Searched defs:skey (Results 1 - 25 of 38) sorted by relevance

12

/external/dropbear/libtomcrypt/src/mac/xcbc/
H A Dxcbc_init.c30 symmetric_key *skey; local
47 skey = XCALLOC(1, sizeof(*skey));
48 if (skey == NULL) {
52 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) {
61 cipher_descriptor[cipher].ecb_encrypt(xcbc->K[y], xcbc->K[y], skey);
73 cipher_descriptor[cipher].done(skey);
75 zeromem(skey, sizeof(*skey));
77 XFREE(skey);
[all...]
/external/dropbear/libtomcrypt/src/pk/dsa/
H A Ddsa_decrypt_key.c33 unsigned char *skey, *expt; local
69 skey = XMALLOC(MAXBLOCKSIZE);
70 if (expt == NULL || skey == NULL) {
74 if (skey != NULL) {
75 XFREE(skey);
82 LTC_SET_ASN1(decode, 2, LTC_ASN1_OCTET_STRING, skey, MAXBLOCKSIZE);
115 out[x] = expt[x] ^ skey[x];
123 zeromem(skey, MAXBLOCKSIZE);
127 XFREE(skey);
H A Ddsa_encrypt_key.c37 unsigned char *expt, *skey; local
66 skey = XMALLOC(MAXBLOCKSIZE);
67 if (expt == NULL || skey == NULL) {
71 if (skey != NULL) {
72 XFREE(skey);
102 if ((err = hash_memory(hash, expt, x, skey, &y)) != CRYPT_OK) {
108 skey[x] ^= in[x];
114 LTC_ASN1_OCTET_STRING, inlen, skey,
121 zeromem(skey, MAXBLOCKSIZE);
124 XFREE(skey);
[all...]
/external/dropbear/libtomcrypt/src/pk/ecc/
H A Decc_decrypt_key.c39 unsigned char *ecc_shared, *skey, *pub_expt; local
72 skey = XMALLOC(MAXBLOCKSIZE);
73 if (pub_expt == NULL || ecc_shared == NULL || skey == NULL) {
80 if (skey != NULL) {
81 XFREE(skey);
86 LTC_SET_ASN1(decode, 2, LTC_ASN1_OCTET_STRING, skey, MAXBLOCKSIZE);
126 out[x] = skey[x] ^ ecc_shared[x];
135 zeromem(skey, MAXBLOCKSIZE);
140 XFREE(skey);
H A Decc_encrypt_key.c43 unsigned char *pub_expt, *ecc_shared, *skey; local
73 skey = XMALLOC(MAXBLOCKSIZE);
74 if (pub_expt == NULL || ecc_shared == NULL || skey == NULL) {
81 if (skey != NULL) {
82 XFREE(skey);
102 if ((err = hash_memory(hash, ecc_shared, x, skey, &y)) != CRYPT_OK) {
108 skey[x] ^= in[x];
114 LTC_ASN1_OCTET_STRING, inlen, skey,
122 zeromem(skey, MAXBLOCKSIZE);
125 XFREE(skey);
[all...]
/external/dropbear/libtomcrypt/src/ciphers/
H A Dxtea.c34 int xtea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
39 LTC_ARGCHK(skey != NULL);
57 skey->xtea.A[x] = (sum + K[sum&3]) & 0xFFFFFFFFUL;
59 skey->xtea.B[x] = (sum + K[(sum>>11)&3]) & 0xFFFFFFFFUL;
73 @param skey The key as scheduled
76 int xtea_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
83 LTC_ARGCHK(skey != NULL);
88 y = (y + ((((z<<4)^(z>>5)) + z) ^ skey->xtea.A[r])) & 0xFFFFFFFFUL;
89 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r])) & 0xFFFFFFFFUL;
91 y = (y + ((((z<<4)^(z>>5)) + z) ^ skey
112 xtea_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
184 xtea_done(symmetric_key *skey) argument
[all...]
H A Drc2.c67 @param skey The key in as scheduled by this function.
