/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_csp/lib/ |
H A D | DH_exchange.cpp | 41 DH *privKey = contextToDhKey(context, session, CSSM_ATTRIBUTE_KEY, local 43 if(privKey == NULL) { 46 cspDhDebug("DeriveKey_DH, privKey %p", privKey); 47 privSize = DH_size(privKey); 85 int rtn = DH_compute_key(buf, pubKeyBn, privKey); 105 DH_free(privKey);
|
H A D | AppleCSPContext.cpp | 98 CssmKey &privKey, 105 CssmKey::Header &privHdr = privKey.header(); 148 session.addRefKey(*privBinKey, privKey); 151 privHdr.Format = requestedKeyFormat(context, privKey); 155 CssmData::overlay(privKey.KeyData), 93 generate( const Context &context, AppleCSPSession &session, CssmKey &pubKey, BinaryKey *pubBinKey, CssmKey &privKey, BinaryKey *privBinKey) argument
|
H A D | FEEKeys.h | 77 CssmKey &privKey);
|
/macosx-10.9.5/BerkeleyDB-21/db/java/src/com/sleepycat/util/keyrange/ |
H A D | RangeCursor.java | 65 private DatabaseEntry privKey; field in class:RangeCursor 132 privKey = new DatabaseEntry(); 136 privKey = null; 163 privKey = key; 210 swapData(key, privKey); 271 KeyRange.copy(range.beginKey, privKey); 300 KeyRange.copy(range.beginKey, privKey); 310 KeyRange.copy(range.beginKey, privKey); 314 range.compare(privKey, range.beginKey) == 0) { 319 !range.check(privKey)) { [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_keychain/regressions/ |
H A D | kc-41-sececkey.c | 44 static void testdigestandsignalg(SecKeyRef privKey, SecKeyRef pubKey, const SecAsn1AlgId *algId) { argument 47 size_t sigLen = SecKeyGetSize(privKey, kSecKeySignatureSize); 64 ok_status(status = SecKeyDigestAndSign(privKey, algId, dataToDigest, dataToDigestLen, 84 static void testdigestandsign(SecKeyRef privKey, SecKeyRef pubKey) { argument 105 testdigestandsignalg(privKey, pubKey, &algId); 153 SecKeyRef pubKey = NULL, privKey = NULL; local 163 ok_status(status = SecKeyGeneratePair(kgp, &pubKey, &privKey), 172 ok(privKey, "privKey returned"); 174 is(SecKeyGetSize(privKey, kSecKeyKeySizeInBit 225 SecKeyRef pubKey = NULL, privKey = NULL; local [all...] |
H A D | kc-40-seckey.c | 34 static void testdigestandsignalg(SecKeyRef privKey, SecKeyRef pubKey, const SecAsn1AlgId *algId) { argument 37 size_t sigLen = SecKeyGetSize(privKey, kSecKeySignatureSize); 54 ok_status(status = SecKeyDigestAndSign(privKey, algId, dataToDigest, dataToDigestLen, 73 static void testdigestandsign(SecKeyRef privKey, SecKeyRef pubKey) { argument 99 testdigestandsignalg(privKey, pubKey, &algId); 120 static void test_encrypt_decrypt(SecKeyRef pubKey, SecKeyRef privKey, uint32_t padding, size_t keySizeInBytes) argument 152 ok_status(SecKeyDecrypt(privKey, padding, 196 SecKeyRef pubKey = NULL, privKey = NULL; local 206 ok_status(status = SecKeyGeneratePair(kgp, &pubKey, &privKey), 215 ok(privKey, "privKe 385 SecKeyRef pubKey = NULL, privKey = NULL; local [all...] |
/macosx-10.9.5/Security-55471.14.18/sec/Security/Regressions/secitem/ |
H A D | si-41-sececkey.c | 39 static void testdigestandsignalg(SecKeyRef privKey, SecKeyRef pubKey, const SecAsn1AlgId *algId) { argument 42 size_t sigLen = SecKeyGetSize(privKey, kSecKeySignatureSize); 59 ok_status(status = SecKeyDigestAndSign(privKey, algId, dataToDigest, dataToDigestLen, 79 static void testdigestandsign(SecKeyRef privKey, SecKeyRef pubKey) { argument 100 testdigestandsignalg(privKey, pubKey, &algId); 105 SecKeyRef pubKey = NULL, privKey = NULL; local 116 ok_status(status = SecKeyGeneratePair(kgp, &pubKey, &privKey), 125 ok(privKey, "privKey returned"); 127 is(SecKeyGetSize(privKey, kSecKeyKeySizeInBit 172 SecKeyRef pubKey = NULL, privKey = NULL; local [all...] |
