Searched refs:inkey (Results 1 - 25 of 48) sorted by relevance

12

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/crypto/asn1/
H A Dd2i_pr.c133 STACK_OF(ASN1_TYPE) *inkey;
141 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length);
145 if(sk_ASN1_TYPE_num(inkey) == 6)
147 else if (sk_ASN1_TYPE_num(inkey) == 4)
149 else if (sk_ASN1_TYPE_num(inkey) == 3)
154 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
168 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/crypto/asn1/
H A Dd2i_pr.c129 STACK_OF(ASN1_TYPE) *inkey;
138 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length);
143 if (sk_ASN1_TYPE_num(inkey) == 6)
145 else if (sk_ASN1_TYPE_num(inkey) == 4)
147 else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not
152 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
166 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/crypto/asn1/
H A Dd2i_pr.c133 STACK_OF(ASN1_TYPE) *inkey;
141 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length);
145 if(sk_ASN1_TYPE_num(inkey) == 6)
147 else if (sk_ASN1_TYPE_num(inkey) == 4)
149 else if (sk_ASN1_TYPE_num(inkey) == 3)
154 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
168 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/crypto/asn1/
H A Dd2i_pr.c129 STACK_OF(ASN1_TYPE) *inkey;
138 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length);
143 if (sk_ASN1_TYPE_num(inkey) == 6)
145 else if (sk_ASN1_TYPE_num(inkey) == 4)
147 else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not
152 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
166 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/crypto/asn1/
H A Dd2i_pr.c133 STACK_OF(ASN1_TYPE) *inkey;
141 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length);
145 if(sk_ASN1_TYPE_num(inkey) == 6)
147 else if (sk_ASN1_TYPE_num(inkey) == 4)
149 else if (sk_ASN1_TYPE_num(inkey) == 3)
154 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
168 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/asn1/
H A Dd2i_pr.c129 STACK_OF(ASN1_TYPE) *inkey;
138 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length);
143 if (sk_ASN1_TYPE_num(inkey) == 6)
145 else if (sk_ASN1_TYPE_num(inkey) == 4)
147 else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not
152 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
166 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/net/sunrpc/auth_gss/
H A Dgss_krb5_keys.c151 const struct xdr_netobj *inkey,
166 if ((inkey->len != keylength) || (outkey->len != keylength))
173 if (crypto_blkcipher_setkey(cipher, inkey->data, inkey->len))
150 krb5_derive_key(const struct gss_krb5_enctype *gk5e, const struct xdr_netobj *inkey, struct xdr_netobj *outkey, const struct xdr_netobj *in_constant, gfp_t gfp_mask) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/net/sunrpc/auth_gss/
H A Dgss_krb5_keys.c151 const struct xdr_netobj *inkey,
166 if ((inkey->len != keylength) || (outkey->len != keylength))
173 if (crypto_blkcipher_setkey(cipher, inkey->data, inkey->len))
150 krb5_derive_key(const struct gss_krb5_enctype *gk5e, const struct xdr_netobj *inkey, struct xdr_netobj *outkey, const struct xdr_netobj *in_constant, gfp_t gfp_mask) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/fs/ceph/
H A Dcrypto.c42 int ceph_crypto_key_unarmor(struct ceph_crypto_key *key, const char *inkey) argument
44 int inlen = strlen(inkey);
49 dout("crypto_key_unarmor %s\n", inkey);
53 blen = ceph_unarmor(buf, inkey, inkey+inlen);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/fs/ceph/
H A Dcrypto.c42 int ceph_crypto_key_unarmor(struct ceph_crypto_key *key, const char *inkey) argument
44 int inlen = strlen(inkey);
49 dout("crypto_key_unarmor %s\n", inkey);
53 blen = ceph_unarmor(buf, inkey, inkey+inlen);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/crypto/
H A Dhmac.c45 const u8 *inkey, unsigned int keylen)
68 err = crypto_shash_digest(&desc.shash, inkey, keylen, ipad);
74 memcpy(ipad, inkey, keylen);
44 hmac_setkey(struct crypto_shash *parent, const u8 *inkey, unsigned int keylen) argument
H A Dxcbc.c61 const u8 *inkey, unsigned int keylen)
70 if ((err = crypto_cipher_setkey(ctx->child, inkey, keylen)))
60 crypto_xcbc_digest_setkey(struct crypto_shash *parent, const u8 *inkey, unsigned int keylen) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/crypto/
H A Dhmac.c45 const u8 *inkey, unsigned int keylen)
68 err = crypto_shash_digest(&desc.shash, inkey, keylen, ipad);
74 memcpy(ipad, inkey, keylen);
