/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/libmsrpc/test/reg/ |
H A D | regkeyenum.c | 67 struct RegEnumKeys ek; local 68 ZERO_STRUCT(ek); 70 ek.in.key = rok.out.key; 71 ek.in.max_keys = max_enum; 73 while(cac_RegEnumKeys(hnd, mem_ctx, &ek)) { 76 for(j = 0; j < ek.out.num_keys; j++) { 77 printf(" Key name: %s\n", ek.out.key_names[j]);
|
H A D | regkeycreate.c | 71 struct RegEnumKeys ek; local 72 ZERO_STRUCT(ek); 74 ek.in.key = rok.out.key; 75 ek.in.max_keys = 50; 77 while(cac_RegEnumKeys(hnd, mem_ctx, &ek)) { 80 for(j = 0; j < ek.out.num_keys; j++) { 81 printf(" Key name: %s\n", ek.out.key_names[j]);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | p_dec.c | 69 int EVP_PKEY_decrypt(unsigned char *key, const unsigned char *ek, int ekl, argument 83 ret=RSA_private_decrypt(ekl,ek,key,priv->pkey.rsa,RSA_PKCS1_PADDING);
|
H A D | p_enc.c | 69 int EVP_PKEY_encrypt(unsigned char *ek, const unsigned char *key, int key_len, argument 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
|
H A D | p_open.c | 70 const unsigned char *ek, int ekl, const unsigned char *iv, 98 i=EVP_PKEY_decrypt(key,ek,ekl,priv); 69 EVP_OpenInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, const unsigned char *ek, int ekl, const unsigned char *iv, EVP_PKEY *priv) argument
|
H A D | p_seal.c | 69 int EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek, argument 90 ekl[i]=EVP_PKEY_encrypt(ek[i],key,EVP_CIPHER_CTX_key_length(ctx),
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | p_dec.c | 69 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, argument 83 RSA_private_decrypt(ekl, ek, key, priv->pkey.rsa, RSA_PKCS1_PADDING);
|
H A D | p_enc.c | 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, argument 82 RSA_public_encrypt(key_len, key, ek, pubk->pkey.rsa,
|
H A D | p_open.c | 70 const unsigned char *ek, int ekl, const unsigned char *iv, 98 i = EVP_PKEY_decrypt_old(key, ek, ekl, priv); 69 EVP_OpenInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, const unsigned char *ek, int ekl, const unsigned char *iv, EVP_PKEY *priv) argument
|
H A D | p_seal.c | 70 unsigned char **ek, int *ekl, unsigned char *iv, 94 EVP_PKEY_encrypt_old(ek[i], key, EVP_CIPHER_CTX_key_length(ctx), 69 EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | p_dec.c | 69 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, argument 83 RSA_private_decrypt(ekl, ek, key, priv->pkey.rsa, RSA_PKCS1_PADDING);
|
H A D | p_enc.c | 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, argument 82 RSA_public_encrypt(key_len, key, ek, pubk->pkey.rsa,
|
H A D | p_open.c | 70 const unsigned char *ek, int ekl, const unsigned char *iv, 98 i = EVP_PKEY_decrypt_old(key, ek, ekl, priv); 69 EVP_OpenInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, const unsigned char *ek, int ekl, const unsigned char *iv, EVP_PKEY *priv) argument
|
H A D | p_seal.c | 70 unsigned char **ek, int *ekl, unsigned char *iv, 94 EVP_PKEY_encrypt_old(ek[i], key, EVP_CIPHER_CTX_key_length(ctx), 69 EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/nfsd/ |
H A D | export.c | 64 struct svc_expkey *ek = container_of(h, struct svc_expkey, h); local 67 qword_add(bpp, blen, ek->ek_client->name); 68 snprintf(type, 5, "%d", ek->ek_fsidtype); 70 qword_addhex(bpp, blen, (char*)ek->ek_fsid, key_len(ek->ek_fsidtype)); 93 struct svc_expkey *ek = NULL; local 139 ek = svc_expkey_lookup(&key); 141 if (!ek) 153 ek = svc_expkey_update(&key, ek); 182 struct svc_expkey *ek ; local 780 struct svc_expkey key, *ek; local 802 struct svc_expkey key, *ek; local 925 struct svc_expkey *ek; local 965 struct svc_expkey *ek; local 1199 struct svc_expkey *ek = exp_find_key(clp, fsid_type, fsidv, reqp); local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pem/ |
H A D | pem_seal.c | 71 unsigned char **ek, int *ekl, unsigned char *iv, 101 ret = EVP_SealInit(&ctx->cipher, type, ek, ekl, iv, pubk, npubk); 107 j = EVP_EncodeBlock((unsigned char *)s, ek[i], 110 memcpy(ek[i], s, j + 1); 70 PEM_SealInit(PEM_ENCODE_SEAL_CTX *ctx, EVP_CIPHER *type, EVP_MD *md_type, unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | idea.h | 87 void idea_set_decrypt_key(const IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/idea/ |
H A D | idea.h | 87 void idea_set_decrypt_key(const IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk);
|
H A D | i_skey.c | 97 void idea_set_decrypt_key(const IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk) argument 104 fp= &(ek->data[8][0]);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pem/ |
H A D | pem_seal.c | 71 unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, 102 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk); 108 j=EVP_EncodeBlock((unsigned char *)s,ek[i], 111 memcpy(ek[i],s,j+1); 70 PEM_SealInit(PEM_ENCODE_SEAL_CTX *ctx, EVP_CIPHER *type, EVP_MD *md_type, unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/idea/ |
H A D | idea.h | 90 void idea_set_decrypt_key(IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pem/ |
H A D | pem_seal.c | 71 unsigned char **ek, int *ekl, unsigned char *iv, 101 ret = EVP_SealInit(&ctx->cipher, type, ek, ekl, iv, pubk, npubk); 107 j = EVP_EncodeBlock((unsigned char *)s, ek[i], 110 memcpy(ek[i], s, j + 1); 70 PEM_SealInit(PEM_ENCODE_SEAL_CTX *ctx, EVP_CIPHER *type, EVP_MD *md_type, unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/idea/ |
H A D | idea.h | 90 void idea_set_decrypt_key(IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs7/ |
H A D | pk7_doit.c | 142 unsigned char *ek = NULL; local 167 ek = OPENSSL_malloc(eklen); 169 if (ek == NULL) { 174 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) 177 ASN1_STRING_set0(ri->enc_key, ek, eklen); 178 ek = NULL; 187 if (ek) 188 OPENSSL_free(ek); 197 unsigned char *ek = NULL; local 219 ek 430 unsigned char *ek = NULL, *tkey = NULL; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 142 unsigned char *ek = NULL; local 167 ek = OPENSSL_malloc(eklen); 169 if (ek == NULL) { 174 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) 177 ASN1_STRING_set0(ri->enc_key, ek, eklen); 178 ek = NULL; 187 if (ek) 188 OPENSSL_free(ek); 197 unsigned char *ek = NULL; local 219 ek 430 unsigned char *ek = NULL, *tkey = NULL; local [all...] |