| /freebsd/sys/contrib/ck/src/ |
| H A D | ck_barrier_tournament.c | 36 * move on to the next round, while losers spin in their current rounds 61 struct ck_barrier_tournament_round **rounds, in ck_barrier_tournament_init() argument 71 rounds[i][0].flag = 0; in ck_barrier_tournament_init() 72 rounds[i][0].role = CK_BARRIER_TOURNAMENT_DROPOUT; in ck_barrier_tournament_init() 74 rounds[i][k].flag = 0; in ck_barrier_tournament_init() 79 rounds[i][k].role = CK_BARRIER_TOURNAMENT_WINNER; in ck_barrier_tournament_init() 81 rounds[i][k].role = CK_BARRIER_TOURNAMENT_BYE; in ck_barrier_tournament_init() 85 rounds[i][k].role = CK_BARRIER_TOURNAMENT_LOSER; in ck_barrier_tournament_init() 87 rounds[i][k].role = CK_BARRIER_TOURNAMENT_CHAMPION; in ck_barrier_tournament_init() 89 if (rounds[i][k].role == CK_BARRIER_TOURNAMENT_LOSER) in ck_barrier_tournament_init() [all …]
|
| /freebsd/crypto/openssl/crypto/aes/asm/ |
| H A D | aes-armv4.pl | 72 $rounds="r12"; 214 mov $rounds,r0 @ inp 217 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral 218 ldrb $t1,[$rounds,#2] @ manner... 219 ldrb $t2,[$rounds,#1] 220 ldrb $t3,[$rounds,#0] 222 ldrb $s1,[$rounds,#7] 224 ldrb $t1,[$rounds,#6] 226 ldrb $t2,[$rounds,#5] 227 ldrb $t3,[$rounds,#4] [all …]
|
| H A D | aesni-x86.pl | 90 $rounds="ecx"; 94 $rounds_="ebx"; # backup copy for $rounds 137 &dec ($rounds); 153 &cmp ($rounds,11); 196 &mov ($rounds,&DWP(240,$key)); 215 &mov ($rounds,&DWP(240,$key)); 248 &shl ($rounds,4); 253 &lea ($key,&DWP(32,$key,$rounds)); 254 &neg ($rounds); 255 &add ($rounds,16); [all …]
|
| H A D | aesni-x86_64.pl | 80 # rounds for larger block sizes, i.e. 192-bit result being 10/12 times 104 # calculated as latency times number of rounds, 10 for 128-bit key, 218 $rounds="%eax"; # input to and changed by aesni_[en|de]cryptN !!! 226 $rnds_="%r10d"; # backup copy for $rounds 245 my ($p,$key,$rounds,$inout,$ivec)=@_; $inout=$inout0 if (!defined($inout)); 263 dec $rounds 282 mov 240($key),$rounds # key->rounds 284 &aesni_generate1("enc",$key,$rounds); 301 mov 240($key),$rounds # key->rounds 303 &aesni_generate1("dec",$key,$rounds); [all …]
|
| H A D | aesv8-armx.pl | 104 my ($inp,$bits,$out,$ptr,$rounds)=("x0","w1","x2","x3","w12"); 219 mov $rounds,#10 258 mov $rounds,#12 266 mov $rounds,#14 301 str $rounds,[$out] 372 my $rounds="w3"; 385 ldr $rounds,[$key,#240] 388 sub $rounds,$rounds,#2 395 subs $rounds,$rounds,#2 442 my ($enc,$rounds,$cnt,$key_,$step)=("w4","w5","w6","x7","x8"); [all …]
|
| H A D | aes-parisc.pl | 73 $rounds="%r29"; 198 ldw 240($key),$rounds 202 _srm $rounds,1,$rounds 245 addib,= -1,$rounds,L\$enc_last 360 ldo 1024($tbl),$rounds 397 ldbx $acc0($rounds),$acc0 399 ldbx $acc1($rounds),$acc1 402 ldbx $acc2($rounds),$acc2 403 ldbx $acc3($rounds),$acc3 405 ldbx $acc4($rounds),$acc4 [all …]
|
| H A D | aes-sparcv9.pl | 77 $rounds="%i7"; # aliases with return address, which is off-loaded to stack 205 ld [$key+240],$rounds 209 srl $rounds,1,$rounds 272 subcc $rounds,1,$rounds ! 275 add $tbl,2048,$rounds 449 ldub [$rounds+$acc0],$acc0 452 ldub [$rounds+$acc1],$acc1 455 ldub [$rounds+$acc2],$acc2 456 ldub [$rounds+$acc3],$acc3 459 ldub [$rounds+$acc4],$acc4 [all …]
|
| /freebsd/crypto/openssl/test/recipes/ |
