/freebsd/contrib/wpa/src/crypto/ |
H A D | des-internal.c | 403 u32 ek[32], work[2]; in des_encrypt() local 414 deskey(pkey, 0, ek); in des_encrypt() 418 desfunc(work, ek); in des_encrypt() 423 os_memset(ek, 0, sizeof(ek)); in des_encrypt() 428 void des_key_setup(const u8 *key, u32 *ek, u32 *dk) in des_key_setup() argument 430 deskey(key, 0, ek); in des_key_setup() 435 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) in des_block_encrypt() argument 440 desfunc(work, ek); in des_block_encrypt() 459 deskey(key, 0, dkey->ek[0]); in des3_key_setup() 460 deskey(key + 8, 1, dkey->ek[1]); in des3_key_setup() [all …]
|
H A D | des_i.h | 13 u32 ek[3][32]; member 17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
|
H A D | crypto_internal-cipher.c | 35 u32 ek[32]; member 91 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk); in crypto_cipher_init() 151 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek, in crypto_cipher_encrypt()
|
/freebsd/crypto/heimdal/kdc/ |
H A D | kerberos5.c | 324 KDC_REP *rep, const EncTicketPart *et, EncKDCRepPart *ek, in _kdc_encode_reply() argument 379 ASN1_MALLOC_ENCODE(EncASRepPart, buf, buf_size, ek, &len, ret); in _kdc_encode_reply() 381 ASN1_MALLOC_ENCODE(EncTGSRepPart, buf, buf_size, ek, &len, ret); in _kdc_encode_reply() 973 EncKDCRepPart ek; in _kdc_as_rep() local 1085 memset(&ek, 0, sizeof(ek)); in _kdc_as_rep() 1617 ek.last_req.val = malloc(2 * sizeof(*ek.last_req.val)); in _kdc_as_rep() 1618 if (ek.last_req.val == NULL) { in _kdc_as_rep() 1622 ek.last_req.len = 0; in _kdc_as_rep() 1626 ek.last_req.val[ek.last_req.len].lr_type = LR_PW_EXPTIME; in _kdc_as_rep() 1627 ek.last_req.val[ek.last_req.len].lr_value = *client->entry.pw_end; in _kdc_as_rep() [all …]
|
H A D | krb5tgs.c | 754 EncKDCRepPart ek; in tgs_make_reply() local 762 memset(&ek, 0, sizeof(ek)); in tgs_make_reply() 821 ek.caddr = et.caddr; in tgs_make_reply() 928 ek.key = et.key; in tgs_make_reply() 930 ek.last_req.len = 1; in tgs_make_reply() 931 ek.last_req.val = calloc(1, sizeof(*ek.last_req.val)); in tgs_make_reply() 932 if (ek.last_req.val == NULL) { in tgs_make_reply() 936 ek.nonce = b->nonce; in tgs_make_reply() 937 ek.flags = et.flags; in tgs_make_reply() 938 ek.authtime = et.authtime; in tgs_make_reply() [all …]
|
/freebsd/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 113 unsigned char *ek = NULL; in pkcs7_encode_rinfo() local 133 ek = OPENSSL_malloc(eklen); in pkcs7_encode_rinfo() 135 if (ek == NULL) { in pkcs7_encode_rinfo() 140 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) in pkcs7_encode_rinfo() 143 ASN1_STRING_set0(ri->enc_key, ek, eklen); in pkcs7_encode_rinfo() 144 ek = NULL; in pkcs7_encode_rinfo() 150 OPENSSL_free(ek); in pkcs7_encode_rinfo() 160 unsigned char *ek = NULL; in pkcs7_decrypt_rinfo() local 177 ek = OPENSSL_malloc(eklen); in pkcs7_decrypt_rinfo() 179 if (ek == NULL) { in pkcs7_decrypt_rinfo() [all …]
|
/freebsd/contrib/bearssl/tools/ |
H A D | keys.c | 58 const br_ec_private_key *ek; in decode_key() local 78 ek = br_skey_decoder_get_ec(&dc); in decode_key() 81 sk->key.ec.curve = ek->curve; in decode_key() 82 sk->key.ec.x = xblobdup(ek->x, ek->xlen); in decode_key() 83 sk->key.ec.xlen = ek->xlen; in decode_key()
|
H A D | skey.c | 486 const br_ec_private_key *ek; in decode_key() local 495 ek = br_skey_decoder_get_ec(&dc); in decode_key() 497 ek->curve, ec_curve_name(ek->curve)); in decode_key() 498 ret = print_ec(ek, os); in decode_key()
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | p_open.c | 19 const unsigned char *ek, int ekl, const unsigned char *iv, in EVP_OpenInit() argument 42 || EVP_PKEY_decrypt(pctx, NULL, &keylen, ek, ekl) <= 0) in EVP_OpenInit() 50 if (EVP_PKEY_decrypt(pctx, key, &keylen, ek, ekl) <= 0) in EVP_OpenInit()
|
H A D | p_enc.c | 21 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, in EVP_PKEY_encrypt_old() argument 37 RSA_public_encrypt(key_len, key, ek, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_encrypt_old()
|
