HomeSort by relevance Sort by last modified time
    Searched full:skey (Results 1 - 25 of 51) sorted by null

1 2 3

  /external/dropbear/libtomcrypt/src/ciphers/safer/
saferp.c 48 b[0] = (safer_ebox[(b[0] ^ skey->saferp.K[i][0]) & 255] + skey->saferp.K[i+1][0]) & 255; \
49 b[1] = safer_lbox[(b[1] + skey->saferp.K[i][1]) & 255] ^ skey->saferp.K[i+1][1]; \
50 b[2] = safer_lbox[(b[2] + skey->saferp.K[i][2]) & 255] ^ skey->saferp.K[i+1][2]; \
51 b[3] = (safer_ebox[(b[3] ^ skey->saferp.K[i][3]) & 255] + skey->saferp.K[i+1][3]) & 255; \
52 b[4] = (safer_ebox[(b[4] ^ skey->saferp.K[i][4]) & 255] + skey->saferp.K[i+1][4]) & 255;
    [all...]
safer.c 180 int safer_k64_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey)
183 LTC_ARGCHK(skey != NULL);
193 Safer_Expand_Userkey(key, key, (unsigned int)(numrounds != 0 ?numrounds:SAFER_K64_DEFAULT_NOF_ROUNDS), 0, skey->safer.key);
197 int safer_sk64_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey)
200 LTC_ARGCHK(skey != NULL);
210 Safer_Expand_Userkey(key, key, (unsigned int)(numrounds != 0 ?numrounds:SAFER_SK64_DEFAULT_NOF_ROUNDS), 1, skey->safer.key);
214 int safer_k128_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey)
217 LTC_ARGCHK(skey != NULL);
227 Safer_Expand_Userkey(key, key+8, (unsigned int)(numrounds != 0 ?numrounds:SAFER_K128_DEFAULT_NOF_ROUNDS), 0, skey->safer.key);
231 int safer_sk128_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey)
    [all...]
  /external/dropbear/libtomcrypt/src/ciphers/
xtea.c 34 int xtea_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
39 LTC_ARGCHK(skey != NULL);
57 skey->xtea.A[x] = (sum + K[sum&3]) & 0xFFFFFFFFUL;
59 skey->xtea.B[x] = (sum + K[(sum>>11)&3]) & 0xFFFFFFFFUL;
73 @param skey The key as scheduled
76 int xtea_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey)
83 LTC_ARGCHK(skey != NULL);
88 y = (y + ((((z<<4)^(z>>5)) + z) ^ skey->xtea.A[r])) & 0xFFFFFFFFUL;
89 z = (z + ((((y<<4)^(y>>5)) + y) ^ skey->xtea.B[r])) & 0xFFFFFFFFUL;
91 y = (y + ((((z<<4)^(z>>5)) + z) ^ skey->xtea.A[r+1])) & 0xFFFFFFFFUL
    [all...]
rc5.c 50 @param skey The key in as scheduled by this function.
54 static int _rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
56 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
61 LTC_ARGCHK(skey != NULL);
78 skey->rc5.rounds = num_rounds;
79 S = skey->rc5.K;
112 int rc5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
115 x = _rc5_setup(key, keylen, num_rounds, skey);
125 @param skey The key as scheduled
129 static int _rc5_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey)
    [all...]
noekeon.c 72 @param skey The key in as scheduled by this function.
75 int noekeon_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
80 LTC_ARGCHK(skey != NULL);
90 LOAD32H(skey->noekeon.K[0],&key[0]);
91 LOAD32H(skey->noekeon.K[1],&key[4]);
92 LOAD32H(skey->noekeon.K[2],&key[8]);
93 LOAD32H(skey->noekeon.K[3],&key[12]);
95 LOAD32H(skey->noekeon.dK[0],&key[0]);
96 LOAD32H(skey->noekeon.dK[1],&key[4]);
97 LOAD32H(skey->noekeon.dK[2],&key[8])
    [all...]
cast5.c 405 @param skey The key in as scheduled by this function.
