Home
last modified time | relevance | path

Searched refs:rounds (Results 1 – 25 of 116) sorted by relevance

12345

/freebsd/crypto/openssl/crypto/aes/asm/
H A Daes-armv4.pl72 $rounds="r12";
214 mov $rounds,r0 @ inp
217 ldrb $s0,[$rounds,#3] @ load input data in endian-neutral
218 ldrb $t1,[$rounds,#2] @ manner...
219 ldrb $t2,[$rounds,#1]
220 ldrb $t3,[$rounds,#0]
222 ldrb $s1,[$rounds,#7]
224 ldrb $t1,[$rounds,#6]
226 ldrb $t2,[$rounds,#5]
227 ldrb $t3,[$rounds,#4]
[all …]
H A Daesv8-armx.pl104 my ($inp,$bits,$out,$ptr,$rounds)=("x0","w1","x2","x3","w12");
203 mov $rounds,#10
242 mov $rounds,#12
250 mov $rounds,#14
285 str $rounds,[$out]
356 my $rounds="w3";
369 ldr $rounds,[$key,#240]
372 sub $rounds,$rounds,#2
379 subs $rounds,$rounds,#2
426 my ($enc,$rounds,$cnt,$key_,$step)=("w4","w5","w6","x7","x8");
[all …]
H A Daesni-x86.pl90 $rounds="ecx";
137 &dec ($rounds);
153 &cmp ($rounds,11);
196 &mov ($rounds,&DWP(240,$key));
215 &mov ($rounds,&DWP(240,$key));
248 &shl ($rounds,4);
253 &lea ($key,&DWP(32,$key,$rounds));
254 &neg ($rounds);
255 &add ($rounds,16);
260 &$movekey ($rndkey1,&QWP(0,$key,$rounds));
[all …]
H A Daes-sparcv9.pl77 $rounds="%i7"; # aliases with return address, which is off-loaded to stack
205 ld [$key+240],$rounds
209 srl $rounds,1,$rounds
272 subcc $rounds,1,$rounds !
275 add $tbl,2048,$rounds
449 ldub [$rounds+$acc0],$acc0
452 ldub [$rounds+$acc1],$acc1
455 ldub [$rounds+$acc2],$acc2
456 ldub [$rounds+$acc3],$acc3
459 ldub [$rounds+$acc4],$acc4
[all …]
H A Daes-parisc.pl73 $rounds="%r29";
198 ldw 240($key),$rounds
202 _srm $rounds,1,$rounds
245 addib,= -1,$rounds,L\$enc_last
360 ldo 1024($tbl),$rounds
397 ldbx $acc0($rounds),$acc0
399 ldbx $acc1($rounds),$acc1
402 ldbx $acc2($rounds),$acc2
403 ldbx $acc3($rounds),$acc3
405 ldbx $acc4($rounds),$acc4
[all …]
H A Daesni-x86_64.pl218 $rounds="%eax"; # input to and changed by aesni_[en|de]cryptN !!!
