Searched refs:rounds (Results 1 - 8 of 8) sorted by relevance
/fuchsia/zircon/third_party/ulib/uboringssl/crypto/fipsmodule/aes/asm/ |
H A D | aesv8-armx.pl | 75 my ($inp,$bits,$out,$ptr,$rounds)=("x0","w1","x2","x3","w12"); 172 mov $rounds,#10 206 mov $rounds,#12 214 mov $rounds,#14 249 str $rounds,[$out] 318 my $rounds="w3"; 326 ldr $rounds,[$key,#240] 329 sub $rounds,$rounds,#2 336 subs $rounds, [all...] |
H A D | aesni-x86_64.pl | 80 # rounds for larger block sizes, i.e. 192-bit result being 10/12 times 104 # calculated as latency times number of rounds, 10 for 128-bit key, 216 $rounds="%eax"; # input to and changed by aesni_[en|de]cryptN !!! 224 $rnds_="%r10d"; # backup copy for $rounds 244 my ($p,$key,$rounds,$inout,$ivec)=@_; $inout=$inout0 if (!defined($inout)); 262 dec $rounds 279 mov 240($key),$rounds # key->rounds 281 &aesni_generate1("enc",$key,$rounds); 295 mov 240($key),$rounds # ke [all...] |
H A D | bsaes-x86_64.pl | 28 # - rounds were folded into a loop resulting in >5x size reduction 119 my ($key,$rounds,$const)=("%rax","%r10d","%r11"); 844 dec $rounds 853 dec $rounds 907 dec $rounds 916 dec $rounds 944 my ($out,$inp,$rounds,$const)=("%rax","%rcx","%r10d","%r11"); 987 dec $rounds 1046 dec $rounds 1063 mov 240($inp),%r10d # pass rounds [all...] |
/fuchsia/zircon/third_party/ulib/uboringssl/include/openssl/ |
H A D | aes.h | 65 // AES_MAXNR is the maximum number of AES rounds. 74 unsigned rounds; member in struct:aes_key_st
|
/fuchsia/zircon/third_party/ulib/uboringssl/crypto/fipsmodule/sha/asm/ |
H A D | sha512-x86_64.pl | 151 $rounds=80; 163 $rounds=64; 794 #movdqa $TABLE+`$SZ*2*$rounds`+32(%rip),$t4 795 #movdqa $TABLE+`$SZ*2*$rounds`+64(%rip),$t5 799 movdqa $TABLE+`$SZ*2*$rounds`(%rip),$t3 1149 vmovdqa $TABLE+`$SZ*2*$rounds`(%rip),$t3 1295 vmovdqa $TABLE+`$SZ*2*$rounds`(%rip),$t3 1522 vmovdqa $TABLE+`$SZ*2*$rounds`+32(%rip),$t4 1523 vmovdqa $TABLE+`$SZ*2*$rounds`+64(%rip),$t5 1527 vmovdqa $TABLE+`$SZ*2*$rounds`( [all...] |
H A D | sha512-armv8.pl | 63 $rounds=80; 72 $rounds=64; 233 sub $Ktbl,$Ktbl,#`$SZ*($rounds+1)` // rewind 404 sub $Ktbl,$Ktbl,#$rounds*$SZ-16 // rewind
|
/fuchsia/zircon/third_party/ulib/uboringssl/crypto/fipsmodule/aes/ |
H A D | aes.c | 549 aeskey->rounds = 10; 552 aeskey->rounds = 12; 555 aeskey->rounds = 14; 648 for (i = 0, j = 4 * aeskey->rounds; i < j; i += 4, j -= 4) { 664 for (i = 1; i < (int)aeskey->rounds; i++) { 698 // Nr - 1 full rounds: 699 r = key->rounds >> 1; 760 // Nr - 1 full rounds: 761 r = key->rounds >> 1; 824 // the aes_hw_* functions. The latter set |AES_KEY.rounds| t [all...] |
/fuchsia/zircon/third_party/ulib/uboringssl/crypto/fipsmodule/modes/asm/ |
H A D | aesni-gcm-x86_64.pl | 81 ($counter,$rounds,$ret,$const,$in0,$end0)=("%ebx","%ebp","%r10","%r11","%r14","%r15"); 294 cmp \$11,$rounds 478 mov 0xf0-0x80($key),$rounds 575 lea -1($rounds),%r13 716 mov 0xf0-0x80($key),$rounds
|
Completed in 39 milliseconds