HomeSort by: relevance | last modified time | path
    Searched defs:ek (Results 1 - 21 of 21) sorted by relevancy

  /src/external/bsd/wpa/dist/src/crypto/
des_i.h 13 u32 ek[3][32]; member in struct:des3_key_s
17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk);
18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
crypto_internal-cipher.c 35 u32 ek[32]; member in struct:crypto_cipher::__anon8300::__anon8304
91 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk);
151 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek,
des-internal.c 403 u32 ek[32], work[2]; local
414 deskey(pkey, 0, ek);
418 desfunc(work, ek);
423 os_memset(ek, 0, sizeof(ek));
428 void des_key_setup(const u8 *key, u32 *ek, u32 *dk)
430 deskey(key, 0, ek);
435 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt)
440 desfunc(work, ek);
459 deskey(key, 0, dkey->ek[0])
    [all...]
  /src/crypto/external/bsd/openssh/dist/
cipher-aesctr.h 28 u32 ek[4*(AES_MAXROUNDS + 1)]; /* encrypt key schedule */ member in struct:aesctr_ctx
  /src/crypto/external/cpl/trousers/dist/src/tspi/
tspi_ek.c 34 BYTE *ek; local
50 if ((result = obj_rsakey_get_blob(hKey, &ekSize, &ek)))
54 if ((result = UnloadBlob_TSS_KEY(&offset, ek, &dummyKey)))
58 Trspi_LoadBlob_KEY_PARMS(&offset, ek, &dummyKey.algorithmParms);
77 ek, &newEKSize, &newEK,
272 BYTE *ek; local
310 if ((result = obj_rsakey_get_blob(hKey, &ekSize, &ek)))
314 if ((result = UnloadBlob_TSS_KEY(&offset, ek, &dummyKey)))
318 Trspi_LoadBlob_KEY_PARMS(&offset, ek, &dummyKey.algorithmParms);
336 if ((result = RPC_CreateRevocableEndorsementKeyPair(tspContext, antiReplay, ekSize, ek,
    [all...]
  /src/crypto/external/bsd/heimdal/dist/kdc/
kdc_locl.h 70 EncKDCRepPart ek; member in struct:kdc_request_desc
krb5tgs.c 788 EncKDCRepPart ek; local
796 memset(&ek, 0, sizeof(ek));
866 ek.caddr = et.caddr;
982 ek.key = et.key;
984 ek.last_req.val = calloc(1, sizeof(*ek.last_req.val));
985 if (ek.last_req.val == NULL) {
989 ek.last_req.len = 1; /* set after alloc to avoid null deref on cleanup */
990 ek.nonce = b->nonce
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/crmf/
crmf_lib.c 615 unsigned char *ek = NULL; /* decrypted symmetric encryption key */ local
658 || (ek = OPENSSL_malloc(eksize)) == NULL)
660 retval = EVP_PKEY_decrypt(pkctx, ek, &eksize,
692 if (!EVP_DecryptInit(evp_ctx, cipher, ek, iv)
712 OPENSSL_clear_free(ek, eksize);
  /src/crypto/external/bsd/openssl.old/dist/crypto/cms/
cms_env.c 298 unsigned char *ek = NULL; local
333 ek = OPENSSL_malloc(eklen);
335 if (ek == NULL) {
340 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0)
343 ASN1_STRING_set0(ktri->encryptedKey, ek, eklen);
344 ek = NULL;
351 OPENSSL_free(ek);
363 unsigned char *ek = NULL; local
409 ek = OPENSSL_malloc(eklen);
411 if (ek == NULL)
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/aria/
aria.c 1109 ARIA_KEY ek; local
1110 const int r = ossl_aria_set_encrypt_key(userKey, bits, &ek);
1111 unsigned int i, rounds = ek.rounds;
1115 memcpy(&key->rd_key[0], &ek.rd_key[rounds], sizeof(key->rd_key[0]));
1117 a(&key->rd_key[i], &ek.rd_key[rounds - i]);
1118 memcpy(&key->rd_key[rounds], &ek.rd_key[0], sizeof(key->rd_key[rounds]));
  /src/crypto/external/apache2/openssl/dist/crypto/crmf/
crmf_lib.c 764 unsigned char *ek = NULL; /* decrypted symmetric encryption key */ local
809 || (ek = OPENSSL_malloc(eksize)) == NULL)
811 retval = EVP_PKEY_decrypt(pkctx, ek, &eksize, encKey->data, encKey->length);
837 if (!EVP_DecryptInit(evp_ctx, cipher, ek, iv)
852 OPENSSL_clear_free(ek, eksize);
930 OSSL_CRMF_ENCRYPTEDKEY *ek = OSSL_CRMF_ENCRYPTEDKEY_new(); local
932 if (ek == NULL)
934 ek->type = OSSL_CRMF_ENCRYPTEDKEY_ENVELOPEDDATA;
