/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
D | rijndael-alg-fst.c | 36 int rijndaelKeySched(word8 k[MAXKC][4], word8 W[MAXROUNDS+1][4][4], int ROUNDS) { in rijndaelKeySched() argument 46 int KC = ROUNDS - 6; in rijndaelKeySched() 54 for (j = 0; (j < KC) && (r < ROUNDS + 1); ) { in rijndaelKeySched() 64 while (r < ROUNDS + 1) { /* while not enough round key material calculated */ in rijndaelKeySched() 89 for (j = 0; (j < KC) && (r < ROUNDS + 1); ) { in rijndaelKeySched() 103 int rijndaelKeyEncToDec(word8 W[MAXROUNDS+1][4][4], int ROUNDS) { in rijndaelKeyEncToDec() argument 107 for (r = 1; r < ROUNDS; r++) { in rijndaelKeyEncToDec() 142 int rijndaelEncrypt(word8 in[16], word8 out[16], word8 rk[MAXROUNDS+1][4][4], int ROUNDS) { in rijndaelEncrypt() argument 178 for (r = 1; r < ROUNDS-1; r++) { in rijndaelEncrypt() 202 *((word32*)temp[0]) = *((word32*)(b )) ^ *((word32*)rk[ROUNDS-1][0]); in rijndaelEncrypt() [all …]
|
D | rijndael-alg-fst.h | 19 …jndaelKeySched(u_int8_t k[RIJNDAEL_MAXKC][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS); 21 int rijndaelKeyEncToDec(u_int8_t W[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS); 23 …jndaelEncrypt(u_int8_t a[16], u_int8_t b[16], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS); 26 int rijndaelEncryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int… 29 …jndaelDecrypt(u_int8_t a[16], u_int8_t b[16], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS); 32 int rijndaelDecryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int…
|
D | rijndael-api-fst.c | 64 key->ROUNDS = keyLen/32 + 6; in rijndael_makeKey() 71 rijndaelKeySched(k, key->keySched, key->ROUNDS); in rijndael_makeKey() 73 rijndaelKeyEncToDec(key->keySched, key->ROUNDS); in rijndael_makeKey() 112 rijndaelEncrypt(input, outBuffer, key->keySched, key->ROUNDS); in rijndael_blockEncrypt() 132 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS); in rijndael_blockEncrypt() 149 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS); in rijndael_blockEncrypt() 169 rijndaelEncrypt(block, block, key->keySched, key->ROUNDS); in rijndael_blockEncrypt() 226 rijndaelEncrypt(input, outBuffer, key->keySched, key->ROUNDS); in rijndael_padEncrypt() 236 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS); in rijndael_padEncrypt() 246 rijndaelEncrypt(block, outBuffer, key->keySched, key->ROUNDS); in rijndael_padEncrypt() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/ |
D | BlowfishEngine.java | 299 private static final int ROUNDS = 16; field in BlowfishEngine 302 private static final int P_SZ = ROUNDS+2; 415 for (int i = 1; i < ROUNDS; i += 2) in processTable() 421 xr ^= P[ROUNDS + 1]; in processTable() 523 for (int i = 1; i < ROUNDS; i += 2) in encryptBlock() 529 xr ^= P[ROUNDS + 1]; in encryptBlock() 549 xl ^= P[ROUNDS + 1]; in decryptBlock() 551 for (int i = ROUNDS; i > 0 ; i -= 2) in decryptBlock()
|
