Searched refs:keytype (Results 1 - 25 of 43) sorted by relevance

12

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/
H A Dd2i_pr.c143 int keytype; local
155 keytype = EVP_PKEY_DSA;
157 keytype = EVP_PKEY_EC;
158 else keytype = EVP_PKEY_RSA;
160 return d2i_PrivateKey(keytype, a, pp, length);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/
H A Dd2i_pr.c134 int keytype; local
148 keytype = EVP_PKEY_DSA;
150 keytype = EVP_PKEY_EC;
172 keytype = EVP_PKEY_RSA;
174 return d2i_PrivateKey(keytype, a, pp, length);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/
H A Dd2i_pr.c134 int keytype; local
148 keytype = EVP_PKEY_DSA;
150 keytype = EVP_PKEY_EC;
172 keytype = EVP_PKEY_RSA;
174 return d2i_PrivateKey(keytype, a, pp, length);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/vendor_defns/
H A Dsureware.h97 * out param keytype: 1 if RSA 2 if DSA
101 char *keytype);
114 * out param keytype: 1 if RSA 2 if DSA
117 unsigned long *num, char *keytype);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/engines/vendor_defns/
H A Dsureware.h96 * out param keytype: 1 if RSA 2 if DSA
98 typedef int SureWareHook_Load_Privkey_t(char*const msg,const char *key_id,char **hptr,unsigned long *num,char *keytype);
111 * out param keytype: 1 if RSA 2 if DSA
114 char *keytype);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/vendor_defns/
H A Dsureware.h97 * out param keytype: 1 if RSA 2 if DSA
101 char *keytype);
114 * out param keytype: 1 if RSA 2 if DSA
117 unsigned long *num, char *keytype);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/sound/
H A Djack.h69 int keytype);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/sound/core/
H A Djack.c172 * @keytype: Input layer key type to be reported
188 int keytype)
194 if (!keytype || key >= ARRAY_SIZE(jack->key))
198 jack->key[key] = keytype;
187 snd_jack_set_key(struct snd_jack *jack, enum snd_jack_types type, int keytype) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/tests/
H A Dcavs_driver.pl1054 my $keytype = shift;
1065 $out .= "$keytype = $key1\n";
1160 my $keytype = shift;
1186 $out .= "$keytype = ". bin2hex($key1). "\n";
1190 $out .= "$keytype = ". bin2hex($key1). "\n";
1643 my $keytype = ""; # we can have "KEY", "KEYs", "KEY1"
1826 $keytype=$1;
1832 $keytype=$1;
2005 $out .= kat($keytype, $key1, $key2, $key3, $iv, $pt, $cipher, $enc);
2006 $keytype
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/tests/
H A Dcavs_driver.pl1054 my $keytype = shift;
1065 $out .= "$keytype = $key1\n";
1160 my $keytype = shift;
1186 $out .= "$keytype = ". bin2hex($key1). "\n";
1190 $out .= "$keytype = ". bin2hex($key1). "\n";
1643 my $keytype = ""; # we can have "KEY", "KEYs", "KEY1"
1826 $keytype=$1;
1832 $keytype=$1;
2005 $out .= kat($keytype, $key1, $key2, $key3, $iv, $pt, $cipher, $enc);
2006 $keytype
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/pkcs12/
H A Dp12_crt.c82 int mac_iter, int keytype)
144 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass);
80 PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, int mac_iter, int keytype) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/engines/
H A De_sureware.c687 char keytype)
703 switch (keytype) {
824 char keytype = 0; local
831 ret = p_surewarehk_Load_Privkey(msg, key_id, &hptr, &el, &keytype);
837 res = sureware_load_public(e, key_id, hptr, el, keytype);
850 char keytype = 0; local
858 ret = p_surewarehk_Info_Pubkey(msg, key_id, &el, &keytype);
864 res = sureware_load_public(e, key_id, hptr, el, keytype);
685 sureware_load_public(ENGINE *e, const char *key_id, char *hptr, unsigned long el, char keytype) argument
