Home
last modified time | relevance | path

Searched refs:ek (Results 1 – 25 of 52) sorted by relevance

123

/freebsd/contrib/wpa/src/crypto/
H A Ddes-internal.c403 u32 ek[32], work[2]; in des_encrypt() local
414 deskey(pkey, 0, ek); in des_encrypt()
418 desfunc(work, ek); in des_encrypt()
423 os_memset(ek, 0, sizeof(ek)); in des_encrypt()
428 void des_key_setup(const u8 *key, u32 *ek, u32 *dk) in des_key_setup() argument
430 deskey(key, 0, ek); in des_key_setup()
435 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) in des_block_encrypt() argument
440 desfunc(work, ek); in des_block_encrypt()
459 deskey(key, 0, dkey->ek[0]); in des3_key_setup()
460 deskey(key + 8, 1, dkey->ek[1]); in des3_key_setup()
[all …]
H A Ddes_i.h13 u32 ek[3][32]; member
17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk);
18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
H A Dcrypto_internal-cipher.c35 u32 ek[32]; member
91 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk); in crypto_cipher_init()
151 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek, in crypto_cipher_encrypt()
/freebsd/crypto/heimdal/kdc/
H A Dkerberos5.c324 KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek, in _kdc_encode_reply() argument
379 ASN1_MALLOC_ENCODE(EncASRepPart, buf, buf_size, ek, &len, ret); in _kdc_encode_reply()
381 ASN1_MALLOC_ENCODE(EncTGSRepPart, buf, buf_size, ek, &len, ret); in _kdc_encode_reply()
973 EncKDCRepPart ek; in _kdc_as_rep() local
1085 memset(&ek, 0, sizeof(ek)); in _kdc_as_rep()
1617 ek.last_req.val = malloc(2 * sizeof(*ek.last_req.val)); in _kdc_as_rep()
1618 if (ek.last_req.val == NULL) { in _kdc_as_rep()
1622 ek.last_req.len = 0; in _kdc_as_rep()
1626 ek.last_req.val[ek.last_req.len].lr_type = LR_PW_EXPTIME; in _kdc_as_rep()
1627 ek.last_req.val[ek.last_req.len].lr_value = *client->entry.pw_end; in _kdc_as_rep()
[all …]
H A Dkrb5tgs.c754 EncKDCRepPart ek; in tgs_make_reply() local
762 memset(&ek, 0, sizeof(ek)); in tgs_make_reply()
821 ek.caddr = et.caddr; in tgs_make_reply()
928 ek.key = et.key; in tgs_make_reply()
930 ek.last_req.len = 1; in tgs_make_reply()
931 ek.last_req.val = calloc(1, sizeof(*ek.last_req.val)); in tgs_make_reply()
932 if (ek.last_req.val == NULL) { in tgs_make_reply()
936 ek.nonce = b->nonce; in tgs_make_reply()
937 ek.flags = et.flags; in tgs_make_reply()
938 ek.authtime = et.authtime; in tgs_make_reply()
[all …]
/freebsd/crypto/openssl/crypto/pkcs7/
H A Dpk7_doit.c113 unsigned char *ek = NULL; in pkcs7_encode_rinfo() local
133 ek = OPENSSL_malloc(eklen); in pkcs7_encode_rinfo()
135 if (ek == NULL) { in pkcs7_encode_rinfo()
140 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) in pkcs7_encode_rinfo()
143 ASN1_STRING_set0(ri->enc_key, ek, eklen); in pkcs7_encode_rinfo()
144 ek = NULL; in pkcs7_encode_rinfo()
150 OPENSSL_free(ek); in pkcs7_encode_rinfo()
160 unsigned char *ek = NULL; in pkcs7_decrypt_rinfo() local
177 ek = OPENSSL_malloc(eklen); in pkcs7_decrypt_rinfo()
179 if (ek == NULL) { in pkcs7_decrypt_rinfo()
[all …]
/freebsd/contrib/bearssl/tools/
H A Dkeys.c58 const br_ec_private_key *ek; in decode_key() local
78 ek = br_skey_decoder_get_ec(&dc); in decode_key()
81 sk->key.ec.curve = ek->curve; in decode_key()
82 sk->key.ec.x = xblobdup(ek->x, ek->xlen); in decode_key()
83 sk->key.ec.xlen = ek->xlen; in decode_key()
H A Dskey.c486 const br_ec_private_key *ek; in decode_key() local
495 ek = br_skey_decoder_get_ec(&dc); in decode_key()
497 ek->curve, ec_curve_name(ek->curve)); in decode_key()
498 ret = print_ec(ek, os); in decode_key()
/freebsd/crypto/openssl/crypto/evp/
H A Dp_open.c19 const unsigned char *ek, int ekl, const unsigned char *iv, in EVP_OpenInit() argument
42 || EVP_PKEY_decrypt(pctx, NULL, &keylen, ek, ekl) <= 0) in EVP_OpenInit()
50 if (EVP_PKEY_decrypt(pctx, key, &keylen, ek, ekl) <= 0) in EVP_OpenInit()
H A Dp_enc.c21 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, in EVP_PKEY_encrypt_old() argument
