| /src/crypto/external/bsd/openssl.old/dist/crypto/cms/ |
| cms_kari.c | 182 * Derive KEK and decrypt/encrypt with it to produce either the original CEK 191 unsigned char kek[EVP_MAX_KEY_LENGTH]; local 199 /* Derive KEK */ 200 if (EVP_PKEY_derive(kari->pctx, kek, &keklen) <= 0) 202 /* Set KEK in context */ 203 if (!EVP_CipherInit_ex(kari->ctx, NULL, NULL, kek, NULL, enc)) 218 OPENSSL_cleanse(kek, keklen); 239 /* Setup all parameters to derive KEK */ 399 /* For each rek, derive KEK, encrypt CEK */
|
| /src/crypto/external/apache2/openssl/dist/crypto/cms/ |
| cms_kari.c | 206 * Derive KEK and decrypt/encrypt with it to produce either the original CEK 215 unsigned char kek[EVP_MAX_KEY_LENGTH]; local 224 /* Derive KEK */ 225 if (EVP_PKEY_derive(kari->pctx, kek, &keklen) <= 0) 227 /* Set KEK in context */ 228 if (!EVP_CipherInit_ex(kari->ctx, NULL, NULL, kek, NULL, enc)) 243 OPENSSL_cleanse(kek, keklen); 265 /* Setup all parameters to derive KEK */ 518 /* For each rek, derive KEK, encrypt CEK */
|
| /src/crypto/external/bsd/openssl/dist/crypto/cms/ |
| cms_kari.c | 206 * Derive KEK and decrypt/encrypt with it to produce either the original CEK 215 unsigned char kek[EVP_MAX_KEY_LENGTH]; local 224 /* Derive KEK */ 225 if (EVP_PKEY_derive(kari->pctx, kek, &keklen) <= 0) 227 /* Set KEK in context */ 228 if (!EVP_CipherInit_ex(kari->ctx, NULL, NULL, kek, NULL, enc)) 243 OPENSSL_cleanse(kek, keklen); 265 /* Setup all parameters to derive KEK */ 516 /* For each rek, derive KEK, encrypt CEK */
|
| /src/external/bsd/wpa/dist/src/common/ |
| common_module_tests.c | 712 const u8 kek[] = { local 744 if (ptk.kek_len != sizeof(kek) || 745 os_memcmp(kek, ptk.kek, sizeof(kek)) != 0) { 746 wpa_printf(MSG_ERROR, "KDK no PASN auth: Mismatched KEK");
|
| dpp_backup.c | 269 u8 kek[DPP_MAX_HASH_LEN]; local 288 kek, hash_len)) { 293 kek, hash_len); 297 aes_siv_encrypt(kek, hash_len, wpabuf_head(cont_enc_key), 342 forced_memzero(kek, sizeof(kek)); 1137 u8 kek[DPP_MAX_HASH_LEN]; local 1160 kek, data.pbkdf2_key_len)) { 1165 kek, data.pbkdf2_key_len); 1172 res = aes_siv_decrypt(kek, data.pbkdf2_key_len [all...] |
| sae.h | 69 u8 kek[SAE_MAX_HASH_LEN]; member in struct:sae_temporary_data
|
| wpa_common.h | 260 u8 kek[WPA_KEK_MAX_LEN]; /* EAPOL-Key Key Encryption Key (KEK) */ member in struct:wpa_ptk
|
| /src/external/bsd/wpa/dist/src/rsn_supp/ |
| wpa_ft.c | 806 const u8 *kek; local 810 kek = sm->ptk.kek2; 813 kek = sm->ptk.kek; 832 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { 889 const u8 *kek; local 893 kek = sm->ptk.kek2; 896 kek = sm->ptk.kek; 926 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) 959 const u8 *kek; local [all...] |
| /src/external/bsd/wpa/dist/src/pae/ |
| ieee802_1x_kay_i.h | 75 u8 *kek, size_t kek_bytes); 108 struct mka_key kek; member in struct:ieee802_1x_mka_participant
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| evp_extra_test.c | 962 unsigned char *kek = NULL; local 970 || !TEST_ptr(kek = OPENSSL_zalloc(EVP_PKEY_size(keypair))) 972 || !TEST_true(EVP_SealInit(ctx, type, &kek, &kek_len, iv, 982 if (!TEST_true(EVP_OpenInit(ctx, type, kek, kek_len, iv, keypair)) 994 OPENSSL_free(kek);
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| evp_extra_test.c | 1295 unsigned char *kek = NULL; local 1312 || !TEST_ptr(kek = OPENSSL_zalloc(EVP_PKEY_get_size(keypair))) 1314 || !TEST_true(EVP_SealInit(ctx, type, &kek, &kek_len, iv, 1324 if (!TEST_true(EVP_OpenInit(ctx, type, kek, kek_len, iv, keypair)) 1338 OPENSSL_free(kek);
|
| /src/external/bsd/wpa/dist/src/ap/ |
| wpa_auth_ft.c | 2224 const u8 *kek; local 2228 kek = sm->PTK.kek2; 2231 kek = sm->PTK.kek; 2290 if (aes_wrap(kek, kek_len, key_len / 8, key, subelem + 13)) { 2311 const u8 *kek, *igtk; local 2317 kek = sm->PTK.kek2; 2320 kek = sm->PTK.kek; 2353 if (aes_wrap(kek, kek_len, igtk_len / 8, igtk, pos)) 2372 const u8 *kek, *bigtk; local [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| evp_extra_test.c | 1792 unsigned char *kek = NULL; local 1809 || !TEST_ptr(kek = OPENSSL_zalloc(EVP_PKEY_get_size(keypair))) 1811 || !TEST_true(EVP_SealInit(ctx, type, &kek, &kek_len, iv, 1821 if (!TEST_true(EVP_OpenInit(ctx, type, kek, kek_len, iv, keypair)) 1835 OPENSSL_free(kek);
|