/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | des-internal.c | 403 u32 ek[32], work[2]; in des_encrypt() local 414 deskey(pkey, 0, ek); in des_encrypt() 418 desfunc(work, ek); in des_encrypt() 423 os_memset(ek, 0, sizeof(ek)); in des_encrypt() 430 deskey(key, 0, ek); in des_key_setup() 440 desfunc(work, ek); in des_block_encrypt() 459 deskey(key, 0, dkey->ek[0]); in des3_key_setup() 460 deskey(key + 8, 1, dkey->ek[1]); in des3_key_setup() 475 desfunc(work, key->ek[0]); in des3_encrypt() 476 desfunc(work, key->ek[1]); in des3_encrypt() [all …]
|
H A D | des_i.h | 13 u32 ek[3][32]; member 17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
|
H A D | crypto_internal-cipher.c | 35 u32 ek[32]; member 91 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk); in crypto_cipher_init() 151 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek, in crypto_cipher_encrypt()
|
/dragonfly/crypto/libressl/crypto/pkcs7/ |
H A D | pk7_doit.c | 172 ek = malloc(eklen); in pkcs7_encode_rinfo() 174 if (ek == NULL) { in pkcs7_encode_rinfo() 183 ek = NULL; in pkcs7_encode_rinfo() 190 free(ek); in pkcs7_encode_rinfo() 223 if (ek == NULL) { in pkcs7_decrypt_rinfo() 240 *pek = ek; in pkcs7_decrypt_rinfo() 245 if (!ret && ek) in pkcs7_decrypt_rinfo() 246 free(ek); in pkcs7_decrypt_rinfo() 569 ek = tkey; in PKCS7_dataDecode() 582 ek = tkey; in PKCS7_dataDecode() [all …]
|
/dragonfly/crypto/libressl/crypto/cms/ |
H A D | cms_env.c | 362 unsigned char *ek = NULL; in cms_RecipientInfo_ktri_encrypt() local 397 ek = malloc(eklen); in cms_RecipientInfo_ktri_encrypt() 399 if (ek == NULL) { in cms_RecipientInfo_ktri_encrypt() 407 ASN1_STRING_set0(ktri->encryptedKey, ek, eklen); in cms_RecipientInfo_ktri_encrypt() 408 ek = NULL; in cms_RecipientInfo_ktri_encrypt() 415 free(ek); in cms_RecipientInfo_ktri_encrypt() 427 unsigned char *ek = NULL; in cms_RecipientInfo_ktri_decrypt() local 476 ek = malloc(eklen); in cms_RecipientInfo_ktri_decrypt() 478 if (ek == NULL) { in cms_RecipientInfo_ktri_decrypt() 492 ec->key = ek; in cms_RecipientInfo_ktri_decrypt() [all …]
|
/dragonfly/sys/crypto/rijndael/ |
H A D | rijndael-api.c | 41 ctx->Nr = rijndaelKeySetupEnc(ctx->ek, key, bits); in rijndael_set_key() 56 rijndaelEncrypt(ctx->ek, ctx->Nr, src, dst); in rijndael_encrypt()
|
H A D | rijndael.h | 40 uint32_t ek[4 * (RIJNDAEL_MAXNR + 1)]; /* encrypt key schedule */ member
|
H A D | rijndael-api-fst.h | 48 u_int32_t ek[4*(RIJNDAEL_MAXNR + 1)]; /* CFB1 key schedule (encryption only) */ member
|
H A D | rijndael-api-fst.c | 65 rijndaelKeySetupEnc(key->ek, cipherKey, keyLen); in rijndael_makeKey() 159 rijndaelEncrypt(key->ek, key->Nr, block, in rijndael_blockEncrypt() 330 rijndaelEncrypt(key->ek, key->Nr, block, in rijndael_blockDecrypt()
|
/dragonfly/crypto/libressl/crypto/idea/ |
H A D | i_skey.c | 98 void idea_set_decrypt_key(IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk) in idea_set_decrypt_key() argument 104 fp= &(ek->data[8][0]); in idea_set_decrypt_key()
|
/dragonfly/crypto/openssh/ |
H A D | rijndael.h | 47 u32 ek[4*(AES_MAXROUNDS + 1)]; /* encrypt key schedule */ member
|
H A D | cipher-aesctr.h | 27 u32 ek[4*(AES_MAXROUNDS + 1)]; /* encrypt key schedule */ member
|
/dragonfly/crypto/libressl/include/openssl/ |
H A D | idea.h | 87 void idea_set_decrypt_key(IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk);
|
H A D | evp.h | 527 const unsigned char *ek, int ekl, const unsigned char *iv, EVP_PKEY *priv); 531 unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk,
|
/dragonfly/share/timedef/ |
H A D | pl_PL.ISO8859-2.src | 45 poniedzia�ek
|
H A D | pl_PL.UTF-8.src | 45 poniedziałek
|
/dragonfly/contrib/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.c | 1706 u8 ek[32]; in wpa_supplicant_process_1_of_2_wpa() 1713 os_memcpy(ek, key->key_iv, 16); in wpa_supplicant_process_1_of_2_wpa() 1714 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_process_1_of_2_wpa() 1716 if (rc4_skip(ek, 32, 256, gd->gtk, key_data_len)) { in wpa_supplicant_process_1_of_2_wpa() 1717 forced_memzero(ek, sizeof(ek)); in wpa_supplicant_process_1_of_2_wpa() 1722 forced_memzero(ek, sizeof(ek)); in wpa_supplicant_process_1_of_2_wpa() 1998 u8 ek[32]; in wpa_supplicant_decrypt_key_data() 2001 os_memcpy(ek, key->key_iv, 16); in wpa_supplicant_decrypt_key_data() 2002 os_memcpy(ek + 16, sm->ptk.kek, sm->ptk.kek_len); in wpa_supplicant_decrypt_key_data() 2004 forced_memzero(ek, sizeof(ek)); in wpa_supplicant_decrypt_key_data() [all …]
|
/dragonfly/share/syscons/keymaps/ |
H A D | ce.iso2.kbd | 51 # alt-= � (caron, m�k�e�, h��ek) and alt-+ � (breve)
|
H A D | cz.iso2.kbd | 58 # alt-= � (caron, m�k�e�, h��ek) and alt-+ � (breve)
|
H A D | sk.iso2.kbd | 58 # alt-= � (caron, m�k�e�, h��ek) and alt-+ � (breve)
|
/dragonfly/contrib/wpa_supplicant/src/ap/ |
H A D | wpa_auth.c | 1589 u8 ek[32]; in __wpa_send_eapol() local 1596 os_memcpy(ek, key->key_iv, 16); in __wpa_send_eapol() 1597 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len); in __wpa_send_eapol() 1599 rc4_skip(ek, 32, 256, key_data, key_data_len); in __wpa_send_eapol()
|
/dragonfly/contrib/file/magic/Magdir/ |
H A D | images | 675 # From: Joerg Jenderek <joerg.jen.der.ek@gmx.net>
|
/dragonfly/crypto/libressl/ |
H A D | cert.pem | 4476 Fyo6dIMzMH1hVBHL7avg5tKifvVrbxi3Cgst/ek+7wrGsxDp3MJGF/hd/aTa/55J
|
/dragonfly/contrib/ncurses/misc/ |
H A D | terminfo.src | 10458 sgr=\E%?%p1%p5%|%t)%e(%;\s\010\E%?%p1%p3%|%tj%ek%;\010\E%?
|