Searched refs:rounds (Results 1 - 25 of 125) sorted by relevance

12345

/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/rc5/
H A Drc5_skey.c14 int rounds)
19 if ((rounds != RC5_16_ROUNDS) &&
20 (rounds != RC5_12_ROUNDS) && (rounds != RC5_8_ROUNDS))
21 rounds = RC5_16_ROUNDS;
23 key->rounds = rounds;
41 t = (rounds + 1) * 2;
13 RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data, int rounds) argument
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/rc5/
H A Drc5_skey.c20 int rounds)
28 if ((rounds != RC5_16_ROUNDS) &&
29 (rounds != RC5_12_ROUNDS) && (rounds != RC5_8_ROUNDS))
30 rounds = RC5_16_ROUNDS;
32 key->rounds = rounds;
50 t = (rounds + 1) * 2;
19 RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data, int rounds) argument
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/evp/
H A De_rc5.c26 int rounds; /* number of rounds */ member in struct:__anon254
41 data(c)->rounds = RC5_12_ROUNDS;
45 *(int *)ptr = data(c)->rounds;
53 data(c)->rounds = arg;
74 key, data(ctx)->rounds);
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/evp/
H A De_rc5.c32 int rounds; /* number of rounds */ member in struct:__anon335
47 data(c)->rounds = RC5_12_ROUNDS;
51 *(int *)ptr = data(c)->rounds;
59 data(c)->rounds = arg;
81 return RC5_32_set_key(&data(ctx)->ks, key_len, key, data(ctx)->rounds);
/netbsd-current/crypto/dist/ipsec-tools/src/racoon/missing/crypto/rijndael/
H A Drijndael-alg-fst.h26 int rijndaelEncryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds);
32 int rijndaelDecryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds);
/netbsd-current/sys/crypto/cast128/
H A Dcast128.h16 int rounds; /* Number of rounds to use, 12 or 16 */ member in struct:__anon9693
/netbsd-current/crypto/external/bsd/openssl/dist/providers/implementations/ciphers/
H A Dcipher_rc5.h19 unsigned int rounds; /* number of rounds */ member in struct:prov_blowfish_ctx_st
H A Dcipher_rc5_hw.c23 return RC5_32_set_key(&rctx->ks.ks, keylen, key, rctx->rounds);
H A Dcipher_rc5.c90 unsigned int rounds; local
92 if (!OSSL_PARAM_get_uint(p, &rounds)) {
96 if (rounds != RC5_8_ROUNDS
97 && rounds != RC5_12_ROUNDS
98 && rounds != RC5_16_ROUNDS) {
102 ctx->rounds = rounds;
125 if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->rounds)) {
152 ctx->rounds = RC5_12_ROUNDS; \
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/aes/asm/
H A Daes-armv4.pl70 $rounds="r12";
211 mov $rounds,r0 @ inp
214 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral
215 ldrb $t1,[$rounds,#2] @ manner...
216 ldrb $t2,[$rounds,#1]
217 ldrb $t3,[$rounds,#0]
219 ldrb $s1,[$rounds,#7]
221 ldrb $t1,[$rounds,#6]
223 ldrb $t2,[$rounds,#5]
224 ldrb $t3,[$rounds,#
[all...]
H A Daesni-x86.pl92 $rounds="ecx";
96 $rounds_="ebx"; # backup copy for $rounds
140 &dec ($rounds);
156 &cmp ($rounds,11);
200 &mov ($rounds,&DWP(240,$key));
219 &mov ($rounds,&DWP(240,$key));
252 &shl ($rounds,4);
257 &lea ($key,&DWP(32,$key,$rounds));
258 &neg ($rounds);
259 &add ($rounds,1
[all...]
H A Daes-sparcv9.pl78 $rounds="%i7"; # aliases with return address, which is off-loaded to stack
203 ld [$key+240],$rounds
207 srl $rounds,1,$rounds
270 subcc $rounds,1,$rounds !
273 add $tbl,2048,$rounds
447 ldub [$rounds+$acc0],$acc0
450 ldub [$rounds+$acc1],$acc1
453 ldub [$rounds
[all...]
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/aes/asm/
H A Daes-armv4.pl72 $rounds="r12";
214 mov $rounds,r0 @ inp