D | AESEngine.java | 292 …ROUNDS = KC + 6; // This is not always true for the generalized Rijndael that allows larger block… in generateWorkingKey() 293 int[][] W = new int[ROUNDS+1][4]; // 4 words in a block in generateWorkingKey() 401 for (int j = 1; j < ROUNDS; j++) in generateWorkingKey() 413 private int ROUNDS; field in AESEngine 572 while (r < ROUNDS - 1) in encryptBlock() 599 int t0 = this.C0 ^ KW[ROUNDS][0]; in decryptBlock() 600 int t1 = this.C1 ^ KW[ROUNDS][1]; in decryptBlock() 601 int t2 = this.C2 ^ KW[ROUNDS][2]; in decryptBlock() 603 int r = ROUNDS - 1, r0, r1, r2, r3 = this.C3 ^ KW[ROUNDS][3]; in decryptBlock()
|
D | AESFastEngine.java | 621 …ROUNDS = KC + 6; // This is not always true for the generalized Rijndael that allows larger block… in generateWorkingKey() 622 int[][] W = new int[ROUNDS+1][4]; // 4 words in a block in generateWorkingKey() 730 for (int j = 1; j < ROUNDS; j++) in generateWorkingKey() 742 private int ROUNDS; field in AESFastEngine 861 while (r < ROUNDS - 1) in encryptBlock() 933 int t0 = this.C0 ^ KW[ROUNDS][0]; in decryptBlock() 934 int t1 = this.C1 ^ KW[ROUNDS][1]; in decryptBlock() 935 int t2 = this.C2 ^ KW[ROUNDS][2]; in decryptBlock() 937 int r = ROUNDS - 1, r0, r1, r2, r3 = this.C3 ^ KW[ROUNDS][3]; in decryptBlock()
|
D | TwofishEngine.java | 192 private static final int ROUNDS = 16; field in TwofishEngine 458 for (int r = 0; r < ROUNDS; r +=2) in encryptBlock() 495 int k = ROUND_SUBKEYS + 2 * ROUNDS -1 ; in decryptBlock() 497 for (int r = 0; r< ROUNDS ; r +=2) in decryptBlock()
|
/external/bouncycastle/repackaged/bcprov/src/main/java/com/android/org/bouncycastle/crypto/engines/ |
D | BlowfishEngine.java | 301 private static final int ROUNDS = 16; field in BlowfishEngine 304 private static final int P_SZ = ROUNDS+2; 417 for (int i = 1; i < ROUNDS; i += 2) in processTable() 423 xr ^= P[ROUNDS + 1]; in processTable() 525 for (int i = 1; i < ROUNDS; i += 2) in encryptBlock() 531 xr ^= P[ROUNDS + 1]; in encryptBlock() 551 xl ^= P[ROUNDS + 1]; in decryptBlock() 553 for (int i = ROUNDS; i > 0 ; i -= 2) in decryptBlock()
|
D | AESEngine.java | 294 …ROUNDS = KC + 6; // This is not always true for the generalized Rijndael that allows larger block… in generateWorkingKey() 295 int[][] W = new int[ROUNDS+1][4]; // 4 words in a block in generateWorkingKey() 403 for (int j = 1; j < ROUNDS; j++) in generateWorkingKey() 415 private int ROUNDS; field in AESEngine 574 while (r < ROUNDS - 1) in encryptBlock() 601 int t0 = this.C0 ^ KW[ROUNDS][0]; in decryptBlock() 602 int t1 = this.C1 ^ KW[ROUNDS][1]; in decryptBlock() 603 int t2 = this.C2 ^ KW[ROUNDS][2]; in decryptBlock() 605 int r = ROUNDS - 1, r0, r1, r2, r3 = this.C3 ^ KW[ROUNDS][3]; in decryptBlock()
|
D | AESFastEngine.java | 623 …ROUNDS = KC + 6; // This is not always true for the generalized Rijndael that allows larger block… in generateWorkingKey() 624 int[][] W = new int[ROUNDS+1][4]; // 4 words in a block in generateWorkingKey() 732 for (int j = 1; j < ROUNDS; j++) in generateWorkingKey() 744 private int ROUNDS; field in AESFastEngine 863 while (r < ROUNDS - 1) in encryptBlock() 935 int t0 = this.C0 ^ KW[ROUNDS][0]; in decryptBlock() 936 int t1 = this.C1 ^ KW[ROUNDS][1]; in decryptBlock() 937 int t2 = this.C2 ^ KW[ROUNDS][2]; in decryptBlock() 939 int r = ROUNDS - 1, r0, r1, r2, r3 = this.C3 ^ KW[ROUNDS][3]; in decryptBlock()
