| /src/external/bsd/ekermit/dist/ |
| makefile | 8 EK = makewhat 9 ALL = $(EK) 13 ek: $(OBJS) 14 $(CC) $(CFLAGS) -o ek $(OBJS) 28 make ek 32 @UNAME=`uname` ; make "CC=gcc" "CC2=gcc" "CFLAGS=-D$$UNAME -O2" ek 36 make "CC=gcc" "CC2=gcc" "CFLAGS=-DNODEBUG -O2" ek 41 "CFLAGS=-DMINSIZE -DOBUFLEN=256 -DFN_MAX=16 -O2" ek 46 "CFLAGS=-DMINSIZE -DOBUFLEN=256 -DFN_MAX=16 -DRECVONLY -O2" ek 51 "CFLAGS=-DMINSIZE -DOBUFLEN=256 -DFN_MAX=16 -DRECVONLY -DDEBUG -O2" ek [all...] |
| /src/external/bsd/wpa/dist/src/crypto/ |
| des_i.h | 13 u32 ek[3][32]; member in struct:des3_key_s 17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
|
| des-internal.c | 403 u32 ek[32], work[2]; local 414 deskey(pkey, 0, ek); 418 desfunc(work, ek); 423 os_memset(ek, 0, sizeof(ek)); 428 void des_key_setup(const u8 *key, u32 *ek, u32 *dk) 430 deskey(key, 0, ek); 435 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) 440 desfunc(work, ek); 459 deskey(key, 0, dkey->ek[0]) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
| p_dec.c | 17 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, 31 RSA_private_decrypt(ekl, ek, key, EVP_PKEY_get0_RSA(priv),
|
| p_enc.c | 17 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, 30 RSA_public_encrypt(key_len, key, ek, EVP_PKEY_get0_RSA(pubk),
|
| p_open.c | 22 const unsigned char *ek, int ekl, const unsigned char *iv, 50 i = EVP_PKEY_decrypt_old(key, ek, ekl, priv);
|
| p_seal.c | 19 unsigned char **ek, int *ekl, unsigned char *iv, 45 EVP_PKEY_encrypt_old(ek[i], key, EVP_CIPHER_CTX_key_length(ctx),
|
| /src/crypto/external/apache2/openssl/dist/crypto/evp/ |
| p_dec.c | 21 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, 36 ret = RSA_private_decrypt(ekl, ek, key, rsa, RSA_PKCS1_PADDING);
|
| p_enc.c | 21 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, 36 ret = RSA_public_encrypt(key_len, key, ek, rsa, RSA_PKCS1_PADDING);
|
| p_open.c | 19 const unsigned char *ek, int ekl, const unsigned char *iv, 42 || EVP_PKEY_decrypt(pctx, NULL, &keylen, ek, ekl) <= 0) 48 if (EVP_PKEY_decrypt(pctx, key, &keylen, ek, ekl) <= 0)
|
| p_seal.c | 20 unsigned char **ek, int *ekl, unsigned char *iv, 67 || EVP_PKEY_encrypt(pctx, ek[i], &outlen, key, keylen) <= 0)
|
| /src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| p_dec.c | 21 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, 37 RSA_private_decrypt(ekl, ek, key, rsa, RSA_PKCS1_PADDING);
|
| p_enc.c | 21 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, 37 RSA_public_encrypt(key_len, key, ek, rsa, RSA_PKCS1_PADDING);
|
| p_open.c | 19 const unsigned char *ek, int ekl, const unsigned char *iv, 42 || EVP_PKEY_decrypt(pctx, NULL, &keylen, ek, ekl) <= 0) 50 if (EVP_PKEY_decrypt(pctx, key, &keylen, ek, ekl) <= 0)
|
| p_seal.c | 21 unsigned char **ek, int *ekl, unsigned char *iv, 67 || EVP_PKEY_encrypt(pctx, ek[i], &keylen, key, keylen) <= 0)
|
| /src/crypto/external/bsd/openssh/dist/ |
