OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:shifts
(Results
126 - 150
of
376
) sorted by null
1
2
3
4
5
6
7
8
9
10
11
>>
/external/webrtc/src/modules/audio_processing/ns/main/source/
nsx_core.c
27
// Constants to compensate for shifting signal log(2^
shifts
).
[
all
...]
/external/llvm/lib/Target/CellSPU/
SPUISelDAGToDAG.cpp
901
* Emit the instruction sequence for i64 left
shifts
. The basic algorithm
[
all
...]
/external/llvm/lib/Target/PowerPC/
PPCInstr64Bit.td
711
// Standard
shifts
. These are represented separately from the real
shifts
above
712
// so that we can distinguish between
shifts
that allow 6-bit and 7-bit shift
[
all
...]
/external/grub/stage2/
ufs2.h
381
* quantities by using
shifts
and masks in place of divisions
/external/jpeg/
jfdctint.c
23
* scaled fixed-point arithmetic, with a minimal number of
shifts
.
jidctint.c
25
* scaled fixed-point arithmetic, with a minimal number of
shifts
.
/external/kernel-headers/original/linux/
mtio.h
305
/* Bitfield
shifts
in the status */
/external/llvm/include/llvm/
IntrinsicsPowerPC.td
431
// Right
Shifts
.
/external/srtp/crypto/include/
datatypes.h
248
doesn't use the 128-bit get/set or 128-bit
shifts
*/
/external/srtp/doc/
draft-irtf-cfrg-icm-00.txt
157
Crypto Forum Research Group David A. McGrew Internet Draft Cisco Systems, Inc. Expires April, 2003 October, 2002 Integer Counter Mode <draft-irtf-cfrg-icm-00.txt> Status of this Memo This document is an Internet Draft and is in full conformance with all provisions of Section 10 of RFC-2026. Internet Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and working groups. Note that other groups may also distribute working documents as Internet Drafts. Internet Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. 1. Abstract This document specifies Integer Counter Mode (ICM), a mode of operation of a block cipher which defines an indexed keystream generator (which generates a keystream segment given an index). This mode is efficient, parallelizable, and has been proven secure given realistic assumptions about the block cipher. Test vectors are provided for AES. Counter Mode admits many variations. The variant specified in this document is secure and flexible, yet it enables a single implementation of a keystream generator to suffice in different application domains. McGrew [Page 1] Internet Draft Integer Counter Mode October, 2002 2. Notational Conventions The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC-2119 [B97]. 3. Introduction Counter Mode is a way to define a pseudorandom keystream generator using a block cipher [CTR]. The keystream can be used for additive encryption, key derivation, or any other application requiring pseudorandom data. In ICM, the keystream is logically broken into segments. Each segment is identified with a segment index, and the segments have equal lengths. This segmentation makes ICM especially appropriate for securing packet-based protocols. 4. ICM In this section, ICM keystream generation and encryption are defined. 4.1. ICM Parameters The following parameters are used in ICM. These parameters MUST remain fixed for any given use of a key. Parameter Meaning ----------------------------------------------------------------- BLOCK_LENGTH the number of octets in the cipher block KEY_LENGTH the number of octets in the cipher key OFFSET_LENGTH the number of octets in the offset SEGMENT_INDEX_LENGTH the number of octets in the segment index BLOCK_INDEX_LENGTH the number of octets in the block index 4.2. Keystream Segments Conceptually, ICM is a keystream generator that takes a secret key and a segment index as an input and then outputs a keystream segment. The segmentation lends itself to packet encryption, as each keystream segment can be used to encrypt a distinct packet. A counter is a value containing BLOCK_LENGTH octets which is McGrew [Page 2] Internet Draft Integer Counter Mode October, 2002 incremented using an increment function based on integer addition, to produce a sequence of distinct values which are used as inputs to the block cipher. (In the context of this specification, an integer is an octet string, the most significant of which is the first.) The output blocks of the cipher are concatenated to form the keystream segment. The first octet of the segment is the first octet of the first output block, and so on. A schematic of this process is shown in Figure 1. Figure 1. The generation of a keystream segment given a segment index and a block cipher key K. Here C[i] and S[i] denote the ith counter and keystream block, respectively. segment index | v C[0] -----> C[1] -----> C[2] -----> ... | | | v v v +---+ +---+ +---+ K->| E | K->| E | K->| E | ... +---+ +---+ +---+ | | | v v v S[0] S[1] S[2] ... The ith counter C[i] of the keystream segment with segment index s is defined as C[i] = (i + s * (256^BLOCK_INDEX_LENGTH)) (+) r where r denotes the shifted Offset, which is defined as the Offset times 256^(BLOCK_LENGTH - OFFSET_LENGTH). (This multiplication left-
shifts
the Offset so that it is aligned with the leftmost edge of the block.) Here ^ denotes exponenti (…)
/external/tremolo/Tremolo/
floor0.c
296
need at most one right shift or a number of left
shifts
*/
/external/v8/src/
strtod.cc
383
// Our Bignum implementation has a separate field for exponents.
Shifts
will
/external/v8/tools/
generate-ten-powers.scm
42
;;----------------bignum
shifts
-----------------------------------------------
/external/valgrind/main/VEX/priv/
host_generic_simd128.c
230
that the scalar
shifts
are always in range. In fact, given the
/external/webrtc/src/modules/audio_processing/aecm/main/source/
echo_control_mobile.c
57
// Variables used for delay
shifts
/external/wpa_supplicant_8/src/crypto/
sha1-internal.c
70
However, on 16 bit machines an int is too small for the
shifts
being done
/external/yaffs2/yaffs2/utils/
mkyaffs2image.c
142
// This one is easier, since the types are more standard. No funky
shifts
here.
mkyaffsimage.c
273
// This one is easier, since the types are more standard. No funky
shifts
here.
/frameworks/base/media/libstagefright/codecs/aacdec/
fwd_long_complex_rot.cpp
28
(1) Change the input arguments, no
shifts
information from
/libcore/luni/src/main/java/java/lang/
Math.java
[
all
...]
/libcore/luni/src/main/native/
java_math_NativeBN.cpp
103
unsigned int hi = dw >> 32; // This
shifts
without sign extension.
/packages/apps/Phone/res/layout/
incall_touch_ui.xml
42
- The negative layout_marginBottom
shifts
us slightly downward;
/prebuilt/darwin-x86/toolchain/arm-linux-androideabi-4.4.x/arm-linux-androideabi/include/c++/4.4.3/
cxxabi.h
373
// defined. GCC implements such
shifts
as arithmetic, which is
/prebuilt/linux-x86/toolchain/arm-linux-androideabi-4.4.x/arm-linux-androideabi/include/c++/4.4.3/
cxxabi.h
373
// defined. GCC implements such
shifts
as arithmetic, which is
/prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/i686-linux/include/c++/4.4.3/
cxxabi.h
373
// defined. GCC implements such
shifts
as arithmetic, which is
Completed in 514 milliseconds
1
2
3
4
5
6
7
8
9
10
11
>>