Searched refs:inkey (Results 1 - 21 of 21) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/
H A Dd2i_pr.c132 STACK_OF(ASN1_TYPE) *inkey;
141 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length);
147 if (sk_ASN1_TYPE_num(inkey) == 6)
149 else if (sk_ASN1_TYPE_num(inkey) == 4)
151 else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not
156 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
173 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/
H A Dd2i_pr.c132 STACK_OF(ASN1_TYPE) *inkey;
141 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length);
147 if (sk_ASN1_TYPE_num(inkey) == 6)
149 else if (sk_ASN1_TYPE_num(inkey) == 4)
151 else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not
156 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
173 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/
H A Dd2i_pr.c141 STACK_OF(ASN1_TYPE) *inkey;
149 inkey = d2i_ASN1_SET_OF_ASN1_TYPE(NULL, &p, length, d2i_ASN1_TYPE,
154 if(sk_ASN1_TYPE_num(inkey) == 6)
156 else if (sk_ASN1_TYPE_num(inkey) == 4)
159 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sunrpc/auth_gss/
H A Dgss_krb5_keys.c151 const struct xdr_netobj *inkey,
166 if ((inkey->len != keylength) || (outkey->len != keylength))
173 if (crypto_blkcipher_setkey(cipher, inkey->data, inkey->len))
150 krb5_derive_key(const struct gss_krb5_enctype *gk5e, const struct xdr_netobj *inkey, struct xdr_netobj *outkey, const struct xdr_netobj *in_constant, gfp_t gfp_mask) argument
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ceph/
H A Dcrypto.c42 int ceph_crypto_key_unarmor(struct ceph_crypto_key *key, const char *inkey) argument
44 int inlen = strlen(inkey);
49 dout("crypto_key_unarmor %s\n", inkey);
53 blen = ceph_unarmor(buf, inkey, inkey+inlen);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/
H A Dhmac.c45 const u8 *inkey, unsigned int keylen)
68 err = crypto_shash_digest(&desc.shash, inkey, keylen, ipad);
74 memcpy(ipad, inkey, keylen);
44 hmac_setkey(struct crypto_shash *parent, const u8 *inkey, unsigned int keylen) argument
H A Dxcbc.c61 const u8 *inkey, unsigned int keylen)
70 if ((err = crypto_cipher_setkey(ctx->child, inkey, keylen)))
60 crypto_xcbc_digest_setkey(struct crypto_shash *parent, const u8 *inkey, unsigned int keylen) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Dpkeyutl.c105 const char *inkey = NULL; local
138 } else if (!strcmp(*argv, "-inkey")) {
142 inkey = *++argv;
215 if (inkey == NULL ||
220 ctx = init_ctx(&keysize, inkey, keyform, key_type,
380 BIO_printf(bio_err, "-inkey file input key\n");
H A Dts.c99 char *queryfile, char *passin, char *inkey,
105 char *queryfile, char *passin, char *inkey,
148 char *inkey = NULL; local
231 } else if (strcmp(*argv, "-inkey") == 0) {
234 inkey = *++argv;
319 password, inkey, signer, chain, policy,
347 "[-signer tsa_cert.pem] [-inkey private_key.pem] "
649 char *queryfile, char *passin, char *inkey,
678 passin, inkey, signer, chain, policy);
773 char *queryfile, char *passin, char *inkey,
648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument
772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument
[all...]
H A DCA.sh150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Dpkeyutl.c105 const char *inkey = NULL; local
138 } else if (!strcmp(*argv, "-inkey")) {
142 inkey = *++argv;
215 if (inkey == NULL ||
220 ctx = init_ctx(&keysize, inkey, keyform, key_type,
380 BIO_printf(bio_err, "-inkey file input key\n");
H A Dts.c99 char *queryfile, char *passin, char *inkey,
105 char *queryfile, char *passin, char *inkey,
148 char *inkey = NULL; local
231 } else if (strcmp(*argv, "-inkey") == 0) {
234 inkey = *++argv;
319 password, inkey, signer, chain, policy,
347 "[-signer tsa_cert.pem] [-inkey private_key.pem] "
649 char *queryfile, char *passin, char *inkey,
678 passin, inkey, signer, chain, policy);
773 char *queryfile, char *passin, char *inkey,
648 reply_command(CONF *conf, char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy, char *in, int token_in, char *out, int token_out, int text) argument
772 create_response(CONF *conf, const char *section, char *engine, char *queryfile, char *passin, char *inkey, char *signer, char *chain, const char *policy) argument
[all...]
H A DCA.sh150 $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/
H A De_rc4_hmac_md5.c86 const unsigned char *inkey,
91 RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey);
85 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
H A De_aes_cbc_hmac_sha1.c122 const unsigned char *inkey,
129 ret = aesni_set_encrypt_key(inkey, ctx->key_len * 8, &key->ks);
131 ret = aesni_set_decrypt_key(inkey, ctx->key_len * 8, &key->ks);
121 aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
H A De_aes_cbc_hmac_sha256.c118 const unsigned char *inkey,
126 ret = aesni_set_encrypt_key(inkey, ctx->key_len * 8, &key->ks);
128 ret = aesni_set_decrypt_key(inkey, ctx->key_len * 8, &key->ks);
117 aesni_cbc_hmac_sha256_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/
H A De_rc4_hmac_md5.c86 const unsigned char *inkey,
91 RC4_set_key(&key->ks, EVP_CIPHER_CTX_key_length(ctx), inkey);
85 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
H A De_aes_cbc_hmac_sha1.c122 const unsigned char *inkey,
129 ret = aesni_set_encrypt_key(inkey, ctx->key_len * 8, &key->ks);
131 ret = aesni_set_decrypt_key(inkey, ctx->key_len * 8, &key->ks);
121 aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
H A De_aes_cbc_hmac_sha256.c118 const unsigned char *inkey,
126 ret = aesni_set_encrypt_key(inkey, ctx->key_len * 8, &key->ks);
128 ret = aesni_set_decrypt_key(inkey, ctx->key_len * 8, &key->ks);
117 aesni_cbc_hmac_sha256_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/tests/certs/scripts/
H A Dgenserv.sh84 echo "$OPENSSL pkcs12 -export -des3 -out $PREFIX-sv.p12 -caname $CAPREFIX -name $PREFIX -inkey $PREFIX-sv.key -in $PREFIX-sv.crt -certfile $CAPREFIX-ca.crt "
86 $OPENSSL pkcs12 -export -des3 -out $PREFIX-sv.p12 -caname $CAPREFIX -name $PREFIX -inkey $PREFIX-sv.key -in $PREFIX-sv.crt -certfile $CAPREFIX-ca.crt
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/sunrpc/
H A Dgss_krb5.h295 const struct xdr_netobj *inkey,

Completed in 245 milliseconds