/freebsd-10.1-release/crypto/openssl/crypto/rc5/ |
H A D | rc5_skey.c | 63 int rounds) 68 if ((rounds != RC5_16_ROUNDS) && 69 (rounds != RC5_12_ROUNDS) && (rounds != RC5_8_ROUNDS)) 70 rounds = RC5_16_ROUNDS; 72 key->rounds = rounds; 90 t = (rounds + 1) * 2; 62 RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data, int rounds) argument
|
H A D | rc5.h | 90 /* Number of rounds */ 91 int rounds; member in struct:rc5_key_st 96 int rounds);
|
H A D | rc5_enc.c | 155 if (key->rounds == 12) { 160 } else if (key->rounds == 16) { 183 if (key->rounds == 16) { 193 } else if (key->rounds == 12) {
|
/freebsd-10.1-release/sys/crypto/aesni/ |
H A D | aesni.h | 61 int rounds; member in struct:aesni_session 82 void aesni_encrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/, 85 void aesni_decrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/, 87 void aesni_encrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/, 89 void aesni_decrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/, 92 void aesni_encrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/, 95 void aesni_decrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/,
|
H A D | aesni_wrap.c | 49 aesni_encrypt_cbc(int rounds, const void *key_schedule, size_t len, argument 58 tot = aesni_enc(rounds - 1, key_schedule, 68 aesni_decrypt_cbc(int rounds, const void *key_schedule, size_t len, argument 80 aesni_dec8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], 95 aesni_dec(rounds - 1, key_schedule, nextiv) ^ ivreg); 102 aesni_encrypt_ecb(int rounds, const void *key_schedule, size_t len, argument 115 aesni_enc8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], 132 tot = aesni_enc(rounds - 1, key_schedule, 141 aesni_decrypt_ecb(int rounds, const void *key_schedule, size_t len, argument 154 aesni_dec8(rounds 202 aesni_crypt_xts_block(int rounds, const __m128i *key_schedule, __m128i *tweak, const uint8_t *from, uint8_t *to, int do_encrypt) argument 220 aesni_crypt_xts_block8(int rounds, const __m128i *key_schedule, __m128i *tweak, const uint8_t *from, uint8_t *to, int do_encrypt) argument 273 aesni_crypt_xts(int rounds, const __m128i *data_schedule, const __m128i *tweak_schedule, size_t len, const uint8_t *from, uint8_t *to, const uint8_t iv[AES_BLOCK_LEN], int do_encrypt) argument 313 aesni_encrypt_xts(int rounds, const void *data_schedule, const void *tweak_schedule, size_t len, const uint8_t *from, uint8_t *to, const uint8_t iv[AES_BLOCK_LEN]) argument 323 aesni_decrypt_xts(int rounds, const void *data_schedule, const void *tweak_schedule, size_t len, const uint8_t *from, uint8_t *to, const uint8_t iv[AES_BLOCK_LEN]) argument [all...] |
H A D | aesencdec.h | 33 aesni_enc8(int rounds, const __m128i *keysched, __m128i a, argument 48 for (i = 0; i < rounds; i++) { 70 aesni_dec8(int rounds, const __m128i *keysched, __m128i a, argument 85 for (i = 0; i < rounds; i++) { 107 aesni_enc(int rounds, const __m128i *keysched, const __m128i from) argument 114 for (i = 0; i < rounds; i++) 121 aesni_dec(int rounds, const __m128i *keysched, const __m128i from) argument 128 for (i = 0; i < rounds; i++)
