/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
RC5ParameterSpecTest.java | 38 * RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv) method 45 int rounds = 5; local 50 new RC5ParameterSpec(version, rounds, wordSize, null); 57 new RC5ParameterSpec(version, rounds, wordSize+8, iv); 64 new RC5ParameterSpec(version, rounds, wordSize, new byte[] {1, 2, 3}); 70 RC5ParameterSpec ps = new RC5ParameterSpec(version, rounds, 79 * RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv, int 86 int rounds = 5; local 92 new RC5ParameterSpec(version, rounds, wordSize, null, offset); 99 new RC5ParameterSpec(version, rounds, wordSize+8, iv, offset) 142 int rounds = 5; local 157 int rounds = 5; local 172 int rounds = 5; local 189 int rounds = 5; local 216 int rounds = 5; local 266 int rounds = 5; local [all...] |
/libcore/luni/src/main/java/javax/crypto/spec/ |
RC5ParameterSpec.java | 30 private final int rounds; field in class:RC5ParameterSpec 40 * @param rounds 45 public RC5ParameterSpec(int version, int rounds, int wordSize) { 47 this.rounds = rounds; 63 * @param rounds 73 public RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv) { 81 this.rounds = rounds; 98 * @param rounds [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
RC5ParameterSpecTest.java | 38 * RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv) method 45 int rounds = 5; local 50 new RC5ParameterSpec(version, rounds, wordSize, null); 57 new RC5ParameterSpec(version, rounds, wordSize+8, iv); 64 new RC5ParameterSpec(version, rounds, wordSize, new byte[] {1, 2, 3}); 70 RC5ParameterSpec ps = new RC5ParameterSpec(version, rounds, 79 * RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv, int 86 int rounds = 5; local 92 new RC5ParameterSpec(version, rounds, wordSize, null, offset); 99 new RC5ParameterSpec(version, rounds, wordSize+8, iv, offset) 142 int rounds = 5; local 157 int rounds = 5; local 172 int rounds = 5; local 189 int rounds = 5; local 216 int rounds = 5; local 266 int rounds = 5; local 280 int rounds = 5; local [all...] |
/external/openssl/crypto/evp/ |
e_rc5.c | 75 int rounds; /* number of rounds */ member in struct:__anon8827 92 data(c)->rounds = RC5_12_ROUNDS; 96 *(int *)ptr = data(c)->rounds; 105 data(c)->rounds = arg; 122 key,data(ctx)->rounds);
|
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
rijndael-alg-fst.h | 19 int rijndaelKeySched(u_int8_t k[RIJNDAEL_MAXKC][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS); 21 int rijndaelKeyEncToDec(u_int8_t W[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS); 23 int rijndaelEncrypt(u_int8_t a[16], u_int8_t b[16], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS); 26 int rijndaelEncryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds); 29 int rijndaelDecrypt(u_int8_t a[16], u_int8_t b[16], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS); 32 int rijndaelDecryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds);
|
rijndael-alg-fst.c | 36 int rijndaelKeySched(word8 k[MAXKC][4], word8 W[MAXROUNDS+1][4][4], int ROUNDS) { 46 int KC = ROUNDS - 6; 54 for (j = 0; (j < KC) && (r < ROUNDS + 1); ) { 64 while (r < ROUNDS + 1) { /* while not enough round key material calculated */ 89 for (j = 0; (j < KC) && (r < ROUNDS + 1); ) { 103 int rijndaelKeyEncToDec(word8 W[MAXROUNDS+1][4][4], int ROUNDS) { 107 for (r = 1; r < ROUNDS; r++) { 142 int rijndaelEncrypt(word8 in[16], word8 out[16], word8 rk[MAXROUNDS+1][4][4], int ROUNDS) { 178 for (r = 1; r < ROUNDS-1; r++) { 202 *((word32*)temp[0]) = *((word32*)(b )) ^ *((word32*)rk[ROUNDS-1][0]) [all...] |
rijndael-api-fst.c | 64 key->ROUNDS = keyLen/32 + 6; 71 rijndaelKeySched(k, key->keySched, key->ROUNDS); 73 rijndaelKeyEncToDec(key->keySched, key->ROUNDS); 112 rijndaelEncrypt(input, outBuffer, key->keySched, key->ROUNDS); 132 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS); 149 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS); 169 rijndaelEncrypt(block, block, key->keySched, key->ROUNDS); 226 rijndaelEncrypt(input, outBuffer, key->keySched, key->ROUNDS); 236 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS); 246 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS); [all...] |