70 int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
72 unsigned *xkey = skey->rc2.xkey;
78 LTC_ARGCHK(skey != NULL);
127 @param skey The key as scheduled
133 symmetric_key *skey)
137 symmetric_key *skey)
145 LTC_ARGCHK(skey != NULL);
147 xkey = skey->rc2.xkey;
190 symmetric_key *skey)
131 _rc2_ecb_encrypt( const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
188 rc2_ecb_encrypt( const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
209 _rc2_ecb_decrypt( const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
267 rc2_ecb_decrypt( const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
335 rc2_done(symmetric_key *skey) argument
[all...]
H A Dblowfish.c305 @param skey The key in as scheduled by this function.
309 symmetric_key *skey)
315 LTC_ARGCHK(skey != NULL);
336 skey->blowfish.K[x] = ORIG_P[x] ^ A;
342 skey->blowfish.S[x][y] = ORIG_S[x][y];
353 blowfish_ecb_encrypt(B, B, skey);
355 LOAD32H(skey->blowfish.K[x], &B[0]);
356 LOAD32H(skey->blowfish.K[x+1], &B[4]);
363 blowfish_ecb_encrypt(B, B, skey);
365 LOAD32H(skey
308 blowfish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
391 _blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
437 blowfish_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
453 _blowfish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
498 blowfish_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
568 blowfish_done(symmetric_key *skey) argument
[all...]
H A Dkasumi.c141 int kasumi_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
148 LTC_ARGCHK(skey != NULL);
154 temp = FL(left, n, skey);
155 temp = FO(temp, n++, skey);
157 temp = FO(right, n, skey);
158 temp = FL(temp, n++, skey);
168 int kasumi_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
175 LTC_ARGCHK(skey != NULL);
181 temp = FO(right, n, skey);
182 temp = FL(temp, n--, skey);
195 kasumi_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
237 kasumi_done(symmetric_key *skey) argument
[all...]
H A Dkhazad.c593 @param skey The key in as scheduled by this function.
596 int khazad_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
603 LTC_ARGCHK(skey != NULL);
643 skey->khazad.roundKeyEnc[r] =
653 K2 = K1; K1 = skey->khazad.roundKeyEnc[r];
659 skey->khazad.roundKeyDec[0] = skey->khazad.roundKeyEnc[R];
661 K1 = skey->khazad.roundKeyEnc[R - r];
662 skey->khazad.roundKeyDec[r] =
672 skey
746 khazad_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
762 khazad_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
831 khazad_done(symmetric_key *skey) argument
[all...]
H A Dkseed.c199 @param skey The key in as scheduled by this function.
202 int kseed_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
222 skey->kseed.K[2*i+0] = G(k1 + k3 - KCi[i]);
223 skey->kseed.K[2*i+1] = G(k2 - k4 + KCi[i]);
234 skey->kseed.dK[2*(15-i)+0] = skey->kseed.K[2*i+0];
235 skey->kseed.dK[2*(15-i)+1] = skey->kseed.K[2*i+1];
256 @param skey The key as scheduled
259 int kseed_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
281 kseed_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
299 kseed_done(symmetric_key *skey) argument
[all...]
H A Dnoekeon.c72 @param skey The key in as scheduled by this function.
75 int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
80 LTC_ARGCHK(skey != NULL);
90 LOAD32H(skey->noekeon.K[0],&key[0]);
91 LOAD32H(skey->noekeon.K[1],&key[4]);
92 LOAD32H(skey->noekeon.K[2],&key[8]);
93 LOAD32H(skey->noekeon.K[3],&key[12]);
95 LOAD32H(skey->noekeon.dK[0],&key[0]);
96 LOAD32H(skey->noekeon.dK[1],&key[4]);
97 LOAD32H(skey
113 _noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
151 noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
167 _noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
204 noekeon_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
278 noekeon_done(symmetric_key *skey) argument
[all...]
H A Drc5.c50 @param skey The key in as scheduled by this function.
54 static int _rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
56 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
61 LTC_ARGCHK(skey != NULL);
78 skey->rc5.rounds = num_rounds;
79 S = skey->rc5.K;
112 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
115 x = _rc5_setup(key, keylen, num_rounds, skey);
125 @param skey The key as scheduled
129 static int _rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
168 rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
184 _rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
224 rc5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
295 rc5_done(symmetric_key *skey) argument
[all...]
