/third_party/node/deps/openssl/openssl/crypto/asn1/ |
H A D | d2i_pr.c | 168 STACK_OF(ASN1_TYPE) *inkey; in d2i_AutoPrivateKey_legacy() 178 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); in d2i_AutoPrivateKey_legacy() 184 if (sk_ASN1_TYPE_num(inkey) == 6) { in d2i_AutoPrivateKey_legacy() 186 } else if (sk_ASN1_TYPE_num(inkey) == 4) { in d2i_AutoPrivateKey_legacy() 188 } else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not in d2i_AutoPrivateKey_legacy() 193 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); in d2i_AutoPrivateKey_legacy() 210 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); in d2i_AutoPrivateKey_legacy()
|
/third_party/openssl/crypto/asn1/ |
H A D | d2i_pr.c | 168 STACK_OF(ASN1_TYPE) *inkey; in d2i_AutoPrivateKey_legacy() 178 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); in d2i_AutoPrivateKey_legacy() 184 if (sk_ASN1_TYPE_num(inkey) == 6) { in d2i_AutoPrivateKey_legacy() 186 } else if (sk_ASN1_TYPE_num(inkey) == 4) { in d2i_AutoPrivateKey_legacy() 188 } else if (sk_ASN1_TYPE_num(inkey) == 3) { /* This seems to be PKCS8, not in d2i_AutoPrivateKey_legacy() 193 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); in d2i_AutoPrivateKey_legacy() 210 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); in d2i_AutoPrivateKey_legacy()
|
/third_party/node/deps/openssl/openssl/apps/ |
H A D | ts.c | 50 const char *queryfile, const char *passin, const char *inkey, 57 const char *inkey, const EVP_MD *md, const char *signer, 97 {"inkey", OPT_INKEY, 's', "File with private key for reply"}, 143 " [-signer tsa_cert.pem] [-inkey private_key.pem]", 169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; in ts_main() local 256 inkey = opt_arg(); in ts_main() 331 password, inkey, md, signer, chain, policy, in ts_main() 585 const char *queryfile, const char *passin, const char *inkey, in reply_command() 608 passin, inkey, md, signer, chain, policy); in reply_command() 694 const char *inkey, cons in create_response() 584 reply_command(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy, const char *in, int token_in, const char *out, int token_out, int text) reply_command() argument 692 create_response(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy) create_response() argument [all...] |
H A D | pkeyutl.c | 73 {"inkey", OPT_INKEY, 's', "Input private key file"}, 120 const char *inkey = NULL; in pkeyutl_main() local 157 inkey = opt_arg(); in pkeyutl_main() 289 } else if (inkey == NULL) { in pkeyutl_main() 291 "%s: no private key given (-inkey parameter).\n", prog); in pkeyutl_main() 305 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type, in pkeyutl_main()
|
/third_party/openssl/apps/ |
H A D | ts.c | 50 const char *queryfile, const char *passin, const char *inkey, 57 const char *inkey, const EVP_MD *md, const char *signer, 97 {"inkey", OPT_INKEY, 's', "File with private key for reply"}, 143 " [-signer tsa_cert.pem] [-inkey private_key.pem]", 169 char *inkey = NULL, *signer = NULL, *chain = NULL, *CApath = NULL; in ts_main() local 256 inkey = opt_arg(); in ts_main() 331 password, inkey, md, signer, chain, policy, in ts_main() 585 const char *queryfile, const char *passin, const char *inkey, in reply_command() 608 passin, inkey, md, signer, chain, policy); in reply_command() 694 const char *inkey, cons in create_response() 584 reply_command(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy, const char *in, int token_in, const char *out, int token_out, int text) reply_command() argument 692 create_response(CONF *conf, const char *section, const char *engine, const char *queryfile, const char *passin, const char *inkey, const EVP_MD *md, const char *signer, const char *chain, const char *policy) create_response() argument [all...] |
H A D | pkeyutl.c | 73 {"inkey", OPT_INKEY, 's', "Input private key file"}, 120 const char *inkey = NULL; in pkeyutl_main() local 157 inkey = opt_arg(); in pkeyutl_main() 289 } else if (inkey == NULL) { in pkeyutl_main() 291 "%s: no private key given (-inkey parameter).\n", prog); in pkeyutl_main() 305 ctx = init_ctx(kdfalg, &keysize, inkey, keyform, key_type, in pkeyutl_main()
|
/third_party/node/deps/openssl/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_cbc_hmac_sha.h | 18 void (*init_mac_key)(void *ctx, const unsigned char *inkey, size_t inlen);
|
