| /src/external/bsd/wpa/dist/src/crypto/ |
| des_i.h | 13 u32 ek[3][32]; member in struct:des3_key_s 17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
|
| crypto_internal-cipher.c | 35 u32 ek[32]; member in struct:crypto_cipher::__anon8300::__anon8304 91 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk); 151 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek,
|
| des-internal.c | 403 u32 ek[32], work[2]; local 414 deskey(pkey, 0, ek); 418 desfunc(work, ek); 423 os_memset(ek, 0, sizeof(ek)); 428 void des_key_setup(const u8 *key, u32 *ek, u32 *dk) 430 deskey(key, 0, ek); 435 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) 440 desfunc(work, ek); 459 deskey(key, 0, dkey->ek[0]) [all...] |
| /src/crypto/external/bsd/openssh/dist/ |
| cipher-aesctr.h | 28 u32 ek[4*(AES_MAXROUNDS + 1)]; /* encrypt key schedule */ member in struct:aesctr_ctx
|
| /src/crypto/external/cpl/trousers/dist/src/tspi/ |
| tspi_ek.c | 34 BYTE *ek; local 50 if ((result = obj_rsakey_get_blob(hKey, &ekSize, &ek))) 54 if ((result = UnloadBlob_TSS_KEY(&offset, ek, &dummyKey))) 58 Trspi_LoadBlob_KEY_PARMS(&offset, ek, &dummyKey.algorithmParms); 77 ek, &newEKSize, &newEK, 272 BYTE *ek; local 310 if ((result = obj_rsakey_get_blob(hKey, &ekSize, &ek))) 314 if ((result = UnloadBlob_TSS_KEY(&offset, ek, &dummyKey))) 318 Trspi_LoadBlob_KEY_PARMS(&offset, ek, &dummyKey.algorithmParms); 336 if ((result = RPC_CreateRevocableEndorsementKeyPair(tspContext, antiReplay, ekSize, ek, [all...] |
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| kdc_locl.h | 70 EncKDCRepPart ek; member in struct:kdc_request_desc
|
| krb5tgs.c | 788 EncKDCRepPart ek; local 796 memset(&ek, 0, sizeof(ek)); 866 ek.caddr = et.caddr; 982 ek.key = et.key; 984 ek.last_req.val = calloc(1, sizeof(*ek.last_req.val)); 985 if (ek.last_req.val == NULL) { 989 ek.last_req.len = 1; /* set after alloc to avoid null deref on cleanup */ 990 ek.nonce = b->nonce [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/crmf/ |
| crmf_lib.c | 615 unsigned char *ek = NULL; /* decrypted symmetric encryption key */ local 658 || (ek = OPENSSL_malloc(eksize)) == NULL) 660 retval = EVP_PKEY_decrypt(pkctx, ek, &eksize, 692 if (!EVP_DecryptInit(evp_ctx, cipher, ek, iv) 712 OPENSSL_clear_free(ek, eksize);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/cms/ |
| cms_env.c | 298 unsigned char *ek = NULL; local 333 ek = OPENSSL_malloc(eklen); 335 if (ek == NULL) { 340 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0) 343 ASN1_STRING_set0(ktri->encryptedKey, ek, eklen); 344 ek = NULL; 351 OPENSSL_free(ek); 363 unsigned char *ek = NULL; local 409 ek = OPENSSL_malloc(eklen); 411 if (ek == NULL) [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/aria/ |
| aria.c | 1109 ARIA_KEY ek; local 1110 const int r = ossl_aria_set_encrypt_key(userKey, bits, &ek); 1111 unsigned int i, rounds = ek.rounds; 1115 memcpy(&key->rd_key[0], &ek.rd_key[rounds], sizeof(key->rd_key[0])); 1117 a(&key->rd_key[i], &ek.rd_key[rounds - i]); 1118 memcpy(&key->rd_key[rounds], &ek.rd_key[0], sizeof(key->rd_key[rounds]));
|
| /src/crypto/external/apache2/openssl/dist/crypto/crmf/ |
| crmf_lib.c | 764 unsigned char *ek = NULL; /* decrypted symmetric encryption key */ local 809 || (ek = OPENSSL_malloc(eksize)) == NULL) 811 retval = EVP_PKEY_decrypt(pkctx, ek, &eksize, encKey->data, encKey->length); 837 if (!EVP_DecryptInit(evp_ctx, cipher, ek, iv) 852 OPENSSL_clear_free(ek, eksize); 930 OSSL_CRMF_ENCRYPTEDKEY *ek = OSSL_CRMF_ENCRYPTEDKEY_new(); local 932 if (ek == NULL) 934 ek->type = OSSL_CRMF_ENCRYPTEDKEY_ENVELOPEDDATA; 935 ek->value.envelopedData = envdata; 936 return ek; [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/aria/ |
