/external/dropbear/libtomcrypt/src/mac/xcbc/ |
H A D | xcbc_init.c | 30 symmetric_key *skey; local 47 skey = XCALLOC(1, sizeof(*skey)); 48 if (skey == NULL) { 52 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) { 61 cipher_descriptor[cipher].ecb_encrypt(xcbc->K[y], xcbc->K[y], skey); 73 cipher_descriptor[cipher].done(skey); 75 zeromem(skey, sizeof(*skey)); 77 XFREE(skey); [all...] |
/external/dropbear/libtomcrypt/src/pk/dsa/ |
H A D | dsa_decrypt_key.c | 33 unsigned char *skey, *expt; local 69 skey = XMALLOC(MAXBLOCKSIZE); 70 if (expt == NULL || skey == NULL) { 74 if (skey != NULL) { 75 XFREE(skey); 82 LTC_SET_ASN1(decode, 2, LTC_ASN1_OCTET_STRING, skey, MAXBLOCKSIZE); 115 out[x] = expt[x] ^ skey[x]; 123 zeromem(skey, MAXBLOCKSIZE); 127 XFREE(skey);
|
H A D | dsa_encrypt_key.c | 37 unsigned char *expt, *skey; local 66 skey = XMALLOC(MAXBLOCKSIZE); 67 if (expt == NULL || skey == NULL) { 71 if (skey != NULL) { 72 XFREE(skey); 102 if ((err = hash_memory(hash, expt, x, skey, &y)) != CRYPT_OK) { 108 skey[x] ^= in[x]; 114 LTC_ASN1_OCTET_STRING, inlen, skey, 121 zeromem(skey, MAXBLOCKSIZE); 124 XFREE(skey); [all...] |
/external/dropbear/libtomcrypt/src/pk/ecc/ |
H A D | ecc_decrypt_key.c | 39 unsigned char *ecc_shared, *skey, *pub_expt; local 72 skey = XMALLOC(MAXBLOCKSIZE); 73 if (pub_expt == NULL || ecc_shared == NULL || skey == NULL) { 80 if (skey != NULL) { 81 XFREE(skey); 86 LTC_SET_ASN1(decode, 2, LTC_ASN1_OCTET_STRING, skey, MAXBLOCKSIZE); 126 out[x] = skey[x] ^ ecc_shared[x]; 135 zeromem(skey, MAXBLOCKSIZE); 140 XFREE(skey);
|
H A D | ecc_encrypt_key.c | 43 unsigned char *pub_expt, *ecc_shared, *skey; local 73 skey = XMALLOC(MAXBLOCKSIZE); 74 if (pub_expt == NULL || ecc_shared == NULL || skey == NULL) { 81 if (skey != NULL) { 82 XFREE(skey); 102 if ((err = hash_memory(hash, ecc_shared, x, skey, &y)) != CRYPT_OK) { 108 skey[x] ^= in[x]; 114 LTC_ASN1_OCTET_STRING, inlen, skey, 122 zeromem(skey, MAXBLOCKSIZE); 125 XFREE(skey); [all...] |
/external/dropbear/libtomcrypt/src/ciphers/ |
H A D | xtea.c | 34 int xtea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 39 LTC_ARGCHK(skey != NULL); 57 skey->xtea.A[x] = (sum + K[sum&3]) & 0xFFFFFFFFUL; 59 skey->xtea.B[x] = (sum + K[(sum>>11)&3]) & 0xFFFFFFFFUL; 73 @param skey The key as scheduled 76 int xtea_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 83 LTC_ARGCHK(skey != NULL); 88 y = (y + ((((z<<4)^(z>>5)) + z) ^ skey->xtea.A[r])) & 0xFFFFFFFFUL; 89 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r])) & 0xFFFFFFFFUL; 91 y = (y + ((((z<<4)^(z>>5)) + z) ^ skey 112 xtea_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 184 xtea_done(symmetric_key *skey) argument [all...] |
H A D | rc2.c | 67 @param skey The key in as scheduled by this function. 70 int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 72 unsigned *xkey = skey->rc2.xkey; 78 LTC_ARGCHK(skey != NULL); 127 @param skey The key as scheduled 133 symmetric_key *skey) 137 symmetric_key *skey) 145 LTC_ARGCHK(skey != NULL); 147 xkey = skey->rc2.xkey; 190 symmetric_key *skey) 131 _rc2_ecb_encrypt( const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 188 rc2_ecb_encrypt( const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 209 _rc2_ecb_decrypt( const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 267 rc2_ecb_decrypt( const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 335 rc2_done(symmetric_key *skey) argument [all...] |
H A D | blowfish.c | 305 @param skey The key in as scheduled by this function. 309 symmetric_key *skey) 315 LTC_ARGCHK(skey != NULL); 336 skey->blowfish.K[x] = ORIG_P[x] ^ A; 342 skey->blowfish.S[x][y] = ORIG_S[x][y]; 353 blowfish_ecb_encrypt(B, B, skey); 355 LOAD32H(skey->blowfish.K[x], &B[0]); 356 LOAD32H(skey->blowfish.K[x+1], &B[4]); 363 blowfish_ecb_encrypt(B, B, skey); 365 LOAD32H(skey 308 blowfish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 391 _blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 437 blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 453 _blowfish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 498 blowfish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 568 blowfish_done(symmetric_key *skey) argument [all...] |
