/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | des-internal.c | 403 u32 ek[32], work[2]; in des_encrypt() local 414 deskey(pkey, 0, ek); in des_encrypt() 418 desfunc(work, ek); in des_encrypt() 423 os_memset(ek, 0, sizeof(ek)); in des_encrypt() 428 void des_key_setup(const u8 *key, u32 *ek, u32 *dk) in des_key_setup() argument 430 deskey(key, 0, ek); in des_key_setup() 435 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) in des_block_encrypt() argument 440 desfunc(work, ek); in des_block_encrypt() 459 deskey(key, 0, dkey->ek[ in des3_key_setup() [all...] |
H A D | des_i.h | 13 u32 ek[3][32]; member 17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
|
H A D | crypto_internal-cipher.c | 35 u32 ek[32]; member 91 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk); in crypto_cipher_init() 151 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek, in crypto_cipher_encrypt()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | des-internal.c | 403 u32 ek[32], work[2]; in des_encrypt() local 414 deskey(pkey, 0, ek); in des_encrypt() 418 desfunc(work, ek); in des_encrypt() 423 os_memset(ek, 0, sizeof(ek)); in des_encrypt() 428 void des_key_setup(const u8 *key, u32 *ek, u32 *dk) in des_key_setup() argument 430 deskey(key, 0, ek); in des_key_setup() 435 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) in des_block_encrypt() argument 440 desfunc(work, ek); in des_block_encrypt() 459 deskey(key, 0, dkey->ek[ in des3_key_setup() [all...] |
H A D | des_i.h | 13 u32 ek[3][32]; member 17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
|
H A D | crypto_internal-cipher.c | 35 u32 ek[32]; member 91 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk); in crypto_cipher_init() 151 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek, in crypto_cipher_encrypt()
|
/third_party/node/deps/openssl/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 113 unsigned char *ek = NULL; in pkcs7_encode_rinfo() local 133 ek = OPENSSL_malloc(eklen); in pkcs7_encode_rinfo() 135 if (ek == NULL) { in pkcs7_encode_rinfo() 140 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) in pkcs7_encode_rinfo() 143 ASN1_STRING_set0(ri->enc_key, ek, eklen); in pkcs7_encode_rinfo() 144 ek = NULL; in pkcs7_encode_rinfo() 150 OPENSSL_free(ek); in pkcs7_encode_rinfo() 160 unsigned char *ek = NULL; in pkcs7_decrypt_rinfo() local 177 ek = OPENSSL_malloc(eklen); in pkcs7_decrypt_rinfo() 179 if (ek in pkcs7_decrypt_rinfo() 410 unsigned char *ek = NULL, *tkey = NULL; PKCS7_dataDecode() local [all...] |
/third_party/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 113 unsigned char *ek = NULL; in pkcs7_encode_rinfo() local 133 ek = OPENSSL_malloc(eklen); in pkcs7_encode_rinfo() 135 if (ek == NULL) { in pkcs7_encode_rinfo() 140 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) in pkcs7_encode_rinfo() 143 ASN1_STRING_set0(ri->enc_key, ek, eklen); in pkcs7_encode_rinfo() 144 ek = NULL; in pkcs7_encode_rinfo() 150 OPENSSL_free(ek); in pkcs7_encode_rinfo() 160 unsigned char *ek = NULL; in pkcs7_decrypt_rinfo() local 177 ek = OPENSSL_malloc(eklen); in pkcs7_decrypt_rinfo() 179 if (ek in pkcs7_decrypt_rinfo() 410 unsigned char *ek = NULL, *tkey = NULL; PKCS7_dataDecode() local [all...] |
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | p_open.c | 19 const unsigned char *ek, int ekl, const unsigned char *iv, in EVP_OpenInit() 42 || EVP_PKEY_decrypt(pctx, NULL, &keylen, ek, ekl) <= 0) in EVP_OpenInit() 50 if (EVP_PKEY_decrypt(pctx, key, &keylen, ek, ekl) <= 0) in EVP_OpenInit() 18 EVP_OpenInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, const unsigned char *ek, int ekl, const unsigned char *iv, EVP_PKEY *priv) EVP_OpenInit() argument
|
H A D | p_enc.c | 21 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, in EVP_PKEY_encrypt_old() argument 37 RSA_public_encrypt(key_len, key, ek, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_encrypt_old()
|
H A D | p_dec.c | 21 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, in EVP_PKEY_decrypt_old() argument 37 RSA_private_decrypt(ekl, ek, key, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_decrypt_old()
|
H A D | p_seal.c | 21 unsigned char **ek, int *ekl, unsigned char *iv, in EVP_SealInit() 67 || EVP_PKEY_encrypt(pctx, ek[i], &keylen, key, keylen) <= 0) in EVP_SealInit() 20 EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk) EVP_SealInit() argument
|
/third_party/openssl/crypto/evp/ |
