/external/dropbear/libtomcrypt/src/ciphers/safer/ |
saferp.c | 48 b[0] = (safer_ebox[(b[0] ^ skey->saferp.K[i][0]) & 255] + skey->saferp.K[i+1][0]) & 255; \ 49 b[1] = safer_lbox[(b[1] + skey->saferp.K[i][1]) & 255] ^ skey->saferp.K[i+1][1]; \ 50 b[2] = safer_lbox[(b[2] + skey->saferp.K[i][2]) & 255] ^ skey->saferp.K[i+1][2]; \ 51 b[3] = (safer_ebox[(b[3] ^ skey->saferp.K[i][3]) & 255] + skey->saferp.K[i+1][3]) & 255; \ 52 b[4] = (safer_ebox[(b[4] ^ skey->saferp.K[i][4]) & 255] + skey->saferp.K[i+1][4]) & 255; [all...] |
safer.c | 180 int safer_k64_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) 183 LTC_ARGCHK(skey != NULL); 193 Safer_Expand_Userkey(key, key, (unsigned int)(numrounds != 0 ?numrounds:SAFER_K64_DEFAULT_NOF_ROUNDS), 0, skey->safer.key); 197 int safer_sk64_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) 200 LTC_ARGCHK(skey != NULL); 210 Safer_Expand_Userkey(key, key, (unsigned int)(numrounds != 0 ?numrounds:SAFER_SK64_DEFAULT_NOF_ROUNDS), 1, skey->safer.key); 214 int safer_k128_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) 217 LTC_ARGCHK(skey != NULL); 227 Safer_Expand_Userkey(key, key+8, (unsigned int)(numrounds != 0 ?numrounds:SAFER_K128_DEFAULT_NOF_ROUNDS), 0, skey->safer.key); 231 int safer_sk128_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) [all...] |
/external/dropbear/libtomcrypt/src/ciphers/ |
xtea.c | 34 int xtea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 39 LTC_ARGCHK(skey != NULL); 57 skey->xtea.A[x] = (sum + K[sum&3]) & 0xFFFFFFFFUL; 59 skey->xtea.B[x] = (sum + K[(sum>>11)&3]) & 0xFFFFFFFFUL; 73 @param skey The key as scheduled 76 int xtea_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) 83 LTC_ARGCHK(skey != NULL); 88 y = (y + ((((z<<4)^(z>>5)) + z) ^ skey->xtea.A[r])) & 0xFFFFFFFFUL; 89 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r])) & 0xFFFFFFFFUL; 91 y = (y + ((((z<<4)^(z>>5)) + z) ^ skey->xtea.A[r+1])) & 0xFFFFFFFFUL [all...] |
rc5.c | 50 @param skey The key in as scheduled by this function. 54 static int _rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 56 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 61 LTC_ARGCHK(skey != NULL); 78 skey->rc5.rounds = num_rounds; 79 S = skey->rc5.K; 112 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 115 x = _rc5_setup(key, keylen, num_rounds, skey); 125 @param skey The key as scheduled 129 static int _rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) [all...] |
noekeon.c | 72 @param skey The key in as scheduled by this function. 75 int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 80 LTC_ARGCHK(skey != NULL); 90 LOAD32H(skey->noekeon.K[0],&key[0]); 91 LOAD32H(skey->noekeon.K[1],&key[4]); 92 LOAD32H(skey->noekeon.K[2],&key[8]); 93 LOAD32H(skey->noekeon.K[3],&key[12]); 95 LOAD32H(skey->noekeon.dK[0],&key[0]); 96 LOAD32H(skey->noekeon.dK[1],&key[4]); 97 LOAD32H(skey->noekeon.dK[2],&key[8]) [all...] |
