/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | crl.c | 111 char *infile = NULL, *outfile = NULL, *crldiff = NULL, *keyfile = NULL; local 183 keyfile = *(++argv); 300 if (!keyfile) { 307 pkey = load_key(bio_err, keyfile, keyformat, 0, NULL, NULL,
|
H A D | pkeyutl.c | 76 const char *keyfile, int keyform, int key_type, 404 const char *keyfile, int keyform, int key_type, 426 pkey = load_key(bio_err, keyfile, keyform, 0, 431 pkey = load_pubkey(bio_err, keyfile, keyform, 0, 436 x = load_cert(bio_err, keyfile, keyform, NULL, e, "Certificate"); 403 init_ctx(int *pkeysize, const char *keyfile, int keyform, int key_type, char *passargin, int pkey_op, ENGINE *e, int engine_impl) argument
|
H A D | CA.sh | 133 -keyfile ${CATOP}/private/$CAKEY -selfsign \
|
H A D | s_cb.c | 1170 const char *keyfile; member in struct:ssl_excert_st 1283 exc->keyfile = NULL; 1342 if (exc->keyfile) { 1343 exc->key = load_key(err, exc->keyfile, exc->keyform, 1393 if (exc->keyfile) { 1398 exc->keyfile = argn;
|
H A D | x509.c | 190 char *infile = NULL, *outfile = NULL, *keyfile = NULL, *CAfile = NULL; local 326 keyfile = *(++argv); 914 keyfile, keyformat, 0, 943 if (keyfile == NULL) { 948 keyfile, keyformat, 0,
|
H A D | ocsp.c | 139 char *signfile = NULL, *keyfile = NULL; local 357 keyfile = *args; 675 if (!keyfile) 676 keyfile = signfile; 689 key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/contrib/src/stc/scintilla/src/ |
H A D | PropSet.cxx | 566 char *keyfile = NULL; local 574 keyfile = StringDup(s.c_str()); 577 char *keyptr = keyfile; 579 if (keyfile == NULL) 580 keyfile = orgkeyfile; 583 char *del = strchr(keyfile, ';'); 585 del = keyfile + strlen(keyfile); 588 if (*keyfile == '*') { 589 if (IsSuffix(filename, keyfile [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | pkeyutl.c | 76 const char *keyfile, int keyform, int key_type, 404 const char *keyfile, int keyform, int key_type, 426 pkey = load_key(bio_err, keyfile, keyform, 0, 431 pkey = load_pubkey(bio_err, keyfile, keyform, 0, 436 x = load_cert(bio_err, keyfile, keyform, NULL, e, "Certificate"); 403 init_ctx(int *pkeysize, const char *keyfile, int keyform, int key_type, char *passargin, int pkey_op, ENGINE *e, int engine_impl) argument
|
H A D | CA.sh | 133 -keyfile ${CATOP}/private/$CAKEY -selfsign \
|
H A D | s_cb.c | 1170 const char *keyfile; member in struct:ssl_excert_st 1283 exc->keyfile = NULL; 1342 if (exc->keyfile) { 1343 exc->key = load_key(err, exc->keyfile, exc->keyform, 1393 if (exc->keyfile) { 1398 exc->keyfile = argn;
|
H A D | x509.c | 190 char *infile = NULL, *outfile = NULL, *keyfile = NULL, *CAfile = NULL; local 326 keyfile = *(++argv); 914 keyfile, keyformat, 0, 943 if (keyfile == NULL) { 948 keyfile, keyformat, 0,
|
H A D | ocsp.c | 139 char *signfile = NULL, *keyfile = NULL; local 357 keyfile = *args; 675 if (!keyfile) 676 keyfile = signfile; 689 key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL,
|
H A D | req.c | 180 char *infile, *outfile, *prog, *keyfile = NULL, *template = local 249 keyfile = *(++argv); 601 if (keyfile != NULL) { 602 pkey = load_key(bio_err, keyfile, keyform, 0, passin, e,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/passdb/ |
H A D | secrets.c | 946 Store a complete AFS keyfile into secrets.tdb. 949 BOOL secrets_store_afs_keyfile(const char *cell, const struct afs_keyfile *keyfile) argument 953 if ((cell == NULL) || (keyfile == NULL)) 956 if (ntohl(keyfile->nkeys) > SECRETS_AFS_MAXKEYS) 960 return secrets_store(key, keyfile, sizeof(struct afs_keyfile)); 969 struct afs_keyfile *keyfile; local 975 keyfile = (struct afs_keyfile *)secrets_fetch(key, &size); 977 if (keyfile == NULL) 981 SAFE_FREE(keyfile); 985 i = ntohl(keyfile [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/include/atalk/ |
H A D | globals.h | 85 char *guest, *loginmesg, *keyfile, *passwdfile; member in struct:afp_options
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/avahi-0.6.25/avahi-sharp/ |
