Home
last modified time | relevance | path

Searched refs:rounds (Results 1 – 25 of 50) sorted by relevance

12

/external/openssl/crypto/aes/asm/
Daes-armv4.pl46 $rounds="r12";
166 mov $rounds,r0 @ inp
170 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral
171 ldrb $t1,[$rounds,#2] @ manner...
172 ldrb $t2,[$rounds,#1]
173 ldrb $t3,[$rounds,#0]
175 ldrb $s1,[$rounds,#7]
177 ldrb $t1,[$rounds,#6]
179 ldrb $t2,[$rounds,#5]
180 ldrb $t3,[$rounds,#4]
[all …]
Daes-sparcv9.pl70 $rounds="%i7"; # aliases with return address, which is off-loaded to stack
193 ld [$key+240],$rounds
197 srl $rounds,1,$rounds
260 subcc $rounds,1,$rounds !
263 add $tbl,2048,$rounds
437 ldub [$rounds+$acc0],$acc0
440 ldub [$rounds+$acc1],$acc1
443 ldub [$rounds+$acc2],$acc2
444 ldub [$rounds+$acc3],$acc3
447 ldub [$rounds+$acc4],$acc4
[all …]
Daes-s390x.pl68 $rounds="%r13";
241 l $rounds,240($key)
243 aghi $rounds,-1
313 brct $rounds,.Lenc_loop
567 l $rounds,240($key)
569 aghi $rounds,-1
639 brct $rounds,.Ldec_loop
818 lghi $rounds,10
819 st $rounds,240($key)
859 brct $rounds,.L128_loop
[all …]
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/
DRC5ParameterSpecTest.java45 int rounds = 5; in testRC5ParameterSpec1() local
50 new RC5ParameterSpec(version, rounds, wordSize, null); in testRC5ParameterSpec1()
57 new RC5ParameterSpec(version, rounds, wordSize+8, iv); in testRC5ParameterSpec1()
64 new RC5ParameterSpec(version, rounds, wordSize, new byte[] {1, 2, 3}); in testRC5ParameterSpec1()
70 RC5ParameterSpec ps = new RC5ParameterSpec(version, rounds, in testRC5ParameterSpec1()
86 int rounds = 5; in testRC5ParameterSpec2() local
92 new RC5ParameterSpec(version, rounds, wordSize, null, offset); in testRC5ParameterSpec2()
99 new RC5ParameterSpec(version, rounds, wordSize+8, iv, offset); in testRC5ParameterSpec2()
106 new RC5ParameterSpec(version, rounds, wordSize, iv, offset+1); in testRC5ParameterSpec2()
113 new RC5ParameterSpec(version, rounds, wordSize, new byte[] { 1, 2, in testRC5ParameterSpec2()
[all …]
/external/dropbear/libtomcrypt/src/ciphers/safer/
Dsaferp.c220 static const int rounds[3] = { 8, 12, 16 }; in saferp_setup() local
233 if (num_rounds != 0 && num_rounds != rounds[(keylen/8)-2]) { in saferp_setup()
265 skey->saferp.rounds = 8; in saferp_setup()
292 skey->saferp.rounds = 12; in saferp_setup()
319 skey->saferp.rounds = 16; in saferp_setup()
356 if (skey->saferp.rounds > 8) { in saferp_ecb_encrypt()
363 if (skey->saferp.rounds > 12) { in saferp_ecb_encrypt()
369 ct[0] = b[0] ^ skey->saferp.K[skey->saferp.rounds*2][0]; in saferp_ecb_encrypt()
370 ct[1] = (b[1] + skey->saferp.K[skey->saferp.rounds*2][1]) & 255; in saferp_ecb_encrypt()
371 ct[2] = (b[2] + skey->saferp.K[skey->saferp.rounds*2][2]) & 255; in saferp_ecb_encrypt()
[all …]
/external/openssl/crypto/evp/
De_rc5.c75 int rounds; /* number of rounds */ member
92 data(c)->rounds = RC5_12_ROUNDS; in rc5_ctrl()
96 *(int *)ptr = data(c)->rounds; in rc5_ctrl()
105 data(c)->rounds = arg; in rc5_ctrl()
122 key,data(ctx)->rounds); in r_32_12_16_init_key()
/external/dropbear/libtomcrypt/src/ciphers/
Drc5.c78 skey->rc5.rounds = num_rounds; in _rc5_setup()
146 if ((skey->rc5.rounds & 1) == 0) { in _rc5_ecb_encrypt()
147 for (r = 0; r < skey->rc5.rounds; r += 2) { in _rc5_ecb_encrypt()
155 for (r = 0; r < skey->rc5.rounds; r++) { in _rc5_ecb_encrypt()
197 K = skey->rc5.K + (skey->rc5.rounds << 1); in _rc5_ecb_decrypt()
199 if ((skey->rc5.rounds & 1) == 0) { in _rc5_ecb_decrypt()
201 for (r = skey->rc5.rounds - 1; r >= 0; r -= 2) { in _rc5_ecb_decrypt()
209 for (r = skey->rc5.rounds - 1; r >= 0; r--) { in _rc5_ecb_decrypt()
Dkseed.c241 static void rounds(ulong32 *P, ulong32 *K) in rounds() function
266 rounds(P, skey->kseed.K); in kseed_ecb_encrypt()
288 rounds(P, skey->kseed.dK); in kseed_ecb_decrypt()
/external/openssl/crypto/sha/asm/
Dsha512-ia64.pl80 $rounds=80;
94 $rounds=64;
486 { .mii; mov ar.lc=$rounds-17
571 { .mmb; add Ktbl=-$SZ*$rounds,Ktbl
624 .size K256#,$SZ*$rounds