cast5.c | 405 @param skey The key in as scheduled by this function. 409 static int _cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 411 int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 419 LTC_ARGCHK(skey != NULL); 447 skey->cast5.K[i++] = S5[GB(z, 0x8)] ^ S6[GB(z, 0x9)] ^ S7[GB(z, 0x7)] ^ S8[GB(z, 0x6)] ^ S5[GB(z, 0x2)]; 448 skey->cast5.K[i++] = S5[GB(z, 0xA)] ^ S6[GB(z, 0xB)] ^ S7[GB(z, 0x5)] ^ S8[GB(z, 0x4)] ^ S6[GB(z, 0x6)]; 449 skey->cast5.K[i++] = S5[GB(z, 0xC)] ^ S6[GB(z, 0xd)] ^ S7[GB(z, 0x3)] ^ S8[GB(z, 0x2)] ^ S7[GB(z, 0x9)]; 450 skey->cast5.K[i++] = S5[GB(z, 0xE)] ^ S6[GB(z, 0xF)] ^ S7[GB(z, 0x1)] ^ S8[GB(z, 0x0)] ^ S8[GB(z, 0xc)]; [all...] |
blowfish.c | 305 @param skey The key in as scheduled by this function. 309 symmetric_key *skey) 315 LTC_ARGCHK(skey != NULL); 336 skey->blowfish.K[x] = ORIG_P[x] ^ A; 342 skey->blowfish.S[x][y] = ORIG_S[x][y]; 353 blowfish_ecb_encrypt(B, B, skey); 355 LOAD32H(skey->blowfish.K[x], &B[0]); 356 LOAD32H(skey->blowfish.K[x+1], &B[4]); 363 blowfish_ecb_encrypt(B, B, skey); 365 LOAD32H(skey->blowfish.S[x][y], &B[0]) [all...] |
rc6.c | 47 @param skey The key in as scheduled by this function. 51 static int _rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 53 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 59 LTC_ARGCHK(skey != NULL); 101 skey->rc6.K[i] = S[i]; 107 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 110 x = _rc6_setup(key, keylen, num_rounds, skey); 120 @param skey The key as scheduled 123 static int _rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) 125 int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) [all...] |
rc2.c | 67 @param skey The key in as scheduled by this function. 70 int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 72 unsigned *xkey = skey->rc2.xkey; 78 LTC_ARGCHK(skey != NULL); 127 @param skey The key as scheduled 133 symmetric_key *skey) 137 symmetric_key *skey) 145 LTC_ARGCHK(skey != NULL); 147 xkey = skey->rc2.xkey; 190 symmetric_key *skey) [all...] |
kasumi.c | 141 int kasumi_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) 148 LTC_ARGCHK(skey != NULL); 154 temp = FL(left, n, skey); 155 temp = FO(temp, n++, skey); 157 temp = FO(right, n, skey); 158 temp = FL(temp, n++, skey); 168 int kasumi_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey) 175 LTC_ARGCHK(skey != NULL); 181 temp = FO(right, n, skey); 182 temp = FL(temp, n--, skey); [all...] |
skipjack.c | 64 @param skey The key in as scheduled by this function. 67 int skipjack_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 72 LTC_ARGCHK(skey != NULL); 84 skey->skipjack.key[x] = key[x] & 255; 91 tmp = g_func(w1, &kp, skey->skipjack.key); \ 97 tmp = g_func(w1, &kp, skey->skipjack.key); \ 104 w1 = ig_func(w2, &kp, skey->skipjack.key); \ 108 tmp = ig_func(w2, &kp, skey->skipjack.key); \ 140 @param skey The key as scheduled 144 static int _skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) [all...] |
