/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/rc5/ |
H A D | rc5_skey.c | 14 int rounds) 19 if ((rounds != RC5_16_ROUNDS) && 20 (rounds != RC5_12_ROUNDS) && (rounds != RC5_8_ROUNDS)) 21 rounds = RC5_16_ROUNDS; 23 key->rounds = rounds; 41 t = (rounds + 1) * 2; 13 RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data, int rounds) argument
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/rc5/ |
H A D | rc5_skey.c | 20 int rounds) 28 if ((rounds != RC5_16_ROUNDS) && 29 (rounds != RC5_12_ROUNDS) && (rounds != RC5_8_ROUNDS)) 30 rounds = RC5_16_ROUNDS; 32 key->rounds = rounds; 50 t = (rounds + 1) * 2; 19 RC5_32_set_key(RC5_32_KEY *key, int len, const unsigned char *data, int rounds) argument
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
H A D | e_rc5.c | 26 int rounds; /* number of rounds */ member in struct:__anon254 41 data(c)->rounds = RC5_12_ROUNDS; 45 *(int *)ptr = data(c)->rounds; 53 data(c)->rounds = arg; 74 key, data(ctx)->rounds);
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/evp/ |
H A D | e_rc5.c | 32 int rounds; /* number of rounds */ member in struct:__anon335 47 data(c)->rounds = RC5_12_ROUNDS; 51 *(int *)ptr = data(c)->rounds; 59 data(c)->rounds = arg; 81 return RC5_32_set_key(&data(ctx)->ks, key_len, key, data(ctx)->rounds);
|
/netbsd-current/crypto/dist/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
H A D | rijndael-alg-fst.h | 26 int rijndaelEncryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds); 32 int rijndaelDecryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds);
|
/netbsd-current/sys/crypto/cast128/ |
H A D | cast128.h | 16 int rounds; /* Number of rounds to use, 12 or 16 */ member in struct:__anon9693
|
/netbsd-current/crypto/external/bsd/openssl/dist/providers/implementations/ciphers/ |
H A D | cipher_rc5.h | 19 unsigned int rounds; /* number of rounds */ member in struct:prov_blowfish_ctx_st
|
H A D | cipher_rc5_hw.c | 23 return RC5_32_set_key(&rctx->ks.ks, keylen, key, rctx->rounds);
|
H A D | cipher_rc5.c | 90 unsigned int rounds; local 92 if (!OSSL_PARAM_get_uint(p, &rounds)) { 96 if (rounds != RC5_8_ROUNDS 97 && rounds != RC5_12_ROUNDS 98 && rounds != RC5_16_ROUNDS) { 102 ctx->rounds = rounds; 125 if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->rounds)) { 152 ctx->rounds = RC5_12_ROUNDS; \
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/aes/asm/ |
H A D | aes-armv4.pl | 70 $rounds="r12"; 211 mov $rounds,r0 @ inp 214 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral 215 ldrb $t1,[$rounds,#2] @ manner... 216 ldrb $t2,[$rounds,#1] 217 ldrb $t3,[$rounds,#0] 219 ldrb $s1,[$rounds,#7] 221 ldrb $t1,[$rounds,#6] 223 ldrb $t2,[$rounds,#5] 224 ldrb $t3,[$rounds,# [all...] |
H A D | aesni-x86.pl | 92 $rounds="ecx"; 96 $rounds_="ebx"; # backup copy for $rounds 140 &dec ($rounds); 156 &cmp ($rounds,11); 200 &mov ($rounds,&DWP(240,$key)); 219 &mov ($rounds,&DWP(240,$key)); 252 &shl ($rounds,4); 257 &lea ($key,&DWP(32,$key,$rounds)); 258 &neg ($rounds); 259 &add ($rounds,1 [all...] |
H A D | aes-sparcv9.pl | 78 $rounds="%i7"; # aliases with return address, which is off-loaded to stack 203 ld [$key+240],$rounds 207 srl $rounds,1,$rounds 270 subcc $rounds,1,$rounds ! 273 add $tbl,2048,$rounds 447 ldub [$rounds+$acc0],$acc0 450 ldub [$rounds+$acc1],$acc1 453 ldub [$rounds [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/aes/asm/ |