H A Drc6.c47 @param skey The key in as scheduled by this function.
51 static int _rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
53 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
59 LTC_ARGCHK(skey != NULL);
101 skey->rc6.K[i] = S[i];
107 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
110 x = _rc6_setup(key, keylen, num_rounds, skey);
120 @param skey The key as scheduled
123 static int _rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
125 int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey)
162 rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
177 _rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
218 rc6_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
322 rc6_done(symmetric_key *skey) argument
[all...]
H A Dskipjack.c64 @param skey The key in as scheduled by this function.
67 int skipjack_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
72 LTC_ARGCHK(skey != NULL);
84 skey->skipjack.key[x] = key[x] & 255;
91 tmp = g_func(w1, &kp, skey->skipjack.key); \
97 tmp = g_func(w1, &kp, skey->skipjack.key); \
104 w1 = ig_func(w2, &kp, skey->skipjack.key); \
108 tmp = ig_func(w2, &kp, skey->skipjack.key); \
140 @param skey The key as scheduled
144 static int _skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
192 skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
208 _skipjack_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
260 skipjack_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
319 skipjack_done(symmetric_key *skey) argument
[all...]
H A Danubis.c891 @param skey The key in as scheduled by this function.
895 static int _anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
897 int anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
906 LTC_ARGCHK(skey != NULL);
912 skey->anubis.keyBits = keylen*8;
918 N = skey->anubis.keyBits >> 5;
923 skey->anubis.R = R = 8 + N;
925 if (num_rounds != 0 && num_rounds != skey->anubis.R) {
983 skey->anubis.roundKeyEnc[r][0] = K0;
984 skey
1029 anubis_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
1139 anubis_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
1155 anubis_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
1521 anubis_done(symmetric_key *skey) argument
[all...]
H A Dcast5.c405 @param skey The key in as scheduled by this function.
409 static int _cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
411 int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
419 LTC_ARGCHK(skey != NULL);
447 skey->cast5.K[i++] = S5[GB(z, 0x8)] ^ S6[GB(z, 0x9)] ^ S7[GB(z, 0x7)] ^ S8[GB(z, 0x6)] ^ S5[GB(z, 0x2)];
448 skey->cast5.K[i++] = S5[GB(z, 0xA)] ^ S6[GB(z, 0xB)] ^ S7[GB(z, 0x5)] ^ S8[GB(z, 0x4)] ^ S6[GB(z, 0x6)];
449 skey->cast5.K[i++] = S5[GB(z, 0xC)] ^ S6[GB(z, 0xd)] ^ S7[GB(z, 0x3)] ^ S8[GB(z, 0x2)] ^ S7[GB(z, 0x9)];
450 skey->cast5.K[i++] = S5[GB(z, 0xE)] ^ S6[GB(z, 0xF)] ^ S7[GB(z, 0x1)] ^ S8[GB(z, 0x0)] ^ S8[GB(z, 0xc)];
456 skey->cast5.K[i++] = S5[GB(x, 0x3)] ^ S6[GB(x, 0x2)] ^ S7[GB(x, 0xc)] ^ S8[GB(x, 0xd)] ^ S5[GB(x, 0x8)];
457 skey
493 cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
539 _cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
577 cast5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
592 _cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
630 cast5_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
696 cast5_done(symmetric_key *skey) argument
[all...]
H A Ddes.c1529 @param skey The key in as scheduled by this function.
1532 int des_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
1535 LTC_ARGCHK(skey != NULL);
1545 deskey(key, EN0, skey->des.ek);
1546 deskey(key, DE1, skey->des.dk);
1557 @param skey The key in as scheduled by this function.
1560 int des3_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
1563 LTC_ARGCHK(skey != NULL);
1573 deskey(key, EN0, skey->des3.ek[0]);
1574 deskey(key+8, DE1, skey
1635 des3_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
1659 des3_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
1872 des3_done(symmetric_key *skey) argument
[all...]
