/dports/www/srt/srt-1.4.4/haicrypt/ |
H A D | hcrypt_sa.c | 71 size_t kek_len = ctx->sek_len; in hcryptCtx_GenSecret() local 80 HAICRYPT_PBKDF2_ITER_CNT, kek_len, kek); in hcryptCtx_GenSecret() 87 HCRYPT_PRINTKEY(kek, kek_len, "kek"); in hcryptCtx_GenSecret() 90 …>km_setkey(crypto->cryspr_cb, (HCRYPT_CTX_F_ENCRYPT & ctx->flags ? true : false), kek, kek_len))) { in hcryptCtx_GenSecret() 91 HCRYPT_LOG(LOG_ERR, "km_setkey(pdkek[%zd]) failed (rc=%d)\n", kek_len, iret); in hcryptCtx_GenSecret()
|
H A D | hcrypt_ctx_rx.c | 60 size_t kek_len = 0; in hcryptCtx_Rx_ParseKM() local 156 kek_len = sek_len; /* KEK changed */ in hcryptCtx_Rx_ParseKM() 186 if (kek_len) { /* New or changed KEK */ in hcryptCtx_Rx_ParseKM()
|
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/ffi/ |
H A D | ffi_keywrap.cpp | 19 const uint8_t kek[], size_t kek_len, in botan_key_wrap3394() argument 24 const Botan::SymmetricKey kek_sym(kek, kek_len); in botan_key_wrap3394() 35 const uint8_t kek[], size_t kek_len, in botan_key_unwrap3394() argument 40 const Botan::SymmetricKey kek_sym(kek, kek_len); in botan_key_unwrap3394()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/ffi/ |
H A D | ffi_keywrap.cpp | 19 const uint8_t kek[], size_t kek_len, in botan_key_wrap3394() argument 24 const Botan::SymmetricKey kek_sym(kek, kek_len); in botan_key_wrap3394() 35 const uint8_t kek[], size_t kek_len, in botan_key_unwrap3394() argument 40 const Botan::SymmetricKey kek_sym(kek, kek_len); in botan_key_unwrap3394()
|
/dports/security/botan2/Botan-2.18.2/src/lib/ffi/ |
H A D | ffi_keywrap.cpp | 19 const uint8_t kek[], size_t kek_len, in botan_key_wrap3394() argument 24 const Botan::SymmetricKey kek_sym(kek, kek_len); in botan_key_wrap3394() 35 const uint8_t kek[], size_t kek_len, in botan_key_unwrap3394() argument 40 const Botan::SymmetricKey kek_sym(kek, kek_len); in botan_key_unwrap3394()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/rnp/src/lib/crypto/ |
H A D | ecdh.cpp | 41 size_t kek_len, in compute_kek() argument 74 kdf_name, kek, kek_len, s.data(), s_len, NULL, 0, other_info, other_info_size); in compute_kek() 224 const size_t kek_len = pgp_key_size(key->key_wrap_alg); in ecdh_encrypt_pkcs5() local 245 kek_len, in ecdh_encrypt_pkcs5() 263 if (botan_key_wrap3394(m, m_padded_len, kek, kek_len, out->m, &out->mlen)) { in ecdh_encrypt_pkcs5() 344 size_t kek_len = pgp_key_size(wrap_alg); in ecdh_decrypt_pkcs5() local 346 kek_len, in ecdh_decrypt_pkcs5() 357 in->m, in->mlen, kek.data(), kek_len, deckey.data(), &deckey_len)) { in ecdh_decrypt_pkcs5()
|
/dports/security/rnp/rnp-0.15.2/src/lib/crypto/ |
H A D | ecdh.cpp | 148 size_t kek_len, in compute_kek() argument 181 kdf_name, kek, kek_len, s.data(), s_len, NULL, 0, other_info, other_info_size); in compute_kek() 340 const size_t kek_len = pgp_key_size(key->key_wrap_alg); in ecdh_encrypt_pkcs5() local 361 kek_len, in ecdh_encrypt_pkcs5() 379 if (botan_key_wrap3394(m, m_padded_len, kek, kek_len, out->m, &out->mlen)) { in ecdh_encrypt_pkcs5() 460 size_t kek_len = pgp_key_size(wrap_alg); in ecdh_decrypt_pkcs5() local 462 kek_len, in ecdh_decrypt_pkcs5() 473 in->m, in->mlen, kek.data(), kek_len, deckey.data(), &deckey_len)) { in ecdh_decrypt_pkcs5()
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/rsn_supp/ |
H A D | wpa_ft.c | 762 size_t kek_len; in wpa_ft_process_gtk_subelem() local 766 kek_len = sm->ptk.kek2_len; in wpa_ft_process_gtk_subelem() 769 kek_len = sm->ptk.kek_len; in wpa_ft_process_gtk_subelem() 787 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem() 845 size_t kek_len; in wpa_ft_process_igtk_subelem() local 849 kek_len = sm->ptk.kek2_len; in wpa_ft_process_igtk_subelem() 852 kek_len = sm->ptk.kek_len; in wpa_ft_process_igtk_subelem() 881 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem() 915 size_t kek_len; in wpa_ft_process_bigtk_subelem() local 926 kek_len = sm->ptk.kek2_len; in wpa_ft_process_bigtk_subelem() [all …]
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/rsn_supp/ |
H A D | wpa_ft.c | 762 size_t kek_len; in wpa_ft_process_gtk_subelem() local 766 kek_len = sm->ptk.kek2_len; in wpa_ft_process_gtk_subelem() 769 kek_len = sm->ptk.kek_len; in wpa_ft_process_gtk_subelem() 787 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem() 845 size_t kek_len; in wpa_ft_process_igtk_subelem() local 849 kek_len = sm->ptk.kek2_len; in wpa_ft_process_igtk_subelem() 852 kek_len = sm->ptk.kek_len; in wpa_ft_process_igtk_subelem() 881 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem() 915 size_t kek_len; in wpa_ft_process_bigtk_subelem() local 926 kek_len = sm->ptk.kek2_len; in wpa_ft_process_bigtk_subelem() [all …]
