/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | des_i.h | 13 u32 ek[3][32]; member in struct:des3_key_s 17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
|
H A D | crypto_internal-cipher.c | 35 u32 ek[32]; member in struct:crypto_cipher::__anon33587::__anon33591 91 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk); 151 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek,
|
H A D | des-internal.c | 403 u32 ek[32], work[2]; local 414 deskey(pkey, 0, ek); 418 desfunc(work, ek); 423 os_memset(ek, 0, sizeof(ek)); 427 void des_key_setup(const u8 *key, u32 *ek, u32 *dk) argument 429 deskey(key, 0, ek); 434 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) argument 439 desfunc(work, ek); 458 deskey(key, 0, dkey->ek[ [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | des_i.h | 13 u32 ek[3][32]; member in struct:des3_key_s 17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
|
H A D | crypto_internal-cipher.c | 35 u32 ek[32]; member in struct:crypto_cipher::__anon33840::__anon33844 91 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk); 151 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek,
|
H A D | des-internal.c | 403 u32 ek[32], work[2]; local 414 deskey(pkey, 0, ek); 418 desfunc(work, ek); 423 os_memset(ek, 0, sizeof(ek)); 427 void des_key_setup(const u8 *key, u32 *ek, u32 *dk) argument 429 deskey(key, 0, ek); 434 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) argument 439 desfunc(work, ek); 458 deskey(key, 0, dkey->ek[ [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | des_i.h | 13 u32 ek[3][32]; member in struct:des3_key_s 17 void des_key_setup(const u8 *key, u32 *ek, u32 *dk); 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt);
|
H A D | crypto_internal-cipher.c | 35 u32 ek[32]; member in struct:crypto_cipher::__anon34091::__anon34095 91 des_key_setup(key, ctx->u.des.ek, ctx->u.des.dk); 151 des_block_encrypt(ctx->u.des.cbc, ctx->u.des.ek,
|
H A D | des-internal.c | 403 u32 ek[32], work[2]; local 414 deskey(pkey, 0, ek); 418 desfunc(work, ek); 423 os_memset(ek, 0, sizeof(ek)); 427 void des_key_setup(const u8 *key, u32 *ek, u32 *dk) argument 429 deskey(key, 0, ek); 434 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt) argument 439 desfunc(work, ek); 458 deskey(key, 0, dkey->ek[ [all...] |
/external/openssl/crypto/evp/ |
H A D | p_dec.c | 69 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, argument 83 ret=RSA_private_decrypt(ekl,ek,key,priv->pkey.rsa,RSA_PKCS1_PADDING);
|
H A D | p_enc.c | 69 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, int key_len, argument 82 ret=RSA_public_encrypt(key_len,key,ek,pubk->pkey.rsa,RSA_PKCS1_PADDING);
|
H A D | p_open.c | 70 const unsigned char *ek, int ekl, const unsigned char *iv, 98 i=EVP_PKEY_decrypt_old(key,ek,ekl,priv); 69 EVP_OpenInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, const unsigned char *ek, int ekl, const unsigned char *iv, EVP_PKEY *priv) argument
|
H A D | p_seal.c | 69 int EVP_SealInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *type, unsigned char **ek, argument 90 ekl[i]=EVP_PKEY_encrypt_old(ek[i],key,EVP_CIPHER_CTX_key_length(ctx),
|
/external/openssl/crypto/pem/ |
H A D | pem_seal.c | 71 unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, 103 ret=EVP_SealInit(&ctx->cipher,type,ek,ekl,iv,pubk,npubk); 109 j=EVP_EncodeBlock((unsigned char *)s,ek[i], 112 memcpy(ek[i],s,j+1); 70 PEM_SealInit(PEM_ENCODE_SEAL_CTX *ctx, EVP_CIPHER *type, EVP_MD *md_type, unsigned char **ek, int *ekl, unsigned char *iv, EVP_PKEY **pubk, int npubk) argument