409 static int _cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
411 int cast5_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
419 LTC_ARGCHK(skey != NULL);
447 skey->cast5.K[i++] = S5[GB(z, 0x8)] ^ S6[GB(z, 0x9)] ^ S7[GB(z, 0x7)] ^ S8[GB(z, 0x6)] ^ S5[GB(z, 0x2)];
448 skey->cast5.K[i++] = S5[GB(z, 0xA)] ^ S6[GB(z, 0xB)] ^ S7[GB(z, 0x5)] ^ S8[GB(z, 0x4)] ^ S6[GB(z, 0x6)];
449 skey->cast5.K[i++] = S5[GB(z, 0xC)] ^ S6[GB(z, 0xd)] ^ S7[GB(z, 0x3)] ^ S8[GB(z, 0x2)] ^ S7[GB(z, 0x9)];
450 skey->cast5.K[i++] = S5[GB(z, 0xE)] ^ S6[GB(z, 0xF)] ^ S7[GB(z, 0x1)] ^ S8[GB(z, 0x0)] ^ S8[GB(z, 0xc)];
    [all...]
blowfish.c 305 @param skey The key in as scheduled by this function.
309 symmetric_key *skey)
315 LTC_ARGCHK(skey != NULL);
336 skey->blowfish.K[x] = ORIG_P[x] ^ A;
342 skey->blowfish.S[x][y] = ORIG_S[x][y];
353 blowfish_ecb_encrypt(B, B, skey);
355 LOAD32H(skey->blowfish.K[x], &B[0]);
356 LOAD32H(skey->blowfish.K[x+1], &B[4]);
363 blowfish_ecb_encrypt(B, B, skey);
365 LOAD32H(skey->blowfish.S[x][y], &B[0])
    [all...]
rc6.c 47 @param skey The key in as scheduled by this function.
51 static int _rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
53 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
59 LTC_ARGCHK(skey != NULL);
101 skey->rc6.K[i] = S[i];
107 int rc6_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
110 x = _rc6_setup(key, keylen, num_rounds, skey);
120 @param skey The key as scheduled
123 static int _rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey)
125 int rc6_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey)
    [all...]
rc2.c 67 @param skey The key in as scheduled by this function.
70 int rc2_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
72 unsigned *xkey = skey->rc2.xkey;
78 LTC_ARGCHK(skey != NULL);
127 @param skey The key as scheduled
133 symmetric_key *skey)
137 symmetric_key *skey)
145 LTC_ARGCHK(skey != NULL);
147 xkey = skey->rc2.xkey;
190 symmetric_key *skey)
    [all...]
kasumi.c 141 int kasumi_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey)
148 LTC_ARGCHK(skey != NULL);
154 temp = FL(left, n, skey);
155 temp = FO(temp, n++, skey);
157 temp = FO(right, n, skey);
158 temp = FL(temp, n++, skey);
168 int kasumi_ecb_decrypt(const unsigned char *ct, unsigned char *pt, symmetric_key *skey)
175 LTC_ARGCHK(skey != NULL);
181 temp = FO(right, n, skey);
182 temp = FL(temp, n--, skey);
    [all...]
skipjack.c 64 @param skey The key in as scheduled by this function.
67 int skipjack_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
72 LTC_ARGCHK(skey != NULL);
84 skey->skipjack.key[x] = key[x] & 255;
91 tmp = g_func(w1, &kp, skey->skipjack.key); \
97 tmp = g_func(w1, &kp, skey->skipjack.key); \
104 w1 = ig_func(w2, &kp, skey->skipjack.key); \
108 tmp = ig_func(w2, &kp, skey->skipjack.key); \
140 @param skey The key as scheduled
144 static int _skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey)
    [all...]
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_cipher.h 335 @param skey [out] The destination of the scheduled key
338 int (*setup)(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey);
342 @param skey The scheduled key
345 int (*ecb_encrypt)(const unsigned char *pt, unsigned char *ct, symmetric_key *skey);
349 @param skey The scheduled key
352 int (*ecb_decrypt)(const unsigned char *ct, unsigned char *pt, symmetric_key *skey);
359 @param skey The scheduled key
361 void (*done)(symmetric_key *skey);
374 @param skey The scheduled key context
377 int (*accel_ecb_encrypt)(const unsigned char *pt, unsigned char *ct, unsigned long blocks, symmetric_key *skey);
    [all...]