935 ek->value.envelopedData = envdata;
936 return ek;
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/aria/
aria.c 1198 ARIA_KEY ek; local
1199 const int r = ossl_aria_set_encrypt_key(userKey, bits, &ek);
1200 unsigned int i, rounds = ek.rounds;
1204 memcpy(&key->rd_key[0], &ek.rd_key[rounds], sizeof(key->rd_key[0]));
1206 a(&key->rd_key[i], &ek.rd_key[rounds - i]);
1207 memcpy(&key->rd_key[rounds], &ek.rd_key[0], sizeof(key->rd_key[rounds]));
  /src/crypto/external/bsd/openssl/dist/crypto/pkcs7/
pk7_doit.c 113 unsigned char *ek = NULL; local
133 ek = OPENSSL_malloc(eklen);
135 if (ek == NULL) {
140 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0)
143 ASN1_STRING_set0(ri->enc_key, ek, eklen);
144 ek = NULL;
150 OPENSSL_free(ek);
160 unsigned char *ek = NULL; local
177 ek = OPENSSL_malloc(eklen);
179 if (ek == NULL)
410 unsigned char *ek = NULL, *tkey = NULL; local
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/aria/
aria.c 1198 ARIA_KEY ek; local
1199 const int r = aria_set_encrypt_key(userKey, bits, &ek);
1200 unsigned int i, rounds = ek.rounds;
1204 memcpy(&key->rd_key[0], &ek.rd_key[rounds], sizeof(key->rd_key[0]));
1206 a(&key->rd_key[i], &ek.rd_key[rounds - i]);
1207 memcpy(&key->rd_key[rounds], &ek.rd_key[0], sizeof(key->rd_key[rounds]));
  /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs7/
pk7_doit.c 92 unsigned char *ek = NULL; local
117 ek = OPENSSL_malloc(eklen);
119 if (ek == NULL) {
124 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0)
127 ASN1_STRING_set0(ri->enc_key, ek, eklen);
128 ek = NULL;
134 OPENSSL_free(ek);
144 unsigned char *ek = NULL; local
166 ek = OPENSSL_malloc(eklen);
168 if (ek == NULL)
372 unsigned char *ek = NULL, *tkey = NULL; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/cmp/
cmp_msg.c 477 OSSL_CRMF_ENCRYPTEDKEY *ek = NULL; local
499 ek = OSSL_CRMF_ENCRYPTEDKEY_init_envdata(envData);
504 if (ek == NULL)
507 return ek;
  /src/crypto/external/apache2/openssl/dist/crypto/cms/
cms_env.c 511 unsigned char *ek = NULL; local
543 ek = OPENSSL_malloc(eklen);
544 if (ek == NULL)
547 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0)
550 ASN1_STRING_set0(ktri->encryptedKey, ek, eklen);
551 ek = NULL;
558 OPENSSL_free(ek);
569 unsigned char *ek = NULL; local
629 if (evp_pkey_decrypt_alloc(ktri->pctx, &ek, &eklen, fixlen,
638 ec->key = ek;
    [all...]
  /src/crypto/external/apache2/openssl/dist/crypto/pkcs7/
pk7_doit.c 150 unsigned char *ek = NULL; local
170 ek = OPENSSL_malloc(eklen);
171 if (ek == NULL)
174 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0)
177 ASN1_STRING_set0(ri->enc_key, ek, eklen);
178 ek = NULL;
184 OPENSSL_free(ek);
193 unsigned char *ek = NULL; local
213 ret = evp_pkey_decrypt_alloc(pctx, &ek, &eklen, fixlen,
221 *pek = ek;
452 unsigned char *ek = NULL, *tkey = NULL; local
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/cms/
cms_env.c 470 unsigned char *ek = NULL; local
502 ek = OPENSSL_malloc(eklen);
504 if (ek == NULL) {
509 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0)
512 ASN1_STRING_set0(ktri->encryptedKey, ek, eklen);
513 ek = NULL;
520 OPENSSL_free(ek);
531 unsigned char *ek = NULL; local
589 ek = OPENSSL_malloc(eklen);
590 if (ek == NULL)
    [all...]
  /src/external/bsd/tmux/dist/
input.c 1441 int i, n, m, ek, set, p; local
1507 ek = options_get_number(global_options, "extended-keys");
1508 if (ek == 0)
1513 else if (m == 1 || ek == 2)
  /src/external/bsd/wpa/dist/src/ap/
wpa_auth.c 2127 u8 ek[32]; local
2134 os_memcpy(ek, key->key_iv, 16);
2135 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len);
2137 rc4_skip(ek, 32, 256, key_data, key_data_len);

Completed in 51 milliseconds