Home
last modified time | relevance | path

Searched refs:inkey (Results 1 - 20 of 20) sorted by relevance

/third_party/node/deps/openssl/openssl/crypto/asn1/
H A Dd2i_pr.c168 STACK_OF(ASN1_TYPE) *inkey; in d2i_AutoPrivateKey_legacy()
178 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); in d2i_AutoPrivateKey_legacy()
184 if (sk_ASN1_TYPE_num(inkey) == 6) { in d2i_AutoPrivateKey_legacy()
186 } else if (sk_ASN1_TYPE_num(inkey) == 4) { in d2i_AutoPrivateKey_legacy()
188 } else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not in d2i_AutoPrivateKey_legacy()
193 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); in d2i_AutoPrivateKey_legacy()
210 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); in d2i_AutoPrivateKey_legacy()
/third_party/openssl/crypto/asn1/
H A Dd2i_pr.c168 STACK_OF(ASN1_TYPE) *inkey; in d2i_AutoPrivateKey_legacy()
178 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); in d2i_AutoPrivateKey_legacy()
184 if (sk_ASN1_TYPE_num(inkey) == 6) { in d2i_AutoPrivateKey_legacy()
186 } else if (sk_ASN1_TYPE_num(inkey) == 4) { in d2i_AutoPrivateKey_legacy()
188 } else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not in d2i_AutoPrivateKey_legacy()
193 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); in d2i_AutoPrivateKey_legacy()
210 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); in d2i_AutoPrivateKey_legacy()
/third_party/node/deps/openssl/openssl/apps/
H A Dts.c50 const char *queryfile, const char *passin, const char *inkey,
57 const char *inkey, const EVP_MD *md, const char *signer,
97 {"inkey", OPT_INKEY, 's', "File with private key for reply"},
143 " [-signer tsa_cert.pem] [-inkey private_key.pem]",
169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; in ts_main() local
256 inkey = opt_arg(); in ts_main()
331 password, inkey, md, signer, chain, policy, in ts_main()
585 const char *queryfile, const char *passin, const char *inkey, in reply_command()
608 passin, inkey, md, signer, chain, policy); in reply_command()
694 const char *inkey, cons in create_response()
584 reply_command(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy, const char *in, int token_in, const char *out, int token_out, int text) reply_command() argument
692 create_response(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy) create_response() argument
[all...]
H A Dpkeyutl.c73 {"inkey", OPT_INKEY, 's', "Input private key file"},
120 const char *inkey = NULL; in pkeyutl_main() local
157 inkey = opt_arg(); in pkeyutl_main()
289 } else if (inkey == NULL) { in pkeyutl_main()
291 "%s: no private key given (-inkey parameter).\n", prog); in pkeyutl_main()
305 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type, in pkeyutl_main()
/third_party/openssl/apps/
H A Dts.c50 const char *queryfile, const char *passin, const char *inkey,
57 const char *inkey, const EVP_MD *md, const char *signer,
97 {"inkey", OPT_INKEY, 's', "File with private key for reply"},
143 " [-signer tsa_cert.pem] [-inkey private_key.pem]",
169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; in ts_main() local
256 inkey = opt_arg(); in ts_main()
331 password, inkey, md, signer, chain, policy, in ts_main()
585 const char *queryfile, const char *passin, const char *inkey, in reply_command()
608 passin, inkey, md, signer, chain, policy); in reply_command()
694 const char *inkey, cons in create_response()
584 reply_command(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy, const char *in, int token_in, const char *out, int token_out, int text) reply_command() argument
692 create_response(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy) create_response() argument
[all...]
H A Dpkeyutl.c73 {"inkey", OPT_INKEY, 's', "Input private key file"},
120 const char *inkey = NULL; in pkeyutl_main() local
157 inkey = opt_arg(); in pkeyutl_main()
289 } else if (inkey == NULL) { in pkeyutl_main()
291 "%s: no private key given (-inkey parameter).\n", prog); in pkeyutl_main()
305 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type, in pkeyutl_main()
/third_party/node/deps/openssl/openssl/providers/implementations/ciphers/
H A Dcipher_aes_cbc_hmac_sha.h18 void (*init_mac_key)(void *ctx, const unsigned char *inkey, size_t inlen);