  /external/dropbear/libtomcrypt/src/mac/xcbc/
xcbc_init.c 30 symmetric_key *skey; local
47 skey = XCALLOC(1, sizeof(*skey));
48 if (skey == NULL) {
52 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) {
61 cipher_descriptor[cipher].ecb_encrypt(xcbc->K[y], xcbc->K[y], skey);
73 cipher_descriptor[cipher].done(skey);
75 zeromem(skey, sizeof(*skey));
77 XFREE(skey);
    [all...]
  /external/dropbear/libtomcrypt/notes/etc/
saferp_optimizer.c 21 b[0] = (safer_ebox[(b[0] ^ skey->saferp.K[i][0]) & 255] + skey->saferp.K[i+1][0]) & 255; \
22 b[1] = safer_lbox[(b[1] + skey->saferp.K[i][1]) & 255] ^ skey->saferp.K[i+1][1]; \
23 b[2] = safer_lbox[(b[2] + skey->saferp.K[i][2]) & 255] ^ skey->saferp.K[i+1][2]; \
24 b[3] = (safer_ebox[(b[3] ^ skey->saferp.K[i][3]) & 255] + skey->saferp.K[i+1][3]) & 255; \
25 b[4] = (safer_ebox[(b[4] ^ skey->saferp.K[i][4]) & 255] + skey->saferp.K[i+1][4]) & 255;
    [all...]
  /external/dropbear/libtomcrypt/src/pk/dsa/
dsa_encrypt_key.c 37 unsigned char *expt, *skey; local
66 skey = XMALLOC(MAXBLOCKSIZE);
67 if (expt == NULL || skey == NULL) {
71 if (skey != NULL) {
72 XFREE(skey);
102 if ((err = hash_memory(hash, expt, x, skey, &y)) != CRYPT_OK) {
108 skey[x] ^= in[x];
114 LTC_ASN1_OCTET_STRING, inlen, skey,
121 zeromem(skey, MAXBLOCKSIZE);
124 XFREE(skey);
    [all...]
dsa_decrypt_key.c 33 unsigned char *skey, *expt; local
69 skey = XMALLOC(MAXBLOCKSIZE);
70 if (expt == NULL || skey == NULL) {
74 if (skey != NULL) {
75 XFREE(skey);
82 LTC_SET_ASN1(decode, 2, LTC_ASN1_OCTET_STRING, skey, MAXBLOCKSIZE);
115 out[x] = expt[x] ^ skey[x];
123 zeromem(skey, MAXBLOCKSIZE);
127 XFREE(skey);
  /external/dropbear/libtomcrypt/src/pk/ecc/
ecc_encrypt_key.c 43 unsigned char *pub_expt, *ecc_shared, *skey; local
73 skey = XMALLOC(MAXBLOCKSIZE);
74 if (pub_expt == NULL || ecc_shared == NULL || skey == NULL) {
81 if (skey != NULL) {
82 XFREE(skey);
102 if ((err = hash_memory(hash, ecc_shared, x, skey, &y)) != CRYPT_OK) {
108 skey[x] ^= in[x];
114 LTC_ASN1_OCTET_STRING, inlen, skey,
122 zeromem(skey, MAXBLOCKSIZE);
125 XFREE(skey);
    [all...]
ecc_decrypt_key.c 39 unsigned char *ecc_shared, *skey, *pub_expt; local
72 skey = XMALLOC(MAXBLOCKSIZE);
73 if (pub_expt == NULL || ecc_shared == NULL || skey == NULL) {
80 if (skey != NULL) {
81 XFREE(skey);
86 LTC_SET_ASN1(decode, 2, LTC_ASN1_OCTET_STRING, skey, MAXBLOCKSIZE);
126 out[x] = skey[x] ^ ecc_shared[x];
135 zeromem(skey, MAXBLOCKSIZE);
140 XFREE(skey);
  /external/dropbear/libtomcrypt/src/ciphers/twofish/
twofish.c 280 #define S1 skey->twofish.S[0]
281 #define S2 skey->twofish.S[1]
282 #define S3 skey->twofish.S[2]
283 #define S4 skey->twofish.S[3]
342 @param skey The key in as scheduled by this function.