| aria.c | 1198 ARIA_KEY ek; local 1199 const int r = ossl_aria_set_encrypt_key(userKey, bits, &ek); 1200 unsigned int i, rounds = ek.rounds; 1204 memcpy(&key->rd_key[0], &ek.rd_key[rounds], sizeof(key->rd_key[0])); 1206 a(&key->rd_key[i], &ek.rd_key[rounds - i]); 1207 memcpy(&key->rd_key[rounds], &ek.rd_key[0], sizeof(key->rd_key[rounds]));
|
| /src/crypto/external/bsd/openssl/dist/crypto/pkcs7/ |
| pk7_doit.c | 113 unsigned char *ek = NULL; local 133 ek = OPENSSL_malloc(eklen); 135 if (ek == NULL) { 140 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) 143 ASN1_STRING_set0(ri->enc_key, ek, eklen); 144 ek = NULL; 150 OPENSSL_free(ek); 160 unsigned char *ek = NULL; local 177 ek = OPENSSL_malloc(eklen); 179 if (ek == NULL) 410 unsigned char *ek = NULL, *tkey = NULL; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/aria/ |
| aria.c | 1198 ARIA_KEY ek; local 1199 const int r = aria_set_encrypt_key(userKey, bits, &ek); 1200 unsigned int i, rounds = ek.rounds; 1204 memcpy(&key->rd_key[0], &ek.rd_key[rounds], sizeof(key->rd_key[0])); 1206 a(&key->rd_key[i], &ek.rd_key[rounds - i]); 1207 memcpy(&key->rd_key[rounds], &ek.rd_key[0], sizeof(key->rd_key[rounds]));
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs7/ |
| pk7_doit.c | 92 unsigned char *ek = NULL; local 117 ek = OPENSSL_malloc(eklen); 119 if (ek == NULL) { 124 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) 127 ASN1_STRING_set0(ri->enc_key, ek, eklen); 128 ek = NULL; 134 OPENSSL_free(ek); 144 unsigned char *ek = NULL; local 166 ek = OPENSSL_malloc(eklen); 168 if (ek == NULL) 372 unsigned char *ek = NULL, *tkey = NULL; local [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/cmp/ |
| cmp_msg.c | 477 OSSL_CRMF_ENCRYPTEDKEY *ek = NULL; local 499 ek = OSSL_CRMF_ENCRYPTEDKEY_init_envdata(envData); 504 if (ek == NULL) 507 return ek;
|
| /src/crypto/external/apache2/openssl/dist/crypto/cms/ |
| cms_env.c | 511 unsigned char *ek = NULL; local 543 ek = OPENSSL_malloc(eklen); 544 if (ek == NULL) 547 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0) 550 ASN1_STRING_set0(ktri->encryptedKey, ek, eklen); 551 ek = NULL; 558 OPENSSL_free(ek); 569 unsigned char *ek = NULL; local 629 if (evp_pkey_decrypt_alloc(ktri->pctx, &ek, &eklen, fixlen, 638 ec->key = ek; [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/pkcs7/ |
| pk7_doit.c | 150 unsigned char *ek = NULL; local 170 ek = OPENSSL_malloc(eklen); 171 if (ek == NULL) 174 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) 177 ASN1_STRING_set0(ri->enc_key, ek, eklen); 178 ek = NULL; 184 OPENSSL_free(ek); 193 unsigned char *ek = NULL; local 213 ret = evp_pkey_decrypt_alloc(pctx, &ek, &eklen, fixlen, 221 *pek = ek; 452 unsigned char *ek = NULL, *tkey = NULL; local [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/cms/ |
| cms_env.c | 470 unsigned char *ek = NULL; local 502 ek = OPENSSL_malloc(eklen); 504 if (ek == NULL) { 509 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0) 512 ASN1_STRING_set0(ktri->encryptedKey, ek, eklen); 513 ek = NULL; 520 OPENSSL_free(ek); 531 unsigned char *ek = NULL; local 589 ek = OPENSSL_malloc(eklen); 590 if (ek == NULL) [all...] |
| /src/external/bsd/tmux/dist/ |
| input.c | 1441 int i, n, m, ek, set, p; local 1507 ek = options_get_number(global_options, "extended-keys"); 1508 if (ek == 0) 1513 else if (m == 1 || ek == 2)
|
| /src/external/bsd/wpa/dist/src/ap/ |
| wpa_auth.c | 2127 u8 ek[32]; local 2134 os_memcpy(ek, key->key_iv, 16); 2135 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len); 2137 rc4_skip(ek, 32, 256, key_data, key_data_len);
|