245 my ($p,$key,$rounds,$inout,$ivec)=@_; $inout=$inout0 if (!defined($inout));
263 dec $rounds
282 mov 240($key),$rounds # key->rounds
284 &aesni_generate1("enc",$key,$rounds);
301 mov 240($key),$rounds # key->rounds
303 &aesni_generate1("dec",$key,$rounds);
338 shl \$4,$rounds
343 lea 32($key,$rounds),$key
344 neg %rax # $rounds
[all …]
H A Dbsaes-armv7.pl74 my ($key,$rounds,$const)=("r4","r5","r6");
782 sub $rounds,$rounds,#1
791 subs $rounds,$rounds,#1
883 sub $rounds,$rounds,#1
892 subs $rounds,$rounds,#1
923 my ($out,$inp,$rounds,$const)=("r12","r4","r5","r6");
974 sub $rounds,$rounds,#1
1001 subs $rounds,$rounds,#1
1115 my ($inp,$out,$len,$key, $ivp,$fp,$rounds)=map("r$_",(0..3,8..10));
1147 ldr $rounds, [$key, #240] @ get # of rounds
[all …]
H A Daesfx-sparcv9.pl39 my ($inp,$out,$key,$rounds,$tmp,$mask) = map("%o$_",(0..5));
59 ld [$key + 240], $rounds
83 sub $rounds, 4, $rounds
99 brnz,a $rounds, .Loop_enc
100 sub $rounds, 2, $rounds
149 ld [$key + 240], $rounds
173 sub $rounds, 4, $rounds
189 brnz,a $rounds, .Loop_dec
190 sub $rounds, 2, $rounds
393 my ($rounds,$inner,$end,$inc,$ialign,$oalign,$mask) = map("%l$_",(0..7));
[all …]
H A Daesp8-ppc.pl87 my ($inp,$bits,$out,$ptr,$cnt,$rounds)=map("r$_",(3..8));
231 li $rounds,10
305 li $rounds,12
313 li $rounds,14
367 stw $rounds,0($out)
389 slwi $cnt,$rounds,4
391 srwi $rounds,$rounds,1
393 mtctr $rounds
431 my ($inp,$out,$key,$rounds,$idx)=map("r$_",(3..7));
437 lwz $rounds,240($key)
[all …]
H A Daest4-sparcv9.pl91 my ($inp,$out,$key,$rounds,$tmp,$mask)=map("%o$_",(0..5));
128 ld [$key + 240], $rounds
135 srl $rounds, 1, $rounds
137 sub $rounds, 1, $rounds
146 sub $rounds,1,$rounds
151 brnz,pt $rounds, .Lenc
206 ld [$key + 240], $rounds
213 srl $rounds, 1, $rounds
215 sub $rounds, 1, $rounds
224 sub $rounds,1,$rounds
[all …]
/freebsd/sys/contrib/ck/src/
H A Dck_barrier_tournament.c61 struct ck_barrier_tournament_round **rounds, in ck_barrier_tournament_init() argument
71 rounds[i][0].flag = 0; in ck_barrier_tournament_init()
72 rounds[i][0].role = CK_BARRIER_TOURNAMENT_DROPOUT; in ck_barrier_tournament_init()
74 rounds[i][k].flag = 0; in ck_barrier_tournament_init()
79 rounds[i][k].role = CK_BARRIER_TOURNAMENT_WINNER; in ck_barrier_tournament_init()
81 rounds[i][k].role = CK_BARRIER_TOURNAMENT_BYE; in ck_barrier_tournament_init()
85 rounds[i][k].role = CK_BARRIER_TOURNAMENT_LOSER; in ck_barrier_tournament_init()
87 rounds[i][k].role = CK_BARRIER_TOURNAMENT_CHAMPION; in ck_barrier_tournament_init()
89 if (rounds[i][k].role == CK_BARRIER_TOURNAMENT_LOSER) in ck_barrier_tournament_init()
90 rounds[i][k].opponent = &rounds[i - twokm1][k].flag; in ck_barrier_tournament_init()
[all …]
/freebsd/sys/crypto/aesni/
H A Daesni_wrap.c54 aesni_encrypt_cbc(int rounds, const void *key_schedule, size_t len, in aesni_encrypt_cbc() argument
63 tot = aesni_enc(rounds - 1, key_schedule, in aesni_encrypt_cbc()
73 aesni_decrypt_cbc(int rounds, const void *key_schedule, size_t len, in aesni_decrypt_cbc() argument
85 aesni_dec8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], in aesni_decrypt_cbc()
100 aesni_dec(rounds - 1, key_schedule, nextiv) ^ ivreg); in aesni_decrypt_cbc()
107 aesni_encrypt_ecb(int rounds, const void *key_schedule, size_t len, in aesni_encrypt_ecb() argument
120 aesni_enc8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], in aesni_encrypt_ecb()
137 tot = aesni_enc(rounds - 1, key_schedule, in aesni_encrypt_ecb()