670 .size K512#,$SZ*$rounds
Dsha512-s390x.pl62 $rounds=80;
76 $rounds=64;
264 lghi $t0,`($rounds-16)*$SZ`
Dsha512-ppc.pl71 $rounds=80;
83 $rounds=64;
328 li $T,`$rounds/16-1`
344 subi $Tbl,$Tbl,`($rounds-16)*$SZ` ; rewind Tbl
Dsha512-x86_64.pl67 $rounds=80;
79 $rounds=64;
237 cmp \$$rounds,$round
/external/openssl/crypto/aes/
Daes_core.c643 key->rounds = 10; in AES_set_encrypt_key()
645 key->rounds = 12; in AES_set_encrypt_key()
647 key->rounds = 14; in AES_set_encrypt_key()
744 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) { in AES_set_decrypt_key()
751 for (i = 1; i < (key->rounds); i++) { in AES_set_decrypt_key()
847 if (key->rounds > 10) { in AES_encrypt()
858 if (key->rounds > 12) { in AES_encrypt()
871 rk += key->rounds << 2; in AES_encrypt()
876 r = key->rounds >> 1; in AES_encrypt()
1038 if (key->rounds > 10) { in AES_decrypt()
[all …]
Daes_x86core.c485 key->rounds = 10; in AES_set_encrypt_key()
487 key->rounds = 12; in AES_set_encrypt_key()
489 key->rounds = 14; in AES_set_encrypt_key()
586 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) { in AES_set_decrypt_key()
593 for (i = 1; i < (key->rounds); i++) { in AES_set_decrypt_key()
738 for (rk+=8,r=key->rounds-2; r>0; rk+=4,r--) { in AES_encrypt()
960 for (rk+=8,r=key->rounds-2; r>0; rk+=4,r--) { in AES_decrypt()
Daes.h82 int rounds; member
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/
Drijndael-alg-fst.h26 …aelEncryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds);
32 …aelDecryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds);
Drijndael-alg-fst.c240 int rijndaelEncryptRound(word8 a[4][4], word8 rk[MAXROUNDS+1][4][4], int ROUNDS, int rounds) { in rijndaelEncryptRound() argument
245 if (rounds > ROUNDS) { in rijndaelEncryptRound()
246 rounds = ROUNDS; in rijndaelEncryptRound()
254 for (r = 1; (r <= rounds) && (r < ROUNDS); r++) { in rijndaelEncryptRound()
276 if (rounds == ROUNDS) { in rijndaelEncryptRound()
409 int rijndaelDecryptRound(word8 a[4][4], word8 rk[MAXROUNDS+1][4][4], int ROUNDS, int rounds) { in rijndaelDecryptRound() argument
414 if (rounds > ROUNDS) { in rijndaelDecryptRound()
415 rounds = ROUNDS; in rijndaelDecryptRound()
440 for (r = ROUNDS-1; r > rounds; r--) { in rijndaelDecryptRound()
487 if (rounds == 0) { in rijndaelDecryptRound()
/external/llvm/test/CodeGen/PowerPC/
Dfrounds.ll8 %tmp1 = call i32 @llvm.flt.rounds( ) ; <i32> [#uses=1]
19 declare i32 @llvm.flt.rounds() nounwind
/external/qemu/
Daes.c746 key->rounds = 10; in AES_set_encrypt_key()
748 key->rounds = 12; in AES_set_encrypt_key()
750 key->rounds = 14; in AES_set_encrypt_key()
847 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) { in AES_set_decrypt_key()
854 for (i = 1; i < (key->rounds); i++) { in AES_set_decrypt_key()
951 if (key->rounds > 10) { in AES_encrypt()
962 if (key->rounds > 12) { in AES_encrypt()
975 rk += key->rounds << 2; in AES_encrypt()
980 r = key->rounds >> 1; in AES_encrypt()
1142 if (key->rounds > 10) { in AES_decrypt()
[all …]
Daes.h9 int rounds; member
/external/chromium/crypto/
Dsymmetric_key_unittest.cc72 unsigned int rounds; member
86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) { in TEST_P()
96 test_data.rounds, test_data.key_size_in_bits)); in TEST_P()
/external/llvm/test/CodeGen/CellSPU/
Ddiv_ops.ll3 ; signed division rounds towards zero, rotma don't.
/external/dropbear/libtommath/
Dposter.tex25 …rt$ & {\tt mp\_unsigned\_bin\_size(\&a)} & $res$ = 1 if $a$ prime to $t$ rounds? & {\tt mp\_prime\…
26 … & {\tt mp\_to\_unsigned\_bin(\&a, buf)} & Next prime after $a$ to $t$ rounds. & {\tt mp\_prime\…
/external/openssl/crypto/rc2/
Drrc2.doc99 The cipher has 16 full rounds, each divided into 4 subrounds. Two of the full
100 rounds perform an additional transformation on the data. Note that the
111 In addition the fifth and eleventh rounds add the contents of the S-box indexed
134 In addition the fifth and eleventh rounds subtract the contents of the S-box
/external/openssl/include/openssl/
Daes.h82 int rounds; member

12