|
D | TwofishEngine.java | 194 private static final int ROUNDS = 16; field in TwofishEngine 460 for (int r = 0; r < ROUNDS; r +=2) in encryptBlock() 497 int k = ROUND_SUBKEYS + 2 * ROUNDS -1 ; in decryptBlock() 499 for (int r = 0; r< ROUNDS ; r +=2) in decryptBlock()
|
/external/bouncycastle/repackaged_platform/bcprov/src/main/java/com/android/internal/org/bouncycastle/crypto/engines/ |
D | BlowfishEngine.java | 301 private static final int ROUNDS = 16; field in BlowfishEngine 304 private static final int P_SZ = ROUNDS+2; 417 for (int i = 1; i < ROUNDS; i += 2) in processTable() 423 xr ^= P[ROUNDS + 1]; in processTable() 525 for (int i = 1; i < ROUNDS; i += 2) in encryptBlock() 531 xr ^= P[ROUNDS + 1]; in encryptBlock() 551 xl ^= P[ROUNDS + 1]; in decryptBlock() 553 for (int i = ROUNDS; i > 0 ; i -= 2) in decryptBlock()
|
D | AESEngine.java | 294 …ROUNDS = KC + 6; // This is not always true for the generalized Rijndael that allows larger block… in generateWorkingKey() 295 int[][] W = new int[ROUNDS+1][4]; // 4 words in a block in generateWorkingKey() 403 for (int j = 1; j < ROUNDS; j++) in generateWorkingKey() 415 private int ROUNDS; field in AESEngine 574 while (r < ROUNDS - 1) in encryptBlock() 601 int t0 = this.C0 ^ KW[ROUNDS][0]; in decryptBlock() 602 int t1 = this.C1 ^ KW[ROUNDS][1]; in decryptBlock() 603 int t2 = this.C2 ^ KW[ROUNDS][2]; in decryptBlock() 605 int r = ROUNDS - 1, r0, r1, r2, r3 = this.C3 ^ KW[ROUNDS][3]; in decryptBlock()
|
D | AESFastEngine.java | 623 …ROUNDS = KC + 6; // This is not always true for the generalized Rijndael that allows larger block… in generateWorkingKey() 624 int[][] W = new int[ROUNDS+1][4]; // 4 words in a block in generateWorkingKey() 732 for (int j = 1; j < ROUNDS; j++) in generateWorkingKey() 744 private int ROUNDS; field in AESFastEngine 863 while (r < ROUNDS - 1) in encryptBlock() 935 int t0 = this.C0 ^ KW[ROUNDS][0]; in decryptBlock() 936 int t1 = this.C1 ^ KW[ROUNDS][1]; in decryptBlock() 937 int t2 = this.C2 ^ KW[ROUNDS][2]; in decryptBlock() 939 int r = ROUNDS - 1, r0, r1, r2, r3 = this.C3 ^ KW[ROUNDS][3]; in decryptBlock()
|
D | TwofishEngine.java | 194 private static final int ROUNDS = 16; field in TwofishEngine 460 for (int r = 0; r < ROUNDS; r +=2) in encryptBlock() 497 int k = ROUND_SUBKEYS + 2 * ROUNDS -1 ; in decryptBlock() 499 for (int r = 0; r< ROUNDS ; r +=2) in decryptBlock()
|
/external/icu/android_icu4j/src/main/java/android/icu/math/ |
D | MathContext.java | 302 …private static final int ROUNDS[]=new int[]{ROUND_HALF_UP,ROUND_UNNECESSARY,ROUND_CEILING,ROUND_DO… field in MathContext 559 {int $1=ROUNDS.length;r=0;r:for(;$1>0;$1--,r++){ in toString() 560 if (roundingMode==ROUNDS[r]) in toString() 576 {int $2=ROUNDS.length;for(r=0;$2>0;$2--,r++){ in isValidRound() 577 if (testround==ROUNDS[r]) in isValidRound()
