Searched refs:skey (Results 1 - 25 of 43) sorted by relevance

12

/external/dropbear/libtomcrypt/src/mac/xcbc/
H A Dxcbc_init.c30 symmetric_key *skey; local
47 skey = XCALLOC(1, sizeof(*skey));
48 if (skey == NULL) {
52 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) {
61 cipher_descriptor[cipher].ecb_encrypt(xcbc->K[y], xcbc->K[y], skey);
73 cipher_descriptor[cipher].done(skey);
75 zeromem(skey, sizeof(*skey));
77 XFREE(skey);
[all...]
/external/dropbear/libtomcrypt/src/ciphers/safer/
H A Dsaferp.c48 b[0] = (safer_ebox[(b[0] ^ skey->saferp.K[i][0]) & 255] + skey->saferp.K[i+1][0]) & 255; \
49 b[1] = safer_lbox[(b[1] + skey->saferp.K[i][1]) & 255] ^ skey->saferp.K[i+1][1]; \
50 b[2] = safer_lbox[(b[2] + skey->saferp.K[i][2]) & 255] ^ skey->saferp.K[i+1][2]; \
51 b[3] = (safer_ebox[(b[3] ^ skey->saferp.K[i][3]) & 255] + skey->saferp.K[i+1][3]) & 255; \
52 b[4] = (safer_ebox[(b[4] ^ skey->saferp.K[i][4]) & 255] + skey
139 _round(unsigned char *b, int i, symmetric_key *skey) argument
144 _iround(unsigned char *b, int i, symmetric_key *skey) argument
216 saferp_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
334 saferp_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
398 saferp_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
528 saferp_done(symmetric_key *skey) argument
[all...]
H A Dsafer.c180 int safer_k64_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) argument
183 LTC_ARGCHK(skey != NULL);
193 Safer_Expand_Userkey(key, key, (unsigned int)(numrounds != 0 ?numrounds:SAFER_K64_DEFAULT_NOF_ROUNDS), 0, skey->safer.key);
197 int safer_sk64_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) argument
200 LTC_ARGCHK(skey != NULL);
210 Safer_Expand_Userkey(key, key, (unsigned int)(numrounds != 0 ?numrounds:SAFER_SK64_DEFAULT_NOF_ROUNDS), 1, skey->safer.key);
214 int safer_k128_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) argument
217 LTC_ARGCHK(skey != NULL);
227 Safer_Expand_Userkey(key, key+8, (unsigned int)(numrounds != 0 ?numrounds:SAFER_K128_DEFAULT_NOF_ROUNDS), 0, skey->safer.key);
231 int safer_sk128_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) argument
249 _safer_ecb_encrypt(const unsigned char *block_in, unsigned char *block_out, symmetric_key *skey) argument
292 safer_ecb_encrypt(const unsigned char *block_in, unsigned char *block_out, symmetric_key *skey) argument
303 _safer_ecb_decrypt(const unsigned char *block_in, unsigned char *block_out, symmetric_key *skey) argument
347 safer_ecb_decrypt(const unsigned char *block_in, unsigned char *block_out, symmetric_key *skey) argument
446 safer_done(symmetric_key *skey) argument
[all...]
/external/dropbear/libtomcrypt/src/headers/
H A Dtomcrypt_cipher.h335 @param skey [out] The destination of the scheduled key
338 int (*setup)(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
342 @param skey The scheduled key
345 int (*ecb_encrypt)(const unsigned char *pt, unsigned char *ct, symmetric_key *skey);
349 @param skey The scheduled key
352 int (*ecb_decrypt)(const unsigned char *ct, unsigned char *pt, symmetric_key *skey);
359 @param skey The scheduled key
361 void (*done)(symmetric_key *skey);
374 @param skey The scheduled key context
377 int (*accel_ecb_encrypt)(const unsigned char *pt, unsigned char *ct, unsigned long blocks, symmetric_key *skey);
[all...]
/external/dropbear/libtomcrypt/src/ciphers/
H A Dxtea.c34 int xtea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
39 LTC_ARGCHK(skey != NULL);
57 skey->xtea.A[x] = (sum + K[sum&3]) & 0xFFFFFFFFUL;
59 skey->xtea.B[x] = (sum + K[(sum>>11)&3]) & 0xFFFFFFFFUL;
73 @param skey The key as scheduled
76 int xtea_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
83 LTC_ARGCHK(skey != NULL);
88 y = (y + ((((z<<4)^(z>>5)) + z) ^ skey->xtea.A[r])) & 0xFFFFFFFFUL;
89 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r])) & 0xFFFFFFFFUL;
91 y = (y + ((((z<<4)^(z>>5)) + z) ^ skey
112 xtea_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
184 xtea_done(symmetric_key *skey) argument
[all...]