| cipher-aesctr.h | 28 u32 ek[4*(AES_MAXROUNDS + 1)]; /* encrypt key schedule */ member in struct:aesctr_ctx
|
| cipher-aesctr.c | 59 x->rounds = rijndaelKeySetupEnc(x->ek, k, kbits); 76 rijndaelEncrypt(x->ek, x->rounds, x->ctr, buf);
|
| /src/crypto/external/bsd/openssl.old/dist/include/openssl/ |
| idea.h | 36 void IDEA_set_decrypt_key(IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs7/ |
| pk7_doit.c | 92 unsigned char *ek = NULL; local 117 ek = OPENSSL_malloc(eklen); 119 if (ek == NULL) { 124 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) 127 ASN1_STRING_set0(ri->enc_key, ek, eklen); 128 ek = NULL; 134 OPENSSL_free(ek); 144 unsigned char *ek = NULL; local 166 ek = OPENSSL_malloc(eklen); 168 if (ek == NULL) 372 unsigned char *ek = NULL, *tkey = NULL; local [all...] |
| /src/crypto/external/cpl/trousers/dist/src/tspi/ |
| tspi_ek.c | 34 BYTE *ek; local 50 if ((result = obj_rsakey_get_blob(hKey, &ekSize, &ek))) 54 if ((result = UnloadBlob_TSS_KEY(&offset, ek, &dummyKey))) 58 Trspi_LoadBlob_KEY_PARMS(&offset, ek, &dummyKey.algorithmParms); 77 ek, &newEKSize, &newEK, 272 BYTE *ek; local 310 if ((result = obj_rsakey_get_blob(hKey, &ekSize, &ek))) 314 if ((result = UnloadBlob_TSS_KEY(&offset, ek, &dummyKey))) 318 Trspi_LoadBlob_KEY_PARMS(&offset, ek, &dummyKey.algorithmParms); 336 if ((result = RPC_CreateRevocableEndorsementKeyPair(tspContext, antiReplay, ekSize, ek, [all...] |
| /src/crypto/external/bsd/heimdal/dist/kdc/ |
| kerberos5.c | 855 KDC_REP *rep, EncTicketPart *et, EncKDCRepPart *ek, 968 ASN1_MALLOC_ENCODE(EncASRepPart, buf, buf_size, ek, &len, ret); 970 ASN1_MALLOC_ENCODE(EncTGSRepPart, buf, buf_size, ek, &len, ret); 1651 if (r->ek.encrypted_pa_data == NULL) { 1652 ALLOC(r->ek.encrypted_pa_data); 1653 if (r->ek.encrypted_pa_data == NULL) 1656 ret = krb5_padata_add(r->context, r->ek.encrypted_pa_data, 1661 return krb5_padata_add(r->context, r->ek.encrypted_pa_data, 2125 r->ek.last_req.val = malloc(2 * sizeof(*r->ek.last_req.val)) [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/pkcs7/ |
| pk7_doit.c | 113 unsigned char *ek = NULL; local 133 ek = OPENSSL_malloc(eklen); 135 if (ek == NULL) { 140 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) 143 ASN1_STRING_set0(ri->enc_key, ek, eklen); 144 ek = NULL; 150 OPENSSL_free(ek); 160 unsigned char *ek = NULL; local 177 ek = OPENSSL_malloc(eklen); 179 if (ek == NULL) 410 unsigned char *ek = NULL, *tkey = NULL; local [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/idea/ |
| i_skey.c | 61 void IDEA_set_decrypt_key(IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk) 67 fp = &(ek->data[8][0]);
|
| /src/crypto/external/bsd/openssl/dist/crypto/idea/ |
| i_skey.c | 62 void IDEA_set_decrypt_key(IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk) 68 fp = &(ek->data[8][0]);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/idea/ |
| i_skey.c | 55 void IDEA_set_decrypt_key(IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk) 61 fp = &(ek->data[8][0]);
|