H A D | aes-armv4.pl | 72 $rounds="r12"; 214 mov $rounds,r0 @ inp 217 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral 218 ldrb $t1,[$rounds,#2] @ manner... 219 ldrb $t2,[$rounds,#1] 220 ldrb $t3,[$rounds,#0] 222 ldrb $s1,[$rounds,#7] 224 ldrb $t1,[$rounds,#6] 226 ldrb $t2,[$rounds,#5] 227 ldrb $t3,[$rounds,# [all...] |
H A D | aesni-x86.pl | 90 $rounds="ecx"; 94 $rounds_="ebx"; # backup copy for $rounds 138 &dec ($rounds); 154 &cmp ($rounds,11); 198 &mov ($rounds,&DWP(240,$key)); 217 &mov ($rounds,&DWP(240,$key)); 250 &shl ($rounds,4); 255 &lea ($key,&DWP(32,$key,$rounds)); 256 &neg ($rounds); 257 &add ($rounds,1 [all...] |
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
H A D | aes.c | 49 key->rounds = rijndaelKeySetupEnc(key->key, userkey, bits); 50 if (key->rounds == 0) 58 key->rounds = rijndaelKeySetupDec(key->key, userkey, bits); 59 if (key->rounds == 0) 67 rijndaelEncrypt(key->key, key->rounds, in, out); 73 rijndaelDecrypt(key->key, key->rounds, in, out);
|
H A D | aes.h | 61 int rounds; member in struct:aes_key
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/include/openssl/ |
H A D | rc5.h | 37 /* Number of rounds */ 38 int rounds; member in struct:rc5_key_st 43 int rounds);
|
/netbsd-current/crypto/external/bsd/openssh/dist/ |
H A D | cipher-aesctr.h | 27 int rounds; /* keylen-dependent #rounds */ member in struct:aesctr_ctx
|
H A D | cipher-aesctr.c | 58 x->rounds = rijndaelKeySetupEnc(x->ek, k, kbits); 75 rijndaelEncrypt(x->ek, x->rounds, x->ctr, buf);
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/include/crypto/ |
H A D | aria.h | 37 unsigned int rounds; member in struct:aria_key_st
|
/netbsd-current/crypto/external/bsd/openssl/dist/include/crypto/ |
H A D | aria.h | 38 unsigned int rounds; member in struct:aria_key_st
|
/netbsd-current/crypto/external/bsd/openssl/dist/test/ |
H A D | rdrand_sanitytest.c | 24 int rounds, int min_failures, int max_retries, int max_zero_words) 31 for (i = 0; i < rounds; i++) { 23 sanity_check_bytes(size_t (rng)unsigned char *, size_t), int rounds, int min_failures, int max_retries, int max_zero_words) argument
|
/netbsd-current/crypto/external/bsd/openssl/dist/include/openssl/ |
H A D | rc5.h | 44 /* Number of rounds */ 45 int rounds; member in struct:rc5_key_st 52 int rounds);
|
/netbsd-current/share/examples/rump/sdread/ |
H A D | sdread.c | 63 int fd, val = 0, rounds = 0; local 70 if (rounds > 0) { 71 if (rounds == 1) { 81 rounds++; 82 } while (val == 0 || rounds >= 30);
|
/netbsd-current/external/bsd/libarchive/dist/libarchive/ |
H A D | archive_cryptor.c | 51 size_t salt_len, unsigned rounds, uint8_t *derived_key, 55 pw_len, salt, salt_len, kCCPRFHmacAlgSHA1, rounds, 67 size_t salt_len, unsigned rounds, uint8_t *derived_key, 80 (PUCHAR)(uintptr_t)salt, (ULONG)salt_len, rounds, 92 size_t salt_len, unsigned rounds, uint8_t *derived_key, 111 pw_len, salt, salt_len, rounds, derived_key_len, derived_key); 121 size_t salt_len, unsigned rounds, uint8_t *derived_key, 123 pbkdf2_hmac_sha1((unsigned)pw_len, (const uint8_t *)pw, rounds, 132 size_t salt_len, unsigned rounds, uint8_t *derived_key, 135 PKCS5_PBKDF2_HMAC_SHA1(pw, pw_len, salt, salt_len, rounds, 50 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 66 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 91 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 120 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 131 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument 144 pbkdf2_sha1(const char *pw, size_t pw_len, const uint8_t *salt, size_t salt_len, unsigned rounds, uint8_t *derived_key, size_t derived_key_len) argument [all...] |