/external/openssl/crypto/aes/asm/ |
D | aes-armv4.pl | 46 $rounds="r12"; 166 mov $rounds,r0 @ inp 170 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral 171 ldrb $t1,[$rounds,#2] @ manner... 172 ldrb $t2,[$rounds,#1] 173 ldrb $t3,[$rounds,#0] 175 ldrb $s1,[$rounds,#7] 177 ldrb $t1,[$rounds,#6] 179 ldrb $t2,[$rounds,#5] 180 ldrb $t3,[$rounds,#4] [all …]
|
D | aes-sparcv9.pl | 70 $rounds="%i7"; # aliases with return address, which is off-loaded to stack 193 ld [$key+240],$rounds 197 srl $rounds,1,$rounds 260 subcc $rounds,1,$rounds ! 263 add $tbl,2048,$rounds 437 ldub [$rounds+$acc0],$acc0 440 ldub [$rounds+$acc1],$acc1 443 ldub [$rounds+$acc2],$acc2 444 ldub [$rounds+$acc3],$acc3 447 ldub [$rounds+$acc4],$acc4 [all …]
|
D | aes-s390x.pl | 68 $rounds="%r13"; 241 l $rounds,240($key) 243 aghi $rounds,-1 313 brct $rounds,.Lenc_loop 567 l $rounds,240($key) 569 aghi $rounds,-1 639 brct $rounds,.Ldec_loop 818 lghi $rounds,10 819 st $rounds,240($key) 859 brct $rounds,.L128_loop [all …]
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/spec/ |
D | RC5ParameterSpecTest.java | 45 int rounds = 5; in testRC5ParameterSpec1() local 50 new RC5ParameterSpec(version, rounds, wordSize, null); in testRC5ParameterSpec1() 57 new RC5ParameterSpec(version, rounds, wordSize+8, iv); in testRC5ParameterSpec1() 64 new RC5ParameterSpec(version, rounds, wordSize, new byte[] {1, 2, 3}); in testRC5ParameterSpec1() 70 RC5ParameterSpec ps = new RC5ParameterSpec(version, rounds, in testRC5ParameterSpec1() 86 int rounds = 5; in testRC5ParameterSpec2() local 92 new RC5ParameterSpec(version, rounds, wordSize, null, offset); in testRC5ParameterSpec2() 99 new RC5ParameterSpec(version, rounds, wordSize+8, iv, offset); in testRC5ParameterSpec2() 106 new RC5ParameterSpec(version, rounds, wordSize, iv, offset+1); in testRC5ParameterSpec2() 113 new RC5ParameterSpec(version, rounds, wordSize, new byte[] { 1, 2, in testRC5ParameterSpec2() [all …]
|
/external/dropbear/libtomcrypt/src/ciphers/safer/ |
D | saferp.c | 220 static const int rounds[3] = { 8, 12, 16 }; in saferp_setup() local 233 if (num_rounds != 0 && num_rounds != rounds[(keylen/8)-2]) { in saferp_setup() 265 skey->saferp.rounds = 8; in saferp_setup() 292 skey->saferp.rounds = 12; in saferp_setup() 319 skey->saferp.rounds = 16; in saferp_setup() 356 if (skey->saferp.rounds > 8) { in saferp_ecb_encrypt() 363 if (skey->saferp.rounds > 12) { in saferp_ecb_encrypt() 369 ct[0] = b[0] ^ skey->saferp.K[skey->saferp.rounds*2][0]; in saferp_ecb_encrypt() 370 ct[1] = (b[1] + skey->saferp.K[skey->saferp.rounds*2][1]) & 255; in saferp_ecb_encrypt() 371 ct[2] = (b[2] + skey->saferp.K[skey->saferp.rounds*2][2]) & 255; in saferp_ecb_encrypt() [all …]
|
/external/openssl/crypto/evp/ |
D | e_rc5.c | 75 int rounds; /* number of rounds */ member 92 data(c)->rounds = RC5_12_ROUNDS; in rc5_ctrl() 96 *(int *)ptr = data(c)->rounds; in rc5_ctrl() 105 data(c)->rounds = arg; in rc5_ctrl() 122 key,data(ctx)->rounds); in r_32_12_16_init_key()
|
/external/dropbear/libtomcrypt/src/ciphers/ |
D | rc5.c | 78 skey->rc5.rounds = num_rounds; in _rc5_setup() 146 if ((skey->rc5.rounds & 1) == 0) { in _rc5_ecb_encrypt() 147 for (r = 0; r < skey->rc5.rounds; r += 2) { in _rc5_ecb_encrypt() 155 for (r = 0; r < skey->rc5.rounds; r++) { in _rc5_ecb_encrypt() 197 K = skey->rc5.K + (skey->rc5.rounds << 1); in _rc5_ecb_decrypt() 199 if ((skey->rc5.rounds & 1) == 0) { in _rc5_ecb_decrypt() 201 for (r = skey->rc5.rounds - 1; r >= 0; r -= 2) { in _rc5_ecb_decrypt() 209 for (r = skey->rc5.rounds - 1; r >= 0; r--) { in _rc5_ecb_decrypt()
|
D | kseed.c | 241 static void rounds(ulong32 *P, ulong32 *K) in rounds() function 266 rounds(P, skey->kseed.K); in kseed_ecb_encrypt() 288 rounds(P, skey->kseed.dK); in kseed_ecb_decrypt()
|
/external/openssl/crypto/sha/asm/ |
D | sha512-ia64.pl | 80 $rounds=80; 94 $rounds=64; 486 { .mii; mov ar.lc=$rounds-17 571 { .mmb; add Ktbl=-$SZ*$rounds,Ktbl 624 .size K256#,$SZ*$rounds 670 .size K512#,$SZ*$rounds
|
D | sha512-s390x.pl | 62 $rounds=80; 76 $rounds=64; 264 lghi $t0,`($rounds-16)*$SZ`