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_cipher.h | 335 @param skey [out] The destination of the scheduled key 338 int (*setup)(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey); 342 @param skey The scheduled key 345 int (*ecb_encrypt)(const unsigned char *pt, unsigned char *ct, symmetric_key *skey); 349 @param skey The scheduled key 352 int (*ecb_decrypt)(const unsigned char *ct, unsigned char *pt, symmetric_key *skey); 359 @param skey The scheduled key 361 void (*done)(symmetric_key *skey); 374 @param skey The scheduled key context 377 int (*accel_ecb_encrypt)(const unsigned char *pt, unsigned char *ct, unsigned long blocks, symmetric_key *skey); [all...] |
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_init.c | 30 symmetric_key *skey; local 47 skey = XCALLOC(1, sizeof(*skey)); 48 if (skey == NULL) { 52 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) { 61 cipher_descriptor[cipher].ecb_encrypt(xcbc->K[y], xcbc->K[y], skey); 73 cipher_descriptor[cipher].done(skey); 75 zeromem(skey, sizeof(*skey)); 77 XFREE(skey); [all...] |
/external/dropbear/libtomcrypt/notes/etc/ |
saferp_optimizer.c | 21 b[0] = (safer_ebox[(b[0] ^ skey->saferp.K[i][0]) & 255] + skey->saferp.K[i+1][0]) & 255; \ 22 b[1] = safer_lbox[(b[1] + skey->saferp.K[i][1]) & 255] ^ skey->saferp.K[i+1][1]; \ 23 b[2] = safer_lbox[(b[2] + skey->saferp.K[i][2]) & 255] ^ skey->saferp.K[i+1][2]; \ 24 b[3] = (safer_ebox[(b[3] ^ skey->saferp.K[i][3]) & 255] + skey->saferp.K[i+1][3]) & 255; \ 25 b[4] = (safer_ebox[(b[4] ^ skey->saferp.K[i][4]) & 255] + skey->saferp.K[i+1][4]) & 255; [all...] |
/external/dropbear/libtomcrypt/src/pk/dsa/ |
dsa_encrypt_key.c | 37 unsigned char *expt, *skey; local 66 skey = XMALLOC(MAXBLOCKSIZE); 67 if (expt == NULL || skey == NULL) { 71 if (skey != NULL) { 72 XFREE(skey); 102 if ((err = hash_memory(hash, expt, x, skey, &y)) != CRYPT_OK) { 108 skey[x] ^= in[x]; 114 LTC_ASN1_OCTET_STRING, inlen, skey, 121 zeromem(skey, MAXBLOCKSIZE); 124 XFREE(skey); [all...] |
dsa_decrypt_key.c | 33 unsigned char *skey, *expt; local 69 skey = XMALLOC(MAXBLOCKSIZE); 70 if (expt == NULL || skey == NULL) { 74 if (skey != NULL) { 75 XFREE(skey); 82 LTC_SET_ASN1(decode, 2, LTC_ASN1_OCTET_STRING, skey, MAXBLOCKSIZE); 115 out[x] = expt[x] ^ skey[x]; 123 zeromem(skey, MAXBLOCKSIZE); 127 XFREE(skey);
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
ecc_encrypt_key.c | 43 unsigned char *pub_expt, *ecc_shared, *skey; local 73 skey = XMALLOC(MAXBLOCKSIZE); 74 if (pub_expt == NULL || ecc_shared == NULL || skey == NULL) { 81 if (skey != NULL) { 82 XFREE(skey); 102 if ((err = hash_memory(hash, ecc_shared, x, skey, &y)) != CRYPT_OK) { 108 skey[x] ^= in[x]; 114 LTC_ASN1_OCTET_STRING, inlen, skey, 122 zeromem(skey, MAXBLOCKSIZE); 125 XFREE(skey); [all...] |
ecc_decrypt_key.c | 39 unsigned char *ecc_shared, *skey, *pub_expt; local 72 skey = XMALLOC(MAXBLOCKSIZE); 73 if (pub_expt == NULL || ecc_shared == NULL || skey == NULL) { 80 if (skey != NULL) { 81 XFREE(skey); 86 LTC_SET_ASN1(decode, 2, LTC_ASN1_OCTET_STRING, skey, MAXBLOCKSIZE); 126 out[x] = skey[x] ^ ecc_shared[x]; 135 zeromem(skey, MAXBLOCKSIZE); 140 XFREE(skey);
|
/external/dropbear/libtomcrypt/src/ciphers/twofish/ |