H A D | kasumi.c | 141 int kasumi_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 148 LTC_ARGCHK(skey != NULL); 154 temp = FL(left, n, skey); 155 temp = FO(temp, n++, skey); 157 temp = FO(right, n, skey); 158 temp = FL(temp, n++, skey); 168 int kasumi_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 175 LTC_ARGCHK(skey != NULL); 181 temp = FO(right, n, skey); 182 temp = FL(temp, n--, skey); 195 kasumi_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 237 kasumi_done(symmetric_key *skey) argument [all...] |
H A D | khazad.c | 593 @param skey The key in as scheduled by this function. 596 int khazad_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 603 LTC_ARGCHK(skey != NULL); 643 skey->khazad.roundKeyEnc[r] = 653 K2 = K1; K1 = skey->khazad.roundKeyEnc[r]; 659 skey->khazad.roundKeyDec[0] = skey->khazad.roundKeyEnc[R]; 661 K1 = skey->khazad.roundKeyEnc[R - r]; 662 skey->khazad.roundKeyDec[r] = 672 skey 746 khazad_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 762 khazad_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 831 khazad_done(symmetric_key *skey) argument [all...] |
H A D | kseed.c | 199 @param skey The key in as scheduled by this function. 202 int kseed_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 222 skey->kseed.K[2*i+0] = G(k1 + k3 - KCi[i]); 223 skey->kseed.K[2*i+1] = G(k2 - k4 + KCi[i]); 234 skey->kseed.dK[2*(15-i)+0] = skey->kseed.K[2*i+0]; 235 skey->kseed.dK[2*(15-i)+1] = skey->kseed.K[2*i+1]; 256 @param skey The key as scheduled 259 int kseed_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 281 kseed_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 299 kseed_done(symmetric_key *skey) argument [all...] |
H A D | noekeon.c | 72 @param skey The key in as scheduled by this function. 75 int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 80 LTC_ARGCHK(skey != NULL); 90 LOAD32H(skey->noekeon.K[0],&key[0]); 91 LOAD32H(skey->noekeon.K[1],&key[4]); 92 LOAD32H(skey->noekeon.K[2],&key[8]); 93 LOAD32H(skey->noekeon.K[3],&key[12]); 95 LOAD32H(skey->noekeon.dK[0],&key[0]); 96 LOAD32H(skey->noekeon.dK[1],&key[4]); 97 LOAD32H(skey 113 _noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 151 noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 167 _noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 204 noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 278 noekeon_done(symmetric_key *skey) argument [all...] |
H A D | rc5.c | 50 @param skey The key in as scheduled by this function. 54 static int _rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 56 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 61 LTC_ARGCHK(skey != NULL); 78 skey->rc5.rounds = num_rounds; 79 S = skey->rc5.K; 112 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 115 x = _rc5_setup(key, keylen, num_rounds, skey); 125 @param skey The key as scheduled 129 static int _rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 168 rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 184 _rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 224 rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 295 rc5_done(symmetric_key *skey) argument [all...] |
H A D | rc6.c | 47 @param skey The key in as scheduled by this function. 51 static int _rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 53 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 59 LTC_ARGCHK(skey != NULL); 101 skey->rc6.K[i] = S[i]; 107 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 110 x = _rc6_setup(key, keylen, num_rounds, skey); 120 @param skey The key as scheduled 123 static int _rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 125 int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) 162 rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 177 _rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 218 rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 322 rc6_done(symmetric_key *skey) argument [all...] |
