Lines Matching refs:key

105                                  safer_key_t key)  in _Safer_Expand_Userkey()  argument
111 safer_key_t key) in _Safer_Expand_Userkey()
120 *key++ = (unsigned char)nof_rounds; in _Safer_Expand_Userkey()
127 kb[j] = *key++ = userkey_2[j]; in _Safer_Expand_Userkey()
141 *key++ = (ka[k] in _Safer_Expand_Userkey()
145 *key++ = (ka[j] + safer_ebox[(int)safer_ebox[(int)((18 * i + j + 1)&0xFF)]]) & 0xFF; in _Safer_Expand_Userkey()
154 *key++ = (kb[k] in _Safer_Expand_Userkey()
158 … *key++ = (kb[j] + safer_ebox[(int)safer_ebox[(int)((18 * i + j + 10)&0xFF)]]) & 0xFF; in _Safer_Expand_Userkey()
174 safer_key_t key) in Safer_Expand_Userkey() argument
176 _Safer_Expand_Userkey(userkey_1, userkey_2, nof_rounds, strengthened, key); in Safer_Expand_Userkey()
181 int safer_k64_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in safer_k64_setup() argument
183 LTC_ARGCHK(key != NULL); in safer_k64_setup()
194 …Safer_Expand_Userkey(key, key, (unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_K64_DEFAULT_NO… in safer_k64_setup()
198 int safer_sk64_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in safer_sk64_setup() argument
200 LTC_ARGCHK(key != NULL); in safer_sk64_setup()
211 …Safer_Expand_Userkey(key, key, (unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_SK64_DEFAULT_N… in safer_sk64_setup()
215 int safer_k128_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in safer_k128_setup() argument
217 LTC_ARGCHK(key != NULL); in safer_k128_setup()
228 …Safer_Expand_Userkey(key, key+8, (unsigned int)(num_rounds != 0 ?num_rounds:LTC_SAFER_K128_DEFAULT… in safer_k128_setup()
232 int safer_sk128_setup(const unsigned char *key, int keylen, int num_rounds, symmetric_key *skey) in safer_sk128_setup() argument
234 LTC_ARGCHK(key != NULL); in safer_sk128_setup()
245 …Safer_Expand_Userkey(key, key+8, (unsigned int)(num_rounds != 0?num_rounds:LTC_SAFER_SK128_DEFAULT… in safer_sk128_setup()
260 const unsigned char *key; in _safer_ecb_encrypt() local
266 key = skey->safer.key; in _safer_ecb_encrypt()
269 if (LTC_SAFER_MAX_NOF_ROUNDS < (round = *key)) round = LTC_SAFER_MAX_NOF_ROUNDS; in _safer_ecb_encrypt()
272 a ^= *++key; b += *++key; c += *++key; d ^= *++key; in _safer_ecb_encrypt()
273 e ^= *++key; f += *++key; g += *++key; h ^= *++key; in _safer_ecb_encrypt()
274 a = EXP(a) + *++key; b = LOG(b) ^ *++key; in _safer_ecb_encrypt()
275 c = LOG(c) ^ *++key; d = EXP(d) + *++key; in _safer_ecb_encrypt()
276 e = EXP(e) + *++key; f = LOG(f) ^ *++key; in _safer_ecb_encrypt()
277 g = LOG(g) ^ *++key; h = EXP(h) + *++key; in _safer_ecb_encrypt()
283 a ^= *++key; b += *++key; c += *++key; d ^= *++key; in _safer_ecb_encrypt()
284 e ^= *++key; f += *++key; g += *++key; h ^= *++key; in _safer_ecb_encrypt()
314 const unsigned char *key; in _safer_ecb_decrypt() local
320 key = skey->safer.key; in _safer_ecb_decrypt()
323 if (LTC_SAFER_MAX_NOF_ROUNDS < (round = *key)) round = LTC_SAFER_MAX_NOF_ROUNDS; in _safer_ecb_decrypt()
324 key += LTC_SAFER_BLOCK_LEN * (1 + 2 * round); in _safer_ecb_decrypt()
325 h ^= *key; g -= *--key; f -= *--key; e ^= *--key; in _safer_ecb_decrypt()
326 d ^= *--key; c -= *--key; b -= *--key; a ^= *--key; in _safer_ecb_decrypt()
333 h -= *--key; g ^= *--key; f ^= *--key; e -= *--key; in _safer_ecb_decrypt()
334 d -= *--key; c ^= *--key; b ^= *--key; a -= *--key; in _safer_ecb_decrypt()
335 h = LOG(h) ^ *--key; g = EXP(g) - *--key; in _safer_ecb_decrypt()
336 f = EXP(f) - *--key; e = LOG(e) ^ *--key; in _safer_ecb_decrypt()
337 d = LOG(d) ^ *--key; c = EXP(c) - *--key; in _safer_ecb_decrypt()
338 b = EXP(b) - *--key; a = LOG(a) ^ *--key; in _safer_ecb_decrypt()