H A D | si-40-seckey.c | 30 static void testdigestandsignalg(SecKeyRef privKey, SecKeyRef pubKey, const SecAsn1AlgId *algId) { argument 33 size_t sigLen = SecKeyGetSize(privKey, kSecKeySignatureSize); 50 ok_status(status = SecKeyDigestAndSign(privKey, algId, dataToDigest, dataToDigestLen, 69 static void testdigestandsign(SecKeyRef privKey, SecKeyRef pubKey) { argument 95 testdigestandsignalg(privKey, pubKey, &algId); 111 static void test_encrypt_decrypt(SecKeyRef pubKey, SecKeyRef privKey, uint32_t padding, size_t keySizeInBytes) argument 143 ok_status(SecKeyDecrypt(privKey, padding, 160 SecKeyRef pubKey = NULL, privKey = NULL; local 170 ok_status(status = SecKeyGeneratePair(kgp, &pubKey, &privKey), 179 ok(privKey, "privKe 329 SecKeyRef pubKey = NULL, privKey = NULL; local [all...] |
H A D | si-64-ossl-cms.c | 148 SecKeyRef privKey = NULL; local 152 isnt(privKey = SecKeyCreateRSAPrivateKey(NULL, privkey_der, privkey_der_len, kSecKeyEncodingPkcs1), NULL, "create private key"); 153 isnt(identity = SecIdentityCreate(NULL, cert, privKey), NULL, "create identity"); 154 CFReleaseSafe(privKey);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/ |
H A D | sslCrypto.h | 51 * Free a privKey object. 53 extern OSStatus sslFreePrivKey(SSLPrivKey **privKey); 56 extern CFIndex sslPrivKeyGetAlgorithmID(SSLPrivKey *privKey); 94 SSLPrivKey *privKey, 112 SSLPrivKey *privKey, 147 SSLPrivKey *privKey, 166 SSLPrivKey *privKey,
|
H A D | sslCrypto.c | 93 * Free a privKey object. 95 extern OSStatus sslFreePrivKey(SSLPrivKey **privKey) argument 97 if (privKey && *privKey) { 98 CFReleaseNull(SECKEYREF(*privKey)); 118 CFIndex sslPrivKeyGetAlgorithmID(SSLPrivKey *privKey) argument 121 return SecKeyGetAlgorithmID(SECKEYREF(privKey)); 123 return SecKeyGetAlgorithmId(SECKEYREF(privKey)); 132 SSLPrivKey *privKey, 150 rsaStatus = RSA_Sign(&privKey 130 sslRawSign( SSLContext *ctx, SSLPrivKey *privKey, const uint8_t *plainText, size_t plainTextLen, uint8_t *sig, size_t sigLen, size_t *actualBytes) argument 193 sslRsaSign( SSLContext *ctx, SSLPrivKey *privKey, const SecAsn1AlgId *algId, const uint8_t *plainText, size_t plainTextLen, uint8_t *sig, size_t sigLen, size_t *actualBytes) argument 349 sslRsaDecrypt( SSLContext *ctx, SSLPrivKey *privKey, const uint32_t padding, const uint8_t *cipherText, size_t cipherTextLen, uint8_t *plainText, size_t plainTextLen, size_t *actualBytes) argument 394 sslPrivKeyLengthInBytes(SSLPrivKey *privKey) argument 425 sslGetMaxSigSize( SSLPrivKey *privKey, size_t *maxSigSize) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/ |
H A D | sslCrypto.h | 51 * Free a privKey object. 53 extern OSStatus sslFreePrivKey(SSLPrivKey **privKey); 56 extern CFIndex sslPrivKeyGetAlgorithmID(SSLPrivKey *privKey); 94 SSLPrivKey *privKey, 112 SSLPrivKey *privKey, 147 SSLPrivKey *privKey, 166 SSLPrivKey *privKey,
|
H A D | sslCrypto.c | 93 * Free a privKey object. 95 extern OSStatus sslFreePrivKey(SSLPrivKey **privKey) argument 97 if (privKey && *privKey) { 98 CFReleaseNull(SECKEYREF(*privKey)); 118 CFIndex sslPrivKeyGetAlgorithmID(SSLPrivKey *privKey) argument 121 return SecKeyGetAlgorithmID(SECKEYREF(privKey)); 123 return SecKeyGetAlgorithmId(SECKEYREF(privKey)); 132 SSLPrivKey *privKey, 150 rsaStatus = RSA_Sign(&privKey 130 sslRawSign( SSLContext *ctx, SSLPrivKey *privKey, const uint8_t *plainText, size_t plainTextLen, uint8_t *sig, size_t sigLen, size_t *actualBytes) argument 193 sslRsaSign( SSLContext *ctx, SSLPrivKey *privKey, const SecAsn1AlgId *algId, const uint8_t *plainText, size_t plainTextLen, uint8_t *sig, size_t sigLen, size_t *actualBytes) argument 349 sslRsaDecrypt( SSLContext *ctx, SSLPrivKey *privKey, const uint32_t padding, const uint8_t *cipherText, size_t cipherTextLen, uint8_t *plainText, size_t plainTextLen, size_t *actualBytes) argument 394 sslPrivKeyLengthInBytes(SSLPrivKey *privKey) argument 425 sslGetMaxSigSize( SSLPrivKey *privKey, size_t *maxSigSize) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/ |
