Searched refs:keytype (Results 1 - 24 of 24) sorted by relevance

/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/
H A Dd2i_pr.c143 int keytype; local
155 keytype = EVP_PKEY_DSA;
157 keytype = EVP_PKEY_EC;
158 else keytype = EVP_PKEY_RSA;
160 return d2i_PrivateKey(keytype, a, pp, length);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/asn1/
H A Dd2i_pr.c130 int keytype; local
141 if(sk_ASN1_TYPE_num(inkey) == 6) keytype = EVP_PKEY_DSA;
142 else keytype = EVP_PKEY_RSA;
144 return d2i_PrivateKey(keytype, a, pp, length);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/engine/vendor_defns/
H A Dsureware.h96 * out param keytype: 1 if RSA 2 if DSA
98 typedef int SureWareHook_Load_Privkey_t(char*const msg,const char *key_id,char **hptr,unsigned long *num,char *keytype);
111 * out param keytype: 1 if RSA 2 if DSA
114 char *keytype);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/engines/vendor_defns/
H A Dsureware.h96 * out param keytype: 1 if RSA 2 if DSA
98 typedef int SureWareHook_Load_Privkey_t(char*const msg,const char *key_id,char **hptr,unsigned long *num,char *keytype);
111 * out param keytype: 1 if RSA 2 if DSA
114 char *keytype);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/pkcs12/
H A Dp12_crt.c65 int keytype)
134 if(keytype && !PKCS8_add_keyusage(p8, keytype)) return NULL;
63 PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, int mac_iter, int keytype) argument
H A Dpkcs12.h251 int mac_iter, int keytype);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/tests/
H A Dcavs_driver.pl1054 my $keytype = shift;
1065 $out .= "$keytype = $key1\n";
1160 my $keytype = shift;
1186 $out .= "$keytype = ". bin2hex($key1). "\n";
1190 $out .= "$keytype = ". bin2hex($key1). "\n";
1643 my $keytype = ""; # we can have "KEY", "KEYs", "KEY1"
1826 $keytype=$1;
1832 $keytype=$1;
2005 $out .= kat($keytype, $key1, $key2, $key3, $iv, $pt, $cipher, $enc);
2006 $keytype
[all...]
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/engine/
H A Dhw_sureware.c637 static EVP_PKEY* sureware_load_public(ENGINE *e,const char *key_id,char *hptr,unsigned long el,char keytype) argument
653 switch (keytype)
766 char keytype=0; local
775 ret=p_surewarehk_Load_Privkey(msg,key_id,&hptr,&el,&keytype);
782 res=sureware_load_public(e,key_id,hptr,el,keytype);
794 char keytype=0; local
804 ret=p_surewarehk_Info_Pubkey(msg,key_id,&el,&keytype);
811 res=sureware_load_public(e,key_id,hptr,el,keytype);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/
H A Dp12_crt.c68 int keytype)
126 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass);
H A Dpkcs12.h251 int mac_iter, int keytype);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/engines/
H A De_sureware.c652 static EVP_PKEY* sureware_load_public(ENGINE *e,const char *key_id,char *hptr,unsigned long el,char keytype) argument
668 switch (keytype)
781 char keytype=0; local
790 ret=p_surewarehk_Load_Privkey(msg,key_id,&hptr,&el,&keytype);
797 res=sureware_load_public(e,key_id,hptr,el,keytype);
809 char keytype=0; local
819 ret=p_surewarehk_Info_Pubkey(msg,key_id,&el,&keytype);
826 res=sureware_load_public(e,key_id,hptr,el,keytype);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/apps/
H A Dpkcs12.c111 int keytype = 0; local
148 else if (!strcmp (*args, "-keyex")) keytype = KEY_EX;
149 else if (!strcmp (*args, "-keysig")) keytype = KEY_SIG;
589 if(keytype) PKCS8_add_keyusage(p8, keytype);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/include/openssl/
H A Dpkcs12.h251 int mac_iter, int keytype);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Dpkcs12.c112 int keytype = 0; local
142 else if (!strcmp (*args, "-keyex")) keytype = KEY_EX;
143 else if (!strcmp (*args, "-keysig")) keytype = KEY_SIG;
580 key_pbe, cert_pbe, iter, -1, keytype);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Dpkcs12.h251 int mac_iter, int keytype);
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/lib/
H A Dssh.c518 int keytype; local
521 &keylen, &keytype);
539 keybit = (keytype == LIBSSH2_HOSTKEY_TYPE_RSA)?
558 knownkey.keytype = (keytype == LIBSSH2_HOSTKEY_TYPE_RSA)?
566 foundkey.keytype = (keytype == LIBSSH2_HOSTKEY_TYPE_RSA)?
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/libsmb/
H A Dclikrb5.c27 #define KRB5_KEY_TYPE(k) ((k)->keytype)
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/net/wireless/libertas/
H A Dhostcmd.h264 u8 keytype[4]; member in struct:cmd_ds_802_11_set_wep
H A Dcmd.c188 wep->keytype[i] =
194 wep->keytype[i] =
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/ssl/
H A Dkssl.c985 printf("%s\n\t[et%d:%d]: ", label, keyblk->keytype,
1113 kssl_ctx->enctype = krb5credsp->session.keytype;
1684 enctype = session->keytype;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Dkssl.c1012 printf("%s\n\t[et%d:%d]: ", label, keyblk->keytype,
1140 kssl_ctx->enctype = krb5credsp->session.keytype;
1711 enctype = session->keytype;
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/include/curl/
H A Dcurl.h631 } keytype; member in struct:curl_khkey
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/curl-7.23.1/source/tmp.bak/include/curl/
H A Dcurl.h631 } keytype; member in struct:curl_khkey
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/samba-3.0.13/source/
H A Dconfigure33181 krb5_keytype keytype; keytype = KEYTYPE_ARCFOUR_56;
33499 krb5_keytab_entry entry; entry.keyblock.keytype = 0;
[all...]

Completed in 801 milliseconds