|
/dports/net/hostapd/hostapd-2.9/src/crypto/ |
H A D | aes-wrap.c | 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
|
H A D | aes-unwrap.c | 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/crypto/ |
H A D | aes-wrap.c | 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
|
H A D | aes-unwrap.c | 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | aes-wrap.c | 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
|
H A D | aes-unwrap.c | 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/crypto/ |
H A D | aes-wrap.c | 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
|
H A D | aes-unwrap.c | 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/crypto/ |
H A D | aes-wrap.c | 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) in aes_wrap() argument 40 ctx = aes_encrypt_init(kek, kek_len); in aes_wrap()
|
H A D | aes-unwrap.c | 26 int aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, in aes_unwrap() argument 39 ctx = aes_decrypt_init(kek, kek_len); in aes_unwrap()
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/common/ |
H A D | sae_pk.c | 629 if (tmp->kek_len != 32 && tmp->kek_len != 48 && tmp->kek_len != 64) { in sae_write_confirm_pk() 688 if (aes_siv_encrypt(tmp->kek, tmp->kek_len, in sae_write_confirm_pk() 789 if (tmp->kek_len != 32 && tmp->kek_len != 48 && tmp->kek_len != 64) { in sae_check_confirm_pk() 825 if (aes_siv_decrypt(tmp->kek, tmp->kek_len, in sae_check_confirm_pk()
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/common/ |
H A D | sae_pk.c | 629 if (tmp->kek_len != 32 && tmp->kek_len != 48 && tmp->kek_len != 64) { in sae_write_confirm_pk() 688 if (aes_siv_encrypt(tmp->kek, tmp->kek_len, in sae_write_confirm_pk() 789 if (tmp->kek_len != 32 && tmp->kek_len != 48 && tmp->kek_len != 64) { in sae_check_confirm_pk() 825 if (aes_siv_decrypt(tmp->kek, tmp->kek_len, in sae_check_confirm_pk()
|
/dports/net/hostapd/hostapd-2.9/src/rsn_supp/ |
H A D | wpa_ft.c | 695 size_t kek_len; in wpa_ft_process_gtk_subelem() local 699 kek_len = sm->ptk.kek2_len; in wpa_ft_process_gtk_subelem() 702 kek_len = sm->ptk.kek_len; in wpa_ft_process_gtk_subelem() 720 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem() 778 size_t kek_len; in wpa_ft_process_igtk_subelem() local 782 kek_len = sm->ptk.kek2_len; in wpa_ft_process_igtk_subelem() 785 kek_len = sm->ptk.kek_len; in wpa_ft_process_igtk_subelem() 814 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem()
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | wpa_ft.c | 695 size_t kek_len; in wpa_ft_process_gtk_subelem() local 699 kek_len = sm->ptk.kek2_len; in wpa_ft_process_gtk_subelem() 702 kek_len = sm->ptk.kek_len; in wpa_ft_process_gtk_subelem() 720 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem() 778 size_t kek_len; in wpa_ft_process_igtk_subelem() local 782 kek_len = sm->ptk.kek2_len; in wpa_ft_process_igtk_subelem() 785 kek_len = sm->ptk.kek_len; in wpa_ft_process_igtk_subelem() 814 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem()
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/rsn_supp/ |
H A D | wpa_ft.c | 695 size_t kek_len; in wpa_ft_process_gtk_subelem() local 699 kek_len = sm->ptk.kek2_len; in wpa_ft_process_gtk_subelem() 702 kek_len = sm->ptk.kek_len; in wpa_ft_process_gtk_subelem() 720 if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + 11, gtk)) { in wpa_ft_process_gtk_subelem() 778 size_t kek_len; in wpa_ft_process_igtk_subelem() local 782 kek_len = sm->ptk.kek2_len; in wpa_ft_process_igtk_subelem() 785 kek_len = sm->ptk.kek_len; in wpa_ft_process_igtk_subelem() 814 if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + 9, igtk)) { in wpa_ft_process_igtk_subelem()
|
/dports/multimedia/libv4l/linux-5.13-rc2/net/wireless/ |
H A D | sme.c | 834 params->fils.kek_len + params->fils.pmk_len + in cfg80211_connect_done() 862 if (params->fils.kek_len) { in cfg80211_connect_done() 864 ev->cr.fils.kek_len = params->fils.kek_len; in cfg80211_connect_done() 866 params->fils.kek_len); in cfg80211_connect_done() 867 next += params->fils.kek_len; in cfg80211_connect_done() 978 info->fils.kek_len + info->fils.pmk_len + in cfg80211_roamed() 1000 if (info->fils.kek_len) { in cfg80211_roamed() 1002 ev->rm.fils.kek_len = info->fils.kek_len; in cfg80211_roamed() 1004 info->fils.kek_len); in cfg80211_roamed() 1005 next += info->fils.kek_len; in cfg80211_roamed()
|