| /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs12/ |
| p12_p8e.c | 48 ASN1_OCTET_STRING *enckey; local 50 enckey = 53 if (!enckey) { 62 ASN1_OCTET_STRING_free(enckey); 66 p8->digest = enckey;
|
| /src/crypto/external/apache2/openssl/dist/crypto/pkcs12/ |
| p12_p8e.c | 74 ASN1_OCTET_STRING *enckey; local 76 enckey = PKCS12_item_i2d_encrypt_ex(pbe, ASN1_ITEM_rptr(PKCS8_PRIV_KEY_INFO), 78 if (!enckey) { 86 ASN1_OCTET_STRING_free(enckey); 90 p8->digest = enckey;
|
| /src/crypto/external/bsd/openssl/dist/crypto/pkcs12/ |
| p12_p8e.c | 74 ASN1_OCTET_STRING *enckey; local 76 enckey = 79 if (!enckey) { 88 ASN1_OCTET_STRING_free(enckey); 92 p8->digest = enckey;
|
| /src/crypto/external/apache2/openssl/dist/crypto/aes/asm/ |
| aes-586.pl | 2644 sub enckey() subroutine 2722 &enckey (); 2762 &enckey (); 2816 &enckey ();
|
| aes-x86_64.pl | 1313 sub enckey() subroutine 1428 &enckey (); 1463 &enckey (); 1508 &enckey ();
|
| /src/crypto/external/apache2/openssl/dist/crypto/asn1/ |
| n_pkey.c | 37 X509_SIG *enckey; member in struct:netscape_encrypted_pkey_st 42 ASN1_SIMPLE(NETSCAPE_ENCRYPTED_PKEY, enckey, X509_SIG)
|
| /src/crypto/external/bsd/openssl/dist/crypto/asn1/ |
| n_pkey.c | 37 X509_SIG *enckey; member in struct:netscape_encrypted_pkey_st 43 ASN1_SIMPLE(NETSCAPE_ENCRYPTED_PKEY, enckey, X509_SIG)
|
| /src/sys/crypto/adiantum/ |
| adiantum_selftest.c | 48 AES_KEY enckey; member in struct:aesenc
|
| adiantum.c | 68 AES_KEY enckey; member in struct:aesenc 76 #define aes_setenckey256(E, K) AES_set_encrypt_key((K), 256, &(E)->enckey) 78 #define aes_enc(E, P, C, NR) AES_encrypt(P, C, &(E)->enckey)
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/cms/ |
| cms_kari.c | 233 unsigned char *enckey = NULL, *cek = NULL; local 238 enckey = rek->encryptedKey->data; 243 if (!cms_kek_cipher(&cek, &ceklen, enckey, enckeylen, ri->d.kari, 0)) 401 unsigned char *enckey; local 406 if (!cms_kek_cipher(&enckey, &enckeylen, ec->key, ec->keylen, 409 ASN1_STRING_set0(rek->encryptedKey, enckey, enckeylen);
|
| /src/crypto/external/apache2/openssl/dist/crypto/cms/ |
| cms_kari.c | 258 unsigned char *enckey = NULL, *cek = NULL; local 264 enckey = rek->encryptedKey->data; 269 if (!cms_kek_cipher(&cek, &ceklen, enckey, enckeylen, ri->d.kari, 0)) 520 unsigned char *enckey; local 525 if (!cms_kek_cipher(&enckey, &enckeylen, ec->key, ec->keylen, 528 ASN1_STRING_set0(rek->encryptedKey, enckey, enckeylen);
|
| /src/crypto/external/bsd/openssl/dist/crypto/cms/ |
| cms_kari.c | 258 unsigned char *enckey = NULL, *cek = NULL; local 264 enckey = rek->encryptedKey->data; 269 if (!cms_kek_cipher(&cek, &ceklen, enckey, enckeylen, ri->d.kari, 0)) 518 unsigned char *enckey; local 523 if (!cms_kek_cipher(&enckey, &enckeylen, ec->key, ec->keylen, 526 ASN1_STRING_set0(rek->encryptedKey, enckey, enckeylen);
|
| /src/lib/libresolv/ |
| dst_api.c | 476 char name[PATH_MAX], enckey[RAW_KEY_SIZE], *notspace; local 549 fgets(enckey, (int)sizeof(enckey), fp); 561 if ((len = strlen(enckey)) == 0) 565 enckey[--len] = '\0'; 568 for (notspace = (char *) enckey; isspace((*notspace)&0xff); len--)
|
| /src/external/bsd/libbind/dist/dst/ |
| dst_api.c | 469 char name[PATH_MAX], enckey[RAW_KEY_SIZE], *notspace; local 542 fgets(enckey, sizeof(enckey), fp); 554 if ((len = strlen(enckey)) <= 0) 558 enckey[--len] = '\0'; 561 for (notspace = (char *) enckey; isspace((*notspace)&0xff); len--)
|
| /src/external/bsd/tcpdump/dist/ |
| print-esp.c | 528 char *enckey; local 534 enckey = strsep(&line, " \t"); 537 if(!init || !icookie || !rcookie || !authkey || !enckey) { 569 if(!espprint_decode_encalgo(ndo, enckey, &sa1)) return;
|
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| packet.h | 993 pgp_pubkey_t enckey; /* encryption key */ member in struct:pgp_key_t
|