H A Drc5.c50 @param skey The key in as scheduled by this function.
54 static int _rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
56 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
61 LTC_ARGCHK(skey != NULL);
78 skey->rc5.rounds = num_rounds;
79 S = skey->rc5.K;
112 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
115 x = _rc5_setup(key, keylen, num_rounds, skey);
125 @param skey The key as scheduled
129 static int _rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
168 rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
184 _rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
224 rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
295 rc5_done(symmetric_key *skey) argument
[all...]
H A Dnoekeon.c72 @param skey The key in as scheduled by this function.
75 int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
80 LTC_ARGCHK(skey != NULL);
90 LOAD32H(skey->noekeon.K[0],&key[0]);
91 LOAD32H(skey->noekeon.K[1],&key[4]);
92 LOAD32H(skey->noekeon.K[2],&key[8]);
93 LOAD32H(skey->noekeon.K[3],&key[12]);
95 LOAD32H(skey->noekeon.dK[0],&key[0]);
96 LOAD32H(skey->noekeon.dK[1],&key[4]);
97 LOAD32H(skey
113 _noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
151 noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
167 _noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
204 noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
278 noekeon_done(symmetric_key *skey) argument
[all...]
H A Dkasumi.c141 int kasumi_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
148 LTC_ARGCHK(skey != NULL);
154 temp = FL(left, n, skey);
155 temp = FO(temp, n++, skey);
157 temp = FO(right, n, skey);
158 temp = FL(temp, n++, skey);
168 int kasumi_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
175 LTC_ARGCHK(skey != NULL);
181 temp = FO(right, n, skey);
182 temp = FL(temp, n--, skey);
195 kasumi_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
237 kasumi_done(symmetric_key *skey) argument
[all...]
H A Drc2.c67 @param skey The key in as scheduled by this function.
70 int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
72 unsigned *xkey = skey->rc2.xkey;
78 LTC_ARGCHK(skey != NULL);
127 @param skey The key as scheduled
133 symmetric_key *skey)
137 symmetric_key *skey)
145 LTC_ARGCHK(skey != NULL);
147 xkey = skey->rc2.xkey;
190 symmetric_key *skey)
131 _rc2_ecb_encrypt( const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
188 rc2_ecb_encrypt( const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
209 _rc2_ecb_decrypt( const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
267 rc2_ecb_decrypt( const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
335 rc2_done(symmetric_key *skey) argument
[all...]
H A Drc6.c47 @param skey The key in as scheduled by this function.
51 static int _rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
53 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
59 LTC_ARGCHK(skey != NULL);
101 skey->rc6.K[i] = S[i];
107 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
110 x = _rc6_setup(key, keylen, num_rounds, skey);
120 @param skey The key as scheduled
123 static int _rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
125 int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey)
162 rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
177 _rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
218 rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
322 rc6_done(symmetric_key *skey) argument
[all...]
H A Dcast5.c405 @param skey The key in as scheduled by this function.
409 static int _cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
411 int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
419 LTC_ARGCHK(skey != NULL);
447 skey->cast5.K[i++] = S5[GB(z, 0x8)] ^ S6[GB(z, 0x9)] ^ S7[GB(z, 0x7)] ^ S8[GB(z, 0x6)] ^ S5[GB(z, 0x2)];
448 skey->cast5.K[i++] = S5[GB(z, 0xA)] ^ S6[GB(z, 0xB)] ^ S7[GB(z, 0x5)] ^ S8[GB(z, 0x4)] ^ S6[GB(z, 0x6)];
449 skey->cast5.K[i++] = S5[GB(z, 0xC)] ^ S6[GB(z, 0xd)] ^ S7[GB(z, 0x3)] ^ S8[GB(z, 0x2)] ^ S7[GB(z, 0x9)];
450 skey->cast5.K[i++] = S5[GB(z, 0xE)] ^ S6[GB(z, 0xF)] ^ S7[GB(z, 0x1)] ^ S8[GB(z, 0x0)] ^ S8[GB(z, 0xc)];
456 skey->cast5.K[i++] = S5[GB(x, 0x3)] ^ S6[GB(x, 0x2)] ^ S7[GB(x, 0xc)] ^ S8[GB(x, 0xd)] ^ S5[GB(x, 0x8)];
457 skey
493 cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
539 _cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
577 cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
592 _cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
630 cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
696 cast5_done(symmetric_key *skey) argument
[all...]