44 hmac_setkey(struct crypto_shash *parent, const u8 *inkey, unsigned int keylen) argument
H A Dxcbc.c61 const u8 *inkey, unsigned int keylen)
70 if ((err = crypto_cipher_setkey(ctx->child, inkey, keylen)))
60 crypto_xcbc_digest_setkey(struct crypto_shash *parent, const u8 *inkey, unsigned int keylen) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/apps/
H A Dts.c98 char *queryfile, char *passin, char *inkey,
104 char *queryfile, char *passin, char *inkey,
146 char *inkey = NULL; local
253 else if (strcmp(*argv, "-inkey") == 0)
256 inkey = *++argv;
351 password, inkey, signer, chain, policy,
378 "[-signer tsa_cert.pem] [-inkey private_key.pem] "
674 char *queryfile, char *passin, char *inkey,
706 passin, inkey, signer, chain,
801 char *queryfile, char *passin, char *inkey,
673 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument
800 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument
[all...]
H A DCA.sh150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/apps/
H A Dts.c99 char *queryfile, char *passin, char *inkey,
105 char *queryfile, char *passin, char *inkey,
148 char *inkey = NULL; local
231 } else if (strcmp(*argv, "-inkey") == 0) {
234 inkey = *++argv;
319 password, inkey, signer, chain, policy,
347 "[-signer tsa_cert.pem] [-inkey private_key.pem] "
649 char *queryfile, char *passin, char *inkey,
678 passin, inkey, signer, chain, policy);
773 char *queryfile, char *passin, char *inkey,
648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument
772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument
[all...]
H A DCA.sh150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/apps/
H A Dts.c99 char *queryfile, char *passin, char *inkey,
105 char *queryfile, char *passin, char *inkey,
148 char *inkey = NULL; local
231 } else if (strcmp(*argv, "-inkey") == 0) {
234 inkey = *++argv;
319 password, inkey, signer, chain, policy,
347 "[-signer tsa_cert.pem] [-inkey private_key.pem] "
649 char *queryfile, char *passin, char *inkey,
678 passin, inkey, signer, chain, policy);
773 char *queryfile, char *passin, char *inkey,
648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument
772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/apps/
H A Dts.c98 char *queryfile, char *passin, char *inkey,
104 char *queryfile, char *passin, char *inkey,
146 char *inkey = NULL; local
253 else if (strcmp(*argv, "-inkey") == 0)
256 inkey = *++argv;
351 password, inkey, signer, chain, policy,
378 "[-signer tsa_cert.pem] [-inkey private_key.pem] "
674 char *queryfile, char *passin, char *inkey,
706 passin, inkey, signer, chain,
801 char *queryfile, char *passin, char *inkey,
673 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument
800 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/apps/
H A Dts.c99 char *queryfile, char *passin, char *inkey,
105 char *queryfile, char *passin, char *inkey,
148 char *inkey = NULL; local
231 } else if (strcmp(*argv, "-inkey") == 0) {
234 inkey = *++argv;
319 password, inkey, signer, chain, policy,
347 "[-signer tsa_cert.pem] [-inkey private_key.pem] "
649 char *queryfile, char *passin, char *inkey,
678 passin, inkey, signer, chain, policy);
773 char *queryfile, char *passin, char *inkey,
648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument
772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/apps/
H A Dts.c98 char *queryfile, char *passin, char *inkey,
104 char *queryfile, char *passin, char *inkey,
146 char *inkey = NULL; local
253 else if (strcmp(*argv, "-inkey") == 0)
256 inkey = *++argv;
351 password, inkey, signer, chain, policy,
378 "[-signer tsa_cert.pem] [-inkey private_key.pem] "
674 char *queryfile, char *passin, char *inkey,
706 passin, inkey, signer, chain,
801 char *queryfile, char *passin, char *inkey,
673 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument
800 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/crypto/evp/
H A De_rc4_hmac_md5.c86 const unsigned char *inkey,
91 RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey);
85 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/crypto/evp/
H A De_rc4_hmac_md5.c86 const unsigned char *inkey,
91 RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey);
85 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/evp/
H A De_rc4_hmac_md5.c86 const unsigned char *inkey,
91 RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey);
85 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument

Completed in 478 milliseconds

12