H A D | Makefile.am | 51 mcs -keyfile:$(srcdir)/avahi.snk -target:library -out:$@ -debug $(AVAHISOURCES) -r:Mono.Posix
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/avahi-0.6.25/avahi-ui-sharp/ |
H A D | Makefile.am | 37 mcs -keyfile:$(top_srcdir)/avahi-sharp/avahi.snk -target:library -out:$@ -debug $(AVAHISOURCES) -pkg:gtk-sharp-2.0 -r:$(top_builddir)/avahi-sharp/avahi-sharp.dll -r:Mono.Posix
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/avahi-0.6.25/avahi-sharp/ |
H A D | Makefile.am | 51 mcs -keyfile:$(srcdir)/avahi.snk -target:library -out:$@ -debug $(AVAHISOURCES) -r:Mono.Posix
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/avahi-0.6.25/avahi-ui-sharp/ |
H A D | Makefile.am | 37 mcs -keyfile:$(top_srcdir)/avahi-sharp/avahi.snk -target:library -out:$@ -debug $(AVAHISOURCES) -pkg:gtk-sharp-2.0 -r:$(top_builddir)/avahi-sharp/avahi-sharp.dll -r:Mono.Posix
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | CA.sh | 93 -keyfile ${CATOP}/private/$CAKEY -selfsign \
|
H A D | ocsp.c | 102 char *signfile = NULL, *keyfile = NULL; local 335 keyfile = *args; 645 if (!keyfile) keyfile = signfile; 659 key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL,
|
H A D | x509.c | 175 char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL; local 301 keyfile= *(++argv); 911 keyfile, keyformat, 0, 959 if (keyfile == NULL) 967 keyfile, FORMAT_PEM, 0,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/ |
H A D | net.c | 715 struct afs_keyfile keyfile; local 718 d_printf("usage: 'net afs key <keyfile> cell'\n"); 732 if (read(fd, &keyfile, sizeof(keyfile)) != sizeof(keyfile)) { 733 d_fprintf(stderr, "Could not read keyfile\n"); 737 if (!secrets_store_afs_keyfile(argv[1], &keyfile)) { 738 d_fprintf(stderr, "Could not write keyfile to secrets.tdb\n");
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/tests/ |
H A D | fipsdrv.c | 1535 int hashalgo, int pkcs1, const char *keyfile) 1575 s_key = read_private_key_file (keyfile, 0); 1580 gcry_sexp_release (read_private_key_file (keyfile, 1)); 1581 die ("gcry_pk_signed failed (datalen=%d,keyfile=%s): %s\n", 1582 (int)datalen, keyfile, gpg_strerror (err)); 1627 const char *keyfile, const char *sigfile) 1663 s_key = read_public_key_file (keyfile, 0); 1879 run_dsa_sign (const void *data, size_t datalen, const char *keyfile) 1899 s_key = read_sexp_from_file (keyfile); 1904 gcry_sexp_release (read_private_key_file (keyfile, 1528 run_rsa_sign(const void *data, size_t datalen, int hashalgo, int pkcs1, const char *keyfile) argument 1619 run_rsa_verify(const void *data, size_t datalen, int hashalgo, int pkcs1, const char *keyfile, const char *sigfile) argument 1870 run_dsa_sign(const void *data, size_t datalen, const char *keyfile) argument 1961 run_dsa_verify(const void *data, size_t datalen, const char *keyfile, const char *sigfile) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/tests/ |
H A D | fipsdrv.c | 1535 int hashalgo, int pkcs1, const char *keyfile) 1575 s_key = read_private_key_file (keyfile, 0); 1580 gcry_sexp_release (read_private_key_file (keyfile, 1)); 1581 die ("gcry_pk_signed failed (datalen=%d,keyfile=%s): %s\n", 1582 (int)datalen, keyfile, gpg_strerror (err)); 1627 const char *keyfile, const char *sigfile) 1663 s_key = read_public_key_file (keyfile, 0); 1879 run_dsa_sign (const void *data, size_t datalen, const char *keyfile) 1899 s_key = read_sexp_from_file (keyfile); 1904 gcry_sexp_release (read_private_key_file (keyfile, 1528 run_rsa_sign(const void *data, size_t datalen, int hashalgo, int pkcs1, const char *keyfile) argument 1619 run_rsa_verify(const void *data, size_t datalen, int hashalgo, int pkcs1, const char *keyfile, const char *sigfile) argument 1870 run_dsa_sign(const void *data, size_t datalen, const char *keyfile) argument 1961 run_dsa_verify(const void *data, size_t datalen, const char *keyfile, const char *sigfile) argument [all...] |