/freebsd-current/sys/contrib/ck/src/ |
H A D | ck_barrier_tournament.c | 36 * move on to the next round, while losers spin in their current rounds 61 struct ck_barrier_tournament_round **rounds, 71 rounds[i][0].flag = 0; 72 rounds[i][0].role = CK_BARRIER_TOURNAMENT_DROPOUT; 74 rounds[i][k].flag = 0; 79 rounds[i][k].role = CK_BARRIER_TOURNAMENT_WINNER; 81 rounds[i][k].role = CK_BARRIER_TOURNAMENT_BYE; 85 rounds[i][k].role = CK_BARRIER_TOURNAMENT_LOSER; 87 rounds[i][k].role = CK_BARRIER_TOURNAMENT_CHAMPION; 89 if (rounds[ 60 ck_barrier_tournament_init(struct ck_barrier_tournament *barrier, struct ck_barrier_tournament_round **rounds, unsigned int nthr) argument 112 struct ck_barrier_tournament_round **rounds = ck_pr_load_ptr(&barrier->rounds); local [all...] |
/freebsd-current/crypto/openssl/crypto/rc5/ |
H A D | rc5_skey.c | 20 int rounds) 28 if ((rounds != RC5_16_ROUNDS) && 29 (rounds != RC5_12_ROUNDS) && (rounds != RC5_8_ROUNDS)) 30 rounds = RC5_16_ROUNDS; 32 key->rounds = rounds; 50 t = (rounds + 1) * 2; 19 RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data, int rounds) argument
|
/freebsd-current/crypto/openssl/crypto/evp/ |
H A D | e_rc5.c | 32 int rounds; /* number of rounds */ member in struct:__anon3954 47 data(c)->rounds = RC5_12_ROUNDS; 51 *(int *)ptr = data(c)->rounds; 59 data(c)->rounds = arg; 81 return RC5_32_set_key(&data(ctx)->ks, key_len, key, data(ctx)->rounds);
|
/freebsd-current/sys/crypto/aesni/ |
H A D | aesencdec.h | 38 aesni_enc8(int rounds, const __m128i *keysched, __m128i a, argument 53 for (i = 0; i < rounds; i++) { 75 aesni_dec8(int rounds, const __m128i *keysched, __m128i a, argument 90 for (i = 0; i < rounds; i++) { 111 /* rounds is passed in as rounds - 1 */ 113 aesni_enc(int rounds, const __m128i *keysched, const __m128i from) argument 119 for (i = 1; i < rounds; i += 2) { 124 tmp = _mm_aesenc_si128(tmp, keysched[rounds]); 125 return _mm_aesenclast_si128(tmp, keysched[rounds 129 aesni_dec(int rounds, const __m128i *keysched, const __m128i from) argument [all...] |
H A D | aesni.h | 55 int rounds; member in struct:aesni_session 78 void aesni_encrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/, 81 void aesni_decrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/, 83 void aesni_encrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/, 85 void aesni_decrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/, 87 void aesni_encrypt_icm(int rounds, const void *key_schedule /*__aligned(16)*/, 91 void aesni_encrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/, 95 void aesni_decrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/,
|
H A D | aesni_wrap.c | 54 aesni_encrypt_cbc(int rounds, const void *key_schedule, size_t len, argument 63 tot = aesni_enc(rounds - 1, key_schedule, 73 aesni_decrypt_cbc(int rounds, const void *key_schedule, size_t len, argument 85 aesni_dec8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], 100 aesni_dec(rounds - 1, key_schedule, nextiv) ^ ivreg); 107 aesni_encrypt_ecb(int rounds, const void *key_schedule, size_t len, argument 120 aesni_enc8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], 137 tot = aesni_enc(rounds - 1, key_schedule, 146 aesni_decrypt_ecb(int rounds, const void *key_schedule, size_t