/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/ |
H A D | d2i_pr.c | 132 STACK_OF(ASN1_TYPE) *inkey; 141 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); 147 if (sk_ASN1_TYPE_num(inkey) == 6) 149 else if (sk_ASN1_TYPE_num(inkey) == 4) 151 else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not 156 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); 173 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/ |
H A D | d2i_pr.c | 132 STACK_OF(ASN1_TYPE) *inkey; 141 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); 147 if (sk_ASN1_TYPE_num(inkey) == 6) 149 else if (sk_ASN1_TYPE_num(inkey) == 4) 151 else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not 156 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); 173 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | d2i_pr.c | 141 STACK_OF(ASN1_TYPE) *inkey; 149 inkey = d2i_ASN1_SET_OF_ASN1_TYPE(NULL, &p, length, d2i_ASN1_TYPE, 154 if(sk_ASN1_TYPE_num(inkey) == 6) 156 else if (sk_ASN1_TYPE_num(inkey) == 4) 159 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sunrpc/auth_gss/ |
H A D | gss_krb5_keys.c | 151 const struct xdr_netobj *inkey, 166 if ((inkey->len != keylength) || (outkey->len != keylength)) 173 if (crypto_blkcipher_setkey(cipher, inkey->data, inkey->len)) 150 krb5_derive_key(const struct gss_krb5_enctype *gk5e, const struct xdr_netobj *inkey, struct xdr_netobj *outkey, const struct xdr_netobj *in_constant, gfp_t gfp_mask) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ceph/ |
H A D | crypto.c | 42 int ceph_crypto_key_unarmor(struct ceph_crypto_key *key, const char *inkey) argument 44 int inlen = strlen(inkey); 49 dout("crypto_key_unarmor %s\n", inkey); 53 blen = ceph_unarmor(buf, inkey, inkey+inlen);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | hmac.c | 45 const u8 *inkey, unsigned int keylen) 68 err = crypto_shash_digest(&desc.shash, inkey, keylen, ipad); 74 memcpy(ipad, inkey, keylen); 44 hmac_setkey(struct crypto_shash *parent, const u8 *inkey, unsigned int keylen) argument
|
H A D | xcbc.c | 61 const u8 *inkey, unsigned int keylen) 70 if ((err = crypto_cipher_setkey(ctx->child, inkey, keylen))) 60 crypto_xcbc_digest_setkey(struct crypto_shash *parent, const u8 *inkey, unsigned int keylen) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | pkeyutl.c | 105 const char *inkey = NULL; local 138 } else if (!strcmp(*argv, "-inkey")) { 142 inkey = *++argv; 215 if (inkey == NULL || 220 ctx = init_ctx(&keysize, inkey, keyform, key_type, 380 BIO_printf(bio_err, "-inkey file input key\n");
|
H A D | ts.c | 99 char *queryfile, char *passin, char *inkey, 105 char *queryfile, char *passin, char *inkey, 148 char *inkey = NULL; local 231 } else if (strcmp(*argv, "-inkey") == 0) { 234 inkey = *++argv; 319 password, inkey, signer, chain, policy, 347 "[-signer tsa_cert.pem] [-inkey private_key.pem] " 649 char *queryfile, char *passin, char *inkey, 678 passin, inkey, signer, chain, policy); 773 char *queryfile, char *passin, char *inkey, 648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument 772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument [all...] |
H A D | CA.sh | 150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | pkeyutl.c | 105 const char *inkey = NULL; local 138 } else if (!strcmp(*argv, "-inkey")) { 142 inkey = *++argv; 215 if (inkey == NULL || 220 ctx = init_ctx(&keysize, inkey, keyform, key_type, 380 BIO_printf(bio_err, "-inkey file input key\n");
|
H A D | ts.c | 99 char *queryfile, char *passin, char *inkey, 105 char *queryfile, char *passin, char *inkey, 148 char *inkey = NULL; local 231 } else if (strcmp(*argv, "-inkey") == 0) { 234 inkey = *++argv; 319 password, inkey, signer, chain, policy, 347 "[-signer tsa_cert.pem] [-inkey private_key.pem] " 649 char *queryfile, char *passin, char *inkey, 678 passin, inkey, signer, chain, policy); 773 char *queryfile, char *passin, char *inkey, 648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument 772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument [all...] |
H A D | CA.sh | 150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 86 const unsigned char *inkey, 91 RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey); 85 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
H A D | e_aes_cbc_hmac_sha1.c | 122 const unsigned char *inkey, 129 ret = aesni_set_encrypt_key(inkey, ctx->key_len * 8, &key->ks); 131 ret = aesni_set_decrypt_key(inkey, ctx->key_len * 8, &key->ks); 121 aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
H A D | e_aes_cbc_hmac_sha256.c | 118 const unsigned char *inkey, 126 ret = aesni_set_encrypt_key(inkey, ctx->key_len * 8, &key->ks); 128 ret = aesni_set_decrypt_key(inkey, ctx->key_len * 8, &key->ks); 117 aesni_cbc_hmac_sha256_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | e_rc4_hmac_md5.c | 86 const unsigned char *inkey, 91 RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey); 85 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
H A D | e_aes_cbc_hmac_sha1.c | 122 const unsigned char *inkey, 129 ret = aesni_set_encrypt_key(inkey, ctx->key_len * 8, &key->ks); 131 ret = aesni_set_decrypt_key(inkey, ctx->key_len * 8, &key->ks); 121 aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
H A D | e_aes_cbc_hmac_sha256.c | 118 const unsigned char *inkey, 126 ret = aesni_set_encrypt_key(inkey, ctx->key_len * 8, &key->ks); 128 ret = aesni_set_decrypt_key(inkey, ctx->key_len * 8, &key->ks); 117 aesni_cbc_hmac_sha256_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/tests/certs/scripts/ |
H A D | genserv.sh | 84 echo "$OPENSSL pkcs12 -export -des3 -out $PREFIX-sv.p12 -caname $CAPREFIX -name $PREFIX -inkey $PREFIX-sv.key -in $PREFIX-sv.crt -certfile $CAPREFIX-ca.crt " 86 $OPENSSL pkcs12 -export -des3 -out $PREFIX-sv.p12 -caname $CAPREFIX -name $PREFIX -inkey $PREFIX-sv.key -in $PREFIX-sv.crt -certfile $CAPREFIX-ca.crt
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/sunrpc/ |
H A D | gss_krb5.h | 295 const struct xdr_netobj *inkey,
|