/freebsd-10.0-release/crypto/openssl/crypto/rc5/ |
H A D | rc5_skey.c | 63 int rounds) 68 if ( (rounds != RC5_16_ROUNDS) && 69 (rounds != RC5_12_ROUNDS) && 70 (rounds != RC5_8_ROUNDS)) 71 rounds=RC5_16_ROUNDS; 73 key->rounds=rounds; 93 t=(rounds+1)*2; 62 RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data, int rounds) argument
|
H A D | rc5.h | 92 /* Number of rounds */ 93 int rounds; member in struct:rc5_key_st 99 int rounds);
|
H A D | rc5_enc.c | 154 if (key->rounds == 12) 161 else if (key->rounds == 16) 185 if (key->rounds == 16) 197 else if (key->rounds == 12)
|
/freebsd-10.0-release/sys/crypto/aesni/ |
H A D | aesni.h | 61 int rounds; member in struct:aesni_session 82 void aesni_encrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/, 85 void aesni_decrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/, 87 void aesni_encrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/, 89 void aesni_decrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/, 92 void aesni_encrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/, 95 void aesni_decrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/,
|
H A D | aesni_wrap.c | 49 aesni_encrypt_cbc(int rounds, const void *key_schedule, size_t len, argument 58 tot = aesni_enc(rounds - 1, key_schedule, 68 aesni_decrypt_cbc(int rounds, const void *key_schedule, size_t len, argument 80 aesni_dec8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], 95 aesni_dec(rounds - 1, key_schedule, nextiv) ^ ivreg); 102 aesni_encrypt_ecb(int rounds, const void *key_schedule, size_t len, argument 115 aesni_enc8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], 132 tot = aesni_enc(rounds - 1, key_schedule, 141 aesni_decrypt_ecb(int rounds, const void *key_schedule, size_t len, argument 154 aesni_dec8(rounds 202 aesni_crypt_xts_block(int rounds, const __m128i *key_schedule, __m128i *tweak, const uint8_t *from, uint8_t *to, int do_encrypt) argument 220 aesni_crypt_xts_block8(int rounds, const __m128i *key_schedule, __m128i *tweak, const uint8_t *from, uint8_t *to, int do_encrypt) argument 273 aesni_crypt_xts(int rounds, const __m128i *data_schedule, const __m128i *tweak_schedule, size_t len, const uint8_t *from, uint8_t *to, const uint8_t iv[AES_BLOCK_LEN], int do_encrypt) argument 313 aesni_encrypt_xts(int rounds, const void *data_schedule, const void *tweak_schedule, size_t len, const uint8_t *from, uint8_t *to, const uint8_t iv[AES_BLOCK_LEN]) argument 323 aesni_decrypt_xts(int rounds, const void *data_schedule, const void *tweak_schedule, size_t len, const uint8_t *from, uint8_t *to, const uint8_t iv[AES_BLOCK_LEN]) argument [all...] |
H A D | aesencdec.h | 33 aesni_enc8(int rounds, const __m128i *keysched, __m128i a, argument 48 for (i = 0; i < rounds; i++) { 70 aesni_dec8(int rounds, const __m128i *keysched, __m128i a, argument 85 for (i = 0; i < rounds; i++) { 107 aesni_enc(int rounds, const __m128i *keysched, const __m128i from) argument 114 for (i = 0; i < rounds; i++) 121 aesni_dec(int rounds, const __m128i *keysched, const __m128i from) argument 128 for (i = 0; i < rounds; i++)