len, argument 159 aesni_dec8(rounds 203 aesni_encrypt_icm(int rounds, const void *key_schedule, size_t len, const uint8_t *from, uint8_t *to, const uint8_t iv[static AES_BLOCK_LEN]) argument 313 aesni_crypt_xts_block(int rounds, const __m128i *key_schedule, __m128i *tweak, const uint8_t *from, uint8_t *to, int do_encrypt) argument 331 aesni_crypt_xts_block8(int rounds, const __m128i *key_schedule, __m128i *tweak, const uint8_t *from, uint8_t *to, int do_encrypt) argument 384 aesni_crypt_xts(int rounds, const __m128i *data_schedule, const __m128i *tweak_schedule, size_t len, const uint8_t *from, uint8_t *to, const uint8_t iv[static AES_BLOCK_LEN], int do_encrypt) argument 424 aesni_encrypt_xts(int rounds, const void *data_schedule, const void *tweak_schedule, size_t len, const uint8_t *from, uint8_t *to, const uint8_t iv[static AES_BLOCK_LEN]) argument 434 aesni_decrypt_xts(int rounds, const void *data_schedule, const void *tweak_schedule, size_t len, const uint8_t *from, uint8_t *to, const uint8_t iv[static AES_BLOCK_LEN]) argument [all...] |
/freebsd-current/crypto/openssl/providers/implementations/ciphers/ |
H A D | cipher_rc5.h | 19 unsigned int rounds; /* number of rounds */ member in struct:prov_blowfish_ctx_st
|
H A D | cipher_rc5.c | 90 unsigned int rounds; local 92 if (!OSSL_PARAM_get_uint(p, &rounds)) { 96 if (rounds != RC5_8_ROUNDS 97 && rounds != RC5_12_ROUNDS 98 && rounds != RC5_16_ROUNDS) { 102 ctx->rounds = rounds; 125 if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->rounds)) { 152 ctx->rounds = RC5_12_ROUNDS; \
|
H A D | cipher_rc5_hw.c | 23 return RC5_32_set_key(&rctx->ks.ks, keylen, key, rctx->rounds);
|
/freebsd-current/sys/opencrypto/ |
H A D | gmac.h | 44 int rounds; member in struct:aes_gmac_ctx
|
H A D | cbc_mac.h | 53 int rounds; member in struct:aes_cbc_mac_ctx
|
H A D | gmac.c | 53 agc->rounds = rijndaelKeySetupEnc(agc->keysched, key, klen * 8); 55 rijndaelEncrypt(agc->keysched, agc->rounds, zeros, hbuf); 125 rijndaelEncrypt(agc->keysched, agc->rounds, agc->counter, enccntr);
|
/freebsd-current/crypto/openssl/crypto/aes/asm/ |
H A D | aes-armv4.pl | 72 $rounds="r12"; 214 mov $rounds,r0 @ inp 217 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral 218 ldrb $t1,[$rounds,#2] @ manner... 219 ldrb $t2,[$rounds,#1] 220 ldrb $t3,[$rounds,#0] 222 ldrb $s1,[$rounds,#7] 224 ldrb $t1,[$rounds,#6] 226 ldrb $t2,[$rounds,#5] 227 ldrb $t3,[$rounds,# [all...] |
H A D | aesni-x86.pl | 90 $rounds="ecx"; 94 $rounds_="ebx"; # backup copy for $rounds 138 &dec ($rounds); 154 &cmp ($rounds,11); 198 &mov ($rounds,&DWP(240,$key)); 217 &mov ($rounds,&DWP(240,$key)); 250 &shl ($rounds,4); 255 &lea ($key,&DWP(32,$key,$rounds)); 256 &neg ($rounds); 257 &add ($rounds,1 [all...] |
H A D | aes-sparcv9.pl | 77 $rounds="%i7"; # aliases with return address, which is off-loaded to stack 205 ld [$key+240],$rounds 209 srl $rounds,1,$rounds 272 subcc $rounds,1,$rounds ! 275 add $tbl,2048,$rounds 449 ldub [$rounds+$acc0],$acc0 452 ldub [$rounds+$acc1],$acc1 455 ldub [$rounds [all...] |
H A D | aesv8-armx.pl | 104 my ($inp,$bits,$out,$ptr,$rounds)=("x0","w1","x2","x3","w12"); 203 mov $rounds,#10 242 mov $rounds,#12 250 mov $rounds,#14 285 str $rounds,[$out] 356 my $rounds="w3"; 369 ldr $rounds,[$key,#240] 372 sub $rounds,$rounds,#2 379 subs $rounds, [all...] |