/third_party/openssl/providers/implementations/ciphers/
H A Dcipher_aes_cbc_hmac_sha.h18 void (*init_mac_key)(void *ctx, const unsigned char *inkey, size_t inlen);
/third_party/node/deps/openssl/openssl/crypto/evp/
H A De_chacha20_poly1305.c168 const unsigned char *inkey, in chacha20_poly1305_init_key()
173 if (!inkey && !iv) in chacha20_poly1305_init_key()
190 chacha_init_key(ctx, inkey, temp, enc); in chacha20_poly1305_init_key()
196 chacha_init_key(ctx, inkey, NULL, enc); in chacha20_poly1305_init_key()
167 chacha20_poly1305_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) chacha20_poly1305_init_key() argument
H A De_rc4_hmac_md5.c45 const unsigned char *inkey, in rc4_hmac_md5_init_key()
54 RC4_set_key(&key->ks, keylen, inkey); in rc4_hmac_md5_init_key()
44 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) rc4_hmac_md5_init_key() argument
H A De_aes_cbc_hmac_sha256.c66 const unsigned char *inkey, in aesni_cbc_hmac_sha256_init_key()
73 ret = aesni_set_encrypt_key(inkey, in aesni_cbc_hmac_sha256_init_key()
77 ret = aesni_set_decrypt_key(inkey, in aesni_cbc_hmac_sha256_init_key()
65 aesni_cbc_hmac_sha256_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) aesni_cbc_hmac_sha256_init_key() argument
H A De_aes_cbc_hmac_sha1.c70 const unsigned char *inkey, in aesni_cbc_hmac_sha1_init_key()
77 ret = aesni_set_encrypt_key(inkey, in aesni_cbc_hmac_sha1_init_key()
81 ret = aesni_set_decrypt_key(inkey, in aesni_cbc_hmac_sha1_init_key()
69 aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) aesni_cbc_hmac_sha1_init_key() argument
/third_party/openssl/crypto/evp/
H A De_chacha20_poly1305.c168 const unsigned char *inkey, in chacha20_poly1305_init_key()
173 if (!inkey && !iv) in chacha20_poly1305_init_key()
190 chacha_init_key(ctx, inkey, temp, enc); in chacha20_poly1305_init_key()
196 chacha_init_key(ctx, inkey, NULL, enc); in chacha20_poly1305_init_key()
167 chacha20_poly1305_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) chacha20_poly1305_init_key() argument
H A De_rc4_hmac_md5.c45 const unsigned char *inkey, in rc4_hmac_md5_init_key()
54 RC4_set_key(&key->ks, keylen, inkey); in rc4_hmac_md5_init_key()
44 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) rc4_hmac_md5_init_key() argument
H A De_aes_cbc_hmac_sha256.c66 const unsigned char *inkey, in aesni_cbc_hmac_sha256_init_key()
73 ret = aesni_set_encrypt_key(inkey, in aesni_cbc_hmac_sha256_init_key()
77 ret = aesni_set_decrypt_key(inkey, in aesni_cbc_hmac_sha256_init_key()
65 aesni_cbc_hmac_sha256_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) aesni_cbc_hmac_sha256_init_key() argument
H A De_aes_cbc_hmac_sha1.c70 const unsigned char *inkey, in aesni_cbc_hmac_sha1_init_key()
77 ret = aesni_set_encrypt_key(inkey, in aesni_cbc_hmac_sha1_init_key()
81 ret = aesni_set_decrypt_key(inkey, in aesni_cbc_hmac_sha1_init_key()
69 aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) aesni_cbc_hmac_sha1_init_key() argument
/third_party/python/Modules/
H A Dnismodule.c132 nis_foreach(int instatus, char *inkey, int inkeylen, char *inval, in nis_foreach() argument
142 if (inkeylen > 0 && inkey[inkeylen-1] == '\0') in nis_foreach()
147 key = PyUnicode_DecodeFSDefaultAndSize(inkey, inkeylen); in nis_foreach()
/third_party/node/deps/openssl/openssl/engines/
H A De_ossltest.c781 const unsigned char *inkey, in ossltest_aes128_cbc_hmac_sha1_init_key()
780 ossltest_aes128_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) ossltest_aes128_cbc_hmac_sha1_init_key() argument
/third_party/openssl/engines/
H A De_ossltest.c781 const unsigned char *inkey, in ossltest_aes128_cbc_hmac_sha1_init_key()
780 ossltest_aes128_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) ossltest_aes128_cbc_hmac_sha1_init_key() argument
/third_party/mbedtls/tests/data_files/
H A DMakefile1899 $(OPENSSL) smime -sign -binary -in pkcs7_data.bin -out $@ -md sha256 -inkey pkcs7-rsa-expired.key -signer pkcs7-rsa-expired.crt -noattr -outform DER -out $@
1917 $(OPENSSL) smime -sign -md sha256 -nocerts -noattr -in pkcs7_zerolendata.bin -inkey pkcs7-rsa-sha256-1.key -outform DER -binary -signer pkcs7-rsa-sha256-1.crt -out pkcs7_zerolendata_detached.der

Completed in 24 milliseconds