Searched refs:keyfile (Results 26 - 50 of 70) sorted by relevance

123

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Dcrl.c111 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; local
183 keyfile = *(++argv);
300 if (!keyfile) {
307 pkey = load_key(bio_err, keyfile, keyformat, 0, NULL, NULL,
H A Dpkeyutl.c76 const char *keyfile, int keyform, int key_type,
404 const char *keyfile, int keyform, int key_type,
426 pkey = load_key(bio_err, keyfile, keyform, 0,
431 pkey = load_pubkey(bio_err, keyfile, keyform, 0,
436 x = load_cert(bio_err, keyfile, keyform, NULL, e, "Certificate");
403 init_ctx(int *pkeysize, const char *keyfile, int keyform, int key_type, char *passargin, int pkey_op, ENGINE *e, int engine_impl) argument
H A DCA.sh133 -keyfile ${CATOP}/private/$CAKEY -selfsign \
H A Ds_cb.c1170 const char *keyfile; member in struct:ssl_excert_st
1283 exc->keyfile = NULL;
1342 if (exc->keyfile) {
1343 exc->key = load_key(err, exc->keyfile, exc->keyform,
1393 if (exc->keyfile) {
1398 exc->keyfile = argn;
H A Dx509.c190 char *infile = NULL, *outfile = NULL, *keyfile = NULL, *CAfile = NULL; local
326 keyfile = *(++argv);
914 keyfile, keyformat, 0,
943 if (keyfile == NULL) {
948 keyfile, keyformat, 0,
H A Docsp.c139 char *signfile = NULL, *keyfile = NULL; local
357 keyfile = *args;
675 if (!keyfile)
676 keyfile = signfile;
689 key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/contrib/src/stc/scintilla/src/
H A DPropSet.cxx566 char *keyfile = NULL; local
574 keyfile = StringDup(s.c_str());
577 char *keyptr = keyfile;
579 if (keyfile == NULL)
580 keyfile = orgkeyfile;
583 char *del = strchr(keyfile, ';');
585 del = keyfile + strlen(keyfile);
588 if (*keyfile == '*') {
589 if (IsSuffix(filename, keyfile
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Dpkeyutl.c76 const char *keyfile, int keyform, int key_type,
404 const char *keyfile, int keyform, int key_type,
426 pkey = load_key(bio_err, keyfile, keyform, 0,
431 pkey = load_pubkey(bio_err, keyfile, keyform, 0,
436 x = load_cert(bio_err, keyfile, keyform, NULL, e, "Certificate");
403 init_ctx(int *pkeysize, const char *keyfile, int keyform, int key_type, char *passargin, int pkey_op, ENGINE *e, int engine_impl) argument
H A DCA.sh133 -keyfile ${CATOP}/private/$CAKEY -selfsign \
H A Ds_cb.c1170 const char *keyfile; member in struct:ssl_excert_st
1283 exc->keyfile = NULL;
1342 if (exc->keyfile) {
1343 exc->key = load_key(err, exc->keyfile, exc->keyform,
1393 if (exc->keyfile) {
1398 exc->keyfile = argn;
H A Dx509.c190 char *infile = NULL, *outfile = NULL, *keyfile = NULL, *CAfile = NULL; local
326 keyfile = *(++argv);
914 keyfile, keyformat, 0,
943 if (keyfile == NULL) {
948 keyfile, keyformat, 0,
H A Docsp.c139 char *signfile = NULL, *keyfile = NULL; local
357 keyfile = *args;
675 if (!keyfile)
676 keyfile = signfile;
689 key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL,
H A Dreq.c180 char *infile, *outfile, *prog, *keyfile = NULL, *template = local
249 keyfile = *(++argv);
601 if (keyfile != NULL) {
602 pkey = load_key(bio_err, keyfile, keyform, 0, passin, e,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/passdb/
H A Dsecrets.c946 Store a complete AFS keyfile into secrets.tdb.
949 BOOL secrets_store_afs_keyfile(const char *cell, const struct afs_keyfile *keyfile) argument
953 if ((cell == NULL) || (keyfile == NULL))
956 if (ntohl(keyfile->nkeys) > SECRETS_AFS_MAXKEYS)
960 return secrets_store(key, keyfile, sizeof(struct afs_keyfile));
969 struct afs_keyfile *keyfile; local
975 keyfile = (struct afs_keyfile *)secrets_fetch(key, &size);
977 if (keyfile == NULL)
981 SAFE_FREE(keyfile);
985 i = ntohl(keyfile
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/include/atalk/
H A Dglobals.h85 char *guest, *loginmesg, *keyfile, *passwdfile; member in struct:afp_options
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/avahi-0.6.25/avahi-sharp/