|
H A D | aesni.c | 411 aesni_encrypt_cbc(ses->rounds, ses->enc_schedule, 414 aesni_encrypt_xts(ses->rounds, ses->enc_schedule, 425 aesni_decrypt_cbc(ses->rounds, ses->dec_schedule, 428 aesni_decrypt_xts(ses->rounds, ses->dec_schedule,
|
/freebsd-10.1-release/crypto/openssl/crypto/evp/ |
H A D | e_rc5.c | 74 int rounds; /* number of rounds */ member in struct:__anon159 89 data(c)->rounds = RC5_12_ROUNDS; 93 *(int *)ptr = data(c)->rounds; 101 data(c)->rounds = arg; 118 key, data(ctx)->rounds);
|
/freebsd-10.1-release/sys/opencrypto/ |
H A D | cast.h | 16 int rounds; /* Number of rounds to use, 12 or 16 */ member in struct:__anon11180
|
/freebsd-10.1-release/crypto/openssl/crypto/aes/asm/ |
H A D | aes-armv4.pl | 51 $rounds="r12"; 172 mov $rounds,r0 @ inp 176 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral 177 ldrb $t1,[$rounds,#2] @ manner... 178 ldrb $t2,[$rounds,#1] 179 ldrb $t3,[$rounds,#0] 181 ldrb $s1,[$rounds,#7] 183 ldrb $t1,[$rounds,#6] 185 ldrb $t2,[$rounds,#5] 186 ldrb $t3,[$rounds,# [all...] |
H A D | aesni-x86.pl | 61 $rounds="ecx"; 65 $rounds_="ebx"; # backup copy for $rounds 109 &dec ($rounds); 125 &cmp ($rounds,11); 169 &mov ($rounds,&DWP(240,$key)); 185 &mov ($rounds,&DWP(240,$key)); 213 &shr ($rounds,1); 224 &dec ($rounds); 253 &shr ($rounds,1); 264 &dec ($rounds); [all...] |
H A D | aes-sparcv9.pl | 70 $rounds="%i7"; # aliases with return address, which is off-loaded to stack 193 ld [$key+240],$rounds 197 srl $rounds,1,$rounds 260 subcc $rounds,1,$rounds ! 263 add $tbl,2048,$rounds 437 ldub [$rounds+$acc0],$acc0 440 ldub [$rounds+$acc1],$acc1 443 ldub [$rounds [all...] |
H A D | aesni-x86_64.pl | 73 # rounds for larger block sizes, i.e. 192-bit result being 10/12 times 97 # calculated as latency times number of rounds, 10 for 128-bit key, 184 $rounds="%eax"; # input to and changed by aesni_[en|de]cryptN !!! 192 $rnds_="%r10d"; # backup copy for $rounds 212 my ($p,$key,$rounds,$inout,$ivec)=@_; $inout=$inout0 if (!defined($inout)); 230 dec $rounds 247 mov 240($key),$rounds # key->rounds 249 &aesni_generate1("enc",$key,$rounds); 260 mov 240($key),$rounds # ke [all...] |
H A D | aes-parisc.pl | 63 $rounds="%r29"; 188 ldw 240($key),$rounds 192 _srm $rounds,1,$rounds 235 addib,= -1,$rounds,L\$enc_last 350 ldo 1024($tbl),$rounds 387 ldbx $acc0($rounds),$acc0 389 ldbx $acc1($rounds),$acc1 392 ldbx $acc2($rounds),$acc2 393 ldbx $acc3($rounds), [all...] |
/freebsd-10.1-release/crypto/openssh/openbsd-compat/ |
H A D | bcrypt_pbkdf.c | 46 * 4. The hash function is defined to perform 64 rounds of initial state 47 * expansion. (More rounds are performed by iterating the hash.) 107 u_int8_t *key, size_t keylen, unsigned int rounds) 118 if (rounds < 1) 146 for (i = 1; i < rounds; i++) { 147 /* subsequent rounds, salt is previous output */ 106 bcrypt_pbkdf(const char *pass, size_t passlen, const u_int8_t *salt, size_t saltlen, u_int8_t *key, size_t keylen, unsigned int rounds) argument
|
/freebsd-10.1-release/secure/lib/libcrypt/ |