/freebsd-current/crypto/openssh/ |
H A D | cipher-aesctr.h | 26 int rounds; /* keylen-dependent #rounds */ member in struct:aesctr_ctx
|
H A D | cipher-aesctr.c | 59 x->rounds = rijndaelKeySetupEnc(x->ek, k, kbits); 76 rijndaelEncrypt(x->ek, x->rounds, x->ctr, buf);
|
/freebsd-current/sys/crypto/openssl/ |
H A D | ossl_cipher.h | 58 int rounds; member in struct:ossl_aes_keysched
|
/freebsd-current/crypto/openssl/include/crypto/ |
H A D | aria.h | 38 unsigned int rounds; member in struct:aria_key_st
|
/freebsd-current/crypto/openssl/include/openssl/ |
H A D | rc5.h | 44 /* Number of rounds */ 45 int rounds; member in struct:rc5_key_st 52 int rounds);
|
/freebsd-current/crypto/openssl/test/ |
H A D | rdrand_sanitytest.c | 24 int rounds, int min_failures, int max_retries, int max_zero_words) 31 for (i = 0; i < rounds; i++) { 23 sanity_check_bytes(size_t (rng)unsigned char *, size_t), int rounds, int min_failures, int max_retries, int max_zero_words) argument
|
/freebsd-current/contrib/libarchive/libarchive/ |
H A D | archive_cryptor.c | 51 size_t salt_len, unsigned rounds, uint8_t *derived_key, 55 pw_len, salt, salt_len, kCCPRFHmacAlgSHA1, rounds, 67 size_t salt_len, unsigned rounds, uint8_t *derived_key, 80 (PUCHAR)(uintptr_t)salt, (ULONG)salt_len, rounds, 92 size_t salt_len, unsigned rounds, uint8_t *derived_key, 111 pw_len, salt, salt_len, rounds, derived_key_len, derived_key); 121 size_t salt_len, unsigned rounds, uint8_t *derived_key, 123 pbkdf2_hmac_sha1((unsigned)pw_len, (const uint8_t *)pw, rounds, 132 size_t salt_len, unsigned rounds, uint8_t *derived_key, 135 PKCS5_PBKDF2_HMAC_SHA1(pw, pw_len, salt, salt_len, rounds, 50 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 66 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 91 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 120 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 131 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 144 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument [all...] |
/freebsd-current/sys/crypto/armv8/ |
H A D | armv8_crypto_wrap.c | 56 armv8_aes_enc(int rounds, const uint8x16_t *keysched, const uint8x16_t from) argument 62 for (i = 0; i < rounds - 1; i += 2) { 69 tmp = vaeseq_u8(tmp, keysched[rounds - 1]); 71 tmp = vaeseq_u8(tmp, keysched[rounds]); 72 tmp = veorq_u8(tmp, keysched[rounds + 1]); 78 armv8_aes_dec(int rounds, const uint8x16_t *keysched, const uint8x16_t from) argument 84 for (i = 0; i < rounds - 1; i += 2) { 91 tmp = vaesdq_u8(tmp, keysched[rounds - 1]); 93 tmp = vaesdq_u8(tmp, keysched[rounds]); 94 tmp = veorq_u8(tmp, keysched[rounds 217 armv8_aes_crypt_xts_block(int rounds, const uint8x16_t *key_schedule, uint8x16_t *tweak, const uint8_t *from, uint8_t *to, int do_encrypt) argument 235 armv8_aes_crypt_xts(int rounds, const uint8x16_t *data_schedule, const uint8x16_t *tweak_schedule, size_t len, struct crypto_buffer_cursor *fromc, struct crypto_buffer_cursor *toc, const uint8_t iv[static AES_BLOCK_LEN], int do_encrypt) argument [all...] |
/freebsd-current/contrib/netbsd-tests/rump/rumpkern/h_client/ |
H A D | h_stresscli.c | 136 int rounds, myport; local 153 for (rounds = 1; rounds < atoi(argv[1])*10; rounds++) {
|