HomeSort by relevance Sort by last modified time
    Searched refs:rounds (Results 26 - 50 of 87) sorted by null

12 3 4

  /external/openssl/crypto/aes/asm/
aes-sparcv9.pl 70 $rounds="%i7"; # aliases with return address, which is off-loaded to stack
193 ld [$key+240],$rounds
197 srl $rounds,1,$rounds
260 subcc $rounds,1,$rounds !
263 add $tbl,2048,$rounds
437 ldub [$rounds+$acc0],$acc0
440 ldub [$rounds+$acc1],$acc1
443 ldub [$rounds+$acc2],$acc
    [all...]
bsaes-armv7.S 1079 ldr r10, [r3, #240] @ get # of rounds
1087 mov r5, r10 @ pass # of rounds
1102 mov r5, r10 @ pass # of rounds
1335 ldr r10, [r3, #240] @ get # of rounds
1343 mov r5, r10 @ pass # of rounds
1360 mov r5, r10 @ pass # of rounds
1405 mov r5, r10 @ pass rounds
    [all...]
bsaes-armv7.pl 57 my ($key,$rounds,$const)=("r4","r5","r6");
757 sub $rounds,$rounds,#1
766 subs $rounds,$rounds,#1
854 sub $rounds,$rounds,#1
863 subs $rounds,$rounds,#1
894 my ($out,$inp,$rounds,$const)=("r12","r4","r5","r6")
    [all...]
aes-s390x.pl 45 # at the moment of key schedule setup, which is denoted in key->rounds.
113 $rounds="%r13";
288 l $rounds,240($key)
290 aghi $rounds,-1
360 brct $rounds,.Lenc_loop
614 l $rounds,240($key)
616 aghi $rounds,-1
686 brct $rounds,.Ldec_loop
867 lghi $rounds,10
868 st $rounds,240($key
    [all...]
  /external/chromium_org/third_party/usrsctp/usrsctplib/netinet/
sctp_ss_functions.c 537 strq->ss_params.fb.rounds = -1;
556 strq->ss_params.fb.rounds = with_strq->ss_params.fb.rounds;
558 strq->ss_params.fb.rounds = -1;
574 if (strq->ss_params.fb.rounds < 0)
575 strq->ss_params.fb.rounds = TAILQ_FIRST(&strq->outqueue)->length;
636 if ((strqt->ss_params.fb.rounds >= 0) && (strq == NULL ||
637 strqt->ss_params.fb.rounds < strq->ss_params.fb.rounds)) {
658 subtract = strq->ss_params.fb.rounds;
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/aes/
aes.h 82 int rounds; member in struct:aes_key_st
aes_core.c     [all...]
  /external/chromium_org/third_party/openssl/openssl/include/openssl/
aes.h 82 int rounds; member in struct:aes_key_st
  /external/openssl/crypto/aes/
aes.h 82 int rounds; member in struct:aes_key_st
aes_core.c     [all...]
  /external/openssl/include/openssl/
aes.h 82 int rounds; member in struct:aes_key_st
  /external/ipsec-tools/src/racoon/missing/crypto/rijndael/
rijndael-alg-fst.c 36 int rijndaelKeySched(word8 k[MAXKC][4], word8 W[MAXROUNDS+1][4][4], int ROUNDS) {
46 int KC = ROUNDS - 6;
54 for (j = 0; (j < KC) && (r < ROUNDS + 1); ) {
64 while (r < ROUNDS + 1) { /* while not enough round key material calculated */
89 for (j = 0; (j < KC) && (r < ROUNDS + 1); ) {
103 int rijndaelKeyEncToDec(word8 W[MAXROUNDS+1][4][4], int ROUNDS) {
107 for (r = 1; r < ROUNDS; r++) {
142 int rijndaelEncrypt(word8 in[16], word8 out[16], word8 rk[MAXROUNDS+1][4][4], int ROUNDS) {
178 for (r = 1; r < ROUNDS-1; r++) {
202 *((word32*)temp[0]) = *((word32*)(b )) ^ *((word32*)rk[ROUNDS-1][0])
    [all...]