H A D | p_dec.c | 21 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, in EVP_PKEY_decrypt_old() argument 37 RSA_private_decrypt(ekl, ek, key, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_decrypt_old()
|
H A D | p_seal.c | 21 unsigned char **ek, int *ekl, unsigned char *iv, in EVP_SealInit() argument 67 || EVP_PKEY_encrypt(pctx, ek[i], &keylen, key, keylen) <= 0) in EVP_SealInit()
|
/freebsd/sys/dev/cxgbe/crypto/ |
H A D | t4_keyctx.c | 374 uint32_t ek[4 * (RIJNDAEL_MAXNR + 1)]; in t4_aes_getdeckey() local 378 rijndaelKeySetupEnc(ek, enc_key, kbits); in t4_aes_getdeckey() 385 *--dkey = htobe32(ek[4 * 10 + i]); in t4_aes_getdeckey() 389 *--dkey = htobe32(ek[4 * 11 + 2 + i]); in t4_aes_getdeckey() 391 *--dkey = htobe32(ek[4 * 12 + i]); in t4_aes_getdeckey() 395 *--dkey = htobe32(ek[4 * 13 + i]); in t4_aes_getdeckey() 397 *--dkey = htobe32(ek[4 * 14 + i]); in t4_aes_getdeckey() 401 explicit_bzero(ek, sizeof(ek)); in t4_aes_getdeckey()
|
/freebsd/sys/crypto/rijndael/ |
H A D | rijndael-api.c | 40 ctx->Nr = rijndaelKeySetupEnc(ctx->ek, key, bits); in rijndael_set_key() 55 rijndaelEncrypt(ctx->ek, ctx->Nr, src, dst); in rijndael_encrypt()
|
H A D | rijndael.h | 39 uint32_t ek[4 * (RIJNDAEL_MAXNR + 1)]; /* encrypt key schedule */ member
|
H A D | rijndael-api-fst.h | 47 uint32_t ek[4*(RIJNDAEL_MAXNR + 1)]; /* CFB1 key schedule (encryption only) */ member
|
/freebsd/crypto/openssl/crypto/cms/ |
H A D | cms_env.c | 470 unsigned char *ek = NULL; in cms_RecipientInfo_ktri_encrypt() local 502 ek = OPENSSL_malloc(eklen); in cms_RecipientInfo_ktri_encrypt() 504 if (ek == NULL) { in cms_RecipientInfo_ktri_encrypt() 509 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0) in cms_RecipientInfo_ktri_encrypt() 512 ASN1_STRING_set0(ktri->encryptedKey, ek, eklen); in cms_RecipientInfo_ktri_encrypt() 513 ek = NULL; in cms_RecipientInfo_ktri_encrypt() 520 OPENSSL_free(ek); in cms_RecipientInfo_ktri_encrypt() 531 unsigned char *ek = NULL; in cms_RecipientInfo_ktri_decrypt() local 589 ek = OPENSSL_malloc(eklen); in cms_RecipientInfo_ktri_decrypt() 590 if (ek == NULL) { in cms_RecipientInfo_ktri_decrypt() [all …]
|
/freebsd/crypto/openssh/ |
H A D | cipher-aesctr.c | 59 x->rounds = rijndaelKeySetupEnc(x->ek, k, kbits); in aesctr_keysetup() 76 rijndaelEncrypt(x->ek, x->rounds, x->ctr, buf); in aesctr_encrypt_bytes()
|
H A D | rijndael.h | 47 u32 ek[4*(AES_MAXROUNDS + 1)]; /* encrypt key schedule */ member
|
H A D | cipher-aesctr.h | 27 u32 ek[4*(AES_MAXROUNDS + 1)]; /* encrypt key schedule */ member
|
/freebsd/crypto/openssl/crypto/idea/ |
H A D | i_skey.c | 61 void IDEA_set_decrypt_key(IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk) in IDEA_set_decrypt_key() argument 67 fp = &(ek->data[8][0]); in IDEA_set_decrypt_key()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_SealInit.pod | 12 unsigned char **ek, int *ekl, unsigned char *iv, 29 decrypted using any of the corresponding private keys. B<ek> is an array of 32 B<ek[i]> must have room for B<EVP_PKEY_get_size(pubk[i])> bytes. The actual
|
H A D | EVP_OpenInit.pod | 11 int EVP_OpenInit(EVP_CIPHER_CTX *ctx, EVP_CIPHER *type, unsigned char *ek, 25 B<ekl> bytes passed in the B<ek> parameter using the private key B<priv>.
|
/freebsd/crypto/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 615 unsigned char *ek = NULL; /* decrypted symmetric encryption key */ in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() local 658 || (ek = OPENSSL_malloc(eksize)) == NULL) in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 660 retval = EVP_PKEY_decrypt(pkctx, ek, &eksize, in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 692 if (!EVP_DecryptInit(evp_ctx, cipher, ek, iv) in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 712 OPENSSL_clear_free(ek, eksize); in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert()
|
/freebsd/sys/contrib/device-tree/src/arm64/rockchip/ |
H A D | rk3568-wolfvision-pf5-display-vz.dtso | 14 compatible = "jasonic,jt240mhqs-hwt-ek-e3",
|