H A D | crypt-blowfish.c | 41 * 3. REPEAT rounds: 65 * You can have up to 2^31 rounds which should be enough for some 72 #define BCRYPT_MINLOGROUNDS 4 /* we have log2(rounds) in salt */ 142 u_int32_t rounds, i, k; local 154 rounds = 1U << logr; 194 rounds = 1U << logr; 196 /* Discard num rounds + "$" identifier */ 223 for (k = 0; k < rounds; k++) {
|
/freebsd-10.1-release/sys/crypto/siphash/ |
H A D | siphash.c | 32 * are the number of compression rounds and the number of finalization rounds. 215 int rounds; local 218 rounds = ctx->rounds_compr; 220 rounds = ctx->rounds_final; 222 while (rounds--) {
|
/freebsd-10.1-release/lib/libcrypt/ |
H A D | crypt-sha256.c | 50 /* Prefix for optional rounds specification. */ 51 static const char sha256_rounds_prefix[] = "rounds="; 55 /* Default number of rounds if not explicitly specified. */ 57 /* Minimum number of rounds. */ 59 /* Maximum number of rounds. */ 69 size_t salt_len, key_len, cnt, rounds; local 77 /* Default number of rounds. */ 78 rounds = ROUNDS_DEFAULT; 94 rounds = MAX(ROUNDS_MIN, MIN(srounds, ROUNDS_MAX)); 183 for (cnt = 0; cnt < rounds; [all...] |
H A D | crypt-sha512.c | 50 /* Prefix for optional rounds specification. */ 51 static const char sha512_rounds_prefix[] = "rounds="; 55 /* Default number of rounds if not explicitly specified. */ 57 /* Minimum number of rounds. */ 59 /* Maximum number of rounds. */ 69 size_t salt_len, key_len, cnt, rounds; local 77 /* Default number of rounds. */ 78 rounds = ROUNDS_DEFAULT; 94 rounds = MAX(ROUNDS_MIN, MIN(srounds, ROUNDS_MAX)); 183 for (cnt = 0; cnt < rounds; [all...] |
/freebsd-10.1-release/sys/netinet/ |
H A D | sctp_ss_functions.c | 534 strq->ss_params.fb.rounds = -1; 553 strq->ss_params.fb.rounds = with_strq->ss_params.fb.rounds; 555 strq->ss_params.fb.rounds = -1; 571 if (strq->ss_params.fb.rounds < 0) 572 strq->ss_params.fb.rounds = TAILQ_FIRST(&strq->outqueue)->length; 636 if ((strqt->ss_params.fb.rounds >= 0) && (strq == NULL || 637 strqt->ss_params.fb.rounds < strq->ss_params.fb.rounds)) { 658 subtract = strq->ss_params.fb.rounds; [all...] |
/freebsd-10.1-release/sys/dev/random/ |
H A D | live_entropy_sources.c | 137 * number of rounds, which should be a multiple of the number 146 live_entropy_sources_feed(int rounds, event_proc_f entropy_processor) argument 161 for (i = 0; i < rounds; i++) {
|
/freebsd-10.1-release/sys/gnu/fs/reiserfs/ |
H A D | reiserfs_hashes.c | 36 #define TEACORE(rounds) \ 42 n = rounds; \
|
/freebsd-10.1-release/crypto/openssl/crypto/aes/ |
H A D | aes.h | 84 int rounds; member in struct:aes_key_st
|
H A D | aes_core.c | 644 key->rounds = 10; 646 key->rounds = 12; 648 key->rounds = 14; 746 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) { 753 for (i = 1; i < (key->rounds); i++) { 849 if (key->rounds > 10) { 860 if (key->rounds > 12) { 873 rk += key->rounds << 2; 876 * Nr - 1 full rounds: 878 r = key->rounds >> [all...] |
/freebsd-10.1-release/contrib/ldns/ |
H A D | util.c | 423 size_t i, j = 0, rounds, seed = 1; local 426 rounds = (len / 2) + 1; 427 retval = LDNS_XMALLOC(char, rounds * 6); 430 for (i = 0; i < rounds; i++) { 432 if ((i + 1 < rounds) || (len % 2 != 0)) { 441 if ((i + 1) < rounds) {
|