Home
last modified time | relevance | path

Searched full:rounds (Results 1 – 25 of 400) sorted by relevance

12345678910>>...16

/freebsd/sys/contrib/ck/src/
H A Dck_barrier_tournament.c36 * move on to the next round, while losers spin in their current rounds
61 struct ck_barrier_tournament_round **rounds, in ck_barrier_tournament_init() argument
71 rounds[i][0].flag = 0; in ck_barrier_tournament_init()
72 rounds[i][0].role = CK_BARRIER_TOURNAMENT_DROPOUT; in ck_barrier_tournament_init()
74 rounds[i][k].flag = 0; in ck_barrier_tournament_init()
79 rounds[i][k].role = CK_BARRIER_TOURNAMENT_WINNER; in ck_barrier_tournament_init()
81 rounds[i][k].role = CK_BARRIER_TOURNAMENT_BYE; in ck_barrier_tournament_init()
85 rounds[i][k].role = CK_BARRIER_TOURNAMENT_LOSER; in ck_barrier_tournament_init()
87 rounds[i][k].role = CK_BARRIER_TOURNAMENT_CHAMPION; in ck_barrier_tournament_init()
89 if (rounds[i][k].role == CK_BARRIER_TOURNAMENT_LOSER) in ck_barrier_tournament_init()
[all …]
/freebsd/crypto/openssl/crypto/aes/asm/
H A Daes-armv4.pl72 $rounds="r12";
214 mov $rounds,r0 @ inp
217 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral
218 ldrb $t1,[$rounds,#2] @ manner...
219 ldrb $t2,[$rounds,#1]
220 ldrb $t3,[$rounds,#0]
222 ldrb $s1,[$rounds,#7]
224 ldrb $t1,[$rounds,#6]
226 ldrb $t2,[$rounds,#5]
227 ldrb $t3,[$rounds,#4]
[all …]
H A Daesni-x86.pl90 $rounds="ecx";
94 $rounds_="ebx"; # backup copy for $rounds
137 &dec ($rounds);
153 &cmp ($rounds,11);
196 &mov ($rounds,&DWP(240,$key));
215 &mov ($rounds,&DWP(240,$key));
248 &shl ($rounds,4);
253 &lea ($key,&DWP(32,$key,$rounds));
254 &neg ($rounds);
255 &add ($rounds,16);
[all …]
H A Daesni-x86_64.pl80 # rounds for larger block sizes, i.e. 192-bit result being 10/12 times
104 # calculated as latency times number of rounds, 10 for 128-bit key,
218 $rounds="%eax"; # input to and changed by aesni_[en|de]cryptN !!!
226 $rnds_="%r10d"; # backup copy for $rounds
245 my ($p,$key,$rounds,$inout,$ivec)=@_; $inout=$inout0 if (!defined($inout));
263 dec $rounds
282 mov 240($key),$rounds # key->rounds
284 &aesni_generate1("enc",$key,$rounds);
301 mov 240($key),$rounds # key->rounds
303 &aesni_generate1("dec",$key,$rounds);
[all …]
H A Daesv8-armx.pl104 my ($inp,$bits,$out,$ptr,$rounds)=("x0","w1","x2","x3","w12");
219 mov $rounds,#10
258 mov $rounds,#12
266 mov $rounds,#14
301 str $rounds,[$out]
372 my $rounds="w3";
385 ldr $rounds,[$key,#240]
388 sub $rounds,$rounds,#2
395 subs $rounds,$rounds,#2
442 my ($enc,$rounds,$cnt,$key_,$step)=("w4","w5","w6","x7","x8");
[all …]
H A Daes-parisc.pl73 $rounds="%r29";
198 ldw 240($key),$rounds
202 _srm $rounds,1,$rounds
245 addib,= -1,$rounds,L\$enc_last
360 ldo 1024($tbl),$rounds
397 ldbx $acc0($rounds),$acc0
399 ldbx $acc1($rounds),$acc1
402 ldbx $acc2($rounds),$acc2
403 ldbx $acc3($rounds),$acc3
405 ldbx $acc4($rounds),$acc4
[all …]
H A Daes-sparcv9.pl77 $rounds="%i7"; # aliases with return address, which is off-loaded to stack
205 ld [$key+240],$rounds
209 srl $rounds,1,$rounds
272 subcc $rounds,1,$rounds !
