/netbsd-current/crypto/dist/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
H A D | rijndael-api-fst.c | 453 * Encrypts/Decrypts exactly one full block a specified number of rounds. 461 BYTE *input, int inputLen, BYTE *outBuffer, int rounds) { 476 rijndaelEncryptRound(block, key->keySched, key->ROUNDS, rounds); 480 rijndaelDecryptRound(block, key->keySched, key->ROUNDS, rounds); 460 rijndael_cipherUpdateRounds(cipherInstance *cipher, keyInstance *key, BYTE *input, int inputLen, BYTE *outBuffer, int rounds) argument
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/sha/asm/ |
H A D | sha512p8-ppc.pl | 73 $rounds=80; 78 $rounds=64; 217 li r0,`($rounds-16)/16` # inner loop counter
|
H A D | sha512-mips.pl | 105 $rounds=80; 120 $rounds=64; 421 $PTR_SUB $Ktbl,`($rounds-16)*$SZ` # rewind $Ktbl
|
H A D | sha512-ppc.pl | 81 $rounds=80; 93 $rounds=64; 395 li $t0,`$rounds/16-1` 411 subi $Tbl,$Tbl,`($rounds-16)*$SZ` ; rewind Tbl 642 li $a0,`$rounds/16-1` 659 subi $Tbl,$Tbl,`($rounds-16)*$SZ` ; rewind Tbl
|
H A D | sha512-parisc.pl | 66 $rounds=80; 78 $rounds=64; 317 L\$rounds 322 bb,>= $Tbl,31,L\$rounds ; end of $Tbl signalled? 328 ldo `-$rounds*$SZ-1`($Tbl),$Tbl ; rewind $Tbl 614 ldo `-$rounds*$SZ`($Tbl),$Tbl ; rewind $Tbl
|
H A D | sha512-ia64.pl | 28 # too much. I mean it's 64 32-bit rounds vs. 80 virtually identical 93 $rounds=80; 107 $rounds=64; 507 { .mib; mov ar.lc=$rounds-17 589 { .mmb; add Ktbl=-$SZ*$rounds,Ktbl 644 .size K256#,$SZ*$rounds 690 .size K512#,$SZ*$rounds
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/sha/asm/ |
H A D | sha512-mips.pl | 111 $rounds=80; 126 $rounds=64; 427 $PTR_SUB $Ktbl,`($rounds-16)*$SZ` # rewind $Ktbl
|
H A D | sha512p8-ppc.pl | 76 $rounds=80; 81 $rounds=64; 220 li r0,`($rounds-16)/16` # inner loop counter
|
H A D | sha512-ppc.pl | 84 $rounds=80; 96 $rounds=64; 398 li $t0,`$rounds/16-1` 414 subi $Tbl,$Tbl,`($rounds-16)*$SZ` ; rewind Tbl 645 li $a0,`$rounds/16-1` 662 subi $Tbl,$Tbl,`($rounds-16)*$SZ` ; rewind Tbl
|
H A D | sha512-parisc.pl | 69 $rounds=80; 81 $rounds=64; 320 L\$rounds 325 bb,>= $Tbl,31,L\$rounds ; end of $Tbl signalled? 331 ldo `-$rounds*$SZ-1`($Tbl),$Tbl ; rewind $Tbl 617 ldo `-$rounds*$SZ`($Tbl),$Tbl ; rewind $Tbl
|
H A D | sha512-ia64.pl | 28 # too much. I mean it's 64 32-bit rounds vs. 80 virtually identical 94 $rounds=80; 108 $rounds=64; 508 { .mib; mov ar.lc=$rounds-17 590 { .mmb; add Ktbl=-$SZ*$rounds,Ktbl 645 .size K256#,$SZ*$rounds 691 .size K512#,$SZ*$rounds
|
/netbsd-current/external/mit/expat/dist/lib/ |
H A D | siphash.h | 167 sip_round(struct siphash *H, const int rounds) { argument 170 for (i = 0; i < rounds; i++) {
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/aes/ |
H A D | aes_x86core.c | 53 * referenced in outer and respectively inner rounds. 490 key->rounds = 10; 492 key->rounds = 12; 494 key->rounds = 14; 592 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) { 599 for (i = 1; i < (key->rounds); i++) { 743 * Nr - 2 full rounds: 745 for (rk+=8,r=key->rounds-2; r>0; rk+=4,r--) { 968 * Nr - 2 full rounds: 970 for (rk+=8,r=key->rounds [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/aes/ |
H A D | aes_x86core.c | 53 * referenced in outer and respectively inner rounds. 490 key->rounds = 10; 492 key->rounds = 12; 494 key->rounds = 14; 592 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) { 599 for (i = 1; i < (key->rounds); i++) { 743 * Nr - 2 full rounds: 745 for (rk+=8,r=key->rounds-2; r>0; rk+=4,r--) { 968 * Nr - 2 full rounds: 970 for (rk+=8,r=key->rounds [all...] |
/netbsd-current/crypto/external/bsd/openssl/lib/libcrypto/arch/m68k/ |
H A D | aes-m68k.S | 28 #define rounds (60 * 4) define 61 movel %d0,%a3@(rounds) | key->rounds = 10 138 movel %d0,%a3@(rounds) | key->rounds = 12 229 movel %d0,%a3@(rounds) | key->rounds = 14 407 movel %a3@(rounds),%d4 444 | for (i = 1; i < key->rounds; i++) 500 movel %a3@(rounds), [all...] |
/netbsd-current/crypto/external/bsd/openssl.old/lib/libcrypto/arch/m68k/ |
