/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 109 unsigned char *ek = NULL; in pkcs7_encode_rinfo() local 131 if (ek == NULL) { in pkcs7_encode_rinfo() 140 ek = NULL; in pkcs7_encode_rinfo() 146 OPENSSL_free(ek); in pkcs7_encode_rinfo() 175 if (ek == NULL) { in pkcs7_decrypt_rinfo() 192 *pek = ek; in pkcs7_decrypt_rinfo() 198 OPENSSL_free(ek); in pkcs7_decrypt_rinfo() 603 if (ek == NULL) { in PKCS7_dataDecode() 604 ek = tkey; in PKCS7_dataDecode() 618 ek = tkey; in PKCS7_dataDecode() [all …]
|
/openssl/crypto/evp/ |
H A D | p_open.c | 19 const unsigned char *ek, int ekl, const unsigned char *iv, in EVP_OpenInit() argument 42 || EVP_PKEY_decrypt(pctx, NULL, &keylen, ek, ekl) <= 0) in EVP_OpenInit() 50 if (EVP_PKEY_decrypt(pctx, key, &keylen, ek, ekl) <= 0) in EVP_OpenInit()
|
H A D | p_enc.c | 21 int EVP_PKEY_encrypt_old(unsigned char *ek, const unsigned char *key, in EVP_PKEY_encrypt_old() argument 37 RSA_public_encrypt(key_len, key, ek, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_encrypt_old()
|
H A D | p_dec.c | 21 int EVP_PKEY_decrypt_old(unsigned char *key, const unsigned char *ek, int ekl, in EVP_PKEY_decrypt_old() argument 37 RSA_private_decrypt(ekl, ek, key, rsa, RSA_PKCS1_PADDING); in EVP_PKEY_decrypt_old()
|
H A D | p_seal.c | 20 unsigned char **ek, int *ekl, unsigned char *iv, in EVP_SealInit() argument 66 || EVP_PKEY_encrypt(pctx, ek[i], &keylen, key, keylen) <= 0) in EVP_SealInit()
|
/openssl/crypto/cms/ |
H A D | cms_env.c | 497 unsigned char *ek = NULL; in cms_RecipientInfo_ktri_encrypt() local 529 ek = OPENSSL_malloc(eklen); in cms_RecipientInfo_ktri_encrypt() 531 if (ek == NULL) { in cms_RecipientInfo_ktri_encrypt() 540 ek = NULL; in cms_RecipientInfo_ktri_encrypt() 547 OPENSSL_free(ek); in cms_RecipientInfo_ktri_encrypt() 558 unsigned char *ek = NULL; in cms_RecipientInfo_ktri_decrypt() local 616 ek = OPENSSL_malloc(eklen); in cms_RecipientInfo_ktri_decrypt() 617 if (ek == NULL) { in cms_RecipientInfo_ktri_decrypt() 622 if (EVP_PKEY_decrypt(ktri->pctx, ek, &eklen, in cms_RecipientInfo_ktri_decrypt() 634 ec->key = ek; in cms_RecipientInfo_ktri_decrypt() [all …]
|
/openssl/crypto/idea/ |
H A D | i_skey.c | 61 void IDEA_set_decrypt_key(IDEA_KEY_SCHEDULE *ek, IDEA_KEY_SCHEDULE *dk) in IDEA_set_decrypt_key() argument 67 fp = &(ek->data[8][0]); in IDEA_set_decrypt_key()
|
/openssl/doc/man3/ |
H A D | EVP_SealInit.pod | 12 unsigned char **ek, int *ekl, unsigned char *iv, 29 decrypted using any of the corresponding private keys. B<ek> is an array of 32 B<ek[i]> must have room for B<EVP_PKEY_get_size(pubk[i])> bytes. The actual
|
H A D | EVP_OpenInit.pod | 11 int EVP_OpenInit(EVP_CIPHER_CTX *ctx, EVP_CIPHER *type, unsigned char *ek, 25 B<ekl> bytes passed in the B<ek> parameter using the private key B<priv>.
|
/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 627 unsigned char *ek = NULL; /* decrypted symmetric encryption key */ in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() local 670 || (ek = OPENSSL_malloc(eksize)) == NULL) in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 672 retval = EVP_PKEY_decrypt(pkctx, ek, &eksize, in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 704 if (!EVP_DecryptInit(evp_ctx, cipher, ek, iv) in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert() 724 OPENSSL_clear_free(ek, eksize); in OSSL_CRMF_ENCRYPTEDVALUE_get1_encCert()
|
/openssl/include/openssl/ |
H A D | idea.h | 47 OSSL_DEPRECATEDIN_3_0 void IDEA_set_decrypt_key(IDEA_KEY_SCHEDULE *ek,
|
H A D | evp.h | 846 const unsigned char *ek, int ekl, 851 unsigned char **ek, int *ekl, unsigned char *iv,
|
/openssl/crypto/aria/ |
H A D | aria.c | 1198 ARIA_KEY ek; in ossl_aria_set_decrypt_key() local 1199 const int r = ossl_aria_set_encrypt_key(userKey, bits, &ek); in ossl_aria_set_decrypt_key() 1200 unsigned int i, rounds = ek.rounds; in ossl_aria_set_decrypt_key() 1204 memcpy(&key->rd_key[0], &ek.rd_key[rounds], sizeof(key->rd_key[0])); in ossl_aria_set_decrypt_key() 1206 a(&key->rd_key[i], &ek.rd_key[rounds - i]); in ossl_aria_set_decrypt_key() 1207 memcpy(&key->rd_key[rounds], &ek.rd_key[0], sizeof(key->rd_key[rounds])); in ossl_aria_set_decrypt_key()
|