H A De_capi.c207 DWORD keytype; member in struct:CAPI_CTX_st
220 /* Container name: uses cspname, keytype */
387 ctx->keytype = i;
388 CAPI_trace(ctx, "Setting key type to %d\n", ctx->keytype);
1545 ctx->csptype, ctx->keytype);
1549 ctx->csptype, ctx->keytype);
1580 ctx->keytype = AT_KEYEXCHANGE;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/engines/
H A De_sureware.c652 static EVP_PKEY* sureware_load_public(ENGINE *e,const char *key_id,char *hptr,unsigned long el,char keytype) argument
668 switch (keytype)
781 char keytype=0; local
790 ret=p_surewarehk_Load_Privkey(msg,key_id,&hptr,&el,&keytype);
797 res=sureware_load_public(e,key_id,hptr,el,keytype);
809 char keytype=0; local
819 ret=p_surewarehk_Info_Pubkey(msg,key_id,&el,&keytype);
826 res=sureware_load_public(e,key_id,hptr,el,keytype);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/engines/
H A De_sureware.c687 char keytype)
703 switch (keytype) {
824 char keytype = 0; local
831 ret = p_surewarehk_Load_Privkey(msg, key_id, &hptr, &el, &keytype);
837 res = sureware_load_public(e, key_id, hptr, el, keytype);
850 char keytype = 0; local
858 ret = p_surewarehk_Info_Pubkey(msg, key_id, &el, &keytype);
864 res = sureware_load_public(e, key_id, hptr, el, keytype);
685 sureware_load_public(ENGINE *e, const char *key_id, char *hptr, unsigned long el, char keytype) argument
H A De_capi.c207 DWORD keytype; member in struct:CAPI_CTX_st
220 /* Container name: uses cspname, keytype */
387 ctx->keytype = i;
388 CAPI_trace(ctx, "Setting key type to %d\n", ctx->keytype);
1545 ctx->csptype, ctx->keytype);
1549 ctx->csptype, ctx->keytype);
1580 ctx->keytype = AT_KEYEXCHANGE;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs12/
H A Dp12_crt.c68 int keytype)
126 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/pkcs12/
H A Dp12_crt.c82 int mac_iter, int keytype)
144 bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass);
80 PKCS12_create(char *pass, char *name, EVP_PKEY *pkey, X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, int mac_iter, int keytype) argument
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/ath/ath5k/
H A Dpcu.c726 int keytype; local
746 keytype = ath5k_keycache_type(key);
747 if (keytype < 0)
748 return keytype;
773 ath5k_hw_reg_write(ah, keytype, AR5K_KEYTABLE_TYPE(entry));
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/
H A Dpmeth_lib.c381 int EVP_PKEY_CTX_ctrl(EVP_PKEY_CTX *ctx, int keytype, int optype, argument
389 if ((keytype != -1) && (ctx->pmeth->pkey_id != keytype))
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/
H A Dpmeth_lib.c381 int EVP_PKEY_CTX_ctrl(EVP_PKEY_CTX *ctx, int keytype, int optype, argument
389 if ((keytype != -1) && (ctx->pmeth->pkey_id != keytype))
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/tools/
H A Ddbus-send.c162 append_dict (DBusMessageIter *iter, int keytype, int valtype, const char *value) argument
177 append_arg (&subiter, keytype, val);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Dpkcs12.c119 int keytype = 0; local
159 keytype = KEY_EX;
161 keytype = KEY_SIG;
650 key_pbe, cert_pbe, iter, -1, keytype);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Dpkcs12.c119 int keytype = 0; local
159 keytype = KEY_EX;
161 keytype = KEY_SIG;
650 key_pbe, cert_pbe, iter, -1, keytype);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Dpkcs12.c112 int keytype = 0; local
142 else if (!strcmp (*args, "-keyex")) keytype = KEY_EX;
143 else if (!strcmp (*args, "-keysig")) keytype = KEY_SIG;
580 key_pbe, cert_pbe, iter, -1, keytype);

Completed in 206 milliseconds

12