HomeSort by relevance Sort by last modified time
    Searched refs:rounds (Results 1 - 25 of 60) sorted by null

1 2 3

  /external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
RC5ParameterSpecTest.java 38 * RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv) method
45 int rounds = 5; local
50 new RC5ParameterSpec(version, rounds, wordSize, null);
57 new RC5ParameterSpec(version, rounds, wordSize + 8, iv);
64 new RC5ParameterSpec(version, rounds, wordSize, new byte[] { 1, 2, 3 });
70 RC5ParameterSpec ps = new RC5ParameterSpec(version, rounds,
79 * RC5ParameterSpec(int version, int rounds, int wordSize, byte[] iv, int
86 int rounds = 5; local
92 new RC5ParameterSpec(version, rounds, wordSize, null, offset);
99 new RC5ParameterSpec(version, rounds, wordSize + 8, iv, offset)
142 int rounds = 5; local
157 int rounds = 5; local
172 int rounds = 5; local
189 int rounds = 5; local
216 int rounds = 5; local
266 int rounds = 5; local
    [all...]
  /external/openssl/crypto/evp/
e_rc5.c 75 int rounds; /* number of rounds */ member in struct:__anon7847
92 data(c)->rounds = RC5_12_ROUNDS;
96 *(int *)ptr = data(c)->rounds;
105 data(c)->rounds = arg;
122 key,data(ctx)->rounds);
  /external/ipsec-tools/src/racoon/missing/crypto/rijndael/
rijndael-alg-fst.h 19 int rijndaelKeySched(u_int8_t k[RIJNDAEL_MAXKC][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS);
21 int rijndaelKeyEncToDec(u_int8_t W[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS);
23 int rijndaelEncrypt(u_int8_t a[16], u_int8_t b[16], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS);
26 int rijndaelEncryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds);
29 int rijndaelDecrypt(u_int8_t a[16], u_int8_t b[16], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS);
32 int rijndaelDecryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds);
rijndael-alg-fst.c 36 int rijndaelKeySched(word8 k[MAXKC][4], word8 W[MAXROUNDS+1][4][4], int ROUNDS) {
46 int KC = ROUNDS - 6;
54 for (j = 0; (j < KC) && (r < ROUNDS + 1); ) {
64 while (r < ROUNDS + 1) { /* while not enough round key material calculated */
89 for (j = 0; (j < KC) && (r < ROUNDS + 1); ) {
103 int rijndaelKeyEncToDec(word8 W[MAXROUNDS+1][4][4], int ROUNDS) {
107 for (r = 1; r < ROUNDS; r++) {
142 int rijndaelEncrypt(word8 in[16], word8 out[16], word8 rk[MAXROUNDS+1][4][4], int ROUNDS) {
178 for (r = 1; r < ROUNDS-1; r++) {
202 *((word32*)temp[0]) = *((word32*)(b )) ^ *((word32*)rk[ROUNDS-1][0])
    [all...]
  /external/chromium_org/third_party/boringssl/src/crypto/aes/asm/
aes-armv4.pl 51 $rounds="r12";
192 mov $rounds,r0 @ inp
196 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral
197 ldrb $t1,[$rounds,#2] @ manner...
198 ldrb $t2,[$rounds,#1]
199 ldrb $t3,[$rounds,#0]
201 ldrb $s1,[$rounds,#7]
203 ldrb $t1,[$rounds,#6]
205 ldrb $t2,[$rounds,#5]
206 ldrb $t3,[$rounds,#4
    [all...]
aesni-x86.pl 72 $rounds="ecx";
76 $rounds_="ebx"; # backup copy for $rounds
120 &dec ($rounds);
136 &cmp ($rounds,11);
180 &mov ($rounds,&DWP(240,$key));
196 &mov ($rounds,&DWP(240,$key));
226 &shl ($rounds,4);
231 &lea ($key,&DWP(32,$key,$rounds));
232 &neg ($rounds);
233 &add ($rounds,16)
    [all...]
aesni-x86_64.pl 73 # rounds for larger block sizes, i.e. 192-bit result being 10/12 times
97 # calculated as latency times number of rounds, 10 for 128-bit key,
200 $rounds="%eax"; # input to and changed by aesni_[en|de]cryptN !!!
208 $rnds_="%r10d"; # backup copy for $rounds
228 my ($p,$key,$rounds,$inout,$ivec)=@_; $inout=$inout0 if (!defined($inout));
246 dec $rounds
263 mov 240($key),$rounds # key->rounds
265 &aesni_generate1("enc",$key,$rounds);
276 mov 240($key),$rounds # key->round
    [all...]
bsaes-armv7.pl 57 my ($key,$rounds,$const)=("r4","r5","r6");
758 sub $rounds,$rounds,#1
767 subs $rounds,$rounds,#1
855 sub $rounds,$rounds,#1
864 subs $rounds,$rounds,#1
895 my ($out,$inp,$rounds,$const)=("r12","r4","r5","r6")
    [all...]
  /external/openssl/crypto/aes/asm/
aes-armv4.pl 51 $rounds="r12";
190 mov $rounds,r0 @ inp
194 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral
195 ldrb $t1,[$rounds,#2] @ manner...
196 ldrb $t2,[$rounds,#1]
197 ldrb $t3,[$rounds,#0]
199 ldrb $s1,[$rounds,#7]
201 ldrb $t1,[$rounds,#6]