twofish.c | 280 #define S1 skey->twofish.S[0] 281 #define S2 skey->twofish.S[1] 282 #define S3 skey->twofish.S[2] 283 #define S4 skey->twofish.S[3] 342 @param skey The key in as scheduled by this function. 346 static int _twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 348 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 359 LTC_ARGCHK(skey != NULL); 385 rs_mult(M+(x*8), skey->twofish.S+(x*4)); 407 skey->twofish.K[x+x] = (A + B) & 0xFFFFFFFFUL [all...] |
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
ccm_memory.c | 49 symmetric_key *skey; local 127 skey = XMALLOC(sizeof(*skey)); 128 if (skey == NULL) { 133 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) { 134 XFREE(skey); 138 skey = uskey; 170 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { 195 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) { 205 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/openssl/ |
PEMUtilities.java | 30 Key sKey; 62 sKey = getKey(password, alg, 24, iv, des2); 67 sKey = getKey(password, alg, 8, iv); 72 sKey = getKey(password, alg, 16, iv); 86 sKey = getKey(password, alg, keyBits / 8, iv); 123 sKey = getKey(password, "AES", keyBits / 8, salt); 139 c.init(mode, sKey); 143 c.init(mode, sKey, paramSpec);
|
/packages/inputmethods/PinyinIME/src/com/android/inputmethod/pinyin/ |
SoftKeyboard.java | 316 SoftKey sKey = softKeys.get(i); 317 if (sKey.mLeft <= x && sKey.mTop <= y && sKey.mRight > x 318 && sKey.mBottom > y) { 319 return sKey; 337 SoftKey sKey = softKeys.get(i); 338 int disx = (sKey.mLeft + sKey.mRight) / 2 - x; 339 int disy = (sKey.mTop + sKey.mBottom) / 2 - y [all...] |
/external/wpa_supplicant/ |
crypto_libtomcrypt.c | 48 symmetric_key skey; local 59 des_setup(pkey, 8, 0, &skey); 60 des_ecb_encrypt(clear, cypher, &skey); 61 des_done(&skey); 92 symmetric_key *skey; local 93 skey = os_malloc(sizeof(*skey)); 94 if (skey == NULL) 96 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 97 os_free(skey); 106 symmetric_key *skey = ctx; local 113 symmetric_key *skey = ctx; local 121 symmetric_key *skey; local 135 symmetric_key *skey = ctx; local 142 symmetric_key *skey = ctx; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_libtomcrypt.c | 48 symmetric_key skey; local 59 des_setup(pkey, 8, 0, &skey); 60 des_ecb_encrypt(clear, cypher, &skey); 61 des_done(&skey); 92 symmetric_key *skey; local 93 skey = os_malloc(sizeof(*skey)); 94 if (skey == NULL) 96 if (aes_setup(key, len, 0, skey) != CRYPT_OK) { 97 os_free(skey); 106 symmetric_key *skey = ctx; local 113 symmetric_key *skey = ctx; local 121 symmetric_key *skey; local 135 symmetric_key *skey = ctx; local 142 symmetric_key *skey = ctx; local [all...] |
/external/dropbear/libtomcrypt/src/ciphers/aes/ |
aes.c | 120 @param skey The key in as scheduled by this function. 123 int SETUP(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) 131 LTC_ARGCHK(skey != NULL); 141 skey->rijndael.Nr = 10 + ((keylen/8)-2)*2; 145 rk = skey->rijndael.eK; 169 temp = skey->rijndael.eK[rk - skey->rijndael.eK + 5]; 192 temp = skey->rijndael.eK[rk - skey->rijndael.eK + 7]; 217 rk = skey->rijndael.dK [all...] |