/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/spec/ |
H A D | EncodedKeySpecTest.java | 55 byte[] ek = meks.getEncoded(); 60 if (encodedKey[i] != ek[i]) { 83 byte[] ek = meks.getEncoded(); 86 assertTrue(ek[3] == (byte)4); 100 byte[] ek = meks.getEncoded(); 102 ek[3] = (byte)5;
|
H A D | PKCS8EncodedKeySpecTest.java | 70 byte[] ek = meks.getEncoded(); 72 assertTrue(Arrays.equals(encodedKey, ek)); 104 byte[] ek = meks.getEncoded(); 108 assertTrue(Arrays.equals(encodedKey, ek)); 124 byte[] ek = meks.getEncoded(); 127 ek[3] = (byte)5;
|
H A D | X509EncodedKeySpecTest.java | 70 byte[] ek = eks.getEncoded(); 72 assertTrue(Arrays.equals(encodedKey, ek)); 104 byte[] ek = meks.getEncoded(); 108 assertTrue(Arrays.equals(encodedKey, ek)); 124 byte[] ek = meks.getEncoded(); 127 ek[3] = (byte)5;
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | des_i.h | 13 u32 ek[3][32]; member in struct:des3_key_s 17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
|
H A D | des-internal.c | 403 u32 ek[32], work[2]; local 414 deskey(pkey, 0, ek); 418 desfunc(work, ek); 423 os_memset(ek, 0, sizeof(ek)); 427 void des_key_setup(const u8 *key, u32 *ek, u32 *dk) argument 429 deskey(key, 0, ek); 434 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) argument 439 desfunc(work, ek); 458 deskey(key, 0, dkey->ek[ [all...] |
H A D | crypto_internal-cipher.c | 35 u32 ek[32]; member in struct:crypto_cipher::__anon29116::__anon29120 91 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk); 151 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek,
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | des_i.h | 13 u32 ek[3][32]; member in struct:des3_key_s 17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
|
H A D | des-internal.c | 403 u32 ek[32], work[2]; local 414 deskey(pkey, 0, ek); 418 desfunc(work, ek); 423 os_memset(ek, 0, sizeof(ek)); 427 void des_key_setup(const u8 *key, u32 *ek, u32 *dk) argument 429 deskey(key, 0, ek); 434 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) argument 439 desfunc(work, ek); 458 deskey(key, 0, dkey->ek[ [all...] |
H A D | crypto_internal-cipher.c | 35 u32 ek[32]; member in struct:crypto_cipher::__anon29346::__anon29350 91 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk); 151 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek,
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | des_i.h | 13 u32 ek[3][32]; member in struct:des3_key_s 17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
|
H A D | des-internal.c | 403 u32 ek[32], work[2]; local 414 deskey(pkey, 0, ek); 418 desfunc(work, ek); 423 os_memset(ek, 0, sizeof(ek)); 427 void des_key_setup(const u8 *key, u32 *ek, u32 *dk) argument 429 deskey(key, 0, ek); 434 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) argument 439 desfunc(work, ek); 458 deskey(key, 0, dkey->ek[ [all...] |
H A D | crypto_internal-cipher.c | 35 u32 ek[32]; member in struct:crypto_cipher::__anon29578::__anon29582 91 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk); 151 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek,
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
H A D | p_dec.c | 69 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, argument 83 ret=RSA_private_decrypt(ekl,ek,key,priv->pkey.rsa,RSA_PKCS1_PADDING);
|
H A D | p_enc.c | 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, argument 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
|
H A D | p_open.c | 70 const unsigned char *ek, int ekl, const unsigned char *iv, 98 i=EVP_PKEY_decrypt_old(key,ek,ekl,priv); 69 EVP_OpenInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, const unsigned char *ek, int ekl, const unsigned char *iv, EVP_PKEY *priv) argument
|
H A D | p_seal.c | 69 int EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek, argument 90 ekl[i]=EVP_PKEY_encrypt_old(ek[i],key,EVP_CIPHER_CTX_key_length(ctx),
|
/external/openssl/crypto/evp/ |
H A D | p_dec.c | 69 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, argument 83 ret=RSA_private_decrypt(ekl,ek,key,priv->pkey.rsa,RSA_PKCS1_PADDING);
|
H A D | p_enc.c | 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, argument 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
|
H A D | p_open.c | 70 const unsigned char *ek, int ekl, const unsigned char *iv, 98 i=EVP_PKEY_decrypt_old(key,ek,ekl,priv); 69 EVP_OpenInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, const unsigned char *ek, int ekl, const unsigned char *iv, EVP_PKEY *priv) argument
|
H A D | p_seal.c | 69 int EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek, argument 90 ekl[i]=EVP_PKEY_encrypt_old(ek[i],key,EVP_CIPHER_CTX_key_length(ctx),
|
/external/openssh/ |
H A D | rijndael.h | 43 u32 ek[4*(MAXNR + 1)]; /* encrypt key schedule */ member in struct:__anon24407
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 146 unsigned char *ek = NULL; local 172 ek = OPENSSL_malloc(eklen); 174 if (ek == NULL) 180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) 183 ASN1_STRING_set0(ri->enc_key, ek, eklen); 184 ek = NULL; 193 if (ek) 194 OPENSSL_free(ek); 204 unsigned char *ek = NULL; local 227 ek 433 unsigned char *ek = NULL, *tkey = NULL; local [all...] |
/external/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 146 unsigned char *ek = NULL; local 172 ek = OPENSSL_malloc(eklen); 174 if (ek == NULL) 180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) 183 ASN1_STRING_set0(ri->enc_key, ek, eklen); 184 ek = NULL; 193 if (ek) 194 OPENSSL_free(ek); 204 unsigned char *ek = NULL; local 227 ek 433 unsigned char *ek = NULL, *tkey = NULL; local [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/pem/ |
H A D | pem_seal.c | 71 unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, 103 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk); 109 j=EVP_EncodeBlock((unsigned char *)s,ek[i], 112 memcpy(ek[i],s,j+1); 70 PEM_SealInit(PEM_ENCODE_SEAL_CTX *ctx, EVP_CIPHER *type, EVP_MD *md_type, unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk) argument
|
/external/openssl/crypto/pem/ |
H A D | pem_seal.c | 71 unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, 103 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk); 109 j=EVP_EncodeBlock((unsigned char *)s,ek[i], 112 memcpy(ek[i],s,j+1); 70 PEM_SealInit(PEM_ENCODE_SEAL_CTX *ctx, EVP_CIPHER *type, EVP_MD *md_type, unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk) argument
|