|
/external/icu/icu4j/main/classes/core/src/com/ibm/icu/math/ |
D | MathContext.java | 313 …private static final int ROUNDS[]=new int[]{ROUND_HALF_UP,ROUND_UNNECESSARY,ROUND_CEILING,ROUND_DO… field in MathContext 580 {int $1=ROUNDS.length;r=0;r:for(;$1>0;$1--,r++){ in toString() 581 if (roundingMode==ROUNDS[r]) in toString() 597 {int $2=ROUNDS.length;for(r=0;$2>0;$2--,r++){ in isValidRound() 598 if (testround==ROUNDS[r]) in isValidRound()
|
/external/igt-gpu-tools/tests/i915/ |
D | gem_tiled_partial_pwrite_pread.c | 120 #define ROUNDS 200 macro 128 for (i = 0; i < ROUNDS; i++) { in test_partial_reads() 144 igt_progress("partial reads test: ", i, ROUNDS); in test_partial_reads() 152 for (i = 0; i < ROUNDS; i++) { in test_partial_writes() 186 igt_progress("partial writes test: ", i, ROUNDS); in test_partial_writes() 194 for (i = 0; i < ROUNDS; i++) { in test_partial_read_writes() 245 igt_progress("partial read/writes test: ", i, ROUNDS); in test_partial_read_writes()
|
D | gem_caching.c | 98 #define ROUNDS 1000 macro 143 for (i = 0; i < ROUNDS; i++) { 161 igt_progress("partial reads test: ", i, ROUNDS); 170 for (i = 0; i < ROUNDS; i++) { 206 igt_progress("partial writes test: ", i, ROUNDS); 215 for (i = 0; i < ROUNDS; i++) { 270 igt_progress("partial read/writes test: ", i, ROUNDS);
|
D | gem_partial_pwrite_pread.c | 99 #define ROUNDS 1000 macro 113 for (i = 0; i < ROUNDS; i++) { in test_partial_reads() 127 igt_progress("partial reads test: ", i, ROUNDS); in test_partial_reads() 137 for (i = 0; i < ROUNDS; i++) { in test_partial_writes() 169 igt_progress("partial writes test: ", i, ROUNDS); in test_partial_writes() 179 for (i = 0; i < ROUNDS; i++) { in test_partial_read_writes() 226 igt_progress("partial read/writes test: ", i, ROUNDS); in test_partial_read_writes()
|
/external/rust/crates/ring/src/digest/ |
D | sha1.rs | 34 const ROUNDS: usize = 80; constant 53 let mut W: [W32; ROUNDS] = [W32::ZERO; ROUNDS]; 57 for t in 16..ROUNDS {
|
/external/kotlinx.coroutines/benchmarks/src/jmh/kotlin/benchmarks/scheduler/actors/ |
D | ConcurrentStatefulActorBenchmark.kt | 98 if (++received >= ROUNDS * 8) { in requestorActorUnfair() 126 if (++receivedTotal >= ROUNDS * computations.size) { in requestorActorFair() 132 if (receivedFromSender <= ROUNDS) { in requestorActorFair()
|
/external/igt-gpu-tools/tests/ |
D | kms_mmap_write_crc.c | 43 #define ROUNDS 10 macro 291 igt_info("Using %d rounds for the test\n", ROUNDS); 293 for (i = 0; i < ROUNDS; i++)
|
/external/kotlinx.coroutines/benchmarks/src/jmh/kotlin/benchmarks/akka/ |
D | StatefulActorAkkaBenchmark.kt | 14 const val ROUNDS = 10_000 constant 132 if (++received >= ROUNDS) { in onReceive()
|
/external/scrypt/lib/crypto/ |
D | crypto_scrypt-neon-salsa208.h | 9 #define ROUNDS 8 macro 73 for (i = ROUNDS;i > 0;i -= 2) { in salsa20_8_intrinsic()
|