rijndael-api-fst.c 64 key->ROUNDS = keyLen/32 + 6;
71 rijndaelKeySched(k, key->keySched, key->ROUNDS);
73 rijndaelKeyEncToDec(key->keySched, key->ROUNDS);
112 rijndaelEncrypt(input, outBuffer, key->keySched, key->ROUNDS);
132 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS);
149 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS);
169 rijndaelEncrypt(block, block, key->keySched, key->ROUNDS);
226 rijndaelEncrypt(input, outBuffer, key->keySched, key->ROUNDS);
236 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS);
246 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS);
    [all...]
  /external/chromium_org/third_party/openssl/openssl/crypto/sha/asm/
sha512-s390x.pl 82 $rounds=80;
96 $rounds=64;
285 lghi $t0,`($rounds-16)*$SZ`
sha512-mips.pl 91 $rounds=80;
105 $rounds=64;
355 $PTR_SUB $Ktbl,`($rounds-16)*$SZ` # rewind $Ktbl
sha512-x86_64.pl 68 $rounds=80;
80 $rounds=64;
232 cmp \$$rounds,$round
  /external/openssl/crypto/sha/asm/
sha512-s390x.pl 82 $rounds=80;
96 $rounds=64;
285 lghi $t0,`($rounds-16)*$SZ`
sha512-mips.pl 91 $rounds=80;
105 $rounds=64;
355 $PTR_SUB $Ktbl,`($rounds-16)*$SZ` # rewind $Ktbl
sha512-x86_64.pl 68 $rounds=80;
80 $rounds=64;
232 cmp \$$rounds,$round
  /external/chromium_org/third_party/openssl/openssl/crypto/aes/asm/
aes-s390x.pl 45 # at the moment of key schedule setup, which is denoted in key->rounds.
113 $rounds="%r13";
288 l $rounds,240($key)
290 aghi $rounds,-1
360 brct $rounds,.Lenc_loop
614 l $rounds,240($key)
616 aghi $rounds,-1
686 brct $rounds,.Ldec_loop
867 lghi $rounds,10
868 st $rounds,240($key
    [all...]
aesni-sha1-x86_64.pl 169 my $rounds="${ivp}d";
173 mov 240($key),$rounds
228 cmp \$11,$rounds
485 $k = (($jj+1)*12/20)*20*$n/12; # 12 aesencs per these 20 rounds
506 $k = (($jj+1)*8/20)*20*$n/8; # 8 aesencs per these 20 rounds
531 $k=(($jj+1)*12/20)*20*$n/12; # 12 aesencs per these 20 rounds
688 my $rounds="${ivp}d";
692 mov 240($key),$rounds
745 cmp \$11,$rounds
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/math/ec/
IntArray.java 583 // private static void deInterleave(int[] x, int xOff, int[] z, int zOff, int count, int rounds)
587 // z[zOff + i] = deInterleave(x[zOff + i], rounds);
591 // private static int deInterleave(int x, int rounds)
593 // while (--rounds >= 0)
704 private static void interleave(int[] x, int xOff, int[] z, int zOff, int count, int rounds)
708 z[zOff + i] = interleave(x[xOff + i], rounds);
712 private static int interleave(int x, int rounds)
714 while (--rounds >= 0)
  /external/qemu/util/
aes.c     [all...]
  /external/chromium_org/third_party/jinja2/
filters.py 633 - ``'common'`` rounds either up or down
634 - ``'ceil'`` always rounds up
635 - ``'floor'`` always rounds down
  /libcore/jsr166-tests/src/test/java/jsr166/
SemaphoreTest.java 547 final int rounds = 4; local
551 for (int i = 0; i < rounds; i++) {
559 for (int i = 0; i < rounds; i++) {

Completed in 824 milliseconds

12 3 4