275 add $tbl,2048,$rounds
449 ldub [$rounds+$acc0],$acc0
452 ldub [$rounds+$acc1],$acc1
455 ldub [$rounds+$acc2],$acc2
456 ldub [$rounds+$acc3],$acc3
459 ldub [$rounds+$acc4],$acc4
[all …]
/freebsd/crypto/openssl/test/recipes/
H A D20-test_passwd.t26 salt => 'rounds=10000$saltstringsaltstring',
28 expected => '$5$rounds=10000$saltstringsaltst$3xv.VbSHBb41AL9AvLeujZkZRBAwqFMz2.opqey6IcA' },
30 salt => 'rounds=5000$toolongsaltstring',
32 expected => '$5$rounds=5000$toolongsaltstrin$Un/5jzAHMgOGZ5.mWJpuVolil07guHPvOW8mGRcvxa5' },
34 salt => 'rounds=1400$anotherlongsaltstring',
36 expected => '$5$rounds=1400$anotherlongsalts$Rx.j8H.h8HjEDGomFU8bDkXm3XIUnzyxf12oP84Bnq1' },
38 salt => 'rounds=10$roundstoolow',
40 expected => '$5$rounds=1000$roundstoolow$yfvwcWrQ8l/K0DAWyuPMDNHpIVlTQebY9l/gL972bIC' },
46 salt => 'rounds=10000$saltstringsaltstring',
48 …expected => '$6$rounds=10000$saltstringsaltst$OW1/O6BYHV6BcXZu8QVeXbDWra3Oeqh0sbHbbMCVNSnCM/UrjmM0…
[all …]
/freebsd/sys/crypto/aesni/
H A Daesni_wrap.c54 aesni_encrypt_cbc(int rounds, const void *key_schedule, size_t len, in aesni_encrypt_cbc() argument
63 tot = aesni_enc(rounds - 1, key_schedule, in aesni_encrypt_cbc()
73 aesni_decrypt_cbc(int rounds, const void *key_schedule, size_t len, in aesni_decrypt_cbc() argument
85 aesni_dec8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], in aesni_decrypt_cbc()
100 aesni_dec(rounds - 1, key_schedule, nextiv) ^ ivreg); in aesni_decrypt_cbc()
107 aesni_encrypt_ecb(int rounds, const void *key_schedule, size_t len, in aesni_encrypt_ecb() argument
120 aesni_enc8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], in aesni_encrypt_ecb()
137 tot = aesni_enc(rounds - 1, key_schedule, in aesni_encrypt_ecb()
146 aesni_decrypt_ecb(int rounds, const void *key_schedule, size_t len, in aesni_decrypt_ecb() argument
159 aesni_dec8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], in aesni_decrypt_ecb()
[all …]
H A Dintel_sha1.c45 * The indented lines in the loop are instructions related to rounds processing.
88 // Save hash values for addition after rounds in intel_sha1_step()
92 // Rounds 0-3 in intel_sha1_step()
99 // Rounds 4-7 in intel_sha1_step()
107 // Rounds 8-11 in intel_sha1_step()
116 // Rounds 12-15 in intel_sha1_step()
126 // Rounds 16-19 in intel_sha1_step()
134 // Rounds 20-23 in intel_sha1_step()
142 // Rounds 24-27 in intel_sha1_step()
150 // Rounds 28-31 in intel_sha1_step()
[all …]
H A Daesencdec.h38 aesni_enc8(int rounds, const __m128i *keysched, __m128i a, in aesni_enc8() argument
53 for (i = 0; i < rounds; i++) { in aesni_enc8()
75 aesni_dec8(int rounds, const __m128i *keysched, __m128i a, in aesni_dec8() argument
90 for (i = 0; i < rounds; i++) { in aesni_dec8()
111 /* rounds is passed in as rounds - 1 */
113 aesni_enc(int rounds, const __m128i *keysched, const __m128i from) in aesni_enc() argument
119 for (i = 1; i < rounds; i += 2) { in aesni_enc()
124 tmp = _mm_aesenc_si128(tmp, keysched[rounds]); in aesni_enc()
125 return _mm_aesenclast_si128(tmp, keysched[rounds + 1]); in aesni_enc()
129 aesni_dec(int rounds, const __m128i *keysched, const __m128i from) in aesni_dec() argument
[all …]
H A Dintel_sha256.c45 * The indented lines in the loop are instructions related to rounds processing.