|
/freebsd-10.0-release/crypto/openssl/crypto/evp/ |
H A D | e_rc5.c | 75 int rounds; /* number of rounds */ member in struct:__anon5140 92 data(c)->rounds = RC5_12_ROUNDS; 96 *(int *)ptr = data(c)->rounds; 105 data(c)->rounds = arg; 122 key,data(ctx)->rounds);
|
/freebsd-10.0-release/sys/opencrypto/ |
H A D | cast.h | 16 int rounds; /* Number of rounds to use, 12 or 16 */ member in struct:__anon10815
|
/freebsd-10.0-release/crypto/openssl/crypto/aes/asm/ |
H A D | aes-armv4.pl | 51 $rounds="r12"; 172 mov $rounds,r0 @ inp 176 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral 177 ldrb $t1,[$rounds,#2] @ manner... 178 ldrb $t2,[$rounds,#1] 179 ldrb $t3,[$rounds,#0] 181 ldrb $s1,[$rounds,#7] 183 ldrb $t1,[$rounds,#6] 185 ldrb $t2,[$rounds,#5] 186 ldrb $t3,[$rounds,# [all...] |
H A D | aesni-x86.pl | 61 $rounds="ecx"; 65 $rounds_="ebx"; # backup copy for $rounds 109 &dec ($rounds); 125 &cmp ($rounds,11); 169 &mov ($rounds,&DWP(240,$key)); 185 &mov ($rounds,&DWP(240,$key)); 213 &shr ($rounds,1); 224 &dec ($rounds); 253 &shr ($rounds,1); 264 &dec ($rounds); [all...] |
H A D | aes-sparcv9.pl | 70 $rounds="%i7"; # aliases with return address, which is off-loaded to stack 193 ld [$key+240],$rounds 197 srl $rounds,1,$rounds 260 subcc $rounds,1,$rounds ! 263 add $tbl,2048,$rounds 437 ldub [$rounds+$acc0],$acc0 440 ldub [$rounds+$acc1],$acc1 443 ldub [$rounds [all...] |
H A D | aesni-x86_64.pl | 73 # rounds for larger block sizes, i.e. 192-bit result being 10/12 times 97 # calculated as latency times number of rounds, 10 for 128-bit key, 184 $rounds="%eax"; # input to and changed by aesni_[en|de]cryptN !!! 192 $rnds_="%r10d"; # backup copy for $rounds 212 my ($p,$key,$rounds,$inout,$ivec)=@_; $inout=$inout0 if (!defined($inout)); 230 dec $rounds 247 mov 240($key),$rounds # key->rounds 249 &aesni_generate1("enc",$key,$rounds); 260 mov 240($key),$rounds # ke [all...] |
H A D | aes-parisc.pl | 63 $rounds="%r29"; 188 ldw 240($key),$rounds 192 _srm $rounds,1,$rounds 235 addib,= -1,$rounds,L\$enc_last 350 ldo 1024($tbl),$rounds 387 ldbx $acc0($rounds),$acc0 389 ldbx $acc1($rounds),$acc1 392 ldbx $acc2($rounds),$acc2 393 ldbx $acc3($rounds), [all...] |
/freebsd-10.0-release/crypto/openssh/ |
H A D | auth2-jpake.c | 223 long long rounds; local 237 rounds = strtonum(rounds_s, 1, 1<<31, NULL); 246 rounds = MAX(rounds, 7250); 247 rounds = MIN(rounds, (1<<24) - 1); 249 pw_encode64(rounds), pw_encode64(rounds >> 6), 250 pw_encode64(rounds >> 12), pw_encode64(rounds >> 1 [all...] |
/freebsd-10.0-release/secure/lib/libcrypt/ |
H A D | crypt-blowfish.c | 39 * REPEAT rounds: 62 * You can have up to 2^31 rounds which should be enough for some 69 #define BCRYPT_MINROUNDS 16 /* we have log2(rounds) in salt */ 139 u_int32_t rounds, i, k; local 150 rounds = 1 << logr; 189 rounds = 1 << logr; 190 if (rounds < BCRYPT_MINROUNDS) 193 /* Discard num rounds + "$" identifier */ 207 for (k = 0; k < rounds; k++) {
