/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | d2i_pr.c | 143 int keytype; local 155 keytype = EVP_PKEY_DSA; 157 keytype = EVP_PKEY_EC; 158 else keytype = EVP_PKEY_RSA; 160 return d2i_PrivateKey(keytype, a, pp, length);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/ |
H A D | d2i_pr.c | 134 int keytype; local 148 keytype = EVP_PKEY_DSA; 150 keytype = EVP_PKEY_EC; 172 keytype = EVP_PKEY_RSA; 174 return d2i_PrivateKey(keytype, a, pp, length);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/ |
H A D | d2i_pr.c | 134 int keytype; local 148 keytype = EVP_PKEY_DSA; 150 keytype = EVP_PKEY_EC; 172 keytype = EVP_PKEY_RSA; 174 return d2i_PrivateKey(keytype, a, pp, length);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/vendor_defns/ |
H A D | sureware.h | 97 * out param keytype: 1 if RSA 2 if DSA 101 char *keytype); 114 * out param keytype: 1 if RSA 2 if DSA 117 unsigned long *num, char *keytype);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/engines/vendor_defns/ |
H A D | sureware.h | 96 * out param keytype: 1 if RSA 2 if DSA 98 typedef int SureWareHook_Load_Privkey_t(char*const msg,const char *key_id,char **hptr,unsigned long *num,char *keytype); 111 * out param keytype: 1 if RSA 2 if DSA 114 char *keytype);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/vendor_defns/ |
H A D | sureware.h | 97 * out param keytype: 1 if RSA 2 if DSA 101 char *keytype); 114 * out param keytype: 1 if RSA 2 if DSA 117 unsigned long *num, char *keytype);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/sound/ |
H A D | jack.h | 69 int keytype);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/sound/core/ |
H A D | jack.c | 172 * @keytype: Input layer key type to be reported 188 int keytype) 194 if (!keytype || key >= ARRAY_SIZE(jack->key)) 198 jack->key[key] = keytype; 187 snd_jack_set_key(struct snd_jack *jack, enum snd_jack_types type, int keytype) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/tests/ |
H A D | cavs_driver.pl | 1054 my $keytype = shift; 1065 $out .= "$keytype = $key1\n"; 1160 my $keytype = shift; 1186 $out .= "$keytype = ". bin2hex($key1). "\n"; 1190 $out .= "$keytype = ". bin2hex($key1). "\n"; 1643 my $keytype = ""; # we can have "KEY", "KEYs", "KEY1" 1826 $keytype=$1; 1832 $keytype=$1; 2005 $out .= kat($keytype, $key1, $key2, $key3, $iv, $pt, $cipher, $enc); 2006 $keytype [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/tests/ |
H A D | cavs_driver.pl | 1054 my $keytype = shift; 1065 $out .= "$keytype = $key1\n"; 1160 my $keytype = shift; 1186 $out .= "$keytype = ". bin2hex($key1). "\n"; 1190 $out .= "$keytype = ". bin2hex($key1). "\n"; 1643 my $keytype = ""; # we can have "KEY", "KEYs", "KEY1" 1826 $keytype=$1; 1832 $keytype=$1; 2005 $out .= kat($keytype, $key1, $key2, $key3, $iv, $pt, $cipher, $enc); 2006 $keytype [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/ |
H A D | p12_crt.c | 82 int mac_iter, int keytype) 144 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); 80 PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, int mac_iter, int keytype) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/ |
H A D | e_sureware.c | 687 char keytype) 703 switch (keytype) { 824 char keytype = 0; local 831 ret = p_surewarehk_Load_Privkey(msg, key_id, &hptr, &el, &keytype); 837 res = sureware_load_public(e, key_id, hptr, el, keytype); 850 char keytype = 0; local 858 ret = p_surewarehk_Info_Pubkey(msg, key_id, &el, &keytype); 864 res = sureware_load_public(e, key_id, hptr, el, keytype); 685 sureware_load_public(ENGINE *e, const char *key_id, char *hptr, unsigned long el, char keytype) argument
