Home | History | Annotate | Download | only in safer

Lines Matching full:skey

180 int safer_k64_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey)
183 LTC_ARGCHK(skey != NULL);
193 Safer_Expand_Userkey(key, key, (unsigned int)(numrounds != 0 ?numrounds:SAFER_K64_DEFAULT_NOF_ROUNDS), 0, skey->safer.key);
197 int safer_sk64_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey)
200 LTC_ARGCHK(skey != NULL);
210 Safer_Expand_Userkey(key, key, (unsigned int)(numrounds != 0 ?numrounds:SAFER_SK64_DEFAULT_NOF_ROUNDS), 1, skey->safer.key);
214 int safer_k128_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey)
217 LTC_ARGCHK(skey != NULL);
227 Safer_Expand_Userkey(key, key+8, (unsigned int)(numrounds != 0 ?numrounds:SAFER_K128_DEFAULT_NOF_ROUNDS), 0, skey->safer.key);
231 int safer_sk128_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey)
234 LTC_ARGCHK(skey != NULL);
244 Safer_Expand_Userkey(key, key+8, (unsigned int)(numrounds != 0?numrounds:SAFER_SK128_DEFAULT_NOF_ROUNDS), 1, skey->safer.key);
251 symmetric_key *skey)
255 symmetric_key *skey)
263 LTC_ARGCHK(skey != NULL);
265 key = skey->safer.key;
294 symmetric_key *skey)
296 int err = _safer_ecb_encrypt(block_in, block_out, skey);
305 symmetric_key *skey)
309 symmetric_key *skey)
317 LTC_ARGCHK(skey != NULL);
319 key = skey->safer.key;
349 symmetric_key *skey)
351 int err = _safer_ecb_decrypt(block_in, block_out, skey);
388 symmetric_key skey;
393 if ((err = safer_k64_setup(k64_key, 8, 6, &skey)) != CRYPT_OK) {
396 safer_ecb_encrypt(k64_pt, buf[0], &skey);
397 safer_ecb_decrypt(buf[0], buf[1], &skey);
417 symmetric_key skey;
422 if ((err = safer_sk64_setup(sk64_key, 8, 6, &skey)) != CRYPT_OK) {
426 safer_ecb_encrypt(sk64_pt, buf[0], &skey);
427 safer_ecb_decrypt(buf[0], buf[1], &skey);
435 for (y = 0; y < 1000; y++) safer_ecb_encrypt(buf[0], buf[0], &skey);
436 for (y = 0; y < 1000; y++) safer_ecb_decrypt(buf[0], buf[0], &skey);
444 @param skey The scheduled key
446 void safer_done(symmetric_key *skey)
460 symmetric_key skey;
465 if ((err = safer_sk128_setup(sk128_key, 16, 0, &skey)) != CRYPT_OK) {
468 safer_ecb_encrypt(sk128_pt, buf[0], &skey);
469 safer_ecb_decrypt(buf[0], buf[1], &skey);
477 for (y = 0; y < 1000; y++) safer_ecb_encrypt(buf[0], buf[0], &skey);
478 for (y = 0; y < 1000; y++) safer_ecb_decrypt(buf[0], buf[0], &skey);