HomeSort by: relevance | last modified time | path
    Searched defs:kek (Results 1 - 13 of 13) sorted by relevancy

  /src/crypto/external/bsd/openssl.old/dist/crypto/cms/
cms_kari.c 182 * Derive KEK and decrypt/encrypt with it to produce either the original CEK
191 unsigned char kek[EVP_MAX_KEY_LENGTH]; local
199 /* Derive KEK */
200 if (EVP_PKEY_derive(kari->pctx, kek, &keklen) <= 0)
202 /* Set KEK in context */
203 if (!EVP_CipherInit_ex(kari->ctx, NULL, NULL, kek, NULL, enc))
218 OPENSSL_cleanse(kek, keklen);
239 /* Setup all parameters to derive KEK */
399 /* For each rek, derive KEK, encrypt CEK */
  /src/crypto/external/apache2/openssl/dist/crypto/cms/
cms_kari.c 206 * Derive KEK and decrypt/encrypt with it to produce either the original CEK
215 unsigned char kek[EVP_MAX_KEY_LENGTH]; local
224 /* Derive KEK */
225 if (EVP_PKEY_derive(kari->pctx, kek, &keklen) <= 0)
227 /* Set KEK in context */
228 if (!EVP_CipherInit_ex(kari->ctx, NULL, NULL, kek, NULL, enc))
243 OPENSSL_cleanse(kek, keklen);
265 /* Setup all parameters to derive KEK */
518 /* For each rek, derive KEK, encrypt CEK */
  /src/crypto/external/bsd/openssl/dist/crypto/cms/
cms_kari.c 206 * Derive KEK and decrypt/encrypt with it to produce either the original CEK
215 unsigned char kek[EVP_MAX_KEY_LENGTH]; local
224 /* Derive KEK */
225 if (EVP_PKEY_derive(kari->pctx, kek, &keklen) <= 0)
227 /* Set KEK in context */
228 if (!EVP_CipherInit_ex(kari->ctx, NULL, NULL, kek, NULL, enc))
243 OPENSSL_cleanse(kek, keklen);
265 /* Setup all parameters to derive KEK */
516 /* For each rek, derive KEK, encrypt CEK */
  /src/external/bsd/wpa/dist/src/common/
common_module_tests.c 712 const u8 kek[] = { local
744 if (ptk.kek_len != sizeof(kek) ||
745 os_memcmp(kek, ptk.kek, sizeof(kek)) != 0) {
746 wpa_printf(MSG_ERROR, "KDK no PASN auth: Mismatched KEK");
dpp_backup.c 269 u8 kek[DPP_MAX_HASH_LEN]; local
288 kek, hash_len)) {
293 kek, hash_len);
297 aes_siv_encrypt(kek, hash_len, wpabuf_head(cont_enc_key),
342 forced_memzero(kek, sizeof(kek));
1137 u8 kek[DPP_MAX_HASH_LEN]; local
1160 kek, data.pbkdf2_key_len)) {
1165 kek, data.pbkdf2_key_len);
1172 res = aes_siv_decrypt(kek, data.pbkdf2_key_len
    [all...]
sae.h 69 u8 kek[SAE_MAX_HASH_LEN]; member in struct:sae_temporary_data
wpa_common.h 260 u8 kek[WPA_KEK_MAX_LEN]; /* EAPOL-Key Key Encryption Key (KEK) */ member in struct:wpa_ptk
  /src/external/bsd/wpa/dist/src/rsn_supp/
wpa_ft.c 806 const u8 *kek; local
810 kek = sm->ptk.kek2;
813 kek = sm->ptk.kek;
832 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) {
889 const u8 *kek; local
893 kek = sm->ptk.kek2;
896 kek = sm->ptk.kek;
926 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk))
959 const u8 *kek; local
    [all...]
  /src/external/bsd/wpa/dist/src/pae/
ieee802_1x_kay_i.h 75 u8 *kek, size_t kek_bytes);
108 struct mka_key kek; member in struct:ieee802_1x_mka_participant
  /src/crypto/external/bsd/openssl.old/dist/test/
evp_extra_test.c 962 unsigned char *kek = NULL; local
970 || !TEST_ptr(kek = OPENSSL_zalloc(EVP_PKEY_size(keypair)))
972 || !TEST_true(EVP_SealInit(ctx, type, &kek, &kek_len, iv,
982 if (!TEST_true(EVP_OpenInit(ctx, type, kek, kek_len, iv, keypair))
994 OPENSSL_free(kek);
  /src/crypto/external/bsd/openssl/dist/test/
evp_extra_test.c 1295 unsigned char *kek = NULL; local
1312 || !TEST_ptr(kek = OPENSSL_zalloc(EVP_PKEY_get_size(keypair)))
1314 || !TEST_true(EVP_SealInit(ctx, type, &kek, &kek_len, iv,
1324 if (!TEST_true(EVP_OpenInit(ctx, type, kek, kek_len, iv, keypair))
1338 OPENSSL_free(kek);
  /src/external/bsd/wpa/dist/src/ap/
wpa_auth_ft.c 2224 const u8 *kek; local
2228 kek = sm->PTK.kek2;
2231 kek = sm->PTK.kek;
2290 if (aes_wrap(kek, kek_len, key_len / 8, key, subelem + 13)) {
2311 const u8 *kek, *igtk; local
2317 kek = sm->PTK.kek2;
2320 kek = sm->PTK.kek;
2353 if (aes_wrap(kek, kek_len, igtk_len / 8, igtk, pos))
2372 const u8 *kek, *bigtk; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
evp_extra_test.c 1792 unsigned char *kek = NULL; local
1809 || !TEST_ptr(kek = OPENSSL_zalloc(EVP_PKEY_get_size(keypair)))
1811 || !TEST_true(EVP_SealInit(ctx, type, &kek, &kek_len, iv,
1821 if (!TEST_true(EVP_OpenInit(ctx, type, kek, kek_len, iv, keypair))
1835 OPENSSL_free(kek);

Completed in 68 milliseconds