Home
last modified time | relevance | path

Searched refs:ek (Results 1 – 25 of 53) sorted by relevance

123

/freebsd/contrib/wpa/src/crypto/
H A Ddes-internal.c403 u32 ek[32], work[2]; in des_encrypt() local
414 deskey(pkey, 0, ek); in des_encrypt()
418 desfunc(work, ek); in des_encrypt()
423 os_memset(ek, 0, sizeof(ek)); in des_encrypt()
430 deskey(key, 0, ek); in des_key_setup()
440 desfunc(work, ek); in des_block_encrypt()
459 deskey(key, 0, dkey->ek[0]); in des3_key_setup()
460 deskey(key + 8, 1, dkey->ek[1]); in des3_key_setup()
475 desfunc(work, key->ek[0]); in des3_encrypt()
476 desfunc(work, key->ek[1]); in des3_encrypt()
[all …]
H A Ddes_i.h13 u32 ek[3][32]; member
17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk);
18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
H A Dcrypto_internal-cipher.c35 u32 ek[32]; member
91 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk); in crypto_cipher_init()
151 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek, in crypto_cipher_encrypt()
/freebsd/crypto/heimdal/kdc/
H A Dkerberos5.c1085 memset(&ek, 0, sizeof(ek)); in _kdc_as_rep()
1617 ek.last_req.val = malloc(2 * sizeof(*ek.last_req.val)); in _kdc_as_rep()
1626 ek.last_req.val[ek.last_req.len].lr_type = LR_PW_EXPTIME; in _kdc_as_rep()
1627 ek.last_req.val[ek.last_req.len].lr_value = *client->entry.pw_end; in _kdc_as_rep()
1628 ++ek.last_req.len; in _kdc_as_rep()
1631 ek.last_req.val[ek.last_req.len].lr_type = LR_ACCT_EXPTIME; in _kdc_as_rep()
1633 ++ek.last_req.len; in _kdc_as_rep()
1636 ek.last_req.val[ek.last_req.len].lr_type = LR_NONE; in _kdc_as_rep()
1637 ek.last_req.val[ek.last_req.len].lr_value = 0; in _kdc_as_rep()
1638 ++ek.last_req.len; in _kdc_as_rep()
[all …]
H A Dkrb5tgs.c754 EncKDCRepPart ek; in tgs_make_reply() local
762 memset(&ek, 0, sizeof(ek)); in tgs_make_reply()
821 ek.caddr = et.caddr; in tgs_make_reply()
928 ek.key = et.key; in tgs_make_reply()
930 ek.last_req.len = 1; in tgs_make_reply()
931 ek.last_req.val = calloc(1, sizeof(*ek.last_req.val)); in tgs_make_reply()
936 ek.nonce = b->nonce; in tgs_make_reply()
937 ek.flags = et.flags; in tgs_make_reply()
938 ek.authtime = et.authtime; in tgs_make_reply()
940 ek.endtime = et.endtime; in tgs_make_reply()
[all …]
/freebsd/crypto/openssl/crypto/pkcs7/
H A Dpk7_doit.c113 unsigned char *ek = NULL; in pkcs7_encode_rinfo() local
135 if (ek == NULL) { in pkcs7_encode_rinfo()
144 ek = NULL; in pkcs7_encode_rinfo()
150 OPENSSL_free(ek); in pkcs7_encode_rinfo()
179 if (ek == NULL) { in pkcs7_decrypt_rinfo()
196 *pek = ek; in pkcs7_decrypt_rinfo()
202 OPENSSL_free(ek); in pkcs7_decrypt_rinfo()
611 if (ek == NULL) { in PKCS7_dataDecode()
612 ek = tkey; in PKCS7_dataDecode()
626 ek = tkey; in PKCS7_dataDecode()
[all …]
/freebsd/contrib/bearssl/tools/
H A Dkeys.c58 const br_ec_private_key *ek; in decode_key() local
78 ek = br_skey_decoder_get_ec(&dc); in decode_key()
81 sk->key.ec.curve = ek->curve; in decode_key()
82 sk->key.ec.x = xblobdup(ek->x, ek->xlen); in decode_key()
83 sk->key.ec.xlen = ek->xlen; in decode_key()
H A Dskey.c486 const br_ec_private_key *ek; in decode_key() local
495 ek = br_skey_decoder_get_ec(&dc); in decode_key()
497 ek->curve, ec_curve_name(ek->curve)); in decode_key()
498 ret = print_ec(ek, os); in decode_key()
/freebsd/crypto/openssl/crypto/evp/
H A Dp_open.c19 const unsigned char *ek, int ekl, const unsigned char *iv, in EVP_OpenInit() argument
42 || EVP_PKEY_decrypt(pctx, NULL, &keylen, ek, ekl) <= 0) in EVP_OpenInit()
50 if (EVP_PKEY_decrypt(pctx, key, &keylen, ek, ekl) <= 0) in EVP_OpenInit()
H A Dp_dec.c21 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, in EVP_PKEY_decrypt_old() argument
37 RSA_private_decrypt(ekl, ek, key, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_decrypt_old()