146 aesni_decrypt_ecb(int rounds, const void *key_schedule, size_t len, in aesni_decrypt_ecb() argument
159 aesni_dec8(rounds - 1, key_schedule, blks->blk[0], blks->blk[1], in aesni_decrypt_ecb()
[all …]
H A Daesencdec.h38 aesni_enc8(int rounds, const __m128i *keysched, __m128i a, in aesni_enc8() argument
53 for (i = 0; i < rounds; i++) { in aesni_enc8()
75 aesni_dec8(int rounds, const __m128i *keysched, __m128i a, in aesni_dec8() argument
90 for (i = 0; i < rounds; i++) { in aesni_dec8()
113 aesni_enc(int rounds, const __m128i *keysched, const __m128i from) in aesni_enc() argument
119 for (i = 1; i < rounds; i += 2) { in aesni_enc()
124 tmp = _mm_aesenc_si128(tmp, keysched[rounds]); in aesni_enc()
125 return _mm_aesenclast_si128(tmp, keysched[rounds + 1]); in aesni_enc()
129 aesni_dec(int rounds, const __m128i *keysched, const __m128i from) in aesni_dec() argument
136 for (i = 1; i < rounds; i += 2) { in aesni_dec()
[all …]
H A Daesni.h55 int rounds; member
78 void aesni_encrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/,
81 void aesni_decrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/,
83 void aesni_encrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/,
85 void aesni_decrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/,
87 void aesni_encrypt_icm(int rounds, const void *key_schedule /*__aligned(16)*/,
91 void aesni_encrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/,
95 void aesni_decrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/,
/freebsd/crypto/openssl/crypto/rc5/
H A Drc5_skey.c20 int rounds) in RC5_32_set_key() argument
28 if ((rounds != RC5_16_ROUNDS) && in RC5_32_set_key()
29 (rounds != RC5_12_ROUNDS) && (rounds != RC5_8_ROUNDS)) in RC5_32_set_key()
30 rounds = RC5_16_ROUNDS; in RC5_32_set_key()
32 key->rounds = rounds; in RC5_32_set_key()
50 t = (rounds + 1) * 2; in RC5_32_set_key()
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devpmac_siphash.txt14 # SIPHASH tests - default values: 2,4 rounds, 16-byte mac
129 # SIPHASH - default values: 2,4 rounds, explicit 8-byte mac
143 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac
151 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac (set as 0)
159 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
166 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
174 Title = SIPHASH - explicit rounds
178 Ctrl = c-rounds:2
179 Ctrl = d-rounds:4
185 Title = SIPHASH - non-default values: 4,8 rounds
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DEVP_rc5_32_12_16_cbc.pod35 variable key length cipher with an additional "number of rounds" parameter. By
36 default the key length is set to 128 bits and 12 rounds. Alternative key lengths
45 =item EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_SET_RC5_ROUNDS, rounds, NULL)
47 Sets the number of rounds to B<rounds>. This must be one of RC5_8_ROUNDS,
50 =item EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GET_RC5_ROUNDS, 0, &rounds)
52 Stores the number of rounds currently configured in B<*rounds> where B<*rounds>
/freebsd/crypto/openssl/providers/implementations/ciphers/
H A Dcipher_rc5.c90 unsigned int rounds; in rc5_set_ctx_params() local
92 if (!OSSL_PARAM_get_uint(p, &rounds)) { in rc5_set_ctx_params()
96 if (rounds != RC5_8_ROUNDS in rc5_set_ctx_params()
97 && rounds != RC5_12_ROUNDS in rc5_set_ctx_params()
98 && rounds != RC5_16_ROUNDS) { in rc5_set_ctx_params()
102 ctx->rounds = rounds; in rc5_set_ctx_params()
125 if (p != NULL && !OSSL_PARAM_set_uint(p, ctx->rounds)) { in OSSL_PARAM_uint()
