/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | des_i.h | 19 u32 ek[3][32]; member in struct:des3_key_s 23 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 24 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
|
H A D | des-internal.c | 409 u32 ek[32], work[2]; local 420 deskey(pkey, 0, ek); 424 desfunc(work, ek); 429 os_memset(ek, 0, sizeof(ek)); 433 void des_key_setup(const u8 *key, u32 *ek, u32 *dk) argument 435 deskey(key, 0, ek); 440 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) argument 445 desfunc(work, ek); 464 deskey(key, 0, dkey->ek[ [all...] |
H A D | crypto_internal-cipher.c | 42 u32 ek[32]; member in struct:crypto_cipher::__anon4318::__anon4322 103 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk); 164 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek,
|
/freebsd-9.3-release/crypto/openssl/crypto/evp/ |
H A D | p_enc.c | 69 int EVP_PKEY_encrypt(unsigned char *ek, const unsigned char *key, int key_len, argument 82 RSA_public_encrypt(key_len, key, ek, pubk->pkey.rsa,
|
H A D | p_dec.c | 69 int EVP_PKEY_decrypt(unsigned char *key, const unsigned char *ek, int ekl, argument 83 RSA_private_decrypt(ekl, ek, key, priv->pkey.rsa, RSA_PKCS1_PADDING);
|
H A D | p_open.c | 70 const unsigned char *ek, int ekl, const unsigned char *iv, 98 i = EVP_PKEY_decrypt(key, ek, ekl, priv); 69 EVP_OpenInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, const unsigned char *ek, int ekl, const unsigned char *iv, EVP_PKEY *priv) argument
|
H A D | p_seal.c | 70 unsigned char **ek, int *ekl, unsigned char *iv, 92 ekl[i] = EVP_PKEY_encrypt(ek[i], key, EVP_CIPHER_CTX_key_length(ctx), 69 EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk) argument
|
H A D | evp.h | 620 const unsigned char *ek, int ekl, const unsigned char *iv, 625 unsigned char **ek, int *ekl, unsigned char *iv,
|
/freebsd-9.3-release/crypto/openssh/ |
H A D | rijndael.h | 43 u32 ek[4*(MAXNR + 1)]; /* encrypt key schedule */ member in struct:__anon4720
|
H A D | rijndael.c | 1223 ctx->Nr = rijndaelKeySetupEnc(ctx->ek, key, bits); 1229 memcpy(ctx->dk, ctx->ek, sizeof(ctx->dk)); 1243 rijndaelEncrypt(ctx->ek, ctx->Nr, src, dst);
|
/freebsd-9.3-release/sys/crypto/rijndael/ |
H A D | rijndael-api.c | 43 ctx->Nr = rijndaelKeySetupEnc(ctx->ek, key, bits); 58 rijndaelEncrypt(ctx->ek, ctx->Nr, src, dst);
|
H A D | rijndael.h | 40 uint32_t ek[4 * (RIJNDAEL_MAXNR + 1)]; /* encrypt key schedule */ member in struct:__anon6770
|
H A D | rijndael-api-fst.h | 48 u_int32_t ek[4*(RIJNDAEL_MAXNR + 1)]; /* CFB1 key schedule (encryption only) */ member in struct:__anon6768
|
H A D | rijndael-api-fst.c | 67 rijndaelKeySetupEnc(key->ek, cipherKey, keyLen); 161 rijndaelEncrypt(key->ek, key->Nr, block, 332 rijndaelEncrypt(key->ek, key->Nr, block,
|
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | kerberos5.c | 241 KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek, 291 ASN1_MALLOC_ENCODE(EncASRepPart, buf, buf_size, ek, &len, ret); 293 ASN1_MALLOC_ENCODE(EncTGSRepPart, buf, buf_size, ek, &len, ret); 961 EncKDCRepPart ek; local 1065 memset(&ek, 0, sizeof(ek)); 1552 copy_EncryptionKey(&et.key, &ek.key); 1563 ek.last_req.val = malloc(2 * sizeof(*ek.last_req.val)); 1564 if (ek 239 _kdc_encode_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek, krb5_enctype etype, int skvno, const EncryptionKey *skey, int ckvno, const EncryptionKey *ckey, const char **e_text, krb5_data *reply) argument [all...] |
