/macosx-10.10/OpenSSL098-52/src/crypto/evp/ |
H A D | p_dec.c | 69 int EVP_PKEY_decrypt(unsigned char *key, const unsigned char *ek, int ekl, argument 83 ret=RSA_private_decrypt(ekl,ek,key,priv->pkey.rsa,RSA_PKCS1_PADDING);
|
H A D | p_enc.c | 69 int EVP_PKEY_encrypt(unsigned char *ek, const unsigned char *key, int key_len, argument 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
|
H A D | p_open.c | 70 const unsigned char *ek, int ekl, const unsigned char *iv, 98 i=EVP_PKEY_decrypt(key,ek,ekl,priv); 69 EVP_OpenInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, const unsigned char *ek, int ekl, const unsigned char *iv, EVP_PKEY *priv) argument
|
H A D | p_seal.c | 69 int EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek, argument 90 ekl[i]=EVP_PKEY_encrypt(ek[i],key,EVP_CIPHER_CTX_key_length(ctx),
|
H A D | evp.h | 612 const unsigned char *ek, int ekl, const unsigned char *iv, 617 unsigned char **ek, int *ekl, unsigned char *iv,
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | rijndael.h | 43 u32 ek[4*(MAXNR + 1)]; /* encrypt key schedule */ member in struct:__anon3211
|
H A D | rijndael.c | 1223 ctx->Nr = rijndaelKeySetupEnc(ctx->ek, key, bits); 1229 memcpy(ctx->dk, ctx->ek, sizeof(ctx->dk)); 1243 rijndaelEncrypt(ctx->ek, ctx->Nr, src, dst);
|
/macosx-10.10/BerkeleyDB-21/db/crypto/rijndael/ |
H A D | rijndael-api-fst.h | 82 u32 ek[4*(MAXNR + 1)]; /* CFB1 key schedule (encryption only) */ member in struct:__anon274
|
H A D | rijndael-api-fst.c | 84 __db_rijndaelKeySetupEnc(key->ek, cipherKey, keyLen); 168 __db_rijndaelEncrypt(key->ek, key->Nr, iv, block); 328 __db_rijndaelEncrypt(key->ek, key->Nr, iv, block);
|
/macosx-10.10/ksh-23/ksh/lib/package/ |
H A D | ast.def | 19 [ek]="Lefty Koutsofios <ek@research.att.com>"
|
/macosx-10.10/OpenSSL098-52/src/crypto/pem/ |
H A D | pem_seal.c | 71 unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, 102 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk); 108 j=EVP_EncodeBlock((unsigned char *)s,ek[i], 111 memcpy(ek[i],s,j+1); 70 PEM_SealInit(PEM_ENCODE_SEAL_CTX *ctx, EVP_CIPHER *type, EVP_MD *md_type, unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk) argument
|
H A D | pem.h | 620 EVP_MD *md_type, unsigned char **ek, int *ekl,
|
/macosx-10.10/OpenSSL098-52/src/crypto/cms/ |
H A D | cms_env.c | 306 unsigned char *ek = NULL; local 322 ek = OPENSSL_malloc(eklen); 324 if (ek == NULL) 331 eklen = EVP_PKEY_encrypt(ek, ec->key, ec->keylen, ktri->pkey); 336 ASN1_STRING_set0(ktri->encryptedKey, ek, eklen); 337 ek = NULL; 342 if (ek) 343 OPENSSL_free(ek); 354 unsigned char *ek = NULL; local 369 ek [all...] |
/macosx-10.10/Heimdal-398.1.2/kdc/ |
H A D | kerberos5.c | 1166 KDC_REP *rep, EncTicketPart *et, EncKDCRepPart *ek, 1278 ASN1_MALLOC_ENCODE(EncASRepPart, buf, buf_size, ek, &len, ret); 1280 ASN1_MALLOC_ENCODE(EncTGSRepPart, buf, buf_size, ek, &len, ret); 1807 if (r->ek.encrypted_pa_data == NULL) { 1808 ALLOC(r->ek.encrypted_pa_data); 1809 if (r->ek.encrypted_pa_data == NULL) 1812 ret = krb5_padata_add(r->context, r->ek.encrypted_pa_data, 1817 return krb5_padata_add(r->context, r->ek.encrypted_pa_data, 2369 r->ek.last_req.val = malloc(2 * sizeof(*r->ek 1162 _kdc_encode_reply(krb5_context context, krb5_kdc_configuration *config, kdc_request_t r, uint32_t nonce, KDC_REP *rep, EncTicketPart *et, EncKDCRepPart *ek, krb5_enctype etype, int skvno, const EncryptionKey *skey, int ckvno, int rk_is_subkey, const char **e_text, krb5_data *reply) argument [all...] |
H A D | kdc_locl.h | 68 EncKDCRepPart ek; member in struct:kdc_request_desc
|
H A D | krb5tgs.c | 747 EncKDCRepPart ek; local 755 memset(&ek, 0, sizeof(ek)); 810 ek.caddr = et.caddr; 917 ek.key = et.key; 919 ek.last_req.len = 1; 920 ek.last_req.val = calloc(1, sizeof(*ek.last_req.val)); 921 if (ek.last_req.val == NULL) { 925 ek [all...] |
H A D | kdc-private.h | 80 KDC_REP *rep, EncTicketPart *et, EncKDCRepPart *ek,
|
/macosx-10.10/OpenSSL098-52/src/crypto/idea/ |
H A D | i_skey.c | 114 void idea_set_decrypt_key(const IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk) argument 121 fp= &(ek->data[8][0]);
|
/macosx-10.10/OpenSSL098-52/src/ssl/ |
H A D | s2_srvr.c | 366 int is_export,i,n,keya,ek; local 465 ek=8; 468 ek=5; 476 || (is_export && ((i != ek) || (s->s2->tmp.clear+(unsigned int)i != 481 i=ek; 495 || (is_export && ((i != ek) || (s->s2->tmp.clear+i !=
|
/macosx-10.10/ksh-23/ksh/src/cmd/INIT/ |
H A D | Makefile | 30 ditto :: ditto.sh LICENSE=since=2001,author=gsf+ek
|
/macosx-10.10/emacs-93/emacs/etc/ |
H A D | cs-survival.tex | 245 Tabulky zna�ek (tags) zaznamen�vaj� polohu funkc� a procedur, glob�ln�ch 246 prom�nn�ch, datov�ch typ� a dal��ho. Pro vytvo�en� tabulky zna�ek spus�te 253 zaznamenan�ch v tabulce zna�ek.
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/open_ssl/openssl/ |
H A D | evp.h | 531 int EVP_OpenInit(EVP_CIPHER_CTX *ctx,EVP_CIPHER *type,unsigned char *ek, 535 int EVP_SealInit(EVP_CIPHER_CTX *ctx, EVP_CIPHER *type, unsigned char **ek,
|
/macosx-10.10/ruby-106/ruby/test/openssl/ |
H A D | test_ssl_session.rb | 87 ek+f+n1MBCMfFFsQXJ2gtLB84zD6UCz8aaCWN5/czJCd7xMz7fRLy3TOIW5boXAU
|
/macosx-10.10/OpenSSL098-52/src/include/openssl/ |
H A D | evp.h | 612 const unsigned char *ek, int ekl, const unsigned char *iv, 617 unsigned char **ek, int *ekl, unsigned char *iv,
|
/macosx-10.10/emacs-93/emacs/leim/quail/ |
H A D | hanja-jis.el | 135 ("ek" "$BB?BgCcTl(B")
|