87 // Save hash values for addition after rounds in intel_sha256_step()
91 // Rounds 0-3 in intel_sha256_step()
100 // Rounds 4-7 in intel_sha256_step()
110 // Rounds 8-11 in intel_sha256_step()
120 // Rounds 12-15 in intel_sha256_step()
133 // Rounds 16-19 in intel_sha256_step()
144 // Rounds 20-23 in intel_sha256_step()
155 // Rounds 24-27 in intel_sha256_step()
166 // Rounds 28-31 in intel_sha256_step()
[all …]
H A Daesni.h55 int rounds; member
78 void aesni_encrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/,
81 void aesni_decrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/,
83 void aesni_encrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/,
85 void aesni_decrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/,
87 void aesni_encrypt_icm(int rounds, const void *key_schedule /*__aligned(16)*/,
91 void aesni_encrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/,
95 void aesni_decrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/,
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devpmac_siphash.txt14 # SIPHASH tests - default values: 2,4 rounds, 16-byte mac
129 # SIPHASH - default values: 2,4 rounds, explicit 8-byte mac
143 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac
151 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac (set as 0)
159 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
166 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
174 Title = SIPHASH - explicit rounds
178 Ctrl = c-rounds:2
179 Ctrl = d-rounds:4
185 Title = SIPHASH - non-default values: 4,8 rounds
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DEVP_rc5_32_12_16_cbc.387 variable key length cipher with an additional "number of rounds" parameter. By
88 default the key length is set to 128 bits and 12 rounds. Alternative key lengths
95 .IP "EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_SET_RC5_ROUNDS, rounds, NULL)" 4
96 .IX Item "EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_SET_RC5_ROUNDS, rounds, NULL)"
97 Sets the number of rounds to \fBrounds\fR. This must be one of RC5_8_ROUNDS,
99 .IP "EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GET_RC5_ROUNDS, 0, &rounds)" 4
100 .IX Item "EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GET_RC5_ROUNDS, 0, &rounds)"
101 Stores the number of rounds currently configured in \fB*rounds\fR where \fB*rounds\fR
/freebsd/crypto/openssl/doc/man3/
H A DEVP_rc5_32_12_16_cbc.pod35 variable key length cipher with an additional "number of rounds" parameter. By
36 default the key length is set to 128 bits and 12 rounds. Alternative key lengths
45 =item EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_SET_RC5_ROUNDS, rounds, NULL)
47 Sets the number of rounds to B<rounds>. This must be one of RC5_8_ROUNDS,
50 =item EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GET_RC5_ROUNDS, 0, &rounds)
52 Stores the number of rounds currently configured in B<*rounds> where B<*rounds>
/freebsd/lib/libcrypt/
H A Dcrypt-sha256.c51 /* Prefix for optional rounds specification. */
52 static const char sha256_rounds_prefix[] = "rounds=";
56 /* Default number of rounds if not explicitly specified. */
58 /* Minimum number of rounds. */
60 /* Maximum number of rounds. */
69 size_t salt_len, key_len, cnt, rounds; in crypt_sha256() local
74 /* Default number of rounds. */ in crypt_sha256()
75 rounds = ROUNDS_DEFAULT; in crypt_sha256()
91 rounds = MAX(ROUNDS_MIN, MIN(srounds, ROUNDS_MAX)); in crypt_sha256()
180 for (cnt = 0; cnt < rounds; ++cnt) { in crypt_sha256()
[all …]
H A Dcrypt-sha512.c51 /* Prefix for optional rounds specification. */