|
/freebsd-10.0-release/contrib/ldns/ |
H A D | util.c | 422 size_t i, j = 0, rounds, seed = 1; local 425 rounds = (len / 2) + 1; 426 retval = LDNS_XMALLOC(char, rounds * 6); 429 for (i = 0; i < rounds; i++) { 431 if ((i + 1 < rounds) || (len % 2 != 0)) { 440 if ((i + 1) < rounds) {
|
/freebsd-10.0-release/sys/crypto/siphash/ |
H A D | siphash.c | 32 * are the number of compression rounds and the number of finalization rounds. 215 int rounds; local 218 rounds = ctx->rounds_compr; 220 rounds = ctx->rounds_final; 222 while (rounds--) {
|
/freebsd-10.0-release/lib/libcrypt/ |
H A D | crypt-sha256.c | 50 /* Prefix for optional rounds specification. */ 51 static const char sha256_rounds_prefix[] = "rounds="; 55 /* Default number of rounds if not explicitly specified. */ 57 /* Minimum number of rounds. */ 59 /* Maximum number of rounds. */ 69 size_t salt_len, key_len, cnt, rounds; local 77 /* Default number of rounds. */ 78 rounds = ROUNDS_DEFAULT; 94 rounds = MAX(ROUNDS_MIN, MIN(srounds, ROUNDS_MAX)); 183 for (cnt = 0; cnt < rounds; [all...] |
H A D | crypt-sha512.c | 50 /* Prefix for optional rounds specification. */ 51 static const char sha512_rounds_prefix[] = "rounds="; 55 /* Default number of rounds if not explicitly specified. */ 57 /* Minimum number of rounds. */ 59 /* Maximum number of rounds. */ 69 size_t salt_len, key_len, cnt, rounds; local 77 /* Default number of rounds. */ 78 rounds = ROUNDS_DEFAULT; 94 rounds = MAX(ROUNDS_MIN, MIN(srounds, ROUNDS_MAX)); 183 for (cnt = 0; cnt < rounds; [all...] |
/freebsd-10.0-release/sys/netinet/ |
H A D | sctp_ss_functions.c | 534 strq->ss_params.fb.rounds = -1; 553 strq->ss_params.fb.rounds = with_strq->ss_params.fb.rounds; 555 strq->ss_params.fb.rounds = -1; 571 if (strq->ss_params.fb.rounds < 0) 572 strq->ss_params.fb.rounds = TAILQ_FIRST(&strq->outqueue)->length; 636 if ((strqt->ss_params.fb.rounds >= 0) && (strq == NULL || 637 strqt->ss_params.fb.rounds < strq->ss_params.fb.rounds)) { 658 subtract = strq->ss_params.fb.rounds; [all...] |
/freebsd-10.0-release/sys/dev/random/ |
H A D | live_entropy_sources.c | 137 * number of rounds, which should be a multiple of the number 146 live_entropy_sources_feed(int rounds, event_proc_f entropy_processor) argument 161 for (i = 0; i < rounds; i++) {
|
/freebsd-10.0-release/sys/gnu/fs/reiserfs/ |
H A D | reiserfs_hashes.c | 36 #define TEACORE(rounds) \ 42 n = rounds; \
|
/freebsd-10.0-release/crypto/openssl/crypto/aes/ |
H A D | aes.h | 82 int rounds; member in struct:aes_key_st
|
H A D | aes_core.c | 643 key->rounds = 10; 645 key->rounds = 12; 647 key->rounds = 14; 744 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) { 751 for (i = 1; i < (key->rounds); i++) { 847 if (key->rounds > 10) { 858 if (key->rounds > 12) { 871 rk += key->rounds << 2; 874 * Nr - 1 full rounds: 876 r = key->rounds >> [all...] |
/freebsd-10.0-release/crypto/openssl/crypto/sha/asm/ |
H A D | sha512-s390x.pl | 82 $rounds=80; 96 $rounds=64; 285 lghi $t0,`($rounds-16)*$SZ`
|