/freebsd/sys/contrib/ck/src/ |
H A D | ck_barrier_tournament.c | 36 * move on to the next round, while losers spin in their current rounds 61 struct ck_barrier_tournament_round **rounds, in ck_barrier_tournament_init() argument 71 rounds[i][0].flag = 0; in ck_barrier_tournament_init() 72 rounds[i][0].role = CK_BARRIER_TOURNAMENT_DROPOUT; in ck_barrier_tournament_init() 74 rounds[i][k].flag = 0; in ck_barrier_tournament_init() 79 rounds[i][k].role = CK_BARRIER_TOURNAMENT_WINNER; in ck_barrier_tournament_init() 81 rounds[i][k].role = CK_BARRIER_TOURNAMENT_BYE; in ck_barrier_tournament_init() 85 rounds[i][k].role = CK_BARRIER_TOURNAMENT_LOSER; in ck_barrier_tournament_init() 87 rounds[i][k].role = CK_BARRIER_TOURNAMENT_CHAMPION; in ck_barrier_tournament_init() 89 if (rounds[i][k].role == CK_BARRIER_TOURNAMENT_LOSER) in ck_barrier_tournament_init() [all …]
|
/freebsd/crypto/openssl/crypto/aes/asm/ |
H A D | aes-armv4.pl | 72 $rounds="r12"; 214 mov $rounds,r0 @ inp 217 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral 218 ldrb $t1,[$rounds,#2] @ manner... 219 ldrb $t2,[$rounds,#1] 220 ldrb $t3,[$rounds,#0] 222 ldrb $s1,[$rounds,#7] 224 ldrb $t1,[$rounds,#6] 226 ldrb $t2,[$rounds,#5] 227 ldrb $t3,[$rounds,#4] [all …]
|
H A D | aesni-x86.pl | 90 $rounds="ecx"; 94 $rounds_="ebx"; # backup copy for $rounds 137 &dec ($rounds); 153 &cmp ($rounds,11); 196 &mov ($rounds,&DWP(240,$key)); 215 &mov ($rounds,&DWP(240,$key)); 248 &shl ($rounds,4); 253 &lea ($key,&DWP(32,$key,$rounds)); 254 &neg ($rounds); 255 &add ($rounds,16); [all …]
|
H A D | aesv8-armx.pl | 104 my ($inp,$bits,$out,$ptr,$rounds)=("x0","w1","x2","x3","w12"); 203 mov $rounds,#10 242 mov $rounds,#12 250 mov $rounds,#14 285 str $rounds,[$out] 356 my $rounds="w3"; 369 ldr $rounds,[$key,#240] 372 sub $rounds,$rounds,#2 379 subs $rounds,$rounds,#2 426 my ($enc,$rounds,$cnt,$key_,$step)=("w4","w5","w6","x7","x8"); [all …]
|
H A D | aesni-x86_64.pl | 80 # rounds for larger block sizes, i.e. 192-bit result being 10/12 times 104 # calculated as latency times number of rounds, 10 for 128-bit key, 218 $rounds="%eax"; # input to and changed by aesni_[en|de]cryptN !!! 226 $rnds_="%r10d"; # backup copy for $rounds 245 my ($p,$key,$rounds,$inout,$ivec)=@_; $inout=$inout0 if (!defined($inout)); 263 dec $rounds 282 mov 240($key),$rounds # key->rounds 284 &aesni_generate1("enc",$key,$rounds); 301 mov 240($key),$rounds # key->rounds 303 &aesni_generate1("dec",$key,$rounds); [all …]
|
H A D | aes-parisc.pl | 73 $rounds="%r29"; 198 ldw 240($key),$rounds 202 _srm $rounds,1,$rounds 245 addib,= -1,$rounds,L\$enc_last 360 ldo 1024($tbl),$rounds 397 ldbx $acc0($rounds),$acc0 399 ldbx $acc1($rounds),$acc1 402 ldbx $acc2($rounds),$acc2 403 ldbx $acc3($rounds),$acc3 405 ldbx $acc4($rounds),$acc4 [all …]
|
H A D | aes-sparcv9.pl | 77 $rounds="%i7"; # aliases with return address, which is off-loaded to stack 205 ld [$key+240],$rounds 209 srl $rounds,1,$rounds 272 subcc $rounds,1,$rounds ! 275 add $tbl,2048,$rounds 449 ldub [$rounds+$acc0],$acc0 452 ldub [$rounds+$acc1],$acc1 455 ldub [$rounds+$acc2],$acc2 456 ldub [$rounds+$acc3],$acc3 459 ldub [$rounds+$acc4],$acc4 [all …]
|
H A D | aesfx-sparcv9.pl | 39 my ($inp,$out,$key,$rounds,$tmp,$mask) = map("%o$_",(0..5)); 59 ld [$key + 240], $rounds 83 sub $rounds, 4, $rounds 99 brnz,a $rounds, .Loop_enc 100 sub $rounds, 2, $rounds 149 ld [$key + 240], $rounds 173 sub $rounds, 4, $rounds 189 brnz,a $rounds, .Loop_dec 190 sub $rounds, 2, $rounds 281 st $bits, [$out + 240] ! store rounds [all …]
