HomeSort by relevance Sort by last modified time
    Searched refs:rounds (Results 1 - 25 of 43) sorted by null

1 2

  /external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
RC5ParameterSpecTest.java 38 * RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv) method
45 int rounds = 5; local
50 new RC5ParameterSpec(version, rounds, wordSize, null);
57 new RC5ParameterSpec(version, rounds, wordSize+8, iv);
64 new RC5ParameterSpec(version, rounds, wordSize, new byte[] {1, 2, 3});
70 RC5ParameterSpec ps = new RC5ParameterSpec(version, rounds,
79 * RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv, int
86 int rounds = 5; local
92 new RC5ParameterSpec(version, rounds, wordSize, null, offset);
99 new RC5ParameterSpec(version, rounds, wordSize+8, iv, offset)
142 int rounds = 5; local
157 int rounds = 5; local
172 int rounds = 5; local
189 int rounds = 5; local
216 int rounds = 5; local
266 int rounds = 5; local
    [all...]
  /libcore/luni/src/main/java/javax/crypto/spec/
RC5ParameterSpec.java 30 private final int rounds; field in class:RC5ParameterSpec
40 * @param rounds
45 public RC5ParameterSpec(int version, int rounds, int wordSize) {
47 this.rounds = rounds;
63 * @param rounds
73 public RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv) {
81 this.rounds = rounds;
98 * @param rounds
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
RC5ParameterSpecTest.java 38 * RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv) method
45 int rounds = 5; local
50 new RC5ParameterSpec(version, rounds, wordSize, null);
57 new RC5ParameterSpec(version, rounds, wordSize+8, iv);
64 new RC5ParameterSpec(version, rounds, wordSize, new byte[] {1, 2, 3});
70 RC5ParameterSpec ps = new RC5ParameterSpec(version, rounds,
79 * RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv, int
86 int rounds = 5; local
92 new RC5ParameterSpec(version, rounds, wordSize, null, offset);
99 new RC5ParameterSpec(version, rounds, wordSize+8, iv, offset)
142 int rounds = 5; local
157 int rounds = 5; local
172 int rounds = 5; local
189 int rounds = 5; local
216 int rounds = 5; local
266 int rounds = 5; local
280 int rounds = 5; local
    [all...]
  /external/openssl/crypto/evp/
e_rc5.c 75 int rounds; /* number of rounds */ member in struct:__anon8827
92 data(c)->rounds = RC5_12_ROUNDS;
96 *(int *)ptr = data(c)->rounds;
105 data(c)->rounds = arg;
122 key,data(ctx)->rounds);
  /external/ipsec-tools/src/racoon/missing/crypto/rijndael/
rijndael-alg-fst.h 19 int rijndaelKeySched(u_int8_t k[RIJNDAEL_MAXKC][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS);
21 int rijndaelKeyEncToDec(u_int8_t W[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS);
23 int rijndaelEncrypt(u_int8_t a[16], u_int8_t b[16], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS);
26 int rijndaelEncryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds);
29 int rijndaelDecrypt(u_int8_t a[16], u_int8_t b[16], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS);
32 int rijndaelDecryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds);
rijndael-alg-fst.c 36 int rijndaelKeySched(word8 k[MAXKC][4], word8 W[MAXROUNDS+1][4][4], int ROUNDS) {
46 int KC = ROUNDS - 6;
54 for (j = 0; (j < KC) && (r < ROUNDS + 1); ) {
64 while (r < ROUNDS + 1) { /* while not enough round key material calculated */
89 for (j = 0; (j < KC) && (r < ROUNDS + 1); ) {
103 int rijndaelKeyEncToDec(word8 W[MAXROUNDS+1][4][4], int ROUNDS) {
107 for (r = 1; r < ROUNDS; r++) {
142 int rijndaelEncrypt(word8 in[16], word8 out[16], word8 rk[MAXROUNDS+1][4][4], int ROUNDS) {
178 for (r = 1; r < ROUNDS-1; r++) {
202 *((word32*)temp[0]) = *((word32*)(b )) ^ *((word32*)rk[ROUNDS-1][0])
    [all...]
rijndael-api-fst.c 64 key->ROUNDS = keyLen/32 + 6;
71 rijndaelKeySched(k, key->keySched, key->ROUNDS);
73 rijndaelKeyEncToDec(key->keySched, key->ROUNDS);
112 rijndaelEncrypt(input, outBuffer, key->keySched, key->ROUNDS);
132 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS);
149 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS);