203 ldrb $t2,[$rounds,#5]
204 ldrb $t3,[$rounds,#4
    [all...]
aesni-x86.pl 61 $rounds="ecx";
65 $rounds_="ebx"; # backup copy for $rounds
109 &dec ($rounds);
125 &cmp ($rounds,11);
169 &mov ($rounds,&DWP(240,$key));
185 &mov ($rounds,&DWP(240,$key));
213 &shr ($rounds,1);
224 &dec ($rounds);
253 &shr ($rounds,1);
264 &dec ($rounds);
    [all...]
aesni-x86_64.pl 73 # rounds for larger block sizes, i.e. 192-bit result being 10/12 times
97 # calculated as latency times number of rounds, 10 for 128-bit key,
184 $rounds="%eax"; # input to and changed by aesni_[en|de]cryptN !!!
192 $rnds_="%r10d"; # backup copy for $rounds
212 my ($p,$key,$rounds,$inout,$ivec)=@_; $inout=$inout0 if (!defined($inout));
230 dec $rounds
247 mov 240($key),$rounds # key->rounds
249 &aesni_generate1("enc",$key,$rounds);
260 mov 240($key),$rounds # key->round
    [all...]
aesv8-armx.pl 45 my ($inp,$bits,$out,$ptr,$rounds)=("x0","w1","x2","x3","w12");
129 mov $rounds,#10
163 mov $rounds,#12
171 mov $rounds,#14
206 str $rounds,[$out]
269 my $rounds="w3";
277 ldr $rounds,[$key,#240]
280 sub $rounds,$rounds,#2
287 subs $rounds,$rounds,#
    [all...]
aes-parisc.pl 63 $rounds="%r29";
188 ldw 240($key),$rounds
192 _srm $rounds,1,$rounds
235 addib,= -1,$rounds,L\$enc_last
350 ldo 1024($tbl),$rounds
387 ldbx $acc0($rounds),$acc0
389 ldbx $acc1($rounds),$acc1
392 ldbx $acc2($rounds),$acc2
393 ldbx $acc3($rounds),$acc
    [all...]
aes-sparcv9.pl 70 $rounds="%i7"; # aliases with return address, which is off-loaded to stack
193 ld [$key+240],$rounds
197 srl $rounds,1,$rounds
260 subcc $rounds,1,$rounds !
263 add $tbl,2048,$rounds
437 ldub [$rounds+$acc0],$acc0
440 ldub [$rounds+$acc1],$acc1
443 ldub [$rounds+$acc2],$acc
    [all...]
bsaes-armv7.S 1079 ldr r10, [r3, #240] @ get # of rounds
1087 mov r5, r10 @ pass # of rounds
1102 mov r5, r10 @ pass # of rounds
1335 ldr r10, [r3, #240] @ get # of rounds
1343 mov r5, r10 @ pass # of rounds
1360 mov r5, r10 @ pass # of rounds
1405 mov r5, r10 @ pass rounds
    [all...]
  /external/fio/t/
stest.c 27 unsigned int size, nr, rounds = 0; local
31 while (rounds++ < LOOPS) {
  /external/chromium_org/crypto/third_party/nss/
rsawrapr.c 24 PRUint32 counter, rounds; local
35 rounds = (maskLen + hash->length - 1) / hash->length;
36 for (counter = 0; counter < rounds; counter++) {
49 if (counter != (rounds-1)) {
  /external/openssl/crypto/sha/asm/
sha512-ia64.pl 21 # too much. I mean it's 64 32-bit rounds vs. 80 virtually identical
80 $rounds=80;
94 $rounds=64;
486 { .mii; mov ar.lc=$rounds-17
571 { .mmb; add Ktbl=-$SZ*$rounds,Ktbl
624 .size K256#,$SZ*$rounds
670 .size K512#,$SZ*$rounds
  /bionic/libc/bionic/
pthread_key.cpp 140 for (int rounds = PTHREAD_DESTRUCTOR_ITERATIONS; rounds > 0; --rounds) {
  /external/chromium_org/crypto/
symmetric_key_unittest.cc 72 unsigned int rounds; member in struct:PBKDF2TestVector
86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) {
96 test_data.rounds, test_data.key_size_in_bits));
  /external/chromium_org/third_party/boringssl/src/include/openssl/
aes.h 65 /* AES_MAXNR is the maximum number of AES rounds. */
74 unsigned rounds; member in struct:aes_key_st
  /external/chromium_org/third_party/usrsctp/usrsctplib/netinet/
sctp_ss_functions.c 537 strq->ss_params.fb.rounds = -1;
556 strq->ss_params.fb.rounds = with_strq->ss_params.fb.rounds;
558 strq->ss_params.fb.rounds = -1;
574 if (strq->ss_params.fb.rounds < 0)
575 strq->ss_params.fb.rounds = TAILQ_FIRST(&strq->outqueue)->length;
636 if ((strqt->ss_params.fb.rounds >= 0) && (strq == NULL ||
637 strqt->ss_params.fb.rounds < strq->ss_params.fb.rounds)) {
658 subtract = strq->ss_params.fb.rounds;
    [all...]
  /external/openssl/crypto/aes/
aes.h 82 int rounds; member in struct:aes_key_st
  /external/openssl/include/openssl/
aes.h 82 int rounds; member in struct:aes_key_st
  /external/chromium_org/third_party/boringssl/linux-arm/crypto/aes/
bsaes-armv7.S 1081 ldr r10, [r3, #240] @ get # of rounds
1089 mov r5, r10 @ pass # of rounds
1104 mov r5, r10 @ pass # of rounds
1338 ldr r10, [r3, #240] @ get # of rounds
1346 mov r5, r10 @ pass # of rounds
1363 mov r5, r10 @ pass # of rounds
1408 mov r5, r10 @ pass rounds
    [all...]

Completed in 1217 milliseconds

1 2 3