H A Dblowfish.c305 @param skey The key in as scheduled by this function.
309 symmetric_key *skey)
315 LTC_ARGCHK(skey != NULL);
336 skey->blowfish.K[x] = ORIG_P[x] ^ A;
342 skey->blowfish.S[x][y] = ORIG_S[x][y];
353 blowfish_ecb_encrypt(B, B, skey);
355 LOAD32H(skey->blowfish.K[x], &B[0]);
356 LOAD32H(skey->blowfish.K[x+1], &B[4]);
363 blowfish_ecb_encrypt(B, B, skey);
365 LOAD32H(skey
308 blowfish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
391 _blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
437 blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
453 _blowfish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
498 blowfish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
568 blowfish_done(symmetric_key *skey) argument
[all...]
H A Dskipjack.c64 @param skey The key in as scheduled by this function.
67 int skipjack_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
72 LTC_ARGCHK(skey != NULL);
84 skey->skipjack.key[x] = key[x] & 255;
91 tmp = g_func(w1, &kp, skey->skipjack.key); \
97 tmp = g_func(w1, &kp, skey->skipjack.key); \
104 w1 = ig_func(w2, &kp, skey->skipjack.key); \
108 tmp = ig_func(w2, &kp, skey->skipjack.key); \
140 @param skey The key as scheduled
144 static int _skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
192 skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
208 _skipjack_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
260 skipjack_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
319 skipjack_done(symmetric_key *skey) argument
[all...]
/external/dropbear/libtomcrypt/notes/etc/
H A Dsaferp_optimizer.c21 b[0] = (safer_ebox[(b[0] ^ skey->saferp.K[i][0]) & 255] + skey->saferp.K[i+1][0]) & 255; \
22 b[1] = safer_lbox[(b[1] + skey->saferp.K[i][1]) & 255] ^ skey->saferp.K[i+1][1]; \
23 b[2] = safer_lbox[(b[2] + skey->saferp.K[i][2]) & 255] ^ skey->saferp.K[i+1][2]; \
24 b[3] = (safer_ebox[(b[3] ^ skey->saferp.K[i][3]) & 255] + skey->saferp.K[i+1][3]) & 255; \
25 b[4] = (safer_ebox[(b[4] ^ skey->saferp.K[i][4]) & 255] + skey
[all...]
/external/dropbear/libtomcrypt/src/encauth/ccm/
H A Dccm_memory.c49 symmetric_key *skey; local
127 skey = XMALLOC(sizeof(*skey));
128 if (skey == NULL) {
133 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) {
134 XFREE(skey);
138 skey = uskey;
170 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) {
195 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) {
205 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) !
[all...]
/external/dropbear/libtomcrypt/src/pk/dsa/
H A Ddsa_encrypt_key.c37 unsigned char *expt, *skey; local
66 skey = XMALLOC(MAXBLOCKSIZE);
67 if (expt == NULL || skey == NULL) {
71 if (skey != NULL) {
72 XFREE(skey);
102 if ((err = hash_memory(hash, expt, x, skey, &y)) != CRYPT_OK) {
108 skey[x] ^= in[x];
114 LTC_ASN1_OCTET_STRING, inlen, skey,
121 zeromem(skey, MAXBLOCKSIZE);
124 XFREE(skey);
[all...]
H A Ddsa_decrypt_key.c33 unsigned char *skey, *expt; local
69 skey = XMALLOC(MAXBLOCKSIZE);
70 if (expt == NULL || skey == NULL) {
74 if (skey != NULL) {
75 XFREE(skey);
82 LTC_SET_ASN1(decode, 2, LTC_ASN1_OCTET_STRING, skey, MAXBLOCKSIZE);
115 out[x] = expt[x] ^ skey[x];
123 zeromem(skey, MAXBLOCKSIZE);
127 XFREE(skey);
/external/dropbear/libtomcrypt/src/pk/ecc/
H A Decc_encrypt_key.c43 unsigned char *pub_expt, *ecc_shared, *skey; local
73 skey = XMALLOC(MAXBLOCKSIZE);
74 if (pub_expt == NULL || ecc_shared == NULL || skey == NULL) {
81 if (skey != NULL) {
82 XFREE(skey);
102 if ((err = hash_memory(hash, ecc_shared, x, skey, &y)) != CRYPT_OK) {
108 skey[x] ^= in[x];
114 LTC_ASN1_OCTET_STRING, inlen, skey,
122 zeromem(skey, MAXBLOCKSIZE);
125 XFREE(skey);
[all...]