H A DMakefile.am51 mcs -keyfile:$(srcdir)/avahi.snk -target:library -out:$@ -debug $(AVAHISOURCES) -r:Mono.Posix
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/avahi-0.6.25/avahi-ui-sharp/
H A DMakefile.am37 mcs -keyfile:$(top_srcdir)/avahi-sharp/avahi.snk -target:library -out:$@ -debug $(AVAHISOURCES) -pkg:gtk-sharp-2.0 -r:$(top_builddir)/avahi-sharp/avahi-sharp.dll -r:Mono.Posix
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/avahi-0.6.25/avahi-sharp/
H A DMakefile.am51 mcs -keyfile:$(srcdir)/avahi.snk -target:library -out:$@ -debug $(AVAHISOURCES) -r:Mono.Posix
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/avahi-0.6.25/avahi-ui-sharp/
H A DMakefile.am37 mcs -keyfile:$(top_srcdir)/avahi-sharp/avahi.snk -target:library -out:$@ -debug $(AVAHISOURCES) -pkg:gtk-sharp-2.0 -r:$(top_builddir)/avahi-sharp/avahi-sharp.dll -r:Mono.Posix
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A DCA.sh93 -keyfile ${CATOP}/private/$CAKEY -selfsign \
H A Docsp.c102 char *signfile = NULL, *keyfile = NULL; local
335 keyfile = *args;
645 if (!keyfile) keyfile = signfile;
659 key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL,
H A Dx509.c175 char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL; local
301 keyfile= *(++argv);
911 keyfile, keyformat, 0,
959 if (keyfile == NULL)
967 keyfile, FORMAT_PEM, 0,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/
H A Dnet.c715 struct afs_keyfile keyfile; local
718 d_printf("usage: 'net afs key <keyfile> cell'\n");
732 if (read(fd, &keyfile, sizeof(keyfile)) != sizeof(keyfile)) {
733 d_fprintf(stderr, "Could not read keyfile\n");
737 if (!secrets_store_afs_keyfile(argv[1], &keyfile)) {
738 d_fprintf(stderr, "Could not write keyfile to secrets.tdb\n");
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/tests/
H A Dfipsdrv.c1535 int hashalgo, int pkcs1, const char *keyfile)
1575 s_key = read_private_key_file (keyfile, 0);
1580 gcry_sexp_release (read_private_key_file (keyfile, 1));
1581 die ("gcry_pk_signed failed (datalen=%d,keyfile=%s): %s\n",
1582 (int)datalen, keyfile, gpg_strerror (err));
1627 const char *keyfile, const char *sigfile)
1663 s_key = read_public_key_file (keyfile, 0);
1879 run_dsa_sign (const void *data, size_t datalen, const char *keyfile)
1899 s_key = read_sexp_from_file (keyfile);
1904 gcry_sexp_release (read_private_key_file (keyfile,
1528 run_rsa_sign(const void *data, size_t datalen, int hashalgo, int pkcs1, const char *keyfile) argument
1619 run_rsa_verify(const void *data, size_t datalen, int hashalgo, int pkcs1, const char *keyfile, const char *sigfile) argument
1870 run_dsa_sign(const void *data, size_t datalen, const char *keyfile) argument
1961 run_dsa_verify(const void *data, size_t datalen, const char *keyfile, const char *sigfile) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/tests/
H A Dfipsdrv.c1535 int hashalgo, int pkcs1, const char *keyfile)
1575 s_key = read_private_key_file (keyfile, 0);
1580 gcry_sexp_release (read_private_key_file (keyfile, 1));
1581 die ("gcry_pk_signed failed (datalen=%d,keyfile=%s): %s\n",
1582 (int)datalen, keyfile, gpg_strerror (err));
1627 const char *keyfile, const char *sigfile)
1663 s_key = read_public_key_file (keyfile, 0);
1879 run_dsa_sign (const void *data, size_t datalen, const char *keyfile)
1899 s_key = read_sexp_from_file (keyfile);
1904 gcry_sexp_release (read_private_key_file (keyfile,
1528 run_rsa_sign(const void *data, size_t datalen, int hashalgo, int pkcs1, const char *keyfile) argument
1619 run_rsa_verify(const void *data, size_t datalen, int hashalgo, int pkcs1, const char *keyfile, const char *sigfile) argument
1870 run_dsa_sign(const void *data, size_t datalen, const char *keyfile) argument
1961 run_dsa_verify(const void *data, size_t datalen, const char *keyfile, const char *sigfile) argument
[all...]

Completed in 539 milliseconds

123