H A D | krb5tgs.c | 677 EncKDCRepPart ek; local 684 memset(&ek, 0, sizeof(ek)); 744 ek.caddr = et.caddr; 840 ek.key = et.key; 842 ek.last_req.len = 1; 843 ek.last_req.val = calloc(1, sizeof(*ek.last_req.val)); 844 if (ek.last_req.val == NULL) { 848 ek [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/pem/ |
H A D | pem_seal.c | 71 unsigned char **ek, int *ekl, unsigned char *iv, 100 ret = EVP_SealInit(&ctx->cipher, type, ek, ekl, iv, pubk, npubk); 106 j = EVP_EncodeBlock((unsigned char *)s, ek[i], 109 memcpy(ek[i], s, j + 1); 70 PEM_SealInit(PEM_ENCODE_SEAL_CTX *ctx, EVP_CIPHER *type, EVP_MD *md_type, unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk) argument
|
/freebsd-9.3-release/crypto/openssl/crypto/idea/ |
H A D | idea.h | 90 void idea_set_decrypt_key(const IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk);
|
H A D | i_skey.c | 121 void idea_set_decrypt_key(const IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk) argument 128 fp = &(ek->data[8][0]);
|
/freebsd-9.3-release/crypto/openssl/crypto/cms/ |
H A D | cms_env.c | 292 unsigned char *ek = NULL; local 306 ek = OPENSSL_malloc(eklen); 308 if (ek == NULL) { 313 eklen = EVP_PKEY_encrypt(ek, ec->key, ec->keylen, ktri->pkey); 318 ASN1_STRING_set0(ktri->encryptedKey, ek, eklen); 319 ek = NULL; 324 if (ek) 325 OPENSSL_free(ek); 336 unsigned char *ek = NULL; local 349 ek [all...] |
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | s2_srvr.c | 373 unsigned int ek; local 468 ek = 8; 470 ek = 5; 485 * this portion is in |ek|. If the cipher is not an export cipher, 490 (is_export && s->s2->tmp.clear + ek != (unsigned int)EVP_CIPHER_key_length(c))) { 500 if ((is_export && s->s2->tmp.enc < ek) || 520 || (is_export && i != (int)ek))) { 523 i = ek; 536 || (is_export && ((i != ek) || (s->s2->tmp.clear + i !=
|
/freebsd-9.3-release/contrib/wpa/src/rsn_supp/ |
H A D | wpa.c | 1205 u8 ek[32]; local 1233 os_memcpy(ek, key->key_iv, 16); 1234 os_memcpy(ek + 16, sm->ptk.kek, 16); 1242 if (rc4_skip(ek, 32, 256, gd->gtk, keydatalen)) { 1433 u8 ek[32]; local 1434 os_memcpy(ek, key->key_iv, 16); 1435 os_memcpy(ek + 16, sm->ptk.kek, 16); 1436 if (rc4_skip(ek, 32, 256, (u8 *) (key + 1), keydatalen)) {
|
/freebsd-9.3-release/sys/dev/cesa/ |
H A D | cesa.c | 502 uint32_t ek[4 * (RIJNDAEL_MAXNR + 1)]; local 506 rijndaelKeySetupEnc(ek, cs->cs_key, cs->cs_klen * 8); 515 *dkey++ = htobe32(ek[4 * 10 + i]); 520 *dkey++ = htobe32(ek[4 * 12 + i]); 522 *dkey++ = htobe32(ek[4 * 11 + 2 + i]); 527 *dkey++ = htobe32(ek[4 * 14 + i]); 529 *dkey++ = htobe32(ek[4 * 13 + i]);
|
/freebsd-9.3-release/contrib/wpa/src/ap/ |
H A D | wpa_auth.c | 1162 u8 ek[32]; local 1166 os_memcpy(ek, key->key_iv, 16); 1167 os_memcpy(ek + 16, sm->PTK.kek, 16); 1169 rc4_skip(ek, 32, 256, (u8 *) (key + 1), key_data_len);
|
/freebsd-9.3-release/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 184 u32 ek[3][32]; member in struct:des3_key_s
|