H A Decc_decrypt_key.c39 unsigned char *ecc_shared, *skey, *pub_expt; local
72 skey = XMALLOC(MAXBLOCKSIZE);
73 if (pub_expt == NULL || ecc_shared == NULL || skey == NULL) {
80 if (skey != NULL) {
81 XFREE(skey);
86 LTC_SET_ASN1(decode, 2, LTC_ASN1_OCTET_STRING, skey, MAXBLOCKSIZE);
126 out[x] = skey[x] ^ ecc_shared[x];
135 zeromem(skey, MAXBLOCKSIZE);
140 XFREE(skey);
/external/dropbear/libtomcrypt/src/ciphers/twofish/
H A Dtwofish.c280 #define S1 skey->twofish.S[0]
281 #define S2 skey->twofish.S[1]
282 #define S3 skey->twofish.S[2]
283 #define S4 skey->twofish.S[3]
342 @param skey The key in as scheduled by this function.
346 static int _twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
348 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
359 LTC_ARGCHK(skey != NULL);
385 rs_mult(M+(x*8), skey->twofish.S+(x*4));
407 skey
456 twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
473 _twofish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
530 twofish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
546 _twofish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
605 twofish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
685 twofish_done(symmetric_key *skey) argument
[all...]
/external/openssh/
H A Dauth-skey.c1 /* $OpenBSD: auth-skey.c,v 1.27 2007/01/21 01:41:54 stevesk Exp $ */
35 #include <skey.h>
57 struct skey skey; local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
94 "skey",
102 "skey",
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dcrypto_libtomcrypt.c48 symmetric_key skey; local
59 des_setup(pkey, 8, 0, &skey);
60 des_ecb_encrypt(clear, cypher, &skey);
61 des_done(&skey);
92 symmetric_key *skey; local
93 skey = os_malloc(sizeof(*skey));
94 if (skey == NULL)
96 if (aes_setup(key, len, 0, skey) != CRYPT_OK) {
97 os_free(skey);
106 symmetric_key *skey = ctx; local
113 symmetric_key *skey = ctx; local
121 symmetric_key *skey; local
135 symmetric_key *skey = ctx; local
142 symmetric_key *skey = ctx; local
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dcrypto_libtomcrypt.c42 symmetric_key skey; local
53 des_setup(pkey, 8, 0, &skey);
54 des_ecb_encrypt(clear, cypher, &skey);
55 des_done(&skey);
87 symmetric_key *skey; local
88 skey = os_malloc(sizeof(*skey));
89 if (skey == NULL)
91 if (aes_setup(key, len, 0, skey) != CRYPT_OK) {
92 os_free(skey);
101 symmetric_key *skey = ctx; local
108 symmetric_key *skey = ctx; local
116 symmetric_key *skey; local
130 symmetric_key *skey = ctx; local
137 symmetric_key *skey = ctx; local
[all...]
/external/wpa_supplicant_8/src/crypto/
H A Dcrypto_libtomcrypt.c42 symmetric_key skey; local
53 des_setup(pkey, 8, 0, &skey);
54 des_ecb_encrypt(clear, cypher, &skey);
55 des_done(&skey);
87 symmetric_key *skey; local
88 skey = os_malloc(sizeof(*skey));
89 if (skey == NULL)
91 if (aes_setup(key, len, 0, skey) != CRYPT_OK) {
92 os_free(skey);
101 symmetric_key *skey = ctx; local
108 symmetric_key *skey = ctx; local
116 symmetric_key *skey; local
130 symmetric_key *skey = ctx; local
137 symmetric_key *skey = ctx; local
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dcrypto_libtomcrypt.c42 symmetric_key skey; local
53 des_setup(pkey, 8, 0, &skey);
54 des_ecb_encrypt(clear, cypher, &skey);
55 des_done(&skey);
87 symmetric_key *skey; local
88 skey = os_malloc(sizeof(*skey));
89 if (skey == NULL)
91 if (aes_setup(key, len, 0, skey) != CRYPT_OK) {
92 os_free(skey);
101 symmetric_key *skey = ctx; local
108 symmetric_key *skey = ctx; local
116 symmetric_key *skey; local
130 symmetric_key *skey = ctx; local
137 symmetric_key *skey = ctx; local
[all...]

Completed in 1690 milliseconds

12