| H A D | 20-test_passwd.t | 26 salt => 'rounds=10000$saltstringsaltstring', 28 expected => '$5$rounds=10000$saltstringsaltst$3xv.VbSHBb41AL9AvLeujZkZRBAwqFMz2.opqey6IcA' }, 30 salt => 'rounds=5000$toolongsaltstring', 32 expected => '$5$rounds=5000$toolongsaltstrin$Un/5jzAHMgOGZ5.mWJpuVolil07guHPvOW8mGRcvxa5' }, 34 salt => 'rounds=1400$anotherlongsaltstring', 36 expected => '$5$rounds=1400$anotherlongsalts$Rx.j8H.h8HjEDGomFU8bDkXm3XIUnzyxf12oP84Bnq1' }, 38 salt => 'rounds=10$roundstoolow', 40 expected => '$5$rounds=1000$roundstoolow$yfvwcWrQ8l/K0DAWyuPMDNHpIVlTQebY9l/gL972bIC' }, 46 salt => 'rounds=10000$saltstringsaltstring', 48 …expected => '$6$rounds=10000$saltstringsaltst$OW1/O6BYHV6BcXZu8QVeXbDWra3Oeqh0sbHbbMCVNSnCM/UrjmM0… [all …]
|
| /freebsd/sys/crypto/aesni/ |
| H A D | aesni_wrap.c | 54 aesni_encrypt_cbc(int rounds, const void *key_schedule, size_t len, in aesni_encrypt_cbc() argument 63 tot = aesni_enc(rounds - 1, key_schedule, in aesni_encrypt_cbc() 73 aesni_decrypt_cbc(int rounds, const void *key_schedule, size_t len, in aesni_decrypt_cbc() argument 85 aesni_dec8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], in aesni_decrypt_cbc() 100 aesni_dec(rounds - 1, key_schedule, nextiv) ^ ivreg); in aesni_decrypt_cbc() 107 aesni_encrypt_ecb(int rounds, const void *key_schedule, size_t len, in aesni_encrypt_ecb() argument 120 aesni_enc8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], in aesni_encrypt_ecb() 137 tot = aesni_enc(rounds - 1, key_schedule, in aesni_encrypt_ecb() 146 aesni_decrypt_ecb(int rounds, const void *key_schedule, size_t len, in aesni_decrypt_ecb() argument 159 aesni_dec8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], in aesni_decrypt_ecb() [all …]
|
| H A D | intel_sha1.c | 45 * The indented lines in the loop are instructions related to rounds processing. 88 // Save hash values for addition after rounds in intel_sha1_step() 92 // Rounds 0-3 in intel_sha1_step() 99 // Rounds 4-7 in intel_sha1_step() 107 // Rounds 8-11 in intel_sha1_step() 116 // Rounds 12-15 in intel_sha1_step() 126 // Rounds 16-19 in intel_sha1_step() 134 // Rounds 20-23 in intel_sha1_step() 142 // Rounds 24-27 in intel_sha1_step() 150 // Rounds 28-31 in intel_sha1_step() [all …]
|
| H A D | aesencdec.h | 38 aesni_enc8(int rounds, const __m128i *keysched, __m128i a, in aesni_enc8() argument 53 for (i = 0; i < rounds; i++) { in aesni_enc8() 75 aesni_dec8(int rounds, const __m128i *keysched, __m128i a, in aesni_dec8() argument 90 for (i = 0; i < rounds; i++) { in aesni_dec8() 111 /* rounds is passed in as rounds - 1 */ 113 aesni_enc(int rounds, const __m128i *keysched, const __m128i from) in aesni_enc() argument 119 for (i = 1; i < rounds; i += 2) { in aesni_enc() 124 tmp = _mm_aesenc_si128(tmp, keysched[rounds]); in aesni_enc() 125 return _mm_aesenclast_si128(tmp, keysched[rounds + 1]); in aesni_enc() 129 aesni_dec(int rounds, const __m128i *keysched, const __m128i from) in aesni_dec() argument [all …]
|
| H A D | intel_sha256.c | 45 * The indented lines in the loop are instructions related to rounds processing. 87 // Save hash values for addition after rounds in intel_sha256_step() 91 // Rounds 0-3 in intel_sha256_step() 100 // Rounds 4-7 in intel_sha256_step() 110 // Rounds 8-11 in intel_sha256_step() 120 // Rounds 12-15 in intel_sha256_step() 133 // Rounds 16-19 in intel_sha256_step() 144 // Rounds 20-23 in intel_sha256_step() 155 // Rounds 24-27 in intel_sha256_step() 166 // Rounds 28-31 in intel_sha256_step() [all …]
|