|
/freebsd/crypto/openssl/test/recipes/ |
H A D | 20-test_passwd.t | 26 salt => 'rounds=10000$saltstringsaltstring', 28 expected => '$5$rounds=10000$saltstringsaltst$3xv.VbSHBb41AL9AvLeujZkZRBAwqFMz2.opqey6IcA' }, 30 salt => 'rounds=5000$toolongsaltstring', 32 expected => '$5$rounds=5000$toolongsaltstrin$Un/5jzAHMgOGZ5.mWJpuVolil07guHPvOW8mGRcvxa5' }, 34 salt => 'rounds=1400$anotherlongsaltstring', 36 expected => '$5$rounds=1400$anotherlongsalts$Rx.j8H.h8HjEDGomFU8bDkXm3XIUnzyxf12oP84Bnq1' }, 38 salt => 'rounds=10$roundstoolow', 40 expected => '$5$rounds=1000$roundstoolow$yfvwcWrQ8l/K0DAWyuPMDNHpIVlTQebY9l/gL972bIC' }, 46 salt => 'rounds=10000$saltstringsaltstring', 48 …expected => '$6$rounds=10000$saltstringsaltst$OW1/O6BYHV6BcXZu8QVeXbDWra3Oeqh0sbHbbMCVNSnCM/UrjmM0… [all …]
|
/freebsd/sys/crypto/aesni/ |
H A D | aesni_wrap.c | 54 aesni_encrypt_cbc(int rounds, const void *key_schedule, size_t len, in aesni_encrypt_cbc() argument 63 tot = aesni_enc(rounds - 1, key_schedule, in aesni_encrypt_cbc() 73 aesni_decrypt_cbc(int rounds, const void *key_schedule, size_t len, in aesni_decrypt_cbc() argument 85 aesni_dec8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], in aesni_decrypt_cbc() 100 aesni_dec(rounds - 1, key_schedule, nextiv) ^ ivreg); in aesni_decrypt_cbc() 107 aesni_encrypt_ecb(int rounds, const void *key_schedule, size_t len, in aesni_encrypt_ecb() argument 120 aesni_enc8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], in aesni_encrypt_ecb() 137 tot = aesni_enc(rounds - 1, key_schedule, in aesni_encrypt_ecb() 146 aesni_decrypt_ecb(int rounds, const void *key_schedule, size_t len, in aesni_decrypt_ecb() argument 159 aesni_dec8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], in aesni_decrypt_ecb() [all …]
|
H A D | intel_sha1.c | 45 * The indented lines in the loop are instructions related to rounds processing. 88 // Save hash values for addition after rounds in intel_sha1_step() 92 // Rounds 0-3 in intel_sha1_step() 99 // Rounds 4-7 in intel_sha1_step() 107 // Rounds 8-11 in intel_sha1_step() 116 // Rounds 12-15 in intel_sha1_step() 126 // Rounds 16-19 in intel_sha1_step() 134 // Rounds 20-23 in intel_sha1_step() 142 // Rounds 24-27 in intel_sha1_step() 150 // Rounds 28-31 in intel_sha1_step() [all …]
|
H A D | aesencdec.h | 38 aesni_enc8(int rounds, const __m128i *keysched, __m128i a, in aesni_enc8() argument 53 for (i = 0; i < rounds; i++) { in aesni_enc8() 75 aesni_dec8(int rounds, const __m128i *keysched, __m128i a, in aesni_dec8() argument 90 for (i = 0; i < rounds; i++) { in aesni_dec8() 111 /* rounds is passed in as rounds - 1 */ 113 aesni_enc(int rounds, const __m128i *keysched, const __m128i from) in aesni_enc() argument 119 for (i = 1; i < rounds; i += 2) { in aesni_enc() 124 tmp = _mm_aesenc_si128(tmp, keysched[rounds]); in aesni_enc() 125 return _mm_aesenclast_si128(tmp, keysched[rounds + 1]); in aesni_enc() 129 aesni_dec(int rounds, const __m128i *keysched, const __m128i from) in aesni_dec() argument [all …]
|
H A D | intel_sha256.c | 45 * The indented lines in the loop are instructions related to rounds processing. 87 // Save hash values for addition after rounds in intel_sha256_step() 91 // Rounds 0-3 in intel_sha256_step() 100 // Rounds 4-7 in intel_sha256_step() 110 // Rounds 8-11 in intel_sha256_step() 120 // Rounds 12-15 in intel_sha256_step() 133 // Rounds 16-19 in intel_sha256_step() 144 // Rounds 20-23 in intel_sha256_step() 155 // Rounds 24-27 in intel_sha256_step() 166 // Rounds 28-31 in intel_sha256_step() [all …]
