Searched refs:rounds (Results 76 - 100 of 125) sorted by relevance

12345

/netbsd-current/crypto/dist/ipsec-tools/src/racoon/missing/crypto/rijndael/
H A Drijndael-api-fst.c453 * Encrypts/Decrypts exactly one full block a specified number of rounds.
461 BYTE *input, int inputLen, BYTE *outBuffer, int rounds) {
476 rijndaelEncryptRound(block, key->keySched, key->ROUNDS, rounds);
480 rijndaelDecryptRound(block, key->keySched, key->ROUNDS, rounds);
460 rijndael_cipherUpdateRounds(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer, int rounds) argument
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/sha/asm/
H A Dsha512p8-ppc.pl73 $rounds=80;
78 $rounds=64;
217 li r0,`($rounds-16)/16` # inner loop counter
H A Dsha512-mips.pl105 $rounds=80;
120 $rounds=64;
421 $PTR_SUB $Ktbl,`($rounds-16)*$SZ` # rewind $Ktbl
H A Dsha512-ppc.pl81 $rounds=80;
93 $rounds=64;
395 li $t0,`$rounds/16-1`
411 subi $Tbl,$Tbl,`($rounds-16)*$SZ` ; rewind Tbl
642 li $a0,`$rounds/16-1`
659 subi $Tbl,$Tbl,`($rounds-16)*$SZ` ; rewind Tbl
H A Dsha512-parisc.pl66 $rounds=80;
78 $rounds=64;
317 L\$rounds
322 bb,>= $Tbl,31,L\$rounds ; end of $Tbl signalled?
328 ldo `-$rounds*$SZ-1`($Tbl),$Tbl ; rewind $Tbl
614 ldo `-$rounds*$SZ`($Tbl),$Tbl ; rewind $Tbl
H A Dsha512-ia64.pl28 # too much. I mean it's 64 32-bit rounds vs. 80 virtually identical
93 $rounds=80;
107 $rounds=64;
507 { .mib; mov ar.lc=$rounds-17
589 { .mmb; add Ktbl=-$SZ*$rounds,Ktbl
644 .size K256#,$SZ*$rounds
690 .size K512#,$SZ*$rounds
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/sha/asm/
H A Dsha512-mips.pl111 $rounds=80;
126 $rounds=64;
427 $PTR_SUB $Ktbl,`($rounds-16)*$SZ` # rewind $Ktbl
H A Dsha512p8-ppc.pl76 $rounds=80;
81 $rounds=64;
220 li r0,`($rounds-16)/16` # inner loop counter
H A Dsha512-ppc.pl84 $rounds=80;
96 $rounds=64;
398 li $t0,`$rounds/16-1`
414 subi $Tbl,$Tbl,`($rounds-16)*$SZ` ; rewind Tbl
645 li $a0,`$rounds/16-1`
662 subi $Tbl,$Tbl,`($rounds-16)*$SZ` ; rewind Tbl
H A Dsha512-parisc.pl69 $rounds=80;
81 $rounds=64;
320 L\$rounds
325 bb,>= $Tbl,31,L\$rounds ; end of $Tbl signalled?
331 ldo `-$rounds*$SZ-1`($Tbl),$Tbl ; rewind $Tbl
617 ldo `-$rounds*$SZ`($Tbl),$Tbl ; rewind $Tbl
H A Dsha512-ia64.pl28 # too much. I mean it's 64 32-bit rounds vs. 80 virtually identical
94 $rounds=80;
108 $rounds=64;
508 { .mib; mov ar.lc=$rounds-17
590 { .mmb; add Ktbl=-$SZ*$rounds,Ktbl
645 .size K256#,$SZ*$rounds
691 .size K512#,$SZ*$rounds
/netbsd-current/external/mit/expat/dist/lib/
H A Dsiphash.h167 sip_round(struct siphash *H, const int rounds) { argument
170 for (i = 0; i < rounds; i++) {
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/aes/
H A Daes_x86core.c53 * referenced in outer and respectively inner rounds.
490 key->rounds = 10;
492 key->rounds = 12;
494 key->rounds = 14;
592 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) {
599 for (i = 1; i < (key->rounds); i++) {
743 * Nr - 2 full rounds:
745 for (rk+=8,r=key->rounds-2; r>0; rk+=4,r--) {
968 * Nr - 2 full rounds:
970 for (rk+=8,r=key->rounds
[all...]
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/aes/
H A Daes_x86core.c53 * referenced in outer and respectively inner rounds.
490 key->rounds = 10;
492 key->rounds = 12;
494 key->rounds = 14;
592 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) {
599 for (i = 1; i < (key->rounds); i++) {
743 * Nr - 2 full rounds:
745 for (rk+=8,r=key->rounds-2; r>0; rk+=4,r--) {
968 * Nr - 2 full rounds:
970 for (rk+=8,r=key->rounds
[all...]
/netbsd-current/crypto/external/bsd/openssl/lib/libcrypto/arch/m68k/
H A Daes-m68k.S28 #define rounds (60 * 4) define
61 movel %d0,%a3@(rounds) | key->rounds = 10
138 movel %d0,%a3@(rounds) | key->rounds = 12
229 movel %d0,%a3@(rounds) | key->rounds = 14
407 movel %a3@(rounds),%d4
444 | for (i = 1; i < key->rounds; i++)
500 movel %a3@(rounds),
[all...]
/netbsd-current/crypto/external/bsd/openssl.old/lib/libcrypto/arch/m68k/
H A Daes-m68k.S28 #define rounds (60 * 4) define
61 movel %d0,%a3@(rounds) | key->rounds = 10
138 movel %d0,%a3@(rounds) | key->rounds = 12
229 movel %d0,%a3@(rounds) | key->rounds = 14