/external/openssl/crypto/aes/asm/ |
aes-armv4.pl | 46 $rounds="r12"; 166 mov $rounds,r0 @ inp 170 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral 171 ldrb $t1,[$rounds,#2] @ manner... 172 ldrb $t2,[$rounds,#1] 173 ldrb $t3,[$rounds,#0] 175 ldrb $s1,[$rounds,#7] 177 ldrb $t1,[$rounds,#6] 179 ldrb $t2,[$rounds,#5] 180 ldrb $t3,[$rounds,#4 [all...] |
aes-sparcv9.pl | 70 $rounds="%i7"; # aliases with return address, which is off-loaded to stack 193 ld [$key+240],$rounds 197 srl $rounds,1,$rounds 260 subcc $rounds,1,$rounds ! 263 add $tbl,2048,$rounds 437 ldub [$rounds+$acc0],$acc0 440 ldub [$rounds+$acc1],$acc1 443 ldub [$rounds+$acc2],$acc [all...] |
aes-s390x.pl | 45 # at the moment of key schedule setup, which is denoted in key->rounds. 68 $rounds="%r13"; 241 l $rounds,240($key) 243 aghi $rounds,-1 313 brct $rounds,.Lenc_loop 567 l $rounds,240($key) 569 aghi $rounds,-1 639 brct $rounds,.Ldec_loop 818 lghi $rounds,10 819 st $rounds,240($key [all...] |
/external/qemu/ |
aes.h | 9 int rounds; member in struct:aes_key_st
|
aes.c | [all...] |
/external/dropbear/libtomcrypt/src/ciphers/safer/ |
saferp.c | 212 @param num_rounds The number of rounds desired (0 for default) 220 static const int rounds[3] = { 8, 12, 16 }; local 230 /* Is the number of rounds valid? Either use zero for default or 231 * 8,12,16 rounds for 16,24,32 byte keys 233 if (num_rounds != 0 && num_rounds != rounds[(keylen/8)-2]) { 265 skey->saferp.rounds = 8; 292 skey->saferp.rounds = 12; 319 skey->saferp.rounds = 16; 343 /* do eight rounds */ 356 if (skey->saferp.rounds > 8) [all...] |
/external/dropbear/libtomcrypt/src/ciphers/ |
rc5.c | 49 @param num_rounds The number of rounds desired (0 for default) 78 skey->rc5.rounds = num_rounds; 146 if ((skey->rc5.rounds & 1) == 0) { 147 for (r = 0; r < skey->rc5.rounds; r += 2) { 155 for (r = 0; r < skey->rc5.rounds; r++) { 197 K = skey->rc5.K + (skey->rc5.rounds << 1); 199 if ((skey->rc5.rounds & 1) == 0) { 201 for (r = skey->rc5.rounds - 1; r >= 0; r -= 2) { 209 for (r = skey->rc5.rounds - 1; r >= 0; r--) {
|
/external/openssl/crypto/sha/asm/ |
sha512-ia64.pl | 21 # too much. I mean it's 64 32-bit rounds vs. 80 virtually identical 80 $rounds=80; 94 $rounds=64; 486 { .mii; mov ar.lc=$rounds-17 571 { .mmb; add Ktbl=-$SZ*$rounds,Ktbl 624 .size K256#,$SZ*$rounds 670 .size K512#,$SZ*$rounds
|
sha512-s390x.pl | 62 $rounds=80; 76 $rounds=64; 264 lghi $t0,`($rounds-16)*$SZ`
|
sha512-ppc.pl | 71 $rounds=80; 83 $rounds=64; 328 li $T,`$rounds/16-1` 344 subi $Tbl,$Tbl,`($rounds-16)*$SZ` ; rewind Tbl
|
sha512-x86_64.pl | 67 $rounds=80; 79 $rounds=64; 237 cmp \$$rounds,$round
|
/external/chromium/crypto/ |
symmetric_key_unittest.cc | 72 unsigned int rounds; member in struct:PBKDF2TestVector 86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) { 96 test_data.rounds, test_data.key_size_in_bits));
|
/external/openssl/crypto/aes/ |
aes.h | 82 int rounds; member in struct:aes_key_st
|
aes_core.c | [all...] |
aes_x86core.c | 51 * referenced in outer and respectively inner rounds. 485 key->rounds = 10; 487 key->rounds = 12; 489 key->rounds = 14; 586 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) { 593 for (i = 1; i < (key->rounds); i++) { 736 * Nr - 2 full rounds: 738 for (rk+=8,r=key->rounds-2; r>0; rk+=4,r--) { [all...] |
/external/openssl/include/openssl/ |
aes.h | 82 int rounds; member in struct:aes_key_st
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_cipher.h | 15 int rounds; member in struct:rc5_key 29 long rounds; member in struct:saferp_key 329 /** default number of rounds */ 334 @param num_rounds The requested number of rounds (0==default)
|
/bionic/libc/bionic/ |
pthread.c | 1793 int rounds = PTHREAD_DESTRUCTOR_ITERATIONS; local [all...] |