|
H A D | aesni.h | 55 int rounds; member 78 void aesni_encrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/, 81 void aesni_decrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/, 83 void aesni_encrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/, 85 void aesni_decrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/, 87 void aesni_encrypt_icm(int rounds, const void *key_schedule /*__aligned(16)*/, 91 void aesni_encrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/, 95 void aesni_decrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/,
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evpmac_siphash.txt | 14 # SIPHASH tests - default values: 2,4 rounds, 16-byte mac 129 # SIPHASH - default values: 2,4 rounds, explicit 8-byte mac 143 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac 151 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac (set as 0) 159 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size) 166 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size) 174 Title = SIPHASH - explicit rounds 178 Ctrl = c-rounds:2 179 Ctrl = d-rounds:4 185 Title = SIPHASH - non-default values: 4,8 rounds [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_rc5_32_12_16_cbc.pod | 35 variable key length cipher with an additional "number of rounds" parameter. By 36 default the key length is set to 128 bits and 12 rounds. Alternative key lengths 45 =item EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_SET_RC5_ROUNDS, rounds, NULL) 47 Sets the number of rounds to B<rounds>. This must be one of RC5_8_ROUNDS, 50 =item EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GET_RC5_ROUNDS, 0, &rounds) 52 Stores the number of rounds currently configured in B<*rounds> where B<*rounds>
|
/freebsd/lib/libcrypt/ |
H A D | crypt-sha256.c | 51 /* Prefix for optional rounds specification. */ 52 static const char sha256_rounds_prefix[] = "rounds="; 56 /* Default number of rounds if not explicitly specified. */ 58 /* Minimum number of rounds. */ 60 /* Maximum number of rounds. */ 69 size_t salt_len, key_len, cnt, rounds; in crypt_sha256() local 74 /* Default number of rounds. */ in crypt_sha256() 75 rounds = ROUNDS_DEFAULT; in crypt_sha256() 91 rounds = MAX(ROUNDS_MIN, MIN(srounds, ROUNDS_MAX)); in crypt_sha256() 180 for (cnt = 0; cnt < rounds; ++cnt) { in crypt_sha256() [all …]
|
H A D | crypt-sha512.c | 51 /* Prefix for optional rounds specification. */ 52 static const char sha512_rounds_prefix[] = "rounds="; 56 /* Default number of rounds if not explicitly specified. */ 58 /* Minimum number of rounds. */ 60 /* Maximum number of rounds. */ 69 size_t salt_len, key_len, cnt, rounds; in crypt_sha512() local 74 /* Default number of rounds. */ in crypt_sha512() 75 rounds = ROUNDS_DEFAULT; in crypt_sha512() 91 rounds = MAX(ROUNDS_MIN, MIN(srounds, ROUNDS_MAX)); in crypt_sha512() 180 for (cnt = 0; cnt < rounds; ++cnt) { in crypt_sha512() [all …]
|
/freebsd/crypto/openssl/crypto/rc5/ |
H A D | rc5_skey.c | 20 int rounds) in RC5_32_set_key() argument 28 if ((rounds != RC5_16_ROUNDS) && in RC5_32_set_key() 29 (rounds != RC5_12_ROUNDS) && (rounds != RC5_8_ROUNDS)) in RC5_32_set_key() 30 rounds = RC5_16_ROUNDS; in RC5_32_set_key() 32 key->rounds = rounds; in RC5_32_set_key() 50 t = (rounds + 1) * 2; in RC5_32_set_key()