|
/external/eigen/Eigen/src/Eigen2Support/ |
H A D | SVD.h | 377 Scalar ek = e[k]/scale; local 389 Scalar g = sk*ek;
|
/external/openssl/ssl/ |
H A D | s2_srvr.c | 366 int is_export,i,n,keya,ek; local 465 ek=8; 468 ek=5; 476 || (is_export && ((i != ek) || (s->s2->tmp.clear+(unsigned int)i != 481 i=ek; 495 || (is_export && ((i != ek) || (s->s2->tmp.clear+i !=
|
/external/chromium_org/third_party/skia/third_party/lua/src/ |
H A D | ltable.c | 343 static void rehash (lua_State *L, Table *t, const TValue *ek) { argument 353 nasize += countint(ek, nums);
|
/external/openssl/crypto/cms/ |
H A D | cms_env.c | 308 unsigned char *ek = NULL; local 339 ek = OPENSSL_malloc(eklen); 341 if (ek == NULL) 348 if (EVP_PKEY_encrypt(pctx, ek, &eklen, ec->key, ec->keylen) <= 0) 351 ASN1_STRING_set0(ktri->encryptedKey, ek, eklen); 352 ek = NULL; 359 if (ek) 360 OPENSSL_free(ek); 372 unsigned char *ek = NULL; local 404 ek [all...] |
/external/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 146 unsigned char *ek = NULL; local 172 ek = OPENSSL_malloc(eklen); 174 if (ek == NULL) 180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) 183 ASN1_STRING_set0(ri->enc_key, ek, eklen); 184 ek = NULL; 193 if (ek) 194 OPENSSL_free(ek); 204 unsigned char *ek = NULL; local 227 ek 433 unsigned char *ek = NULL, *tkey = NULL; local [all...] |
/external/linux-tools-perf/perf-3.12.0/tools/perf/util/ |
H A D | symbol-elf.c | 323 Elf_Kind ek; local 329 ek = elf_kind(elf); 330 if (ek != ELF_K_ELF) 476 Elf_Kind ek; local 488 ek = elf_kind(elf); 489 if (ek != ELF_K_ELF)
|
H A D | parse-events.c | 689 int ek; member in struct:event_modifier 703 int ek = evsel ? evsel->attr.exclude_kernel : 0; local 711 int exclude = eu | ek | eh; 719 exclude = eu = ek = eh = 1; 723 exclude = eu = ek = eh = 1; 724 ek = 0; 727 exclude = eu = ek = eh = 1; 766 mod->ek = ek; 819 evsel->attr.exclude_kernel = mod.ek; [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | sslcon.c | 652 PRUint8 *ek, int ekLen) 683 PORT_Memcpy(msg+SSL_HL_CLIENT_MASTER_KEY_HBYTES+ckLen, ek, ekLen); 1530 ** "ek" the encrypted-key data 1547 PRUint8 *ek, unsigned int ekLen, 1642 rv = PK11_PubDecryptRaw(sc->SERVERKEY, kbuf, &ddLen, modulusLen, ek, ekLen); 649 ssl2_SendSessionKeyMessage(sslSocket *ss, int cipher, int keySize, PRUint8 *ca, int caLen, PRUint8 *ck, int ckLen, PRUint8 *ek, int ekLen) argument 1545 ssl2_ServerSetupSessionCypher(sslSocket *ss, int cipher, unsigned int keyBits, PRUint8 *ck, unsigned int ckLen, PRUint8 *ek, unsigned int ekLen, PRUint8 *ca, unsigned int caLen) argument
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | wpa_auth.c | 1402 u8 ek[32]; local 1406 os_memcpy(ek, key->key_iv, 16); 1407 os_memcpy(ek + 16, sm->PTK.kek, 16); 1409 rc4_skip(ek, 32, 256, (u8 *) (key + 1), key_data_len);
|
/external/wpa_supplicant_8/hostapd/src/rsn_supp/ |
H A D | wpa.c | 1266 u8 ek[32]; local 1273 os_memcpy(ek, key->key_iv, 16); 1274 os_memcpy(ek + 16, sm->ptk.kek, 16); 1276 if (rc4_skip(ek, 32, 256, gd->gtk, key_data_len)) { 1277 os_memset(ek, 0, sizeof(ek)); 1282 os_memset(ek, 0, sizeof(ek)); 1480 u8 ek[32]; local 1481 os_memcpy(ek, ke [all...] |
/external/wpa_supplicant_8/src/ap/ |
H A D | wpa_auth.c | 1402 u8 ek[32]; local 1406 os_memcpy(ek, key->key_iv, 16); 1407 os_memcpy(ek + 16, sm->PTK.kek, 16); 1409 rc4_skip(ek, 32, 256, (u8 *) (key + 1), key_data_len);
|