/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | evp_pbe.c | 29 EVP_PBE_KEYGEN *keygen; member 99 EVP_PBE_KEYGEN *keygen; in EVP_PBE_CipherInit_ex() local 102 &cipher_nid, &md_nid, &keygen, &keygen_ex)) { in EVP_PBE_CipherInit_ex() 149 /* Try extended keygen with libctx/propq first, fall back to legacy keygen */ in EVP_PBE_CipherInit_ex() 153 ret = keygen(ctx, pass, passlen, param, cipher, md, en_de); in EVP_PBE_CipherInit_ex() 193 int md_nid, EVP_PBE_KEYGEN *keygen) in EVP_PBE_alg_add_type() 210 pbe_tmp->keygen = keygen; in EVP_PBE_alg_add_type() 224 EVP_PBE_KEYGEN *keygen) in EVP_PBE_alg_add() 192 EVP_PBE_alg_add_type(int pbe_type, int pbe_nid, int cipher_nid, int md_nid, EVP_PBE_KEYGEN *keygen) EVP_PBE_alg_add_type() argument 223 EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, EVP_PBE_KEYGEN *keygen) EVP_PBE_alg_add() argument [all...] |
H A D | pmeth_gn.c | 65 && ctx->pmeth->keygen == NULL)) in gen_init() 132 /* Legacy compatible keygen callback info, only used with provider impls */ in EVP_PKEY_generate() 213 * If we get here then we're using legacy paramgen/keygen. In that case in EVP_PKEY_generate() 228 ret = ctx->pmeth->keygen(ctx, *ppkey); in EVP_PKEY_generate()
|
/third_party/openssl/crypto/evp/ |
H A D | evp_pbe.c | 29 EVP_PBE_KEYGEN *keygen; member 99 EVP_PBE_KEYGEN *keygen; in EVP_PBE_CipherInit_ex() local 102 &cipher_nid, &md_nid, &keygen, &keygen_ex)) { in EVP_PBE_CipherInit_ex() 149 /* Try extended keygen with libctx/propq first, fall back to legacy keygen */ in EVP_PBE_CipherInit_ex() 153 ret = keygen(ctx, pass, passlen, param, cipher, md, en_de); in EVP_PBE_CipherInit_ex() 193 int md_nid, EVP_PBE_KEYGEN *keygen) in EVP_PBE_alg_add_type() 210 pbe_tmp->keygen = keygen; in EVP_PBE_alg_add_type() 224 EVP_PBE_KEYGEN *keygen) in EVP_PBE_alg_add() 192 EVP_PBE_alg_add_type(int pbe_type, int pbe_nid, int cipher_nid, int md_nid, EVP_PBE_KEYGEN *keygen) EVP_PBE_alg_add_type() argument 223 EVP_PBE_alg_add(int nid, const EVP_CIPHER *cipher, const EVP_MD *md, EVP_PBE_KEYGEN *keygen) EVP_PBE_alg_add() argument [all...] |
H A D | pmeth_gn.c | 65 && ctx->pmeth->keygen == NULL)) in gen_init() 132 /* Legacy compatible keygen callback info, only used with provider impls */ in EVP_PKEY_generate() 213 * If we get here then we're using legacy paramgen/keygen. In that case in EVP_PKEY_generate() 228 ret = ctx->pmeth->keygen(ctx, *ppkey); in EVP_PKEY_generate()
|
/third_party/icu/icu4j/perf-tests/ |
H A D | collationperf.pl | 80 doKeyTimes("java -classpath $classPath com.ibm.icu.dev.test.perf.CollationPerformanceTest -terse -file data/collation/$data -locale $locale -loop 1000 -keygen", 92 doKeyTimes("java -classpath $classPath com.ibm.icu.dev.test.perf.CollationPerformanceTest -terse -file data/collation/$data -locale $locale -loop 1000 -keygen -java", 126 Locale Data file strcoll keygen keylen strcoll keygen keylen coll keygen keylen
|
/third_party/node/deps/openssl/openssl/crypto/rsa/ |
H A D | rsa_meth.c | 273 int (*keygen) (RSA *rsa, int bits, BIGNUM *e, in RSA_meth_set_keygen() 276 meth->rsa_keygen = keygen; in RSA_meth_set_keygen() 287 int (*keygen) (RSA *rsa, int bits, in RSA_meth_set_multi_prime_keygen() 291 meth->rsa_multi_prime_keygen = keygen; in RSA_meth_set_multi_prime_keygen()
|
/third_party/openssl/crypto/rsa/ |
H A D | rsa_meth.c | 273 int (*keygen) (RSA *rsa, int bits, BIGNUM *e, in RSA_meth_set_keygen() 276 meth->rsa_keygen = keygen; in RSA_meth_set_keygen() 287 int (*keygen) (RSA *rsa, int bits, in RSA_meth_set_multi_prime_keygen() 291 meth->rsa_multi_prime_keygen = keygen; in RSA_meth_set_multi_prime_keygen()
|
/third_party/icu/icu4c/source/test/perf/collationperf/ |
H A D | CollPerf.pl | 91 #keygen time 92 @icu = `$p -locale @locale[$n] -loop 1000 -file $filePath@data[$n] -keygen`; 93 @nix = `$p -locale @locale[$n] -unix -loop 1000 -file $filePath@data[$n] -keygen`; 103 #keygen len 194 <td>keygen</td> 246 <td align="left"><b>keygen</b> <i>(ICU)</i></td> 249 <td align="left"><b>keygen</b> <i>(GLIBC)</i></td> 252 <td align="left"><b>keygen</b> <i>(GLIBC-ICU)/ICU)</i></td>