152 ctx->rounds = RC5_12_ROUNDS; \
/freebsd/crypto/openssl/crypto/evp/
H A De_rc5.c32 int rounds; /* number of rounds */ member
47 data(c)->rounds = RC5_12_ROUNDS; in rc5_ctrl()
51 *(int *)ptr = data(c)->rounds; in rc5_ctrl()
59 data(c)->rounds = arg; in rc5_ctrl()
81 return RC5_32_set_key(&data(ctx)->ks, key_len, key, data(ctx)->rounds); in r_32_12_16_init_key()
/freebsd/sys/crypto/armv8/
H A Darmv8_crypto_wrap.c56 armv8_aes_enc(int rounds, const uint8x16_t *keysched, const uint8x16_t from) in armv8_aes_enc() argument
62 for (i = 0; i < rounds - 1; i += 2) { in armv8_aes_enc()
69 tmp = vaeseq_u8(tmp, keysched[rounds - 1]); in armv8_aes_enc()
71 tmp = vaeseq_u8(tmp, keysched[rounds]); in armv8_aes_enc()
72 tmp = veorq_u8(tmp, keysched[rounds + 1]); in armv8_aes_enc()
78 armv8_aes_dec(int rounds, const uint8x16_t *keysched, const uint8x16_t from) in armv8_aes_dec() argument
84 for (i = 0; i < rounds - 1; i += 2) { in armv8_aes_dec()
91 tmp = vaesdq_u8(tmp, keysched[rounds - 1]); in armv8_aes_dec()
93 tmp = vaesdq_u8(tmp, keysched[rounds]); in armv8_aes_dec()
94 tmp = veorq_u8(tmp, keysched[rounds + 1]); in armv8_aes_dec()
[all …]
/freebsd/contrib/libarchive/libarchive/
H A Darchive_cryptor.c51 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
55 pw_len, salt, salt_len, kCCPRFHmacAlgSHA1, rounds, in pbkdf2_sha1()
67 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
80 (PUCHAR)(uintptr_t)salt, (ULONG)salt_len, rounds, in pbkdf2_sha1()
92 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
111 pw_len, salt, salt_len, rounds, derived_key_len, derived_key); in pbkdf2_sha1()
121 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
123 pbkdf2_hmac_sha1((unsigned)pw_len, (const uint8_t *)pw, rounds, in pbkdf2_sha1()
132 size_t salt_len, unsigned rounds, uint8_t *derived_key, in pbkdf2_sha1() argument
135 PKCS5_PBKDF2_HMAC_SHA1(pw, pw_len, salt, salt_len, rounds, in pbkdf2_sha1()
[all …]
/freebsd/crypto/openssl/crypto/aria/
H A Daria.c483 Nr = key->rounds; in ossl_aria_encrypt()
556 key->rounds = Nr; in ossl_aria_set_encrypt_key()
686 rk_tail = rk_head + key->rounds; in ossl_aria_set_decrypt_key()
1090 unsigned int rounds, const ARIA_u128 *keys) in do_encrypt() argument
1096 for (i = 0; i < rounds - 2; i += 2) { in do_encrypt()
1100 FO(&p, &p, &keys[rounds - 2]); in do_encrypt()
1101 sl2(o, &p, &keys[rounds - 1]); in do_encrypt()
1102 xor128(o, o, &keys[rounds]); in do_encrypt()
1113 do_encrypt(out, in, key->rounds, key->rd_key); in ossl_aria_encrypt()
1135 key->rounds = 12; in ossl_aria_set_encrypt_key()
[all …]
/freebsd/crypto/openssl/crypto/sha/asm/
H A Dsha512-ia64.pl94 $rounds=80;
108 $rounds=64;
508 { .mib; mov ar.lc=$rounds-17
590 { .mmb; add Ktbl=-$SZ*$rounds,Ktbl
645 .size K256#,$SZ*$rounds
691 .size K512#,$SZ*$rounds
/freebsd/contrib/bearssl/src/rsa/
H A Drsa_i15_keygen.c231 int rounds; in mkprime() local
350 rounds = 12; in mkprime()
352 rounds = 9; in mkprime()
354 rounds = 6; in mkprime()
356 rounds = 4; in mkprime()
358 rounds = 3; in mkprime()
360 rounds = 2; in mkprime()
363 if (miller_rabin(rng, x, rounds, t, tlen)) { in mkprime()
/freebsd/crypto/openssl/doc/man7/
H A DEVP_MAC-Siphash.pod44 =item "c-rounds" (B<OSSL_MAC_PARAM_C_ROUNDS>) <unsigned integer>
46 Specifies the number of rounds per message block. By default this is I<2>.
48 =item "d-rounds" (B<OSSL_MAC_PARAM_D_ROUNDS>) <unsigned integer>
50 Specifies the number of finalisation rounds. By default this is I<4>.

12345