Searched refs:sgckey (Results 1 - 10 of 10) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/apps/
H A Drsa.c104 int i,badops=0, sgckey=0; local
173 else if (strcmp(*argv,"-sgckey") == 0)
174 sgckey=1;
205 BIO_printf(bio_err," -sgckey Use IIS SGC key format\n");
257 (informat == FORMAT_NETSCAPE && sgckey ?
262 (informat == FORMAT_NETSCAPE && sgckey ?
355 size=i2d_RSA_NET(rsa,NULL,NULL, sgckey);
362 i2d_RSA_NET(rsa,&p,NULL, sgckey);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/
H A Dn_pkey.c108 int verify), int sgckey);
119 int verify), int sgckey)
204 if (sgckey) {
241 int verify), int sgckey)
268 if ((ret = d2i_RSA_NET_2(a, enckey->enckey->digest, cb, sgckey)) == NULL)
281 int verify), int sgckey)
299 if (sgckey) {
117 i2d_RSA_NET(const RSA *a, unsigned char **pp, int (*cb) (char *buf, int len, const char *prompt, int verify), int sgckey) argument
239 d2i_RSA_NET(RSA **a, const unsigned char **pp, long length, int (*cb) (char *buf, int len, const char *prompt, int verify), int sgckey) argument
279 d2i_RSA_NET_2(RSA **a, ASN1_OCTET_STRING *os, int (*cb) (char *buf, int len, const char *prompt, int verify), int sgckey) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/
H A Dn_pkey.c112 int sgckey);
123 int sgckey)
208 if(sgckey) {
242 int sgckey)
271 if ((ret=d2i_RSA_NET_2(a, enckey->enckey->digest,cb, sgckey)) == NULL) goto err;
283 int verify), int sgckey)
301 if(sgckey){
121 i2d_RSA_NET(const RSA *a, unsigned char **pp, int (*cb)(char *buf, int len, const char *prompt, int verify), int sgckey) argument
240 d2i_RSA_NET(RSA **a, const unsigned char **pp, long length, int (*cb)(char *buf, int len, const char *prompt, int verify), int sgckey) argument
281 d2i_RSA_NET_2(RSA **a, ASN1_OCTET_STRING *os, int (*cb)(char *buf, int len, const char *prompt, int verify), int sgckey) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/
H A Dn_pkey.c108 int verify), int sgckey);
119 int verify), int sgckey)
204 if (sgckey) {
241 int verify), int sgckey)
268 if ((ret = d2i_RSA_NET_2(a, enckey->enckey->digest, cb, sgckey)) == NULL)
281 int verify), int sgckey)
299 if (sgckey) {
117 i2d_RSA_NET(const RSA *a, unsigned char **pp, int (*cb) (char *buf, int len, const char *prompt, int verify), int sgckey) argument
239 d2i_RSA_NET(RSA **a, const unsigned char **pp, long length, int (*cb) (char *buf, int len, const char *prompt, int verify), int sgckey) argument
279 d2i_RSA_NET_2(RSA **a, ASN1_OCTET_STRING *os, int (*cb) (char *buf, int len, const char *prompt, int verify), int sgckey) argument
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/apps/
H A Drsa.c106 int i, badops = 0, sgckey = 0; local
171 else if (strcmp(*argv, "-sgckey") == 0)
172 sgckey = 1;
213 BIO_printf(bio_err, " -sgckey Use IIS SGC key format\n");
283 } else if (informat == FORMAT_NETSCAPE && sgckey)
292 (informat == FORMAT_NETSCAPE && sgckey ?
379 size = i2d_RSA_NET(rsa, NULL, NULL, sgckey);
385 i2d_RSA_NET(rsa, &p, NULL, sgckey);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/apps/
H A Drsa.c106 int i, badops = 0, sgckey = 0; local
171 else if (strcmp(*argv, "-sgckey") == 0)
172 sgckey = 1;
213 BIO_printf(bio_err, " -sgckey Use IIS SGC key format\n");
283 } else if (informat == FORMAT_NETSCAPE && sgckey)
292 (informat == FORMAT_NETSCAPE && sgckey ?
379 size = i2d_RSA_NET(rsa, NULL, NULL, sgckey);
385 i2d_RSA_NET(rsa, &p, NULL, sgckey);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/rsa/
H A Drsa.h272 int sgckey);
275 int sgckey);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/
H A Drsa.h272 int sgckey);
275 int sgckey);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/rsa/
H A Drsa.h393 int verify), int sgckey);
396 int verify), int sgckey);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/rsa/
H A Drsa.h393 int verify), int sgckey);
396 int verify), int sgckey);

Completed in 202 milliseconds