169 rijndaelEncrypt(block, block, key->keySched, key->ROUNDS);
226 rijndaelEncrypt(input, outBuffer, key->keySched, key->ROUNDS);
236 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS);
246 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS);
    [all...]
  /external/openssl/crypto/aes/asm/
aes-armv4.pl 46 $rounds="r12";
166 mov $rounds,r0 @ inp
170 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral
171 ldrb $t1,[$rounds,#2] @ manner...
172 ldrb $t2,[$rounds,#1]
173 ldrb $t3,[$rounds,#0]
175 ldrb $s1,[$rounds,#7]
177 ldrb $t1,[$rounds,#6]
179 ldrb $t2,[$rounds,#5]
180 ldrb $t3,[$rounds,#4
    [all...]
aes-sparcv9.pl 70 $rounds="%i7"; # aliases with return address, which is off-loaded to stack
193 ld [$key+240],$rounds
197 srl $rounds,1,$rounds
260 subcc $rounds,1,$rounds !
263 add $tbl,2048,$rounds
437 ldub [$rounds+$acc0],$acc0
440 ldub [$rounds+$acc1],$acc1
443 ldub [$rounds+$acc2],$acc
    [all...]
aes-s390x.pl 45 # at the moment of key schedule setup, which is denoted in key->rounds.
68 $rounds="%r13";
241 l $rounds,240($key)
243 aghi $rounds,-1
313 brct $rounds,.Lenc_loop
567 l $rounds,240($key)
569 aghi $rounds,-1
639 brct $rounds,.Ldec_loop
818 lghi $rounds,10
819 st $rounds,240($key
    [all...]
  /external/qemu/
aes.h 9 int rounds; member in struct:aes_key_st
aes.c     [all...]
  /external/dropbear/libtomcrypt/src/ciphers/safer/
saferp.c 212 @param num_rounds The number of rounds desired (0 for default)
220 static const int rounds[3] = { 8, 12, 16 }; local
230 /* Is the number of rounds valid? Either use zero for default or
231 * 8,12,16 rounds for 16,24,32 byte keys
233 if (num_rounds != 0 && num_rounds != rounds[(keylen/8)-2]) {
265 skey->saferp.rounds = 8;
292 skey->saferp.rounds = 12;
319 skey->saferp.rounds = 16;
343 /* do eight rounds */
356 if (skey->saferp.rounds > 8)
    [all...]
  /external/dropbear/libtomcrypt/src/ciphers/
rc5.c 49 @param num_rounds The number of rounds desired (0 for default)
78 skey->rc5.rounds = num_rounds;
146 if ((skey->rc5.rounds & 1) == 0) {
147 for (r = 0; r < skey->rc5.rounds; r += 2) {
155 for (r = 0; r < skey->rc5.rounds; r++) {
197 K = skey->rc5.K + (skey->rc5.rounds << 1);
199 if ((skey->rc5.rounds & 1) == 0) {
201 for (r = skey->rc5.rounds - 1; r >= 0; r -= 2) {
209 for (r = skey->rc5.rounds - 1; r >= 0; r--) {
  /external/openssl/crypto/sha/asm/
sha512-ia64.pl 21 # too much. I mean it's 64 32-bit rounds vs. 80 virtually identical
80 $rounds=80;
94 $rounds=64;
486 { .mii; mov ar.lc=$rounds-17
571 { .mmb; add Ktbl=-$SZ*$rounds,Ktbl
624 .size K256#,$SZ*$rounds
670 .size K512#,$SZ*$rounds
sha512-s390x.pl 62 $rounds=80;
76 $rounds=64;
264 lghi $t0,`($rounds-16)*$SZ`
sha512-ppc.pl 71 $rounds=80;
83 $rounds=64;
328 li $T,`$rounds/16-1`
344 subi $Tbl,$Tbl,`($rounds-16)*$SZ` ; rewind Tbl
sha512-x86_64.pl 67 $rounds=80;
79 $rounds=64;
237 cmp \$$rounds,$round
  /external/chromium/crypto/
symmetric_key_unittest.cc 72 unsigned int rounds; member in struct:PBKDF2TestVector
86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) {
96 test_data.rounds, test_data.key_size_in_bits));
  /external/openssl/crypto/aes/
aes.h 82 int rounds; member in struct:aes_key_st
aes_core.c     [all...]
aes_x86core.c 51 * referenced in outer and respectively inner rounds.
485 key->rounds = 10;
487 key->rounds = 12;
489 key->rounds = 14;
586 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) {
593 for (i = 1; i < (key->rounds); i++) {
736 * Nr - 2 full rounds:
738 for (rk+=8,r=key->rounds-2; r>0; rk+=4,r--) {
    [all...]
  /external/openssl/include/openssl/
aes.h 82 int rounds; member in struct:aes_key_st
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_cipher.h 15 int rounds; member in struct:rc5_key
29 long rounds; member in struct:saferp_key
329 /** default number of rounds */
334 @param num_rounds The requested number of rounds (0==default)
  /bionic/libc/bionic/
pthread.c 1793 int rounds = PTHREAD_DESTRUCTOR_ITERATIONS; local
    [all...]

Completed in 694 milliseconds

1 2