/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/crypto/asn1/ |
H A D | d2i_pr.c | 133 STACK_OF(ASN1_TYPE) *inkey; 141 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); 145 if(sk_ASN1_TYPE_num(inkey) == 6) 147 else if (sk_ASN1_TYPE_num(inkey) == 4) 149 else if (sk_ASN1_TYPE_num(inkey) == 3) 154 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); 168 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/crypto/asn1/ |
H A D | d2i_pr.c | 129 STACK_OF(ASN1_TYPE) *inkey; 138 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); 143 if (sk_ASN1_TYPE_num(inkey) == 6) 145 else if (sk_ASN1_TYPE_num(inkey) == 4) 147 else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not 152 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); 166 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/crypto/asn1/ |
H A D | d2i_pr.c | 133 STACK_OF(ASN1_TYPE) *inkey; 141 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); 145 if(sk_ASN1_TYPE_num(inkey) == 6) 147 else if (sk_ASN1_TYPE_num(inkey) == 4) 149 else if (sk_ASN1_TYPE_num(inkey) == 3) 154 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); 168 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/crypto/asn1/ |
H A D | d2i_pr.c | 129 STACK_OF(ASN1_TYPE) *inkey; 138 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); 143 if (sk_ASN1_TYPE_num(inkey) == 6) 145 else if (sk_ASN1_TYPE_num(inkey) == 4) 147 else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not 152 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); 166 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/crypto/asn1/ |
H A D | d2i_pr.c | 133 STACK_OF(ASN1_TYPE) *inkey; 141 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); 145 if(sk_ASN1_TYPE_num(inkey) == 6) 147 else if (sk_ASN1_TYPE_num(inkey) == 4) 149 else if (sk_ASN1_TYPE_num(inkey) == 3) 154 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); 168 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/asn1/ |
H A D | d2i_pr.c | 129 STACK_OF(ASN1_TYPE) *inkey; 138 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); 143 if (sk_ASN1_TYPE_num(inkey) == 6) 145 else if (sk_ASN1_TYPE_num(inkey) == 4) 147 else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not 152 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); 166 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/net/sunrpc/auth_gss/ |
H A D | gss_krb5_keys.c | 151 const struct xdr_netobj *inkey, 166 if ((inkey->len != keylength) || (outkey->len != keylength)) 173 if (crypto_blkcipher_setkey(cipher, inkey->data, inkey->len)) 150 krb5_derive_key(const struct gss_krb5_enctype *gk5e, const struct xdr_netobj *inkey, struct xdr_netobj *outkey, const struct xdr_netobj *in_constant, gfp_t gfp_mask) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/net/sunrpc/auth_gss/ |
H A D | gss_krb5_keys.c | 151 const struct xdr_netobj *inkey, 166 if ((inkey->len != keylength) || (outkey->len != keylength)) 173 if (crypto_blkcipher_setkey(cipher, inkey->data, inkey->len)) 150 krb5_derive_key(const struct gss_krb5_enctype *gk5e, const struct xdr_netobj *inkey, struct xdr_netobj *outkey, const struct xdr_netobj *in_constant, gfp_t gfp_mask) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/fs/ceph/ |
H A D | crypto.c | 42 int ceph_crypto_key_unarmor(struct ceph_crypto_key *key, const char *inkey) argument 44 int inlen = strlen(inkey); 49 dout("crypto_key_unarmor %s\n", inkey); 53 blen = ceph_unarmor(buf, inkey, inkey+inlen);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/fs/ceph/ |
H A D | crypto.c | 42 int ceph_crypto_key_unarmor(struct ceph_crypto_key *key, const char *inkey) argument 44 int inlen = strlen(inkey); 49 dout("crypto_key_unarmor %s\n", inkey); 53 blen = ceph_unarmor(buf, inkey, inkey+inlen);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6.36/crypto/ |
H A D | hmac.c | 45 const u8 *inkey, unsigned int keylen) 68 err = crypto_shash_digest(&desc.shash, inkey, keylen, ipad); 74 memcpy(ipad, inkey, keylen); 44 hmac_setkey(struct crypto_shash *parent, const u8 *inkey, unsigned int keylen) argument
|
H A D | xcbc.c | 61 const u8 *inkey, unsigned int keylen) 70 if ((err = crypto_cipher_setkey(ctx->child, inkey, keylen))) 60 crypto_xcbc_digest_setkey(struct crypto_shash *parent, const u8 *inkey, unsigned int keylen) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/linux/linux-2.6/crypto/ |
