/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
rijndael-alg-fst.h | 19 int rijndaelKeySched(u_int8_t k[RIJNDAEL_MAXKC][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS); 21 int rijndaelKeyEncToDec(u_int8_t W[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS); 23 int rijndaelEncrypt(u_int8_t a[16], u_int8_t b[16], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS); 26 int rijndaelEncryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds); 29 int rijndaelDecrypt(u_int8_t a[16], u_int8_t b[16], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS); 32 int rijndaelDecryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds);
|
rijndael-alg-fst.c | 36 int rijndaelKeySched(word8 k[MAXKC][4], word8 W[MAXROUNDS+1][4][4], int ROUNDS) { 46 int KC = ROUNDS - 6; 54 for (j = 0; (j < KC) && (r < ROUNDS + 1); ) { 64 while (r < ROUNDS + 1) { /* while not enough round key material calculated */ 89 for (j = 0; (j < KC) && (r < ROUNDS + 1); ) { 103 int rijndaelKeyEncToDec(word8 W[MAXROUNDS+1][4][4], int ROUNDS) { 107 for (r = 1; r < ROUNDS; r++) { 142 int rijndaelEncrypt(word8 in[16], word8 out[16], word8 rk[MAXROUNDS+1][4][4], int ROUNDS) { 178 for (r = 1; r < ROUNDS-1; r++) { 202 *((word32*)temp[0]) = *((word32*)(b )) ^ *((word32*)rk[ROUNDS-1][0]) [all...] |
rijndael-api-fst.c | 64 key->ROUNDS = keyLen/32 + 6; 71 rijndaelKeySched(k, key->keySched, key->ROUNDS); 73 rijndaelKeyEncToDec(key->keySched, key->ROUNDS); 112 rijndaelEncrypt(input, outBuffer, key->keySched, key->ROUNDS); 132 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS); 149 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS); 169 rijndaelEncrypt(block, block, key->keySched, key->ROUNDS); 226 rijndaelEncrypt(input, outBuffer, key->keySched, key->ROUNDS); 236 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS); 246 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS); [all...] |
rijndael-api-fst.h | 58 int ROUNDS; /* key-length-dependent number of rounds */ 102 u_int8_t *input, int inputLen, u_int8_t *outBuffer, int Rounds);
|
/art/test/103-string-append/src/ |
Main.java | 18 public static final int ROUNDS = 16; 23 for (int j = 0; j < ROUNDS; j++) {
|
/frameworks/base/tools/obbtool/ |
pbkdf2gen.cpp | 33 #define ROUNDS 1024 62 ROUNDS, KEY_BITS, rawKey) != 1) {
|
/external/chromium_org/third_party/tlslite/tlslite/utils/ |
rijndael.py | 221 ROUNDS = num_rounds[len(key)][block_size] 224 Ke = [[0] * BC for i in xrange(ROUNDS + 1)] 226 Kd = [[0] * BC for i in xrange(ROUNDS + 1)] 227 ROUND_KEY_COUNT = (ROUNDS + 1) * BC 241 Kd[ROUNDS - (t / BC)][t % BC] = tk[j] 272 Kd[ROUNDS - (t / BC)][t % BC] = tk[j] 276 for r in xrange(1, ROUNDS): 292 ROUNDS = len(Ke) - 1 312 for r in xrange(1, ROUNDS): 322 tt = Ke[ROUNDS][i [all...] |
/external/scrypt/lib/crypto/ |
crypto_scrypt-neon-salsa208.h | 9 #define ROUNDS 8 73 for (i = ROUNDS;i > 0;i -= 2) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/ |
AESEngine.java | 112 // precomputation tables of calculations for rounds 282 ROUNDS = KC + 6; // This is not always true for the generalized Rijndael that allows larger block sizes 283 int[][] W = new int[ROUNDS+1][4]; // 4 words in a block 302 int k = (ROUNDS + 1) << 2; 320 for (int j = 1; j < ROUNDS; j++) 332 private int ROUNDS; 485 while (r < ROUNDS - 1) 515 C0 ^= KW[ROUNDS][0]; 516 C1 ^= KW[ROUNDS][1]; 517 C2 ^= KW[ROUNDS][2] [all...] |
BlowfishEngine.java | 299 private static final int ROUNDS = 16; 302 private static final int P_SZ = ROUNDS+2; 415 for (int i = 1; i < ROUNDS; i += 2) 421 xr ^= P[ROUNDS + 1]; 522 for (int i = 1; i < ROUNDS; i += 2) 528 xr ^= P[ROUNDS + 1]; 548 xl ^= P[ROUNDS + 1]; 550 for (int i = ROUNDS; i > 0 ; i -= 2)
|
AESFastEngine.java | 112 // precomputation tables of calculations for rounds [all...] |
TwofishEngine.java | 192 private static final int ROUNDS = 16; 458 for (int r = 0; r < ROUNDS; r +=2) 495 int k = ROUND_SUBKEYS + 2 * ROUNDS -1 ; 497 for (int r = 0; r< ROUNDS ; r +=2)
|
/external/ganymed-ssh2/src/main/java/ch/ethz/ssh2/crypto/cipher/ |
BlowFish.java | 168 private static final int ROUNDS = 16; 171 private static final int P_SZ = ROUNDS + 2; 257 for (int i = 1; i < ROUNDS; i += 2) 263 xr ^= P[ROUNDS + 1]; 353 for (int i = 1; i < ROUNDS; i += 2) 359 xr ^= P[ROUNDS + 1]; 375 xl ^= P[ROUNDS + 1]; 377 for (int i = ROUNDS; i > 0; i -= 2)
|
AES.java | 128 // precomputation tables of calculations for rounds [all...] |
/prebuilts/devtools/tools/lib/ |
jobb.jar | |
bcprov-jdk15on-1.48.jar | |
/prebuilts/sdk/tools/lib/ |
signapk.jar | |
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.48/ |
bcprov-jdk15on-1.48.jar | |
/prebuilts/tools/common/m2/internal/com/ibm/icu/icu4j/2.6.1/ |
icu4j-2.6.1.jar | |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
com.ibm.icu_4.2.1.v20100412.jar | |
/prebuilts/misc/common/icu4j/ |
icu4j.jar | |