H A D | skipjack.c | 64 @param skey The key in as scheduled by this function. 67 int skipjack_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 72 LTC_ARGCHK(skey != NULL); 84 skey->skipjack.key[x] = key[x] & 255; 91 tmp = g_func(w1, &kp, skey->skipjack.key); \ 97 tmp = g_func(w1, &kp, skey->skipjack.key); \ 104 w1 = ig_func(w2, &kp, skey->skipjack.key); \ 108 tmp = ig_func(w2, &kp, skey->skipjack.key); \ 140 @param skey The key as scheduled 144 static int _skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 192 skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 208 _skipjack_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 260 skipjack_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 319 skipjack_done(symmetric_key *skey) argument [all...] |
H A D | anubis.c | 891 @param skey The key in as scheduled by this function. 895 static int _anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 897 int anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 906 LTC_ARGCHK(skey != NULL); 912 skey->anubis.keyBits = keylen*8; 918 N = skey->anubis.keyBits >> 5; 923 skey->anubis.R = R = 8 + N; 925 if (num_rounds != 0 && num_rounds != skey->anubis.R) { 983 skey->anubis.roundKeyEnc[r][0] = K0; 984 skey 1029 anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 1139 anubis_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 1155 anubis_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 1521 anubis_done(symmetric_key *skey) argument [all...] |
H A D | cast5.c | 405 @param skey The key in as scheduled by this function. 409 static int _cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 411 int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 419 LTC_ARGCHK(skey != NULL); 447 skey->cast5.K[i++] = S5[GB(z, 0x8)] ^ S6[GB(z, 0x9)] ^ S7[GB(z, 0x7)] ^ S8[GB(z, 0x6)] ^ S5[GB(z, 0x2)]; 448 skey->cast5.K[i++] = S5[GB(z, 0xA)] ^ S6[GB(z, 0xB)] ^ S7[GB(z, 0x5)] ^ S8[GB(z, 0x4)] ^ S6[GB(z, 0x6)]; 449 skey->cast5.K[i++] = S5[GB(z, 0xC)] ^ S6[GB(z, 0xd)] ^ S7[GB(z, 0x3)] ^ S8[GB(z, 0x2)] ^ S7[GB(z, 0x9)]; 450 skey->cast5.K[i++] = S5[GB(z, 0xE)] ^ S6[GB(z, 0xF)] ^ S7[GB(z, 0x1)] ^ S8[GB(z, 0x0)] ^ S8[GB(z, 0xc)]; 456 skey->cast5.K[i++] = S5[GB(x, 0x3)] ^ S6[GB(x, 0x2)] ^ S7[GB(x, 0xc)] ^ S8[GB(x, 0xd)] ^ S5[GB(x, 0x8)]; 457 skey 493 cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 539 _cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 577 cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 592 _cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 630 cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 696 cast5_done(symmetric_key *skey) argument [all...] |
H A D | des.c | 1529 @param skey The key in as scheduled by this function. 1532 int des_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 1535 LTC_ARGCHK(skey != NULL); 1545 deskey(key, EN0, skey->des.ek); 1546 deskey(key, DE1, skey->des.dk); 1557 @param skey The key in as scheduled by this function. 1560 int des3_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 1563 LTC_ARGCHK(skey != NULL); 1573 deskey(key, EN0, skey->des3.ek[0]); 1574 deskey(key+8, DE1, skey 1635 des3_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 1659 des3_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 1872 des3_done(symmetric_key *skey) argument [all...] |
/external/openssh/ |
H A D | auth-skey.c | 1 /* $OpenBSD: auth-skey.c,v 1.27 2007/01/21 01:41:54 stevesk Exp $ */ 35 #include <skey.h> 57 struct skey skey; local 59 if (_compat_skeychallenge(&skey, authctxt->user, challenge, 94 "skey", 102 "skey",
|
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
