Lines Matching refs:key
105 safer_key_t key) in _Safer_Expand_Userkey() argument
111 safer_key_t key) in _Safer_Expand_Userkey()
119 *key++ = (unsigned char)nof_rounds; in _Safer_Expand_Userkey()
126 kb[j] = *key++ = userkey_2[j]; in _Safer_Expand_Userkey()
140 *key++ = (ka[k] in _Safer_Expand_Userkey()
144 *key++ = (ka[j] + safer_ebox[(int)safer_ebox[(int)((18 * i + j + 1)&0xFF)]]) & 0xFF; in _Safer_Expand_Userkey()
153 *key++ = (kb[k] in _Safer_Expand_Userkey()
157 … *key++ = (kb[j] + safer_ebox[(int)safer_ebox[(int)((18 * i + j + 10)&0xFF)]]) & 0xFF; in _Safer_Expand_Userkey()
173 safer_key_t key) in Safer_Expand_Userkey() argument
175 _Safer_Expand_Userkey(userkey_1, userkey_2, nof_rounds, strengthened, key); in Safer_Expand_Userkey()
180 int safer_k64_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) in safer_k64_setup() argument
182 LTC_ARGCHK(key != NULL); in safer_k64_setup()
193 …Safer_Expand_Userkey(key, key, (unsigned int)(numrounds != 0 ?numrounds:SAFER_K64_DEFAULT_NOF_ROUN… in safer_k64_setup()
197 int safer_sk64_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) in safer_sk64_setup() argument
199 LTC_ARGCHK(key != NULL); in safer_sk64_setup()
210 …Safer_Expand_Userkey(key, key, (unsigned int)(numrounds != 0 ?numrounds:SAFER_SK64_DEFAULT_NOF_ROU… in safer_sk64_setup()
214 int safer_k128_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) in safer_k128_setup() argument
216 LTC_ARGCHK(key != NULL); in safer_k128_setup()
227 …Safer_Expand_Userkey(key, key+8, (unsigned int)(numrounds != 0 ?numrounds:SAFER_K128_DEFAULT_NOF_R… in safer_k128_setup()
231 int safer_sk128_setup(const unsigned char *key, int keylen, int numrounds, symmetric_key *skey) in safer_sk128_setup() argument
233 LTC_ARGCHK(key != NULL); in safer_sk128_setup()
244 …Safer_Expand_Userkey(key, key+8, (unsigned int)(numrounds != 0?numrounds:SAFER_SK128_DEFAULT_NOF_R… in safer_sk128_setup()
259 unsigned char *key; in _safer_ecb_encrypt() local
265 key = skey->safer.key; in _safer_ecb_encrypt()
268 if (SAFER_MAX_NOF_ROUNDS < (round = *key)) round = SAFER_MAX_NOF_ROUNDS; in _safer_ecb_encrypt()
271 a ^= *++key; b += *++key; c += *++key; d ^= *++key; in _safer_ecb_encrypt()
272 e ^= *++key; f += *++key; g += *++key; h ^= *++key; in _safer_ecb_encrypt()
273 a = EXP(a) + *++key; b = LOG(b) ^ *++key; in _safer_ecb_encrypt()
274 c = LOG(c) ^ *++key; d = EXP(d) + *++key; in _safer_ecb_encrypt()
275 e = EXP(e) + *++key; f = LOG(f) ^ *++key; in _safer_ecb_encrypt()
276 g = LOG(g) ^ *++key; h = EXP(h) + *++key; in _safer_ecb_encrypt()
282 a ^= *++key; b += *++key; c += *++key; d ^= *++key; in _safer_ecb_encrypt()
283 e ^= *++key; f += *++key; g += *++key; h ^= *++key; in _safer_ecb_encrypt()
313 unsigned char *key; in _safer_ecb_decrypt() local
319 key = skey->safer.key; in _safer_ecb_decrypt()
322 if (SAFER_MAX_NOF_ROUNDS < (round = *key)) round = SAFER_MAX_NOF_ROUNDS; in _safer_ecb_decrypt()
323 key += SAFER_BLOCK_LEN * (1 + 2 * round); in _safer_ecb_decrypt()
324 h ^= *key; g -= *--key; f -= *--key; e ^= *--key; in _safer_ecb_decrypt()
325 d ^= *--key; c -= *--key; b -= *--key; a ^= *--key; in _safer_ecb_decrypt()
332 h -= *--key; g ^= *--key; f ^= *--key; e -= *--key; in _safer_ecb_decrypt()
333 d -= *--key; c ^= *--key; b ^= *--key; a -= *--key; in _safer_ecb_decrypt()
334 h = LOG(h) ^ *--key; g = EXP(g) - *--key; in _safer_ecb_decrypt()
335 f = EXP(f) - *--key; e = LOG(e) ^ *--key; in _safer_ecb_decrypt()
336 d = LOG(d) ^ *--key; c = EXP(c) - *--key; in _safer_ecb_decrypt()
337 b = EXP(b) - *--key; a = LOG(a) ^ *--key; in _safer_ecb_decrypt()