/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/demos/maurice/ |
H A D | loadkeys.h | 16 EVP_PKEY *ReadPrivateKey(const char *keyfile);
|
H A D | loadkeys.c | 54 EVP_PKEY *ReadPrivateKey(const char *keyfile) argument 56 FILE *fp = fopen(keyfile, "r");
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/demos/maurice/ |
H A D | loadkeys.h | 16 EVP_PKEY *ReadPrivateKey(const char *keyfile);
|
H A D | loadkeys.c | 54 EVP_PKEY *ReadPrivateKey(const char *keyfile) argument 56 FILE *fp = fopen(keyfile, "r");
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/demos/sign/ |
H A D | sign.c | 83 static char keyfile[] = "key.pem"; local 97 fp = fopen (keyfile, "r");
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/demos/sign/ |
H A D | sign.c | 83 static char keyfile[] = "key.pem"; local 97 fp = fopen (keyfile, "r");
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/crypto/pkcs7/ |
H A D | enc.c | 76 char *keyfile = NULL; local 98 keyfile = argv[2]; 101 if (!(in=BIO_new_file(keyfile,"r"))) goto err;
|
H A D | dec.c | 75 char *keyfile=NULL; local 103 keyfile = argv[1]; 119 if(!keyfile) { 124 if ((in=BIO_new_file(keyfile,"r")) == NULL) goto err;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/crypto/pkcs7/ |
H A D | enc.c | 76 char *keyfile = NULL; local 98 keyfile = argv[2]; 101 if (!(in=BIO_new_file(keyfile,"r"))) goto err;
|
H A D | dec.c | 75 char *keyfile=NULL; local 103 keyfile = argv[1]; 119 if(!keyfile) { 124 if ((in=BIO_new_file(keyfile,"r")) == NULL) goto err;
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/openssl/apps/ |
H A D | smime.c | 90 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local 225 keyfile = *args; 437 if(!keyfile) keyfile = recipfile; 439 if(!keyfile) keyfile = signerfile; 440 } else keyfile = NULL; 442 if(keyfile) { 443 key = load_key(bio_err, keyfile, keyform, 0, passin, e,
|
H A D | rsautl.c | 91 char *keyfile = NULL; local 127 keyfile = *(++argv); 186 pkey = load_key(bio_err, keyfile, keyform, 0, 191 pkey = load_pubkey(bio_err, keyfile, keyform, 0, 196 x = load_cert(bio_err, keyfile, keyform,
|
H A D | spkac.c | 91 char *challenge = NULL, *keyfile = NULL; local 129 keyfile= *(++argv); 194 if(keyfile) { 196 strcmp(keyfile, "-") ? keyfile : NULL,
|
H A D | dgst.c | 100 const char *outfile = NULL, *keyfile = NULL; local 152 keyfile=*(++argv); 163 keyfile=*(++argv); 170 keyfile=*(++argv); 283 if(keyfile) out_bin = 1; 311 if(keyfile) 314 sigkey = load_pubkey(bio_err, keyfile, keyform, 0, NULL, 317 sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/openssl-0.9.8e/apps/ |
H A D | rsautl.c | 93 char *keyfile = NULL; local 129 keyfile = *(++argv); 189 pkey = load_key(bio_err, keyfile, keyform, 0, 194 pkey = load_pubkey(bio_err, keyfile, keyform, 0, 199 x = load_cert(bio_err, keyfile, keyform,
|
H A D | spkac.c | 92 char *challenge = NULL, *keyfile = NULL; local 130 keyfile= *(++argv); 195 if(keyfile) { 197 strcmp(keyfile, "-") ? keyfile : NULL,
|
H A D | dgst.c | 98 const char *outfile = NULL, *keyfile = NULL; local 149 keyfile=*(++argv); 160 keyfile=*(++argv); 167 keyfile=*(++argv); 288 if(keyfile) out_bin = 1; 316 if(keyfile) 319 sigkey = load_pubkey(bio_err, keyfile, keyform, 0, NULL, 322 sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
|
H A D | smime.c | 93 char *certfile = NULL, *keyfile = NULL, *contfile=NULL; local 281 keyfile = *args; 395 if (!recipfile && !keyfile) 581 if (!keyfile) 582 keyfile = recipfile; 586 if (!keyfile) 587 keyfile = signerfile; 589 else keyfile = NULL; 591 if (keyfile) 593 key = load_key(bio_err, keyfile, keyfor [all...] |
H A D | CA.sh | 93 -keyfile ${CATOP}/private/$CAKEY -selfsign \
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/libgcrypt-1.5.0/tests/ |
H A D | cavs_driver.pl | 176 # $2 keyfile name 258 # $1 keyfile name 292 my $keyfile = shift; 297 "openssl dgst -$cipher -binary -sign $keyfile"); 304 my $keyfile = shift; 310 "openssl dgst -$cipher -binary -verify $keyfile -signature $sigfile"); 410 my $keyfile = shift; 415 "fipsdrv --pkcs1 --algo $hashalgo --key $keyfile rsa-sign"); 421 my $keyfile = shift; 426 "fipsdrv --pkcs1 --algo $hashalgo --key $keyfile [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/passdb/ |
H A D | secrets.c | 747 Store a complete AFS keyfile into secrets.tdb. 750 BOOL secrets_store_afs_keyfile(const char *cell, const struct afs_keyfile *keyfile) argument 754 if ((cell == NULL) || (keyfile == NULL)) 757 if (ntohl(keyfile->nkeys) > SECRETS_AFS_MAXKEYS) 761 return secrets_store(key, keyfile, sizeof(struct afs_keyfile)); 770 struct afs_keyfile *keyfile; local 776 keyfile = (struct afs_keyfile *)secrets_fetch(key, &size); 778 if (keyfile == NULL) 782 SAFE_FREE(keyfile); 786 i = ntohl(keyfile [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/netatalk-2.2.0/include/atalk/ |
H A D | globals.h | 81 char *guest, *loginmesg, *keyfile, *passwdfile; member in struct:afp_options
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/avahi-0.6.25/avahi-sharp/ |
H A D | Makefile.am | 51 mcs -keyfile:$(srcdir)/avahi.snk -target:library -out:$@ -debug $(AVAHISOURCES) -r:Mono.Posix
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/timemachine/avahi-0.6.25/avahi-ui-sharp/ |
H A D | Makefile.am | 37 mcs -keyfile:$(top_srcdir)/avahi-sharp/avahi.snk -target:library -out:$@ -debug $(AVAHISOURCES) -pkg:gtk-sharp-2.0 -r:$(top_builddir)/avahi-sharp/avahi-sharp.dll -r:Mono.Posix
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/samba-3.0.13/source/utils/ |
H A D | net.c | 567 struct afs_keyfile keyfile; local 570 d_printf("usage: 'net afskey <keyfile> cell'\n"); 584 if (read(fd, &keyfile, sizeof(keyfile)) != sizeof(keyfile)) { 585 d_printf("Could not read keyfile\n"); 589 if (!secrets_store_afs_keyfile(argv[1], &keyfile)) { 590 d_printf("Could not write keyfile to secrets.tdb\n");
|