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | EVP_rc5_32_12_16_cbc.3 | 163 variable key length cipher with an additional \*(L"number of rounds\*(R" parameter. By 164 default the key length is set to 128 bits and 12 rounds. Alternative key lengths 171 .IP "EVP_CIPHER_CTX_ctrl(ctx, \s-1EVP_CTRL_SET_RC5_ROUNDS,\s0 rounds, \s-1NULL\s0)" 4 172 .IX Item "EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_SET_RC5_ROUNDS, rounds, NULL)" 173 Sets the number of rounds to \fBrounds\fR. This must be one of \s-1RC5_8_ROUNDS, 175 .IP "EVP_CIPHER_CTX_ctrl(ctx, \s-1EVP_CTRL_GET_RC5_ROUNDS, 0,\s0 &rounds)" 4 176 .IX Item "EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GET_RC5_ROUNDS, 0, &rounds)" 177 Stores the number of rounds currently configured in \fB*rounds\fR where \fB*rounds\fR
|
/freebsd/crypto/openssl/providers/implementations/ciphers/ |
H A D | cipher_rc5.c | 90 unsigned int rounds; in rc5_set_ctx_params() local 92 if (!OSSL_PARAM_get_uint(p, &rounds)) { in rc5_set_ctx_params() 96 if (rounds != RC5_8_ROUNDS in rc5_set_ctx_params() 97 && rounds != RC5_12_ROUNDS in rc5_set_ctx_params() 98 && rounds != RC5_16_ROUNDS) { in rc5_set_ctx_params() 102 ctx->rounds = rounds; in rc5_set_ctx_params() 125 if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->rounds)) { in OSSL_PARAM_uint() 152 ctx->rounds = RC5_12_ROUNDS; \
|
/freebsd/contrib/libcbor/test/ |
H A D | fuzz_test.c | 13 #define ROUNDS 65536ULL macro 16 #define ROUNDS 256ULL macro 60 printf("Fuzzing %llu rounds of up to %llu bytes with seed %u\n", ROUNDS, in fuzz() 64 for (size_t i = 0; i < ROUNDS; i++) run_round(); in fuzz() 67 (ROUNDS * MAXLEN) / 1024); in fuzz()
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | e_rc5.c | 32 int rounds; /* number of rounds */ member 47 data(c)->rounds = RC5_12_ROUNDS; in rc5_ctrl() 51 *(int *)ptr = data(c)->rounds; in rc5_ctrl() 59 data(c)->rounds = arg; in rc5_ctrl() 81 return RC5_32_set_key(&data(ctx)->ks, key_len, key, data(ctx)->rounds); in r_32_12_16_init_key()
|
/freebsd/sys/crypto/armv8/ |
H A D | armv8_crypto_wrap.c | 56 armv8_aes_enc(int rounds, const uint8x16_t *keysched, const uint8x16_t from) in armv8_aes_enc() argument 62 for (i = 0; i < rounds - 1; i += 2) { in armv8_aes_enc() 69 tmp = vaeseq_u8(tmp, keysched[rounds - 1]); in armv8_aes_enc() 71 tmp = vaeseq_u8(tmp, keysched[rounds]); in armv8_aes_enc() 72 tmp = veorq_u8(tmp, keysched[rounds + 1]); in armv8_aes_enc() 78 armv8_aes_dec(int rounds, const uint8x16_t *keysched, const uint8x16_t from) in armv8_aes_dec() argument 84 for (i = 0; i < rounds - 1; i += 2) { in armv8_aes_dec() 91 tmp = vaesdq_u8(tmp, keysched[rounds - 1]); in armv8_aes_dec() 93 tmp = vaesdq_u8(tmp, keysched[rounds]); in armv8_aes_dec() 94 tmp = veorq_u8(tmp, keysched[rounds + 1]); in armv8_aes_dec() [all …]
|
/freebsd/contrib/libarchive/libarchive/ |
H A D | archive_cryptor.c | 51 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 55 pw_len, salt, salt_len, kCCPRFHmacAlgSHA1, rounds, in pbkdf2_sha1() 67 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 80 (PUCHAR)(uintptr_t)salt, (ULONG)salt_len, rounds, in pbkdf2_sha1() 92 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 111 pw_len, salt, salt_len, rounds, derived_key_len, derived_key); in pbkdf2_sha1() 121 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 123 pbkdf2_hmac_sha1((unsigned)pw_len, (const uint8_t *)pw, rounds, in pbkdf2_sha1() 132 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument 135 PKCS5_PBKDF2_HMAC_SHA1(pw, pw_len, salt, salt_len, rounds, in pbkdf2_sha1() [all …]
|