Searched refs:rounds (Results 1 - 25 of 89) sorted by relevance

1234

/freebsd-current/sys/contrib/ck/src/
H A Dck_barrier_tournament.c36 * move on to the next round, while losers spin in their current rounds
61 struct ck_barrier_tournament_round **rounds,
71 rounds[i][0].flag = 0;
72 rounds[i][0].role = CK_BARRIER_TOURNAMENT_DROPOUT;
74 rounds[i][k].flag = 0;
79 rounds[i][k].role = CK_BARRIER_TOURNAMENT_WINNER;
81 rounds[i][k].role = CK_BARRIER_TOURNAMENT_BYE;
85 rounds[i][k].role = CK_BARRIER_TOURNAMENT_LOSER;
87 rounds[i][k].role = CK_BARRIER_TOURNAMENT_CHAMPION;
89 if (rounds[
60 ck_barrier_tournament_init(struct ck_barrier_tournament *barrier, struct ck_barrier_tournament_round **rounds, unsigned int nthr) argument
112 struct ck_barrier_tournament_round **rounds = ck_pr_load_ptr(&barrier->rounds); local
[all...]
/freebsd-current/crypto/openssl/crypto/rc5/
H A Drc5_skey.c20 int rounds)
28 if ((rounds != RC5_16_ROUNDS) &&
29 (rounds != RC5_12_ROUNDS) && (rounds != RC5_8_ROUNDS))
30 rounds = RC5_16_ROUNDS;
32 key->rounds = rounds;
50 t = (rounds + 1) * 2;
19 RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data, int rounds) argument
/freebsd-current/crypto/openssl/crypto/evp/
H A De_rc5.c32 int rounds; /* number of rounds */ member in struct:__anon3954
47 data(c)->rounds = RC5_12_ROUNDS;
51 *(int *)ptr = data(c)->rounds;
59 data(c)->rounds = arg;
81 return RC5_32_set_key(&data(ctx)->ks, key_len, key, data(ctx)->rounds);
/freebsd-current/sys/crypto/aesni/
H A Daesencdec.h38 aesni_enc8(int rounds, const __m128i *keysched, __m128i a, argument
53 for (i = 0; i < rounds; i++) {
75 aesni_dec8(int rounds, const __m128i *keysched, __m128i a, argument
90 for (i = 0; i < rounds; i++) {
111 /* rounds is passed in as rounds - 1 */
113 aesni_enc(int rounds, const __m128i *keysched, const __m128i from) argument
119 for (i = 1; i < rounds; i += 2) {
124 tmp = _mm_aesenc_si128(tmp, keysched[rounds]);
125 return _mm_aesenclast_si128(tmp, keysched[rounds
129 aesni_dec(int rounds, const __m128i *keysched, const __m128i from) argument
[all...]
H A Daesni.h55 int rounds; member in struct:aesni_session
78 void aesni_encrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/,
81 void aesni_decrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/,
83 void aesni_encrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/,
85 void aesni_decrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/,
87 void aesni_encrypt_icm(int rounds, const void *key_schedule /*__aligned(16)*/,
91 void aesni_encrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/,
95 void aesni_decrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/,
H A Daesni_wrap.c54 aesni_encrypt_cbc(int rounds, const void *key_schedule, size_t len, argument
63 tot = aesni_enc(rounds - 1, key_schedule,
73 aesni_decrypt_cbc(int rounds, const void *key_schedule, size_t len, argument
85 aesni_dec8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1],
100 aesni_dec(rounds - 1, key_schedule, nextiv) ^ ivreg);
107 aesni_encrypt_ecb(int rounds, const void *key_schedule, size_t len, argument
120 aesni_enc8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1],
137 tot = aesni_enc(rounds - 1, key_schedule,
146 aesni_decrypt_ecb(int rounds, const void *key_schedule, size_t len, argument
159 aesni_dec8(rounds
203 aesni_encrypt_icm(int rounds, const void *key_schedule, size_t len, const uint8_t *from, uint8_t *to, const uint8_t iv[static AES_BLOCK_LEN]) argument
313 aesni_crypt_xts_block(int rounds, const __m128i *key_schedule, __m128i *tweak, const uint8_t *from, uint8_t *to, int do_encrypt) argument
331 aesni_crypt_xts_block8(int rounds, const __m128i *key_schedule, __m128i *tweak, const uint8_t *from, uint8_t *to, int do_encrypt) argument
384 aesni_crypt_xts(int rounds, const __m128i *data_schedule, const __m128i *tweak_schedule, size_t len, const uint8_t *from, uint8_t *to, const uint8_t iv[static AES_BLOCK_LEN], int do_encrypt) argument
424 aesni_encrypt_xts(int rounds, const void *data_schedule, const void *tweak_schedule, size_t len, const uint8_t *from, uint8_t *to, const uint8_t iv[static AES_BLOCK_LEN]) argument
434 aesni_decrypt_xts(int rounds, const void *data_schedule, const void *tweak_schedule, size_t len, const uint8_t *from, uint8_t *to, const uint8_t iv[static AES_BLOCK_LEN]) argument
[all...]
