Home
last modified time | relevance | path

Searched refs:skey (Results 1 – 25 of 89) sorted by relevance

1234

/freebsd/contrib/bearssl/src/symcipher/
H A Ddes_tab.c232 t = l ^ Fconf(r, skey[(i << 1) + 0], skey[(i << 1) + 1]); in process_block_unit()
253 skey += 32; in br_des_tab_process_block()
274 xl = skey[(i << 1) + 0]; in keysched_unit()
275 xr = skey[(i << 1) + 1]; in keysched_unit()
284 skey[(i << 1) + 0] = ul; in keysched_unit()
285 skey[(i << 1) + 1] = ur; in keysched_unit()
295 keysched_unit(skey, key); in br_des_tab_keysched()
298 keysched_unit(skey, key); in br_des_tab_keysched()
300 br_des_rev_skey(skey + 32); in br_des_tab_keysched()
301 memcpy(skey + 64, skey, 32 * sizeof *skey); in br_des_tab_keysched()
[all …]
H A Ddes_tab_cbcdec.c33 ctx->num_rounds = br_des_tab_keysched(ctx->skey, key, len); in br_des_tab_cbcdec_init()
35 br_des_rev_skey(ctx->skey); in br_des_tab_cbcdec_init()
42 t = ctx->skey[i]; in br_des_tab_cbcdec_init()
43 ctx->skey[i] = ctx->skey[94 - i]; in br_des_tab_cbcdec_init()
44 ctx->skey[94 - i] = t; in br_des_tab_cbcdec_init()
45 t = ctx->skey[i + 1]; in br_des_tab_cbcdec_init()
46 ctx->skey[i + 1] = ctx->skey[95 - i]; in br_des_tab_cbcdec_init()
47 ctx->skey[95 - i] = t; in br_des_tab_cbcdec_init()
66 br_des_tab_process_block(ctx->num_rounds, ctx->skey, buf); in br_des_tab_cbcdec_run()
H A Ddes_ct_cbcdec.c33 ctx->num_rounds = br_des_ct_keysched(ctx->skey, key, len); in br_des_ct_cbcdec_init()
35 br_des_rev_skey(ctx->skey); in br_des_ct_cbcdec_init()
42 t = ctx->skey[i]; in br_des_ct_cbcdec_init()
43 ctx->skey[i] = ctx->skey[94 - i]; in br_des_ct_cbcdec_init()
44 ctx->skey[94 - i] = t; in br_des_ct_cbcdec_init()
45 t = ctx->skey[i + 1]; in br_des_ct_cbcdec_init()
46 ctx->skey[i + 1] = ctx->skey[95 - i]; in br_des_ct_cbcdec_init()
47 ctx->skey[95 - i] = t; in br_des_ct_cbcdec_init()
60 br_des_ct_skey_expand(sk_exp, ctx->num_rounds, ctx->skey); in br_des_ct_cbcdec_run()
H A Daes_big_dec.c161 p = skey[i]; in br_aes_big_keysched_inv()
200 s0 ^= skey[(num_rounds << 2) + 0]; in br_aes_big_decrypt()
201 s1 ^= skey[(num_rounds << 2) + 1]; in br_aes_big_decrypt()
225 s0 ^= skey[u << 2]; in br_aes_big_decrypt()
226 s1 ^= skey[(u << 2) + 1]; in br_aes_big_decrypt()
227 s2 ^= skey[(u << 2) + 2]; in br_aes_big_decrypt()
228 s3 ^= skey[(u << 2) + 3]; in br_aes_big_decrypt()
246 s0 = t0 ^ skey[0]; in br_aes_big_decrypt()
247 s1 = t1 ^ skey[1]; in br_aes_big_decrypt()
248 s2 = t2 ^ skey[2]; in br_aes_big_decrypt()
[all …]
H A Daes_big_enc.c101 s0 ^= skey[0]; in br_aes_big_encrypt()
102 s1 ^= skey[1]; in br_aes_big_encrypt()
103 s2 ^= skey[2]; in br_aes_big_encrypt()
104 s3 ^= skey[3]; in br_aes_big_encrypt()
128 s0 ^= skey[u << 2]; in br_aes_big_encrypt()
129 s1 ^= skey[(u << 2) + 1]; in br_aes_big_encrypt()
130 s2 ^= skey[(u << 2) + 2]; in br_aes_big_encrypt()
131 s3 ^= skey[(u << 2) + 3]; in br_aes_big_encrypt()