H A D | sslCrypto.h | 51 * Free a privKey object. 53 extern OSStatus sslFreePrivKey(SSLPrivKey **privKey); 56 extern CFIndex sslPrivKeyGetAlgorithmID(SSLPrivKey *privKey); 94 SSLPrivKey *privKey, 112 SSLPrivKey *privKey, 147 SSLPrivKey *privKey, 166 SSLPrivKey *privKey,
|
H A D | sslCrypto.c | 93 * Free a privKey object. 95 extern OSStatus sslFreePrivKey(SSLPrivKey **privKey) argument 97 if (privKey && *privKey) { 98 CFReleaseNull(SECKEYREF(*privKey)); 118 CFIndex sslPrivKeyGetAlgorithmID(SSLPrivKey *privKey) argument 121 return SecKeyGetAlgorithmID(SECKEYREF(privKey)); 123 return SecKeyGetAlgorithmId(SECKEYREF(privKey)); 132 SSLPrivKey *privKey, 150 rsaStatus = RSA_Sign(&privKey 130 sslRawSign( SSLContext *ctx, SSLPrivKey *privKey, const uint8_t *plainText, size_t plainTextLen, uint8_t *sig, size_t sigLen, size_t *actualBytes) argument 193 sslRsaSign( SSLContext *ctx, SSLPrivKey *privKey, const SecAsn1AlgId *algId, const uint8_t *plainText, size_t plainTextLen, uint8_t *sig, size_t sigLen, size_t *actualBytes) argument 349 sslRsaDecrypt( SSLContext *ctx, SSLPrivKey *privKey, const uint32_t padding, const uint8_t *cipherText, size_t cipherTextLen, uint8_t *plainText, size_t plainTextLen, size_t *actualBytes) argument 394 sslPrivKeyLengthInBytes(SSLPrivKey *privKey) argument 425 sslGetMaxSigSize( SSLPrivKey *privKey, size_t *maxSigSize) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/include/security_smime/ |
H A D | cmsreclist.c | 191 SecPrivateKeyRef privKey = NULL; local 219 if (SecIdentityCopyPrivateKey(identity, &privKey)) 224 recipient->privkey = privKey; 233 if (privKey) 234 CFRelease(privKey);
|
H A D | cert.h | 39 SecPublicKeyRef SECKEY_CopyPrivateKey(SecPublicKeyRef privKey); 40 void SECKEY_DestroyPrivateKey(SecPublicKeyRef privKey);
|
H A D | cryptohi.h | 95 extern SECStatus SGN_Digest(SecPrivateKeyRef privKey,
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_apple_csp/tests/ |
H A D | t-rsa.cpp | 59 B_KEY_OBJ privKey = NULL; check(B_CreateKeyObject(&privKey)); local 82 check(B_GenerateKeypair(gen, pubKey, privKey, random, NULL)); 96 check(B_DecryptInit(dec, privKey, chooser, NULL)); 106 B_DestroyKeyObject(&privKey);
|
H A D | t-dsa.cpp | 76 B_KEY_OBJ privKey = NULL; check(B_CreateKeyObject(&privKey)); 85 check(B_GenerateKeypair(gen, pubKey, privKey, random, NULL)); 99 check(B_DecryptInit(dec, privKey, chooser, NULL)); 107 B_DestroyKeyObject(&privKey);
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_smime/lib/ |
H A D | cmsreclist.c | 191 SecPrivateKeyRef privKey = NULL; local 219 if (SecIdentityCopyPrivateKey(identity, &privKey)) 224 recipient->privkey = privKey; 233 if (privKey) 234 CFRelease(privKey);
|
H A D | cert.h | 39 SecPublicKeyRef SECKEY_CopyPrivateKey(SecPublicKeyRef privKey); 40 void SECKEY_DestroyPrivateKey(SecPublicKeyRef privKey);
|
/macosx-10.9.5/Security-55471.14.18/include/security_pkcs12/ |
H A D | pkcs12Crypto.h | 135 SecNssCoder &coder, // for mallocing privKey 146 CSSM_KEY_PTR &privKey); 150 CSSM_KEY_PTR privKey,
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_pkcs12/lib/ |
H A D | pkcs12Crypto.h | 135 SecNssCoder &coder, // for mallocing privKey 146 CSSM_KEY_PTR &privKey); 150 CSSM_KEY_PTR privKey,
|
/macosx-10.9.5/SecurityTool-55115/ |
H A D | createFVMaster.c | 136 CSSM_KEY_PTR privKey = NULL; local 177 "FileVault Master Password Key", &pubKey, &privKey); 182 ortn = createRootCert(tpHand,clHand,cspHand,pubKey,privKey,hostStr,userStr, 221 if (privKey) 225 privKey, 227 APP_FREE(privKey); 597 CSSM_KEY_PTR privKey = (CSSM_KEY_PTR)(APP_MALLOC(sizeof(CSSM_KEY))); local 598 if((pubKey == NULL) || (privKey == NULL)) { 620 privKey, 627 APP_FREE(privKey); [all...] |