/third_party/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_cbc_hmac_sha.h | 18 void (*init_mac_key)(void *ctx, const unsigned char *inkey, size_t inlen);
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | e_chacha20_poly1305.c | 168 const unsigned char *inkey, in chacha20_poly1305_init_key() 173 if (!inkey && !iv) in chacha20_poly1305_init_key() 190 chacha_init_key(ctx, inkey, temp, enc); in chacha20_poly1305_init_key() 196 chacha_init_key(ctx, inkey, NULL, enc); in chacha20_poly1305_init_key() 167 chacha20_poly1305_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) chacha20_poly1305_init_key() argument
|
H A D | e_rc4_hmac_md5.c | 45 const unsigned char *inkey, in rc4_hmac_md5_init_key() 54 RC4_set_key(&key->ks, keylen, inkey); in rc4_hmac_md5_init_key() 44 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) rc4_hmac_md5_init_key() argument
|
H A D | e_aes_cbc_hmac_sha256.c | 66 const unsigned char *inkey, in aesni_cbc_hmac_sha256_init_key() 73 ret = aesni_set_encrypt_key(inkey, in aesni_cbc_hmac_sha256_init_key() 77 ret = aesni_set_decrypt_key(inkey, in aesni_cbc_hmac_sha256_init_key() 65 aesni_cbc_hmac_sha256_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) aesni_cbc_hmac_sha256_init_key() argument
|
H A D | e_aes_cbc_hmac_sha1.c | 70 const unsigned char *inkey, in aesni_cbc_hmac_sha1_init_key() 77 ret = aesni_set_encrypt_key(inkey, in aesni_cbc_hmac_sha1_init_key() 81 ret = aesni_set_decrypt_key(inkey, in aesni_cbc_hmac_sha1_init_key() 69 aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) aesni_cbc_hmac_sha1_init_key() argument
|
/third_party/openssl/crypto/evp/ |
H A D | e_chacha20_poly1305.c | 168 const unsigned char *inkey, in chacha20_poly1305_init_key() 173 if (!inkey && !iv) in chacha20_poly1305_init_key() 190 chacha_init_key(ctx, inkey, temp, enc); in chacha20_poly1305_init_key() 196 chacha_init_key(ctx, inkey, NULL, enc); in chacha20_poly1305_init_key() 167 chacha20_poly1305_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) chacha20_poly1305_init_key() argument
|
H A D | e_rc4_hmac_md5.c | 45 const unsigned char *inkey, in rc4_hmac_md5_init_key() 54 RC4_set_key(&key->ks, keylen, inkey); in rc4_hmac_md5_init_key() 44 rc4_hmac_md5_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) rc4_hmac_md5_init_key() argument
|
H A D | e_aes_cbc_hmac_sha256.c | 66 const unsigned char *inkey, in aesni_cbc_hmac_sha256_init_key() 73 ret = aesni_set_encrypt_key(inkey, in aesni_cbc_hmac_sha256_init_key() 77 ret = aesni_set_decrypt_key(inkey, in aesni_cbc_hmac_sha256_init_key() 65 aesni_cbc_hmac_sha256_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) aesni_cbc_hmac_sha256_init_key() argument
|
H A D | e_aes_cbc_hmac_sha1.c | 70 const unsigned char *inkey, in aesni_cbc_hmac_sha1_init_key() 77 ret = aesni_set_encrypt_key(inkey, in aesni_cbc_hmac_sha1_init_key() 81 ret = aesni_set_decrypt_key(inkey, in aesni_cbc_hmac_sha1_init_key() 69 aesni_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) aesni_cbc_hmac_sha1_init_key() argument
|
/third_party/python/Modules/ |
H A D | nismodule.c | 132 nis_foreach(int instatus, char *inkey, int inkeylen, char *inval, in nis_foreach() argument 142 if (inkeylen > 0 && inkey[inkeylen-1] == '\0') in nis_foreach() 147 key = PyUnicode_DecodeFSDefaultAndSize(inkey, inkeylen); in nis_foreach()
|
/third_party/node/deps/openssl/openssl/engines/ |
H A D | e_ossltest.c | 781 const unsigned char *inkey, in ossltest_aes128_cbc_hmac_sha1_init_key() 780 ossltest_aes128_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) ossltest_aes128_cbc_hmac_sha1_init_key() argument
|
/third_party/openssl/engines/ |
H A D | e_ossltest.c | 781 const unsigned char *inkey, in ossltest_aes128_cbc_hmac_sha1_init_key() 780 ossltest_aes128_cbc_hmac_sha1_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *inkey, const unsigned char *iv, int enc) ossltest_aes128_cbc_hmac_sha1_init_key() argument
|
/third_party/mbedtls/tests/data_files/ |
H A D | Makefile | 1899 $(OPENSSL) smime -sign -binary -in pkcs7_data.bin -out $@ -md sha256 -inkey pkcs7-rsa-expired.key -signer pkcs7-rsa-expired.crt -noattr -outform DER -out $@ 1917 $(OPENSSL) smime -sign -md sha256 -nocerts -noattr -in pkcs7_zerolendata.bin -inkey pkcs7-rsa-sha256-1.key -outform DER -binary -signer pkcs7-rsa-sha256-1.crt -out pkcs7_zerolendata_detached.der
|