/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
d2i_pr.c | 133 STACK_OF(ASN1_TYPE) *inkey; 141 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); 145 if(sk_ASN1_TYPE_num(inkey) == 6) 147 else if (sk_ASN1_TYPE_num(inkey) == 4) 149 else if (sk_ASN1_TYPE_num(inkey) == 3) 154 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); 168 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
|
/external/openssl/crypto/asn1/ |
d2i_pr.c | 133 STACK_OF(ASN1_TYPE) *inkey; 141 inkey = d2i_ASN1_SEQUENCE_ANY(NULL, &p, length); 145 if(sk_ASN1_TYPE_num(inkey) == 6) 147 else if (sk_ASN1_TYPE_num(inkey) == 4) 149 else if (sk_ASN1_TYPE_num(inkey) == 3) 154 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free); 168 sk_ASN1_TYPE_pop_free(inkey, ASN1_TYPE_free);
|
/system/core/fastboot/ |
genkey.sh | 20 openssl pkcs12 -export -in $1-cert.pem -inkey $1.pem -passin pass:"$2" \
|
/system/extras/verity/ |
VeritySigner.java | 26 // openssl rsautl -raw -inkey <key.pem> -encrypt -in <sigfile> > /tmp/dump
|
/external/chromium_org/net/data/ssl/scripts/ |
generate-duplicate-cn-certs.sh | 92 -inkey out/A.key \ 99 -inkey out/A.key \
|
/external/chromium_org/sandbox/mac/ |
os_compatibility.cc | 55 vproc_gsk_t inkey; member in struct:sandbox::__anon14578::swap_integer_request_10_6 97 return request->inkey == 0 && request->inval == 0 && request->outkey != 0;
|
/external/chromium_org/third_party/icu/source/common/ |
uresimp.h | 191 * @param inKey a key associated with the requested resource 203 const char* inKey, 215 * @param inKey a key associated with the requested resource 226 const char* inKey,
|
uresbund.c | [all...] |
/external/icu/icu4c/source/common/ |
uresimp.h | 189 * @param inKey a key associated with the requested resource 200 const char* inKey, 212 * @param inKey a key associated with the requested resource 221 const char* inKey,
|
uresbund.cpp | [all...] |
/external/chromium_org/third_party/openssl/openssl/apps/ |
pkeyutl.c | 134 else if(!strcmp(*argv, "-inkey")) 212 "-pkeyopt command before -inkey\n"); 394 BIO_printf(bio_err, "-inkey file input key\n"); 520 BIO_puts(err, "-peerkey command before -inkey\n");
|
smime.c | 292 else if (!strcmp (*args, "-inkey")) 296 /* If previous -inkey arument add signer to list */ 301 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 386 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 471 BIO_printf (bio_err, "-inkey file input private key (if not signer or recipient)\n");
|
rsautl.c | 131 } else if(!strcmp(*argv, "-inkey")) { 325 BIO_printf(bio_err, "-inkey file input key\n");
|
cms.c | 435 else if (!strcmp (*args, "-inkey")) 439 /* If previous -inkey arument add signer to list */ 444 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 545 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 634 BIO_printf (bio_err, "-inkey file input private key (if not signer or recipient)\n"); [all...] |
/external/openssl/apps/ |
pkeyutl.c | 134 else if(!strcmp(*argv, "-inkey")) 212 "-pkeyopt command before -inkey\n"); 394 BIO_printf(bio_err, "-inkey file input key\n"); 520 BIO_puts(err, "-peerkey command before -inkey\n");
|
smime.c | 292 else if (!strcmp (*args, "-inkey")) 296 /* If previous -inkey arument add signer to list */ 301 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 386 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 471 BIO_printf (bio_err, "-inkey file input private key (if not signer or recipient)\n");
|
rsautl.c | 131 } else if(!strcmp(*argv, "-inkey")) { 325 BIO_printf(bio_err, "-inkey file input key\n");
|
cms.c | 435 else if (!strcmp (*args, "-inkey")) 439 /* If previous -inkey arument add signer to list */ 444 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 545 BIO_puts(bio_err, "Illegal -inkey without -signer\n"); 634 BIO_printf (bio_err, "-inkey file input private key (if not signer or recipient)\n"); [all...] |
/external/chromium_org/third_party/icu/source/tools/toolutil/ |
pkgitems.cpp | 283 Resource res, const char *inKey, const char *parentKey, int32_t depth, 292 if(depth==1 && inKey!=NULL) { 293 if(0!=strcmp(inKey, "%%ALIAS")) { 329 inKey, depth+1, 350 inKey, depth+1,
|
/external/icu/icu4c/source/tools/toolutil/ |
pkgitems.cpp | 283 Resource res, const char *inKey, const char *parentKey, int32_t depth, 292 if(depth==1 && inKey!=NULL) { 293 if(0!=strcmp(inKey, "%%ALIAS")) { 329 inKey, depth+1, 350 inKey, depth+1,
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
e_rc4_hmac_md5.c | 86 const unsigned char *inkey, 92 inkey);
|
/external/openssl/crypto/evp/ |
e_rc4_hmac_md5.c | 86 const unsigned char *inkey, 92 inkey);
|
/external/chromium_org/google_apis/cup/ |
client_update_protocol_unittest.cc | 84 // openssl rsautl -inkey cr2_pub.pem -pubin -encrypt -raw
|
/packages/inputmethods/OpenWnn/src/jp/co/omronsoft/openwnn/ |
Keyboard.java | 757 boolean inKey = false; 783 inKey = true; 797 if (inKey) { 798 inKey = false;
|
/system/core/fastbootd/other/sign/src/ |
SignImg.java | 49 * openssl pkcs8 -topk8 -nocrypt -outform DER < inkey.pem > outkey.pk8
|