| H A D | aesni.h | 55 int rounds; member 78 void aesni_encrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/, 81 void aesni_decrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/, 83 void aesni_encrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/, 85 void aesni_decrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/, 87 void aesni_encrypt_icm(int rounds, const void *key_schedule /*__aligned(16)*/, 91 void aesni_encrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/, 95 void aesni_decrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/,
|
| /freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evpmac_siphash.txt | 14 # SIPHASH tests - default values: 2,4 rounds, 16-byte mac 129 # SIPHASH - default values: 2,4 rounds, explicit 8-byte mac 143 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac 151 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac (set as 0) 159 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size) 166 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size) 174 Title = SIPHASH - explicit rounds 178 Ctrl = c-rounds:2 179 Ctrl = d-rounds:4 185 Title = SIPHASH - non-default values: 4,8 rounds [all …]
|
| /freebsd/secure/lib/libcrypto/man/man3/ |
| H A D | EVP_rc5_32_12_16_cbc.3 | 87 variable key length cipher with an additional "number of rounds" parameter. By 88 default the key length is set to 128 bits and 12 rounds. Alternative key lengths 95 .IP "EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_SET_RC5_ROUNDS, rounds, NULL)" 4 96 .IX Item "EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_SET_RC5_ROUNDS, rounds, NULL)" 97 Sets the number of rounds to \fBrounds\fR. This must be one of RC5_8_ROUNDS, 99 .IP "EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GET_RC5_ROUNDS, 0, &rounds)" 4 100 .IX Item "EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GET_RC5_ROUNDS, 0, &rounds)" 101 Stores the number of rounds currently configured in \fB*rounds\fR where \fB*rounds\fR
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_rc5_32_12_16_cbc.pod | 35 variable key length cipher with an additional "number of rounds" parameter. By 36 default the key length is set to 128 bits and 12 rounds. Alternative key lengths 45 =item EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_SET_RC5_ROUNDS, rounds, NULL) 47 Sets the number of rounds to B<rounds>. This must be one of RC5_8_ROUNDS, 50 =item EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GET_RC5_ROUNDS, 0, &rounds) 52 Stores the number of rounds currently configured in B<*rounds> where B<*rounds>
|
| /freebsd/lib/libcrypt/ |
| H A D | crypt-sha256.c | 51 /* Prefix for optional rounds specification. */ 52 static const char sha256_rounds_prefix[] = "rounds="; 56 /* Default number of rounds if not explicitly specified. */ 58 /* Minimum number of rounds. */ 60 /* Maximum number of rounds. */ 69 size_t salt_len, key_len, cnt, rounds; in crypt_sha256() local 74 /* Default number of rounds. */ in crypt_sha256() 75 rounds = ROUNDS_DEFAULT; in crypt_sha256() 91 rounds = MAX(ROUNDS_MIN, MIN(srounds, ROUNDS_MAX)); in crypt_sha256() 180 for (cnt = 0; cnt < rounds; ++cnt) { in crypt_sha256() [all …]
|
| H A D | crypt-sha512.c | 51 /* Prefix for optional rounds specification. */ 52 static const char sha512_rounds_prefix[] = "rounds="; 56 /* Default number of rounds if not explicitly specified. */ 58 /* Minimum number of rounds. */ 60 /* Maximum number of rounds. */ 69 size_t salt_len, key_len, cnt, rounds; in crypt_sha512() local 74 /* Default number of rounds. */ in crypt_sha512() 75 rounds = ROUNDS_DEFAULT; in crypt_sha512() 91 rounds = MAX(ROUNDS_MIN, MIN(srounds, ROUNDS_MAX)); in crypt_sha512() 180 for (cnt = 0; cnt < rounds; ++cnt) { in crypt_sha512() [all …]