149 s0 = t0 ^ skey[num_rounds << 2]; in br_aes_big_encrypt()
150 s1 = t1 ^ skey[(num_rounds << 2) + 1]; in br_aes_big_encrypt()
[all …]
H A Ddes_support.c91 br_des_keysched_unit(uint32_t *skey, const void *key) in br_des_keysched_unit() argument
145 skey[(i << 1) + 0] = kl; in br_des_keysched_unit()
146 skey[(i << 1) + 1] = kr; in br_des_keysched_unit()
152 br_des_rev_skey(uint32_t *skey) in br_des_rev_skey() argument
159 t = skey[i + 0]; in br_des_rev_skey()
160 skey[i + 0] = skey[30 - i]; in br_des_rev_skey()
161 skey[30 - i] = t; in br_des_rev_skey()
162 t = skey[i + 1]; in br_des_rev_skey()
163 skey[i + 1] = skey[31 - i]; in br_des_rev_skey()
164 skey[31 - i] = t; in br_des_rev_skey()
H A Ddes_ct.c86 kl = skey[(i << 1) + 0]; in keysched_unit()
87 kr = skey[(i << 1) + 1]; in keysched_unit()
99 skey[(i << 1) + 0] = sk0; in keysched_unit()
100 skey[(i << 1) + 1] = sk1; in keysched_unit()
162 keysched_unit(skey, key); in br_des_ct_keysched()
165 keysched_unit(skey, key); in br_des_ct_keysched()
167 br_des_rev_skey(skey + 32); in br_des_ct_keysched()
168 memcpy(skey + 64, skey, 32 * sizeof *skey); in br_des_ct_keysched()
171 keysched_unit(skey, key); in br_des_ct_keysched()
396 v = *skey ++; in br_des_ct_skey_expand()
[all …]
H A Daes_common.c71 br_aes_keysched(uint32_t *skey, const void *key, size_t key_len) in br_aes_keysched() argument
93 skey[i] = br_dec32be((const unsigned char *)key + (i << 2)); in br_aes_keysched()
98 tmp = skey[i - 1]; in br_aes_keysched()
105 skey[i] = skey[i - nk] ^ tmp; in br_aes_keysched()
H A Daes_ct.c262 uint32_t skey[120]; in br_aes_ct_keysched() local
283 skey[(i << 1) + 0] = tmp; in br_aes_ct_keysched()
284 skey[(i << 1) + 1] = tmp; in br_aes_ct_keysched()
293 tmp ^= skey[(i - nk) << 1]; in br_aes_ct_keysched()
294 skey[(i << 1) + 0] = tmp; in br_aes_ct_keysched()
295 skey[(i << 1) + 1] = tmp; in br_aes_ct_keysched()
302 br_aes_ct_ortho(skey + (i << 1)); in br_aes_ct_keysched()
306 | (skey[j + 1] & 0xAAAAAAAA); in br_aes_ct_keysched()
313 br_aes_ct_skey_expand(uint32_t *skey, in br_aes_ct_skey_expand() argument
324 skey[v + 0] = x | (x << 1); in br_aes_ct_skey_expand()
[all …]
H A Daes_ct64.c314 uint32_t skey[60]; in br_aes_ct64_keysched() local
332 br_range_dec32le(skey, (key_len >> 2), key); in br_aes_ct64_keysched()
333 tmp = skey[(key_len >> 2) - 1]; in br_aes_ct64_keysched()
341 tmp ^= skey[i - nk]; in br_aes_ct64_keysched()
342 skey[i] = tmp; in br_aes_ct64_keysched()
352 br_aes_ct64_interleave_in(&q[0], &q[4], skey + i); in br_aes_ct64_keysched()
376 br_aes_ct64_skey_expand(uint64_t *skey, in br_aes_ct64_skey_expand() argument
393 skey[v + 0] = (x0 << 4) - x0; in br_aes_ct64_skey_expand()
394 skey[v + 1] = (x1 << 4) - x1; in br_aes_ct64_skey_expand()
395 skey[v + 2] = (x2 << 4) - x2; in br_aes_ct64_skey_expand()
[all …]