H A D | aes-m68k.S | 28 #define rounds (60 * 4) define 61 movel %d0,%a3@(rounds) | key->rounds = 10 138 movel %d0,%a3@(rounds) | key->rounds = 12 229 movel %d0,%a3@(rounds) | key->rounds = 14 407 movel %a3@(rounds),%d4 444 | for (i = 1; i < key->rounds; i++) 500 movel %a3@(rounds), [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/aes/asm/ |
H A D | aesni-mb-x86_64.pl | 106 ($rounds,$one,$sink,$offset)=("%eax","%ecx","%rbp","%rbx"); 204 mov 0xf0-0x78($key),$rounds 272 cmp \$11,$rounds 484 mov 0xf0-0x78($key),$rounds 550 cmp \$11,$rounds 763 mov 0xf0-0x78($key),$rounds 828 cmp \$11,$rounds 1063 mov 0xf0-0x78($key),$rounds 1137 cmp \$11,$rounds
|
H A D | aesni-sha1-x86_64.pl | 241 my $rounds="${ivp}d"; 245 mov 240-112($key),$rounds 303 cmp \$11,$rounds 581 $k = (($jj+1)*12/20)*20*$n/12; # 12 aesencs per these 20 rounds 612 $k = (($jj+1)*8/20)*20*$n/8; # 8 aesencs per these 20 rounds 647 $k=(($jj+1)*12/20)*20*$n/12; # 12 aesencs per these 20 rounds 1118 my $rounds="${ivp}d"; 1122 mov 240-112($key),$rounds 1177 cmp \$11,$rounds 1756 $rounds [all...] |
/netbsd-current/crypto/external/bsd/openssh/dist/ |
H A D | sshkey.c | 913 u_int i, j = 0, rounds, seed = 1; local 916 rounds = (dgst_raw_len / 2) + 1; 917 if ((retval = calloc(rounds, 6)) == NULL) 920 for (i = 0; i < rounds; i++) { 922 if ((i + 1 < rounds) || (dgst_raw_len % 2 != 0)) { 931 if ((i + 1) < rounds) { 2721 int rounds) 2733 if (rounds <= 0) 2734 rounds = DEFAULT_ROUNDS; 2762 salt, SALT_LEN, key, keylen + ivlen, rounds) < 2719 sshkey_private_to_blob2(struct sshkey *prv, struct sshbuf *blob, const char *passphrase, const char *comment, const char *ciphername, int rounds) argument 2931 u_int blocksize, rounds, nkeys, encrypted_len, check1, check2; local [all...] |
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/aes/asm/ |
H A D | aesni-sha1-x86_64.pl | 239 my $rounds="${ivp}d"; 243 mov 240-112($key),$rounds 301 cmp \$11,$rounds 579 $k = (($jj+1)*12/20)*20*$n/12; # 12 aesencs per these 20 rounds 610 $k = (($jj+1)*8/20)*20*$n/8; # 8 aesencs per these 20 rounds 645 $k=(($jj+1)*12/20)*20*$n/12; # 12 aesencs per these 20 rounds 1116 my $rounds="${ivp}d"; 1120 mov 240-112($key),$rounds 1175 cmp \$11,$rounds 1754 $rounds [all...] |
/netbsd-current/crypto/external/bsd/openssl.old/dist/engines/ |
H A D | e_padlock.c | 188 int rounds:4; member in struct:__anon347::__anon348 615 cdata->cword.b.rounds = 10 + (key_len - 128) / 32;
|
/netbsd-current/crypto/external/bsd/openssl/dist/engines/ |
H A D | e_padlock.c | 203 int rounds:4; member in struct:__anon413::__anon414 635 cdata->cword.b.rounds = 10 + (key_len - 128) / 32;
|
/netbsd-current/crypto/external/bsd/openssl.old/lib/libcrypto/arch/sparc/ |
H A D | des_enc-sparc.S | 134 ! The logic used in the DES rounds is the same as in the C code, 141 ! In this version we do two rounds in a loop repeated 7 times 142 ! and two rounds separately. 157 ! left and right are kept in the same register in all rounds, meaning 158 ! that after the 16 rounds the result for right is in the register 416 ! two rounds more: 474 ! next round (two rounds more) 670 ! two rounds more: 728 ! next round (two rounds more) 1035 ! two rounds mor [all...] |
/netbsd-current/crypto/external/bsd/openssl.old/lib/libcrypto/arch/sparc64/ |
H A D | des_enc-sparc.S | 134 ! The logic used in the DES rounds is the same as in the C code, 141 ! In this version we do two rounds in a loop repeated 7 times 142 ! and two rounds separately. 157 ! left and right are kept in the same register in all rounds, meaning 158 ! that after the 16 rounds the result for right is in the register 416 ! two rounds more: 474 ! next round (two rounds more) 670 ! two rounds more: 728 ! next round (two rounds more) 1035 ! two rounds mor [all...] |
/netbsd-current/crypto/external/bsd/openssl/lib/libcrypto/arch/sparc64/ |
H A D | des_enc-sparc.S | 132 ! The logic used in the DES rounds is the same as in the C code, 139 ! In this version we do two rounds in a loop repeated 7 times 140 ! and two rounds separately. 155 ! left and right are kept in the same register in all rounds, meaning 156 ! that after the 16 rounds the result for right is in the register 414 ! two rounds more: 472 ! next round (two rounds more) 668 ! two rounds more: 726 ! next round (two rounds more) 1033 ! two rounds mor [all...] |