|
| /freebsd/crypto/openssl/crypto/rc5/ |
| H A D | rc5_skey.c | 20 int rounds) in RC5_32_set_key() argument 28 if ((rounds != RC5_16_ROUNDS) && in RC5_32_set_key() 29 (rounds != RC5_12_ROUNDS) && (rounds != RC5_8_ROUNDS)) in RC5_32_set_key() 30 rounds = RC5_16_ROUNDS; in RC5_32_set_key() 32 key->rounds = rounds; in RC5_32_set_key() 50 t = (rounds + 1) * 2; in RC5_32_set_key()
|
| /freebsd/crypto/openssl/providers/implementations/ciphers/ |
| H A D | cipher_rc5.c | 88 unsigned int rounds; in rc5_set_ctx_params() local 90 if (!OSSL_PARAM_get_uint(p, &rounds)) { in rc5_set_ctx_params() 94 if (rounds != RC5_8_ROUNDS in rc5_set_ctx_params() 95 && rounds != RC5_12_ROUNDS in rc5_set_ctx_params() 96 && rounds != RC5_16_ROUNDS) { in rc5_set_ctx_params() 100 ctx->rounds = rounds; in rc5_set_ctx_params() 123 if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->rounds)) { in OSSL_PARAM_uint() 150 ctx->rounds = RC5_12_ROUNDS; \
|
| /freebsd/contrib/libcbor/test/ |
| H A D | fuzz_test.c | 13 #define ROUNDS 65536ULL macro 16 #define ROUNDS 256ULL macro 60 printf("Fuzzing %llu rounds of up to %llu bytes with seed %u\n", ROUNDS, in fuzz() 64 for (size_t i = 0; i < ROUNDS; i++) run_round(); in fuzz() 67 (ROUNDS * MAXLEN) / 1024); in fuzz()
|
| /freebsd/crypto/openssl/crypto/evp/ |
| H A D | e_rc5.c | 32 int rounds; /* number of rounds */ member 47 data(c)->rounds = RC5_12_ROUNDS; in rc5_ctrl() 51 *(int *)ptr = data(c)->rounds; in rc5_ctrl() 59 data(c)->rounds = arg; in rc5_ctrl() 81 return RC5_32_set_key(&data(ctx)->ks, key_len, key, data(ctx)->rounds); in r_32_12_16_init_key()
|
| /freebsd/lib/libmd/aarch64/ |
| H A D | sha1block.S | 338 /* rounds 0--3 */ 344 /* rounds 4--7 */ 351 /* rounds 8--11 */ 358 /* rounds 12--15 */ 365 /* rounds 16--19 */ 372 /* rounds 20--23 */ 379 /* rounds 24--27 */ 386 /* rounds 28--31 */ 393 /* rounds 32--35 */ 400 /* rounds 36--39 */ [all …]
|
| /freebsd/sys/crypto/armv8/ |
| H A D | armv8_crypto_wrap.c | 56 armv8_aes_enc(int rounds, const uint8x16_t *keysched, const uint8x16_t from) in armv8_aes_enc() argument 62 for (i = 0; i < rounds - 1; i += 2) { in armv8_aes_enc() 69 tmp = vaeseq_u8(tmp, keysched[rounds - 1]); in armv8_aes_enc() 71 tmp = vaeseq_u8(tmp, keysched[rounds]); in armv8_aes_enc() 72 tmp = veorq_u8(tmp, keysched[rounds + 1]); in armv8_aes_enc() 78 armv8_aes_dec(int rounds, const uint8x16_t *keysched, const uint8x16_t from) in armv8_aes_dec() argument 84 for (i = 0; i < rounds - 1; i += 2) { in armv8_aes_dec() 91 tmp = vaesdq_u8(tmp, keysched[rounds - 1]); in armv8_aes_dec() 93 tmp = vaesdq_u8(tmp, keysched[rounds]); in armv8_aes_dec() 94 tmp = veorq_u8(tmp, keysched[rounds + 1]); in armv8_aes_dec() [all …]
|
| /freebsd/secure/lib/libcrypto/man/man7/ |
| H A D | EVP_MAC-Siphash.7 | 90 .IP """c\-rounds"" (\fBOSSL_MAC_PARAM_C_ROUNDS\fR) <unsigned integer>" 4 91 .IX Item """c-rounds"" (OSSL_MAC_PARAM_C_ROUNDS) <unsigned integer>" 92 Specifies the number of rounds per message block. By default this is \fI2\fR. 93 .IP """d\-rounds"" (\fBOSSL_MAC_PARAM_D_ROUNDS\fR) <unsigned integer>" 4 94 .IX Item """d-rounds"" (OSSL_MAC_PARAM_D_ROUNDS) <unsigned integer>" 95 Specifies the number of finalisation rounds. By default this is \fI4\fR.
|