/freebsd-current/crypto/openssl/providers/implementations/ciphers/
H A Dcipher_rc5.h19 unsigned int rounds; /* number of rounds */ member in struct:prov_blowfish_ctx_st
H A Dcipher_rc5.c90 unsigned int rounds; local
92 if (!OSSL_PARAM_get_uint(p, &rounds)) {
96 if (rounds != RC5_8_ROUNDS
97 && rounds != RC5_12_ROUNDS
98 && rounds != RC5_16_ROUNDS) {
102 ctx->rounds = rounds;
125 if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->rounds)) {
152 ctx->rounds = RC5_12_ROUNDS; \
H A Dcipher_rc5_hw.c23 return RC5_32_set_key(&rctx->ks.ks, keylen, key, rctx->rounds);
/freebsd-current/sys/opencrypto/
H A Dgmac.h44 int rounds; member in struct:aes_gmac_ctx
H A Dcbc_mac.h53 int rounds; member in struct:aes_cbc_mac_ctx
H A Dgmac.c53 agc->rounds = rijndaelKeySetupEnc(agc->keysched, key, klen * 8);
55 rijndaelEncrypt(agc->keysched, agc->rounds, zeros, hbuf);
125 rijndaelEncrypt(agc->keysched, agc->rounds, agc->counter, enccntr);
/freebsd-current/crypto/openssl/crypto/aes/asm/
H A Daes-armv4.pl72 $rounds="r12";
214 mov $rounds,r0 @ inp
217 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral
218 ldrb $t1,[$rounds,#2] @ manner...
219 ldrb $t2,[$rounds,#1]
220 ldrb $t3,[$rounds,#0]
222 ldrb $s1,[$rounds,#7]
224 ldrb $t1,[$rounds,#6]
226 ldrb $t2,[$rounds,#5]
227 ldrb $t3,[$rounds,#
[all...]
H A Daesni-x86.pl90 $rounds="ecx";
94 $rounds_="ebx"; # backup copy for $rounds
138 &dec ($rounds);
154 &cmp ($rounds,11);
198 &mov ($rounds,&DWP(240,$key));
217 &mov ($rounds,&DWP(240,$key));
250 &shl ($rounds,4);
255 &lea ($key,&DWP(32,$key,$rounds));
256 &neg ($rounds);
257 &add ($rounds,1
[all...]
H A Daes-sparcv9.pl77 $rounds="%i7"; # aliases with return address, which is off-loaded to stack
205 ld [$key+240],$rounds
209 srl $rounds,1,$rounds
272 subcc $rounds,1,$rounds !
275 add $tbl,2048,$rounds
449 ldub [$rounds+$acc0],$acc0
452 ldub [$rounds+$acc1],$acc1
455 ldub [$rounds
[all...]
H A Daesv8-armx.pl104 my ($inp,$bits,$out,$ptr,$rounds)=("x0","w1","x2","x3","w12");
203 mov $rounds,#10
242 mov $rounds,#12
250 mov $rounds,#14
285 str $rounds,[$out]
356 my $rounds="w3";
369 ldr $rounds,[$key,#240]
372 sub $rounds,$rounds,#2
379 subs $rounds,
[all...]