H A D | p_open.c | 19 const unsigned char *ek, int ekl, const unsigned char *iv, in EVP_OpenInit() 42 || EVP_PKEY_decrypt(pctx, NULL, &keylen, ek, ekl) <= 0) in EVP_OpenInit() 50 if (EVP_PKEY_decrypt(pctx, key, &keylen, ek, ekl) <= 0) in EVP_OpenInit() 18 EVP_OpenInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, const unsigned char *ek, int ekl, const unsigned char *iv, EVP_PKEY *priv) EVP_OpenInit() argument
|
H A D | p_enc.c | 21 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, in EVP_PKEY_encrypt_old() argument 37 RSA_public_encrypt(key_len, key, ek, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_encrypt_old()
|
H A D | p_dec.c | 21 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, in EVP_PKEY_decrypt_old() argument 37 RSA_private_decrypt(ekl, ek, key, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_decrypt_old()
|
H A D | p_seal.c | 21 unsigned char **ek, int *ekl, unsigned char *iv, in EVP_SealInit() 67 || EVP_PKEY_encrypt(pctx, ek[i], &keylen, key, keylen) <= 0) in EVP_SealInit() 20 EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk) EVP_SealInit() argument
|
/third_party/node/deps/openssl/openssl/crypto/cms/ |
H A D | cms_env.c | 479 unsigned char *ek = NULL; in cms_RecipientInfo_ktri_encrypt() local 511 ek = OPENSSL_malloc(eklen); in cms_RecipientInfo_ktri_encrypt() 513 if (ek == NULL) { in cms_RecipientInfo_ktri_encrypt() 518 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0) in cms_RecipientInfo_ktri_encrypt() 521 ASN1_STRING_set0(ktri->encryptedKey, ek, eklen); in cms_RecipientInfo_ktri_encrypt() 522 ek = NULL; in cms_RecipientInfo_ktri_encrypt() 529 OPENSSL_free(ek); in cms_RecipientInfo_ktri_encrypt() 540 unsigned char *ek = NULL; in cms_RecipientInfo_ktri_decrypt() local 598 ek = OPENSSL_malloc(eklen); in cms_RecipientInfo_ktri_decrypt() 599 if (ek in cms_RecipientInfo_ktri_decrypt() [all...] |
/third_party/openssl/crypto/cms/ |
H A D | cms_env.c | 460 unsigned char *ek = NULL; in cms_RecipientInfo_ktri_encrypt() local 492 ek = OPENSSL_malloc(eklen); in cms_RecipientInfo_ktri_encrypt() 494 if (ek == NULL) { in cms_RecipientInfo_ktri_encrypt() 499 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0) in cms_RecipientInfo_ktri_encrypt() 502 ASN1_STRING_set0(ktri->encryptedKey, ek, eklen); in cms_RecipientInfo_ktri_encrypt() 503 ek = NULL; in cms_RecipientInfo_ktri_encrypt() 510 OPENSSL_free(ek); in cms_RecipientInfo_ktri_encrypt() 521 unsigned char *ek = NULL; in cms_RecipientInfo_ktri_decrypt() local 579 ek = OPENSSL_malloc(eklen); in cms_RecipientInfo_ktri_decrypt() 580 if (ek in cms_RecipientInfo_ktri_decrypt() [all...] |
/third_party/node/deps/openssl/openssl/crypto/idea/ |
H A D | i_skey.c | 61 void IDEA_set_decrypt_key(IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk) in IDEA_set_decrypt_key() argument 67 fp = &(ek->data[8][0]); in IDEA_set_decrypt_key()
|
/third_party/openssl/crypto/idea/ |
H A D | i_skey.c | 61 void IDEA_set_decrypt_key(IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk) in IDEA_set_decrypt_key() argument 67 fp = &(ek->data[8][0]); in IDEA_set_decrypt_key()
|
/third_party/node/deps/openssl/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 615 unsigned char *ek = NULL; /* decrypted symmetric encryption key */ in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() local 658 || (ek = OPENSSL_malloc(eksize)) == NULL) in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 660 retval = EVP_PKEY_decrypt(pkctx, ek, &eksize, in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 692 if (!EVP_DecryptInit(evp_ctx, cipher, ek, iv) in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 712 OPENSSL_clear_free(ek, eksize); in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert()
|
/third_party/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 615 unsigned char *ek = NULL; /* decrypted symmetric encryption key */ in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() local 658 || (ek = OPENSSL_malloc(eksize)) == NULL) in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 660 retval = EVP_PKEY_decrypt(pkctx, ek, &eksize, in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 692 if (!EVP_DecryptInit(evp_ctx, cipher, ek, iv) in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 712 OPENSSL_clear_free(ek, eksize); in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert()
|
/third_party/FreeBSD/sys/crypto/rijndael/ |
H A D | rijndael.h | 39 uint32_t ek[4 * (RIJNDAEL_MAXNR + 1)]; /* encrypt key schedule */ member
|
H A D | rijndael-api-fst.h | 47 u_int32_t ek[4*(RIJNDAEL_MAXNR + 1)]; /* CFB1 key schedule (encryption only) */ member
|
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | idea.h | 36 void IDEA_set_decrypt_key(IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk);
|