H A D | ccm_memory.c | 49 symmetric_key *skey; local 127 skey = XMALLOC(sizeof(*skey)); 128 if (skey == NULL) { 133 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) { 134 XFREE(skey); 138 skey = uskey; 170 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { 195 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { 205 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) ! [all...] |
/external/dropbear/libtomcrypt/src/ciphers/aes/ |
H A D | aes.c | 120 @param skey The key in as scheduled by this function. 123 int SETUP(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 131 LTC_ARGCHK(skey != NULL); 141 skey->rijndael.Nr = 10 + ((keylen/8)-2)*2; 145 rk = skey->rijndael.eK; 169 temp = skey->rijndael.eK[rk - skey->rijndael.eK + 5]; 192 temp = skey->rijndael.eK[rk - skey->rijndael.eK + 7]; 217 rk = skey 289 _rijndael_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 450 ECB_ENC(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 468 _rijndael_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 630 ECB_DEC(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 729 ECB_DONE(symmetric_key *skey) argument [all...] |
/external/dropbear/libtomcrypt/src/ciphers/safer/ |
H A D | saferp.c | 48 b[0] = (safer_ebox[(b[0] ^ skey->saferp.K[i][0]) & 255] + skey->saferp.K[i+1][0]) & 255; \ 49 b[1] = safer_lbox[(b[1] + skey->saferp.K[i][1]) & 255] ^ skey->saferp.K[i+1][1]; \ 50 b[2] = safer_lbox[(b[2] + skey->saferp.K[i][2]) & 255] ^ skey->saferp.K[i+1][2]; \ 51 b[3] = (safer_ebox[(b[3] ^ skey->saferp.K[i][3]) & 255] + skey->saferp.K[i+1][3]) & 255; \ 52 b[4] = (safer_ebox[(b[4] ^ skey->saferp.K[i][4]) & 255] + skey 139 _round(unsigned char *b, int i, symmetric_key *skey) argument 144 _iround(unsigned char *b, int i, symmetric_key *skey) argument 216 saferp_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument 334 saferp_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument 398 saferp_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument 528 saferp_done(symmetric_key *skey) argument [all...] |
H A D | safer.c | 180 int safer_k64_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) argument 183 LTC_ARGCHK(skey != NULL); 193 Safer_Expand_Userkey(key, key, (unsigned int)(numrounds != 0 ?numrounds:SAFER_K64_DEFAULT_NOF_ROUNDS), 0, skey->safer.key); 197 int safer_sk64_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) argument 200 LTC_ARGCHK(skey != NULL); 210 Safer_Expand_Userkey(key, key, (unsigned int)(numrounds != 0 ?numrounds:SAFER_SK64_DEFAULT_NOF_ROUNDS), 1, skey->safer.key); 214 int safer_k128_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) argument 217 LTC_ARGCHK(skey != NULL); 227 Safer_Expand_Userkey(key, key+8, (unsigned int)(numrounds != 0 ?numrounds:SAFER_K128_DEFAULT_NOF_ROUNDS), 0, skey->safer.key); 231 int safer_sk128_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) argument 249 _safer_ecb_encrypt(const unsigned char *block_in, unsigned char *block_out, symmetric_key *skey) argument 292 safer_ecb_encrypt(const unsigned char *block_in, unsigned char *block_out, symmetric_key *skey) argument 303 _safer_ecb_decrypt(const unsigned char *block_in, unsigned char *block_out, symmetric_key *skey) argument 347 safer_ecb_decrypt(const unsigned char *block_in, unsigned char *block_out, symmetric_key *skey) argument 446 safer_done(symmetric_key *skey) argument [all...] |
/external/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 92 EVP_PKEY *skey; local 93 skey = X509_get_pubkey(signer); 94 ret = OCSP_BASICRESP_verify(bs, skey, 0); 95 EVP_PKEY_free(skey); 388 EVP_PKEY *skey; local 389 skey = X509_get_pubkey(signer); 390 ret = OCSP_REQUEST_verify(req, skey); 391 EVP_PKEY_free(skey);
|
/external/dropbear/libtomcrypt/demos/ |
H A D | tv_gen.c | 162 symmetric_key skey; local 198 if ((err = cipher_descriptor[x].setup(key, kl, 0, &skey)) != CRYPT_OK) { 207 cipher_descriptor[x].ecb_encrypt(pt, pt, &skey); 218 if ((err = cipher_descriptor[x].setup(key, kl, 0, &skey)) != CRYPT_OK) {
|