/freebsd-current/crypto/openssh/
H A Dcipher-aesctr.h26 int rounds; /* keylen-dependent #rounds */ member in struct:aesctr_ctx
H A Dcipher-aesctr.c59 x->rounds = rijndaelKeySetupEnc(x->ek, k, kbits);
76 rijndaelEncrypt(x->ek, x->rounds, x->ctr, buf);
/freebsd-current/sys/crypto/openssl/
H A Dossl_cipher.h58 int rounds; member in struct:ossl_aes_keysched
/freebsd-current/crypto/openssl/include/crypto/
H A Daria.h38 unsigned int rounds; member in struct:aria_key_st
/freebsd-current/crypto/openssl/include/openssl/
H A Drc5.h44 /* Number of rounds */
45 int rounds; member in struct:rc5_key_st
52 int rounds);
/freebsd-current/crypto/openssl/test/
H A Drdrand_sanitytest.c24 int rounds, int min_failures, int max_retries, int max_zero_words)
31 for (i = 0; i < rounds; i++) {
23 sanity_check_bytes(size_t (rng)unsigned char *, size_t), int rounds, int min_failures, int max_retries, int max_zero_words) argument
/freebsd-current/contrib/libarchive/libarchive/
H A Darchive_cryptor.c51 size_t salt_len, unsigned rounds, uint8_t *derived_key,
55 pw_len, salt, salt_len, kCCPRFHmacAlgSHA1, rounds,
67 size_t salt_len, unsigned rounds, uint8_t *derived_key,
80 (PUCHAR)(uintptr_t)salt, (ULONG)salt_len, rounds,
92 size_t salt_len, unsigned rounds, uint8_t *derived_key,
111 pw_len, salt, salt_len, rounds, derived_key_len, derived_key);
121 size_t salt_len, unsigned rounds, uint8_t *derived_key,
123 pbkdf2_hmac_sha1((unsigned)pw_len, (const uint8_t *)pw, rounds,
132 size_t salt_len, unsigned rounds, uint8_t *derived_key,
135 PKCS5_PBKDF2_HMAC_SHA1(pw, pw_len, salt, salt_len, rounds,
50 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
66 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
91 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
120 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
131 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
144 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
[all...]
/freebsd-current/sys/crypto/armv8/
H A Darmv8_crypto_wrap.c56 armv8_aes_enc(int rounds, const uint8x16_t *keysched, const uint8x16_t from) argument
62 for (i = 0; i < rounds - 1; i += 2) {
69 tmp = vaeseq_u8(tmp, keysched[rounds - 1]);
71 tmp = vaeseq_u8(tmp, keysched[rounds]);
72 tmp = veorq_u8(tmp, keysched[rounds + 1]);
78 armv8_aes_dec(int rounds, const uint8x16_t *keysched, const uint8x16_t from) argument
84 for (i = 0; i < rounds - 1; i += 2) {
91 tmp = vaesdq_u8(tmp, keysched[rounds - 1]);
93 tmp = vaesdq_u8(tmp, keysched[rounds]);
94 tmp = veorq_u8(tmp, keysched[rounds
217 armv8_aes_crypt_xts_block(int rounds, const uint8x16_t *key_schedule, uint8x16_t *tweak, const uint8_t *from, uint8_t *to, int do_encrypt) argument
235 armv8_aes_crypt_xts(int rounds, const uint8x16_t *data_schedule, const uint8x16_t *tweak_schedule, size_t len, struct crypto_buffer_cursor *fromc, struct crypto_buffer_cursor *toc, const uint8_t iv[static AES_BLOCK_LEN], int do_encrypt) argument
[all...]
/freebsd-current/contrib/netbsd-tests/rump/rumpkern/h_client/
H A Dh_stresscli.c136 int rounds, myport; local
153 for (rounds = 1; rounds < atoi(argv[1])*10; rounds++) {

Completed in 237 milliseconds

1234