37 RSA_public_encrypt(key_len, key, ek, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_encrypt_old()
H A Dp_dec.c21 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, in EVP_PKEY_decrypt_old() argument
37 RSA_private_decrypt(ekl, ek, key, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_decrypt_old()
H A Dp_seal.c21 unsigned char **ek, int *ekl, unsigned char *iv, in EVP_SealInit() argument
67 || EVP_PKEY_encrypt(pctx, ek[i], &keylen, key, keylen) <= 0) in EVP_SealInit()
/freebsd/sys/dev/cxgbe/crypto/
H A Dt4_keyctx.c374 uint32_t ek[4 * (RIJNDAEL_MAXNR + 1)]; in t4_aes_getdeckey() local
378 rijndaelKeySetupEnc(ek, enc_key, kbits); in t4_aes_getdeckey()
385 *--dkey = htobe32(ek[4 * 10 + i]); in t4_aes_getdeckey()
389 *--dkey = htobe32(ek[4 * 11 + 2 + i]); in t4_aes_getdeckey()
391 *--dkey = htobe32(ek[4 * 12 + i]); in t4_aes_getdeckey()
395 *--dkey = htobe32(ek[4 * 13 + i]); in t4_aes_getdeckey()
397 *--dkey = htobe32(ek[4 * 14 + i]); in t4_aes_getdeckey()
401 explicit_bzero(ek, sizeof(ek)); in t4_aes_getdeckey()
/freebsd/sys/crypto/rijndael/
H A Drijndael-api.c40 ctx->Nr = rijndaelKeySetupEnc(ctx->ek, key, bits); in rijndael_set_key()
55 rijndaelEncrypt(ctx->ek, ctx->Nr, src, dst); in rijndael_encrypt()
H A Drijndael.h39 uint32_t ek[4 * (RIJNDAEL_MAXNR + 1)]; /* encrypt key schedule */ member
H A Drijndael-api-fst.h47 uint32_t ek[4*(RIJNDAEL_MAXNR + 1)]; /* CFB1 key schedule (encryption only) */ member
/freebsd/crypto/openssl/crypto/cms/
H A Dcms_env.c470 unsigned char *ek = NULL; in cms_RecipientInfo_ktri_encrypt() local
502 ek = OPENSSL_malloc(eklen); in cms_RecipientInfo_ktri_encrypt()
504 if (ek == NULL) { in cms_RecipientInfo_ktri_encrypt()
509 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0) in cms_RecipientInfo_ktri_encrypt()
512 ASN1_STRING_set0(ktri->encryptedKey, ek, eklen); in cms_RecipientInfo_ktri_encrypt()
513 ek = NULL; in cms_RecipientInfo_ktri_encrypt()
520 OPENSSL_free(ek); in cms_RecipientInfo_ktri_encrypt()
531 unsigned char *ek = NULL; in cms_RecipientInfo_ktri_decrypt() local
589 ek = OPENSSL_malloc(eklen); in cms_RecipientInfo_ktri_decrypt()
590 if (ek == NULL) { in cms_RecipientInfo_ktri_decrypt()
[all …]
/freebsd/crypto/openssh/
H A Dcipher-aesctr.c59 x->rounds = rijndaelKeySetupEnc(x->ek, k, kbits); in aesctr_keysetup()
76 rijndaelEncrypt(x->ek, x->rounds, x->ctr, buf); in aesctr_encrypt_bytes()
H A Drijndael.h47 u32 ek[4*(AES_MAXROUNDS + 1)]; /* encrypt key schedule */ member
H A Dcipher-aesctr.h27 u32 ek[4*(AES_MAXROUNDS + 1)]; /* encrypt key schedule */ member
/freebsd/crypto/openssl/crypto/idea/
H A Di_skey.c61 void IDEA_set_decrypt_key(IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk) in IDEA_set_decrypt_key() argument
67 fp = &(ek->data[8][0]); in IDEA_set_decrypt_key()
/freebsd/crypto/openssl/doc/man3/
H A DEVP_SealInit.pod12 unsigned char **ek, int *ekl, unsigned char *iv,
29 decrypted using any of the corresponding private keys. B<ek> is an array of
32 B<ek[i]> must have room for B<EVP_PKEY_get_size(pubk[i])> bytes. The actual
H A DEVP_OpenInit.pod11 int EVP_OpenInit(EVP_CIPHER_CTX *ctx, EVP_CIPHER *type, unsigned char *ek,
25 B<ekl> bytes passed in the B<ek> parameter using the private key B<priv>.
/freebsd/crypto/openssl/crypto/crmf/
H A Dcrmf_lib.c615 unsigned char *ek = NULL; /* decrypted symmetric encryption key */ in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() local
658 || (ek = OPENSSL_malloc(eksize)) == NULL) in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert()
660 retval = EVP_PKEY_decrypt(pkctx, ek, &eksize, in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert()
692 if (!EVP_DecryptInit(evp_ctx, cipher, ek, iv) in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert()
712 OPENSSL_clear_free(ek, eksize); in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert()
/freebsd/sys/contrib/device-tree/src/arm64/rockchip/
H A Drk3568-wolfvision-pf5-display-vz.dtso14 compatible = "jasonic,jt240mhqs-hwt-ek-e3",

123