217 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral
218 ldrb $t1,[$rounds,#2] @ manner...
219 ldrb $t2,[$rounds,#1]
220 ldrb $t3,[$rounds,#0]
222 ldrb $s1,[$rounds,#7]
224 ldrb $t1,[$rounds,#6]
226 ldrb $t2,[$rounds,#5]
227 ldrb $t3,[$rounds,#
[all...]
H A Daesni-x86.pl90 $rounds="ecx";
94 $rounds_="ebx"; # backup copy for $rounds
138 &dec ($rounds);
154 &cmp ($rounds,11);
198 &mov ($rounds,&DWP(240,$key));
217 &mov ($rounds,&DWP(240,$key));
250 &shl ($rounds,4);
255 &lea ($key,&DWP(32,$key,$rounds));
256 &neg ($rounds);
257 &add ($rounds,1
[all...]
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hcrypto/
H A Daes.c49 key->rounds = rijndaelKeySetupEnc(key->key, userkey, bits);
50 if (key->rounds == 0)
58 key->rounds = rijndaelKeySetupDec(key->key, userkey, bits);
59 if (key->rounds == 0)
67 rijndaelEncrypt(key->key, key->rounds, in, out);
73 rijndaelDecrypt(key->key, key->rounds, in, out);
H A Daes.h61 int rounds; member in struct:aes_key
/netbsd-current/crypto/external/bsd/openssl.old/dist/include/openssl/
H A Drc5.h37 /* Number of rounds */
38 int rounds; member in struct:rc5_key_st
43 int rounds);
/netbsd-current/crypto/external/bsd/openssh/dist/
H A Dcipher-aesctr.h27 int rounds; /* keylen-dependent #rounds */ member in struct:aesctr_ctx
H A Dcipher-aesctr.c58 x->rounds = rijndaelKeySetupEnc(x->ek, k, kbits);
75 rijndaelEncrypt(x->ek, x->rounds, x->ctr, buf);
/netbsd-current/crypto/external/bsd/openssl.old/dist/include/crypto/
H A Daria.h37 unsigned int rounds; member in struct:aria_key_st
/netbsd-current/crypto/external/bsd/openssl/dist/include/crypto/
H A Daria.h38 unsigned int rounds; member in struct:aria_key_st
/netbsd-current/crypto/external/bsd/openssl/dist/test/
H A Drdrand_sanitytest.c24 int rounds, int min_failures, int max_retries, int max_zero_words)
31 for (i = 0; i < rounds; i++) {
23 sanity_check_bytes(size_t (rng)unsigned char *, size_t), int rounds, int min_failures, int max_retries, int max_zero_words) argument
/netbsd-current/crypto/external/bsd/openssl/dist/include/openssl/
H A Drc5.h44 /* Number of rounds */
45 int rounds; member in struct:rc5_key_st
52 int rounds);
/netbsd-current/share/examples/rump/sdread/
H A Dsdread.c63 int fd, val = 0, rounds = 0; local
70 if (rounds > 0) {
71 if (rounds == 1) {
81 rounds++;
82 } while (val == 0 || rounds >= 30);
/netbsd-current/external/bsd/libarchive/dist/libarchive/
H A Darchive_cryptor.c51 size_t salt_len, unsigned rounds, uint8_t *derived_key,
55 pw_len, salt, salt_len, kCCPRFHmacAlgSHA1, rounds,
67 size_t salt_len, unsigned rounds, uint8_t *derived_key,
80 (PUCHAR)(uintptr_t)salt, (ULONG)salt_len, rounds,
92 size_t salt_len, unsigned rounds, uint8_t *derived_key,
111 pw_len, salt, salt_len, rounds, derived_key_len, derived_key);
121 size_t salt_len, unsigned rounds, uint8_t *derived_key,
123 pbkdf2_hmac_sha1((unsigned)pw_len, (const uint8_t *)pw, rounds,
132 size_t salt_len, unsigned rounds, uint8_t *derived_key,
135 PKCS5_PBKDF2_HMAC_SHA1(pw, pw_len, salt, salt_len, rounds,
50 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
66 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
91 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
120 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
131 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
144 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument
[all...]

Completed in 689 milliseconds

12345