|
/third_party/node/deps/openssl/openssl/crypto/ec/ |
H A D | ec_kmeth.c | 219 int (*keygen)(EC_KEY *key)) in EC_KEY_METHOD_set_keygen() 221 meth->keygen = keygen; in EC_KEY_METHOD_set_keygen() 295 *pkeygen = meth->keygen; in EC_KEY_METHOD_get_keygen()
|
H A D | ec_key.c | 215 if (eckey->meth->keygen != NULL) { in EC_KEY_generate_key() 218 ret = eckey->meth->keygen(eckey); in EC_KEY_generate_key() 232 ret = eckey->group->meth->keygen(eckey); in ossl_ec_key_gen()
|
/third_party/openssl/crypto/ec/ |
H A D | ec_kmeth.c | 219 int (*keygen)(EC_KEY *key)) in EC_KEY_METHOD_set_keygen() 221 meth->keygen = keygen; in EC_KEY_METHOD_set_keygen() 295 *pkeygen = meth->keygen; in EC_KEY_METHOD_get_keygen()
|
H A D | ec_key.c | 215 if (eckey->meth->keygen != NULL) { in EC_KEY_generate_key() 218 ret = eckey->meth->keygen(eckey); in EC_KEY_generate_key() 232 ret = eckey->group->meth->keygen(eckey); in ossl_ec_key_gen()
|
/third_party/ltp/testcases/network/stress/ssh/ |
H A D | ssh-stress.sh | 14 TST_NEEDS_CMDS="sshd ssh ssh-keygen od pkill pgrep" 63 ssh-keygen -q -N "" -t rsa -b 4096 -f $TST_TMPDIR/ssh_host_rsa_key 64 ssh-keygen -q -N "" -t ecdsa -f $TST_TMPDIR/ssh_host_ecdsa_key 65 ssh-keygen -q -N "" -t ed25519 -f $TST_TMPDIR/ssh_host_ed25519_key 68 tst_rhost_run -s -c "ssh-keygen -t rsa -N \"\" -f $TST_TMPDIR/id_rsa \
|
/third_party/node/deps/openssl/openssl/crypto/dsa/ |
H A D | dsa_meth.c | 219 int DSA_meth_set_keygen(DSA_METHOD *dsam, int (*keygen) (DSA *)) in DSA_meth_set_keygen() 221 dsam->dsa_keygen = keygen; in DSA_meth_set_keygen()
|
/third_party/openssl/crypto/dsa/ |
H A D | dsa_meth.c | 219 int DSA_meth_set_keygen(DSA_METHOD *dsam, int (*keygen) (DSA *)) in DSA_meth_set_keygen() 221 dsam->dsa_keygen = keygen; in DSA_meth_set_keygen()
|
/third_party/node/deps/openssl/openssl/engines/ |
H A D | e_padlock.c | 207 unsigned int keygen:1; in IMPLEMENT_DYNAMIC_BIND_FN() member 644 cdata->cword.b.keygen = 0; in padlock_aes_init_key() 666 cdata->cword.b.keygen = 1; in padlock_aes_init_key()
|
/third_party/openssl/engines/ |
H A D | e_padlock.c | 207 unsigned int keygen:1; in IMPLEMENT_DYNAMIC_BIND_FN() member 644 cdata->cword.b.keygen = 0; in padlock_aes_init_key() 666 cdata->cword.b.keygen = 1; in padlock_aes_init_key()
|
/third_party/openssl/test/ |
H A D | evp_test.c | 3098 KEYGEN_TEST_DATA *keygen = t->data; in keygen_test_cleanup() local 3100 EVP_PKEY_CTX_free(keygen->genctx); in keygen_test_cleanup() 3101 OPENSSL_free(keygen->keyname); in keygen_test_cleanup() 3109 KEYGEN_TEST_DATA *keygen = t->data; in keygen_test_parse() local 3112 return TEST_ptr(keygen->keyname = OPENSSL_strdup(value)); in keygen_test_parse() 3114 return pkey_test_ctrl(t, keygen->genctx, value); in keygen_test_parse() 3120 KEYGEN_TEST_DATA *keygen = t->data; in keygen_test_run() local 3124 if (EVP_PKEY_keygen(keygen->genctx, &pkey) <= 0) { in keygen_test_run() 3130 TEST_info("Warning: legacy key generated %s", keygen->keyname); in keygen_test_run() 3133 if (keygen in keygen_test_run() [all...] |
/third_party/python/Tools/buildbot/ |
H A D | remotePythonInfo.bat | 33 echo Also a key must be created with ssh-keygen and added to both the buildbot worker machine
|
H A D | test.bat | 49 echo Also a key must be created with ssh-keygen and added to both the buildbot worker machine
|
H A D | remoteDeploy.bat | 58 echo Also a key must be created with ssh-keygen and added to both the buildbot worker machine
|
/third_party/node/deps/openssl/openssl/include/openssl/ |
H A D | rsa.h | 586 int (*keygen) (RSA *rsa, int bits, BIGNUM *e, 596 int (*keygen) (RSA *rsa, int bits,
|
H A D | dsa.h | 268 int (*keygen) (DSA *));
|
/third_party/openssl/include/openssl/ |
H A D | rsa.h | 586 int (*keygen) (RSA *rsa, int bits, BIGNUM *e, 596 int (*keygen) (RSA *rsa, int bits,
|
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | rsa.h | 500 int (*keygen) (RSA *rsa, int bits, BIGNUM *e, 505 int (*keygen) (RSA *rsa, int bits,
|