|
H A D | e_capi.c | 207 DWORD keytype; member in struct:CAPI_CTX_st 220 /* Container name: uses cspname, keytype */ 387 ctx->keytype = i; 388 CAPI_trace(ctx, "Setting key type to %d\n", ctx->keytype); 1545 ctx->csptype, ctx->keytype); 1549 ctx->csptype, ctx->keytype); 1580 ctx->keytype = AT_KEYEXCHANGE;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/engines/ |
H A D | e_sureware.c | 652 static EVP_PKEY* sureware_load_public(ENGINE *e,const char *key_id,char *hptr,unsigned long el,char keytype) argument 668 switch (keytype) 781 char keytype=0; local 790 ret=p_surewarehk_Load_Privkey(msg,key_id,&hptr,&el,&keytype); 797 res=sureware_load_public(e,key_id,hptr,el,keytype); 809 char keytype=0; local 819 ret=p_surewarehk_Info_Pubkey(msg,key_id,&el,&keytype); 826 res=sureware_load_public(e,key_id,hptr,el,keytype);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/ |
H A D | e_sureware.c | 687 char keytype) 703 switch (keytype) { 824 char keytype = 0; local 831 ret = p_surewarehk_Load_Privkey(msg, key_id, &hptr, &el, &keytype); 837 res = sureware_load_public(e, key_id, hptr, el, keytype); 850 char keytype = 0; local 858 ret = p_surewarehk_Info_Pubkey(msg, key_id, &el, &keytype); 864 res = sureware_load_public(e, key_id, hptr, el, keytype); 685 sureware_load_public(ENGINE *e, const char *key_id, char *hptr, unsigned long el, char keytype) argument
|
H A D | e_capi.c | 207 DWORD keytype; member in struct:CAPI_CTX_st 220 /* Container name: uses cspname, keytype */ 387 ctx->keytype = i; 388 CAPI_trace(ctx, "Setting key type to %d\n", ctx->keytype); 1545 ctx->csptype, ctx->keytype); 1549 ctx->csptype, ctx->keytype); 1580 ctx->keytype = AT_KEYEXCHANGE;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/ |
H A D | p12_crt.c | 68 int keytype) 126 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/ |
H A D | p12_crt.c | 82 int mac_iter, int keytype) 144 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); 80 PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, int mac_iter, int keytype) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/ath/ath5k/ |
H A D | pcu.c | 726 int keytype; local 746 keytype = ath5k_keycache_type(key); 747 if (keytype < 0) 748 return keytype; 773 ath5k_hw_reg_write(ah, keytype, AR5K_KEYTABLE_TYPE(entry));
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | pmeth_lib.c | 381 int EVP_PKEY_CTX_ctrl(EVP_PKEY_CTX *ctx, int keytype, int optype, argument 389 if ((keytype != -1) && (ctx->pmeth->pkey_id != keytype))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | pmeth_lib.c | 381 int EVP_PKEY_CTX_ctrl(EVP_PKEY_CTX *ctx, int keytype, int optype, argument 389 if ((keytype != -1) && (ctx->pmeth->pkey_id != keytype))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/tools/ |
H A D | dbus-send.c | 162 append_dict (DBusMessageIter *iter, int keytype, int valtype, const char *value) argument 177 append_arg (&subiter, keytype, val);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/ |
H A D | pkcs12.c | 119 int keytype = 0; local 159 keytype = KEY_EX; 161 keytype = KEY_SIG; 650 key_pbe, cert_pbe, iter, -1, keytype);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/ |
H A D | pkcs12.c | 119 int keytype = 0; local 159 keytype = KEY_EX; 161 keytype = KEY_SIG; 650 key_pbe, cert_pbe, iter, -1, keytype);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | pkcs12.c | 112 int keytype = 0; local 142 else if (!strcmp (*args, "-keyex")) keytype = KEY_EX; 143 else if (!strcmp (*args, "-keysig")) keytype = KEY_SIG; 580 key_pbe, cert_pbe, iter, -1, keytype);
|