H A Dp_enc.c21 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, in EVP_PKEY_encrypt_old() argument
37 RSA_public_encrypt(key_len, key, ek, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_encrypt_old()
H A Dp_seal.c21 unsigned char **ek, int *ekl, unsigned char *iv, in EVP_SealInit() argument
67 || EVP_PKEY_encrypt(pctx, ek[i], &keylen, key, keylen) <= 0) in EVP_SealInit()
/freebsd/sys/dev/cxgbe/crypto/
H A Dt4_keyctx.c374 uint32_t ek[4 * (RIJNDAEL_MAXNR + 1)]; in t4_aes_getdeckey() local
378 rijndaelKeySetupEnc(ek, enc_key, kbits); in t4_aes_getdeckey()
385 *--dkey = htobe32(ek[4 * 10 + i]); in t4_aes_getdeckey()
389 *--dkey = htobe32(ek[4 * 11 + 2 + i]); in t4_aes_getdeckey()
391 *--dkey = htobe32(ek[4 * 12 + i]); in t4_aes_getdeckey()
395 *--dkey = htobe32(ek[4 * 13 + i]); in t4_aes_getdeckey()
397 *--dkey = htobe32(ek[4 * 14 + i]); in t4_aes_getdeckey()
401 explicit_bzero(ek, sizeof(ek)); in t4_aes_getdeckey()
/freebsd/sys/crypto/rijndael/
H A Drijndael-api.c40 ctx->Nr = rijndaelKeySetupEnc(ctx->ek, key, bits); in rijndael_set_key()
55 rijndaelEncrypt(ctx->ek, ctx->Nr, src, dst); in rijndael_encrypt()
H A Drijndael.h39 uint32_t ek[4 * (RIJNDAEL_MAXNR + 1)]; /* encrypt key schedule */ member
H A Drijndael-api-fst.h47 uint32_t ek[4*(RIJNDAEL_MAXNR + 1)]; /* CFB1 key schedule (encryption only) */ member
/freebsd/crypto/openssh/
H A Dcipher-aesctr.c59 x->rounds = rijndaelKeySetupEnc(x->ek, k, kbits); in aesctr_keysetup()
76 rijndaelEncrypt(x->ek, x->rounds, x->ctr, buf); in aesctr_encrypt_bytes()
H A Drijndael.h47 u32 ek[4*(AES_MAXROUNDS + 1)]; /* encrypt key schedule */ member
H A Dcipher-aesctr.h27 u32 ek[4*(AES_MAXROUNDS + 1)]; /* encrypt key schedule */ member
/freebsd/crypto/openssl/crypto/cms/
H A Dcms_env.c479 unsigned char *ek = NULL; in cms_RecipientInfo_ktri_encrypt() local
511 ek = OPENSSL_malloc(eklen); in cms_RecipientInfo_ktri_encrypt()
513 if (ek == NULL) { in cms_RecipientInfo_ktri_encrypt()
522 ek = NULL; in cms_RecipientInfo_ktri_encrypt()
529 OPENSSL_free(ek); in cms_RecipientInfo_ktri_encrypt()
540 unsigned char *ek = NULL; in cms_RecipientInfo_ktri_decrypt() local
598 ek = OPENSSL_malloc(eklen); in cms_RecipientInfo_ktri_decrypt()
599 if (ek == NULL) { in cms_RecipientInfo_ktri_decrypt()
604 if (EVP_PKEY_decrypt(ktri->pctx, ek, &eklen, in cms_RecipientInfo_ktri_decrypt()
616 ec->key = ek; in cms_RecipientInfo_ktri_decrypt()
[all …]
/freebsd/crypto/openssl/crypto/idea/
H A Di_skey.c61 void IDEA_set_decrypt_key(IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk) in IDEA_set_decrypt_key() argument
67 fp = &(ek->data[8][0]); in IDEA_set_decrypt_key()
/freebsd/crypto/openssl/doc/man3/
H A DEVP_SealInit.pod12 unsigned char **ek, int *ekl, unsigned char *iv,
29 decrypted using any of the corresponding private keys. B<ek> is an array of
32 B<ek[i]> must have room for B<EVP_PKEY_get_size(pubk[i])> bytes. The actual
H A DEVP_OpenInit.pod11 int EVP_OpenInit(EVP_CIPHER_CTX *ctx, EVP_CIPHER *type, unsigned char *ek,
25 B<ekl> bytes passed in the B<ek> parameter using the private key B<priv>.
/freebsd/crypto/openssl/crypto/crmf/
H A Dcrmf_lib.c615 unsigned char *ek = NULL; /* decrypted symmetric encryption key */ in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() local
658 || (ek = OPENSSL_malloc(eksize)) == NULL) in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert()
660 retval = EVP_PKEY_decrypt(pkctx, ek, &eksize, in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert()
692 if (!EVP_DecryptInit(evp_ctx, cipher, ek, iv) in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert()
712 OPENSSL_clear_free(ek, eksize); in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert()
/freebsd/crypto/openssl/include/openssl/
H A Didea.h47 OSSL_DEPRECATEDIN_3_0 void IDEA_set_decrypt_key(IDEA_KEY_SCHEDULE *ek,

123