerify(SECKEYREF(pubKey), kSecPaddingPKCS1,

Completed in 276 milliseconds

12