|
D | sha512-ppc.pl | 71 $rounds=80; 83 $rounds=64; 328 li $T,`$rounds/16-1` 344 subi $Tbl,$Tbl,`($rounds-16)*$SZ` ; rewind Tbl
|
D | sha512-x86_64.pl | 67 $rounds=80; 79 $rounds=64; 237 cmp \$$rounds,$round
|
/external/openssl/crypto/aes/ |
D | aes_core.c | 643 key->rounds = 10; in AES_set_encrypt_key() 645 key->rounds = 12; in AES_set_encrypt_key() 647 key->rounds = 14; in AES_set_encrypt_key() 744 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) { in AES_set_decrypt_key() 751 for (i = 1; i < (key->rounds); i++) { in AES_set_decrypt_key() 847 if (key->rounds > 10) { in AES_encrypt() 858 if (key->rounds > 12) { in AES_encrypt() 871 rk += key->rounds << 2; in AES_encrypt() 876 r = key->rounds >> 1; in AES_encrypt() 1038 if (key->rounds > 10) { in AES_decrypt() [all …]
|
D | aes_x86core.c | 485 key->rounds = 10; in AES_set_encrypt_key() 487 key->rounds = 12; in AES_set_encrypt_key() 489 key->rounds = 14; in AES_set_encrypt_key() 586 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) { in AES_set_decrypt_key() 593 for (i = 1; i < (key->rounds); i++) { in AES_set_decrypt_key() 738 for (rk+=8,r=key->rounds-2; r>0; rk+=4,r--) { in AES_encrypt() 960 for (rk+=8,r=key->rounds-2; r>0; rk+=4,r--) { in AES_decrypt()
|
D | aes.h | 82 int rounds; member
|
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
D | rijndael-alg-fst.h | 26 …aelEncryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds); 32 …aelDecryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int rounds);
|
D | rijndael-alg-fst.c | 240 int rijndaelEncryptRound(word8 a[4][4], word8 rk[MAXROUNDS+1][4][4], int ROUNDS, int rounds) { in rijndaelEncryptRound() argument 245 if (rounds > ROUNDS) { in rijndaelEncryptRound() 246 rounds = ROUNDS; in rijndaelEncryptRound() 254 for (r = 1; (r <= rounds) && (r < ROUNDS); r++) { in rijndaelEncryptRound() 276 if (rounds == ROUNDS) { in rijndaelEncryptRound() 409 int rijndaelDecryptRound(word8 a[4][4], word8 rk[MAXROUNDS+1][4][4], int ROUNDS, int rounds) { in rijndaelDecryptRound() argument 414 if (rounds > ROUNDS) { in rijndaelDecryptRound() 415 rounds = ROUNDS; in rijndaelDecryptRound() 440 for (r = ROUNDS-1; r > rounds; r--) { in rijndaelDecryptRound() 487 if (rounds == 0) { in rijndaelDecryptRound()
|
/external/llvm/test/CodeGen/PowerPC/ |
D | frounds.ll | 8 %tmp1 = call i32 @llvm.flt.rounds( ) ; <i32> [#uses=1] 19 declare i32 @llvm.flt.rounds() nounwind
|
/external/qemu/ |
D | aes.c | 746 key->rounds = 10; in AES_set_encrypt_key() 748 key->rounds = 12; in AES_set_encrypt_key() 750 key->rounds = 14; in AES_set_encrypt_key() 847 for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) { in AES_set_decrypt_key() 854 for (i = 1; i < (key->rounds); i++) { in AES_set_decrypt_key() 951 if (key->rounds > 10) { in AES_encrypt() 962 if (key->rounds > 12) { in AES_encrypt() 975 rk += key->rounds << 2; in AES_encrypt() 980 r = key->rounds >> 1; in AES_encrypt() 1142 if (key->rounds > 10) { in AES_decrypt() [all …]
|
D | aes.h | 9 int rounds; member
|
/external/chromium/crypto/ |
D | symmetric_key_unittest.cc | 72 unsigned int rounds; member 86 if (strlen(test_data.salt) < 8 || test_data.rounds < 1000) { in TEST_P() 96 test_data.rounds, test_data.key_size_in_bits)); in TEST_P()
|
/external/llvm/test/CodeGen/CellSPU/ |
D | div_ops.ll | 3 ; signed division rounds towards zero, rotma don't.
|
/external/dropbear/libtommath/ |
D | poster.tex | 25 …rt$ & {\tt mp\_unsigned\_bin\_size(\&a)} & $res$ = 1 if $a$ prime to $t$ rounds? & {\tt mp\_prime\… 26 … & {\tt mp\_to\_unsigned\_bin(\&a, buf)} & Next prime after $a$ to $t$ rounds. & {\tt mp\_prime\…
|
/external/openssl/crypto/rc2/ |
D | rrc2.doc | 99 The cipher has 16 full rounds, each divided into 4 subrounds. Two of the full 100 rounds perform an additional transformation on the data. Note that the 111 In addition the fifth and eleventh rounds add the contents of the S-box indexed 134 In addition the fifth and eleventh rounds subtract the contents of the S-box
|
/external/openssl/include/openssl/ |
D | aes.h | 82 int rounds; member
|