H A D | hmac.c | 45 const u8 *inkey, unsigned int keylen) 68 err = crypto_shash_digest(&desc.shash, inkey, keylen, ipad); 74 memcpy(ipad, inkey, keylen); 44 hmac_setkey(struct crypto_shash *parent, const u8 *inkey, unsigned int keylen) argument
|
H A D | xcbc.c | 61 const u8 *inkey, unsigned int keylen) 70 if ((err = crypto_cipher_setkey(ctx->child, inkey, keylen))) 60 crypto_xcbc_digest_setkey(struct crypto_shash *parent, const u8 *inkey, unsigned int keylen) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/apps/ |
H A D | ts.c | 98 char *queryfile, char *passin, char *inkey, 104 char *queryfile, char *passin, char *inkey, 146 char *inkey = NULL; local 253 else if (strcmp(*argv, "-inkey") == 0) 256 inkey = *++argv; 351 password, inkey, signer, chain, policy, 378 "[-signer tsa_cert.pem] [-inkey private_key.pem] " 674 char *queryfile, char *passin, char *inkey, 706 passin, inkey, signer, chain, 801 char *queryfile, char *passin, char *inkey, 673 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument 800 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument [all...] |
H A D | CA.sh | 150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/apps/ |
H A D | ts.c | 99 char *queryfile, char *passin, char *inkey, 105 char *queryfile, char *passin, char *inkey, 148 char *inkey = NULL; local 231 } else if (strcmp(*argv, "-inkey") == 0) { 234 inkey = *++argv; 319 password, inkey, signer, chain, policy, 347 "[-signer tsa_cert.pem] [-inkey private_key.pem] " 649 char *queryfile, char *passin, char *inkey, 678 passin, inkey, signer, chain, policy); 773 char *queryfile, char *passin, char *inkey, 648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument 772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument [all...] |
H A D | CA.sh | 150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/apps/ |
H A D | ts.c | 99 char *queryfile, char *passin, char *inkey, 105 char *queryfile, char *passin, char *inkey, 148 char *inkey = NULL; local 231 } else if (strcmp(*argv, "-inkey") == 0) { 234 inkey = *++argv; 319 password, inkey, signer, chain, policy, 347 "[-signer tsa_cert.pem] [-inkey private_key.pem] " 649 char *queryfile, char *passin, char *inkey, 678 passin, inkey, signer, chain, policy); 773 char *queryfile, char *passin, char *inkey, 648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument 772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/apps/ |
H A D | ts.c | 98 char *queryfile, char *passin, char *inkey, 104 char *queryfile, char *passin, char *inkey, 146 char *inkey = NULL; local 253 else if (strcmp(*argv, "-inkey") == 0) 256 inkey = *++argv; 351 password, inkey, signer, chain, policy, 378 "[-signer tsa_cert.pem] [-inkey private_key.pem] " 674 char *queryfile, char *passin, char *inkey, 706 passin, inkey, signer, chain, 801 char *queryfile, char *passin, char *inkey, 673 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument 800 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/apps/ |
H A D | ts.c | 99 char *queryfile, char *passin, char *inkey, 105 char *queryfile, char *passin, char *inkey, 148 char *inkey = NULL; local 231 } else if (strcmp(*argv, "-inkey") == 0) { 234 inkey = *++argv; 319 password, inkey, signer, chain, policy, 347 "[-signer tsa_cert.pem] [-inkey private_key.pem] " 649 char *queryfile, char *passin, char *inkey, 678 passin, inkey, signer, chain, policy); 773 char *queryfile, char *passin, char *inkey, 648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument 772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/apps/ |
H A D | ts.c | 98 char *queryfile, char *passin, char *inkey, 104 char *queryfile, char *passin, char *inkey, 146 char *inkey = NULL; local 253 else if (strcmp(*argv, "-inkey") == 0) 256 inkey = *++argv; 351 password, inkey, signer, chain, policy, 378 "[-signer tsa_cert.pem] [-inkey private_key.pem] " 674 char *queryfile, char *passin, char *inkey, 706 passin, inkey, signer, chain, 801 char *queryfile, char *passin, char *inkey, 673 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument 800 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 86 const unsigned char *inkey, 91 RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey); 85 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 86 const unsigned char *inkey, 91 RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey); 85 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 86 const unsigned char *inkey, 91 RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey); 85 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|