/openssl/apps/ |
H A D | ec.c | 71 ENGINE *e = NULL; in ec_main() local 132 e = setup_engine(opt_arg(), 0); in ec_main() 178 eckey = load_pubkey(infile, informat, 1, passin, e, "public key"); in ec_main() 180 eckey = load_key(infile, informat, 1, passin, e, "private key"); in ec_main() 286 release_engine(e); in ec_main()
|
H A D | dgst.c | 97 ENGINE *e = NULL, *impl = NULL; in dgst_main() local 175 e = setup_engine(opt_arg(), 0); in dgst_main() 244 impl = e; in dgst_main() 282 sigkey = load_pubkey(keyfile, keyform, 0, NULL, e, "public key"); in dgst_main() 284 sigkey = load_key(keyfile, keyform, 0, passin, e, "private key"); in dgst_main() 471 release_engine(e); in dgst_main() 513 size_t i, e = 0, length = strlen(file), newline_count = 0, mem_len = 0; in newline_escape_filename() local 524 while (e < length) { in newline_escape_filename() 525 const char c = file[e]; in newline_escape_filename() 533 e++; in newline_escape_filename()
|
H A D | spkac.c | 63 ENGINE *e = NULL; in spkac_main() local 126 e = setup_engine(opt_arg(), 0); in spkac_main() 149 keyformat, 1, passin, e, "private key"); in spkac_main() 229 release_engine(e); in spkac_main()
|
H A D | rand.c | 51 ENGINE *e = NULL; in rand_main() local 75 e = setup_engine(opt_arg(), 0); in rand_main() 147 release_engine(e); in rand_main()
|
/openssl/crypto/evp/ |
H A D | p_lib.c | 383 if (e == NULL) { in new_raw_key_int() 615 const char *engine_id = e != NULL ? ENGINE_get_id(e) : NULL; in new_cmac_key_int() 686 if (e != NULL) { in EVP_PKEY_set1_engine() 692 ENGINE_finish(e); in EVP_PKEY_set1_engine() 698 pkey->pmeth_engine = e; in EVP_PKEY_set1_engine() 964 ENGINE *e; in EVP_PKEY_type() local 971 ENGINE_finish(e); in EVP_PKEY_type() 1481 ENGINE **eptr = (e == NULL) ? &e : NULL; in pkey_set_type() 1528 ENGINE_finish(e); in pkey_set_type() 1580 if (eptr == NULL && e != NULL && !ENGINE_init(e)) { in pkey_set_type() [all …]
|
/openssl/fuzz/corpora/conf/ |
H A D | 4d25ab27344743497390aa2e49707510a45c9b91 | 10 e::= 15 e.::=
|
H A D | b69ccfe2d5d09472910b338a43c17af32ff4195e | 15 e::= 19 e.::=
|
H A D | aede19ed732abc6511afedd1d6bcf41ee8885fb5 | 14 e::= 19 e.::=
|
H A D | 983b8e68cc7cf4ce00ed6db9cc223c3a749990d8 | 15 e::= 19 e.::=
|
H A D | 7219c1466c058362f3ecd530d2501d991e569973 | 13 e::= 17 e.::=
|
H A D | abcc0f5971280a2b6d0f2b07c3861c327e0f5da6 | 11 e::= 15 e.::=
|
H A D | e6cc966e77cdd363bf72bcdbb6e580a1651cac31 | 12 e::= 17 e.::=
|
H A D | a6aaee0a7396d0d05e4aafb37765be1bc6dc45d8 | 13 e::==`Y 18 e.::=
|
H A D | 151c5c372c6a7f171c86b2a26caae60c33c05cc0 | 27 e::= 32 e.::=
|
H A D | 3a377c3799ef4c5bd25b80ad6632fb933cc85362 | 27 e::= 32 e.::=
|
H A D | d4ba18f699f055ef040fb3c4abae583f0573750c | 13 e::= 15 e.::=
|
H A D | b35328ea9aedef17e09a035b5ee85ccdf3fe860b | 113 ~e::= 213 e::= 218 e.::=
|
H A D | 066aa4d6ca4969ade449457b60e677aa632f169e | 117 ~e::= 217 e::= 222 e.::=
|
H A D | 90ab7f8496785089c7c5d10d948a1bf315526537 | 112 ~e::= 213 e::= 218 e.::=
|
/openssl/Configurations/ |
H A D | unix-Makefile.tmpl | 823 @set -e; for e in dummy $(INSTALL_ENGINES); do \ 825 fn=`basename $$e`; \ 835 @set -e; for e in dummy $(INSTALL_ENGINES); do \ 837 fn=`basename $$e`; \ 847 @set -e; for e in dummy $(INSTALL_MODULES); do \ 849 fn=`basename $$e`; \ 859 @set -e; for e in dummy $(INSTALL_MODULES); do \ 861 fn=`basename $$e`; \ 1227 | sed -e 's/^ *//' -e 's/ *\\$$//' \ 1231 | sed -e 's/^.*: *//' -e 's/ */ /g' \ [all …]
|
/openssl/test/recipes/30-test_evp_pkey_provided/ |
H A D | ED448.pub.txt | 4 6a:1d:a1:34:24:85:a7:0e:1f:8a:0e:a7:5d:80:e9:
|
/openssl/doc/man3/ |
H A D | X509_NAME_get_index_by_NID.pod | 92 X509_NAME_ENTRY *e; 95 e = X509_NAME_get_entry(nm, i); 96 /* Do something with e */ 102 X509_NAME_ENTRY *e; 108 e = X509_NAME_get_entry(nm, lastpos); 109 /* Do something with e */
|
H A D | RSA_get0_key.pod | 23 int RSA_set0_key(RSA *r, BIGNUM *n, BIGNUM *e, BIGNUM *d); 27 const BIGNUM **n, const BIGNUM **e, const BIGNUM **d); 60 B<n>, B<e>, B<d>, B<p>, B<q>, B<dmp1>, B<dmq1> and B<iqmp>. B<n> is 61 the modulus common to both public and private key, B<e> is the public 73 The B<n>, B<e> and B<d> parameters can be obtained by calling 74 RSA_get0_key(). If they have not been set yet, then B<*n>, B<*e> and 80 The B<n>, B<e> and B<d> parameter values can be set by calling 81 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 82 parameters to the function. The values B<n> and B<e> must be non-NULL 105 Any of the values B<n>, B<e>, B<d>, B<p>, B<q>, B<dmp1>, B<dmq1>, and B<iqmp> can also be [all …]
|
/openssl/test/recipes/25-test_rusext_data/ |
H A D | grfc.msb | 35 21:f5:4a:d6:2e:b1:3f:f5:50:e9:96:a0:a2:c9:79:09:15:a2: 36 41:c0:60:e1:1d:3f:25:8d:88:f4:4c:60:f3:0f:4e:e3:29:6e: 37 b8:6e:01:b4:03:2c:07:8f:27:37
|
/openssl/util/ |
H A D | check-format-test-negatives.c | 46 extern e; in f() 137 e; in g() 284 e; in f() 325 } e; typedef
|