407 movel %a3@(rounds),%d4
444 | for (i = 1; i < key->rounds; i++)
500 movel %a3@(rounds),
[all...]
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/aes/asm/
H A Daesni-mb-x86_64.pl106 ($rounds,$one,$sink,$offset)=("%eax","%ecx","%rbp","%rbx");
204 mov 0xf0-0x78($key),$rounds
272 cmp \$11,$rounds
484 mov 0xf0-0x78($key),$rounds
550 cmp \$11,$rounds
763 mov 0xf0-0x78($key),$rounds
828 cmp \$11,$rounds
1063 mov 0xf0-0x78($key),$rounds
1137 cmp \$11,$rounds
H A Daesni-sha1-x86_64.pl241 my $rounds="${ivp}d";
245 mov 240-112($key),$rounds
303 cmp \$11,$rounds
581 $k = (($jj+1)*12/20)*20*$n/12; # 12 aesencs per these 20 rounds
612 $k = (($jj+1)*8/20)*20*$n/8; # 8 aesencs per these 20 rounds
647 $k=(($jj+1)*12/20)*20*$n/12; # 12 aesencs per these 20 rounds
1118 my $rounds="${ivp}d";
1122 mov 240-112($key),$rounds
1177 cmp \$11,$rounds
1756 $rounds
[all...]
/netbsd-current/crypto/external/bsd/openssh/dist/
H A Dsshkey.c913 u_int i, j = 0, rounds, seed = 1; local
916 rounds = (dgst_raw_len / 2) + 1;
917 if ((retval = calloc(rounds, 6)) == NULL)
920 for (i = 0; i < rounds; i++) {
922 if ((i + 1 < rounds) || (dgst_raw_len % 2 != 0)) {
931 if ((i + 1) < rounds) {
2721 int rounds)
2733 if (rounds <= 0)
2734 rounds = DEFAULT_ROUNDS;
2762 salt, SALT_LEN, key, keylen + ivlen, rounds) <
2719 sshkey_private_to_blob2(struct sshkey *prv, struct sshbuf *blob, const char *passphrase, const char *comment, const char *ciphername, int rounds) argument
2931 u_int blocksize, rounds, nkeys, encrypted_len, check1, check2; local
[all...]
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/aes/asm/
H A Daesni-sha1-x86_64.pl239 my $rounds="${ivp}d";
243 mov 240-112($key),$rounds
301 cmp \$11,$rounds
579 $k = (($jj+1)*12/20)*20*$n/12; # 12 aesencs per these 20 rounds
610 $k = (($jj+1)*8/20)*20*$n/8; # 8 aesencs per these 20 rounds
645 $k=(($jj+1)*12/20)*20*$n/12; # 12 aesencs per these 20 rounds
1116 my $rounds="${ivp}d";
1120 mov 240-112($key),$rounds
1175 cmp \$11,$rounds
1754 $rounds
[all...]
/netbsd-current/crypto/external/bsd/openssl.old/dist/engines/
H A De_padlock.c188 int rounds:4; member in struct:__anon347::__anon348
615 cdata->cword.b.rounds = 10 + (key_len - 128) / 32;
/netbsd-current/crypto/external/bsd/openssl/dist/engines/
H A De_padlock.c203 int rounds:4; member in struct:__anon413::__anon414
635 cdata->cword.b.rounds = 10 + (key_len - 128) / 32;
/netbsd-current/crypto/external/bsd/openssl.old/lib/libcrypto/arch/sparc/
H A Ddes_enc-sparc.S134 ! The logic used in the DES rounds is the same as in the C code,
141 ! In this version we do two rounds in a loop repeated 7 times
142 ! and two rounds separately.
157 ! left and right are kept in the same register in all rounds, meaning
158 ! that after the 16 rounds the result for right is in the register
416 ! two rounds more:
474 ! next round (two rounds more)
670 ! two rounds more:
728 ! next round (two rounds more)
1035 ! two rounds mor
[all...]
/netbsd-current/crypto/external/bsd/openssl.old/lib/libcrypto/arch/sparc64/
H A Ddes_enc-sparc.S134 ! The logic used in the DES rounds is the same as in the C code,
141 ! In this version we do two rounds in a loop repeated 7 times
142 ! and two rounds separately.
157 ! left and right are kept in the same register in all rounds, meaning
158 ! that after the 16 rounds the result for right is in the register
416 ! two rounds more:
474 ! next round (two rounds more)
670 ! two rounds more:
728 ! next round (two rounds more)
1035 ! two rounds mor
[all...]
/netbsd-current/crypto/external/bsd/openssl/lib/libcrypto/arch/sparc64/
H A Ddes_enc-sparc.S132 ! The logic used in the DES rounds is the same as in the C code,
139 ! In this version we do two rounds in a loop repeated 7 times
140 ! and two rounds separately.
155 ! left and right are kept in the same register in all rounds, meaning
156 ! that after the 16 rounds the result for right is in the register
414 ! two rounds more:
472 ! next round (two rounds more)
668 ! two rounds more:
726 ! next round (two rounds more)
1033 ! two rounds mor
[all...]

Completed in 660 milliseconds

12345