/external/openssh/
H A Dauth-skey.c1 /* $OpenBSD: auth-skey.c,v 1.27 2007/01/21 01:41:54 stevesk Exp $ */
35 #include <skey.h>
57 struct skey skey; local
59 if (_compat_skeychallenge(&skey, authctxt->user, challenge,
94 "skey",
102 "skey",
/external/dropbear/libtomcrypt/src/encauth/ccm/
H A Dccm_memory.c49 symmetric_key *skey; local
127 skey = XMALLOC(sizeof(*skey));
128 if (skey == NULL) {
133 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) {
134 XFREE(skey);
138 skey = uskey;
170 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) {
195 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) {
205 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) !
[all...]
/external/chromium_org/third_party/openssl/openssl/crypto/ocsp/
H A Docsp_vfy.c92 EVP_PKEY *skey; local
93 skey = X509_get_pubkey(signer);
94 if (skey)
96 ret = OCSP_BASICRESP_verify(bs, skey, 0);
97 EVP_PKEY_free(skey);
99 if(!skey || ret <= 0)
392 EVP_PKEY *skey; local
393 skey = X509_get_pubkey(signer);
394 ret = OCSP_REQUEST_verify(req, skey);
395 EVP_PKEY_free(skey);
[all...]
/external/dropbear/libtomcrypt/src/ciphers/aes/
H A Daes.c120 @param skey The key in as scheduled by this function.
123 int SETUP(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
131 LTC_ARGCHK(skey != NULL);
141 skey->rijndael.Nr = 10 + ((keylen/8)-2)*2;
145 rk = skey->rijndael.eK;
169 temp = skey->rijndael.eK[rk - skey->rijndael.eK + 5];
192 temp = skey->rijndael.eK[rk - skey->rijndael.eK + 7];
217 rk = skey
289 _rijndael_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
450 ECB_ENC(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
468 _rijndael_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
630 ECB_DEC(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
729 ECB_DONE(symmetric_key *skey) argument
[all...]
/external/dropbear/libtomcrypt/src/ciphers/safer/
H A Dsaferp.c48 b[0] = (safer_ebox[(b[0] ^ skey->saferp.K[i][0]) & 255] + skey->saferp.K[i+1][0]) & 255; \
49 b[1] = safer_lbox[(b[1] + skey->saferp.K[i][1]) & 255] ^ skey->saferp.K[i+1][1]; \
50 b[2] = safer_lbox[(b[2] + skey->saferp.K[i][2]) & 255] ^ skey->saferp.K[i+1][2]; \
51 b[3] = (safer_ebox[(b[3] ^ skey->saferp.K[i][3]) & 255] + skey->saferp.K[i+1][3]) & 255; \
52 b[4] = (safer_ebox[(b[4] ^ skey->saferp.K[i][4]) & 255] + skey
139 _round(unsigned char *b, int i, symmetric_key *skey) argument
144 _iround(unsigned char *b, int i, symmetric_key *skey) argument
216 saferp_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) argument
334 saferp_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) argument
398 saferp_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) argument
528 saferp_done(symmetric_key *skey) argument
[all...]
/external/openssl/crypto/ocsp/
H A Docsp_vfy.c92 EVP_PKEY *skey; local
93 skey = X509_get_pubkey(signer);
94 if (skey)
96 ret = OCSP_BASICRESP_verify(bs, skey, 0);
97 EVP_PKEY_free(skey);
99 if(!skey || ret <= 0)
392 EVP_PKEY *skey; local
393 skey = X509_get_pubkey(signer);
394 ret = OCSP_REQUEST_verify(req, skey);
395 EVP_PKEY_free(skey);
[all...]
/external/dropbear/libtomcrypt/demos/
H A Dtv_gen.c162 symmetric_key skey; local
198 if ((err = cipher_descriptor[x].setup(key, kl, 0, &skey)) != CRYPT_OK) {
207 cipher_descriptor[x].ecb_encrypt(pt, pt, &skey);
218 if ((err = cipher_descriptor[x].setup(key, kl, 0, &skey)) != CRYPT_OK) {

Completed in 362 milliseconds

12