52 static const char sha512_rounds_prefix[] = "rounds=";
56 /* Default number of rounds if not explicitly specified. */
58 /* Minimum number of rounds. */
60 /* Maximum number of rounds. */
69 size_t salt_len, key_len, cnt, rounds; in crypt_sha512() local
74 /* Default number of rounds. */ in crypt_sha512()
75 rounds = ROUNDS_DEFAULT; in crypt_sha512()
91 rounds = MAX(ROUNDS_MIN, MIN(srounds, ROUNDS_MAX)); in crypt_sha512()
180 for (cnt = 0; cnt < rounds; ++cnt) { in crypt_sha512()
[all …]
/freebsd/crypto/openssl/crypto/rc5/
H A Drc5_skey.c20 int rounds) in RC5_32_set_key() argument
28 if ((rounds != RC5_16_ROUNDS) && in RC5_32_set_key()
29 (rounds != RC5_12_ROUNDS) && (rounds != RC5_8_ROUNDS)) in RC5_32_set_key()
30 rounds = RC5_16_ROUNDS; in RC5_32_set_key()
32 key->rounds = rounds; in RC5_32_set_key()
50 t = (rounds + 1) * 2; in RC5_32_set_key()
/freebsd/crypto/openssl/providers/implementations/ciphers/
H A Dcipher_rc5.c88 unsigned int rounds; in rc5_set_ctx_params() local
90 if (!OSSL_PARAM_get_uint(p, &rounds)) { in rc5_set_ctx_params()
94 if (rounds != RC5_8_ROUNDS in rc5_set_ctx_params()
95 && rounds != RC5_12_ROUNDS in rc5_set_ctx_params()
96 && rounds != RC5_16_ROUNDS) { in rc5_set_ctx_params()
100 ctx->rounds = rounds; in rc5_set_ctx_params()
123 if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->rounds)) { in OSSL_PARAM_uint()
150 ctx->rounds = RC5_12_ROUNDS; \
/freebsd/contrib/libcbor/test/
H A Dfuzz_test.c13 #define ROUNDS 65536ULL macro
16 #define ROUNDS 256ULL macro
60 printf("Fuzzing %llu rounds of up to %llu bytes with seed %u\n", ROUNDS, in fuzz()
64 for (size_t i = 0; i < ROUNDS; i++) run_round(); in fuzz()
67 (ROUNDS * MAXLEN) / 1024); in fuzz()
/freebsd/crypto/openssl/crypto/evp/
H A De_rc5.c32 int rounds; /* number of rounds */ member
47 data(c)->rounds = RC5_12_ROUNDS; in rc5_ctrl()
51 *(int *)ptr = data(c)->rounds; in rc5_ctrl()
59 data(c)->rounds = arg; in rc5_ctrl()
81 return RC5_32_set_key(&data(ctx)->ks, key_len, key, data(ctx)->rounds); in r_32_12_16_init_key()
/freebsd/lib/libmd/aarch64/
H A Dsha1block.S338 /* rounds 0--3 */
344 /* rounds 4--7 */
351 /* rounds 8--11 */
358 /* rounds 12--15 */
365 /* rounds 16--19 */
372 /* rounds 20--23 */
379 /* rounds 24--27 */
386 /* rounds 28--31 */
393 /* rounds 32--35 */
400 /* rounds 36--39 */
[all …]
/freebsd/sys/crypto/armv8/
H A Darmv8_crypto_wrap.c56 armv8_aes_enc(int rounds, const uint8x16_t *keysched, const uint8x16_t from) in armv8_aes_enc() argument
62 for (i = 0; i < rounds - 1; i += 2) { in armv8_aes_enc()
69 tmp = vaeseq_u8(tmp, keysched[rounds - 1]); in armv8_aes_enc()
71 tmp = vaeseq_u8(tmp, keysched[rounds]); in armv8_aes_enc()
72 tmp = veorq_u8(tmp, keysched[rounds + 1]); in armv8_aes_enc()
78 armv8_aes_dec(int rounds, const uint8x16_t *keysched, const uint8x16_t from) in armv8_aes_dec() argument
84 for (i = 0; i < rounds - 1; i += 2) { in armv8_aes_dec()
91 tmp = vaesdq_u8(tmp, keysched[rounds - 1]); in armv8_aes_dec()
93 tmp = vaesdq_u8(tmp, keysched[rounds]); in armv8_aes_dec()
94 tmp = veorq_u8(tmp, keysched[rounds + 1]); in armv8_aes_dec()
[all …]
/freebsd/secure/lib/libcrypto/man/man7/
H A DEVP_MAC-Siphash.790 .IP """c\-rounds"" (\fBOSSL_MAC_PARAM_C_ROUNDS\fR) <unsigned integer>" 4
91 .IX Item """c-rounds"" (OSSL_MAC_PARAM_C_ROUNDS) <unsigned integer>"
92 Specifies the number of rounds per message block. By default this is \fI2\fR.
93 .IP """d\-rounds"" (\fBOSSL_MAC_PARAM_D_ROUNDS\fR) <unsigned integer>" 4
94 .IX Item """d-rounds"" (OSSL_MAC_PARAM_D_ROUNDS) <unsigned integer>"
95 Specifies the number of finalisation rounds. By default this is \fI4\fR.

12345678910>>...16