H A Daes_small_enc.c106 br_aes_small_encrypt(unsigned num_rounds, const uint32_t *skey, void *data) in br_aes_small_encrypt() argument
116 add_round_key(state, skey); in br_aes_small_encrypt()
121 add_round_key(state, skey + (u << 2)); in br_aes_small_encrypt()
125 add_round_key(state, skey + (num_rounds << 2)); in br_aes_small_encrypt()
H A Daes_ct64_enc.c101 const uint64_t *skey, uint64_t *q) in br_aes_ct64_bitslice_encrypt() argument
105 add_round_key(q, skey); in br_aes_ct64_bitslice_encrypt()
110 add_round_key(q, skey + (u << 3)); in br_aes_ct64_bitslice_encrypt()
114 add_round_key(q, skey + (num_rounds << 3)); in br_aes_ct64_bitslice_encrypt()
H A Daes_ct_enc.c98 const uint32_t *skey, uint32_t *q) in br_aes_ct_bitslice_encrypt() argument
102 add_round_key(q, skey); in br_aes_ct_bitslice_encrypt()
107 add_round_key(q, skey + (u << 3)); in br_aes_ct_bitslice_encrypt()
111 add_round_key(q, skey + (num_rounds << 3)); in br_aes_ct_bitslice_encrypt()
H A Daes_pwr8_ctrcbc.c43 ctx->num_rounds = br_aes_pwr8_keysched(ctx->skey.skni, key, len); in br_aes_pwr8_ctrcbc_init()
792 ctrcbc_128_encrypt(ctx->skey.skni, ctr, cbcmac, data, len >> 4); in br_aes_pwr8_ctrcbc_encrypt()
851 ctr_128(ctx->skey.skni, ctrbuf, data, len >> 6); in br_aes_pwr8_ctrcbc_ctr()
854 ctr_192(ctx->skey.skni, ctrbuf, data, len >> 6); in br_aes_pwr8_ctrcbc_ctr()
857 ctr_256(ctx->skey.skni, ctrbuf, data, len >> 6); in br_aes_pwr8_ctrcbc_ctr()
881 ctr_128(ctx->skey.skni, ctrbuf, tmp, 1); in br_aes_pwr8_ctrcbc_ctr()
884 ctr_192(ctx->skey.skni, ctrbuf, tmp, 1); in br_aes_pwr8_ctrcbc_ctr()
887 ctr_256(ctx->skey.skni, ctrbuf, tmp, 1); in br_aes_pwr8_ctrcbc_ctr()
904 cbcmac_128(ctx->skey.skni, cbcmac, data, len >> 4); in br_aes_pwr8_ctrcbc_mac()
907 cbcmac_192(ctx->skey.skni, cbcmac, data, len >> 4); in br_aes_pwr8_ctrcbc_mac()
[all …]
H A Daes_small_dec.c153 br_aes_small_decrypt(unsigned num_rounds, const uint32_t *skey, void *data) in br_aes_small_decrypt() argument
163 add_round_key(state, skey + (num_rounds << 2)); in br_aes_small_decrypt()
167 add_round_key(state, skey + (u << 2)); in br_aes_small_decrypt()
172 add_round_key(state, skey); in br_aes_small_decrypt()
/freebsd/sys/netinet/
H A Dsctp_auth.c474 if (skey == NULL) in sctp_free_sharedkey()
491 return (skey); in sctp_find_sharedkey()
519 if ((skey->deactivated) || (skey->refcount > 1)) { in sctp_insert_sharedkey()
552 if (skey) { in sctp_auth_key_acquire()
569 if (skey) { in sctp_auth_key_release()
575 if ((skey->refcount <= 2) && (skey->deactivated)) { in sctp_auth_key_release()
592 if (skey == NULL) in sctp_copy_sharedkey()
598 new_skey->key = sctp_set_key(skey->key->key, skey->key->keylen); in sctp_copy_sharedkey()
1196 if (skey == NULL) in sctp_delete_sharedkey()
1230 if (skey == NULL) in sctp_delete_sharedkey_ep()
[all …]
/freebsd/contrib/wpa/src/crypto/
H A Dcrypto_libtomcrypt.c55 des_done(&skey); in des_encrypt()
89 skey = os_malloc(sizeof(*skey)); in aes_encrypt_init()