346 static int _twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
348 int twofish_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
359 LTC_ARGCHK(skey != NULL);
385 rs_mult(M+(x*8), skey->twofish.S+(x*4));
407 skey->twofish.K[x+x] = (A + B) & 0xFFFFFFFFUL
    [all...]
  /external/dropbear/libtomcrypt/src/encauth/ccm/
ccm_memory.c 49 symmetric_key *skey; local
127 skey = XMALLOC(sizeof(*skey));
128 if (skey == NULL) {
133 if ((err = cipher_descriptor[cipher].setup(key, keylen, 0, skey)) != CRYPT_OK) {
134 XFREE(skey);
138 skey = uskey;
170 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) {
195 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK) {
205 if ((err = cipher_descriptor[cipher].ecb_encrypt(PAD, PAD, skey)) != CRYPT_OK)
    [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/openssl/
PEMUtilities.java 30 Key sKey;
62 sKey = getKey(password, alg, 24, iv, des2);
67 sKey = getKey(password, alg, 8, iv);
72 sKey = getKey(password, alg, 16, iv);
86 sKey = getKey(password, alg, keyBits / 8, iv);
123 sKey = getKey(password, "AES", keyBits / 8, salt);
139 c.init(mode, sKey);
143 c.init(mode, sKey, paramSpec);
  /packages/inputmethods/PinyinIME/src/com/android/inputmethod/pinyin/
SoftKeyboard.java 316 SoftKey sKey = softKeys.get(i);
317 if (sKey.mLeft <= x && sKey.mTop <= y && sKey.mRight > x
318 && sKey.mBottom > y) {
319 return sKey;
337 SoftKey sKey = softKeys.get(i);
338 int disx = (sKey.mLeft + sKey.mRight) / 2 - x;
339 int disy = (sKey.mTop + sKey.mBottom) / 2 - y
    [all...]
  /external/wpa_supplicant/
crypto_libtomcrypt.c 48 symmetric_key skey; local
59 des_setup(pkey, 8, 0, &skey);
60 des_ecb_encrypt(clear, cypher, &skey);
61 des_done(&skey);
92 symmetric_key *skey; local
93 skey = os_malloc(sizeof(*skey));
94 if (skey == NULL)
96 if (aes_setup(key, len, 0, skey) != CRYPT_OK) {
97 os_free(skey);
106 symmetric_key *skey = ctx; local
113 symmetric_key *skey = ctx; local
121 symmetric_key *skey; local
135 symmetric_key *skey = ctx; local
142 symmetric_key *skey = ctx; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
crypto_libtomcrypt.c 48 symmetric_key skey; local
59 des_setup(pkey, 8, 0, &skey);
60 des_ecb_encrypt(clear, cypher, &skey);
61 des_done(&skey);
92 symmetric_key *skey; local
93 skey = os_malloc(sizeof(*skey));
94 if (skey == NULL)
96 if (aes_setup(key, len, 0, skey) != CRYPT_OK) {
97 os_free(skey);
106 symmetric_key *skey = ctx; local
113 symmetric_key *skey = ctx; local
121 symmetric_key *skey; local
135 symmetric_key *skey = ctx; local
142 symmetric_key *skey = ctx; local
    [all...]
  /external/dropbear/libtomcrypt/src/ciphers/aes/
aes.c 120 @param skey The key in as scheduled by this function.
123 int SETUP(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey)
131 LTC_ARGCHK(skey != NULL);
141 skey->rijndael.Nr = 10 + ((keylen/8)-2)*2;
145 rk = skey->rijndael.eK;
169 temp = skey->rijndael.eK[rk - skey->rijndael.eK + 5];
192 temp = skey->rijndael.eK[rk - skey->rijndael.eK + 7];
217 rk = skey->rijndael.dK
    [all...]

Completed in 1545 milliseconds

1 2 3