93 os_free(skey); in aes_encrypt_init()
96 return skey; in aes_encrypt_init()
110 aes_done(skey); in aes_encrypt_deinit()
111 os_free(skey); in aes_encrypt_deinit()
118 skey = os_malloc(sizeof(*skey)); in aes_decrypt_init()
122 os_free(skey); in aes_decrypt_init()
125 return skey; in aes_decrypt_init()
139 aes_done(skey); in aes_decrypt_deinit()
[all …]
/freebsd/contrib/bearssl/inc/
H A Dbearssl_block.h713 uint32_t skey[60]; member
728 uint32_t skey[60]; member
744 uint32_t skey[60]; member
1591 } skey; member
1608 } skey; member
1626 } skey; member
1644 } skey; member
1882 } skey; member
1899 } skey; member
1917 } skey; member
[all …]
/freebsd/crypto/openssl/demos/smime/
H A Dsmsign.c19 EVP_PKEY *skey = NULL; in main() local
43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main()
45 if (!scert || !skey) in main()
56 p7 = PKCS7_sign(scert, skey, NULL, in, flags); in main()
81 EVP_PKEY_free(skey); in main()
H A Dsmsign2.c19 EVP_PKEY *skey = NULL, *skey2 = NULL; in main() local
35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main()
65 if (!PKCS7_sign_add_signer(p7, scert, skey, NULL, 0)) in main()
89 EVP_PKEY_free(skey); in main()
/freebsd/crypto/openssl/demos/cms/
H A Dcms_sign.c19 EVP_PKEY *skey = NULL; in main() local
43 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main()
45 if (!scert || !skey) in main()
56 cms = CMS_sign(scert, skey, NULL, in, flags); in main()
83 EVP_PKEY_free(skey); in main()
H A Dcms_sign2.c19 EVP_PKEY *skey = NULL, *skey2 = NULL; in main() local
35 skey = PEM_read_bio_PrivateKey(tbio, NULL, 0, NULL); in main()
65 if (!CMS_add1_signer(cms, scert, skey, NULL, 0)) in main()
91 EVP_PKEY_free(skey); in main()
/freebsd/contrib/telnet/libtelnet/
H A Dkerberos.c233 Session_Key skey; in kerberos4_is() local
301 skey.type = SK_DES; in kerberos4_is()
302 skey.length = 8; in kerberos4_is()
303 skey.data = session_key; in kerberos4_is()
304 encrypt_session_key(&skey, 1); in kerberos4_is()
334 Session_Key skey; in kerberos4_reply() local
360 skey.type = SK_DES; in kerberos4_reply()
361 skey.length = 8; in kerberos4_reply()
362 skey.data = session_key; in kerberos4_reply()
363 encrypt_session_key(&skey, 0); in kerberos4_reply()
H A Dsra.c154 Session_Key skey; in sra_is() local
206 skey.data = ck; in sra_is()
207 skey.type = SK_DES; in sra_is()
208 skey.length = 8; in sra_is()
209 encrypt_session_key(&skey, 1); in sra_is()
245 Session_Key skey; in sra_reply() local
324 skey.data = ck; in sra_reply()
325 skey.type = SK_DES; in sra_reply()
326 skey.length = 8; in sra_reply()
327 encrypt_session_key(&skey, 0); in sra_reply()
/freebsd/crypto/openssl/doc/man3/
H A DEVP_PKEY_derive.pod70 unsigned char *skey;
87 skey = OPENSSL_malloc(skeylen);
89 if (!skey)
92 if (EVP_PKEY_derive(ctx, skey, &skeylen) <= 0)
95 /* Shared secret is skey bytes written to buffer skey */

1234